Skip to content

Commit

Permalink
Revert of Rename PrivateMode enum values: (https://codereview.chromiu…
Browse files Browse the repository at this point in the history
…m.org/215023002/)

Reason for revert:
Broke build.

http://build.chromium.org/p/chromium.linux/builders/Linux%20Builder%20%28dbg%29/builds/71042/steps/compile/logs/stdio#error1

Original issue's description:
> Rename PrivateMode enum values:
> 
> kPrivacyModeDisabled => PRIVACY_MODE_DISABLED
> kPrivacyModeEnabled  => PRIVACY_MODE_ENABLED
> 
> To match the chromium style guide:
> 
> Though the Google C++ Style Guide now says to use kConstantNaming for enums,
> Chromium was written using MACRO_STYLE naming.  Continue to use this style for consistency.
> 
> R=mef@chromium.org
> 
> Committed: https://src.chromium.org/viewvc/chrome?view=rev&revision=260281

TBR=mef@chromium.org,zea@chromium.org
NOTREECHECKS=true
NOTRY=true

Review URL: https://codereview.chromium.org/217053010

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@260296 0039d316-1c4b-4281-b951-d872f2087c98
  • Loading branch information
rch@chromium.org committed Mar 28, 2014
1 parent 3c6f881 commit 23f7bf8
Show file tree
Hide file tree
Showing 42 changed files with 93 additions and 95 deletions.
2 changes: 1 addition & 1 deletion chrome/browser/net/preconnect.cc
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ void PreconnectOnIOThread(

net::NetworkDelegate* delegate = context->network_delegate();
if (delegate->CanEnablePrivacyMode(url, first_party_for_cookies))
request_info.privacy_mode = net::PRIVACY_MODE_ENABLED;
request_info.privacy_mode = net::kPrivacyModeEnabled;

// It almost doesn't matter whether we use net::LOWEST or net::HIGHEST
// priority here, as we won't make a request, and will surrender the created
Expand Down
2 changes: 1 addition & 1 deletion google_apis/gcm/engine/connection_factory_impl.cc
Original file line number Diff line number Diff line change
Expand Up @@ -331,7 +331,7 @@ void ConnectionFactoryImpl::OnProxyResolveDone(int status) {
proxy_info_,
ssl_config,
ssl_config,
net::PRIVACY_MODE_DISABLED,
net::kPrivacyModeDisabled,
bound_net_log_,
&socket_handle_,
base::Bind(&ConnectionFactoryImpl::OnConnectDone,
Expand Down
2 changes: 1 addition & 1 deletion jingle/glue/proxy_resolving_client_socket.cc
Original file line number Diff line number Diff line change
Expand Up @@ -192,7 +192,7 @@ void ProxyResolvingClientSocket::ProcessProxyResolveDone(int status) {
// Now that we have resolved the proxy, we need to connect.
status = net::InitSocketHandleForRawConnect(
dest_host_port_pair_, network_session_.get(), proxy_info_, ssl_config_,
ssl_config_, net::PRIVACY_MODE_DISABLED, bound_net_log_, transport_.get(),
ssl_config_, net::kPrivacyModeDisabled, bound_net_log_, transport_.get(),
connect_callback_);
if (status != net::ERR_IO_PENDING) {
// Since this method is always called asynchronously. it is OK to call
Expand Down
5 changes: 3 additions & 2 deletions net/base/privacy_mode.h
Original file line number Diff line number Diff line change
Expand Up @@ -10,10 +10,11 @@ namespace net {
// Privacy Mode is enabled if cookies to particular site are blocked, so
// Channel ID is disabled on that connection (https or spdy).
enum PrivacyMode {
PRIVACY_MODE_DISABLED = 0,
PRIVACY_MODE_ENABLED = 1,
kPrivacyModeDisabled = 0,
kPrivacyModeEnabled = 1,
};

