| Index: net/quic/quic_connection_test.cc
|
| diff --git a/net/quic/quic_connection_test.cc b/net/quic/quic_connection_test.cc
|
| index 740fece6262cb64a375345770c98fe5a26b92d7c..2869513d14ebf82278c13cd36227ad813f5cd1ab 100644
|
| --- a/net/quic/quic_connection_test.cc
|
| +++ b/net/quic/quic_connection_test.cc
|
| @@ -67,7 +67,7 @@ class TestReceiveAlgorithm : public ReceiveAlgorithmInterface {
|
|
|
| bool GenerateCongestionFeedback(
|
| QuicCongestionFeedbackFrame* congestion_feedback) {
|
| - if (feedback_ == NULL) {
|
| + if (feedback_ == nullptr) {
|
| return false;
|
| }
|
| *congestion_feedback = *feedback_;
|
| @@ -178,10 +178,10 @@ class TaggingDecrypter : public QuicDecrypter {
|
| StringPiece associated_data,
|
| StringPiece ciphertext) OVERRIDE {
|
| if (ciphertext.size() < kTagSize) {
|
| - return NULL;
|
| + return nullptr;
|
| }
|
| if (!CheckTag(ciphertext, GetTag(ciphertext))) {
|
| - return NULL;
|
| + return nullptr;
|
| }
|
| const size_t len = ciphertext.size() - kTagSize;
|
| uint8* buf = new uint8[len];
|
| @@ -451,8 +451,9 @@ class TestConnection : public QuicConnection {
|
| QuicPacketEntropyHash entropy_hash,
|
| HasRetransmittableData retransmittable) {
|
| RetransmittableFrames* retransmittable_frames =
|
| - retransmittable == HAS_RETRANSMITTABLE_DATA ?
|
| - new RetransmittableFrames() : NULL;
|
| + retransmittable == HAS_RETRANSMITTABLE_DATA
|
| + ? new RetransmittableFrames()
|
| + : nullptr;
|
| OnSerializedPacket(
|
| SerializedPacket(sequence_number, PACKET_6BYTE_SEQUENCE_NUMBER,
|
| packet, entropy_hash, retransmittable_frames));
|
| @@ -495,22 +496,22 @@ class TestConnection : public QuicConnection {
|
|
|
| QuicConsumedData SendStreamData3() {
|
| return SendStreamDataWithString(kClientDataStreamId1, "food", 0, !kFin,
|
| - NULL);
|
| + nullptr);
|
| }
|
|
|
| QuicConsumedData SendStreamData3WithFec() {
|
| return SendStreamDataWithStringWithFec(kClientDataStreamId1, "food", 0,
|
| - !kFin, NULL);
|
| + !kFin, nullptr);
|
| }
|
|
|
| QuicConsumedData SendStreamData5() {
|
| - return SendStreamDataWithString(kClientDataStreamId2, "food2", 0,
|
| - !kFin, NULL);
|
| + return SendStreamDataWithString(kClientDataStreamId2, "food2", 0, !kFin,
|
| + nullptr);
|
| }
|
|
|
| QuicConsumedData SendStreamData5WithFec() {
|
| return SendStreamDataWithStringWithFec(kClientDataStreamId2, "food2", 0,
|
| - !kFin, NULL);
|
| + !kFin, nullptr);
|
| }
|
| // Ensures the connection can write stream data before writing.
|
| QuicConsumedData EnsureWritableAndSendStreamData5() {
|
| @@ -524,7 +525,7 @@ class TestConnection : public QuicConnection {
|
| // split needlessly across packet boundaries). As a result, we have separate
|
| // tests for some cases for this stream.
|
| QuicConsumedData SendCryptoStreamData() {
|
| - return SendStreamDataWithString(kCryptoStreamId, "chlo", 0, !kFin, NULL);
|
| + return SendStreamDataWithString(kCryptoStreamId, "chlo", 0, !kFin, nullptr);
|
| }
|
|
|
| bool is_server() {
|
| @@ -635,7 +636,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| connection_.SetLossAlgorithm(loss_algorithm_);
|
| framer_.set_received_entropy_calculator(&entropy_calculator_);
|
| // Simplify tests by not sending feedback unless specifically configured.
|
| - SetFeedback(NULL);
|
| + SetFeedback(nullptr);
|
| EXPECT_CALL(
|
| *send_algorithm_, TimeUntilSend(_, _, _)).WillRepeatedly(Return(
|
| QuicTime::Delta::Zero()));
|
| @@ -823,8 +824,8 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| QuicByteCount packet_size;
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .WillOnce(DoAll(SaveArg<3>(&packet_size), Return(true)));
|
| - connection_.SendStreamDataWithString(id, data, offset, fin, NULL);
|
| - if (last_packet != NULL) {
|
| + connection_.SendStreamDataWithString(id, data, offset, fin, nullptr);
|
| + if (last_packet != nullptr) {
|
| *last_packet =
|
| QuicConnectionPeer::GetPacketCreator(&connection_)->sequence_number();
|
| }
|
| @@ -875,7 +876,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| frames.push_back(frame);
|
| QuicPacket* packet =
|
| BuildUnsizedDataPacket(&framer_, header_, frames).packet;
|
| - EXPECT_TRUE(packet != NULL);
|
| + EXPECT_TRUE(packet != nullptr);
|
| return packet;
|
| }
|
|
|
| @@ -896,7 +897,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| frames.push_back(frame);
|
| QuicPacket* packet =
|
| BuildUnsizedDataPacket(&framer_, header_, frames).packet;
|
| - EXPECT_TRUE(packet != NULL);
|
| + EXPECT_TRUE(packet != nullptr);
|
| return packet;
|
| }
|
|
|
| @@ -919,7 +920,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| frames.push_back(frame);
|
| QuicPacket* packet =
|
| BuildUnsizedDataPacket(&framer_, header_, frames).packet;
|
| - EXPECT_TRUE(packet != NULL);
|
| + EXPECT_TRUE(packet != nullptr);
|
| return packet;
|
| }
|
|
|
| @@ -976,8 +977,8 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| // Call ProcessDataPacket rather than ProcessPacket, as we should not get a
|
| // packet call to the visitor.
