GetParam().send_quic_crypto_reject_reason;
}
- virtual void SetUp() {
+ void SetUp() override {
scoped_ptr<CryptoHandshakeMessage> msg(
config_.AddDefaultConfig(rand_, &clock_,
config_options_));
"NONC", nonce_hex_.c_str(),
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
- NULL);
+ nullptr);
ShouldSucceed(client_hello);
// The message should be rejected because the source-address token is
// missing.
*called_ = false;
}
- virtual void RunImpl(const CryptoHandshakeMessage& client_hello,
- const Result& result) OVERRIDE {
+ void RunImpl(const CryptoHandshakeMessage& client_hello,
+ const Result& result) override {
{
// Ensure that the strike register client lock is not held.
QuicCryptoServerConfigPeer peer(&test_->config_);
"CHLO",
"SNI", kBadSNIs[i],
"VER\0", client_version.data(),
- NULL));
+ nullptr));
const HandshakeFailureReason kRejectReasons[] = {
SERVER_CONFIG_INCHOATE_HELLO_FAILURE
};
"$padding", static_cast<int>(kClientHelloMinimumSize),
"PDMD", "X509",
"VER\0", client_version_.data(),
- NULL));
+ nullptr));
StringPiece cert, proof;
EXPECT_TRUE(out_.GetStringPiece(kCertificateTag, &cert));
ShouldFailMentioning("too small", CryptoTestUtils::Message(
"CHLO",
"VER\0", client_version_.data(),
- NULL));
+ nullptr));
const HandshakeFailureReason kRejectReasons[] = {
SERVER_CONFIG_INCHOATE_HELLO_FAILURE
};
"CHLO",
"STK", kBadSourceAddressTokens[i],
"VER\0", client_version_.data(),
- NULL));
+ nullptr));
const HandshakeFailureReason kRejectReasons[] = {
SERVER_CONFIG_INCHOATE_HELLO_FAILURE
};
"CHLO",
"NONC", kBadNonces[i],
"VER\0", client_version_.data(),
- NULL));
+ nullptr));
const HandshakeFailureReason kRejectReasons[] = {
SERVER_CONFIG_INCHOATE_HELLO_FAILURE
};
ShouldFailMentioning("Downgrade", InchoateClientHello(
"CHLO",
"VER\0", bad_version.data(),
- NULL));
+ nullptr));
const HandshakeFailureReason kRejectReasons[] = {
SERVER_CONFIG_INCHOATE_HELLO_FAILURE
};
"NONC", nonce_hex_.c_str(),
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
- NULL);
+ nullptr);
ShouldSucceed(msg);
ASSERT_EQ(kREJ, out_.tag());
const HandshakeFailureReason kRejectReasons[] = {
"NONC", nonce_hex_.c_str(),
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
- NULL);
+ nullptr);
ShouldSucceed(msg);
ASSERT_EQ(kREJ, out_.tag());
const HandshakeFailureReason kRejectReasons[] = {
"NONC", (string(1, 'X') + nonce_hex_).c_str(),
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
- NULL);
+ nullptr);
ShouldSucceed(msg);
ASSERT_EQ(kREJ, out_.tag());
const HandshakeFailureReason kRejectReasons[] = {
"SNO\0", (string(1, 'X') + nonce_hex_).c_str(),
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
- NULL);
+ nullptr);
ShouldSucceed(msg);
ASSERT_EQ(kREJ, out_.tag());
const HandshakeFailureReason kRejectReasons[] = {
"NONC", nonce_hex_.c_str(),
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
- NULL);
+ nullptr);
ShouldSucceed(msg);
// The message should be rejected because the strike-register is still
// quiescent.
class CryptoServerTestNoConfig : public CryptoServerTest {
public:
- virtual void SetUp() {
+ void SetUp() override {
// Deliberately don't add a config so that we can test this situation.
}
};
ShouldFailMentioning("No config", InchoateClientHello(
"CHLO",
"VER\0", client_version_.data(),
- NULL));
+ nullptr));
const HandshakeFailureReason kRejectReasons[] = {
SERVER_CONFIG_INCHOATE_HELLO_FAILURE
AsyncStrikeServerVerificationTest() {
}
- virtual void SetUp() {
+ void SetUp() override {
const string kOrbit = "12345678";
config_options_.orbit = kOrbit;
strike_register_client_ = new DelayedVerifyStrikeRegisterClient(
"NONC", nonce_hex_.c_str(),
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
- NULL);
+ nullptr);
// Clear the message tag.
out_.set_tag(0);