}; // namespace net

#endif // NET_BASE_PRIVACY_MODE_H_

12 changes: 5 additions & 7 deletions net/http/disk_cache_based_quic_server_info_unittest.cc
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ TEST(DiskCacheBasedQuicServerInfo, DeleteInCallback) {
MockBlockingBackendFactory* factory = new MockBlockingBackendFactory();
MockHttpCache cache(factory);
QuicSessionKey server_key("www.verisign.com", 443, true,
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
scoped_ptr<QuicServerInfo> quic_server_info(
new DiskCacheBasedQuicServerInfo(server_key, cache.http_cache()));
quic_server_info->Start();
Expand All @@ -76,7 +76,7 @@ TEST(DiskCacheBasedQuicServerInfo, Update) {
AddMockTransaction(&kHostInfoTransaction1);
TestCompletionCallback callback;

QuicSessionKey server_key("www.google.com", 443, true, PRIVACY_MODE_DISABLED);
QuicSessionKey server_key("www.google.com", 443, true, kPrivacyModeDisabled);
scoped_ptr<QuicServerInfo> quic_server_info(
new DiskCacheBasedQuicServerInfo(server_key, cache.http_cache()));
quic_server_info->Start();
Expand Down Expand Up @@ -143,8 +143,7 @@ TEST(DiskCacheBasedQuicServerInfo, UpdateDifferentPorts) {
TestCompletionCallback callback;

// Persist data for port 443.
QuicSessionKey server_key1("www.google.com", 443, true,
PRIVACY_MODE_DISABLED);
QuicSessionKey server_key1("www.google.com", 443, true, kPrivacyModeDisabled);
scoped_ptr<QuicServerInfo> quic_server_info1(
new DiskCacheBasedQuicServerInfo(server_key1, cache.http_cache()));
quic_server_info1->Start();
Expand All @@ -168,8 +167,7 @@ TEST(DiskCacheBasedQuicServerInfo, UpdateDifferentPorts) {
base::MessageLoop::current()->RunUntilIdle();

// Persist data for port 80.
QuicSessionKey server_key2("www.google.com", 80, false,
PRIVACY_MODE_DISABLED);
QuicSessionKey server_key2("www.google.com", 80, false, kPrivacyModeDisabled);
scoped_ptr<QuicServerInfo> quic_server_info2(
new DiskCacheBasedQuicServerInfo(server_key2, cache.http_cache()));
quic_server_info2->Start();
Expand Down Expand Up @@ -232,7 +230,7 @@ TEST(DiskCacheBasedQuicServerInfo, IsReadyToPersist) {
AddMockTransaction(&kHostInfoTransaction1);
TestCompletionCallback callback;

QuicSessionKey server_key("www.google.com", 443, true, PRIVACY_MODE_DISABLED);
QuicSessionKey server_key("www.google.com", 443, true, kPrivacyModeDisabled);
scoped_ptr<QuicServerInfo> quic_server_info(
new DiskCacheBasedQuicServerInfo(server_key, cache.http_cache()));
EXPECT_FALSE(quic_server_info->IsDataReady());
Expand Down
2 changes: 1 addition & 1 deletion net/http/http_network_transaction.cc
Original file line number Diff line number Diff line change
Expand Up @@ -196,7 +196,7 @@ int HttpNetworkTransaction::Start(const HttpRequestInfo* request_info,
// Channel ID is enabled unless --disable-tls-channel-id flag is set,
// or if privacy mode is enabled.
bool channel_id_enabled = server_ssl_config_.channel_id_enabled &&
(request_->privacy_mode == PRIVACY_MODE_DISABLED);
(request_->privacy_mode == kPrivacyModeDisabled);
server_ssl_config_.channel_id_enabled = channel_id_enabled;

next_state_ = STATE_NOTIFY_BEFORE_CREATE_STREAM;
Expand Down
10 changes: 5 additions & 5 deletions net/http/http_network_transaction_unittest.cc
Original file line number Diff line number Diff line change
Expand Up @@ -9218,7 +9218,7 @@ TEST_P(HttpNetworkTransactionTest,
// Set up an initial SpdySession in the pool to reuse.
HostPortPair host_port_pair("www.google.com", 443);
SpdySessionKey key(host_port_pair, ProxyServer::Direct(),
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
base::WeakPtr<SpdySession> spdy_session =
CreateSecureSpdySession(session, key, BoundNetLog());

