Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(239)

Side by Side Diff: net/tools/quic/end_to_end_test.cc

Issue 851503003: Update from https://crrev.com/311076 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/spdy/spdy_write_queue.cc ('k') | net/tools/quic/quic_client.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <stddef.h> 5 #include <stddef.h>
6 #include <string> 6 #include <string>
7 #include <sys/epoll.h> 7 #include <sys/epoll.h>
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/basictypes.h" 10 #include "base/basictypes.h"
(...skipping 183 matching lines...) Expand 10 before | Expand all | Expand 10 after
194 server_address_ = IPEndPoint(ip, 0); 194 server_address_ = IPEndPoint(ip, 0);
195 195
196 client_supported_versions_ = GetParam().client_supported_versions; 196 client_supported_versions_ = GetParam().client_supported_versions;
197 server_supported_versions_ = GetParam().server_supported_versions; 197 server_supported_versions_ = GetParam().server_supported_versions;
198 negotiated_version_ = GetParam().negotiated_version; 198 negotiated_version_ = GetParam().negotiated_version;
199 FLAGS_enable_quic_fec = GetParam().use_fec; 199 FLAGS_enable_quic_fec = GetParam().use_fec;
200 200
201 VLOG(1) << "Using Configuration: " << GetParam(); 201 VLOG(1) << "Using Configuration: " << GetParam();
202 202
203 // Use different flow control windows for client/server. 203 // Use different flow control windows for client/server.
204 client_config_.SetInitialFlowControlWindowToSend(
205 2 * kInitialSessionFlowControlWindowForTest);
206 client_config_.SetInitialStreamFlowControlWindowToSend( 204 client_config_.SetInitialStreamFlowControlWindowToSend(
207 2 * kInitialStreamFlowControlWindowForTest); 205 2 * kInitialStreamFlowControlWindowForTest);
208 client_config_.SetInitialSessionFlowControlWindowToSend( 206 client_config_.SetInitialSessionFlowControlWindowToSend(
209 2 * kInitialSessionFlowControlWindowForTest); 207 2 * kInitialSessionFlowControlWindowForTest);
210 server_config_.SetInitialFlowControlWindowToSend(
211 3 * kInitialSessionFlowControlWindowForTest);
212 server_config_.SetInitialStreamFlowControlWindowToSend( 208 server_config_.SetInitialStreamFlowControlWindowToSend(
213 3 * kInitialStreamFlowControlWindowForTest); 209 3 * kInitialStreamFlowControlWindowForTest);
214 server_config_.SetInitialSessionFlowControlWindowToSend( 210 server_config_.SetInitialSessionFlowControlWindowToSend(
215 3 * kInitialSessionFlowControlWindowForTest); 211 3 * kInitialSessionFlowControlWindowForTest);
216 212
217 QuicInMemoryCachePeer::ResetForTests(); 213 QuicInMemoryCachePeer::ResetForTests();
218 AddToCache("GET", "https://www.google.com/foo", 214 AddToCache("GET", "https://www.google.com/foo",
219 "HTTP/1.1", "200", "OK", kFooResponseBody); 215 "HTTP/1.1", "200", "OK", kFooResponseBody);
220 AddToCache("GET", "https://www.google.com/bar", 216 AddToCache("GET", "https://www.google.com/bar",
221 "HTTP/1.1", "200", "OK", kBarResponseBody); 217 "HTTP/1.1", "200", "OK", kBarResponseBody);
(...skipping 10 matching lines...) Expand all
232 server_address_, 228 server_address_,
233 server_hostname_, 229 server_hostname_,
234 false, // not secure 230 false, // not secure
235 client_config_, 231 client_config_,
236 client_supported_versions_); 232 client_supported_versions_);
237 client->UseWriter(writer); 233 client->UseWriter(writer);
238 client->Connect(); 234 client->Connect();
239 return client; 235 return client;
240 } 236 }
241 237
242 void set_client_initial_flow_control_receive_window(uint32 window) {