|
| ProcessDataPacket(6000, 0, !kEntropyFlag);
|
| - EXPECT_FALSE(
|
| - QuicConnectionPeer::GetConnectionClosePacket(&connection_) == NULL);
|
| + EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
|
| + nullptr);
|
| }
|
|
|
| void BlockOnNextWrite() {
|
| @@ -1118,8 +1119,8 @@ TEST_P(QuicConnectionTest, RejectPacketTooFarOut) {
|
| // Call ProcessDataPacket rather than ProcessPacket, as we should not get a
|
| // packet call to the visitor.
|
| ProcessDataPacket(6000, 0, !kEntropyFlag);
|
| - EXPECT_FALSE(
|
| - QuicConnectionPeer::GetConnectionClosePacket(&connection_) == NULL);
|
| + EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
|
| + nullptr);
|
| }
|
|
|
| TEST_P(QuicConnectionTest, RejectUnencryptedStreamData) {
|
| @@ -1129,8 +1130,8 @@ TEST_P(QuicConnectionTest, RejectUnencryptedStreamData) {
|
| EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_UNENCRYPTED_STREAM_DATA,
|
| false));
|
| ProcessDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_FALSE(
|
| - QuicConnectionPeer::GetConnectionClosePacket(&connection_) == NULL);
|
| + EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
|
| + nullptr);
|
| const vector<QuicConnectionCloseFrame>& connection_close_frames =
|
| writer_->connection_close_frames();
|
| EXPECT_EQ(1u, connection_close_frames.size());
|
| @@ -1142,7 +1143,7 @@ TEST_P(QuicConnectionTest, TruncatedAck) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| QuicPacketSequenceNumber num_packets = 256 * 2 + 1;
|
| for (QuicPacketSequenceNumber i = 0; i < num_packets; ++i) {
|
| - SendStreamDataToPeer(3, "foo", i * 3, !kFin, NULL);
|
| + SendStreamDataToPeer(3, "foo", i * 3, !kFin, nullptr);
|
| }
|
|
|
| QuicAckFrame frame = InitAckFrame(num_packets);
|
| @@ -1226,7 +1227,7 @@ TEST_P(QuicConnectionTest, AckReceiptCausesAckSend) {
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .WillOnce(DoAll(SaveArg<2>(&original), SaveArg<3>(&packet_size),
|
| Return(true)));
|
| - connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 0, !kFin, nullptr);
|
| QuicAckFrame frame = InitAckFrame(original);
|
| NackPacket(original, &frame);
|
| // First nack triggers early retransmit.
|
| @@ -1254,7 +1255,7 @@ TEST_P(QuicConnectionTest, AckReceiptCausesAckSend) {
|
| // indicate the high water mark needs to be raised.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _,
|
| HAS_RETRANSMITTABLE_DATA));
|
| - connection_.SendStreamDataWithString(3, "foo", 3, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 3, !kFin, nullptr);
|
| // No ack sent.
|
| EXPECT_EQ(1u, writer_->frame_count());
|
| EXPECT_EQ(1u, writer_->stream_frames().size());
|
| @@ -1265,7 +1266,7 @@ TEST_P(QuicConnectionTest, AckReceiptCausesAckSend) {
|
| ProcessAckPacket(&frame2);
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _,
|
| HAS_RETRANSMITTABLE_DATA));
|
| - connection_.SendStreamDataWithString(3, "foo", 3, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 3, !kFin, nullptr);
|
| // Ack bundled.
|
| EXPECT_EQ(3u, writer_->frame_count());
|
| EXPECT_EQ(1u, writer_->stream_frames().size());
|
| @@ -1280,7 +1281,7 @@ TEST_P(QuicConnectionTest, AckReceiptCausesAckSend) {
|
| TEST_P(QuicConnectionTest, 20AcksCausesAckSend) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| - SendStreamDataToPeer(1, "foo", 0, !kFin, NULL);
|
| + SendStreamDataToPeer(1, "foo", 0, !kFin, nullptr);
|
|
|
| QuicAlarm* ack_alarm = QuicConnectionPeer::GetAckAlarm(&connection_);
|
| // But an ack with no missing packets will not send an ack.
|
| @@ -1298,9 +1299,9 @@ TEST_P(QuicConnectionTest, 20AcksCausesAckSend) {
|
| TEST_P(QuicConnectionTest, LeastUnackedLower) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| - SendStreamDataToPeer(1, "foo", 0, !kFin, NULL);
|
| - SendStreamDataToPeer(1, "bar", 3, !kFin, NULL);
|
| - SendStreamDataToPeer(1, "eep", 6, !kFin, NULL);
|
| + SendStreamDataToPeer(1, "foo", 0, !kFin, nullptr);
|
| + SendStreamDataToPeer(1, "bar", 3, !kFin, nullptr);
|
| + SendStreamDataToPeer(1, "eep", 6, !kFin, nullptr);
|
|
|
| // Start out saying the least unacked is 2.
|
| peer_creator_.set_sequence_number(5);
|
| @@ -1329,9 +1330,9 @@ TEST_P(QuicConnectionTest, LeastUnackedLower) {
|
| TEST_P(QuicConnectionTest, LargestObservedLower) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| - SendStreamDataToPeer(1, "foo", 0, !kFin, NULL);
|
| - SendStreamDataToPeer(1, "bar", 3, !kFin, NULL);
|
| - SendStreamDataToPeer(1, "eep", 6, !kFin, NULL);
|
| + SendStreamDataToPeer(1, "foo", 0, !kFin, nullptr);
|
| + SendStreamDataToPeer(1, "bar", 3, !kFin, nullptr);
|
| + SendStreamDataToPeer(1, "eep", 6, !kFin, nullptr);
|
| EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _));
|
|
|
| // Start out saying the largest observed is 2.
|
| @@ -1535,7 +1536,7 @@ TEST_P(QuicConnectionTest, FECSending) {
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(5);
|
| // The first stream frame will have 2 fewer overhead bytes than the other 3.