Expand Down Expand Up @@ -10377,7 +10377,7 @@ TEST_P(HttpNetworkTransactionTest, PreconnectWithExistingSpdySession) {
// Set up an initial SpdySession in the pool to reuse.
HostPortPair host_port_pair("www.google.com", 443);
SpdySessionKey key(host_port_pair, ProxyServer::Direct(),
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
base::WeakPtr<SpdySession> spdy_session =
CreateInsecureSpdySession(session, key, BoundNetLog());

Expand Down Expand Up @@ -11735,7 +11735,7 @@ TEST_P(HttpNetworkTransactionTest, CloseIdleSpdySessionToOpenNewOne) {

HostPortPair host_port_pair_a("www.a.com", 443);
SpdySessionKey spdy_session_key_a(
host_port_pair_a, ProxyServer::Direct(), PRIVACY_MODE_DISABLED);
host_port_pair_a, ProxyServer::Direct(), kPrivacyModeDisabled);
EXPECT_FALSE(
HasSpdySession(session->spdy_session_pool(), spdy_session_key_a));

Expand Down Expand Up @@ -11767,7 +11767,7 @@ TEST_P(HttpNetworkTransactionTest, CloseIdleSpdySessionToOpenNewOne) {

HostPortPair host_port_pair_b("www.b.com", 443);
SpdySessionKey spdy_session_key_b(
host_port_pair_b, ProxyServer::Direct(), PRIVACY_MODE_DISABLED);
host_port_pair_b, ProxyServer::Direct(), kPrivacyModeDisabled);
EXPECT_FALSE(
HasSpdySession(session->spdy_session_pool(), spdy_session_key_b));
HttpRequestInfo request2;
Expand Down Expand Up @@ -11795,7 +11795,7 @@ TEST_P(HttpNetworkTransactionTest, CloseIdleSpdySessionToOpenNewOne) {

HostPortPair host_port_pair_a1("www.a.com", 80);
SpdySessionKey spdy_session_key_a1(
host_port_pair_a1, ProxyServer::Direct(), PRIVACY_MODE_DISABLED);
host_port_pair_a1, ProxyServer::Direct(), kPrivacyModeDisabled);
EXPECT_FALSE(
HasSpdySession(session->spdy_session_pool(), spdy_session_key_a1));
HttpRequestInfo request3;
Expand Down
4 changes: 2 additions & 2 deletions net/http/http_proxy_client_socket_pool.cc
Original file line number Diff line number Diff line change
Expand Up @@ -206,7 +206,7 @@ int HttpProxyConnectJob::DoSSLConnect() {
if (params_->tunnel()) {
SpdySessionKey key(params_->destination().host_port_pair(),
ProxyServer::Direct(),
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
if (params_->spdy_session_pool()->FindAvailableSession(key, net_log())) {
using_spdy_ = true;
next_state_ = STATE_SPDY_PROXY_CREATE_STREAM;
Expand Down Expand Up @@ -302,7 +302,7 @@ int HttpProxyConnectJob::DoSpdyProxyCreateStream() {
DCHECK(params_->tunnel());
SpdySessionKey key(params_->destination().host_port_pair(),
ProxyServer::Direct(),
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
SpdySessionPool* spdy_pool = params_->spdy_session_pool();
base::WeakPtr<SpdySession> spdy_session =
spdy_pool->FindAvailableSession(key, net_log());
Expand Down
2 changes: 1 addition & 1 deletion net/http/http_proxy_client_socket_pool_unittest.cc
Original file line number Diff line number Diff line change
Expand Up @@ -135,7 +135,7 @@ class HttpProxyClientSocketPoolTest
NULL,
HostPortPair(kHttpsProxyHost, 443),
SSLConfig(),
PRIVACY_MODE_DISABLED,
kPrivacyModeDisabled,
0,
false,
false);
Expand Down
2 changes: 1 addition & 1 deletion net/http/http_request_info.cc
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ HttpRequestInfo::HttpRequestInfo()
: upload_data_stream(NULL),
load_flags(0),
motivation(NORMAL_MOTIVATION),
privacy_mode(PRIVACY_MODE_DISABLED) {
privacy_mode(kPrivacyModeDisabled) {
}