243 CHECK(client_.get() == nullptr);
244 DVLOG(1) << "Setting client initial flow control window: " << window;
245 client_config_.SetInitialFlowControlWindowToSend(window);
246 }
247
248 void set_client_initial_stream_flow_control_receive_window(uint32 window) { 238 void set_client_initial_stream_flow_control_receive_window(uint32 window) {
249 CHECK(client_.get() == nullptr); 239 CHECK(client_.get() == nullptr);
250 DVLOG(1) << "Setting client initial stream flow control window: " << window; 240 DVLOG(1) << "Setting client initial stream flow control window: " << window;
251 client_config_.SetInitialStreamFlowControlWindowToSend(window); 241 client_config_.SetInitialStreamFlowControlWindowToSend(window);
252 } 242 }
253 243
254 void set_client_initial_session_flow_control_receive_window(uint32 window) { 244 void set_client_initial_session_flow_control_receive_window(uint32 window) {
255 CHECK(client_.get() == nullptr); 245 CHECK(client_.get() == nullptr);
256 DVLOG(1) << "Setting client initial session flow control window: " 246 DVLOG(1) << "Setting client initial session flow control window: "
257 << window; 247 << window;
258 client_config_.SetInitialSessionFlowControlWindowToSend(window); 248 client_config_.SetInitialSessionFlowControlWindowToSend(window);
259 } 249 }
260 250
261 void set_server_initial_flow_control_receive_window(uint32 window) {
262 CHECK(server_thread_.get() == nullptr);
263 DVLOG(1) << "Setting server initial flow control window: " << window;
264 server_config_.SetInitialFlowControlWindowToSend(window);
265 }
266
267 void set_server_initial_stream_flow_control_receive_window(uint32 window) { 251 void set_server_initial_stream_flow_control_receive_window(uint32 window) {
268 CHECK(server_thread_.get() == nullptr); 252 CHECK(server_thread_.get() == nullptr);
269 DVLOG(1) << "Setting server initial stream flow control window: " 253 DVLOG(1) << "Setting server initial stream flow control window: "
270 << window; 254 << window;
271 server_config_.SetInitialStreamFlowControlWindowToSend(window); 255 server_config_.SetInitialStreamFlowControlWindowToSend(window);
272 } 256 }
273 257
274 void set_server_initial_session_flow_control_receive_window(uint32 window) { 258 void set_server_initial_session_flow_control_receive_window(uint32 window) {
275 CHECK(server_thread_.get() == nullptr); 259 CHECK(server_thread_.get() == nullptr);
276 DVLOG(1) << "Setting server initial session flow control window: " 260 DVLOG(1) << "Setting server initial session flow control window: "
(...skipping 482 matching lines...) Expand 10 before | Expand all | Expand 10 after
759 // Test that the resume write alarm is not set in QuicConnection::OnCanWrite 743 // Test that the resume write alarm is not set in QuicConnection::OnCanWrite
760 // if currently connection level flow control blocked. If set, this results in 744 // if currently connection level flow control blocked. If set, this results in
761 // an infinite loop in the EpollServer, as the alarm fires and is immediately 745 // an infinite loop in the EpollServer, as the alarm fires and is immediately
762 // rescheduled. 746 // rescheduled.
763 ASSERT_TRUE(Initialize()); 747 ASSERT_TRUE(Initialize());
764 client_->client()->WaitForCryptoHandshakeConfirmed(); 748 client_->client()->WaitForCryptoHandshakeConfirmed();
765 749
766 // Ensure both stream and connection level are flow control blocked by setting 750 // Ensure both stream and connection level are flow control blocked by setting
767 // the send window offset to 0. 751 // the send window offset to 0.