|
| const string payload(payload_length * 4 + 2, 'a');
|
| - connection_.SendStreamDataWithStringWithFec(1, payload, 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithStringWithFec(1, payload, 0, !kFin, nullptr);
|
| // Expect the FEC group to be closed after SendStreamDataWithString.
|
| EXPECT_FALSE(creator->IsFecGroupOpen());
|
| EXPECT_FALSE(creator->IsFecProtected());
|
| @@ -1555,7 +1556,7 @@ TEST_P(QuicConnectionTest, FECQueueing) {
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| BlockOnNextWrite();
|
| const string payload(payload_length, 'a');
|
| - connection_.SendStreamDataWithStringWithFec(1, payload, 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithStringWithFec(1, payload, 0, !kFin, nullptr);
|
| EXPECT_FALSE(creator->IsFecGroupOpen());
|
| EXPECT_FALSE(creator->IsFecProtected());
|
| // Expect the first data packet and the fec packet to be queued.
|
| @@ -1568,7 +1569,7 @@ TEST_P(QuicConnectionTest, AbandonFECFromCongestionWindow) {
|
|
|
| // 1 Data and 1 FEC packet.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
|
| - connection_.SendStreamDataWithStringWithFec(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithStringWithFec(3, "foo", 0, !kFin, nullptr);
|
|
|
| const QuicTime::Delta retransmission_time =
|
| QuicTime::Delta::FromMilliseconds(5000);
|
| @@ -1588,10 +1589,10 @@ TEST_P(QuicConnectionTest, DontAbandonAckedFEC) {
|
|
|
| // 1 Data and 1 FEC packet.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(6);
|
| - connection_.SendStreamDataWithStringWithFec(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithStringWithFec(3, "foo", 0, !kFin, nullptr);
|
| // Send some more data afterwards to ensure early retransmit doesn't trigger.
|
| - connection_.SendStreamDataWithStringWithFec(3, "foo", 3, !kFin, NULL);
|
| - connection_.SendStreamDataWithStringWithFec(3, "foo", 6, !kFin, NULL);
|
| + connection_.SendStreamDataWithStringWithFec(3, "foo", 3, !kFin, nullptr);
|
| + connection_.SendStreamDataWithStringWithFec(3, "foo", 6, !kFin, nullptr);
|
|
|
| QuicAckFrame ack_fec = InitAckFrame(2);
|
| // Data packet missing.
|
| @@ -1616,12 +1617,12 @@ TEST_P(QuicConnectionTest, AbandonAllFEC) {
|
|
|
| // 1 Data and 1 FEC packet.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(6);
|
| - connection_.SendStreamDataWithStringWithFec(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithStringWithFec(3, "foo", 0, !kFin, nullptr);
|
| // Send some more data afterwards to ensure early retransmit doesn't trigger.
|
| - connection_.SendStreamDataWithStringWithFec(3, "foo", 3, !kFin, NULL);
|
| + connection_.SendStreamDataWithStringWithFec(3, "foo", 3, !kFin, nullptr);
|
| // Advance the time so not all the FEC packets are abandoned.
|
| clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(1));
|
| - connection_.SendStreamDataWithStringWithFec(3, "foo", 6, !kFin, NULL);
|
| + connection_.SendStreamDataWithStringWithFec(3, "foo", 6, !kFin, nullptr);
|
|
|
| QuicAckFrame ack_fec = InitAckFrame(5);
|
| // Ack all data packets, but no fec packets.
|
| @@ -1789,7 +1790,7 @@ TEST_P(QuicConnectionTest, FramePackingSendv) {
|
| IOVector data_iov;
|
| data_iov.AppendNoCoalesce(data, 2);
|
| data_iov.AppendNoCoalesce(data + 2, 2);
|
| - connection_.SendStreamData(1, data_iov, 0, !kFin, MAY_FEC_PROTECT, NULL);
|
| + connection_.SendStreamData(1, data_iov, 0, !kFin, MAY_FEC_PROTECT, nullptr);
|
|
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| EXPECT_FALSE(connection_.HasQueuedData());
|
| @@ -1814,7 +1815,7 @@ TEST_P(QuicConnectionTest, FramePackingSendvQueued) {
|
| IOVector data_iov;
|
| data_iov.AppendNoCoalesce(data, 2);
|
| data_iov.AppendNoCoalesce(data + 2, 2);
|
| - connection_.SendStreamData(1, data_iov, 0, !kFin, MAY_FEC_PROTECT, NULL);
|
| + connection_.SendStreamData(1, data_iov, 0, !kFin, MAY_FEC_PROTECT, nullptr);
|
|
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
| EXPECT_TRUE(connection_.HasQueuedData());
|
| @@ -1834,7 +1835,7 @@ TEST_P(QuicConnectionTest, SendingZeroBytes) {
|
| // Send a zero byte write with a fin using writev.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
|
| IOVector empty_iov;
|
| - connection_.SendStreamData(1, empty_iov, 0, kFin, MAY_FEC_PROTECT, NULL);
|
| + connection_.SendStreamData(1, empty_iov, 0, kFin, MAY_FEC_PROTECT, nullptr);
|
|
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| EXPECT_FALSE(connection_.HasQueuedData());
|
| @@ -1944,7 +1945,7 @@ TEST_P(QuicConnectionTest, RetransmitNackedLargestObserved) {
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .WillOnce(DoAll(SaveArg<2>(&largest_observed), SaveArg<3>(&packet_size),
|
| Return(true)));
|
| - connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 0, !kFin, nullptr);
|
|
|
| QuicAckFrame frame = InitAckFrame(1);
|
| NackPacket(largest_observed, &frame);
|
| @@ -1962,7 +1963,7 @@ TEST_P(QuicConnectionTest, RetransmitNackedLargestObserved) {
|
| TEST_P(QuicConnectionTest, QueueAfterTwoRTOs) {
|
| for (int i = 0; i < 10; ++i) {
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
|
| - connection_.SendStreamDataWithString(3, "foo", i * 3, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", i * 3, !kFin, nullptr);
|
| }
|
|
|
| // Block the congestion window and ensure they're queued.
