[cleanup] Fix redundant webrtc name specifier
This CL was uploaded by git cl split.
R=hta@webrtc.org
No-IWYU: LSC
Bug: webrtc:42232595
Change-Id: I34e14bba2b09d3b344d434b9779effffba7b745c
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/390606
Commit-Queue: Evan Shrubsole <eshr@webrtc.org>
Reviewed-by: Harald Alvestrand <hta@webrtc.org>
Auto-Submit: Evan Shrubsole <eshr@webrtc.org>
Cr-Commit-Position: refs/heads/main@{#44575}
diff --git a/rtc_base/async_dns_resolver.cc b/rtc_base/async_dns_resolver.cc
index 625721a..9c9610d 100644
--- a/rtc_base/async_dns_resolver.cc
+++ b/rtc_base/async_dns_resolver.cc
@@ -112,7 +112,7 @@
// Execute the passed function if the state is Active.
void Finish(absl::AnyInvocable<void()> function) {
- webrtc::MutexLock lock(&mutex_);
+ MutexLock lock(&mutex_);
if (status_ != Status::kActive) {
return;
}
@@ -120,12 +120,12 @@
function();
}
void Kill() {
- webrtc::MutexLock lock(&mutex_);
+ MutexLock lock(&mutex_);
status_ = Status::kDead;
}
private:
- webrtc::Mutex mutex_;
+ Mutex mutex_;
Status status_ RTC_GUARDED_BY(mutex_) = Status::kActive;
};
@@ -148,7 +148,7 @@
result_.addr_ = addr;
callback_ = std::move(callback);
auto thread_function = [this, addr, family, flag = safety_.flag(),
- caller_task_queue = webrtc::TaskQueueBase::Current(),
+ caller_task_queue = TaskQueueBase::Current(),
state = state_] {
std::vector<IPAddress> addresses;
int error = ResolveHostname(addr.hostname(), family, addresses);
diff --git a/rtc_base/async_dns_resolver_unittest.cc b/rtc_base/async_dns_resolver_unittest.cc
index e9f1d2b..ae03b20 100644
--- a/rtc_base/async_dns_resolver_unittest.cc
+++ b/rtc_base/async_dns_resolver_unittest.cc
@@ -28,7 +28,7 @@
using ::testing::IsTrue;
-const webrtc::TimeDelta kDefaultTimeout = webrtc::TimeDelta::Millis(1000);
+const TimeDelta kDefaultTimeout = TimeDelta::Millis(1000);
const int kPortNumber = 3027;
TEST(AsyncDnsResolver, ConstructorWorks) {
diff --git a/rtc_base/async_packet_socket.cc b/rtc_base/async_packet_socket.cc
index 2ead920..397e197 100644
--- a/rtc_base/async_packet_socket.cc
+++ b/rtc_base/async_packet_socket.cc
@@ -41,7 +41,7 @@
void AsyncPacketSocket::SubscribeCloseEvent(
const void* removal_tag,
- std::function<void(webrtc::AsyncPacketSocket*, int)> callback) {
+ std::function<void(AsyncPacketSocket*, int)> callback) {
RTC_DCHECK_RUN_ON(&network_checker_);
on_close_.AddReceiver(removal_tag, std::move(callback));
}
@@ -52,8 +52,7 @@
}
void AsyncPacketSocket::RegisterReceivedPacketCallback(
- absl::AnyInvocable<void(webrtc::AsyncPacketSocket*,
- const webrtc::ReceivedIpPacket&)>
+ absl::AnyInvocable<void(AsyncPacketSocket*, const ReceivedIpPacket&)>
received_packet_callback) {
RTC_DCHECK_RUN_ON(&network_checker_);
RTC_CHECK(!received_packet_callback_);
diff --git a/rtc_base/async_packet_socket_unittest.cc b/rtc_base/async_packet_socket_unittest.cc
index 9ed491e..b37334a 100644
--- a/rtc_base/async_packet_socket_unittest.cc
+++ b/rtc_base/async_packet_socket_unittest.cc
@@ -30,7 +30,7 @@
Send,
(const void* pv,
size_t cb,
- const webrtc::AsyncSocketPacketOptions& options),
+ const AsyncSocketPacketOptions& options),
(override));
MOCK_METHOD(int,
@@ -38,7 +38,7 @@
(const void* pv,
size_t cb,
const SocketAddress& addr,
- const webrtc::AsyncSocketPacketOptions& options),
+ const AsyncSocketPacketOptions& options),
(override));
MOCK_METHOD(int, Close, (), (override));
MOCK_METHOD(State, GetState, (), (const, override));
@@ -52,8 +52,7 @@
TEST(AsyncPacketSocket, RegisteredCallbackReceivePacketsFromNotify) {
MockAsyncPacketSocket mock_socket;
- MockFunction<void(webrtc::AsyncPacketSocket*,
- const webrtc::ReceivedIpPacket&)>
+ MockFunction<void(AsyncPacketSocket*, const ReceivedIpPacket&)>
received_packet;
EXPECT_CALL(received_packet, Call);
diff --git a/rtc_base/async_tcp_socket.cc b/rtc_base/async_tcp_socket.cc
index 420d359..e07bfc1 100644
--- a/rtc_base/async_tcp_socket.cc
+++ b/rtc_base/async_tcp_socket.cc
@@ -266,7 +266,7 @@
if (!IsOutBufferEmpty())
return static_cast<int>(cb);
- PacketLength pkt_len = webrtc::HostToNetwork16(static_cast<PacketLength>(cb));
+ PacketLength pkt_len = HostToNetwork16(static_cast<PacketLength>(cb));
AppendToOutBuffer(&pkt_len, kPacketLenSize);
AppendToOutBuffer(pv, cb);
@@ -295,7 +295,7 @@
if (bytes_left < kPacketLenSize)
return processed_bytes;
- PacketLength pkt_len = webrtc::GetBE16(data.data() + processed_bytes);
+ PacketLength pkt_len = GetBE16(data.data() + processed_bytes);
if (bytes_left < kPacketLenSize + pkt_len)
return processed_bytes;
diff --git a/rtc_base/async_udp_socket.cc b/rtc_base/async_udp_socket.cc
index f084687..652c104 100644
--- a/rtc_base/async_udp_socket.cc
+++ b/rtc_base/async_udp_socket.cc
@@ -67,7 +67,7 @@
const AsyncSocketPacketOptions& options) {
SentPacketInfo sent_packet(options.packet_id, TimeMillis(),
options.info_signaled_after_sent);
- webrtc::CopySocketInformationToPacketInfo(cb, *this, &sent_packet.info);
+ CopySocketInformationToPacketInfo(cb, *this, &sent_packet.info);
int ret = socket_->Send(pv, cb);
SignalSentPacket(this, sent_packet);
return ret;
@@ -79,7 +79,7 @@
const AsyncSocketPacketOptions& options) {
SentPacketInfo sent_packet(options.packet_id, TimeMillis(),
options.info_signaled_after_sent);
- webrtc::CopySocketInformationToPacketInfo(cb, *this, &sent_packet.info);
+ CopySocketInformationToPacketInfo(cb, *this, &sent_packet.info);
if (has_set_ect1_options_ != options.ecn_1) {
// It is unclear what is most efficient, setting options on every sent
// packet or when changed. Potentially, can separate send sockets be used?
diff --git a/rtc_base/bit_buffer_unittest.cc b/rtc_base/bit_buffer_unittest.cc
index 923a3df..670275c 100644
--- a/rtc_base/bit_buffer_unittest.cc
+++ b/rtc_base/bit_buffer_unittest.cc
@@ -22,7 +22,6 @@
namespace webrtc {
using ::testing::ElementsAre;
-using ::webrtc::BitstreamReader;
TEST(BitBufferWriterTest, ConsumeBits) {
uint8_t bytes[64] = {0};
diff --git a/rtc_base/boringssl_certificate.cc b/rtc_base/boringssl_certificate.cc
index 016b4da..4a34d05 100644
--- a/rtc_base/boringssl_certificate.cc
+++ b/rtc_base/boringssl_certificate.cc
@@ -265,7 +265,7 @@
SSLIdentityParams actual_params(params);
if (actual_params.common_name.empty()) {
// Use a random string, arbitrarily 8 chars long.
- actual_params.common_name = webrtc::CreateRandomString(8);
+ actual_params.common_name = CreateRandomString(8);
}
bssl::UniquePtr<CRYPTO_BUFFER> cert_buffer =
MakeCertificate(key_pair->pkey(), actual_params);
diff --git a/rtc_base/boringssl_identity.cc b/rtc_base/boringssl_identity.cc
index 5c8f60e..4406962 100644
--- a/rtc_base/boringssl_identity.cc
+++ b/rtc_base/boringssl_identity.cc
@@ -116,9 +116,8 @@
std::unique_ptr<SSLIdentity> BoringSSLIdentity::CreateFromPEMChainStrings(
absl::string_view private_key,
absl::string_view certificate_chain) {
- bssl::UniquePtr<BIO> bio(
- BIO_new_mem_buf(certificate_chain.data(),
- webrtc::dchecked_cast<int>(certificate_chain.size())));
+ bssl::UniquePtr<BIO> bio(BIO_new_mem_buf(
+ certificate_chain.data(), dchecked_cast<int>(certificate_chain.size())));
if (!bio) {
return nullptr;
}
diff --git a/rtc_base/byte_buffer.cc b/rtc_base/byte_buffer.cc
index 0f5ea52..0cf153f 100644
--- a/rtc_base/byte_buffer.cc
+++ b/rtc_base/byte_buffer.cc
@@ -56,7 +56,7 @@
if (!ReadBytes(reinterpret_cast<uint8_t*>(&v), 2)) {
return false;
} else {
- *val = webrtc::NetworkToHost16(v);
+ *val = NetworkToHost16(v);
return true;
}
}
@@ -72,7 +72,7 @@
if (!ReadBytes(read_into, 3)) {
return false;
} else {
- *val = webrtc::NetworkToHost32(v);
+ *val = NetworkToHost32(v);
return true;
}
}
@@ -85,7 +85,7 @@
if (!ReadBytes(reinterpret_cast<uint8_t*>(&v), 4)) {
return false;
} else {
- *val = webrtc::NetworkToHost32(v);
+ *val = NetworkToHost32(v);
return true;
}
}
@@ -98,7 +98,7 @@
if (!ReadBytes(reinterpret_cast<uint8_t*>(&v), 8)) {
return false;
} else {
- *val = webrtc::NetworkToHost64(v);
+ *val = NetworkToHost64(v);
return true;
}
}
diff --git a/rtc_base/byte_buffer_unittest.cc b/rtc_base/byte_buffer_unittest.cc
index 6bf532d..d0b93e2 100644
--- a/rtc_base/byte_buffer_unittest.cc
+++ b/rtc_base/byte_buffer_unittest.cc
@@ -46,35 +46,35 @@
uint32_t n32 = 1;
uint64_t n64 = 1;
- EXPECT_EQ(n16, webrtc::NetworkToHost16(webrtc::HostToNetwork16(n16)));
- EXPECT_EQ(n32, webrtc::NetworkToHost32(webrtc::HostToNetwork32(n32)));
- EXPECT_EQ(n64, webrtc::NetworkToHost64(webrtc::HostToNetwork64(n64)));
+ EXPECT_EQ(n16, NetworkToHost16(HostToNetwork16(n16)));
+ EXPECT_EQ(n32, NetworkToHost32(HostToNetwork32(n32)));
+ EXPECT_EQ(n64, NetworkToHost64(HostToNetwork64(n64)));
- if (webrtc::IsHostBigEndian()) {
+ if (IsHostBigEndian()) {
// The host is the network (big) endian.
- EXPECT_EQ(n16, webrtc::HostToNetwork16(n16));
- EXPECT_EQ(n32, webrtc::HostToNetwork32(n32));
- EXPECT_EQ(n64, webrtc::HostToNetwork64(n64));
+ EXPECT_EQ(n16, HostToNetwork16(n16));
+ EXPECT_EQ(n32, HostToNetwork32(n32));
+ EXPECT_EQ(n64, HostToNetwork64(n64));
// GetBE converts big endian to little endian here.
- EXPECT_EQ(n16 >> 8, webrtc::GetBE16(&n16));
- EXPECT_EQ(n32 >> 24, webrtc::GetBE32(&n32));
- EXPECT_EQ(n64 >> 56, webrtc::GetBE64(&n64));
+ EXPECT_EQ(n16 >> 8, GetBE16(&n16));
+ EXPECT_EQ(n32 >> 24, GetBE32(&n32));
+ EXPECT_EQ(n64 >> 56, GetBE64(&n64));
} else {
// The host is little endian.
- EXPECT_NE(n16, webrtc::HostToNetwork16(n16));
- EXPECT_NE(n32, webrtc::HostToNetwork32(n32));
- EXPECT_NE(n64, webrtc::HostToNetwork64(n64));
+ EXPECT_NE(n16, HostToNetwork16(n16));
+ EXPECT_NE(n32, HostToNetwork32(n32));
+ EXPECT_NE(n64, HostToNetwork64(n64));
// GetBE converts little endian to big endian here.
- EXPECT_EQ(webrtc::GetBE16(&n16), webrtc::HostToNetwork16(n16));
- EXPECT_EQ(webrtc::GetBE32(&n32), webrtc::HostToNetwork32(n32));
- EXPECT_EQ(webrtc::GetBE64(&n64), webrtc::HostToNetwork64(n64));
+ EXPECT_EQ(GetBE16(&n16), HostToNetwork16(n16));
+ EXPECT_EQ(GetBE32(&n32), HostToNetwork32(n32));
+ EXPECT_EQ(GetBE64(&n64), HostToNetwork64(n64));
// GetBE converts little endian to big endian here.
- EXPECT_EQ(n16 << 8, webrtc::GetBE16(&n16));
- EXPECT_EQ(n32 << 24, webrtc::GetBE32(&n32));
- EXPECT_EQ(n64 << 56, webrtc::GetBE64(&n64));
+ EXPECT_EQ(n16 << 8, GetBE16(&n16));
+ EXPECT_EQ(n32 << 24, GetBE32(&n32));
+ EXPECT_EQ(n64 << 56, GetBE64(&n64));
}
}
diff --git a/rtc_base/containers/flat_set_unittest.cc b/rtc_base/containers/flat_set_unittest.cc
index 22c051a..6b0a2f7 100644
--- a/rtc_base/containers/flat_set_unittest.cc
+++ b/rtc_base/containers/flat_set_unittest.cc
@@ -99,7 +99,7 @@
}
TEST(FlatSet, UsingTransparentCompare) {
- using ExplicitInt = webrtc::MoveOnlyInt;
+ using ExplicitInt = MoveOnlyInt;
flat_set<ExplicitInt> s;
const auto& s1 = s;
int x = 0;
diff --git a/rtc_base/cpu_time.cc b/rtc_base/cpu_time.cc
index b0d187c..0ae8906 100644
--- a/rtc_base/cpu_time.cc
+++ b/rtc_base/cpu_time.cc
@@ -58,7 +58,7 @@
#elif defined(WEBRTC_LINUX)
struct timespec ts;
if (clock_gettime(CLOCK_PROCESS_CPUTIME_ID, &ts) == 0) {
- return ts.tv_sec * webrtc::kNumNanosecsPerSec + ts.tv_nsec;
+ return ts.tv_sec * kNumNanosecsPerSec + ts.tv_nsec;
} else {
RTC_LOG_ERR(LS_ERROR) << "clock_gettime() failed.";
}
@@ -106,7 +106,7 @@
#elif defined(WEBRTC_LINUX)
struct timespec ts;
if (clock_gettime(CLOCK_THREAD_CPUTIME_ID, &ts) == 0) {
- return ts.tv_sec * webrtc::kNumNanosecsPerSec + ts.tv_nsec;
+ return ts.tv_sec * kNumNanosecsPerSec + ts.tv_nsec;
} else {
RTC_LOG_ERR(LS_ERROR) << "clock_gettime() failed.";
}
diff --git a/rtc_base/cpu_time_unittest.cc b/rtc_base/cpu_time_unittest.cc
index fbdd5fa..9d2f4ad 100644
--- a/rtc_base/cpu_time_unittest.cc
+++ b/rtc_base/cpu_time_unittest.cc
@@ -80,25 +80,25 @@
// Therefore GetThreadCpuTime is not a wall clock.
EXPECT_LE(thread_duration_nanos,
(kProcessingTimeMillisecs - kAllowedErrorMillisecs) *
- webrtc::kNumNanosecsPerMillisec);
+ kNumNanosecsPerMillisec);
// Total process time is at least twice working threads' CPU time.
// Therefore process and thread times are correctly related.
EXPECT_GE(process_duration_nanos,
kWorkingThreads *
(kProcessingTimeMillisecs - kAllowedErrorMillisecs) *
- webrtc::kNumNanosecsPerMillisec);
+ kNumNanosecsPerMillisec);
}
TEST(CpuTimeTest, MAYBE_TEST(Sleeping)) {
int64_t process_start_time_nanos = GetProcessCpuTimeNanos();
- webrtc::SleepMs(kProcessingTimeMillisecs);
+ SleepMs(kProcessingTimeMillisecs);
int64_t process_duration_nanos =
GetProcessCpuTimeNanos() - process_start_time_nanos;
// Sleeping should not introduce any additional CPU time.
// Therefore GetProcessCpuTime is not a wall clock.
EXPECT_LE(process_duration_nanos,
(kProcessingTimeMillisecs - kAllowedErrorMillisecs) *
- webrtc::kNumNanosecsPerMillisec);
+ kNumNanosecsPerMillisec);
}
} // namespace webrtc
diff --git a/rtc_base/event.cc b/rtc_base/event.cc
index b78e249..7338670 100644
--- a/rtc_base/event.cc
+++ b/rtc_base/event.cc
@@ -30,8 +30,6 @@
namespace webrtc {
-using ::webrtc::TimeDelta;
-
Event::Event() : Event(false, false) {}
#if defined(WEBRTC_WIN)
@@ -189,7 +187,7 @@
} else {
error = wait(warn_ts);
if (error == ETIMEDOUT) {
- webrtc::WarnThatTheCurrentThreadIsProbablyDeadlocked();
+ WarnThatTheCurrentThreadIsProbablyDeadlocked();
error = wait(give_up_ts);
}
}
diff --git a/rtc_base/file_rotating_stream_unittest.cc b/rtc_base/file_rotating_stream_unittest.cc
index 1422fd1..4ee54dc 100644
--- a/rtc_base/file_rotating_stream_unittest.cc
+++ b/rtc_base/file_rotating_stream_unittest.cc
@@ -30,7 +30,7 @@
void CleanupLogDirectory(const FileRotatingStream& stream) {
for (size_t i = 0; i < stream.GetNumFiles(); ++i) {
// Ignore return value, not all files are expected to exist.
- webrtc::test::RemoveFile(stream.GetFilePath(i));
+ test::RemoveFile(stream.GetFilePath(i));
}
}
@@ -53,14 +53,14 @@
size_t max_file_size,
size_t num_log_files,
bool ensure_trailing_delimiter = true) {
- dir_path_ = webrtc::test::OutputPath();
+ dir_path_ = test::OutputPath();
// Append per-test output path in order to run within gtest parallel.
dir_path_.append(dir_name.begin(), dir_name.end());
if (ensure_trailing_delimiter) {
- dir_path_.append(std::string(webrtc::test::kPathDelimiter));
+ dir_path_.append(std::string(test::kPathDelimiter));
}
- ASSERT_TRUE(webrtc::test::CreateDir(dir_path_));
+ ASSERT_TRUE(test::CreateDir(dir_path_));
stream_.reset(new FileRotatingStream(dir_path_, file_prefix, max_file_size,
num_log_files));
}
@@ -69,7 +69,7 @@
// On windows, open files can't be removed.
stream_->Close();
CleanupLogDirectory(*stream_);
- EXPECT_TRUE(webrtc::test::RemoveDir(dir_path_));
+ EXPECT_TRUE(test::RemoveDir(dir_path_));
stream_.reset();
}
@@ -158,12 +158,12 @@
}
// Check that exactly three files exist.
for (size_t i = 0; i < arraysize(messages); ++i) {
- EXPECT_TRUE(webrtc::test::FileExists(stream_->GetFilePath(i)));
+ EXPECT_TRUE(test::FileExists(stream_->GetFilePath(i)));
}
std::string message("d");
WriteAndFlush(message.c_str(), message.size());
for (size_t i = 0; i < arraysize(messages); ++i) {
- EXPECT_TRUE(webrtc::test::FileExists(stream_->GetFilePath(i)));
+ EXPECT_TRUE(test::FileExists(stream_->GetFilePath(i)));
}
// TODO(tkchin): Maybe check all the files in the dir.
