| Index: net/quic/core/quic_connection_test.cc
|
| diff --git a/net/quic/core/quic_connection_test.cc b/net/quic/core/quic_connection_test.cc
|
| index 357e29b32935314ddec2b08c95b15a821397171c..f19d61e129df507becd95c355511e2fca0fb11fb 100644
|
| --- a/net/quic/core/quic_connection_test.cc
|
| +++ b/net/quic/core/quic_connection_test.cc
|
| @@ -90,7 +90,6 @@ class TaggingEncrypter : public QuicEncrypter {
|
| bool SetNoncePrefix(StringPiece nonce_prefix) override { return true; }
|
|
|
| bool EncryptPacket(QuicVersion /*version*/,
|
| - QuicPathId path_id,
|
| QuicPacketNumber packet_number,
|
| StringPiece associated_data,
|
| StringPiece plaintext,
|
| @@ -155,7 +154,6 @@ class TaggingDecrypter : public QuicDecrypter {
|
| }
|
|
|
| bool DecryptPacket(QuicVersion /*version*/,
|
| - QuicPathId path_id,
|
| QuicPacketNumber packet_number,
|
| StringPiece associated_data,
|
| StringPiece ciphertext,
|
| @@ -499,8 +497,7 @@ class TestConnection : public QuicConnection {
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length =
|
| QuicConnectionPeer::GetFramer(this)->EncryptPayload(
|
| - ENCRYPTION_NONE, path_id, packet_number, *packet, buffer,
|
| - kMaxPacketSize);
|
| + ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize);
|
| delete packet;
|
| SerializedPacket serialized_packet(
|
| kDefaultPathId, packet_number, PACKET_6BYTE_PACKET_NUMBER, buffer,
|
| @@ -839,8 +836,8 @@ class QuicConnectionTest : public ::testing::TestWithParam<TestParams> {
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
|
|
| char buffer[kMaxPacketSize];
|
| - size_t encrypted_length = framer_.EncryptPayload(
|
| - level, path_id, number, *packet, buffer, kMaxPacketSize);
|
| + size_t encrypted_length =
|
| + framer_.EncryptPayload(level, number, *packet, buffer, kMaxPacketSize);
|
| connection_.ProcessUdpPacket(
|
| kSelfAddress, kPeerAddress,
|
| QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
|
| @@ -859,7 +856,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<TestParams> {
|
| ConstructDataPacket(path_id, number, has_stop_waiting));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - level, path_id, number, *packet, buffer, kMaxPacketSize);
|
| + level, number, *packet, buffer, kMaxPacketSize);
|
| connection_.ProcessUdpPacket(
|
| kSelfAddress, kPeerAddress,
|
| QuicReceivedPacket(buffer, encrypted_length, clock_.Now(), false));
|
| @@ -873,7 +870,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<TestParams> {
|
| std::unique_ptr<QuicPacket> packet(ConstructClosePacket(number));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, path_id, number, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, number, *packet, buffer, kMaxPacketSize);
|
| connection_.ProcessUdpPacket(
|
| kSelfAddress, kPeerAddress,
|
| QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
|
| @@ -1216,7 +1213,7 @@ TEST_P(QuicConnectionTest, IncreaseServerMaxPacketSize) {
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, 12, *packet, buffer, kMaxPacketSize);
|
| EXPECT_EQ(kMaxPacketSize, encrypted_length);
|
|
|
| framer_.set_version(version());
|
| @@ -1250,7 +1247,7 @@ TEST_P(QuicConnectionTest, IncreaseServerMaxPacketSizeWhileWriterLimited) {
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, 12, *packet, buffer, kMaxPacketSize);
|
| EXPECT_EQ(kMaxPacketSize, encrypted_length);
|
|
|
| framer_.set_version(version());
|
| @@ -4293,8 +4290,8 @@ TEST_P(QuicConnectionTest, ServerSendsVersionNegotiationPacket) {
|
| frames.push_back(QuicFrame(&frame1_));
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| - size_t encrypted_length = framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + size_t encrypted_length = framer_.EncryptPayload(ENCRYPTION_NONE, 12, *packet,
|
| + buffer, kMaxPacketSize);
|
|
|
| framer_.set_version(version());
|
| connection_.ProcessUdpPacket(
|
| @@ -4328,8 +4325,8 @@ TEST_P(QuicConnectionTest, ServerSendsVersionNegotiationPacketSocketBlocked) {
|
| frames.push_back(QuicFrame(&frame1_));
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| - size_t encrypted_length = framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + size_t encrypted_length = framer_.EncryptPayload(ENCRYPTION_NONE, 12, *packet,
|
| + buffer, kMaxPacketSize);
|
|
|
| framer_.set_version(version());
|
| BlockOnNextWrite();
|
| @@ -4370,8 +4367,8 @@ TEST_P(QuicConnectionTest,
|
| frames.push_back(QuicFrame(&frame1_));
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| - size_t encryped_length = framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + size_t encryped_length = framer_.EncryptPayload(ENCRYPTION_NONE, 12, *packet,
|
| + buffer, kMaxPacketSize);
|
|
|
| framer_.set_version(version());
|
| set_perspective(Perspective::IS_SERVER);
|
| @@ -4409,7 +4406,7 @@ TEST_P(QuicConnectionTest, ClientHandlesVersionNegotiation) {
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, 12, *packet, buffer, kMaxPacketSize);
|
| ASSERT_NE(0u, encrypted_length);
|
| EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| @@ -4498,7 +4495,7 @@ TEST_P(QuicConnectionTest, ProcessFramesIfPacketClosedConnection) {
|
| EXPECT_TRUE(nullptr != packet.get());
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 1, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, 1, *packet, buffer, kMaxPacketSize);
|
|
|
| EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PEER_GOING_AWAY, _,
|
| ConnectionCloseSource::FROM_PEER));
|
|
|