| Index: net/quic/test_tools/quic_test_utils.cc
|
| diff --git a/net/quic/test_tools/quic_test_utils.cc b/net/quic/test_tools/quic_test_utils.cc
|
| index eb070011e63947c17b365ee3d8f0b8cfd1e86b47..9b30937b9ee9d54309ac99c593a7dd598bfcc9c1 100644
|
| --- a/net/quic/test_tools/quic_test_utils.cc
|
| +++ b/net/quic/test_tools/quic_test_utils.cc
|
| @@ -461,7 +461,7 @@ TestQuicSpdyClientSession::TestQuicSpdyClientSession(
|
| QuicCryptoClientConfig* crypto_config)
|
| : QuicClientSessionBase(connection, &push_promise_index_, config) {
|
| crypto_stream_.reset(new QuicCryptoClientStream(
|
| - server_id, this, CryptoTestUtils::ProofVerifyContextForTesting(),
|
| + server_id, this, crypto_test_utils::ProofVerifyContextForTesting(),
|
| crypto_config, this));
|
| Initialize();
|
| }
|
| @@ -645,7 +645,7 @@ QuicEncryptedPacket* ConstructEncryptedPacket(
|
| EXPECT_TRUE(packet != nullptr);
|
| char* buffer = new char[kMaxPacketSize];
|
| size_t encrypted_length = framer.EncryptPayload(
|
| - ENCRYPTION_NONE, path_id, packet_number, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize);
|
| EXPECT_NE(0u, encrypted_length);
|
| return new QuicEncryptedPacket(buffer, encrypted_length, true);
|
| }
|
| @@ -699,7 +699,7 @@ QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
|
|
|
| char* buffer = new char[kMaxPacketSize];
|
| size_t encrypted_length = framer.EncryptPayload(
|
| - ENCRYPTION_NONE, path_id, packet_number, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize);
|
| EXPECT_NE(0u, encrypted_length);
|
| return new QuicEncryptedPacket(buffer, encrypted_length, true);
|
| }
|
|
|