HttpRequestInfo::~HttpRequestInfo() {}
Expand Down
4 changes: 2 additions & 2 deletions net/http/http_stream_factory_impl_job.cc
Original file line number Diff line number Diff line change
Expand Up @@ -1092,7 +1092,7 @@ int HttpStreamFactoryImpl::Job::DoCreateStream() {
// We never use privacy mode for connection to proxy server.
spdy_session_key = SpdySessionKey(proxy_server.host_port_pair(),
ProxyServer::Direct(),
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
direct = false;
}

Expand Down Expand Up @@ -1278,7 +1278,7 @@ void HttpStreamFactoryImpl::Job::InitSSLConfig(
ssl_config->verify_ev_cert = true;

// Disable Channel ID if privacy mode is enabled.
if (request_info_.privacy_mode == PRIVACY_MODE_ENABLED)
if (request_info_.privacy_mode == kPrivacyModeEnabled)
ssl_config->channel_id_enabled = false;
}

Expand Down
10 changes: 5 additions & 5 deletions net/http/http_stream_factory_impl_unittest.cc
Original file line number Diff line number Diff line change
Expand Up @@ -550,7 +550,7 @@ TEST_P(HttpStreamFactoryTest, PreconnectDirectWithExistingSpdySession) {
// Put a SpdySession in the pool.
HostPortPair host_port_pair("www.google.com", 443);
SpdySessionKey key(host_port_pair, ProxyServer::Direct(),
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
ignore_result(CreateFakeSpdySession(session->spdy_session_pool(), key));

CapturePreconnectsTransportSocketPool* transport_conn_pool =
Expand Down Expand Up @@ -661,13 +661,13 @@ TEST_P(HttpStreamFactoryTest, PrivacyModeDisablesChannelId) {
// Set an existing SpdySession in the pool.
HostPortPair host_port_pair("www.google.com", 443);
SpdySessionKey key(host_port_pair, ProxyServer::Direct(),
PRIVACY_MODE_ENABLED);
kPrivacyModeEnabled);

HttpRequestInfo request_info;
request_info.method = "GET";
request_info.url = GURL("https://www.google.com");
request_info.load_flags = 0;
request_info.privacy_mode = PRIVACY_MODE_DISABLED;
request_info.privacy_mode = kPrivacyModeDisabled;

SSLConfig ssl_config;
StreamRequestWaiter waiter;
Expand Down Expand Up @@ -720,7 +720,7 @@ TEST_P(HttpStreamFactoryTest, PrivacyModeUsesDifferentSocketPoolGroup) {
request_info.method = "GET";
request_info.url = GURL("https://www.google.com");
request_info.load_flags = 0;
request_info.privacy_mode = PRIVACY_MODE_DISABLED;
request_info.privacy_mode = kPrivacyModeDisabled;

SSLConfig ssl_config;
StreamRequestWaiter waiter;
Expand All @@ -741,7 +741,7 @@ TEST_P(HttpStreamFactoryTest, PrivacyModeUsesDifferentSocketPoolGroup) {

EXPECT_EQ(GetSocketPoolGroupCount(ssl_pool), 1);

request_info.privacy_mode = PRIVACY_MODE_ENABLED;
request_info.privacy_mode = kPrivacyModeEnabled;
scoped_ptr<HttpStreamRequest> request3(
session->http_stream_factory()->RequestStream(
request_info, DEFAULT_PRIORITY, ssl_config, ssl_config,
Expand Down
6 changes: 3 additions & 3 deletions net/quic/crypto/quic_crypto_client_config_test.cc
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ TEST(QuicCryptoClientConfigTest, InchoateChlo) {
QuicCryptoClientConfig config;
QuicCryptoNegotiatedParameters params;
CryptoHandshakeMessage msg;
QuicSessionKey server_key("www.google.com", 80, false, PRIVACY_MODE_DISABLED);
QuicSessionKey server_key("www.google.com", 80, false, kPrivacyModeDisabled);
config.FillInchoateClientHello(server_key, QuicVersionMax(), &state,
&params, &msg);