|
| @@ -1988,7 +1989,7 @@ TEST_P(QuicConnectionTest, WriteBlockedThenSent) {
|
| BlockOnNextWrite();
|
| writer_->set_is_write_blocked_data_buffered(true);
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
|
| - connection_.SendStreamDataWithString(1, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(1, "foo", 0, !kFin, nullptr);
|
| EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
|
|
|
| writer_->SetWritable();
|
| @@ -1998,7 +1999,7 @@ TEST_P(QuicConnectionTest, WriteBlockedThenSent) {
|
|
|
| TEST_P(QuicConnectionTest, RetransmitWriteBlockedAckedOriginalThenSent) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| - connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 0, !kFin, nullptr);
|
| EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
|
|
|
| BlockOnNextWrite();
|
| @@ -2025,7 +2026,7 @@ TEST_P(QuicConnectionTest, RetransmitWriteBlockedAckedOriginalThenSent) {
|
| TEST_P(QuicConnectionTest, AlarmsWhenWriteBlocked) {
|
| // Block the connection.
|
| BlockOnNextWrite();
|
| - connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 0, !kFin, nullptr);
|
| EXPECT_EQ(1u, writer_->packets_write_attempts());
|
| EXPECT_TRUE(writer_->IsWriteBlocked());
|
|
|
| @@ -2044,7 +2045,7 @@ TEST_P(QuicConnectionTest, NoLimitPacketsPerNack) {
|
| int offset = 0;
|
| // Send packets 1 to 15.
|
| for (int i = 0; i < 15; ++i) {
|
| - SendStreamDataToPeer(1, "foo", offset, !kFin, NULL);
|
| + SendStreamDataToPeer(1, "foo", offset, !kFin, nullptr);
|
| offset += 3;
|
| }
|
|
|
| @@ -2094,7 +2095,7 @@ TEST_P(QuicConnectionTest, MultipleAcks) {
|
| }
|
|
|
| TEST_P(QuicConnectionTest, DontLatchUnackedPacket) {
|
| - SendStreamDataToPeer(1, "foo", 0, !kFin, NULL); // Packet 1;
|
| + SendStreamDataToPeer(1, "foo", 0, !kFin, nullptr); // Packet 1;
|
| // From now on, we send acks, so the send algorithm won't mark them pending.
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .WillByDefault(Return(false));
|
| @@ -2131,7 +2132,7 @@ TEST_P(QuicConnectionTest, DontLatchUnackedPacket) {
|
|
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .WillByDefault(Return(true));
|
| - SendStreamDataToPeer(1, "bar", 3, false, NULL); // Packet 4
|
| + SendStreamDataToPeer(1, "bar", 3, false, nullptr); // Packet 4
|
| EXPECT_EQ(4u, stop_waiting()->least_unacked);
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .WillByDefault(Return(false));
|
| @@ -2142,8 +2143,8 @@ TEST_P(QuicConnectionTest, DontLatchUnackedPacket) {
|
| // the least unacked is raised above the ack packets.
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .WillByDefault(Return(true));
|
| - SendStreamDataToPeer(1, "bar", 6, false, NULL); // Packet 6
|
| - SendStreamDataToPeer(1, "bar", 9, false, NULL); // Packet 7
|
| + SendStreamDataToPeer(1, "bar", 6, false, nullptr); // Packet 6
|
| + SendStreamDataToPeer(1, "bar", 9, false, nullptr); // Packet 7
|
|
|
| EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _));
|
| frame = InitAckFrame(7);
|
| @@ -2158,7 +2159,7 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketAfterFecPacket) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| // Don't send missing packet 1.
|
| - ProcessFecPacket(2, 1, true, !kEntropyFlag, NULL);
|
| + ProcessFecPacket(2, 1, true, !kEntropyFlag, nullptr);
|
| // Entropy flag should be false, so entropy should be 0.
|
| EXPECT_EQ(0u, QuicConnectionPeer::ReceivedEntropyHash(&connection_, 2));
|
| }
|
| @@ -2183,7 +2184,7 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketWithVaryingSeqNumLengths) {
|
| sequence_number_length_ = lengths[i];
|
| fec_packet += 2;
|
| // Don't send missing packet, but send fec packet right after it.
|
| - ProcessFecPacket(fec_packet, fec_packet - 1, true, !kEntropyFlag, NULL);
|
| + ProcessFecPacket(fec_packet, fec_packet - 1, true, !kEntropyFlag, nullptr);
|
| // Sequence number length in the revived header should be the same as
|
| // in the original data/fec packet headers.
|
| EXPECT_EQ(sequence_number_length_, fec_visitor->revived_header().
|
| @@ -2211,7 +2212,7 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketWithVaryingConnectionIdLengths) {
|
| connection_id_length_ = lengths[i];
|
| fec_packet += 2;
|
| // Don't send missing packet, but send fec packet right after it.
|
| - ProcessFecPacket(fec_packet, fec_packet - 1, true, !kEntropyFlag, NULL);
|
| + ProcessFecPacket(fec_packet, fec_packet - 1, true, !kEntropyFlag, nullptr);
|
| // Connection id length in the revived header should be the same as
|
| // in the original data/fec packet headers.
|
| EXPECT_EQ(connection_id_length_,
|
| @@ -2224,7 +2225,7 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketAfterDataPacketThenFecPacket) {
|
|
|
| ProcessFecProtectedPacket(1, false, kEntropyFlag);
|
| // Don't send missing packet 2.
|
| - ProcessFecPacket(3, 1, true, !kEntropyFlag, NULL);
|
| + ProcessFecPacket(3, 1, true, !kEntropyFlag, nullptr);
|
| // Entropy flag should be true, so entropy should not be 0.
|
| EXPECT_NE(0u, QuicConnectionPeer::ReceivedEntropyHash(&connection_, 2));
|
| }
|
| @@ -2235,7 +2236,7 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketAfterDataPacketsThenFecPacket) {
|
| ProcessFecProtectedPacket(1, false, !kEntropyFlag);
|
| // Don't send missing packet 2.
