| Index: net/tools/quic/quic_client_session_test.cc
|
| diff --git a/net/tools/quic/quic_client_session_test.cc b/net/tools/quic/quic_client_session_test.cc
|
| index 82c20e60655586e0cda641744c8ace36fb48d0e7..b60833dab182b0f11ce02bf60e0872a0eb12952d 100644
|
| --- a/net/tools/quic/quic_client_session_test.cc
|
| +++ b/net/tools/quic/quic_client_session_test.cc
|
| @@ -7,8 +7,8 @@
|
| #include <vector>
|
|
|
| #include "net/quic/core/crypto/aes_128_gcm_12_encrypter.h"
|
| -#include "net/quic/core/quic_flags.h"
|
| #include "net/quic/core/spdy_utils.h"
|
| +#include "net/quic/platform/api/quic_flags.h"
|
| #include "net/quic/platform/api/quic_ptr_util.h"
|
| #include "net/quic/platform/api/quic_socket_address.h"
|
| #include "net/quic/platform/api/quic_str_cat.h"
|
| @@ -102,8 +102,8 @@ class QuicClientSessionTest : public ::testing::TestWithParam<QuicVersion> {
|
|
|
| void CompleteCryptoHandshake(uint32_t server_max_incoming_streams) {
|
| session_->CryptoConnect();
|
| - QuicCryptoClientStream* stream =
|
| - static_cast<QuicCryptoClientStream*>(session_->GetCryptoStream());
|
| + QuicCryptoClientStream* stream = static_cast<QuicCryptoClientStream*>(
|
| + session_->GetMutableCryptoStream());
|
| crypto_test_utils::FakeServerOptions options;
|
| QuicConfig config = DefaultQuicConfig();
|
| config.SetMaxIncomingDynamicStreamsToSend(server_max_incoming_streams);
|
| @@ -153,7 +153,7 @@ TEST_P(QuicClientSessionTest, NoEncryptionAfterInitialEncryption) {
|
| CryptoHandshakeMessage rej;
|
| crypto_test_utils::FillInDummyReject(&rej, /* stateless */ false);
|
| EXPECT_TRUE(session_->IsEncryptionEstablished());
|
| - session_->GetCryptoStream()->OnHandshakeMessage(rej);
|
| + session_->GetMutableCryptoStream()->OnHandshakeMessage(rej);
|
| EXPECT_FALSE(session_->IsEncryptionEstablished());
|
| EXPECT_EQ(ENCRYPTION_NONE,
|
| QuicPacketCreatorPeer::GetEncryptionLevel(
|
| @@ -166,7 +166,7 @@ TEST_P(QuicClientSessionTest, NoEncryptionAfterInitialEncryption) {
|
| struct iovec iov = {data, arraysize(data)};
|
| QuicIOVector iovector(&iov, 1, iov.iov_len);
|
| QuicConsumedData consumed =
|
| - session_->WritevData(stream, stream->id(), iovector, 0, false, nullptr);
|
| + session_->WritevData(stream, stream->id(), iovector, 0, NO_FIN, nullptr);
|
| EXPECT_FALSE(consumed.fin_consumed);
|
| EXPECT_EQ(0u, consumed.bytes_consumed);
|
| }
|
| @@ -174,15 +174,8 @@ TEST_P(QuicClientSessionTest, NoEncryptionAfterInitialEncryption) {
|
| TEST_P(QuicClientSessionTest, MaxNumStreamsWithNoFinOrRst) {
|
| EXPECT_CALL(*connection_, SendRstStream(_, _, _)).Times(AnyNumber());
|
|
|
| - if (GetParam() <= QUIC_VERSION_34) {
|
| - session_->config()->SetMaxStreamsPerConnection(1, 1);
|
| -
|
| - // Initialize crypto before the client session will create a stream.
|
| - CompleteCryptoHandshake();
|
| - } else {
|
| - const uint32_t kServerMaxIncomingStreams = 1;
|
| - CompleteCryptoHandshake(kServerMaxIncomingStreams);
|
| - }
|
| + const uint32_t kServerMaxIncomingStreams = 1;
|
| + CompleteCryptoHandshake(kServerMaxIncomingStreams);
|
|
|
| QuicSpdyClientStream* stream =
|
| session_->CreateOutgoingDynamicStream(kDefaultPriority);
|
| @@ -201,15 +194,8 @@ TEST_P(QuicClientSessionTest, MaxNumStreamsWithNoFinOrRst) {
|
| TEST_P(QuicClientSessionTest, MaxNumStreamsWithRst) {
|
| EXPECT_CALL(*connection_, SendRstStream(_, _, _)).Times(AnyNumber());
|
|
|
| - if (GetParam() <= QUIC_VERSION_34) {
|
| - session_->config()->SetMaxStreamsPerConnection(1, 1);
|
| -
|
| - // Initialize crypto before the client session will create a stream.
|
| - CompleteCryptoHandshake();
|
| - } else {
|
| - const uint32_t kServerMaxIncomingStreams = 1;
|
| - CompleteCryptoHandshake(kServerMaxIncomingStreams);
|
| - }
|
| + const uint32_t kServerMaxIncomingStreams = 1;
|
| + CompleteCryptoHandshake(kServerMaxIncomingStreams);
|
|
|
| QuicSpdyClientStream* stream =
|
| session_->CreateOutgoingDynamicStream(kDefaultPriority);
|
|
|