768 const uint64 kFlowControlWindow = 752 const uint64 kFlowControlWindow =
769 server_config_.GetInitialFlowControlWindowToSend(); 753 server_config_.GetInitialStreamFlowControlWindowToSend();
770 QuicSpdyClientStream* stream = client_->GetOrCreateStream(); 754 QuicSpdyClientStream* stream = client_->GetOrCreateStream();
771 QuicSession* session = client_->client()->session(); 755 QuicSession* session = client_->client()->session();
772 QuicFlowControllerPeer::SetSendWindowOffset(stream->flow_controller(), 0); 756 QuicFlowControllerPeer::SetSendWindowOffset(stream->flow_controller(), 0);
773 QuicFlowControllerPeer::SetSendWindowOffset(session->flow_controller(), 0); 757 QuicFlowControllerPeer::SetSendWindowOffset(session->flow_controller(), 0);
774 EXPECT_TRUE(stream->flow_controller()->IsBlocked()); 758 EXPECT_TRUE(stream->flow_controller()->IsBlocked());
775 EXPECT_TRUE(session->flow_controller()->IsBlocked()); 759 EXPECT_TRUE(session->flow_controller()->IsBlocked());
776 760
777 // Make sure that the stream has data pending so that it will be marked as 761 // Make sure that the stream has data pending so that it will be marked as
778 // write blocked when it receives a stream level WINDOW_UPDATE. 762 // write blocked when it receives a stream level WINDOW_UPDATE.
779 stream->SendBody("hello", false); 763 stream->SendBody("hello", false);
(...skipping 230 matching lines...) Expand 10 before | Expand all | Expand 10 after
1010 client_sent_packet_manager.GetRttStats()->smoothed_rtt().IsInfinite()); 994 client_sent_packet_manager.GetRttStats()->smoothed_rtt().IsInfinite());
1011 // Expect the default rtt of 100ms. 995 // Expect the default rtt of 100ms.
1012 EXPECT_EQ(static_cast<int64>(100 * kNumMicrosPerMilli), 996 EXPECT_EQ(static_cast<int64>(100 * kNumMicrosPerMilli),
1013 server_sent_packet_manager.GetRttStats()->initial_rtt_us()); 997 server_sent_packet_manager.GetRttStats()->initial_rtt_us());
1014 // Ensure the bandwidth is valid. 998 // Ensure the bandwidth is valid.
1015 client_sent_packet_manager.BandwidthEstimate(); 999 client_sent_packet_manager.BandwidthEstimate();
1016 server_sent_packet_manager.BandwidthEstimate(); 1000 server_sent_packet_manager.BandwidthEstimate();
1017 server_thread_->Resume(); 1001 server_thread_->Resume();
1018 } 1002 }
1019 1003
1004 TEST_P(EndToEndTest, 0ByteConnectionId) {
1005 ValueRestore<bool> old_flag(&FLAGS_allow_truncated_connection_ids_for_quic,
1006 true);
1007 client_config_.SetBytesForConnectionIdToSend(0);
1008 ASSERT_TRUE(Initialize());
1009
1010 EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
1011 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code());
1012
1013 QuicPacketHeader* header = QuicConnectionPeer::GetLastHeader(
1014 client_->client()->session()->connection());
1015 EXPECT_EQ(PACKET_0BYTE_CONNECTION_ID,
1016 header->public_header.connection_id_length);
1017 }
1018
1019 TEST_P(EndToEndTest, 1ByteConnectionId) {
1020 ValueRestore<bool> old_flag(&FLAGS_allow_truncated_connection_ids_for_quic,
1021 true);
1022 client_config_.SetBytesForConnectionIdToSend(1);
1023 ASSERT_TRUE(Initialize());
1024
1025 EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
1026 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code());
1027 QuicPacketHeader* header = QuicConnectionPeer::GetLastHeader(
1028 client_->client()->session()->connection());
1029 EXPECT_EQ(PACKET_1BYTE_CONNECTION_ID,
1030 header->public_header.connection_id_length);
1031 }
1032
1033 TEST_P(EndToEndTest, 4ByteConnectionId) {
1034 ValueRestore<bool> old_flag(&FLAGS_allow_truncated_connection_ids_for_quic,
1035 true);
1036 client_config_.SetBytesForConnectionIdToSend(4);
1037 ASSERT_TRUE(Initialize());