|
| ProcessFecProtectedPacket(3, false, !kEntropyFlag);
|
| - ProcessFecPacket(4, 1, true, kEntropyFlag, NULL);
|
| + ProcessFecPacket(4, 1, true, kEntropyFlag, nullptr);
|
| // Ensure QUIC no longer revives entropy for lost packets.
|
| EXPECT_EQ(0u, QuicConnectionPeer::ReceivedEntropyHash(&connection_, 2));
|
| EXPECT_NE(0u, QuicConnectionPeer::ReceivedEntropyHash(&connection_, 4));
|
| @@ -2245,7 +2246,7 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketAfterDataPacket) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| // Don't send missing packet 1.
|
| - ProcessFecPacket(3, 1, false, !kEntropyFlag, NULL);
|
| + ProcessFecPacket(3, 1, false, !kEntropyFlag, nullptr);
|
| // Out of order.
|
| ProcessFecProtectedPacket(2, true, !kEntropyFlag);
|
| // Entropy flag should be false, so entropy should be 0.
|
| @@ -2257,7 +2258,7 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketAfterDataPackets) {
|
|
|
| ProcessFecProtectedPacket(1, false, !kEntropyFlag);
|
| // Don't send missing packet 2.
|
| - ProcessFecPacket(6, 1, false, kEntropyFlag, NULL);
|
| + ProcessFecPacket(6, 1, false, kEntropyFlag, nullptr);
|
| ProcessFecProtectedPacket(3, false, kEntropyFlag);
|
| ProcessFecProtectedPacket(4, false, kEntropyFlag);
|
| ProcessFecProtectedPacket(5, true, !kEntropyFlag);
|
| @@ -2270,7 +2271,7 @@ TEST_P(QuicConnectionTest, TLP) {
|
| QuicSentPacketManagerPeer::SetMaxTailLossProbes(
|
| QuicConnectionPeer::GetSentPacketManager(&connection_), 1);
|
|
|
| - SendStreamDataToPeer(3, "foo", 0, !kFin, NULL);
|
| + SendStreamDataToPeer(3, "foo", 0, !kFin, nullptr);
|
| EXPECT_EQ(1u, stop_waiting()->least_unacked);
|
| QuicTime retransmission_time =
|
| connection_.GetRetransmissionAlarm()->deadline();
|
| @@ -2290,7 +2291,7 @@ TEST_P(QuicConnectionTest, TLP) {
|
| TEST_P(QuicConnectionTest, RTO) {
|
| QuicTime default_retransmission_time = clock_.ApproximateNow().Add(
|
| DefaultRetransmissionTime());
|
| - SendStreamDataToPeer(3, "foo", 0, !kFin, NULL);
|
| + SendStreamDataToPeer(3, "foo", 0, !kFin, nullptr);
|
| EXPECT_EQ(1u, stop_waiting()->least_unacked);
|
|
|
| EXPECT_EQ(1u, writer_->header().packet_sequence_number);
|
| @@ -2314,12 +2315,12 @@ TEST_P(QuicConnectionTest, RTOWithSameEncryptionLevel) {
|
| // A TaggingEncrypter puts kTagSize copies of the given byte (0x01 here) at
|
| // the end of the packet. We can test this to check which encrypter was used.
|
| connection_.SetEncrypter(ENCRYPTION_NONE, new TaggingEncrypter(0x01));
|
| - SendStreamDataToPeer(3, "foo", 0, !kFin, NULL);
|
| + SendStreamDataToPeer(3, "foo", 0, !kFin, nullptr);
|
| EXPECT_EQ(0x01010101u, writer_->final_bytes_of_last_packet());
|
|
|
| connection_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(0x02));
|
| connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL);
|
| - SendStreamDataToPeer(3, "foo", 0, !kFin, NULL);
|
| + SendStreamDataToPeer(3, "foo", 0, !kFin, nullptr);
|
| EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet());
|
|
|
| EXPECT_EQ(default_retransmission_time,
|
| @@ -2353,7 +2354,7 @@ TEST_P(QuicConnectionTest, SendHandshakeMessages) {
|
| TimeUntilSend(_, _, _)).WillRepeatedly(
|
| testing::Return(QuicTime::Delta::Zero()));
|
| BlockOnNextWrite();
|
| - connection_.SendStreamDataWithString(1, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(1, "foo", 0, !kFin, nullptr);
|
| // The packet should be serialized, but not queued.
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
|
|
| @@ -2403,12 +2404,12 @@ TEST_P(QuicConnectionTest, RetransmitPacketsWithInitialEncryption) {
|
| connection_.SetEncrypter(ENCRYPTION_NONE, new TaggingEncrypter(0x01));
|
| connection_.SetDefaultEncryptionLevel(ENCRYPTION_NONE);
|
|
|
| - SendStreamDataToPeer(1, "foo", 0, !kFin, NULL);
|
| + SendStreamDataToPeer(1, "foo", 0, !kFin, nullptr);
|
|
|
| connection_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(0x02));
|
| connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL);
|
|
|
| - SendStreamDataToPeer(2, "bar", 0, !kFin, NULL);
|
| + SendStreamDataToPeer(2, "bar", 0, !kFin, nullptr);
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
|
|
|
| connection_.RetransmitUnackedPackets(ALL_INITIAL_RETRANSMISSION);
|
| @@ -2446,11 +2447,11 @@ TEST_P(QuicConnectionTest, TestRetransmitOrder) {
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).WillOnce(
|
| DoAll(SaveArg<3>(&first_packet_size), Return(true)));
|
|
|
| - connection_.SendStreamDataWithString(3, "first_packet", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "first_packet", 0, !kFin, nullptr);
|
| QuicByteCount second_packet_size;
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).WillOnce(
|
| DoAll(SaveArg<3>(&second_packet_size), Return(true)));
|
| - connection_.SendStreamDataWithString(3, "second_packet", 12, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "second_packet", 12, !kFin, nullptr);
|
| EXPECT_NE(first_packet_size, second_packet_size);
|
| // Advance the clock by huge time to make sure packets will be retransmitted.
