Index: net/quic/crypto/quic_crypto_server_config.cc |
diff --git a/net/quic/crypto/quic_crypto_server_config.cc b/net/quic/crypto/quic_crypto_server_config.cc |
index 8e48fbb32cad04bd53c048cc892545fe30df4625..a37a88f7ba058416ba3e5910c29ef2b9e098075f 100644 |
--- a/net/quic/crypto/quic_crypto_server_config.cc |
+++ b/net/quic/crypto/quic_crypto_server_config.cc |
@@ -85,6 +85,7 @@ struct ClientHelloInfo { |
// Errors from EvaluateClientHello. |
vector<uint32> reject_reasons; |
+ COMPILE_ASSERT(sizeof(QuicTag) == sizeof(uint32), header_out_of_sync); |
}; |
struct ValidateClientHelloResultCallback::Result { |
@@ -153,8 +154,7 @@ class VerifyNonceIsValidAndUniqueCallback |
// TODO(rtenneti): Implement capturing of error from strike register. |
// Temporarily treat them as CLIENT_NONCE_UNKNOWN_FAILURE. |
if (!nonce_is_valid_and_unique) { |
- result_->info.reject_reasons.push_back( |
- static_cast<uint32>(CLIENT_NONCE_UNKNOWN_FAILURE)); |
+ result_->info.reject_reasons.push_back(CLIENT_NONCE_UNKNOWN_FAILURE); |
} |
done_cb_->Run(result_); |
} |
@@ -901,11 +901,9 @@ void QuicCryptoServerConfig::EvaluateClientHello( |
if (!requested_config.get()) { |
StringPiece requested_scid; |
if (client_hello.GetStringPiece(kSCID, &requested_scid)) { |
- info->reject_reasons.push_back( |
- static_cast<uint32>(SERVER_CONFIG_UNKNOWN_CONFIG_FAILURE)); |
+ info->reject_reasons.push_back(SERVER_CONFIG_UNKNOWN_CONFIG_FAILURE); |
} else { |
- info->reject_reasons.push_back( |
- static_cast<uint32>(SERVER_CONFIG_INCHOATE_HELLO_FAILURE)); |
+ info->reject_reasons.push_back(SERVER_CONFIG_INCHOATE_HELLO_FAILURE); |
} |
// No server config with the requested ID. |
helper.ValidationComplete(QUIC_NO_ERROR, ""); |
@@ -928,8 +926,7 @@ void QuicCryptoServerConfig::EvaluateClientHello( |
bool found_error = false; |
if (source_address_token_error != HANDSHAKE_OK) { |
- info->reject_reasons.push_back( |
- static_cast<uint32>(source_address_token_error)); |
+ info->reject_reasons.push_back(source_address_token_error); |
// No valid source address token. |
if (FLAGS_use_early_return_when_verifying_chlo) { |
helper.ValidationComplete(QUIC_NO_ERROR, ""); |
@@ -942,8 +939,7 @@ void QuicCryptoServerConfig::EvaluateClientHello( |
info->client_nonce.size() == kNonceSize) { |
info->client_nonce_well_formed = true; |
} else { |
- info->reject_reasons.push_back( |
- static_cast<uint32>(CLIENT_NONCE_INVALID_FAILURE)); |
+ info->reject_reasons.push_back(CLIENT_NONCE_INVALID_FAILURE); |
// Invalid client nonce. |
DVLOG(1) << "Invalid client nonce."; |
if (FLAGS_use_early_return_when_verifying_chlo) { |
@@ -970,7 +966,7 @@ void QuicCryptoServerConfig::EvaluateClientHello( |
if (server_nonce_error == HANDSHAKE_OK) { |
info->unique = true; |
} else { |
- info->reject_reasons.push_back(static_cast<uint32>(server_nonce_error)); |
+ info->reject_reasons.push_back(server_nonce_error); |
info->unique = false; |
} |
DVLOG(1) << "Using server nonce, unique: " << info->unique; |
@@ -978,8 +974,8 @@ void QuicCryptoServerConfig::EvaluateClientHello( |
return; |
} |
- // We want to contact strike register if there are no errors because it is |
- // a RPC call and is expensive. |
+ // We want to contact strike register only if there are no errors because it |
+ // is a RPC call and is expensive. |
if (found_error) { |
helper.ValidationComplete(QUIC_NO_ERROR, ""); |
return; |