Index: content/browser/renderer_host/p2p/socket_host_unittest.cc |
diff --git a/content/browser/renderer_host/p2p/socket_host_unittest.cc b/content/browser/renderer_host/p2p/socket_host_unittest.cc |
index fc96e4a158a7af3c43e665a3bd7f11c138dcd6e1..1404ced5bc69bf8b1234e42e47b09d6804b071c2 100644 |
--- a/content/browser/renderer_host/p2p/socket_host_unittest.cc |
+++ b/content/browser/renderer_host/p2p/socket_host_unittest.cc |
@@ -297,7 +297,7 @@ TEST(P2PSocketHostTest, TestUpdateAbsSendTimeExtensionInTurnSendIndication) { |
// without HMAC value in the packet. |
TEST(P2PSocketHostTest, TestApplyPacketOptionsWithDefaultValues) { |
unsigned char fake_tag[4] = { 0xba, 0xdd, 0xba, 0xdd }; |
- rtc::PacketOptions options; |
+ talk_base::PacketOptions options; |
std::vector<char> rtp_packet; |
rtp_packet.resize(sizeof(kRtpMsgWithAbsSendTimeExtension) + 4); // tag length |
memcpy(&rtp_packet[0], kRtpMsgWithAbsSendTimeExtension, |
@@ -317,7 +317,7 @@ TEST(P2PSocketHostTest, TestApplyPacketOptionsWithDefaultValues) { |
// Veirfy HMAC is updated when packet option parameters are set. |
TEST(P2PSocketHostTest, TestApplyPacketOptionsWithAuthParams) { |
- rtc::PacketOptions options; |
+ talk_base::PacketOptions options; |
options.packet_time_params.srtp_auth_key.resize(20); |
options.packet_time_params.srtp_auth_key.assign( |
kTestKey, kTestKey + sizeof(kTestKey)); |
@@ -348,7 +348,7 @@ TEST(P2PSocketHostTest, TestUpdateAbsSendTimeExtensionInRtpPacket) { |
// Verify we update both AbsSendTime extension header and HMAC. |
TEST(P2PSocketHostTest, TestApplyPacketOptionsWithAuthParamsAndAbsSendTime) { |
- rtc::PacketOptions options; |
+ talk_base::PacketOptions options; |
options.packet_time_params.srtp_auth_key.resize(20); |
options.packet_time_params.srtp_auth_key.assign( |
kTestKey, kTestKey + sizeof(kTestKey)); |