|
| clock_.AdvanceTime(QuicTime::Delta::FromSeconds(10));
|
| @@ -2482,7 +2483,7 @@ TEST_P(QuicConnectionTest, RetransmissionCountCalculation) {
|
| QuicPacketSequenceNumber original_sequence_number;
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .WillOnce(DoAll(SaveArg<2>(&original_sequence_number), Return(true)));
|
| - connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 0, !kFin, nullptr);
|
|
|
| EXPECT_TRUE(QuicConnectionPeer::IsSavedForRetransmission(
|
| &connection_, original_sequence_number));
|
| @@ -2531,7 +2532,7 @@ TEST_P(QuicConnectionTest, RetransmissionCountCalculation) {
|
|
|
| TEST_P(QuicConnectionTest, SetRTOAfterWritingToSocket) {
|
| BlockOnNextWrite();
|
| - connection_.SendStreamDataWithString(1, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(1, "foo", 0, !kFin, nullptr);
|
| // Make sure that RTO is not started when the packet is queued.
|
| EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
|
|
|
| @@ -2545,8 +2546,8 @@ TEST_P(QuicConnectionTest, DelayRTOWithAckReceipt) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| .Times(2);
|
| - connection_.SendStreamDataWithString(2, "foo", 0, !kFin, NULL);
|
| - connection_.SendStreamDataWithString(3, "bar", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(2, "foo", 0, !kFin, nullptr);
|
| + connection_.SendStreamDataWithString(3, "bar", 0, !kFin, nullptr);
|
| QuicAlarm* retransmission_alarm = connection_.GetRetransmissionAlarm();
|
| EXPECT_TRUE(retransmission_alarm->IsSet());
|
| EXPECT_EQ(clock_.Now().Add(DefaultRetransmissionTime()),
|
| @@ -2584,7 +2585,7 @@ TEST_P(QuicConnectionTest, DelayRTOWithAckReceipt) {
|
| TEST_P(QuicConnectionTest, TestQueued) {
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| BlockOnNextWrite();
|
| - connection_.SendStreamDataWithString(1, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(1, "foo", 0, !kFin, nullptr);
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
|
|
| // Unblock the writes and actually send.
|
| @@ -2646,7 +2647,7 @@ TEST_P(QuicConnectionTest, DontUpdateQuicCongestionFeedbackFrameForRevived) {
|
| // Process an FEC packet, and revive the missing data packet
|
| // but only contact the receive_algorithm once.
|
| EXPECT_CALL(*receive_algorithm_, RecordIncomingPacket(_, _, _));
|
| - ProcessFecPacket(2, 1, true, !kEntropyFlag, NULL);
|
| + ProcessFecPacket(2, 1, true, !kEntropyFlag, nullptr);
|
| }
|
|
|
| TEST_P(QuicConnectionTest, InitialTimeout) {
|
| @@ -2717,7 +2718,7 @@ TEST_P(QuicConnectionTest, OverallTimeout) {
|
| EXPECT_TRUE(connection_.connected());
|
|
|
| // Send and ack new data 3 seconds later to lengthen the idle timeout.
|
| - SendStreamDataToPeer(1, "GET /", 0, kFin, NULL);
|
| + SendStreamDataToPeer(1, "GET /", 0, kFin, nullptr);
|
| clock_.AdvanceTime(QuicTime::Delta::FromSeconds(3));
|
| QuicAckFrame frame = InitAckFrame(1);
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| @@ -2755,7 +2756,7 @@ TEST_P(QuicConnectionTest, PingAfterSend) {
|
| // the ping alarm.
|
| clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
|
| EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
|
| - SendStreamDataToPeer(1, "GET /", 0, kFin, NULL);
|
| + SendStreamDataToPeer(1, "GET /", 0, kFin, nullptr);
|
| EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
|
| EXPECT_EQ(clock_.ApproximateNow().Add(QuicTime::Delta::FromSeconds(15)),
|
| connection_.GetPingAlarm()->deadline());
|
| @@ -2902,9 +2903,8 @@ TEST_P(QuicConnectionTest, TestQueueLimitsOnSendStreamData) {
|
| TimeUntilSend(_, _, _)).WillOnce(
|
| testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| const string payload(payload_length, 'a');
|
| - EXPECT_EQ(0u,
|
| - connection_.SendStreamDataWithString(3, payload, 0,
|
| - !kFin, NULL).bytes_consumed);
|
| + EXPECT_EQ(0u, connection_.SendStreamDataWithString(3, payload, 0, !kFin,
|
| + nullptr).bytes_consumed);
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| }
|
|
|
| @@ -2927,8 +2927,8 @@ TEST_P(QuicConnectionTest, LoopThroughSendingPackets) {
|
| // The first stream frame will have 2 fewer overhead bytes than the other six.
|
| const string payload(payload_length * 7 + 2, 'a');
|
| EXPECT_EQ(payload.size(),
|
| - connection_.SendStreamDataWithString(1, payload, 0,
|
| - !kFin, NULL).bytes_consumed);
|
| + connection_.SendStreamDataWithString(1, payload, 0, !kFin, nullptr)
|
| + .bytes_consumed);
|
| }
|
|
|
| TEST_P(QuicConnectionTest, SendDelayedAck) {
|
| @@ -3027,8 +3027,8 @@ TEST_P(QuicConnectionTest, NoAckOnOldNacks) {
|
| TEST_P(QuicConnectionTest, SendDelayedAckOnOutgoingPacket) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| ProcessPacket(1);
|
| - connection_.SendStreamDataWithString(kClientDataStreamId1, "foo", 0,
|
| - !kFin, NULL);
|
| + connection_.SendStreamDataWithString(kClientDataStreamId1, "foo", 0, !kFin,
|
| + nullptr);
|
| // Check that ack is bundled with outgoing data and that delayed ack
|
| // alarm is reset.
|
| EXPECT_EQ(3u, writer_->frame_count());
|
| @@ -3040,7 +3040,8 @@ TEST_P(QuicConnectionTest, SendDelayedAckOnOutgoingPacket) {
|
| TEST_P(QuicConnectionTest, SendDelayedAckOnOutgoingCryptoPacket) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| ProcessPacket(1);
|
| - connection_.SendStreamDataWithString(kCryptoStreamId, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(kCryptoStreamId, "foo", 0, !kFin,
|
| + nullptr);
|
| // Check that ack is bundled with outgoing crypto data.
