| Index: net/tools/quic/quic_client_session_test.cc
|
| diff --git a/net/tools/quic/quic_client_session_test.cc b/net/tools/quic/quic_client_session_test.cc
|
| index d463e872295a584429e8a5bbc7ca082b28281249..37492b1aa7fc8a132957c0e5a142a933e6a36d42 100644
|
| --- a/net/tools/quic/quic_client_session_test.cc
|
| +++ b/net/tools/quic/quic_client_session_test.cc
|
| @@ -65,7 +65,7 @@ class TestQuicClientSession : public QuicClientSession {
|
| class QuicClientSessionTest : public ::testing::TestWithParam<QuicVersion> {
|
| protected:
|
| QuicClientSessionTest()
|
| - : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()),
|
| + : crypto_config_(crypto_test_utils::ProofVerifierForTesting()),
|
| promised_stream_id_(kServerDataStreamId1),
|
| associated_stream_id_(kClientDataStreamId1) {
|
| Initialize();
|
| @@ -104,11 +104,11 @@ class QuicClientSessionTest : public ::testing::TestWithParam<QuicVersion> {
|
| session_->CryptoConnect();
|
| QuicCryptoClientStream* stream =
|
| static_cast<QuicCryptoClientStream*>(session_->GetCryptoStream());
|
| - CryptoTestUtils::FakeServerOptions options;
|
| + crypto_test_utils::FakeServerOptions options;
|
| QuicConfig config = DefaultQuicConfig();
|
| config.SetMaxIncomingDynamicStreamsToSend(server_max_incoming_streams);
|
| - CryptoTestUtils::HandshakeWithFakeServer(&config, &helper_, &alarm_factory_,
|
| - connection_, stream, options);
|
| + crypto_test_utils::HandshakeWithFakeServer(
|
| + &config, &helper_, &alarm_factory_, connection_, stream, options);
|
| }
|
|
|
| QuicCryptoClientConfig crypto_config_;
|
| @@ -151,7 +151,7 @@ TEST_P(QuicClientSessionTest, NoEncryptionAfterInitialEncryption) {
|
| // an inchoate CHLO to be sent and will leave the encryption level
|
| // at NONE.
|
| CryptoHandshakeMessage rej;
|
| - CryptoTestUtils::FillInDummyReject(&rej, /* stateless */ false);
|
| + crypto_test_utils::FillInDummyReject(&rej, /* stateless */ false);
|
| EXPECT_TRUE(session_->IsEncryptionEstablished());
|
| session_->GetCryptoStream()->OnHandshakeMessage(rej);
|
| EXPECT_FALSE(session_->IsEncryptionEstablished());
|
|
|