Index: net/tools/quic/quic_client_session_test.cc |
diff --git a/net/tools/quic/quic_client_session_test.cc b/net/tools/quic/quic_client_session_test.cc |
index d463e872295a584429e8a5bbc7ca082b28281249..37492b1aa7fc8a132957c0e5a142a933e6a36d42 100644 |
--- a/net/tools/quic/quic_client_session_test.cc |
+++ b/net/tools/quic/quic_client_session_test.cc |
@@ -65,7 +65,7 @@ class TestQuicClientSession : public QuicClientSession { |
class QuicClientSessionTest : public ::testing::TestWithParam<QuicVersion> { |
protected: |
QuicClientSessionTest() |
- : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), |
+ : crypto_config_(crypto_test_utils::ProofVerifierForTesting()), |
promised_stream_id_(kServerDataStreamId1), |
associated_stream_id_(kClientDataStreamId1) { |
Initialize(); |
@@ -104,11 +104,11 @@ class QuicClientSessionTest : public ::testing::TestWithParam<QuicVersion> { |
session_->CryptoConnect(); |
QuicCryptoClientStream* stream = |
static_cast<QuicCryptoClientStream*>(session_->GetCryptoStream()); |
- CryptoTestUtils::FakeServerOptions options; |
+ crypto_test_utils::FakeServerOptions options; |
QuicConfig config = DefaultQuicConfig(); |
config.SetMaxIncomingDynamicStreamsToSend(server_max_incoming_streams); |
- CryptoTestUtils::HandshakeWithFakeServer(&config, &helper_, &alarm_factory_, |
- connection_, stream, options); |
+ crypto_test_utils::HandshakeWithFakeServer( |
+ &config, &helper_, &alarm_factory_, connection_, stream, options); |
} |
QuicCryptoClientConfig crypto_config_; |
@@ -151,7 +151,7 @@ TEST_P(QuicClientSessionTest, NoEncryptionAfterInitialEncryption) { |
// an inchoate CHLO to be sent and will leave the encryption level |
// at NONE. |
CryptoHandshakeMessage rej; |
- CryptoTestUtils::FillInDummyReject(&rej, /* stateless */ false); |
+ crypto_test_utils::FillInDummyReject(&rej, /* stateless */ false); |
EXPECT_TRUE(session_->IsEncryptionEstablished()); |
session_->GetCryptoStream()->OnHandshakeMessage(rej); |
EXPECT_FALSE(session_->IsEncryptionEstablished()); |