|
| EXPECT_EQ(3u, writer_->frame_count());
|
| EXPECT_FALSE(writer_->ack_frames().empty());
|
| @@ -3052,10 +3053,12 @@ TEST_P(QuicConnectionTest, BlockAndBufferOnFirstCHLOPacketOfTwo) {
|
| ProcessPacket(1);
|
| BlockOnNextWrite();
|
| writer_->set_is_write_blocked_data_buffered(true);
|
| - connection_.SendStreamDataWithString(kCryptoStreamId, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(kCryptoStreamId, "foo", 0, !kFin,
|
| + nullptr);
|
| EXPECT_TRUE(writer_->IsWriteBlocked());
|
| EXPECT_FALSE(connection_.HasQueuedData());
|
| - connection_.SendStreamDataWithString(kCryptoStreamId, "bar", 3, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(kCryptoStreamId, "bar", 3, !kFin,
|
| + nullptr);
|
| EXPECT_TRUE(writer_->IsWriteBlocked());
|
| EXPECT_TRUE(connection_.HasQueuedData());
|
| }
|
| @@ -3080,10 +3083,10 @@ TEST_P(QuicConnectionTest, BundleAckForSecondCHLO) {
|
|
|
| TEST_P(QuicConnectionTest, BundleAckWithDataOnIncomingAck) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| - connection_.SendStreamDataWithString(kClientDataStreamId1, "foo", 0,
|
| - !kFin, NULL);
|
| - connection_.SendStreamDataWithString(kClientDataStreamId1, "foo", 3,
|
| - !kFin, NULL);
|
| + connection_.SendStreamDataWithString(kClientDataStreamId1, "foo", 0, !kFin,
|
| + nullptr);
|
| + connection_.SendStreamDataWithString(kClientDataStreamId1, "foo", 3, !kFin,
|
| + nullptr);
|
| // Ack the second packet, which will retransmit the first packet.
|
| QuicAckFrame ack = InitAckFrame(2);
|
| NackPacket(1, &ack);
|
| @@ -3196,7 +3199,7 @@ TEST_P(QuicConnectionTest, Blocked) {
|
| TEST_P(QuicConnectionTest, InvalidPacket) {
|
| EXPECT_CALL(visitor_,
|
| OnConnectionClosed(QUIC_INVALID_PACKET_HEADER, false));
|
| - QuicEncryptedPacket encrypted(NULL, 0);
|
| + QuicEncryptedPacket encrypted(nullptr, 0);
|
| connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), encrypted);
|
| // The connection close packet should have error details.
|
| ASSERT_FALSE(writer_->connection_close_frames().empty());
|
| @@ -3228,9 +3231,9 @@ TEST_P(QuicConnectionTest, ReceivedEntropyHashCalculationHalfFEC) {
|
| EXPECT_CALL(visitor_, OnStreamFrames(_)).Times(AtLeast(1));
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| ProcessDataPacket(1, 1, kEntropyFlag);
|
| - ProcessFecPacket(4, 1, false, kEntropyFlag, NULL);
|
| + ProcessFecPacket(4, 1, false, kEntropyFlag, nullptr);
|
| ProcessDataPacket(3, 3, !kEntropyFlag);
|
| - ProcessFecPacket(7, 3, false, kEntropyFlag, NULL);
|
| + ProcessFecPacket(7, 3, false, kEntropyFlag, nullptr);
|
| EXPECT_EQ(146u, outgoing_ack()->entropy_hash);
|
| }
|
|
|
| @@ -3325,7 +3328,7 @@ TEST_P(QuicConnectionTest, ServerSendsVersionNegotiationPacket) {
|
| framer_.set_version(version());
|
| connection_.set_is_server(true);
|
| connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
|
| - EXPECT_TRUE(writer_->version_negotiation_packet() != NULL);
|
| + EXPECT_TRUE(writer_->version_negotiation_packet() != nullptr);
|
|
|
| size_t num_versions = arraysize(kSupportedQuicVersions);
|
| ASSERT_EQ(num_versions,
|
| @@ -3369,7 +3372,7 @@ TEST_P(QuicConnectionTest, ServerSendsVersionNegotiationPacketSocketBlocked) {
|
|
|
| writer_->SetWritable();
|
| connection_.OnCanWrite();
|
| - EXPECT_TRUE(writer_->version_negotiation_packet() != NULL);
|
| + EXPECT_TRUE(writer_->version_negotiation_packet() != nullptr);
|
|
|
| size_t num_versions = arraysize(kSupportedQuicVersions);
|
| ASSERT_EQ(num_versions,
|
| @@ -3484,11 +3487,11 @@ TEST_P(QuicConnectionTest, BadVersionNegotiation) {
|
|
|
| TEST_P(QuicConnectionTest, CheckSendStats) {
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
|
| - connection_.SendStreamDataWithString(3, "first", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "first", 0, !kFin, nullptr);
|
| size_t first_packet_size = writer_->last_packet_size();
|
|
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
|
| - connection_.SendStreamDataWithString(5, "second", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(5, "second", 0, !kFin, nullptr);
|
| size_t second_packet_size = writer_->last_packet_size();
|
|
|
| // 2 retransmissions due to rto, 1 due to explicit nack.
|
| @@ -3542,7 +3545,7 @@ TEST_P(QuicConnectionTest, CheckReceiveStats) {
|
| received_bytes += ProcessFecProtectedPacket(3, false, !kEntropyFlag);
|
| // Should be counted against dropped packets.
|
| received_bytes += ProcessDataPacket(3, 1, !kEntropyFlag);
|
| - received_bytes += ProcessFecPacket(4, 1, true, !kEntropyFlag, NULL);
|
| + received_bytes += ProcessFecPacket(4, 1, true, !kEntropyFlag, nullptr);
|
|
|
| EXPECT_CALL(*send_algorithm_, BandwidthEstimate()).WillOnce(
|
| Return(QuicBandwidth::Zero()));
|
| @@ -3562,24 +3565,24 @@ TEST_P(QuicConnectionTest, CheckReceiveStats) {
|
|
|
| TEST_P(QuicConnectionTest, TestFecGroupLimits) {
|
| // Create and return a group for 1.