@@ -193,8 +193,7 @@
// Reopen for read.
std::string expected_contents("bbccd");
VerifyStreamRead(expected_contents,
- dir_path_ + std::string(webrtc::test::kPathDelimiter),
- kFilePrefix);
+ dir_path_ + std::string(test::kPathDelimiter), kFilePrefix);
}
// Tests that a write operation followed by a read (without trailing delimiter)
@@ -258,12 +257,12 @@
class MAYBE_CallSessionFileRotatingStreamTest : public ::testing::Test {
protected:
void Init(absl::string_view dir_name, size_t max_total_log_size) {
- dir_path_ = webrtc::test::OutputPath();
+ dir_path_ = test::OutputPath();
// Append per-test output path in order to run within gtest parallel.
dir_path_.append(dir_name.begin(), dir_name.end());
- dir_path_.append(std::string(webrtc::test::kPathDelimiter));
- ASSERT_TRUE(webrtc::test::CreateDir(dir_path_));
+ dir_path_.append(std::string(test::kPathDelimiter));
+ ASSERT_TRUE(test::CreateDir(dir_path_));
stream_.reset(
new CallSessionFileRotatingStream(dir_path_, max_total_log_size));
}
@@ -272,7 +271,7 @@
// On windows, open files can't be removed.
stream_->Close();
CleanupLogDirectory(*stream_);
- EXPECT_TRUE(webrtc::test::RemoveDir(dir_path_));
+ EXPECT_TRUE(test::RemoveDir(dir_path_));
stream_.reset();
}
diff --git a/rtc_base/ifaddrs_converter.cc b/rtc_base/ifaddrs_converter.cc
index de949aa..8b50e3d 100644
--- a/rtc_base/ifaddrs_converter.cc
+++ b/rtc_base/ifaddrs_converter.cc
@@ -31,7 +31,7 @@
return true;
}
case AF_INET6: {
- int ip_attributes = webrtc::IPV6_ADDRESS_FLAG_NONE;
+ int ip_attributes = IPV6_ADDRESS_FLAG_NONE;
if (!ConvertNativeAttributesToIPAttributes(interface, &ip_attributes)) {
return false;
}
@@ -51,7 +51,7 @@
bool IfAddrsConverter::ConvertNativeAttributesToIPAttributes(
const struct ifaddrs* /* interface */,
int* ip_attributes) {
- *ip_attributes = webrtc::IPV6_ADDRESS_FLAG_NONE;
+ *ip_attributes = IPV6_ADDRESS_FLAG_NONE;
return true;
}
diff --git a/rtc_base/ip_address.cc b/rtc_base/ip_address.cc
index 92be158..5c349dc 100644
--- a/rtc_base/ip_address.cc
+++ b/rtc_base/ip_address.cc
@@ -46,7 +46,7 @@
uint32_t IPAddress::v4AddressAsHostOrderInteger() const {
if (family_ == AF_INET) {
- return webrtc::NetworkToHost32(u_.ip4.s_addr);
+ return NetworkToHost32(u_.ip4.s_addr);
} else {
return 0;
}
@@ -112,8 +112,8 @@
// Comparing addresses of the same family.
switch (family_) {
case AF_INET: {
- return webrtc::NetworkToHost32(u_.ip4.s_addr) <
- webrtc::NetworkToHost32(other.u_.ip4.s_addr);
+ return NetworkToHost32(u_.ip4.s_addr) <
+ NetworkToHost32(other.u_.ip4.s_addr);
}
case AF_INET6: {
return memcmp(&u_.ip6.s6_addr, &other.u_.ip6.s6_addr, 16) < 0;
@@ -371,9 +371,9 @@
return IPAddress(INADDR_ANY);
}
int mask = (0xFFFFFFFF << (32 - length));
- uint32_t host_order_ip = webrtc::NetworkToHost32(ip.ipv4_address().s_addr);
+ uint32_t host_order_ip = NetworkToHost32(ip.ipv4_address().s_addr);
in_addr masked;
- masked.s_addr = webrtc::HostToNetwork32(host_order_ip & mask);
+ masked.s_addr = HostToNetwork32(host_order_ip & mask);
return IPAddress(masked);
} else if (ip.family() == AF_INET6) {
if (length > 127) {
@@ -390,8 +390,8 @@
uint32_t* v6_as_ints = reinterpret_cast<uint32_t*>(&v6addr.s6_addr);
for (int i = 0; i < 4; ++i) {
if (i == position) {
- uint32_t host_order_inner = webrtc::NetworkToHost32(v6_as_ints[i]);
- v6_as_ints[i] = webrtc::HostToNetwork32(host_order_inner & inner_mask);
+ uint32_t host_order_inner = NetworkToHost32(v6_as_ints[i]);
+ v6_as_ints[i] = HostToNetwork32(host_order_inner & inner_mask);
} else if (i > position) {
v6_as_ints[i] = 0;
}
@@ -406,7 +406,7 @@
int bits = 0;
switch (mask.family()) {
case AF_INET: {
- word_to_count = webrtc::NetworkToHost32(mask.ipv4_address().s_addr);
+ word_to_count = NetworkToHost32(mask.ipv4_address().s_addr);
break;
}
case AF_INET6: {
@@ -420,7 +420,7 @@
}
}
if (i < 4) {
- word_to_count = webrtc::NetworkToHost32(v6_as_ints[i]);
+ word_to_count = NetworkToHost32(v6_as_ints[i]);
}
bits = (i * 32);
break;
diff --git a/rtc_base/ip_address_unittest.cc b/rtc_base/ip_address_unittest.cc
index 5f5988d..ff6a182 100644
--- a/rtc_base/ip_address_unittest.cc
+++ b/rtc_base/ip_address_unittest.cc
@@ -522,7 +522,7 @@
test_info.ai_next = &next_info;
// Check that we can get an IPv4 address out.
test_info.ai_addr = reinterpret_cast<struct sockaddr*>(&expected4);
- expected4.sin_addr.s_addr = webrtc::HostToNetwork32(kIPv4PublicAddr);
+ expected4.sin_addr.s_addr = HostToNetwork32(kIPv4PublicAddr);
expected4.sin_family = AF_INET;
IPAddress expected(kIPv4PublicAddr);
IPAddress addr;
diff --git a/rtc_base/memory/fifo_buffer.cc b/rtc_base/memory/fifo_buffer.cc
index 8c10200..4eb0dfa 100644
--- a/rtc_base/memory/fifo_buffer.cc
+++ b/rtc_base/memory/fifo_buffer.cc
@@ -24,7 +24,7 @@
namespace webrtc {
FifoBuffer::FifoBuffer(size_t size)
- : state_(webrtc::SS_OPEN),
+ : state_(SS_OPEN),
buffer_(new char[size]),
buffer_length_(size),
data_length_(0),
@@ -34,7 +34,7 @@
}
FifoBuffer::FifoBuffer(size_t size, Thread* owner)
- : state_(webrtc::SS_OPEN),
+ : state_(SS_OPEN),
buffer_(new char[size]),
buffer_length_(size),
data_length_(0),
@@ -64,7 +64,7 @@
size_t copy = 0;
StreamResult result = ReadLocked(buffer.data(), buffer.size(), ©);
- if (result == webrtc::SR_SUCCESS) {
+ if (result == SR_SUCCESS) {
// If read was successful then adjust the read position and number of
// bytes buffered.
read_position_ = (read_position_ + copy) % buffer_length_;
@@ -73,7 +73,7 @@
// if we were full before, and now we're not, post an event
if (!was_writable && copy > 0) {
- PostEvent(webrtc::SE_WRITE, 0);
+ PostEvent(SE_WRITE, 0);
}
}
return result;
@@ -88,13 +88,13 @@
size_t copy = 0;
StreamResult result = WriteLocked(buffer.data(), buffer.size(), ©);
- if (result == webrtc::SR_SUCCESS) {
+ if (result == SR_SUCCESS) {
// If write was successful then adjust the number of readable bytes.
data_length_ += copy;
bytes_written = copy;
// if we didn't have any data to read before, and now we do, post an event
if (!was_readable && copy > 0) {
- PostEvent(webrtc::SE_READ, 0);
+ PostEvent(SE_READ, 0);
}
}
return result;
@@ -102,7 +102,7 @@
void FifoBuffer::Close() {
RTC_DCHECK_RUN_ON(&callback_sequence_);
- state_ = webrtc::SS_CLOSED;
+ state_ = SS_CLOSED;
}
const void* FifoBuffer::GetReadData(size_t* size) {
@@ -120,14 +120,14 @@
read_position_ = (read_position_ + size) % buffer_length_;
data_length_ -= size;
if (!was_writable && size > 0) {
- PostEvent(webrtc::SE_WRITE, 0);
+ PostEvent(SE_WRITE, 0);
}
}
void* FifoBuffer::GetWriteBuffer(size_t* size) {
RTC_DCHECK_RUN_ON(&callback_sequence_);
- if (state_ == webrtc::SS_CLOSED) {
+ if (state_ == SS_CLOSED) {
return nullptr;
}
@@ -151,7 +151,7 @@
const bool was_readable = (data_length_ > 0);
data_length_ += size;
if (!was_readable && size > 0) {
- PostEvent(webrtc::SE_READ, 0);
+ PostEvent(SE_READ, 0);
}
}
@@ -159,7 +159,7 @@
size_t bytes,
size_t* bytes_read) {
if (data_length_ == 0) {
- return (state_ != webrtc::SS_CLOSED) ? webrtc::SR_BLOCK : webrtc::SR_EOS;
+ return (state_ != SS_CLOSED) ? SR_BLOCK : SR_EOS;
}
const size_t available = data_length_;
@@ -173,18 +173,18 @@
if (bytes_read) {
*bytes_read = copy;
}
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
}
StreamResult FifoBuffer::WriteLocked(const void* buffer,
size_t bytes,
size_t* bytes_written) {
- if (state_ == webrtc::SS_CLOSED) {
- return webrtc::SR_EOS;
+ if (state_ == SS_CLOSED) {
+ return SR_EOS;
}
if (data_length_ >= buffer_length_) {
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
}
const size_t available = buffer_length_ - data_length_;
@@ -199,7 +199,7 @@
if (bytes_written) {
*bytes_written = copy;
}
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
}
} // namespace webrtc
diff --git a/rtc_base/memory_stream.cc b/rtc_base/memory_stream.cc
index ad6793e..d0b6acb 100644
--- a/rtc_base/memory_stream.cc
+++ b/rtc_base/memory_stream.cc
@@ -23,14 +23,14 @@
namespace webrtc {
StreamState MemoryStream::GetState() const {
- return webrtc::SS_OPEN;
+ return SS_OPEN;
}
StreamResult MemoryStream::Read(ArrayView<uint8_t> buffer,
size_t& bytes_read,
int& error) {
if (seek_position_ >= data_length_) {
- return webrtc::SR_EOS;
+ return SR_EOS;
}
size_t available = data_length_ - seek_position_;
size_t bytes;
@@ -43,7 +43,7 @@
memcpy(buffer.data(), &buffer_[seek_position_], bytes);
seek_position_ += bytes;
bytes_read = bytes;
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
}
StreamResult MemoryStream::Write(ArrayView<const uint8_t> buffer,
@@ -57,7 +57,7 @@
size_t new_buffer_length = std::max(
((seek_position_ + buffer.size()) | 0xFF) + 1, buffer_length_ * 2);
StreamResult result = DoReserve(new_buffer_length, &error);
- if (webrtc::SR_SUCCESS != result) {
+ if (SR_SUCCESS != result) {
return result;
}
RTC_DCHECK(buffer_length_ >= new_buffer_length);
@@ -74,7 +74,7 @@
data_length_ = seek_position_;
}
bytes_written = bytes;
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
}
void MemoryStream::Close() {
@@ -105,7 +105,7 @@
}
bool MemoryStream::ReserveSize(size_t size) {
- return (webrtc::SR_SUCCESS == DoReserve(size, nullptr));
+ return (SR_SUCCESS == DoReserve(size, nullptr));
}
///////////////////////////////////////////////////////////////////////////////
@@ -126,7 +126,7 @@
StreamResult MemoryStream::DoReserve(size_t size, int* error) {
if (buffer_length_ >= size)
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
if (char* new_buffer = new char[size]) {
if (buffer_ != nullptr && data_length_ > 0) {
@@ -135,13 +135,13 @@
delete[] buffer_;
buffer_ = new_buffer;
buffer_length_ = size;
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
}
if (error) {
*error = ENOMEM;
}
- return webrtc::SR_ERROR;
+ return SR_ERROR;
}
} // namespace webrtc
diff --git a/rtc_base/network.cc b/rtc_base/network.cc
index cc796b7..edb78eb 100644
--- a/rtc_base/network.cc
+++ b/rtc_base/network.cc
@@ -62,10 +62,6 @@
namespace webrtc {
namespace {
-using ::webrtc::Environment;
-using ::webrtc::SafeTask;
-using ::webrtc::SocketFactory;
-using ::webrtc::TimeDelta;
// List of MAC addresses of known VPN (for windows).
constexpr uint8_t kVpns[3][6] = {
@@ -101,9 +97,8 @@
// After type, networks are sorted by IP address precedence values
// from RFC 3484-bis
- if (webrtc::IPAddressPrecedence(ip_a) != webrtc::IPAddressPrecedence(ip_b)) {
- return webrtc::IPAddressPrecedence(ip_a) >
- webrtc::IPAddressPrecedence(ip_b);
+ if (IPAddressPrecedence(ip_a) != IPAddressPrecedence(ip_b)) {
+ return IPAddressPrecedence(ip_a) > IPAddressPrecedence(ip_b);
}
// TODO(mallinath) - Add VPN and Link speed conditions while sorting.
@@ -118,37 +113,32 @@
bool add_network_cost_to_vpn) {
// TODO(jonaso) : Rollout support for cellular network cost using A/B
// experiment to make sure it does not introduce regressions.
- int vpnCost =
- (is_vpn && add_network_cost_to_vpn) ? webrtc::kNetworkCostVpn : 0;
+ int vpnCost = (is_vpn && add_network_cost_to_vpn) ? kNetworkCostVpn : 0;
switch (type) {
- case webrtc::ADAPTER_TYPE_ETHERNET:
- case webrtc::ADAPTER_TYPE_LOOPBACK:
- return webrtc::kNetworkCostMin + vpnCost;
- case webrtc::ADAPTER_TYPE_WIFI:
- return webrtc::kNetworkCostLow + vpnCost;
- case webrtc::ADAPTER_TYPE_CELLULAR:
- return webrtc::kNetworkCostCellular + vpnCost;
- case webrtc::ADAPTER_TYPE_CELLULAR_2G:
- return (use_differentiated_cellular_costs
- ? webrtc::kNetworkCostCellular2G
- : webrtc::kNetworkCostCellular) +
+ case ADAPTER_TYPE_ETHERNET:
+ case ADAPTER_TYPE_LOOPBACK:
+ return kNetworkCostMin + vpnCost;
+ case ADAPTER_TYPE_WIFI:
+ return kNetworkCostLow + vpnCost;
+ case ADAPTER_TYPE_CELLULAR:
+ return kNetworkCostCellular + vpnCost;
+ case ADAPTER_TYPE_CELLULAR_2G:
+ return (use_differentiated_cellular_costs ? kNetworkCostCellular2G
+ : kNetworkCostCellular) +
vpnCost;
- case webrtc::ADAPTER_TYPE_CELLULAR_3G:
- return (use_differentiated_cellular_costs
- ? webrtc::kNetworkCostCellular3G
- : webrtc::kNetworkCostCellular) +
+ case ADAPTER_TYPE_CELLULAR_3G:
+ return (use_differentiated_cellular_costs ? kNetworkCostCellular3G
+ : kNetworkCostCellular) +
vpnCost;
- case webrtc::ADAPTER_TYPE_CELLULAR_4G:
- return (use_differentiated_cellular_costs
- ? webrtc::kNetworkCostCellular4G
- : webrtc::kNetworkCostCellular) +
+ case ADAPTER_TYPE_CELLULAR_4G:
+ return (use_differentiated_cellular_costs ? kNetworkCostCellular4G
+ : kNetworkCostCellular) +
vpnCost;
- case webrtc::ADAPTER_TYPE_CELLULAR_5G:
- return (use_differentiated_cellular_costs
- ? webrtc::kNetworkCostCellular5G
- : webrtc::kNetworkCostCellular) +
+ case ADAPTER_TYPE_CELLULAR_5G:
+ return (use_differentiated_cellular_costs ? kNetworkCostCellular5G
+ : kNetworkCostCellular) +
vpnCost;
- case webrtc::ADAPTER_TYPE_ANY:
+ case ADAPTER_TYPE_ANY:
// Candidates gathered from the any-address/wildcard ports, as backups,
// are given the maximum cost so that if there are other candidates with
// known interface types, we would not select candidate pairs using these
@@ -158,13 +148,13 @@
// ADAPTER_TYPE_CELLULAR would then have a higher cost. See
// P2PTransportChannel::SortConnectionsAndUpdateState for how we rank and
// select candidate pairs, where the network cost is among the criteria.
- return webrtc::kNetworkCostMax + vpnCost;
- case webrtc::ADAPTER_TYPE_VPN:
+ return kNetworkCostMax + vpnCost;
+ case ADAPTER_TYPE_VPN:
// The cost of a VPN should be computed using its underlying network type.
RTC_DCHECK_NOTREACHED();
- return webrtc::kNetworkCostUnknown;
+ return kNetworkCostUnknown;
default:
- return webrtc::kNetworkCostUnknown + vpnCost;
+ return kNetworkCostUnknown + vpnCost;
}
}
@@ -177,19 +167,19 @@
// Link-local addresses require scope id to be bound successfully.
// However, our IPAddress structure doesn't carry that so the
// information is lost and causes binding failure.
- if (webrtc::IPIsLinkLocal(ip)) {
+ if (IPIsLinkLocal(ip)) {
RTC_LOG(LS_VERBOSE) << "Ignore link local IP:" << ip.ToSensitiveString();
return true;
}
// Any MAC based IPv6 should be avoided to prevent the MAC tracking.
- if (webrtc::IPIsMacBased(ip) && !allow_mac_based_ipv6) {
+ if (IPIsMacBased(ip) && !allow_mac_based_ipv6) {
RTC_LOG(LS_INFO) << "Ignore Mac based IP:" << ip.ToSensitiveString();
return true;
}
// Ignore deprecated IPv6.
- if (ip.ipv6_flags() & webrtc::IPV6_ADDRESS_FLAG_DEPRECATED) {
+ if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED) {
RTC_LOG(LS_INFO) << "Ignore deprecated IP:" << ip.ToSensitiveString();
return true;
}
@@ -275,23 +265,23 @@
// Note that we have a more robust way to determine if a network interface
// is a loopback interface by checking the flag IFF_LOOPBACK in ifa_flags of
// an ifaddr struct. See ConvertIfAddrs in this file.
- return webrtc::ADAPTER_TYPE_LOOPBACK;
+ return ADAPTER_TYPE_LOOPBACK;
}
if (MatchTypeNameWithIndexPattern(network_name, "eth")) {
- return webrtc::ADAPTER_TYPE_ETHERNET;
+ return ADAPTER_TYPE_ETHERNET;
}
if (MatchTypeNameWithIndexPattern(network_name, "wlan") ||
MatchTypeNameWithIndexPattern(network_name, "v4-wlan")) {
- return webrtc::ADAPTER_TYPE_WIFI;
+ return ADAPTER_TYPE_WIFI;
}
if (MatchTypeNameWithIndexPattern(network_name, "ipsec") ||
MatchTypeNameWithIndexPattern(network_name, "tun") ||
MatchTypeNameWithIndexPattern(network_name, "utun") ||
MatchTypeNameWithIndexPattern(network_name, "tap")) {
- return webrtc::ADAPTER_TYPE_VPN;
+ return ADAPTER_TYPE_VPN;
}
#if defined(WEBRTC_IOS)
// Cell networks are pdp_ipN on iOS.