Expand Down Expand Up @@ -131,14 +131,14 @@ TEST(QuicCryptoClientConfigTest, ProcessServerDowngradeAttack) {
TEST(QuicCryptoClientConfigTest, InitializeFrom) {
QuicCryptoClientConfig config;
QuicSessionKey canonical_key1("www.google.com", 80, false,
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
QuicCryptoClientConfig::CachedState* state =
config.LookupOrCreate(canonical_key1);
// TODO(rch): Populate other fields of |state|.
state->set_source_address_token("TOKEN");
state->SetProofValid();

QuicSessionKey other_key("mail.google.com", 80, false, PRIVACY_MODE_DISABLED);
QuicSessionKey other_key("mail.google.com", 80, false, kPrivacyModeDisabled);
config.InitializeFrom(other_key, canonical_key1, &config);
QuicCryptoClientConfig::CachedState* other = config.LookupOrCreate(other_key);

Expand Down
2 changes: 1 addition & 1 deletion net/quic/quic_client_session_test.cc
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ class QuicClientSessionTest : public ::testing::TestWithParam<QuicVersion> {
session_(connection_, GetSocket().Pass(), writer_.Pass(), NULL, NULL,
make_scoped_ptr((QuicServerInfo*)NULL),
QuicSessionKey(kServerHostname, kServerPort, false,
PRIVACY_MODE_DISABLED),
kPrivacyModeDisabled),
DefaultQuicConfig(), &crypto_config_, &net_log_) {
session_.config()->SetDefaults();
crypto_config_.SetDefaults();
Expand Down
4 changes: 2 additions & 2 deletions net/quic/quic_crypto_client_stream_test.cc
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ class QuicCryptoClientStreamTest : public ::testing::Test {
QuicCryptoClientStreamTest()
: connection_(new PacketSavingConnection(false)),
session_(new TestClientSession(connection_, DefaultQuicConfig())),
server_key_(kServerHostname, kServerPort, false, PRIVACY_MODE_DISABLED),
server_key_(kServerHostname, kServerPort, false, kPrivacyModeDisabled),
stream_(new QuicCryptoClientStream(
server_key_, session_.get(), NULL, &crypto_config_)) {
session_->SetCryptoStream(stream_.get());
Expand Down Expand Up @@ -106,7 +106,7 @@ TEST_F(QuicCryptoClientStreamTest, NegotiatedParameters) {
}

TEST_F(QuicCryptoClientStreamTest, InvalidHostname) {
QuicSessionKey server_key("invalid", 80, false, PRIVACY_MODE_DISABLED);
QuicSessionKey server_key("invalid", 80, false, kPrivacyModeDisabled);
stream_.reset(new QuicCryptoClientStream(server_key, session_.get(), NULL,
&crypto_config_));
session_->SetCryptoStream(stream_.get());
Expand Down
2 changes: 1 addition & 1 deletion net/quic/quic_crypto_server_stream_test.cc
Original file line number Diff line number Diff line change
Expand Up @@ -146,7 +146,7 @@ TEST_P(QuicCryptoServerStreamTest, ZeroRTT) {
client_crypto_config.SetDefaults();

QuicSessionKey server_key(kServerHostname, kServerPort, false,
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
scoped_ptr<QuicCryptoClientStream> client(new QuicCryptoClientStream(
server_key, client_session.get(), NULL, &client_crypto_config));
client_session->SetCryptoStream(client.get());
Expand Down
2 changes: 1 addition & 1 deletion net/quic/quic_http_stream_test.cc
Original file line number Diff line number Diff line change
Expand Up @@ -209,7 +209,7 @@ class QuicHttpStreamTest : public ::testing::TestWithParam<QuicVersion> {
&crypto_client_stream_factory_,
make_scoped_ptr((QuicServerInfo*)NULL),
QuicSessionKey(kServerHostname, kServerPort,
false, PRIVACY_MODE_DISABLED),
false, kPrivacyModeDisabled),
DefaultQuicConfig(), &crypto_config_, NULL));
session_->GetCryptoStream()->CryptoConnect();
EXPECT_TRUE(session_->IsCryptoHandshakeConfirmed());
Expand Down
2 changes: 1 addition & 1 deletion net/quic/quic_session_key.cc
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ bool QuicSessionKey::operator==(const QuicSessionKey& other) const {

string QuicSessionKey::ToString() const {
return (is_https_ ? "https://" : "http://") + host_port_pair_.ToString() +
(privacy_mode_ == PRIVACY_MODE_ENABLED ? "/private" : "");
(privacy_mode_ == kPrivacyModeEnabled ? "/private" : "");
}