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 1) != NULL);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 1) != nullptr);
|
|
|
| // Create and return a group for 2.
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 2) != NULL);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 2) != nullptr);
|
|
|
| // Create and return a group for 4. This should remove 1 but not 2.
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 4) != NULL);
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 1) == NULL);
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 2) != NULL);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 4) != nullptr);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 1) == nullptr);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 2) != nullptr);
|
|
|
| // Create and return a group for 3. This will kill off 2.
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 3) != NULL);
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 2) == NULL);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 3) != nullptr);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 2) == nullptr);
|
|
|
| // Verify that adding 5 kills off 3, despite 4 being created before 3.
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 5) != NULL);
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 4) != NULL);
|
| - ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 3) == NULL);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 5) != nullptr);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 4) != nullptr);
|
| + ASSERT_TRUE(QuicConnectionPeer::GetFecGroup(&connection_, 3) == nullptr);
|
| }
|
|
|
| TEST_P(QuicConnectionTest, ProcessFramesIfPacketClosedConnection) {
|
| @@ -3602,7 +3605,7 @@ TEST_P(QuicConnectionTest, ProcessFramesIfPacketClosedConnection) {
|
| frames.push_back(close_frame);
|
| scoped_ptr<QuicPacket> packet(
|
| BuildUnsizedDataPacket(&framer_, header_, frames).packet);
|
| - EXPECT_TRUE(NULL != packet.get());
|
| + EXPECT_TRUE(nullptr != packet.get());
|
| scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
|
| ENCRYPTION_NONE, 1, *packet));
|
|
|
| @@ -3647,7 +3650,7 @@ TEST_P(QuicConnectionTest, ConnectionCloseWhenWritable) {
|
| EXPECT_FALSE(writer_->IsWriteBlocked());
|
|
|
| // Send a packet.
|
| - connection_.SendStreamDataWithString(1, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(1, "foo", 0, !kFin, nullptr);
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| EXPECT_EQ(1u, writer_->packets_write_attempts());
|
|
|
| @@ -3664,7 +3667,7 @@ TEST_P(QuicConnectionTest, ConnectionCloseGettingWriteBlocked) {
|
|
|
| TEST_P(QuicConnectionTest, ConnectionCloseWhenWriteBlocked) {
|
| BlockOnNextWrite();
|
| - connection_.SendStreamDataWithString(1, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(1, "foo", 0, !kFin, nullptr);
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
| EXPECT_EQ(1u, writer_->packets_write_attempts());
|
| EXPECT_TRUE(writer_->IsWriteBlocked());
|
| @@ -3700,8 +3703,8 @@ TEST_P(QuicConnectionTest, AckNotifierFailToTriggerCallback) {
|
| connection_.SendStreamDataWithString(1, "foo", 0, !kFin, delegate.get());
|
|
|
| // Send some other data which we will ACK.
|
| - connection_.SendStreamDataWithString(1, "foo", 0, !kFin, NULL);
|
| - connection_.SendStreamDataWithString(1, "bar", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(1, "foo", 0, !kFin, nullptr);
|
| + connection_.SendStreamDataWithString(1, "bar", 0, !kFin, nullptr);
|
|
|
| // Now we receive ACK for packets 2 and 3, but importantly missing packet 1
|
| // which we registered to be notified about.
|
| @@ -3723,10 +3726,10 @@ TEST_P(QuicConnectionTest, AckNotifierCallbackAfterRetransmission) {
|
| EXPECT_CALL(*delegate.get(), OnAckNotification(_, _, _, _, _)).Times(1);
|
|
|
| // Send four packets, and register to be notified on ACK of packet 2.
|
| - connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 0, !kFin, nullptr);
|
| connection_.SendStreamDataWithString(3, "bar", 0, !kFin, delegate.get());
|
| - connection_.SendStreamDataWithString(3, "baz", 0, !kFin, NULL);
|
| - connection_.SendStreamDataWithString(3, "qux", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "baz", 0, !kFin, nullptr);
|
| + connection_.SendStreamDataWithString(3, "qux", 0, !kFin, nullptr);
|
|
|
| // Now we receive ACK for packets 1, 3, and 4 and lose 2.
|
| QuicAckFrame frame = InitAckFrame(4);
|
| @@ -3800,10 +3803,10 @@ TEST_P(QuicConnectionTest, AckNotifierCallbackForAckOfNackedPacket) {
|
| new StrictMock<MockAckNotifierDelegate>);
|
|
|
| // Send four packets, and register to be notified on ACK of packet 2.
|
| - connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "foo", 0, !kFin, nullptr);
|
| connection_.SendStreamDataWithString(3, "bar", 0, !kFin, delegate.get());
|
| - connection_.SendStreamDataWithString(3, "baz", 0, !kFin, NULL);
|
| - connection_.SendStreamDataWithString(3, "qux", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(3, "baz", 0, !kFin, nullptr);
|
| + connection_.SendStreamDataWithString(3, "qux", 0, !kFin, nullptr);
|
|
|
| // Now we receive ACK for packets 1, 3, and 4 and lose 2.
|
| QuicAckFrame frame = InitAckFrame(4);
|
| @@ -3844,7 +3847,7 @@ TEST_P(QuicConnectionTest, AckNotifierFECTriggerCallback) {
|
|
|
| // Send some data, which will register the delegate to be notified.
|
| connection_.SendStreamDataWithString(1, "foo", 0, !kFin, delegate.get());
|
| - connection_.SendStreamDataWithString(2, "bar", 0, !kFin, NULL);
|
| + connection_.SendStreamDataWithString(2, "bar", 0, !kFin, nullptr);
|
|
|
| // Process an ACK from the server with a revived packet, which should trigger
|
| // the callback.
|
|
|