@@ -316,7 +306,7 @@
}
#endif
- return webrtc::ADAPTER_TYPE_UNKNOWN;
+ return ADAPTER_TYPE_UNKNOWN;
}
NetworkManager::EnumerationPermission NetworkManager::enumeration_permission()
@@ -355,8 +345,8 @@
std::vector<const Network*> networks;
if (!ipv4_any_address_network_) {
const IPAddress ipv4_any_address(INADDR_ANY);
- ipv4_any_address_network_ = CreateNetwork("any", "any", ipv4_any_address, 0,
- webrtc::ADAPTER_TYPE_ANY);
+ ipv4_any_address_network_ =
+ CreateNetwork("any", "any", ipv4_any_address, 0, ADAPTER_TYPE_ANY);
ipv4_any_address_network_->set_default_local_address_provider(this);
ipv4_any_address_network_->set_mdns_responder_provider(this);
ipv4_any_address_network_->AddIP(ipv4_any_address);
@@ -365,8 +355,8 @@
if (!ipv6_any_address_network_) {
const IPAddress ipv6_any_address(in6addr_any);
- ipv6_any_address_network_ = CreateNetwork("any", "any", ipv6_any_address, 0,
- webrtc::ADAPTER_TYPE_ANY);
+ ipv6_any_address_network_ =
+ CreateNetwork("any", "any", ipv6_any_address, 0, ADAPTER_TYPE_ANY);
ipv6_any_address_network_->set_default_local_address_provider(this);
ipv6_any_address_network_->set_mdns_responder_provider(this);
ipv6_any_address_network_->AddIP(ipv6_any_address);
@@ -446,7 +436,7 @@
Network* existing_net = existing->second.get();
*changed = existing_net->SetIPs(kv.second.ips, *changed);
merged_list.push_back(existing_net);
- if (net->type() != webrtc::ADAPTER_TYPE_UNKNOWN &&
+ if (net->type() != ADAPTER_TYPE_UNKNOWN &&
net->type() != existing_net->type()) {
if (ShouldAdapterChangeTriggerNetworkChange(existing_net->type(),
net->type())) {
@@ -599,8 +589,8 @@
struct ifaddrs* cursor) const {
if (cursor->ifa_flags & IFF_LOOPBACK) {
return {
- .adapter_type = webrtc::ADAPTER_TYPE_LOOPBACK,
- .underlying_type_for_vpn = webrtc::ADAPTER_TYPE_UNKNOWN,
+ .adapter_type = ADAPTER_TYPE_LOOPBACK,
+ .underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN,
.network_preference = NetworkPreference::NEUTRAL,
.available = true,
};
@@ -608,7 +598,7 @@
return network_monitor_->GetInterfaceInfo(cursor->ifa_name);
} else {
return {.adapter_type = GetAdapterTypeFromName(cursor->ifa_name),
- .underlying_type_for_vpn = webrtc::ADAPTER_TYPE_UNKNOWN,
+ .underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN,
.network_preference = NetworkPreference::NEUTRAL,
.available = true};
}
@@ -658,8 +648,8 @@
reinterpret_cast<sockaddr_in6*>(cursor->ifa_addr)->sin6_scope_id;
}
- int prefix_length = webrtc::CountIPMaskBits(mask);
- prefix = webrtc::TruncateIP(ip, prefix_length);
+ int prefix_length = CountIPMaskBits(mask);
+ prefix = TruncateIP(ip, prefix_length);
std::string key =
MakeNetworkKey(std::string(cursor->ifa_name), prefix, prefix_length);
@@ -694,10 +684,10 @@
NetworkMonitorInterface::InterfaceInfo if_info = GetInterfaceInfo(cursor);
// Check manually configured VPN override.
- if (if_info.adapter_type != webrtc::ADAPTER_TYPE_VPN &&
+ if (if_info.adapter_type != ADAPTER_TYPE_VPN &&
IsConfiguredVpn(prefix, prefix_length)) {
if_info.underlying_type_for_vpn = if_info.adapter_type;
- if_info.adapter_type = webrtc::ADAPTER_TYPE_VPN;
+ if_info.adapter_type = ADAPTER_TYPE_VPN;
}
auto network = CreateNetwork(cursor->ifa_name, cursor->ifa_name, prefix,
@@ -1177,32 +1167,32 @@
for (const InterfaceAddress& ip : ips_) {
// Ignore any address which has been deprecated already.
- if (ip.ipv6_flags() & webrtc::IPV6_ADDRESS_FLAG_DEPRECATED)
+ if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_DEPRECATED)
continue;
- if (webrtc::IPIsLinkLocal(ip)) {
+ if (IPIsLinkLocal(ip)) {
link_local_ip = ip;
continue;
}
// ULA address should only be returned when we have no other
// global IP.
- if (webrtc::IPIsULA(static_cast<const IPAddress&>(ip))) {
+ if (IPIsULA(static_cast<const IPAddress&>(ip))) {
ula_ip = ip;
continue;
}
selected_ip = ip;
// Search could stop once a temporary non-deprecated one is found.
- if (ip.ipv6_flags() & webrtc::IPV6_ADDRESS_FLAG_TEMPORARY)
+ if (ip.ipv6_flags() & IPV6_ADDRESS_FLAG_TEMPORARY)
break;
}
- if (webrtc::IPIsUnspec(selected_ip)) {
- if (!webrtc::IPIsUnspec(link_local_ip)) {
+ if (IPIsUnspec(selected_ip)) {
+ if (!IPIsUnspec(link_local_ip)) {
// No proper global IPv6 address found, use link local address instead.
selected_ip = link_local_ip;
- } else if (!webrtc::IPIsUnspec(ula_ip)) {
+ } else if (!IPIsUnspec(ula_ip)) {
// No proper global and link local address found, use ULA instead.
selected_ip = ula_ip;
}
@@ -1233,45 +1223,45 @@
std::pair<AdapterType, bool /* vpn */> Network::GuessAdapterFromNetworkCost(
int network_cost) {
switch (network_cost) {
- case webrtc::kNetworkCostMin:
- return {webrtc::ADAPTER_TYPE_ETHERNET, false};
- case webrtc::kNetworkCostMin + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_ETHERNET, true};
- case webrtc::kNetworkCostLow:
- return {webrtc::ADAPTER_TYPE_WIFI, false};
- case webrtc::kNetworkCostLow + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_WIFI, true};
- case webrtc::kNetworkCostCellular:
- return {webrtc::ADAPTER_TYPE_CELLULAR, false};
- case webrtc::kNetworkCostCellular + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_CELLULAR, true};
- case webrtc::kNetworkCostCellular2G:
- return {webrtc::ADAPTER_TYPE_CELLULAR_2G, false};
- case webrtc::kNetworkCostCellular2G + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_CELLULAR_2G, true};
- case webrtc::kNetworkCostCellular3G:
- return {webrtc::ADAPTER_TYPE_CELLULAR_3G, false};
- case webrtc::kNetworkCostCellular3G + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_CELLULAR_3G, true};
- case webrtc::kNetworkCostCellular4G:
- return {webrtc::ADAPTER_TYPE_CELLULAR_4G, false};
- case webrtc::kNetworkCostCellular4G + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_CELLULAR_4G, true};
- case webrtc::kNetworkCostCellular5G:
- return {webrtc::ADAPTER_TYPE_CELLULAR_5G, false};
- case webrtc::kNetworkCostCellular5G + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_CELLULAR_5G, true};
- case webrtc::kNetworkCostUnknown:
- return {webrtc::ADAPTER_TYPE_UNKNOWN, false};
- case webrtc::kNetworkCostUnknown + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_UNKNOWN, true};
- case webrtc::kNetworkCostMax:
- return {webrtc::ADAPTER_TYPE_ANY, false};
- case webrtc::kNetworkCostMax + webrtc::kNetworkCostVpn:
- return {webrtc::ADAPTER_TYPE_ANY, true};
+ case kNetworkCostMin:
+ return {ADAPTER_TYPE_ETHERNET, false};
+ case kNetworkCostMin + kNetworkCostVpn:
+ return {ADAPTER_TYPE_ETHERNET, true};
+ case kNetworkCostLow:
+ return {ADAPTER_TYPE_WIFI, false};
+ case kNetworkCostLow + kNetworkCostVpn:
+ return {ADAPTER_TYPE_WIFI, true};
+ case kNetworkCostCellular:
+ return {ADAPTER_TYPE_CELLULAR, false};
+ case kNetworkCostCellular + kNetworkCostVpn:
+ return {ADAPTER_TYPE_CELLULAR, true};
+ case kNetworkCostCellular2G:
+ return {ADAPTER_TYPE_CELLULAR_2G, false};
+ case kNetworkCostCellular2G + kNetworkCostVpn:
+ return {ADAPTER_TYPE_CELLULAR_2G, true};
+ case kNetworkCostCellular3G:
+ return {ADAPTER_TYPE_CELLULAR_3G, false};
+ case kNetworkCostCellular3G + kNetworkCostVpn:
+ return {ADAPTER_TYPE_CELLULAR_3G, true};
+ case kNetworkCostCellular4G:
+ return {ADAPTER_TYPE_CELLULAR_4G, false};
+ case kNetworkCostCellular4G + kNetworkCostVpn:
+ return {ADAPTER_TYPE_CELLULAR_4G, true};
+ case kNetworkCostCellular5G:
+ return {ADAPTER_TYPE_CELLULAR_5G, false};
+ case kNetworkCostCellular5G + kNetworkCostVpn:
+ return {ADAPTER_TYPE_CELLULAR_5G, true};
+ case kNetworkCostUnknown:
+ return {ADAPTER_TYPE_UNKNOWN, false};
+ case kNetworkCostUnknown + kNetworkCostVpn:
+ return {ADAPTER_TYPE_UNKNOWN, true};
+ case kNetworkCostMax:
+ return {ADAPTER_TYPE_ANY, false};
+ case kNetworkCostMax + kNetworkCostVpn:
+ return {ADAPTER_TYPE_ANY, true};
}
RTC_LOG(LS_VERBOSE) << "Unknown network cost: " << network_cost;
- return {webrtc::ADAPTER_TYPE_UNKNOWN, false};
+ return {ADAPTER_TYPE_UNKNOWN, false};
}
std::string Network::ToString() const {
@@ -1280,9 +1270,9 @@
// the IP address.
ss << "Net[" << description_.substr(0, description_.find(' ')) << ":"
<< prefix_.ToSensitiveString() << "/" << prefix_length_ << ":"
- << webrtc::AdapterTypeToString(type_);
+ << AdapterTypeToString(type_);
if (IsVpn()) {
- ss << "/" << webrtc::AdapterTypeToString(underlying_type_for_vpn_);
+ ss << "/" << AdapterTypeToString(underlying_type_for_vpn_);
}
ss << ":id=" << id_ << "]";
return ss.Release();
@@ -1301,7 +1291,7 @@
RTC_DCHECK_RUN_ON(thread_);
for (const auto& vpn : vpn_) {
if (prefix_length >= vpn.prefix_length()) {
- auto copy = webrtc::TruncateIP(prefix, vpn.prefix_length());
+ auto copy = TruncateIP(prefix, vpn.prefix_length());
if (copy == vpn.address()) {
return true;
}
diff --git a/rtc_base/network_unittest.cc b/rtc_base/network_unittest.cc
index 02c6ee0..35795ed 100644
--- a/rtc_base/network_unittest.cc
+++ b/rtc_base/network_unittest.cc
@@ -79,7 +79,7 @@
IPAddress IPFromString(absl::string_view str) {
IPAddress ip;
- RTC_CHECK(webrtc::IPFromString(str, &ip));
+ RTC_CHECK(IPFromString(str, &ip));
return ip;
}
@@ -90,13 +90,13 @@
bool started() { return started_; }
InterfaceInfo GetInterfaceInfo(absl::string_view if_name) override {
InterfaceInfo if_info = {
- .adapter_type = webrtc::ADAPTER_TYPE_UNKNOWN,
+ .adapter_type = ADAPTER_TYPE_UNKNOWN,
.available = absl::c_count(unavailable_adapters_, if_name) == 0,
};
if (absl::StartsWith(if_name, "wifi")) {
- if_info.adapter_type = webrtc::ADAPTER_TYPE_WIFI;
+ if_info.adapter_type = ADAPTER_TYPE_WIFI;
} else if (absl::StartsWith(if_name, "cellular")) {
- if_info.adapter_type = webrtc::ADAPTER_TYPE_CELLULAR;
+ if_info.adapter_type = ADAPTER_TYPE_CELLULAR;
}
return if_info;
}
@@ -247,7 +247,7 @@
ipv6_addr->sin6_family = AF_INET6;
ipv6_addr->sin6_scope_id = scope_id;
IPAddress ip;
- webrtc::IPFromString(ip_string, &ip);
+ IPFromString(ip_string, &ip);
ipv6_addr->sin6_addr = ip.ipv6_address();
return ipv6_addr;
}
@@ -290,7 +290,7 @@
memset(ipv4_addr, 0, sizeof(struct sockaddr_in));
ipv4_addr->sin_family = AF_INET;
IPAddress ip;
- webrtc::IPFromString(ip_string, &ip);
+ IPFromString(ip_string, &ip);
ipv4_addr->sin_addr = ip.ipv4_address();
return ipv4_addr;
}
@@ -365,11 +365,9 @@
TEST_F(NetworkTest, TestIsIgnoredNetworkIgnoresIPsStartingWith0) {
Network ipv4_network1("test_eth0", "Test Network Adapter 1",
- IPAddress(0x12345600U), 24,
- webrtc::ADAPTER_TYPE_ETHERNET);
+ IPAddress(0x12345600U), 24, ADAPTER_TYPE_ETHERNET);
Network ipv4_network2("test_eth1", "Test Network Adapter 2",
- IPAddress(0x010000U), 24,
- webrtc::ADAPTER_TYPE_ETHERNET);
+ IPAddress(0x010000U), 24, ADAPTER_TYPE_ETHERNET);
PhysicalSocketServer socket_server;
BasicNetworkManager network_manager(CreateEnvironment(), &socket_server);
network_manager.StartUpdating();
@@ -553,25 +551,24 @@
void SetupNetworks(std::vector<std::unique_ptr<Network>>* list) {
IPAddress ip;
IPAddress prefix;
- EXPECT_TRUE(webrtc::IPFromString("abcd::1234:5678:abcd:ef12", &ip));
- EXPECT_TRUE(webrtc::IPFromString("abcd::", &prefix));
+ EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:ef12", &ip));
+ EXPECT_TRUE(IPFromString("abcd::", &prefix));
// First, fake link-locals.
Network ipv6_eth0_linklocalnetwork("test_eth0", "Test NetworkAdapter 1",
prefix, 64);
ipv6_eth0_linklocalnetwork.AddIP(ip);
- EXPECT_TRUE(webrtc::IPFromString("abcd::5678:abcd:ef12:3456", &ip));
+ EXPECT_TRUE(IPFromString("abcd::5678:abcd:ef12:3456", &ip));
Network ipv6_eth1_linklocalnetwork("test_eth1", "Test NetworkAdapter 2",
prefix, 64);
ipv6_eth1_linklocalnetwork.AddIP(ip);
// Public networks:
- EXPECT_TRUE(webrtc::IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip));
- prefix = webrtc::TruncateIP(ip, 64);
+ EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ip));
+ prefix = TruncateIP(ip, 64);
Network ipv6_eth0_publicnetwork1_ip1("test_eth0", "Test NetworkAdapter 1",
prefix, 64);
ipv6_eth0_publicnetwork1_ip1.AddIP(ip);
- EXPECT_TRUE(
- webrtc::IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
- prefix = webrtc::TruncateIP(ip, 64);
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
+ prefix = TruncateIP(ip, 64);
Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 1",
prefix, 64);
ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
@@ -644,16 +641,15 @@
SetupNetworks(&original_list);
// Make a network that we're going to change.
IPAddress ip;
- EXPECT_TRUE(webrtc::IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip));
- IPAddress prefix = webrtc::TruncateIP(ip, 64);
+ EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:faa:fee:faa", &ip));
+ IPAddress prefix = TruncateIP(ip, 64);
std::unique_ptr<Network> network_to_change = std::make_unique<Network>(
"test_eth0", "Test Network Adapter 1", prefix, 64);
std::unique_ptr<Network> changed_network =
std::make_unique<Network>(*network_to_change);
network_to_change->AddIP(ip);
IPAddress changed_ip;
- EXPECT_TRUE(
- webrtc::IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip));
+ EXPECT_TRUE(IPFromString("2401:fa01:4:1000:be30:f00:f00:f00", &changed_ip));
changed_network->AddIP(changed_ip);
const Network* const network_to_change_ptr = network_to_change.get();
original_list.push_back(std::move(network_to_change));
@@ -688,13 +684,12 @@
IPAddress check_ip;
IPAddress prefix;
// Add a second IP to the public network on eth0 (2401:fa00:4:1000/64).
- EXPECT_TRUE(webrtc::IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip));
- prefix = webrtc::TruncateIP(ip, 64);
+ EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c6", &ip));
+ prefix = TruncateIP(ip, 64);
Network ipv6_eth0_publicnetwork1_ip2("test_eth0", "Test NetworkAdapter 1",
prefix, 64);
// This is the IP that already existed in the public network on eth0.
- EXPECT_TRUE(
- webrtc::IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip));
+ EXPECT_TRUE(IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &check_ip));
ipv6_eth0_publicnetwork1_ip2.AddIP(ip);
std::vector<std::unique_ptr<Network>> second_list;
@@ -741,8 +736,8 @@
IPAddress ip;
IPAddress prefix;
// A second network for eth0.
- EXPECT_TRUE(webrtc::IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip));
- prefix = webrtc::TruncateIP(ip, 64);
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:5bff:fee5:c3", &ip));
+ prefix = TruncateIP(ip, 64);
Network ipv6_eth0_publicnetwork2_ip1("test_eth0", "Test NetworkAdapter 1",
prefix, 64);
ipv6_eth0_publicnetwork2_ip1.AddIP(ip);
@@ -806,9 +801,8 @@
IPAddress ip;
IPAddress prefix;
- EXPECT_TRUE(
- webrtc::IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
- prefix = webrtc::TruncateIP(ip, 64);
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:abcd:efab:cdef", &ip));
+ prefix = TruncateIP(ip, 64);
Network ipv6_eth1_publicnetwork1_ip1("test_eth1", "Test NetworkAdapter 2",
prefix, 64);
ipv6_eth1_publicnetwork1_ip1.AddIP(ip);
@@ -854,20 +848,20 @@
TEST_F(NetworkTest, TestNetworkAdapterTypes) {
Network wifi("wlan0", "Wireless Adapter", IPAddress(0x12345600U), 24,
- webrtc::ADAPTER_TYPE_WIFI);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_WIFI, wifi.type());
+ ADAPTER_TYPE_WIFI);
+ EXPECT_EQ(ADAPTER_TYPE_WIFI, wifi.type());
Network ethernet("eth0", "Ethernet", IPAddress(0x12345600U), 24,
- webrtc::ADAPTER_TYPE_ETHERNET);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_ETHERNET, ethernet.type());
+ ADAPTER_TYPE_ETHERNET);
+ EXPECT_EQ(ADAPTER_TYPE_ETHERNET, ethernet.type());
Network cellular("test_cell", "Cellular Adapter", IPAddress(0x12345600U), 24,
- webrtc::ADAPTER_TYPE_CELLULAR);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_CELLULAR, cellular.type());
+ ADAPTER_TYPE_CELLULAR);
+ EXPECT_EQ(ADAPTER_TYPE_CELLULAR, cellular.type());
Network vpn("bridge_test", "VPN Adapter", IPAddress(0x12345600U), 24,
- webrtc::ADAPTER_TYPE_VPN);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_VPN, vpn.type());
+ ADAPTER_TYPE_VPN);
+ EXPECT_EQ(ADAPTER_TYPE_VPN, vpn.type());
Network unknown("test", "Test Adapter", IPAddress(0x12345600U), 24,
- webrtc::ADAPTER_TYPE_UNKNOWN);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_UNKNOWN, unknown.type());
+ ADAPTER_TYPE_UNKNOWN);
+ EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, unknown.type());
}
#if defined(WEBRTC_POSIX)
@@ -953,8 +947,7 @@
// A network created without a network monitor will get UNKNOWN type.
ifaddrs* addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
manager_without_monitor);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_UNKNOWN,
- GetAdapterType(manager_without_monitor));
+ EXPECT_EQ(ADAPTER_TYPE_UNKNOWN, GetAdapterType(manager_without_monitor));
ReleaseIfAddrs(addr_list);
// With the fake network monitor the type should be correctly determined.