} // namespace net
8 changes: 4 additions & 4 deletions net/quic/quic_session_key_test.cc
Original file line number Diff line number Diff line change
Expand Up @@ -16,22 +16,22 @@ TEST(QuicSessionKeyTest, ToString) {
HostPortPair google_host_port_pair("google.com", 10);

QuicSessionKey google_http_key(google_host_port_pair, false,
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
string google_http_key_str = google_http_key.ToString();
EXPECT_EQ("http://google.com:10", google_http_key_str);

QuicSessionKey google_https_key(google_host_port_pair, true,
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
string google_https_key_str = google_https_key.ToString();
EXPECT_EQ("https://google.com:10", google_https_key_str);

QuicSessionKey private_http_key(google_host_port_pair, false,
PRIVACY_MODE_ENABLED);
kPrivacyModeEnabled);
string private_http_key_str = private_http_key.ToString();
EXPECT_EQ("http://google.com:10/private", private_http_key_str);

QuicSessionKey private_https_key(google_host_port_pair, true,
PRIVACY_MODE_ENABLED);
kPrivacyModeEnabled);
string private_https_key_str = private_https_key.ToString();
EXPECT_EQ("https://google.com:10/private", private_https_key_str);
}
Expand Down
8 changes: 4 additions & 4 deletions net/quic/quic_stream_factory_test.cc
Original file line number Diff line number Diff line change
Expand Up @@ -48,15 +48,15 @@ class QuicStreamFactoryPeer {
static bool HasActiveSession(QuicStreamFactory* factory,
const HostPortPair& host_port_pair,
bool is_https) {
QuicSessionKey server_key(host_port_pair, is_https, PRIVACY_MODE_DISABLED);
QuicSessionKey server_key(host_port_pair, is_https, kPrivacyModeDisabled);
return factory->HasActiveSession(server_key);
}

static QuicClientSession* GetActiveSession(
QuicStreamFactory* factory,
const HostPortPair& host_port_pair,
bool is_https) {
QuicSessionKey server_key(host_port_pair, is_https, PRIVACY_MODE_DISABLED);
QuicSessionKey server_key(host_port_pair, is_https, kPrivacyModeDisabled);
DCHECK(factory->HasActiveSession(server_key));
return factory->active_sessions_[server_key];
}
Expand All @@ -66,7 +66,7 @@ class QuicStreamFactoryPeer {
const HostPortPair& host_port_pair,
bool is_https,
const BoundNetLog& net_log) {
QuicSessionKey server_key(host_port_pair, is_https, PRIVACY_MODE_DISABLED);
QuicSessionKey server_key(host_port_pair, is_https, kPrivacyModeDisabled);
return factory->CreateIfSessionExists(server_key, net_log);
}

Expand Down Expand Up @@ -97,7 +97,7 @@ class QuicStreamFactoryTest : public ::testing::TestWithParam<QuicVersion> {
SupportedVersions(GetParam()), true, true),
host_port_pair_(kDefaultServerHostName, kDefaultServerPort),
is_https_(false),
privacy_mode_(PRIVACY_MODE_DISABLED) {
privacy_mode_(kPrivacyModeDisabled) {
factory_.set_require_confirmation(false);
}

Expand Down
2 changes: 1 addition & 1 deletion net/quic/test_tools/crypto_test_utils.cc
Original file line number Diff line number Diff line change
Expand Up @@ -180,7 +180,7 @@ int CryptoTestUtils::HandshakeWithFakeClient(
crypto_config.SetChannelIDSigner(ChannelIDSignerForTesting());
}
QuicSessionKey server_key(kServerHostname, kServerPort, false,
PRIVACY_MODE_DISABLED);
kPrivacyModeDisabled);
QuicCryptoClientStream client(server_key, &client_session, NULL,
&crypto_config);
client_session.SetCryptoStream(&client);
Expand Down
Loading

0 comments on commit 23f7bf8

Please sign in to comment.