1038
1039 EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
1040 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code());
1041 QuicPacketHeader* header = QuicConnectionPeer::GetLastHeader(
1042 client_->client()->session()->connection());
1043 EXPECT_EQ(PACKET_4BYTE_CONNECTION_ID,
1044 header->public_header.connection_id_length);
1045 }
1046
1047 TEST_P(EndToEndTest, 8ByteConnectionId) {
1048 ValueRestore<bool> old_flag(&FLAGS_allow_truncated_connection_ids_for_quic,
1049 true);
1050 client_config_.SetBytesForConnectionIdToSend(8);
1051 ASSERT_TRUE(Initialize());
1052
1053 EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
1054 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code());
1055 QuicPacketHeader* header = QuicConnectionPeer::GetLastHeader(
1056 client_->client()->session()->connection());
1057 EXPECT_EQ(PACKET_8BYTE_CONNECTION_ID,
1058 header->public_header.connection_id_length);
1059 }
1060
1061 TEST_P(EndToEndTest, 15ByteConnectionId) {
1062 ValueRestore<bool> old_flag(&FLAGS_allow_truncated_connection_ids_for_quic,
1063 true);
1064 client_config_.SetBytesForConnectionIdToSend(15);
1065 ASSERT_TRUE(Initialize());
1066
1067 // Our server is permissive and allows for out of bounds values.
1068 EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
1069 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code());
1070 QuicPacketHeader* header = QuicConnectionPeer::GetLastHeader(
1071 client_->client()->session()->connection());
1072 EXPECT_EQ(PACKET_8BYTE_CONNECTION_ID,
1073 header->public_header.connection_id_length);
1074 }
1075
1020 TEST_P(EndToEndTest, ResetConnection) { 1076 TEST_P(EndToEndTest, ResetConnection) {
1021 ASSERT_TRUE(Initialize()); 1077 ASSERT_TRUE(Initialize());
1022 client_->client()->WaitForCryptoHandshakeConfirmed(); 1078 client_->client()->WaitForCryptoHandshakeConfirmed();
1023 1079
1024 EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo")); 1080 EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo"));
1025 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code()); 1081 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code());
1026 client_->ResetConnection(); 1082 client_->ResetConnection();
1027 EXPECT_EQ(kBarResponseBody, client_->SendSynchronousRequest("/bar")); 1083 EXPECT_EQ(kBarResponseBody, client_->SendSynchronousRequest("/bar"));
1028 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code()); 1084 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code());
1029 } 1085 }
(...skipping 136 matching lines...) Expand 10 before | Expand all | Expand 10 after
1166 // Send a second request, using the new FD. 1222 // Send a second request, using the new FD.
1167 EXPECT_EQ(kBarResponseBody, client_->SendSynchronousRequest("/bar")); 1223 EXPECT_EQ(kBarResponseBody, client_->SendSynchronousRequest("/bar"));
1168 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code()); 1224 EXPECT_EQ(200u, client_->response_headers()->parsed_response_code());
1169 1225
1170 // Verify that the client's ephemeral port is different. 1226 // Verify that the client's ephemeral port is different.
1171 IPEndPoint new_address = client_->client()->client_address(); 1227 IPEndPoint new_address = client_->client()->client_address();
1172 EXPECT_EQ(old_address.address(), new_address.address()); 1228 EXPECT_EQ(old_address.address(), new_address.address());
1173 EXPECT_NE(old_address.port(), new_address.port()); 1229 EXPECT_NE(old_address.port(), new_address.port());
1174 } 1230 }
1175 1231
1176 1232 TEST_P(EndToEndTest, DifferentFlowControlWindows) {
1177 TEST_P(EndToEndTest, DifferentFlowControlWindowsQ019) {
1178 // TODO(rjshade): Remove this test when removing QUIC_VERSION_19.
