Index: net/quic/core/crypto/quic_crypto_client_config_test.cc |
diff --git a/net/quic/core/crypto/quic_crypto_client_config_test.cc b/net/quic/core/crypto/quic_crypto_client_config_test.cc |
index 5d15437143fa28074dbfb456205d8c17f9dd3670..68bae7d1845ba81e9c8a6fbf84ed2acc5c281b9e 100644 |
--- a/net/quic/core/crypto/quic_crypto_client_config_test.cc |
+++ b/net/quic/core/crypto/quic_crypto_client_config_test.cc |
@@ -168,7 +168,7 @@ TEST(QuicCryptoClientConfigTest, CachedState_InitializeFrom) { |
TEST(QuicCryptoClientConfigTest, InchoateChlo) { |
QuicCryptoClientConfig::CachedState state; |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> params( |
new QuicCryptoNegotiatedParameters); |
CryptoHandshakeMessage msg; |
@@ -186,7 +186,7 @@ TEST(QuicCryptoClientConfigTest, InchoateChlo) { |
} |
TEST(QuicCryptoClientConfigTest, PreferAesGcm) { |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
if (config.aead.size() > 1) |
EXPECT_NE(kAESG, config.aead[0]); |
config.PreferAesGcm(); |
@@ -195,7 +195,7 @@ TEST(QuicCryptoClientConfigTest, PreferAesGcm) { |
TEST(QuicCryptoClientConfigTest, InchoateChloSecure) { |
QuicCryptoClientConfig::CachedState state; |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> params( |
new QuicCryptoNegotiatedParameters); |
CryptoHandshakeMessage msg; |
@@ -224,7 +224,7 @@ TEST(QuicCryptoClientConfigTest, InchoateChloSecureWithSCIDNoEXPY) { |
state.SetServerConfig(scfg.GetSerialized().AsStringPiece(), now, expiry, |
&details); |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> params( |
new QuicCryptoNegotiatedParameters); |
CryptoHandshakeMessage msg; |
@@ -250,7 +250,7 @@ TEST(QuicCryptoClientConfigTest, InchoateChloSecureWithSCID) { |
QuicWallTime::FromUNIXSeconds(1), |
QuicWallTime::FromUNIXSeconds(0), &details); |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> params( |
new QuicCryptoNegotiatedParameters); |
CryptoHandshakeMessage msg; |
@@ -266,7 +266,7 @@ TEST(QuicCryptoClientConfigTest, InchoateChloSecureWithSCID) { |
TEST(QuicCryptoClientConfigTest, FillClientHello) { |
QuicCryptoClientConfig::CachedState state; |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> params( |
new QuicCryptoNegotiatedParameters); |
QuicConnectionId kConnectionId = 1234; |
@@ -304,7 +304,7 @@ TEST(QuicCryptoClientConfigTest, ProcessServerDowngradeAttack) { |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> out_params( |
new QuicCryptoNegotiatedParameters); |
string error; |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
EXPECT_EQ(QUIC_VERSION_NEGOTIATION_MISMATCH, |
config.ProcessServerHello(msg, 0, supported_versions.front(), |
supported_versions, &cached, out_params, |
@@ -313,7 +313,7 @@ TEST(QuicCryptoClientConfigTest, ProcessServerDowngradeAttack) { |
} |
TEST(QuicCryptoClientConfigTest, InitializeFrom) { |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
QuicServerId canonical_server_id("www.google.com", 443, |
PRIVACY_MODE_DISABLED); |
QuicCryptoClientConfig::CachedState* state = |
@@ -334,7 +334,7 @@ TEST(QuicCryptoClientConfigTest, InitializeFrom) { |
} |
TEST(QuicCryptoClientConfigTest, Canonical) { |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
config.AddCanonicalSuffix(".google.com"); |
QuicServerId canonical_id1("www.google.com", 443, PRIVACY_MODE_DISABLED); |
QuicServerId canonical_id2("mail.google.com", 443, PRIVACY_MODE_DISABLED); |
@@ -358,7 +358,7 @@ TEST(QuicCryptoClientConfigTest, Canonical) { |
} |
TEST(QuicCryptoClientConfigTest, CanonicalNotUsedIfNotValid) { |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
config.AddCanonicalSuffix(".google.com"); |
QuicServerId canonical_id1("www.google.com", 443, PRIVACY_MODE_DISABLED); |
QuicServerId canonical_id2("mail.google.com", 443, PRIVACY_MODE_DISABLED); |
@@ -373,7 +373,7 @@ TEST(QuicCryptoClientConfigTest, CanonicalNotUsedIfNotValid) { |
} |
