| Index: net/quic/quic_crypto_client_stream_test.cc
|
| diff --git a/net/quic/quic_crypto_client_stream_test.cc b/net/quic/quic_crypto_client_stream_test.cc
|
| index a39ab4f1894417cccb081922c0ac7813f27dac90..454d93013b7cc5f4352dd576fa29c37f01315edb 100644
|
| --- a/net/quic/quic_crypto_client_stream_test.cc
|
| +++ b/net/quic/quic_crypto_client_stream_test.cc
|
| @@ -30,10 +30,12 @@ const uint16 kServerPort = 80;
|
| class QuicCryptoClientStreamTest : public ::testing::Test {
|
| public:
|
| QuicCryptoClientStreamTest()
|
| - : connection_(new PacketSavingConnection(false)),
|
| + : connection_(new PacketSavingConnection(/*is_server=*/false)),
|
| session_(new TestClientSession(connection_, DefaultQuicConfig())),
|
| server_id_(kServerHostname, kServerPort, false, PRIVACY_MODE_DISABLED),
|
| - stream_(new QuicCryptoClientStream(server_id_, session_.get(), nullptr,
|
| + stream_(new QuicCryptoClientStream(server_id_,
|
| + session_.get(),
|
| + nullptr,
|
| &crypto_config_)) {
|
| session_->SetCryptoStream(stream_.get());
|
| // Advance the time, because timers do not like uninitialized times.
|
| @@ -121,7 +123,7 @@ TEST_F(QuicCryptoClientStreamTest, ExpiredServerConfig) {
|
| // Seed the config with a cached server config.
|
| CompleteCryptoHandshake();
|
|
|
| - connection_ = new PacketSavingConnection(true);
|
| + connection_ = new PacketSavingConnection(/*is_server=*/false);
|
| session_.reset(new TestClientSession(connection_, DefaultQuicConfig()));
|
| stream_.reset(new QuicCryptoClientStream(server_id_, session_.get(), nullptr,
|
| &crypto_config_));
|
| @@ -135,7 +137,7 @@ TEST_F(QuicCryptoClientStreamTest, ExpiredServerConfig) {
|
|
|
| stream_->CryptoConnect();
|
| // Check that a client hello was sent.
|
| - ASSERT_EQ(1u, connection_->packets_.size());
|
| + ASSERT_EQ(1u, connection_->encrypted_packets_.size());
|
| }
|
|
|
| TEST_F(QuicCryptoClientStreamTest, ServerConfigUpdate) {
|
|
|