1179 // Client and server can set different initial flow control receive windows. 1233 // Client and server can set different initial flow control receive windows.
1180 // These are sent in CHLO/SHLO. Tests that these values are exchanged properly 1234 // These are sent in CHLO/SHLO. Tests that these values are exchanged properly
1181 // in the crypto handshake. 1235 // in the crypto handshake.
1182
1183 const uint32 kClientIFCW = 123456;
1184 set_client_initial_flow_control_receive_window(kClientIFCW);
1185
1186 const uint32 kServerIFCW = 654321;
1187 set_server_initial_flow_control_receive_window(kServerIFCW);
1188
1189 ASSERT_TRUE(Initialize());
1190 if (negotiated_version_ > QUIC_VERSION_19) {
1191 return;
1192 }
1193
1194 // Values are exchanged during crypto handshake, so wait for that to finish.
1195 client_->client()->WaitForCryptoHandshakeConfirmed();
1196 server_thread_->WaitForCryptoHandshakeConfirmed();
1197
1198 // Client should have the right value for server's receive window.
1199 EXPECT_EQ(kServerIFCW, client_->client()
1200 ->session()
1201 ->config()
1202 ->ReceivedInitialFlowControlWindowBytes());
1203
1204 // Server should have the right value for client's receive window.
1205 server_thread_->Pause();
1206 QuicDispatcher* dispatcher =
1207 QuicServerPeer::GetDispatcher(server_thread_->server());
1208 QuicSession* session = dispatcher->session_map().begin()->second;
1209 EXPECT_EQ(kClientIFCW,
1210 session->config()->ReceivedInitialFlowControlWindowBytes());
1211 server_thread_->Resume();
1212 }
1213
1214 TEST_P(EndToEndTest, DifferentFlowControlWindowsQ020) {
1215 // TODO(rjshade): Rename to DifferentFlowControlWindows when removing
1216 // QUIC_VERSION_19.
1217 // Client and server can set different initial flow control receive windows.
1218 // These are sent in CHLO/SHLO. Tests that these values are exchanged properly
1219 // in the crypto handshake.
1220 const uint32 kClientStreamIFCW = 123456; 1236 const uint32 kClientStreamIFCW = 123456;
1221 const uint32 kClientSessionIFCW = 234567; 1237 const uint32 kClientSessionIFCW = 234567;
1222 set_client_initial_stream_flow_control_receive_window(kClientStreamIFCW); 1238 set_client_initial_stream_flow_control_receive_window(kClientStreamIFCW);
1223 set_client_initial_session_flow_control_receive_window(kClientSessionIFCW); 1239 set_client_initial_session_flow_control_receive_window(kClientSessionIFCW);
1224 1240
1225 const uint32 kServerStreamIFCW = 654321; 1241 const uint32 kServerStreamIFCW = 654321;
1226 const uint32 kServerSessionIFCW = 765432; 1242 const uint32 kServerSessionIFCW = 765432;
1227 set_server_initial_stream_flow_control_receive_window(kServerStreamIFCW); 1243 set_server_initial_stream_flow_control_receive_window(kServerStreamIFCW);
1228 set_server_initial_session_flow_control_receive_window(kServerSessionIFCW); 1244 set_server_initial_session_flow_control_receive_window(kServerSessionIFCW);
1229 1245
1230 ASSERT_TRUE(Initialize()); 1246 ASSERT_TRUE(Initialize());
1231 if (negotiated_version_ == QUIC_VERSION_19) {
1232 return;
1233 }
1234 1247
1235 // Values are exchanged during crypto handshake, so wait for that to finish. 1248 // Values are exchanged during crypto handshake, so wait for that to finish.