@@ -965,7 +958,7 @@
// detected by the network monitor now.
addr_list = InstallIpv6Network(if_name, ipv6_address, ipv6_mask,
manager_with_monitor);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor));
+ EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager_with_monitor));
ReleaseIfAddrs(addr_list);
}
@@ -986,25 +979,25 @@
char if_name[20] = "ipsec11";
ifaddrs* addr_list =
InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_VPN, GetAdapterType(manager));
+ EXPECT_EQ(ADAPTER_TYPE_VPN, GetAdapterType(manager));
ClearNetworks(manager);
ReleaseIfAddrs(addr_list);
strcpy(if_name, "lo0");
addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager));
+ EXPECT_EQ(ADAPTER_TYPE_LOOPBACK, GetAdapterType(manager));
ClearNetworks(manager);
ReleaseIfAddrs(addr_list);
strcpy(if_name, "eth0");
addr_list = InstallIpv4Network(if_name, ipv4_address1, ipv4_mask, manager);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_ETHERNET, GetAdapterType(manager));
+ EXPECT_EQ(ADAPTER_TYPE_ETHERNET, GetAdapterType(manager));
ClearNetworks(manager);
ReleaseIfAddrs(addr_list);
strcpy(if_name, "wlan0");
addr_list = InstallIpv6Network(if_name, ipv6_address1, ipv6_mask, manager);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_WIFI, GetAdapterType(manager));
+ EXPECT_EQ(ADAPTER_TYPE_WIFI, GetAdapterType(manager));
ClearNetworks(manager);
ReleaseIfAddrs(addr_list);
@@ -1088,14 +1081,12 @@
// Create 2 IPAddress classes with only last digit different.
IPAddress ip1, ip2;
- EXPECT_TRUE(webrtc::IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
- EXPECT_TRUE(webrtc::IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2));
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:2", &ip2));
// Create 2 networks with the same prefix and length.
- auto net1 =
- std::make_unique<Network>("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
- auto net2 =
- std::make_unique<Network>("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
+ auto net1 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
+ auto net2 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
// Add different IP into each.
net1->AddIP(ip1);
@@ -1170,18 +1161,17 @@
std::string ipstr;
ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
- ASSERT_TRUE(
- webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
// Create a network with this prefix.
- Network ipv6_network("test_eth0", "Test NetworkAdapter",
- webrtc::TruncateIP(ip, 64), 64);
+ Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
+ 64);
EXPECT_EQ(AF_INET6, ipv6_network.family());
// When there is no address added, it should return an unspecified
// address.
EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
- EXPECT_TRUE(webrtc::IPIsUnspec(ipv6_network.GetBestIP()));
+ EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
// Deprecated one should not be returned.
ipv6_network.AddIP(ip);
@@ -1190,20 +1180,19 @@
// Add ULA one. ULA is unique local address which is starting either
// with 0xfc or 0xfd.
ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
- ASSERT_TRUE(webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_NONE, &ip));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
ipv6_network.AddIP(ip);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
// Add global one.
ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
- ASSERT_TRUE(webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_NONE, &ip));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
ipv6_network.AddIP(ip);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
// Add global dynamic temporary one.
ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
- ASSERT_TRUE(
- webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
ipv6_network.AddIP(ip);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
}
@@ -1214,18 +1203,16 @@
std::string ipstr;
ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c3";
- ASSERT_TRUE(
- webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_DEPRECATED, &ip));
// Create a network with this prefix.
- Network ipv6_network("test_eth0", "Test NetworkAdapter",
- webrtc::TruncateIP(ip, 64), 64,
- webrtc::ADAPTER_TYPE_UNKNOWN);
+ Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip, 64),
+ 64, ADAPTER_TYPE_UNKNOWN);
// When there is no address added, it should return an unspecified
// address.
EXPECT_EQ(ipv6_network.GetBestIP(), IPAddress());
- EXPECT_TRUE(webrtc::IPIsUnspec(ipv6_network.GetBestIP()));
+ EXPECT_TRUE(IPIsUnspec(ipv6_network.GetBestIP()));
// Deprecated one should not be returned.
ipv6_network.AddIP(ip);
@@ -1234,43 +1221,39 @@
// Add ULA one. ULA is unique local address which is starting either
// with 0xfc or 0xfd.
ipstr = "fd00:fa00:4:1000:be30:5bff:fee5:c4";
- ASSERT_TRUE(webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_NONE, &ip));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
ipv6_network.AddIP(ip);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
// Add link local one.
ipstr = "fe80::aabb:ccff:fedd:eeff";
- ASSERT_TRUE(
- webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_NONE, &link_local));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local));
ipv6_network.AddIP(link_local);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(link_local));
// Add global one.
ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c5";
- ASSERT_TRUE(webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_NONE, &ip));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &ip));
ipv6_network.AddIP(ip);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
// Add another link local address, then the compatible address is still global
// one.
ipstr = "fe80::aabb:ccff:fedd:eedd";
- ASSERT_TRUE(
- webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_NONE, &link_local));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local));
ipv6_network.AddIP(link_local);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
// Add global dynamic temporary one.
ipstr = "2401:fa00:4:1000:be30:5bff:fee5:c6";
- ASSERT_TRUE(
- webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_TEMPORARY, &ip));
ipv6_network.AddIP(ip);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
// Add another link local address, then the compatible address is still global
// dynamic one.
ipstr = "fe80::aabb:ccff:fedd:eedd";
- ASSERT_TRUE(
- webrtc::IPFromString(ipstr, webrtc::IPV6_ADDRESS_FLAG_NONE, &link_local));
+ ASSERT_TRUE(IPFromString(ipstr, IPV6_ADDRESS_FLAG_NONE, &link_local));
ipv6_network.AddIP(link_local);
EXPECT_EQ(ipv6_network.GetBestIP(), static_cast<IPAddress>(ip));
}
@@ -1284,8 +1267,7 @@
manager.StartUpdating();
FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
EXPECT_TRUE(network_monitor && network_monitor->started());
- EXPECT_THAT(webrtc::WaitUntil([&] { return callback_called_; }, IsTrue()),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return callback_called_; }, IsTrue()), IsRtcOk());
callback_called_ = false;
// Clear the networks so that there will be network changes below.
@@ -1293,8 +1275,7 @@
// Network manager is started, so the callback is called when the network
// monitor fires the network-change event.
network_monitor->InovkeNetworksChangedCallbackForTesting();
- EXPECT_THAT(webrtc::WaitUntil([&] { return callback_called_; }, IsTrue()),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return callback_called_; }, IsTrue()), IsRtcOk());
// Network manager is stopped.
manager.StopUpdating();
@@ -1317,8 +1298,7 @@
manager.SignalNetworksChanged.connect(static_cast<NetworkTest*>(this),
&NetworkTest::OnNetworksChanged);
manager.StartUpdating();
- EXPECT_THAT(webrtc::WaitUntil([&] { return callback_called_; }, IsTrue()),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return callback_called_; }, IsTrue()), IsRtcOk());
// Make sure we can query default local address when an address for such
// address family exists.
@@ -1328,7 +1308,7 @@
if (network->GetBestIP().family() == AF_INET) {
EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET) != IPAddress());
} else if (network->GetBestIP().family() == AF_INET6 &&
- !webrtc::IPIsLoopback(network->GetBestIP())) {
+ !IPIsLoopback(network->GetBestIP())) {
// Existence of an IPv6 loopback address doesn't mean it has IPv6 network
// enabled.
EXPECT_TRUE(QueryDefaultLocalAddress(manager, AF_INET6) != IPAddress());
@@ -1336,23 +1316,23 @@
}
// GetDefaultLocalAddress should return the valid default address after set.
- manager.set_default_local_addresses(webrtc::GetLoopbackIP(AF_INET),
- webrtc::GetLoopbackIP(AF_INET6));
+ manager.set_default_local_addresses(GetLoopbackIP(AF_INET),
+ GetLoopbackIP(AF_INET6));
EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET, &ip));
- EXPECT_EQ(ip, webrtc::GetLoopbackIP(AF_INET));
+ EXPECT_EQ(ip, GetLoopbackIP(AF_INET));
EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
- EXPECT_EQ(ip, webrtc::GetLoopbackIP(AF_INET6));
+ EXPECT_EQ(ip, GetLoopbackIP(AF_INET6));
// More tests on GetDefaultLocalAddress with ipv6 addresses where the set
// default address may be different from the best IP address of any network.
InterfaceAddress ip1;
- EXPECT_TRUE(webrtc::IPFromString("abcd::1234:5678:abcd:1111",
- webrtc::IPV6_ADDRESS_FLAG_TEMPORARY, &ip1));
+ EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:1111",
+ IPV6_ADDRESS_FLAG_TEMPORARY, &ip1));
// Create a network with a prefix of ip1.
- Network ipv6_network("test_eth0", "Test NetworkAdapter",
- webrtc::TruncateIP(ip1, 64), 64);
+ Network ipv6_network("test_eth0", "Test NetworkAdapter", TruncateIP(ip1, 64),
+ 64);
IPAddress ip2;
- EXPECT_TRUE(webrtc::IPFromString("abcd::1234:5678:abcd:2222", &ip2));
+ EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:2222", &ip2));
ipv6_network.AddIP(ip1);
ipv6_network.AddIP(ip2);
std::vector<std::unique_ptr<Network>> list;
@@ -1362,13 +1342,13 @@
// If the set default address is not in any network, GetDefaultLocalAddress
// should return it.
IPAddress ip3;
- EXPECT_TRUE(webrtc::IPFromString("abcd::1234:5678:abcd:3333", &ip3));
- manager.set_default_local_addresses(webrtc::GetLoopbackIP(AF_INET), ip3);
+ EXPECT_TRUE(IPFromString("abcd::1234:5678:abcd:3333", &ip3));
+ manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip3);
EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
EXPECT_EQ(ip3, ip);
// If the set default address is in a network, GetDefaultLocalAddress will
// return the best IP in that network.
- manager.set_default_local_addresses(webrtc::GetLoopbackIP(AF_INET), ip2);
+ manager.set_default_local_addresses(GetLoopbackIP(AF_INET), ip2);
EXPECT_TRUE(manager.GetDefaultLocalAddress(AF_INET6, &ip));
EXPECT_EQ(static_cast<IPAddress>(ip1), ip);
@@ -1382,10 +1362,9 @@
BasicNetworkManager manager(CreateEnvironment(), &socket_server);
IPAddress ip1;
- EXPECT_TRUE(webrtc::IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
- auto net1 =
- std::make_unique<Network>("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
- net1->set_type(webrtc::ADAPTER_TYPE_CELLULAR_3G);
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
+ auto net1 = std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
+ net1->set_type(ADAPTER_TYPE_CELLULAR_3G);
net1->AddIP(ip1);
std::vector<std::unique_ptr<Network>> list;
list.push_back(std::move(net1));
@@ -1396,14 +1375,14 @@
EXPECT_TRUE(changed);
std::vector<const Network*> list2 = manager.GetNetworks();
EXPECT_EQ(list2.size(), 1uL);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_CELLULAR_3G, list2[0]->type());
+ EXPECT_EQ(ADAPTER_TYPE_CELLULAR_3G, list2[0]->type());
}
// Modify net1 from 3G to 4G
{
- auto net2 = std::make_unique<Network>("em1", "em1",
- webrtc::TruncateIP(ip1, 64), 64);
- net2->set_type(webrtc::ADAPTER_TYPE_CELLULAR_4G);
+ auto net2 =
+ std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
+ net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
net2->AddIP(ip1);
list.clear();
list.push_back(std::move(net2));
@@ -1415,14 +1394,14 @@
EXPECT_FALSE(changed);
std::vector<const Network*> list2 = manager.GetNetworks();
ASSERT_EQ(list2.size(), 1uL);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
+ EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
}
// Don't modify.
{
- auto net2 = std::make_unique<Network>("em1", "em1",
- webrtc::TruncateIP(ip1, 64), 64);
- net2->set_type(webrtc::ADAPTER_TYPE_CELLULAR_4G);
+ auto net2 =
+ std::make_unique<Network>("em1", "em1", TruncateIP(ip1, 64), 64);
+ net2->set_type(ADAPTER_TYPE_CELLULAR_4G);
net2->AddIP(ip1);
list.clear();
list.push_back(std::move(net2));
@@ -1433,7 +1412,7 @@
EXPECT_FALSE(changed);
std::vector<const Network*> list2 = manager.GetNetworks();
ASSERT_EQ(list2.size(), 1uL);
- EXPECT_EQ(webrtc::ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
+ EXPECT_EQ(ADAPTER_TYPE_CELLULAR_4G, list2[0]->type());
}
}
@@ -1500,9 +1479,9 @@
FakeNetworkMonitor* network_monitor = GetNetworkMonitor(manager);
IPAddress ipv6;
- EXPECT_TRUE(webrtc::IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6));
+ EXPECT_TRUE(IPFromString("1000:2000:3000:4000:0:0:0:1", &ipv6));
IPAddress ipv4;
- EXPECT_TRUE(webrtc::IPFromString("192.168.0.2", &ipv4));
+ EXPECT_TRUE(IPFromString("192.168.0.2", &ipv4));
// The network monitor only knwos about the ipv6 address, interface.
network_monitor->set_adapters({"wlan0"});
@@ -1518,15 +1497,15 @@
TEST_F(NetworkTest, NetworkCostVpn_Default) {
IPAddress ip1;
- EXPECT_TRUE(webrtc::IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
ScopedKeyValueConfig field_trials;
- Network* net1 = new Network("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
- net1->set_type(webrtc::ADAPTER_TYPE_VPN);
- net1->set_underlying_type_for_vpn(webrtc::ADAPTER_TYPE_ETHERNET);
+ Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
+ net1->set_type(ADAPTER_TYPE_VPN);
+ net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
- Network* net2 = new Network("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
- net2->set_type(webrtc::ADAPTER_TYPE_ETHERNET);
+ Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
+ net2->set_type(ADAPTER_TYPE_ETHERNET);
EXPECT_EQ(net1->GetCost(field_trials), net2->GetCost(field_trials));
delete net1;
@@ -1537,14 +1516,14 @@
ScopedKeyValueConfig field_trials("WebRTC-AddNetworkCostToVpn/Enabled/");
IPAddress ip1;
- EXPECT_TRUE(webrtc::IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
- Network* net1 = new Network("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
- net1->set_type(webrtc::ADAPTER_TYPE_VPN);
- net1->set_underlying_type_for_vpn(webrtc::ADAPTER_TYPE_ETHERNET);
+ Network* net1 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
+ net1->set_type(ADAPTER_TYPE_VPN);
+ net1->set_underlying_type_for_vpn(ADAPTER_TYPE_ETHERNET);
- Network* net2 = new Network("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
- net2->set_type(webrtc::ADAPTER_TYPE_ETHERNET);
+ Network* net2 = new Network("em1", "em1", TruncateIP(ip1, 64), 64);
+ net2->set_type(ADAPTER_TYPE_ETHERNET);
EXPECT_GT(net1->GetCost(field_trials), net2->GetCost(field_trials));
delete net1;
@@ -1557,35 +1536,35 @@
"WebRTC-UseDifferentiatedCellularCosts/Enabled/");
IPAddress ip1;
- EXPECT_TRUE(webrtc::IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
+ EXPECT_TRUE(IPFromString("2400:4030:1:2c00:be30:0:0:1", &ip1));
- for (auto type : webrtc::kAllAdapterTypes) {
- if (type == webrtc::ADAPTER_TYPE_VPN)
+ for (auto type : kAllAdapterTypes) {
+ if (type == ADAPTER_TYPE_VPN)
continue;
- Network net1("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
+ Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
net1.set_type(type);
auto [guess, vpn] =
Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials));
EXPECT_FALSE(vpn);
- if (type == webrtc::ADAPTER_TYPE_LOOPBACK) {
- EXPECT_EQ(guess, webrtc::ADAPTER_TYPE_ETHERNET);
+ if (type == ADAPTER_TYPE_LOOPBACK) {
+ EXPECT_EQ(guess, ADAPTER_TYPE_ETHERNET);
} else {
EXPECT_EQ(type, guess);
}
}
// VPN
- for (auto type : webrtc::kAllAdapterTypes) {
- if (type == webrtc::ADAPTER_TYPE_VPN)
+ for (auto type : kAllAdapterTypes) {
+ if (type == ADAPTER_TYPE_VPN)
continue;
- Network net1("em1", "em1", webrtc::TruncateIP(ip1, 64), 64);
- net1.set_type(webrtc::ADAPTER_TYPE_VPN);
+ Network net1("em1", "em1", TruncateIP(ip1, 64), 64);
+ net1.set_type(ADAPTER_TYPE_VPN);
net1.set_underlying_type_for_vpn(type);
auto [guess, vpn] =
Network::GuessAdapterFromNetworkCost(net1.GetCost(field_trials));
EXPECT_TRUE(vpn);
- if (type == webrtc::ADAPTER_TYPE_LOOPBACK) {
- EXPECT_EQ(guess, webrtc::ADAPTER_TYPE_ETHERNET);
+ if (type == ADAPTER_TYPE_LOOPBACK) {
+ EXPECT_EQ(guess, ADAPTER_TYPE_ETHERNET);
} else {
EXPECT_EQ(type, guess);
}
@@ -1630,8 +1609,8 @@
std::vector<const Network*> list = manager.GetNetworks();
ASSERT_EQ(1u, list.size());
- EXPECT_EQ(webrtc::ADAPTER_TYPE_VPN, list[0]->type());
- EXPECT_EQ(webrtc::ADAPTER_TYPE_ETHERNET, list[0]->underlying_type_for_vpn());
+ EXPECT_EQ(ADAPTER_TYPE_VPN, list[0]->type());
+ EXPECT_EQ(ADAPTER_TYPE_ETHERNET, list[0]->underlying_type_for_vpn());
ClearNetworks(manager);
ReleaseIfAddrs(addr_list);
}
diff --git a/rtc_base/null_socket_server_unittest.cc b/rtc_base/null_socket_server_unittest.cc
index b89a241..81da9c3 100644
--- a/rtc_base/null_socket_server_unittest.cc
+++ b/rtc_base/null_socket_server_unittest.cc
@@ -33,10 +33,10 @@
thread->PostTask([&ss] { ss.WakeUp(); });
// The process_io will be ignored.
const bool process_io = true;
- EXPECT_THAT(webrtc::WaitUntil(
- [&] { return ss.Wait(SocketServer::kForever, process_io); },
- ::testing::IsTrue(), {.timeout = TimeDelta::Millis(5'000)}),
- webrtc::IsRtcOk());
+ EXPECT_THAT(
+ WaitUntil([&] { return ss.Wait(SocketServer::kForever, process_io); },
+ ::testing::IsTrue(), {.timeout = TimeDelta::Millis(5'000)}),
+ IsRtcOk());
}
TEST(NullSocketServerTest, TestWait) {
diff --git a/rtc_base/openssl_adapter.cc b/rtc_base/openssl_adapter.cc
index cb5dfc6..f804f08 100644
--- a/rtc_base/openssl_adapter.cc
+++ b/rtc_base/openssl_adapter.cc
@@ -184,7 +184,6 @@
namespace webrtc {
-using ::webrtc::TimeDelta;
bool OpenSSLAdapter::InitializeSSL() {
// TODO: https://issues.webrtc.org/issues/339300437 - remove once
@@ -206,12 +205,12 @@
ssl_session_cache_(ssl_session_cache),
ssl_cert_verifier_(ssl_cert_verifier),
state_(SSL_NONE),
- role_(webrtc::SSL_CLIENT),
+ role_(SSL_CLIENT),
ssl_read_needs_write_(false),
ssl_write_needs_read_(false),
ssl_(nullptr),
ssl_ctx_(nullptr),
- ssl_mode_(webrtc::SSL_MODE_TLS),
+ ssl_mode_(SSL_MODE_TLS),
ignore_bad_cert_(false),
custom_cert_verifier_status_(false) {
// If a factory is used, take a reference on the factory's SSL_CTX.
@@ -365,12 +364,12 @@
if (!tls_alpn_string.empty()) {
SSL_set_alpn_protos(
ssl_, reinterpret_cast<const unsigned char*>(tls_alpn_string.data()),
- webrtc::dchecked_cast<unsigned>(tls_alpn_string.size()));
+ dchecked_cast<unsigned>(tls_alpn_string.size()));
}
}
if (!elliptic_curves_.empty()) {
- SSL_set1_curves_list(ssl_, webrtc::StrJoin(elliptic_curves_, ":").c_str());
+ SSL_set1_curves_list(ssl_, StrJoin(elliptic_curves_, ":").c_str());
}
// Now that the initial config is done, transfer ownership of `bio` to the
@@ -393,8 +392,7 @@
// Clear the DTLS timer
timer_.reset();
- int code =
- (role_ == webrtc::SSL_CLIENT) ? SSL_connect(ssl_) : SSL_accept(ssl_);
+ int code = (role_ == SSL_CLIENT) ? SSL_connect(ssl_) : SSL_accept(ssl_);
switch (SSL_get_error(ssl_, code)) {
case SSL_ERROR_NONE:
if (!SSLPostConnectionCheck(ssl_, ssl_host_name_)) {
@@ -480,7 +478,7 @@
RTC_DCHECK(error != nullptr);
ssl_write_needs_read_ = false;
- int ret = SSL_write(ssl_, pv, webrtc::checked_cast<int>(cb));
+ int ret = SSL_write(ssl_, pv, checked_cast<int>(cb));
*error = SSL_get_error(ssl_, ret);
switch (*error) {
case SSL_ERROR_NONE:
@@ -574,7 +572,7 @@
pending_data_.SetData(static_cast<const uint8_t*>(pv), cb);
// Since we're taking responsibility for sending this data, return its full
// size. The user of this class can consider it sent.