TEST(QuicCryptoClientConfigTest, ClearCachedStates) { |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
// Create two states on different origins. |
struct TestCase { |
@@ -461,14 +461,14 @@ TEST(QuicCryptoClientConfigTest, ClearCachedStates) { |
TEST(QuicCryptoClientConfigTest, ProcessReject) { |
CryptoHandshakeMessage rej; |
- CryptoTestUtils::FillInDummyReject(&rej, /* stateless */ false); |
+ crypto_test_utils::FillInDummyReject(&rej, /* stateless */ false); |
// Now process the rejection. |
QuicCryptoClientConfig::CachedState cached; |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> out_params( |
new QuicCryptoNegotiatedParameters); |
string error; |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
EXPECT_EQ(QUIC_NO_ERROR, |
config.ProcessRejection(rej, QuicWallTime::FromUNIXSeconds(0), |
AllSupportedVersions().front(), "", &cached, |
@@ -479,7 +479,7 @@ TEST(QuicCryptoClientConfigTest, ProcessReject) { |
TEST(QuicCryptoClientConfigTest, ProcessRejectWithLongTTL) { |
CryptoHandshakeMessage rej; |
- CryptoTestUtils::FillInDummyReject(&rej, /* stateless */ false); |
+ crypto_test_utils::FillInDummyReject(&rej, /* stateless */ false); |
QuicTime::Delta one_week = QuicTime::Delta::FromSeconds(kNumSecondsPerWeek); |
int64_t long_ttl = 3 * one_week.ToSeconds(); |
rej.SetValue(kSTTL, long_ttl); |
@@ -489,7 +489,7 @@ TEST(QuicCryptoClientConfigTest, ProcessRejectWithLongTTL) { |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> out_params( |
new QuicCryptoNegotiatedParameters); |
string error; |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
EXPECT_EQ(QUIC_NO_ERROR, |
config.ProcessRejection(rej, QuicWallTime::FromUNIXSeconds(0), |
AllSupportedVersions().front(), "", &cached, |
@@ -505,7 +505,7 @@ TEST(QuicCryptoClientConfigTest, ProcessRejectWithLongTTL) { |
TEST(QuicCryptoClientConfigTest, ProcessStatelessReject) { |
// Create a dummy reject message and mark it as stateless. |
CryptoHandshakeMessage rej; |
- CryptoTestUtils::FillInDummyReject(&rej, /* stateless */ true); |
+ crypto_test_utils::FillInDummyReject(&rej, /* stateless */ true); |
const QuicConnectionId kConnectionId = 0xdeadbeef; |
const string server_nonce = "SERVER_NONCE"; |
rej.SetValue(kRCID, kConnectionId); |
@@ -516,7 +516,7 @@ TEST(QuicCryptoClientConfigTest, ProcessStatelessReject) { |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> out_params( |
new QuicCryptoNegotiatedParameters); |
string error; |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
EXPECT_EQ(QUIC_NO_ERROR, |
config.ProcessRejection(rej, QuicWallTime::FromUNIXSeconds(0), |
AllSupportedVersions().front(), "", &cached, |
@@ -530,14 +530,14 @@ TEST(QuicCryptoClientConfigTest, BadlyFormattedStatelessReject) { |
// Create a dummy reject message and mark it as stateless. Do not |
// add an server-designated connection-id. |
CryptoHandshakeMessage rej; |
- CryptoTestUtils::FillInDummyReject(&rej, /* stateless */ true); |
+ crypto_test_utils::FillInDummyReject(&rej, /* stateless */ true); |
// Now process the rejection. |
QuicCryptoClientConfig::CachedState cached; |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> out_params( |
new QuicCryptoNegotiatedParameters); |
string error; |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
EXPECT_EQ(QUIC_CRYPTO_MESSAGE_PARAMETER_NOT_FOUND, |
config.ProcessRejection(rej, QuicWallTime::FromUNIXSeconds(0), |
AllSupportedVersions().front(), "", &cached, |
@@ -558,7 +558,7 @@ TEST(QuicCryptoClientConfigTest, ServerNonceinSHLO) { |
versions.push_back(QuicVersionToQuicTag(version)); |
msg.SetVector(kVER, versions); |
- QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting()); |
+ QuicCryptoClientConfig config(crypto_test_utils::ProofVerifierForTesting()); |
QuicCryptoClientConfig::CachedState cached; |
QuicReferenceCountedPointer<QuicCryptoNegotiatedParameters> out_params( |
new QuicCryptoNegotiatedParameters); |