1236 client_->client()->WaitForCryptoHandshakeConfirmed(); 1249 client_->client()->WaitForCryptoHandshakeConfirmed();
1237 server_thread_->WaitForCryptoHandshakeConfirmed(); 1250 server_thread_->WaitForCryptoHandshakeConfirmed();
1238 1251
1239 // Open a data stream to make sure the stream level flow control is updated. 1252 // Open a data stream to make sure the stream level flow control is updated.
1240 QuicSpdyClientStream* stream = client_->GetOrCreateStream(); 1253 QuicSpdyClientStream* stream = client_->GetOrCreateStream();
1241 stream->SendBody("hello", false); 1254 stream->SendBody("hello", false);
1242 1255
1243 // Client should have the right values for server's receive window. 1256 // Client should have the right values for server's receive window.
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after
1275 // The special headers and crypto streams should be subject to per-stream flow 1288 // The special headers and crypto streams should be subject to per-stream flow
1276 // control limits, but should not be subject to connection level flow control. 1289 // control limits, but should not be subject to connection level flow control.
1277 const uint32 kStreamIFCW = 123456; 1290 const uint32 kStreamIFCW = 123456;
1278 const uint32 kSessionIFCW = 234567; 1291 const uint32 kSessionIFCW = 234567;
1279 set_client_initial_stream_flow_control_receive_window(kStreamIFCW); 1292 set_client_initial_stream_flow_control_receive_window(kStreamIFCW);
1280 set_client_initial_session_flow_control_receive_window(kSessionIFCW); 1293 set_client_initial_session_flow_control_receive_window(kSessionIFCW);
1281 set_server_initial_stream_flow_control_receive_window(kStreamIFCW); 1294 set_server_initial_stream_flow_control_receive_window(kStreamIFCW);
1282 set_server_initial_session_flow_control_receive_window(kSessionIFCW); 1295 set_server_initial_session_flow_control_receive_window(kSessionIFCW);
1283 1296
1284 ASSERT_TRUE(Initialize()); 1297 ASSERT_TRUE(Initialize());
1285 if (negotiated_version_ < QUIC_VERSION_21) {
1286 return;
1287 }
1288 1298
1289 // Wait for crypto handshake to finish. This should have contributed to the 1299 // Wait for crypto handshake to finish. This should have contributed to the
1290 // crypto stream flow control window, but not affected the session flow 1300 // crypto stream flow control window, but not affected the session flow
1291 // control window. 1301 // control window.
1292 client_->client()->WaitForCryptoHandshakeConfirmed(); 1302 client_->client()->WaitForCryptoHandshakeConfirmed();
1293 server_thread_->WaitForCryptoHandshakeConfirmed(); 1303 server_thread_->WaitForCryptoHandshakeConfirmed();
1294 1304
1295 QuicCryptoStream* crypto_stream = 1305 QuicCryptoStream* crypto_stream =
1296 QuicSessionPeer::GetCryptoStream(client_->client()->session()); 1306 QuicSessionPeer::GetCryptoStream(client_->client()->session());
1297 EXPECT_LT( 1307 EXPECT_LT(
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after
1365 const QuicSentPacketManager& server_sent_packet_manager = 1375 const QuicSentPacketManager& server_sent_packet_manager =
1366 *GetSentPacketManagerFromFirstServerSession(); 1376 *GetSentPacketManagerFromFirstServerSession();
1367 EXPECT_TRUE(server_sent_packet_manager.using_pacing()); 1377 EXPECT_TRUE(server_sent_packet_manager.using_pacing());
1368 EXPECT_TRUE(client_sent_packet_manager.using_pacing()); 1378 EXPECT_TRUE(client_sent_packet_manager.using_pacing());
1369 } 1379 }
1370 1380
1371 } // namespace 1381 } // namespace
1372 } // namespace test 1382 } // namespace test
1373 } // namespace tools 1383 } // namespace tools
1374 } // namespace net 1384 } // namespace net
OLDNEW
« no previous file with comments | « net/spdy/spdy_write_queue.cc ('k') | net/tools/quic/quic_client.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698