- return webrtc::dchecked_cast<int>(cb);
+ return dchecked_cast<int>(cb);
}
return ret;
}
@@ -612,7 +610,7 @@
}
ssl_read_needs_write_ = false;
- int code = SSL_read(ssl_, pv, webrtc::checked_cast<int>(cb));
+ int code = SSL_read(ssl_, pv, checked_cast<int>(cb));
int error = SSL_get_error(ssl_, code);
switch (error) {
@@ -944,7 +942,7 @@
: TLS_with_buffers_method());
#else
SSL_CTX* ctx =
- SSL_CTX_new(mode == webrtc::SSL_MODE_DTLS ? DTLS_method() : TLS_method());
+ SSL_CTX_new(mode == SSL_MODE_DTLS ? DTLS_method() : TLS_method());
#endif
if (ctx == nullptr) {
unsigned long error = ERR_get_error(); // NOLINT: type used by OpenSSL.
diff --git a/rtc_base/openssl_digest.cc b/rtc_base/openssl_digest.cc
index 96cac43..ce0c6c1 100644
--- a/rtc_base/openssl_digest.cc
+++ b/rtc_base/openssl_digest.cc
@@ -59,17 +59,17 @@
bool OpenSSLDigest::GetDigestEVP(absl::string_view algorithm,
const EVP_MD** mdp) {
const EVP_MD* md;
- if (algorithm == webrtc::DIGEST_MD5) {
+ if (algorithm == DIGEST_MD5) {
md = EVP_md5();
- } else if (algorithm == webrtc::DIGEST_SHA_1) {
+ } else if (algorithm == DIGEST_SHA_1) {
md = EVP_sha1();
- } else if (algorithm == webrtc::DIGEST_SHA_224) {
+ } else if (algorithm == DIGEST_SHA_224) {
md = EVP_sha224();
- } else if (algorithm == webrtc::DIGEST_SHA_256) {
+ } else if (algorithm == DIGEST_SHA_256) {
md = EVP_sha256();
- } else if (algorithm == webrtc::DIGEST_SHA_384) {
+ } else if (algorithm == DIGEST_SHA_384) {
md = EVP_sha384();
- } else if (algorithm == webrtc::DIGEST_SHA_512) {
+ } else if (algorithm == DIGEST_SHA_512) {
md = EVP_sha512();
} else {
return false;
@@ -87,17 +87,17 @@
int md_type = EVP_MD_type(md);
if (md_type == NID_md5) {
- *algorithm = webrtc::DIGEST_MD5;
+ *algorithm = DIGEST_MD5;
} else if (md_type == NID_sha1) {
- *algorithm = webrtc::DIGEST_SHA_1;
+ *algorithm = DIGEST_SHA_1;
} else if (md_type == NID_sha224) {
- *algorithm = webrtc::DIGEST_SHA_224;
+ *algorithm = DIGEST_SHA_224;
} else if (md_type == NID_sha256) {
- *algorithm = webrtc::DIGEST_SHA_256;
+ *algorithm = DIGEST_SHA_256;
} else if (md_type == NID_sha384) {
- *algorithm = webrtc::DIGEST_SHA_384;
+ *algorithm = DIGEST_SHA_384;
} else if (md_type == NID_sha512) {
- *algorithm = webrtc::DIGEST_SHA_512;
+ *algorithm = DIGEST_SHA_512;
} else {
algorithm->clear();
return false;
diff --git a/rtc_base/openssl_stream_adapter.cc b/rtc_base/openssl_stream_adapter.cc
index 654fc46..3a0a558 100644
--- a/rtc_base/openssl_stream_adapter.cc
+++ b/rtc_base/openssl_stream_adapter.cc
@@ -72,7 +72,6 @@
namespace webrtc {
namespace {
-using ::webrtc::SafeTask;
// SRTP cipher suite table. `internal_name` is used to construct a
// colon-separated profile strings which is needed by
// SSL_CTX_set_tlsext_use_srtp().
@@ -83,10 +82,10 @@
// This isn't elegant, but it's better than an external reference
constexpr SrtpCipherMapEntry kSrtpCipherMap[] = {
- {"SRTP_AES128_CM_SHA1_80", webrtc::kSrtpAes128CmSha1_80},
- {"SRTP_AES128_CM_SHA1_32", webrtc::kSrtpAes128CmSha1_32},
- {"SRTP_AEAD_AES_128_GCM", webrtc::kSrtpAeadAes128Gcm},
- {"SRTP_AEAD_AES_256_GCM", webrtc::kSrtpAeadAes256Gcm}};
+ {"SRTP_AES128_CM_SHA1_80", kSrtpAes128CmSha1_80},
+ {"SRTP_AES128_CM_SHA1_32", kSrtpAes128CmSha1_32},
+ {"SRTP_AEAD_AES_128_GCM", kSrtpAeadAes128Gcm},
+ {"SRTP_AEAD_AES_256_GCM", kSrtpAeadAes256Gcm}};
#ifdef OPENSSL_IS_BORINGSSL
// Enabled by EnableTimeCallbackForTesting. Should never be set in production
@@ -94,38 +93,37 @@
bool g_use_time_callback_for_testing = false;
// Not used in production code. Actual time should be relative to Jan 1, 1970.
void TimeCallbackForTesting(const SSL* ssl, struct timeval* out_clock) {
- int64_t time = webrtc::TimeNanos();
- out_clock->tv_sec = time / webrtc::kNumNanosecsPerSec;
- out_clock->tv_usec =
- (time % webrtc::kNumNanosecsPerSec) / webrtc::kNumNanosecsPerMicrosec;
+ int64_t time = TimeNanos();
+ out_clock->tv_sec = time / kNumNanosecsPerSec;
+ out_clock->tv_usec = (time % kNumNanosecsPerSec) / kNumNanosecsPerMicrosec;
}
#endif
uint16_t GetMaxVersion(SSLMode ssl_mode, SSLProtocolVersion version) {
switch (ssl_mode) {
- case webrtc::SSL_MODE_TLS:
+ case SSL_MODE_TLS:
switch (version) {
default:
- case webrtc::SSL_PROTOCOL_NOT_GIVEN:
- case webrtc::SSL_PROTOCOL_TLS_10:
- case webrtc::SSL_PROTOCOL_TLS_11:
- case webrtc::SSL_PROTOCOL_TLS_12:
+ case SSL_PROTOCOL_NOT_GIVEN:
+ case SSL_PROTOCOL_TLS_10:
+ case SSL_PROTOCOL_TLS_11:
+ case SSL_PROTOCOL_TLS_12:
return TLS1_2_VERSION;
- case webrtc::SSL_PROTOCOL_TLS_13:
+ case SSL_PROTOCOL_TLS_13:
#ifdef TLS1_3_VERSION
return TLS1_3_VERSION;
#else
return TLS1_2_VERSION;
#endif
}
- case webrtc::SSL_MODE_DTLS:
+ case SSL_MODE_DTLS:
switch (version) {
default:
- case webrtc::SSL_PROTOCOL_NOT_GIVEN:
- case webrtc::SSL_PROTOCOL_DTLS_10:
- case webrtc::SSL_PROTOCOL_DTLS_12:
+ case SSL_PROTOCOL_NOT_GIVEN:
+ case SSL_PROTOCOL_DTLS_10:
+ case SSL_PROTOCOL_DTLS_12:
return DTLS1_2_VERSION;
- case webrtc::SSL_PROTOCOL_DTLS_13:
+ case SSL_PROTOCOL_DTLS_13:
#ifdef DTLS1_3_VERSION
return DTLS1_3_VERSION;
#else
@@ -219,9 +217,9 @@
int error;
StreamResult result = stream->Read(
MakeArrayView(reinterpret_cast<uint8_t*>(out), outl), read, error);
- if (result == webrtc::SR_SUCCESS) {
- return webrtc::checked_cast<int>(read);
- } else if (result == webrtc::SR_BLOCK) {
+ if (result == SR_SUCCESS) {
+ return checked_cast<int>(read);
+ } else if (result == SR_BLOCK) {
BIO_set_retry_read(b);
}
return -1;
@@ -237,16 +235,16 @@
int error;
StreamResult result = stream->Write(
MakeArrayView(reinterpret_cast<const uint8_t*>(in), inl), written, error);
- if (result == webrtc::SR_SUCCESS) {
- return webrtc::checked_cast<int>(written);
- } else if (result == webrtc::SR_BLOCK) {
+ if (result == SR_SUCCESS) {
+ return checked_cast<int>(written);
+ } else if (result == SR_BLOCK) {
BIO_set_retry_write(b);
}
return -1;
}
static int stream_puts(BIO* b, const char* str) {
- return stream_write(b, str, webrtc::checked_cast<int>(strlen(str)));
+ return stream_write(b, str, checked_cast<int>(strlen(str)));
}
static long stream_ctrl(BIO* b, int cmd, long num, void* ptr) {
@@ -256,7 +254,7 @@
case BIO_CTRL_EOF: {
StreamInterface* stream = static_cast<StreamInterface*>(ptr);
// 1 means end-of-stream.
- return (stream->GetState() == webrtc::SS_CLOSED) ? 1 : 0;
+ return (stream->GetState() == SS_CLOSED) ? 1 : 0;
}
case BIO_CTRL_WPENDING:
case BIO_CTRL_PENDING:
@@ -295,13 +293,13 @@
handshake_error_(std::move(handshake_error)),
owner_(Thread::Current()),
state_(SSL_NONE),
- role_(webrtc::SSL_CLIENT),
+ role_(SSL_CLIENT),
ssl_read_needs_write_(false),
ssl_write_needs_read_(false),
ssl_(nullptr),
ssl_ctx_(nullptr),
- ssl_mode_(webrtc::SSL_MODE_DTLS),
- ssl_max_version_(webrtc::SSL_PROTOCOL_DTLS_12),
+ ssl_mode_(SSL_MODE_DTLS),
+ ssl_max_version_(SSL_PROTOCOL_DTLS_12),
force_dtls_13_(GetForceDtls13(field_trials)),
disable_ssl_group_ids_(field_trials && field_trials->IsEnabled(
"WebRTC-DisableSslGroupIds")) {
@@ -364,7 +362,7 @@
// Post the event asynchronously to unwind the stack. The caller
// of ContinueSSL may be the same object listening for these
// events and may not be prepared for reentrancy.
- PostEvent(webrtc::SE_OPEN | webrtc::SE_READ | webrtc::SE_WRITE, 0);
+ PostEvent(SE_OPEN | SE_READ | SE_WRITE, 0);
}
return SSLPeerCertificateDigestError::NONE;
}
@@ -395,37 +393,37 @@
SSLProtocolVersion OpenSSLStreamAdapter::GetSslVersion() const {
if (state_ != SSL_CONNECTED) {
- return webrtc::SSL_PROTOCOL_NOT_GIVEN;
+ return SSL_PROTOCOL_NOT_GIVEN;
}
int ssl_version = SSL_version(ssl_);
- if (ssl_mode_ == webrtc::SSL_MODE_DTLS) {
+ if (ssl_mode_ == SSL_MODE_DTLS) {
if (ssl_version == DTLS1_VERSION) {
- return webrtc::SSL_PROTOCOL_DTLS_10;
+ return SSL_PROTOCOL_DTLS_10;
} else if (ssl_version == DTLS1_2_VERSION) {
- return webrtc::SSL_PROTOCOL_DTLS_12;
+ return SSL_PROTOCOL_DTLS_12;
}
#ifdef DTLS1_3_VERSION
if (ssl_version == DTLS1_3_VERSION) {
- return webrtc::SSL_PROTOCOL_DTLS_13;
+ return SSL_PROTOCOL_DTLS_13;
}
#endif
} else {
if (ssl_version == TLS1_VERSION) {
- return webrtc::SSL_PROTOCOL_TLS_10;
+ return SSL_PROTOCOL_TLS_10;
} else if (ssl_version == TLS1_1_VERSION) {
- return webrtc::SSL_PROTOCOL_TLS_11;
+ return SSL_PROTOCOL_TLS_11;
} else if (ssl_version == TLS1_2_VERSION) {
- return webrtc::SSL_PROTOCOL_TLS_12;
+ return SSL_PROTOCOL_TLS_12;
}
#ifdef TLS1_3_VERSION
if (ssl_version == TLS1_3_VERSION) {
- return webrtc::SSL_PROTOCOL_TLS_13;
+ return SSL_PROTOCOL_TLS_13;
}
#endif
}
- return webrtc::SSL_PROTOCOL_NOT_GIVEN;
+ return SSL_PROTOCOL_NOT_GIVEN;
}
bool OpenSSLStreamAdapter::GetSslVersionBytes(int* version) const {
@@ -524,7 +522,7 @@
}
*crypto_suite = srtp_profile->id;
- RTC_DCHECK(!webrtc::SrtpCryptoSuiteToName(*crypto_suite).empty());
+ RTC_DCHECK(!SrtpCryptoSuiteToName(*crypto_suite).empty());
return true;
}
@@ -538,7 +536,7 @@
return -1;
}
- if (stream_->GetState() != webrtc::SS_OPEN) {
+ if (stream_->GetState() != SS_OPEN) {
state_ = SSL_WAIT;
return 0;
}
@@ -565,7 +563,7 @@
void OpenSSLStreamAdapter::SetInitialRetransmissionTimeout(int timeout_ms) {
dtls_handshake_timeout_ms_ = timeout_ms;
#ifdef OPENSSL_IS_BORINGSSL
- if (ssl_ctx_ != nullptr && ssl_mode_ == webrtc::SSL_MODE_DTLS) {
+ if (ssl_ctx_ != nullptr && ssl_mode_ == SSL_MODE_DTLS) {
// TODO (jonaso, webrtc:367395350): Switch to upcoming
// DTLSv1_set_timeout_duration.
DTLSv1_set_initial_timeout_duration(ssl_, dtls_handshake_timeout_ms_);
@@ -594,29 +592,28 @@
return stream_->Write(data, written, error);
case SSL_WAIT:
case SSL_CONNECTING:
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
case SSL_CONNECTED:
if (WaitingToVerifyPeerCertificate()) {
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
}
break;
case SSL_ERROR:
case SSL_CLOSED:
default:
error = ssl_error_code_;
- return webrtc::SR_ERROR;
+ return SR_ERROR;
}
// OpenSSL will return an error if we try to write zero bytes
if (data.size() == 0) {
written = 0;
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
}
ssl_write_needs_read_ = false;
- int code =
- SSL_write(ssl_, data.data(), webrtc::checked_cast<int>(data.size()));
+ int code = SSL_write(ssl_, data.data(), checked_cast<int>(data.size()));
int ssl_error = SSL_get_error(ssl_, code);
switch (ssl_error) {
case SSL_ERROR_NONE:
@@ -624,19 +621,19 @@
RTC_DCHECK_GT(code, 0);
RTC_DCHECK_LE(code, data.size());
written = code;
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
case SSL_ERROR_WANT_READ:
RTC_DLOG(LS_VERBOSE) << " -- error want read";
ssl_write_needs_read_ = true;
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
case SSL_ERROR_WANT_WRITE:
RTC_DLOG(LS_VERBOSE) << " -- error want write";
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
case SSL_ERROR_ZERO_RETURN:
default:
Error("SSL_write", (ssl_error ? ssl_error : -1), 0, false);
error = ssl_error_code_;
- return webrtc::SR_ERROR;
+ return SR_ERROR;
}
// not reached
}
@@ -651,30 +648,29 @@
return stream_->Read(data, read, error);
case SSL_WAIT:
case SSL_CONNECTING:
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
case SSL_CONNECTED:
if (WaitingToVerifyPeerCertificate()) {
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
}
break;
case SSL_CLOSED:
- return webrtc::SR_EOS;
+ return SR_EOS;
case SSL_ERROR:
default:
error = ssl_error_code_;
- return webrtc::SR_ERROR;
+ return SR_ERROR;
}
// Don't trust OpenSSL with zero byte reads
if (data.size() == 0) {
read = 0;
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
}
ssl_read_needs_write_ = false;
- const int code =
- SSL_read(ssl_, data.data(), webrtc::checked_cast<int>(data.size()));
+ const int code = SSL_read(ssl_, data.data(), checked_cast<int>(data.size()));
const int ssl_error = SSL_get_error(ssl_, code);
switch (ssl_error) {
@@ -684,33 +680,33 @@
RTC_DCHECK_LE(code, data.size());
read = code;
- if (ssl_mode_ == webrtc::SSL_MODE_DTLS) {
+ if (ssl_mode_ == SSL_MODE_DTLS) {
// Enforce atomic reads -- this is a short read
unsigned int pending = SSL_pending(ssl_);
if (pending) {
RTC_DLOG(LS_INFO) << " -- short DTLS read. flushing";
FlushInput(pending);
- error = webrtc::SSE_MSG_TRUNC;
- return webrtc::SR_ERROR;
+ error = SSE_MSG_TRUNC;
+ return SR_ERROR;
}
}
- return webrtc::SR_SUCCESS;
+ return SR_SUCCESS;
case SSL_ERROR_WANT_READ:
RTC_DLOG(LS_VERBOSE) << " -- error want read";
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
case SSL_ERROR_WANT_WRITE:
RTC_DLOG(LS_VERBOSE) << " -- error want write";
ssl_read_needs_write_ = true;
- return webrtc::SR_BLOCK;
+ return SR_BLOCK;
case SSL_ERROR_ZERO_RETURN:
RTC_DLOG(LS_VERBOSE) << " -- remote side closed";
Close();
- return webrtc::SR_EOS;
+ return SR_EOS;
default:
Error("SSL_read", (ssl_error ? ssl_error : -1), 0, false);
error = ssl_error_code_;
- return webrtc::SR_ERROR;
+ return SR_ERROR;
}
// not reached
}
@@ -750,14 +746,14 @@
switch (state_) {
case SSL_WAIT:
case SSL_CONNECTING:
- return webrtc::SS_OPENING;
+ return SS_OPENING;
case SSL_CONNECTED:
if (WaitingToVerifyPeerCertificate()) {
- return webrtc::SS_OPENING;
+ return SS_OPENING;
}
- return webrtc::SS_OPEN;
+ return SS_OPEN;
default:
- return webrtc::SS_CLOSED;
+ return SS_CLOSED;
}
// not reached
}
@@ -767,11 +763,11 @@
int events_to_signal = 0;
int signal_error = 0;
- if ((events & webrtc::SE_OPEN)) {
+ if ((events & SE_OPEN)) {
RTC_DLOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent SE_OPEN";
if (state_ != SSL_WAIT) {
RTC_DCHECK(state_ == SSL_NONE);
- events_to_signal |= webrtc::SE_OPEN;
+ events_to_signal |= SE_OPEN;
} else {
state_ = SSL_CONNECTING;
if (int error = BeginSSL()) {
@@ -781,36 +777,36 @@
}
}
- if ((events & (webrtc::SE_READ | webrtc::SE_WRITE))) {
+ if ((events & (SE_READ | SE_WRITE))) {
RTC_DLOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent"
- << ((events & webrtc::SE_READ) ? " SE_READ" : "")
- << ((events & webrtc::SE_WRITE) ? " SE_WRITE" : "");
+ << ((events & SE_READ) ? " SE_READ" : "")
+ << ((events & SE_WRITE) ? " SE_WRITE" : "");
if (state_ == SSL_NONE) {
- events_to_signal |= events & (webrtc::SE_READ | webrtc::SE_WRITE);
+ events_to_signal |= events & (SE_READ | SE_WRITE);
} else if (state_ == SSL_CONNECTING) {
if (int error = ContinueSSL()) {
Error("ContinueSSL", error, 0, true);
return;
}
} else if (state_ == SSL_CONNECTED) {
- if (((events & webrtc::SE_READ) && ssl_write_needs_read_) ||
- (events & webrtc::SE_WRITE)) {
+ if (((events & SE_READ) && ssl_write_needs_read_) ||
+ (events & SE_WRITE)) {
RTC_DLOG(LS_VERBOSE) << " -- onStreamWriteable";
- events_to_signal |= webrtc::SE_WRITE;
+ events_to_signal |= SE_WRITE;
}
- if (((events & webrtc::SE_WRITE) && ssl_read_needs_write_) ||
- (events & webrtc::SE_READ)) {
+ if (((events & SE_WRITE) && ssl_read_needs_write_) ||
+ (events & SE_READ)) {
RTC_DLOG(LS_VERBOSE) << " -- onStreamReadable";
- events_to_signal |= webrtc::SE_READ;
+ events_to_signal |= SE_READ;
}
}
}
- if ((events & webrtc::SE_CLOSE)) {
+ if ((events & SE_CLOSE)) {
RTC_DLOG(LS_VERBOSE) << "OpenSSLStreamAdapter::OnEvent(SE_CLOSE, " << err
<< ")";
Cleanup(0);
- events_to_signal |= webrtc::SE_CLOSE;
+ events_to_signal |= SE_CLOSE;
// SE_CLOSE is the only event that uses the final parameter to OnEvent().
