| Index: net/spdy/spdy_framer_test.cc
|
| diff --git a/net/spdy/spdy_framer_test.cc b/net/spdy/spdy_framer_test.cc
|
| index 3d30213bd96e01e8f72f2e2c505ab2b7cdace934..42b2cd22074a03782e4cc577df3e273c525c57e4 100644
|
| --- a/net/spdy/spdy_framer_test.cc
|
| +++ b/net/spdy/spdy_framer_test.cc
|
| @@ -11,7 +11,6 @@
|
| #include <cstdint>
|
| #include <limits>
|
| #include <memory>
|
| -#include <string>
|
| #include <tuple>
|
| #include <vector>
|
|
|
| @@ -33,7 +32,6 @@
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| #include "testing/platform_test.h"
|
|
|
| -using std::string;
|
| using testing::_;
|
|
|
| namespace net {
|
| @@ -471,7 +469,7 @@ class TestSpdyVisitor : public SpdyFramerVisitorInterface,
|
| << "\", altsvc_vector)";
|
| test_altsvc_ir_.set_stream_id(stream_id);
|
| if (origin.length() > 0) {
|
| - test_altsvc_ir_.set_origin(std::string(origin));
|
| + test_altsvc_ir_.set_origin(SpdyString(origin));
|
| }
|
| for (const SpdyAltSvcWireFormat::AlternativeService& altsvc :
|
| altsvc_vector) {
|
| @@ -645,7 +643,7 @@ class TestExtension : public ExtensionVisitorInterface {
|
| size_t length_ = 0;
|
| uint8_t type_ = 0;
|
| uint8_t flags_ = 0;
|
| - string payload_;
|
| + SpdyString payload_;
|
| };
|
|
|
| // Retrieves serialized headers from a HEADERS frame.
|
| @@ -712,7 +710,7 @@ class SpdyFramerTest : public ::testing::TestWithParam<
|
| }
|
| }
|
|
|
| - void CompareFrame(const string& description,
|
| + void CompareFrame(const SpdyString& description,
|
| const SpdySerializedFrame& actual_frame,
|
| const unsigned char* expected,
|
| const int expected_len) {
|
| @@ -722,7 +720,7 @@ class SpdyFramerTest : public ::testing::TestWithParam<
|
| expected, expected_len);
|
| }
|
|
|
| - void CompareFrames(const string& description,
|
| + void CompareFrames(const SpdyString& description,
|
| const SpdySerializedFrame& expected_frame,
|
| const SpdySerializedFrame& actual_frame) {
|
| CompareCharArraysWithHexError(
|
| @@ -1174,7 +1172,7 @@ TEST_P(SpdyFramerTest, ContinuationWithStreamIdZero) {
|
|
|
| SpdyContinuationIR continuation(0);
|
| auto some_nonsense_encoding =
|
| - base::MakeUnique<string>("some nonsense encoding");
|
| + base::MakeUnique<SpdyString>("some nonsense encoding");
|
| continuation.take_encoding(std::move(some_nonsense_encoding));
|
| continuation.set_end_headers(true);
|
| SpdySerializedFrame frame(framer.SerializeContinuation(continuation));
|
| @@ -1268,11 +1266,11 @@ TEST_P(SpdyFramerTest, MultiValueHeader) {
|
| frame.WriteUInt32(0); // Priority exclusivity and dependent stream.
|
| frame.WriteUInt8(255); // Priority weight.
|
|
|
| - string value("value1\0value2", 13);
|
| + SpdyString value("value1\0value2", 13);
|
| // TODO(jgraettinger): If this pattern appears again, move to test class.
|
| SpdyHeaderBlock header_set;
|
| header_set["name"] = value;
|
| - string buffer;
|
| + SpdyString buffer;
|
| HpackEncoder encoder(ObtainHpackHuffmanTable());
|
| encoder.DisableCompression();
|
| encoder.EncodeHeaderSet(header_set, &buffer);
|
| @@ -2477,7 +2475,7 @@ TEST_P(SpdyFramerTest, CreateContinuationUncompressed) {
|
| SpdyHeaderBlock header_block;
|
| header_block["bar"] = "foo";
|
| header_block["foo"] = "bar";
|
| - auto buffer = base::MakeUnique<string>();
|
| + auto buffer = base::MakeUnique<SpdyString>();
|
| HpackEncoder encoder(ObtainHpackHuffmanTable());
|
| encoder.DisableCompression();
|
| encoder.EncodeHeaderSet(header_block, buffer.get());
|
| @@ -2592,7 +2590,7 @@ TEST_P(SpdyFramerTest, CreatePushPromiseThenContinuationUncompressed) {
|
|
|
| SpdyPushPromiseIR push_promise(42, 57);
|
| push_promise.set_padding_len(1);
|
| - string big_value(TestSpdyVisitor::sent_control_frame_max_size(), 'x');
|
| + SpdyString big_value(TestSpdyVisitor::sent_control_frame_max_size(), 'x');
|
| push_promise.SetHeader("xxx", big_value);
|
| SpdySerializedFrame frame(framer.SerializePushPromise(push_promise));
|
| if (use_output_) {
|
| @@ -2742,7 +2740,7 @@ TEST_P(SpdyFramerTest, TooLargeHeadersFrameUsesContinuation) {
|
| // Exact payload length will change with HPACK, but this should be long
|
| // enough to cause an overflow.