RTC_DCHECK(signal_error == 0);
signal_error = err;
@@ -899,7 +895,7 @@
SSL_set_mtu(ssl_, dtls_mtu_);
#ifdef OPENSSL_IS_BORINGSSL
- if (ssl_mode_ == webrtc::SSL_MODE_DTLS) {
+ if (ssl_mode_ == SSL_MODE_DTLS) {
DTLSv1_set_initial_timeout_duration(ssl_, dtls_handshake_timeout_ms_);
}
@@ -927,8 +923,7 @@
// Clear the DTLS timer
timeout_task_.Stop();
- const int code =
- (role_ == webrtc::SSL_CLIENT) ? SSL_connect(ssl_) : SSL_accept(ssl_);
+ const int code = (role_ == SSL_CLIENT) ? SSL_connect(ssl_) : SSL_accept(ssl_);
const int ssl_error = SSL_get_error(ssl_, code);
switch (ssl_error) {
@@ -948,7 +943,7 @@
// The caller of ContinueSSL may be the same object listening for these
// events and may not be prepared for reentrancy.
// PostEvent(SE_OPEN | SE_READ | SE_WRITE, 0);
- FireEvent(webrtc::SE_OPEN | webrtc::SE_READ | webrtc::SE_WRITE, 0);
+ FireEvent(SE_OPEN | SE_READ | SE_WRITE, 0);
}
break;
case SSL_ERROR_WANT_READ:
@@ -995,7 +990,7 @@
ssl_error_code_ = err;
Cleanup(alert);
if (signal) {
- FireEvent(webrtc::SE_CLOSE, err);
+ FireEvent(SE_CLOSE, err);
}
}
@@ -1045,9 +1040,9 @@
#ifdef OPENSSL_IS_BORINGSSL
// If X509 objects aren't used, we can use these methods to avoid
// linking the sizable crypto/x509 code, using CRYPTO_BUFFER instead.
- SSL_CTX* ctx = SSL_CTX_new(ssl_mode_ == webrtc::SSL_MODE_DTLS
- ? DTLS_with_buffers_method()
- : TLS_with_buffers_method());
+ SSL_CTX* ctx =
+ SSL_CTX_new(ssl_mode_ == SSL_MODE_DTLS ? DTLS_with_buffers_method()
+ : TLS_with_buffers_method());
#else
SSL_CTX* ctx =
SSL_CTX_new(ssl_mode_ == SSL_MODE_DTLS ? DTLS_method() : TLS_method());
@@ -1057,7 +1052,7 @@
}
auto min_version =
- ssl_mode_ == webrtc::SSL_MODE_DTLS ? DTLS1_2_VERSION : TLS1_2_VERSION;
+ ssl_mode_ == SSL_MODE_DTLS ? DTLS1_2_VERSION : TLS1_2_VERSION;
auto max_version = GetMaxVersion(ssl_mode_, ssl_max_version_);
#ifdef DTLS1_3_VERSION
if (force_dtls_13_ == kForceDtls13Enabled) {
@@ -1348,7 +1343,7 @@
SSLProtocolVersion OpenSSLStreamAdapter::GetMaxSupportedDTLSProtocolVersion() {
#if defined(OPENSSL_IS_BORINGSSL) && defined(DTLS1_3_VERSION)
- return webrtc::SSL_PROTOCOL_DTLS_13;
+ return SSL_PROTOCOL_DTLS_13;
#else
return SSL_PROTOCOL_DTLS_12;
#endif
diff --git a/rtc_base/openssl_utility.cc b/rtc_base/openssl_utility.cc
index 906127f..9c6dcf8 100644
--- a/rtc_base/openssl_utility.cc
+++ b/rtc_base/openssl_utility.cc
@@ -152,8 +152,8 @@
return false;
}
if (expiration_time) {
- *expiration_time = webrtc::ASN1TimeToSec(CBS_data(¬_after),
- CBS_len(¬_after), long_format);
+ *expiration_time =
+ ASN1TimeToSec(CBS_data(¬_after), CBS_len(¬_after), long_format);
}
// subject Name,
if (!CBS_get_asn1_element(&tbs_certificate, nullptr, CBS_ASN1_SEQUENCE)) {
@@ -248,9 +248,8 @@
for (size_t i = 0; i < arraysize(kSSLCertCertificateList); i++) {
const unsigned char* cert_buffer = kSSLCertCertificateList[i];
size_t cert_buffer_len = kSSLCertCertificateSizeList[i];
- X509* cert =
- d2i_X509(nullptr, &cert_buffer,
- webrtc::checked_cast<long>(cert_buffer_len)); // NOLINT
+ X509* cert = d2i_X509(nullptr, &cert_buffer,
+ checked_cast<long>(cert_buffer_len)); // NOLINT
if (cert) {
int return_value = X509_STORE_add_cert(SSL_CTX_get_cert_store(ctx), cert);
if (return_value == 0) {
diff --git a/rtc_base/openssl_utility_unittest.cc b/rtc_base/openssl_utility_unittest.cc
index 1f0fcd9..3008147 100644
--- a/rtc_base/openssl_utility_unittest.cc
+++ b/rtc_base/openssl_utility_unittest.cc
@@ -187,7 +187,7 @@
const unsigned char* key_ptr = kFakeSSLPrivateKey;
EVP_PKEY* key = d2i_PrivateKey(
EVP_PKEY_EC, nullptr, &key_ptr,
- webrtc::checked_cast<long>(arraysize(kFakeSSLPrivateKey))); // NOLINT
+ checked_cast<long>(arraysize(kFakeSSLPrivateKey))); // NOLINT
RTC_CHECK(key);
#ifdef OPENSSL_IS_BORINGSSL
diff --git a/rtc_base/operations_chain_unittest.cc b/rtc_base/operations_chain_unittest.cc
index ed5cd40..9f7ce22 100644
--- a/rtc_base/operations_chain_unittest.cc
+++ b/rtc_base/operations_chain_unittest.cc
@@ -415,10 +415,9 @@
// Completing the operation empties the chain, invoking the callback.
unblock_async_operation_event0.Set();
async_operation_completed_event0->Wait(Event::kForever);
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return on_empty_callback_counter == 1u; },
+ EXPECT_THAT(WaitUntil([&] { return on_empty_callback_counter == 1u; },
::testing::IsTrue(), {.timeout = kDefaultTimeout}),
- webrtc::IsRtcOk());
+ IsRtcOk());
// Chain multiple events.
Event unblock_async_operation_event1;
@@ -430,25 +429,22 @@
operation_tracker_proxy.PostAsynchronousOperation(
&unblock_async_operation_event2);
// Again, the callback is not invoked until the operation has completed.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return on_empty_callback_counter == 1u; },
+ EXPECT_THAT(WaitUntil([&] { return on_empty_callback_counter == 1u; },
::testing::IsTrue(), {.timeout = kDefaultTimeout}),
- webrtc::IsRtcOk());
+ IsRtcOk());
// Upon completing the first event, the chain is still not empty, so the
// callback must not be invoked yet.
unblock_async_operation_event1.Set();
async_operation_completed_event1->Wait(Event::kForever);
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return on_empty_callback_counter == 1u; },
+ EXPECT_THAT(WaitUntil([&] { return on_empty_callback_counter == 1u; },
::testing::IsTrue(), {.timeout = kDefaultTimeout}),
- webrtc::IsRtcOk());
+ IsRtcOk());
// Completing the last event empties the chain, invoking the callback.
unblock_async_operation_event2.Set();
async_operation_completed_event2->Wait(Event::kForever);
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return on_empty_callback_counter == 2u; },
+ EXPECT_THAT(WaitUntil([&] { return on_empty_callback_counter == 2u; },
::testing::IsTrue(), {.timeout = kDefaultTimeout}),
- webrtc::IsRtcOk());
+ IsRtcOk());
}
TEST(OperationsChainTest,
diff --git a/rtc_base/physical_socket_server.cc b/rtc_base/physical_socket_server.cc
index 4769f41..b18052a 100644
--- a/rtc_base/physical_socket_server.cc
+++ b/rtc_base/physical_socket_server.cc
@@ -204,7 +204,7 @@
int result = ::getsockname(s_, addr, &addrlen);
SocketAddress address;
if (result >= 0) {
- webrtc::SocketAddressFromSockAddrStorage(addr_storage, &address);
+ SocketAddressFromSockAddrStorage(addr_storage, &address);
} else {
RTC_LOG(LS_WARNING) << "GetLocalAddress: unable to get local addr, socket="
<< s_;
@@ -219,7 +219,7 @@
int result = ::getpeername(s_, addr, &addrlen);
SocketAddress address;
if (result >= 0) {
- webrtc::SocketAddressFromSockAddrStorage(addr_storage, &address);
+ SocketAddressFromSockAddrStorage(addr_storage, &address);
} else {
RTC_LOG(LS_WARNING)
<< "GetRemoteAddress: unable to get remote addr, socket=" << s_;
@@ -239,8 +239,7 @@
// Since the network binder handled binding the socket to the desired
// network interface, we don't need to (and shouldn't) include an IP in
// the bind() call; bind() just needs to assign a port.
- copied_bind_addr.SetIP(
- webrtc::GetAnyIP(copied_bind_addr.ipaddr().family()));
+ copied_bind_addr.SetIP(GetAnyIP(copied_bind_addr.ipaddr().family()));
} else if (result == NetworkBindingResult::NOT_IMPLEMENTED) {
RTC_LOG(LS_INFO) << "Can't bind socket to network because "
"network binding is not implemented for this OS.";
@@ -305,7 +304,7 @@
uint8_t events = DE_READ | DE_WRITE;
if (err == 0) {
state_ = CS_CONNECTED;
- } else if (webrtc::IsBlockingError(GetError())) {
+ } else if (IsBlockingError(GetError())) {
state_ = CS_CONNECTING;
events |= DE_CONNECT;
} else {
@@ -417,7 +416,7 @@
// We have seen minidumps where this may be false.
RTC_DCHECK(sent <= static_cast<int>(cb));
if ((sent > 0 && sent < static_cast<int>(cb)) ||
- (sent < 0 && webrtc::IsBlockingError(GetError()))) {
+ (sent < 0 && IsBlockingError(GetError()))) {
EnableEvents(DE_WRITE);
}
return sent;
@@ -442,7 +441,7 @@
// We have seen minidumps where this may be false.
RTC_DCHECK(sent <= static_cast<int>(length));
if ((sent > 0 && sent < static_cast<int>(length)) ||
- (sent < 0 && webrtc::IsBlockingError(GetError()))) {
+ (sent < 0 && IsBlockingError(GetError()))) {
EnableEvents(DE_WRITE);
}
return sent;
@@ -465,7 +464,7 @@
UpdateLastError();
int error = GetError();
- bool success = (received >= 0) || webrtc::IsBlockingError(error);
+ bool success = (received >= 0) || IsBlockingError(error);
if (udp_ || success) {
EnableEvents(DE_READ);
}
@@ -483,7 +482,7 @@
UpdateLastError();
int error = GetError();
- bool success = (received >= 0) || webrtc::IsBlockingError(error);
+ bool success = (received >= 0) || IsBlockingError(error);
if (udp_ || success) {
EnableEvents(DE_READ);
}
@@ -507,7 +506,7 @@
}
UpdateLastError();
int error = GetError();
- bool success = (received >= 0) || webrtc::IsBlockingError(error);
+ bool success = (received >= 0) || IsBlockingError(error);
if (udp_ || success) {
EnableEvents(DE_READ);
}
@@ -569,7 +568,7 @@
}
}
if (out_addr) {
- webrtc::SocketAddressFromSockAddrStorage(addr_storage, out_addr);
+ SocketAddressFromSockAddrStorage(addr_storage, out_addr);
}
return received;
@@ -616,7 +615,7 @@
if (s == INVALID_SOCKET)
return nullptr;
if (out_addr != nullptr)
- webrtc::SocketAddressFromSockAddrStorage(addr_storage, out_addr);
+ SocketAddressFromSockAddrStorage(addr_storage, out_addr);
return ss_->WrapSocket(s);
}
diff --git a/rtc_base/physical_socket_server_unittest.cc b/rtc_base/physical_socket_server_unittest.cc
index ac1743e..56ec609 100644
--- a/rtc_base/physical_socket_server_unittest.cc
+++ b/rtc_base/physical_socket_server_unittest.cc
@@ -208,13 +208,13 @@
server_.CreateSocket(loopback.family(), SOCK_STREAM));
sink.Monitor(client1.get());
EXPECT_EQ(Socket::CS_CLOSED, client1->GetState());
- EXPECT_TRUE(webrtc::IsUnspecOrEmptyIP(client1->GetLocalAddress().ipaddr()));
+ EXPECT_TRUE(IsUnspecOrEmptyIP(client1->GetLocalAddress().ipaddr()));
std::unique_ptr<Socket> client2(
server_.CreateSocket(loopback.family(), SOCK_STREAM));
sink.Monitor(client2.get());
EXPECT_EQ(Socket::CS_CLOSED, client2->GetState());
- EXPECT_TRUE(webrtc::IsUnspecOrEmptyIP(client2->GetLocalAddress().ipaddr()));
+ EXPECT_TRUE(IsUnspecOrEmptyIP(client2->GetLocalAddress().ipaddr()));
// Create server and listen.
std::unique_ptr<Socket> server(
@@ -225,7 +225,7 @@
EXPECT_EQ(Socket::CS_CONNECTING, server->GetState());
// Ensure no pending server connections, since we haven't done anything yet.
- EXPECT_FALSE(sink.Check(server.get(), webrtc::testing::SSE_READ));
+ EXPECT_FALSE(sink.Check(server.get(), testing::SSE_READ));
EXPECT_TRUE(nullptr == server->Accept(&accept_addr));
EXPECT_TRUE(accept_addr.IsNil());
@@ -236,15 +236,14 @@
// Client is connecting, outcome not yet determined.
EXPECT_EQ(Socket::CS_CONNECTING, client1->GetState());
- EXPECT_FALSE(sink.Check(client1.get(), webrtc::testing::SSE_OPEN));
- EXPECT_FALSE(sink.Check(client1.get(), webrtc::testing::SSE_CLOSE));
+ EXPECT_FALSE(sink.Check(client1.get(), testing::SSE_OPEN));
+ EXPECT_FALSE(sink.Check(client1.get(), testing::SSE_CLOSE));
// Server has pending connection, try to accept it (will fail).
EXPECT_THAT(
- webrtc::WaitUntil(
- [&] { return (sink.Check(server.get(), webrtc::testing::SSE_READ)); },
- ::testing::IsTrue()),
- webrtc::IsRtcOk());
+ WaitUntil([&] { return (sink.Check(server.get(), testing::SSE_READ)); },
+ ::testing::IsTrue()),
+ IsRtcOk());
// Simulate "::accept" returning an error.
SetFailAccept(true);
std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
@@ -252,7 +251,7 @@
ASSERT_TRUE(accept_addr.IsNil());
// Ensure no more pending server connections.
- EXPECT_FALSE(sink.Check(server.get(), webrtc::testing::SSE_READ));
+ EXPECT_FALSE(sink.Check(server.get(), testing::SSE_READ));
EXPECT_TRUE(nullptr == server->Accept(&accept_addr));
EXPECT_TRUE(accept_addr.IsNil());
@@ -263,15 +262,14 @@
// Client is connecting, outcome not yet determined.
EXPECT_EQ(Socket::CS_CONNECTING, client2->GetState());
- EXPECT_FALSE(sink.Check(client2.get(), webrtc::testing::SSE_OPEN));
- EXPECT_FALSE(sink.Check(client2.get(), webrtc::testing::SSE_CLOSE));
+ EXPECT_FALSE(sink.Check(client2.get(), testing::SSE_OPEN));
+ EXPECT_FALSE(sink.Check(client2.get(), testing::SSE_CLOSE));
// Server has pending connection, try to accept it (will succeed).
EXPECT_THAT(
- webrtc::WaitUntil(
- [&] { return (sink.Check(server.get(), webrtc::testing::SSE_READ)); },
- ::testing::IsTrue()),
- webrtc::IsRtcOk());
+ WaitUntil([&] { return (sink.Check(server.get(), testing::SSE_READ)); },
+ ::testing::IsTrue()),
+ IsRtcOk());
SetFailAccept(false);
std::unique_ptr<Socket> accepted2(server->Accept(&accept_addr));
ASSERT_TRUE(accepted2);
diff --git a/rtc_base/rate_tracker.cc b/rtc_base/rate_tracker.cc
index 83481c1..f6f4cf3 100644
--- a/rtc_base/rate_tracker.cc
+++ b/rtc_base/rate_tracker.cc
@@ -64,7 +64,7 @@
buckets_to_skip = bucket_count_ - current_bucket_;
milliseconds_to_skip = 0;
available_interval_milliseconds =
- webrtc::TimeDiff(current_time, initialization_time_milliseconds_);
+ TimeDiff(current_time, initialization_time_milliseconds_);
// Let one bucket interval pass after initialization before reporting.
if (available_interval_milliseconds < bucket_milliseconds_) {
return 0.0;
@@ -102,7 +102,7 @@
}
return static_cast<double>(total_sample_count_ * 1000) /
static_cast<double>(
- webrtc::TimeDiff(current_time, initialization_time_milliseconds_));
+ TimeDiff(current_time, initialization_time_milliseconds_));
}
int64_t RateTracker::TotalSampleCount() const {
@@ -139,7 +139,7 @@
}
int64_t RateTracker::Time() const {
- return webrtc::TimeMillis();
+ return TimeMillis();
}
void RateTracker::EnsureInitialized() {
diff --git a/rtc_base/rtc_certificate_generator_unittest.cc b/rtc_base/rtc_certificate_generator_unittest.cc
index a4388f5..06bb581 100644
--- a/rtc_base/rtc_certificate_generator_unittest.cc
+++ b/rtc_base/rtc_certificate_generator_unittest.cc
@@ -97,10 +97,9 @@
// posted to this thread (which is done by `EXPECT_TRUE_WAIT`).
EXPECT_FALSE(fixture_.GenerateAsyncCompleted());
EXPECT_FALSE(fixture_.certificate());
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return fixture_.GenerateAsyncCompleted(); },
+ EXPECT_THAT(WaitUntil([&] { return fixture_.GenerateAsyncCompleted(); },
::testing::IsTrue(), {.timeout = kGenerationTimeoutMs}),
- webrtc::IsRtcOk());
+ IsRtcOk());
EXPECT_TRUE(fixture_.certificate());
}
@@ -140,10 +139,9 @@
fixture_.generator()->GenerateCertificateAsync(invalid_params, std::nullopt,
fixture_.OnGenerated());
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return fixture_.GenerateAsyncCompleted(); },
+ EXPECT_THAT(WaitUntil([&] { return fixture_.GenerateAsyncCompleted(); },
::testing::IsTrue(), {.timeout = kGenerationTimeoutMs}),
- webrtc::IsRtcOk());
+ IsRtcOk());
EXPECT_FALSE(fixture_.certificate());
}
diff --git a/rtc_base/rtc_certificate_unittest.cc b/rtc_base/rtc_certificate_unittest.cc
index 67f7e2c..5233a80 100644
--- a/rtc_base/rtc_certificate_unittest.cc
+++ b/rtc_base/rtc_certificate_unittest.cc
@@ -68,7 +68,7 @@
// or later.
scoped_refptr<RTCCertificate> GenerateCertificateWithExpires(
uint64_t expires_s) const {
- RTC_CHECK(webrtc::IsValueInRangeForNumericType<time_t>(expires_s));
+ RTC_CHECK(IsValueInRangeForNumericType<time_t>(expires_s));
SSLIdentityParams params;
params.common_name = kTestCertCommonName;
diff --git a/rtc_base/socket_address.cc b/rtc_base/socket_address.cc
index 1e7d941..7c08bf4 100644
--- a/rtc_base/socket_address.cc
+++ b/rtc_base/socket_address.cc
@@ -65,11 +65,11 @@
}
bool SocketAddress::IsNil() const {
- return hostname_.empty() && webrtc::IPIsUnspec(ip_) && 0 == port_;
+ return hostname_.empty() && IPIsUnspec(ip_) && 0 == port_;
}
bool SocketAddress::IsComplete() const {
- return (!webrtc::IPIsAny(ip_)) && (0 != port_);
+ return (!IPIsAny(ip_)) && (0 != port_);
}
SocketAddress& SocketAddress::operator=(const SocketAddress& addr) {
@@ -97,7 +97,7 @@
void SocketAddress::SetIP(absl::string_view hostname) {
hostname_ = std::string(hostname);
- literal_ = webrtc::IPFromString(hostname, &ip_);
+ literal_ = IPFromString(hostname, &ip_);
if (!literal_) {
ip_ = IPAddress();
}
@@ -115,7 +115,7 @@
}
void SocketAddress::SetPort(int port) {
- port_ = webrtc::dchecked_cast<uint16_t>(port);
+ port_ = dchecked_cast<uint16_t>(port);
}
uint32_t SocketAddress::ip() const {
@@ -214,20 +214,20 @@
}
bool SocketAddress::IsAnyIP() const {
- return webrtc::IPIsAny(ip_);
+ return IPIsAny(ip_);
}
bool SocketAddress::IsLoopbackIP() const {
- return webrtc::IPIsLoopback(ip_) ||
- (webrtc::IPIsAny(ip_) && 0 == strcmp(hostname_.c_str(), "localhost"));
+ return IPIsLoopback(ip_) ||
+ (IPIsAny(ip_) && 0 == strcmp(hostname_.c_str(), "localhost"));
}
bool SocketAddress::IsPrivateIP() const {
- return webrtc::IPIsPrivate(ip_);
+ return IPIsPrivate(ip_);
}
bool SocketAddress::IsUnresolvedIP() const {
- return webrtc::IPIsUnspec(ip_) && !literal_ && !hostname_.empty();
+ return IPIsUnspec(ip_) && !literal_ && !hostname_.empty();
}
bool SocketAddress::operator==(const SocketAddress& addr) const {
@@ -240,8 +240,7 @@
// We only check hostnames if both IPs are ANY or unspecified. This matches
// EqualIPs().
- if ((webrtc::IPIsAny(ip_) || webrtc::IPIsUnspec(ip_)) &&
- hostname_ != addr.hostname_)
+ if ((IPIsAny(ip_) || IPIsUnspec(ip_)) && hostname_ != addr.hostname_)
return hostname_ < addr.hostname_;
return port_ < addr.port_;
@@ -249,8 +248,7 @@
bool SocketAddress::EqualIPs(const SocketAddress& addr) const {
return (ip_ == addr.ip_) &&
- ((!webrtc::IPIsAny(ip_) && !webrtc::IPIsUnspec(ip_)) ||
- (hostname_ == addr.hostname_));
+ ((!IPIsAny(ip_) && !IPIsUnspec(ip_)) || (hostname_ == addr.hostname_));
}
bool SocketAddress::EqualPorts(const SocketAddress& addr) const {
@@ -259,7 +257,7 @@
size_t SocketAddress::Hash() const {
size_t h = 0;
- h ^= webrtc::HashIP(ip_);
+ h ^= HashIP(ip_);
h ^= port_ | (port_ << 16);
return h;
}
@@ -271,8 +269,8 @@
return;
}
saddr->sin_family = AF_INET;
- saddr->sin_port = webrtc::HostToNetwork16(port_);
- if (webrtc::IPIsAny(ip_)) {
+ saddr->sin_port = HostToNetwork16(port_);
+ if (IPIsAny(ip_)) {
saddr->sin_addr.s_addr = INADDR_ANY;
} else {
saddr->sin_addr = ip_.ipv4_address();
@@ -282,8 +280,8 @@
bool SocketAddress::FromSockAddr(const sockaddr_in& saddr) {
if (saddr.sin_family != AF_INET)
return false;
- SetIP(webrtc::NetworkToHost32(saddr.sin_addr.s_addr));
- SetPort(webrtc::NetworkToHost16(saddr.sin_port));
+ SetIP(NetworkToHost32(saddr.sin_addr.s_addr));
+ SetPort(NetworkToHost16(saddr.sin_port));
literal_ = false;
return true;
}
@@ -297,13 +295,13 @@
if (addr->ss_family == AF_INET6) {
sockaddr_in6* saddr = reinterpret_cast<sockaddr_in6*>(addr);
saddr->sin6_addr = ip.ipv6_address();
- saddr->sin6_port = webrtc::HostToNetwork16(port);
+ saddr->sin6_port = HostToNetwork16(port);
saddr->sin6_scope_id = scope_id;
return sizeof(sockaddr_in6);
} else if (addr->ss_family == AF_INET) {
sockaddr_in* saddr = reinterpret_cast<sockaddr_in*>(addr);
saddr->sin_addr = ip.ipv4_address();
- saddr->sin_port = webrtc::HostToNetwork16(port);
+ saddr->sin_port = HostToNetwork16(port);
return sizeof(sockaddr_in);
}
return 0;
@@ -325,12 +323,12 @@
if (addr.ss_family == AF_INET) {
const sockaddr_in* saddr = reinterpret_cast<const sockaddr_in*>(&addr);
*out = SocketAddress(IPAddress(saddr->sin_addr),
- webrtc::NetworkToHost16(saddr->sin_port));
+ NetworkToHost16(saddr->sin_port));
return true;
} else if (addr.ss_family == AF_INET6) {
const sockaddr_in6* saddr = reinterpret_cast<const sockaddr_in6*>(&addr);
*out = SocketAddress(IPAddress(saddr->sin6_addr),
- webrtc::NetworkToHost16(saddr->sin6_port));
+ NetworkToHost16(saddr->sin6_port));
out->SetScopeID(saddr->sin6_scope_id);
return true;
}
diff --git a/rtc_base/socket_unittest.cc b/rtc_base/socket_unittest.cc
index c7fd137..4f5d219 100644
--- a/rtc_base/socket_unittest.cc
+++ b/rtc_base/socket_unittest.cc
@@ -52,12 +52,12 @@
namespace webrtc {
-using webrtc::testing::SSE_CLOSE;
-using webrtc::testing::SSE_ERROR;
-using webrtc::testing::SSE_OPEN;
-using webrtc::testing::SSE_READ;
-using webrtc::testing::SSE_WRITE;
-using webrtc::testing::StreamSink;
+using testing::SSE_CLOSE;
+using testing::SSE_ERROR;
+using testing::SSE_OPEN;
+using testing::SSE_READ;
+using testing::SSE_WRITE;
+using testing::StreamSink;
// Data size to be used in TcpInternal tests.
static const size_t kTcpInternalDataSize = 1024 * 1024; // bytes
@@ -253,7 +253,7 @@
// values on Windows, but an empty address of the same family on Linux/MacOS X.
bool IsUnspecOrEmptyIP(const IPAddress& address) {
#if !defined(WEBRTC_WIN)
- return webrtc::IPIsAny(address);
+ return IPIsAny(address);
#else
return address.family() == AF_UNSPEC;
#endif
@@ -294,10 +294,9 @@
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
// Server has pending connection, accept it.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
ASSERT_TRUE(accepted);
EXPECT_FALSE(accept_addr.IsNil());
@@ -309,9 +308,9 @@
EXPECT_EQ(client->GetLocalAddress(), accepted->GetRemoteAddress());
// Connected from client perspective, check the addresses are correct.
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CONNECTED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CONNECTED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_OPEN));
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
EXPECT_EQ(client->GetRemoteAddress(), server->GetLocalAddress());
@@ -348,10 +347,9 @@
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
// Server has pending connection, accept it.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
ASSERT_TRUE(accepted);
EXPECT_FALSE(accept_addr.IsNil());
@@ -363,9 +361,9 @@
EXPECT_EQ(client->GetLocalAddress(), accepted->GetRemoteAddress());
// Connected from client perspective, check the addresses are correct.
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CONNECTED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CONNECTED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_OPEN));
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
EXPECT_EQ(client->GetRemoteAddress(), server->GetLocalAddress());
@@ -394,9 +392,9 @@
EXPECT_EQ(0, client->Connect(bogus_addr));
// Wait for connection to fail (ECONNREFUSED).
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CLOSED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CLOSED)),
+ IsRtcOk());
EXPECT_FALSE(sink.Check(client.get(), SSE_OPEN));
EXPECT_TRUE(sink.Check(client.get(), SSE_ERROR));
EXPECT_TRUE(client->GetRemoteAddress().IsNil());
@@ -437,9 +435,9 @@
return;
}
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CLOSED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CLOSED)),
+ IsRtcOk());
EXPECT_FALSE(sink.Check(client.get(), SSE_OPEN));
EXPECT_TRUE(sink.Check(client.get(), SSE_ERROR));
EXPECT_TRUE(client->GetRemoteAddress().IsNil());
@@ -486,10 +484,9 @@
// Accept the original connection.
SocketAddress accept_addr;
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
ASSERT_TRUE(accepted);
EXPECT_FALSE(accept_addr.IsNil());
@@ -498,9 +495,9 @@
EXPECT_EQ(Socket::CS_CONNECTED, accepted->GetState());
EXPECT_EQ(server->GetLocalAddress(), accepted->GetLocalAddress());
EXPECT_EQ(client->GetLocalAddress(), accepted->GetRemoteAddress());
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CONNECTED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CONNECTED)),
+ IsRtcOk());
EXPECT_EQ(client->GetRemoteAddress(), server->GetLocalAddress());
EXPECT_EQ(client->GetRemoteAddress(), accepted->GetLocalAddress());
@@ -533,16 +530,15 @@
EXPECT_EQ(0, client->Connect(server->GetLocalAddress()));
// Close down the server while the socket is in the accept queue.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(server.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(server.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
server->Close();
// This should fail the connection for the client. Clean up.
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CLOSED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CLOSED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_ERROR));
client->Close();
}
@@ -567,10 +563,9 @@
EXPECT_EQ(0, client->Connect(server->GetLocalAddress()));
// Close down the client while the socket is in the accept queue.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(server.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(server.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
client->Close();
// The connection should still be able to be accepted.
@@ -580,9 +575,9 @@
EXPECT_EQ(Socket::CS_CONNECTED, accepted->GetState());
// The accepted socket should then close (possibly with err, timing-related)
- EXPECT_THAT(webrtc::WaitUntil([&] { return accepted->GetState(); },
- ::testing::Eq(Socket::CS_CLOSED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return accepted->GetState(); },
+ ::testing::Eq(Socket::CS_CLOSED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(accepted.get(), SSE_CLOSE) ||
sink.Check(accepted.get(), SSE_ERROR));
@@ -610,18 +605,17 @@
EXPECT_EQ(0, client->Connect(server->GetLocalAddress()));
// Accept connection.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
ASSERT_TRUE(accepted);
sink.Monitor(accepted.get());
// Both sides are now connected.
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CONNECTED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CONNECTED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_OPEN));
EXPECT_EQ(client->GetRemoteAddress(), accepted->GetLocalAddress());
EXPECT_EQ(accepted->GetRemoteAddress(), client->GetLocalAddress());
@@ -632,10 +626,9 @@
EXPECT_EQ(Socket::CS_CLOSED, accepted->GetState());
// Expect that the client is notified, and has not yet closed.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(client.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(client.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
EXPECT_EQ(Socket::CS_CONNECTED, client->GetState());
@@ -645,9 +638,9 @@
EXPECT_EQ('a', buffer[0]);
// Now we should close, but the remote address will remain.
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CLOSED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CLOSED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_CLOSE));
EXPECT_FALSE(client->GetRemoteAddress().IsAnyIP());
@@ -695,18 +688,17 @@
EXPECT_EQ(0, client->Connect(server->GetLocalAddress()));
// Accept connection.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
ASSERT_TRUE(accepted);
sink.Monitor(accepted.get());
// Both sides are now connected.
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CONNECTED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CONNECTED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_OPEN));
EXPECT_EQ(client->GetRemoteAddress(), accepted->GetLocalAddress());
EXPECT_EQ(accepted->GetRemoteAddress(), client->GetLocalAddress());
@@ -720,9 +712,9 @@
EXPECT_EQ(Socket::CS_CONNECTED, client->GetState());
// Now we should be closed and invalidated
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CLOSED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CLOSED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_CLOSE));
EXPECT_TRUE(Socket::CS_CLOSED == client->GetState());
}
@@ -760,9 +752,8 @@
// event.
SocketDeleter deleter(std::move(socket2));
socket1->SignalReadEvent.connect(&deleter, &SocketDeleter::Delete);
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return deleter.deleted(); }, ::testing::IsTrue()),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return deleter.deleted(); }, ::testing::IsTrue()),
+ IsRtcOk());
}
void SocketTest::SocketServerWaitInternal(const IPAddress& loopback) {
@@ -780,10 +771,9 @@
EXPECT_EQ(0, server->Listen(5));
EXPECT_EQ(0, client->Connect(server->GetLocalAddress()));
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
ASSERT_TRUE(accepted);
@@ -792,9 +782,9 @@
EXPECT_EQ(server->GetLocalAddress(), accepted->GetLocalAddress());
EXPECT_EQ(client->GetLocalAddress(), accepted->GetRemoteAddress());
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CONNECTED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CONNECTED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_OPEN));
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
EXPECT_EQ(client->GetRemoteAddress(), server->GetLocalAddress());
@@ -814,10 +804,9 @@
EXPECT_FALSE(sink.Check(accepted.get(), SSE_READ));
// But should signal when process_io is true.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(accepted.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(accepted.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
EXPECT_LT(0, accepted->Recv(buf, 1024, nullptr));
}
@@ -843,18 +832,17 @@
EXPECT_EQ(0, receiver->Connect(server->GetLocalAddress()));
// Accept connection which will be used for sending.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
std::unique_ptr<Socket> sender(server->Accept(&accept_addr));
ASSERT_TRUE(sender);
sink.Monitor(sender.get());
// Both sides are now connected.
- EXPECT_THAT(webrtc::WaitUntil([&] { return receiver->GetState(); },
- ::testing::Eq(Socket::CS_CONNECTED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return receiver->GetState(); },
+ ::testing::Eq(Socket::CS_CONNECTED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(receiver.get(), SSE_OPEN));
EXPECT_EQ(receiver->GetRemoteAddress(), sender->GetLocalAddress());
EXPECT_EQ(sender->GetRemoteAddress(), receiver->GetLocalAddress());
@@ -907,10 +895,10 @@
while (recv_buffer.size() < sent_size) {
if (!readable) {
// Wait until data is available.
- EXPECT_THAT(webrtc::WaitUntil(
- [&] { return sink.Check(receiver.get(), SSE_READ); },
- ::testing::IsTrue()),
- webrtc::IsRtcOk());
+ EXPECT_THAT(
+ WaitUntil([&] { return sink.Check(receiver.get(), SSE_READ); },
+ ::testing::IsTrue()),
+ IsRtcOk());
readable = true;
recv_called = false;
}
@@ -939,10 +927,9 @@
// Once all that we've sent has been received, expect to be able to send
// again.
if (!writable) {
- ASSERT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(sender.get(), SSE_WRITE); },
+ ASSERT_THAT(WaitUntil([&] { return sink.Check(sender.get(), SSE_WRITE); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
writable = true;
send_called = false;
}
@@ -955,9 +942,9 @@
// Close down.
sender->Close();
- EXPECT_THAT(webrtc::WaitUntil([&] { return receiver->GetState(); },
- ::testing::Eq(Socket::CS_CLOSED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return receiver->GetState(); },
+ ::testing::Eq(Socket::CS_CLOSED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(receiver.get(), SSE_CLOSE));
receiver->Close();
}
@@ -982,27 +969,25 @@
EXPECT_EQ(0, client->Connect(server->GetLocalAddress()));
// Accept connection.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
+ EXPECT_THAT(WaitUntil([&] { return (sink.Check(server.get(), SSE_READ)); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
ASSERT_TRUE(accepted);
sink.Monitor(accepted.get());
// Both sides are now connected.
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->GetState(); },
- ::testing::Eq(Socket::CS_CONNECTED)),
- webrtc::IsRtcOk());
+ EXPECT_THAT(WaitUntil([&] { return client->GetState(); },
+ ::testing::Eq(Socket::CS_CONNECTED)),
+ IsRtcOk());
EXPECT_TRUE(sink.Check(client.get(), SSE_OPEN));
EXPECT_EQ(client->GetRemoteAddress(), accepted->GetLocalAddress());
EXPECT_EQ(accepted->GetRemoteAddress(), client->GetLocalAddress());
// Expect a writable callback from the connect.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(accepted.get(), SSE_WRITE); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(accepted.get(), SSE_WRITE); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
// Fill the socket buffer.
char buf[1024 * 16] = {0};
@@ -1012,10 +997,9 @@
EXPECT_TRUE(accepted->IsBlocking());
// Wait until data is available.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(client.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(client.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
// Pull data.
for (int i = 0; i < sends; ++i) {
@@ -1023,10 +1007,9 @@
}
// Expect at least one additional writable callback.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(accepted.get(), SSE_WRITE); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(accepted.get(), SSE_WRITE); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
// Adding data in response to the writeable callback shouldn't cause infinite
// callbacks.
@@ -1046,7 +1029,7 @@
}
void SocketTest::UdpInternal(const IPAddress& loopback) {
- SocketAddress empty = webrtc::EmptySocketAddressWithFamily(loopback.family());
+ SocketAddress empty = EmptySocketAddressWithFamily(loopback.family());
// Test basic bind and connect behavior.
Socket* socket = socket_factory_->CreateSocket(loopback.family(), SOCK_DGRAM);
EXPECT_EQ(Socket::CS_CLOSED, socket->GetState());
@@ -1092,7 +1075,7 @@
}
void SocketTest::UdpReadyToSend(const IPAddress& loopback) {
- SocketAddress empty = webrtc::EmptySocketAddressWithFamily(loopback.family());
+ SocketAddress empty = EmptySocketAddressWithFamily(loopback.family());
// RFC 5737 - The blocks 192.0.2.0/24 (TEST-NET-1) ... are provided for use in
// documentation.
// RFC 3849 - 2001:DB8::/32 as a documentation-only prefix.
@@ -1133,9 +1116,9 @@
}
EXPECT_EQ(expected_error, error);
EXPECT_FALSE(client->ready_to_send());
- EXPECT_THAT(webrtc::WaitUntil([&] { return client->ready_to_send(); },
- ::testing::IsTrue()),
- webrtc::IsRtcOk());
+ EXPECT_THAT(
+ WaitUntil([&] { return client->ready_to_send(); }, ::testing::IsTrue()),
+ IsRtcOk());
RTC_LOG(LS_INFO) << "Got SignalReadyToSend";
}
@@ -1244,10 +1227,9 @@
socket->SendTo("foo", 3, address);
// Wait until data is available.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
Buffer buffer;
Socket::ReceiveBuffer receive_buffer_1(buffer);
ASSERT_GT(socket->RecvFrom(receive_buffer_1), 0);
@@ -1258,10 +1240,9 @@
int64_t send_time_2 = TimeMicros();
socket->SendTo("bar", 3, address);
// Wait until data is available.