|
| const size_t kBigValueSize = TestSpdyVisitor::sent_control_frame_max_size();
|
| - string big_value(kBigValueSize, 'x');
|
| + SpdyString big_value(kBigValueSize, 'x');
|
| headers.SetHeader("aa", big_value);
|
| SpdySerializedFrame control_frame(SpdyFramerPeer::SerializeHeaders(
|
| &framer, headers, use_output_ ? &output_ : nullptr));
|
| @@ -2768,9 +2766,9 @@ TEST_P(SpdyFramerTest, MultipleContinuationFramesWithIterator) {
|
| // Exact payload length will change with HPACK, but this should be long
|
| // enough to cause an overflow.
|
| const size_t kBigValueSize = TestSpdyVisitor::sent_control_frame_max_size();
|
| - string big_valuex(kBigValueSize, 'x');
|
| + SpdyString big_valuex(kBigValueSize, 'x');
|
| headers->SetHeader("aa", big_valuex);
|
| - string big_valuez(kBigValueSize, 'z');
|
| + SpdyString big_valuez(kBigValueSize, 'z');
|
| headers->SetHeader("bb", big_valuez);
|
|
|
| SpdyFramer::SpdyHeaderFrameIterator frame_it(&framer, std::move(headers));
|
| @@ -2829,7 +2827,7 @@ TEST_P(SpdyFramerTest, TooLargePushPromiseFrameUsesContinuation) {
|
| // Exact payload length will change with HPACK, but this should be long
|
| // enough to cause an overflow.
|
| const size_t kBigValueSize = TestSpdyVisitor::sent_control_frame_max_size();
|
| - string big_value(kBigValueSize, 'x');
|
| + SpdyString big_value(kBigValueSize, 'x');
|
| push_promise.SetHeader("aa", big_value);
|
| SpdySerializedFrame control_frame(framer.SerializePushPromise(push_promise));
|
| if (use_output_) {
|
| @@ -2858,7 +2856,7 @@ TEST_P(SpdyFramerTest, ControlFrameMuchTooLarge) {
|
| const size_t kHeaderBufferSize =
|
| TestSpdyVisitor::header_data_chunk_max_size() * kHeaderBufferChunks;
|
| const size_t kBigValueSize = kHeaderBufferSize * 2;
|
| - string big_value(kBigValueSize, 'x');
|
| + SpdyString big_value(kBigValueSize, 'x');
|
| SpdyFramer framer(SpdyFramer::ENABLE_COMPRESSION);
|
| SpdyHeadersIR headers(1);
|
| headers.set_fin(true);
|
| @@ -2899,7 +2897,7 @@ TEST_P(SpdyFramerTest, ControlFrameSizesAreValidated) {
|
| 0x00, 0x00, 0x00, // Truncated Status Field
|
| };
|
| const size_t pad_length = length + kFrameHeaderSize - sizeof(kH2FrameData);
|
| - string pad(pad_length, 'A');
|
| + SpdyString pad(pad_length, 'A');
|
| TestSpdyVisitor visitor(SpdyFramer::DISABLE_COMPRESSION);
|
|
|
| visitor.SimulateInFramer(kH2FrameData, sizeof(kH2FrameData));
|
| @@ -3663,7 +3661,7 @@ TEST_P(SpdyFramerTest, ReadUnknownExtensionFrameWithExtension) {
|
| EXPECT_EQ(20u, extension.length_);
|
| EXPECT_EQ(255, extension.type_);
|
| EXPECT_EQ(0xff, extension.flags_);
|
| - EXPECT_EQ(string(20, '\xff'), extension.payload_);
|
| + EXPECT_EQ(SpdyString(20, '\xff'), extension.payload_);
|
|
|
| // Follow it up with a valid control frame to make sure we handle
|
| // subsequent frames correctly.
|
| @@ -4607,7 +4605,7 @@ TEST_P(SpdyFramerTest, ProcessAllInput) {
|
| VLOG(1) << "frame1_size = " << frame1_size;
|
| VLOG(1) << "frame2_size = " << frame2_size;
|
|
|
| - string input_buffer;
|
| + SpdyString input_buffer;
|
| input_buffer.append(frame1.data(), frame1_size);
|
| input_buffer.append(frame2.data(), frame2_size);
|
|
|
| @@ -4656,7 +4654,7 @@ TEST_P(SpdyFramerTest, ProcessAtMostOneFrame) {
|
| VLOG(1) << "frame1_size = " << frame1_size;
|
| VLOG(1) << "frame2_size = " << frame2_size;
|
|
|
| - string input_buffer;
|
| + SpdyString input_buffer;
|
| input_buffer.append(frame1.data(), frame1_size);
|
| input_buffer.append(frame2.data(), frame2_size);
|
|
|
|
|