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
Socket::ReceiveBuffer receive_buffer_2(buffer);
ASSERT_GT(socket->RecvFrom(receive_buffer_2), 0);
@@ -1274,7 +1255,7 @@
}
void SocketTest::UdpSocketRecvTimestampUseRtcEpoch(const IPAddress& loopback) {
- SocketAddress empty = webrtc::EmptySocketAddressWithFamily(loopback.family());
+ SocketAddress empty = EmptySocketAddressWithFamily(loopback.family());
std::unique_ptr<Socket> socket(
socket_factory_->CreateSocket(loopback.family(), SOCK_DGRAM));
ASSERT_EQ(socket->Bind(SocketAddress(loopback, 0)), 0);
@@ -1311,10 +1292,9 @@
Socket::ReceiveBuffer receive_buffer(buffer);
socket->SendTo("foo", 3, address);
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
ASSERT_GT(socket->RecvFrom(receive_buffer), 0);
EXPECT_EQ(receive_buffer.ecn, EcnMarking::kNotEct);
@@ -1322,28 +1302,25 @@
socket->SetOption(Socket::OPT_RECV_ECN, 1);
socket->SendTo("bar", 3, address);
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
ASSERT_GT(socket->RecvFrom(receive_buffer), 0);
EXPECT_EQ(receive_buffer.ecn, EcnMarking::kEct1);
socket->SetOption(Socket::OPT_SEND_ECN, 2); // Ect(0)
socket->SendTo("bar", 3, address);
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
ASSERT_GT(socket->RecvFrom(receive_buffer), 0);
EXPECT_EQ(receive_buffer.ecn, EcnMarking::kEct0);
socket->SetOption(Socket::OPT_SEND_ECN, 3); // Ce
socket->SendTo("bar", 3, address);
- EXPECT_THAT(
- webrtc::WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
+ EXPECT_THAT(WaitUntil([&] { return sink.Check(socket.get(), SSE_READ); },
::testing::IsTrue()),
- webrtc::IsRtcOk());
+ IsRtcOk());
ASSERT_GT(socket->RecvFrom(receive_buffer), 0);
EXPECT_EQ(receive_buffer.ecn, EcnMarking::kCe);
}
diff --git a/rtc_base/ssl_fingerprint.cc b/rtc_base/ssl_fingerprint.cc
index daca558..ca15d11 100644
--- a/rtc_base/ssl_fingerprint.cc
+++ b/rtc_base/ssl_fingerprint.cc
@@ -61,7 +61,7 @@
std::unique_ptr<SSLFingerprint> SSLFingerprint::CreateUniqueFromRfc4572(
absl::string_view algorithm,
absl::string_view fingerprint) {
- if (algorithm.empty() || !webrtc::IsFips180DigestAlgorithm(algorithm))
+ if (algorithm.empty() || !IsFips180DigestAlgorithm(algorithm))
return nullptr;
if (fingerprint.empty())
diff --git a/rtc_base/ssl_identity.cc b/rtc_base/ssl_identity.cc
index 9e16cb1..35930f8 100644
--- a/rtc_base/ssl_identity.cc
+++ b/rtc_base/ssl_identity.cc
@@ -108,7 +108,7 @@
if (bytes_left != 1) {
return -1;
}
- return webrtc::TmToSeconds(tm);
+ return TmToSeconds(tm);
}
//////////////////////////////////////////////////////////////////////
diff --git a/rtc_base/ssl_stream_adapter.cc b/rtc_base/ssl_stream_adapter.cc
index 02ee729..d02318b 100644
--- a/rtc_base/ssl_stream_adapter.cc
+++ b/rtc_base/ssl_stream_adapter.cc
@@ -86,7 +86,7 @@
std::unique_ptr<SSLStreamAdapter> SSLStreamAdapter::Create(
std::unique_ptr<StreamInterface> stream,
- absl::AnyInvocable<void(webrtc::SSLHandshakeError)> handshake_error,
+ absl::AnyInvocable<void(SSLHandshakeError)> handshake_error,
const FieldTrialsView* field_trials) {
return std::make_unique<OpenSSLStreamAdapter>(
std::move(stream), std::move(handshake_error), field_trials);
diff --git a/rtc_base/strings/string_builder_unittest.cc b/rtc_base/strings/string_builder_unittest.cc
index 44c6c4b..d04e0eb 100644
--- a/rtc_base/strings/string_builder_unittest.cc
+++ b/rtc_base/strings/string_builder_unittest.cc
@@ -20,7 +20,7 @@
TEST(SimpleStringBuilder, Limit) {
char sb_buf[10];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
EXPECT_EQ(0u, strlen(sb.str()));
// Test that for a SSB with a buffer size of 10, that we can write 9 chars
@@ -31,7 +31,7 @@
TEST(SimpleStringBuilder, NumbersAndChars) {
char sb_buf[100];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
sb << 1 << ':' << 2.1 << ":" << 2.2f << ':' << 78187493520ll << ':'
<< 78187493520ul;
EXPECT_EQ(0, strcmp(sb.str(), "1:2.1:2.2:78187493520:78187493520"));
@@ -39,7 +39,7 @@
TEST(SimpleStringBuilder, Format) {
char sb_buf[100];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
sb << "Here we go - ";
sb.AppendFormat("This is a hex formatted value: 0x%08llx", 3735928559ULL);
EXPECT_EQ(0,
@@ -49,7 +49,7 @@
TEST(SimpleStringBuilder, StdString) {
char sb_buf[100];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
std::string str = "does this work?";
sb << str;
EXPECT_EQ(str, sb.str());
@@ -61,7 +61,7 @@
TEST(SimpleStringBuilderDeathTest, BufferOverrunConstCharP) {
char sb_buf[4];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
const char* const msg = "This is just too much";
#if RTC_DCHECK_IS_ON
EXPECT_DEATH(sb << msg, "");
@@ -73,7 +73,7 @@
TEST(SimpleStringBuilderDeathTest, BufferOverrunStdString) {
char sb_buf[4];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
sb << 12;
const std::string msg = "Aw, come on!";
#if RTC_DCHECK_IS_ON
@@ -86,7 +86,7 @@
TEST(SimpleStringBuilderDeathTest, BufferOverrunInt) {
char sb_buf[4];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
constexpr int num = -12345;
#if RTC_DCHECK_IS_ON
EXPECT_DEATH(sb << num, "");
@@ -102,7 +102,7 @@
TEST(SimpleStringBuilderDeathTest, BufferOverrunDouble) {
char sb_buf[5];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
constexpr double num = 123.456;
#if RTC_DCHECK_IS_ON
EXPECT_DEATH(sb << num, "");
@@ -115,7 +115,7 @@
TEST(SimpleStringBuilderDeathTest, BufferOverrunConstCharPAlreadyFull) {
char sb_buf[4];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
sb << 123;
const char* const msg = "This is just too much";
#if RTC_DCHECK_IS_ON
@@ -128,7 +128,7 @@
TEST(SimpleStringBuilderDeathTest, BufferOverrunIntAlreadyFull) {
char sb_buf[4];
- webrtc::SimpleStringBuilder sb(sb_buf);
+ SimpleStringBuilder sb(sb_buf);
sb << "xyz";
constexpr int num = -12345;
#if RTC_DCHECK_IS_ON
@@ -145,7 +145,7 @@
// StringBuilder.
TEST(StringBuilder, Limit) {
- webrtc::StringBuilder sb;
+ StringBuilder sb;
EXPECT_EQ(0u, sb.str().size());
sb << "012345678";
@@ -153,7 +153,7 @@
}
TEST(StringBuilder, NumbersAndChars) {
- webrtc::StringBuilder sb;
+ StringBuilder sb;
sb << 1 << ":" << 2.1 << ":" << 2.2f << ":" << 78187493520ll << ":"
<< 78187493520ul;
EXPECT_THAT(sb.str(),
@@ -161,21 +161,21 @@
}
TEST(StringBuilder, Format) {
- webrtc::StringBuilder sb;
+ StringBuilder sb;
sb << "Here we go - ";
sb.AppendFormat("This is a hex formatted value: 0x%08llx", 3735928559ULL);
EXPECT_EQ(sb.str(), "Here we go - This is a hex formatted value: 0xdeadbeef");
}
TEST(StringBuilder, StdString) {
- webrtc::StringBuilder sb;
+ StringBuilder sb;
std::string str = "does this work?";
sb << str;
EXPECT_EQ(str, sb.str());
}
TEST(StringBuilder, Release) {
- webrtc::StringBuilder sb;
+ StringBuilder sb;
std::string str =
"This string has to be of a moderate length, or we might "
"run into problems with small object optimizations.";
@@ -190,7 +190,7 @@
}
TEST(StringBuilder, Reset) {
- webrtc::StringBuilder sb("abc");
+ StringBuilder sb("abc");
sb << "def";
EXPECT_EQ("abcdef", sb.str());
sb.Clear();
diff --git a/rtc_base/strong_alias_unittest.cc b/rtc_base/strong_alias_unittest.cc
index 711c805..c663cad 100644
--- a/rtc_base/strong_alias_unittest.cc
+++ b/rtc_base/strong_alias_unittest.cc
@@ -282,7 +282,7 @@
TYPED_TEST(StrongAliasTest, CanBeKeysInFlatMap) {
using FooAlias = StrongAlias<class FooTag, TypeParam>;
- webrtc::flat_map<FooAlias, std::string> map;
+ flat_map<FooAlias, std::string> map;
FooAlias k1(GetExampleValue<TypeParam>(0));
FooAlias k2(GetExampleValue<TypeParam>(1));
diff --git a/rtc_base/synchronization/mutex_unittest.cc b/rtc_base/synchronization/mutex_unittest.cc
index 06938a2..cafd24c 100644
--- a/rtc_base/synchronization/mutex_unittest.cc
+++ b/rtc_base/synchronization/mutex_unittest.cc
@@ -30,8 +30,6 @@
namespace webrtc {
namespace {
-using ::webrtc::Event;
-using ::webrtc::Thread;
constexpr int kNumThreads = 16;
diff --git a/rtc_base/synchronization/sequence_checker_internal.cc b/rtc_base/synchronization/sequence_checker_internal.cc
index 007acac..3b0a0b1 100644
--- a/rtc_base/synchronization/sequence_checker_internal.cc
+++ b/rtc_base/synchronization/sequence_checker_internal.cc
@@ -56,7 +56,7 @@
#if RTC_DCHECK_IS_ON
std::string SequenceCheckerImpl::ExpectationToString() const {
const TaskQueueBase* const current_queue = TaskQueueBase::Current();
- const webrtc::PlatformThreadRef current_thread = webrtc::CurrentThreadRef();
+ const PlatformThreadRef current_thread = CurrentThreadRef();
MutexLock scoped_lock(&lock_);
if (!attached_)
return "Checker currently not attached.";
@@ -68,7 +68,7 @@
// # Actual: TQ: 0x7fa8f0604190 SysQ: 0x7fa8f0604a30 Thread: 0x700006f1a000
// TaskQueue doesn't match
- webrtc::StringBuilder message;
+ StringBuilder message;
message.AppendFormat(
"# Expected: TQ: %p Thread: %p\n"
"# Actual: TQ: %p Thread: %p\n",
@@ -77,7 +77,7 @@
if ((valid_queue_ || current_queue) && valid_queue_ != current_queue) {
message << "TaskQueue doesn't match\n";
- } else if (!webrtc::IsThreadRefEqual(valid_thread_, current_thread)) {
+ } else if (!IsThreadRefEqual(valid_thread_, current_thread)) {
message << "Threads don't match\n";
}
diff --git a/rtc_base/task_queue_stdlib_unittest.cc b/rtc_base/task_queue_stdlib_unittest.cc
index c090b5e..ca27f82 100644
--- a/rtc_base/task_queue_stdlib_unittest.cc
+++ b/rtc_base/task_queue_stdlib_unittest.cc
@@ -25,7 +25,7 @@
namespace {
std::unique_ptr<TaskQueueFactory> CreateTaskQueueFactory(
- const webrtc::FieldTrialsView*) {
+ const FieldTrialsView*) {
return CreateTaskQueueStdlibFactory();
}
diff --git a/rtc_base/test_client.cc b/rtc_base/test_client.cc
index 3798c59..a204d1c 100644
--- a/rtc_base/test_client.cc
+++ b/rtc_base/test_client.cc
@@ -138,7 +138,7 @@
// advance time. Otherwise, ProcessMessages will work.
if (fake_clock_) {
for (int64_t start = TimeMillis(); TimeMillis() < start + ms;) {
- fake_clock_->AdvanceTime(webrtc::TimeDelta::Millis(1));
+ fake_clock_->AdvanceTime(TimeDelta::Millis(1));
};
} else {
Thread::Current()->ProcessMessages(1);
diff --git a/rtc_base/test_client_unittest.cc b/rtc_base/test_client_unittest.cc
index c585a8e..4a87ae3 100644
--- a/rtc_base/test_client_unittest.cc
+++ b/rtc_base/test_client_unittest.cc
@@ -57,7 +57,7 @@
void TestTcpInternal(const SocketAddress& loopback) {
PhysicalSocketServer socket_server;
AutoSocketServerThread main_thread(&socket_server);
- webrtc::TestEchoServer server(&main_thread, loopback);
+ TestEchoServer server(&main_thread, loopback);
Socket* socket = socket_server.CreateSocket(loopback.family(), SOCK_STREAM);
std::unique_ptr<AsyncTCPSocket> tcp_socket = absl::WrapUnique(
diff --git a/rtc_base/thread.cc b/rtc_base/thread.cc
index 2491335..6599615 100644
--- a/rtc_base/thread.cc
+++ b/rtc_base/thread.cc
@@ -88,8 +88,6 @@
namespace webrtc {
-using ::webrtc::MutexLock;
-using ::webrtc::TimeDelta;
ThreadManager* ThreadManager::Instance() {
static ThreadManager* const thread_manager = new ThreadManager();
@@ -499,7 +497,7 @@
// Add to the priority queue. Gets sorted soonest first.
// Signal for the multiplexer to return.
- int64_t delay_ms = delay.RoundUpTo(webrtc::TimeDelta::Millis(1)).ms<int>();
+ int64_t delay_ms = delay.RoundUpTo(TimeDelta::Millis(1)).ms<int>();
int64_t run_time_ms = TimeAfter(delay_ms);
{
MutexLock lock(&mutex_);
@@ -523,7 +521,7 @@
return 0;
if (!delayed_messages_.empty()) {
- int delay = webrtc::TimeUntil(delayed_messages_.top().run_time_ms);
+ int delay = TimeUntil(delayed_messages_.top().run_time_ms);
if (delay < 0)
delay = 0;
return delay;
@@ -535,10 +533,10 @@
void Thread::Dispatch(absl::AnyInvocable<void() &&> task) {
TRACE_EVENT0("webrtc", "Thread::Dispatch");
RTC_DCHECK_RUN_ON(this);
- int64_t start_time = webrtc::TimeMillis();
+ int64_t start_time = TimeMillis();
std::move(task)();
- int64_t end_time = webrtc::TimeMillis();
- int64_t diff = webrtc::TimeDiff(end_time, start_time);
+ int64_t end_time = TimeMillis();
+ int64_t diff = TimeDiff(end_time, start_time);
if (diff >= dispatch_warning_ms_) {
RTC_LOG(LS_INFO) << "Message to " << name() << " took " << diff
<< "ms to dispatch.";
@@ -850,9 +848,9 @@
// Using ProcessMessages with a custom clock for testing and a time greater
// than 0 doesn't work, since it's not guaranteed to advance the custom
// clock's time, and may get stuck in an infinite loop.
- RTC_DCHECK(webrtc::GetClockForTesting() == nullptr || cmsLoop == 0 ||
+ RTC_DCHECK(GetClockForTesting() == nullptr || cmsLoop == 0 ||
cmsLoop == kForever);
- int64_t msEnd = (kForever == cmsLoop) ? 0 : webrtc::TimeAfter(cmsLoop);
+ int64_t msEnd = (kForever == cmsLoop) ? 0 : TimeAfter(cmsLoop);
int cmsNext = cmsLoop;
while (true) {
@@ -865,7 +863,7 @@
Dispatch(std::move(task));
if (cmsLoop != kForever) {
- cmsNext = static_cast<int>(webrtc::TimeUntil(msEnd));
+ cmsNext = static_cast<int>(TimeUntil(msEnd));
if (cmsNext < 0)
return true;
}
diff --git a/rtc_base/thread_unittest.cc b/rtc_base/thread_unittest.cc
index 9c417fe..24e7106 100644
--- a/rtc_base/thread_unittest.cc
+++ b/rtc_base/thread_unittest.cc
@@ -53,7 +53,6 @@
namespace {
using ::testing::ElementsAre;
-using ::webrtc::TimeDelta;
// Generates a sequence of numbers (collaboratively).
class TestGenerator {
@@ -206,7 +205,7 @@
// (thread_unittest.cc:262): Blocking TestBody: total=2 (actual=1, could=1)
RTC_LOG_THREAD_BLOCK_COUNT();
#if RTC_DCHECK_IS_ON
- webrtc::Thread::ScopedCountBlockingCalls blocked_calls(
+ Thread::ScopedCountBlockingCalls blocked_calls(
[&](uint32_t actual_block, uint32_t could_block) {
EXPECT_EQ(1u, actual_block);
EXPECT_EQ(1u, could_block);
@@ -242,10 +241,10 @@
#if RTC_DCHECK_IS_ON
TEST(ThreadTest, CountBlockingCallsOneCallback) {
- webrtc::AutoThread current;
+ AutoThread current;
bool was_called_back = false;
{
- webrtc::Thread::ScopedCountBlockingCalls blocked_calls(
+ Thread::ScopedCountBlockingCalls blocked_calls(
[&](uint32_t actual_block, uint32_t could_block) {
was_called_back = true;
});
@@ -255,10 +254,10 @@
}
TEST(ThreadTest, CountBlockingCallsSkipCallback) {
- webrtc::AutoThread current;
+ AutoThread current;
bool was_called_back = false;
{
- webrtc::Thread::ScopedCountBlockingCalls blocked_calls(
+ Thread::ScopedCountBlockingCalls blocked_calls(
[&](uint32_t actual_block, uint32_t could_block) {
was_called_back = true;
});
@@ -309,7 +308,7 @@
#if (!defined(NDEBUG) || RTC_DCHECK_IS_ON)
TEST(ThreadTest, InvokeToThreadAllowedReturnsTrueWithoutPolicies) {
- webrtc::AutoThread main_thread;
+ AutoThread main_thread;
// Create and start the thread.
auto thread1 = Thread::CreateWithSocketServer();
auto thread2 = Thread::CreateWithSocketServer();
@@ -320,7 +319,7 @@
}
TEST(ThreadTest, InvokeAllowedWhenThreadsAdded) {
- webrtc::AutoThread main_thread;
+ AutoThread main_thread;
// Create and start the thread.
auto thread1 = Thread::CreateWithSocketServer();
auto thread2 = Thread::CreateWithSocketServer();
@@ -339,7 +338,7 @@
}
TEST(ThreadTest, InvokesDisallowedWhenDisallowAllInvokes) {
- webrtc::AutoThread main_thread;
+ AutoThread main_thread;
// Create and start the thread.
auto thread1 = Thread::CreateWithSocketServer();
auto thread2 = Thread::CreateWithSocketServer();
@@ -469,9 +468,9 @@
SetAndInvokeSet(&async_invoked, thread2, out);
});
- EXPECT_THAT(webrtc::WaitUntil([&] { return async_invoked.Get(); },
- ::testing::IsTrue()),
- webrtc::IsRtcOk());
+ EXPECT_THAT(
+ WaitUntil([&] { return async_invoked.Get(); }, ::testing::IsTrue()),
+ IsRtcOk());
}
};
@@ -486,9 +485,9 @@
});
EXPECT_FALSE(thread_a_called.Get());
- EXPECT_THAT(webrtc::WaitUntil([&] { return thread_a_called.Get(); },
- ::testing::IsTrue()),
- webrtc::IsRtcOk());
+ EXPECT_THAT(
+ WaitUntil([&] { return thread_a_called.Get(); }, ::testing::IsTrue()),
+ IsRtcOk());
}
static void DelayedPostsWithIdenticalTimesAreProcessedInFifoOrder(
@@ -858,7 +857,6 @@
return std::make_unique<ThreadFactory>();
}
-using ::webrtc::TaskQueueTest;
INSTANTIATE_TEST_SUITE_P(RtcThread,
TaskQueueTest,
diff --git a/rtc_base/unique_id_generator.cc b/rtc_base/unique_id_generator.cc
index f817dec..6bd47d3 100644
--- a/rtc_base/unique_id_generator.cc
+++ b/rtc_base/unique_id_generator.cc
@@ -60,7 +60,7 @@
// TODO(webrtc:13579): remove string copy here once absl::string_view version
// of StringToNumber is available.
std::optional<uint32_t> int_value =
- webrtc::StringToNumber<uint32_t>(std::string(value));
+ StringToNumber<uint32_t>(std::string(value));
// The underlying generator works for uint32_t values, so if the provided
// value is not a uint32_t it will never be generated anyway.
if (int_value.has_value()) {
diff --git a/rtc_base/unique_id_generator_unittest.cc b/rtc_base/unique_id_generator_unittest.cc
index 85ed5d4..661ba58 100644
--- a/rtc_base/unique_id_generator_unittest.cc
+++ b/rtc_base/unique_id_generator_unittest.cc
@@ -173,7 +173,7 @@
// Tests that it's OK to construct the generator in one execution environment
// (thread/task queue) but use it in another.
TEST(UniqueNumberGenerator, UsedOnSecondaryThread) {
- const auto* current_tq = webrtc::TaskQueueBase::Current();
+ const auto* current_tq = TaskQueueBase::Current();
// Construct the generator before `fake_task_queue` to ensure that it is
// constructed in a different execution environment than what
// `fake_task_queue` will represent.
@@ -181,7 +181,7 @@
FakeTaskQueue fake_task_queue;
// Sanity check to make sure we're in a different runtime environment.
- ASSERT_NE(current_tq, webrtc::TaskQueueBase::Current());
+ ASSERT_NE(current_tq, TaskQueueBase::Current());
// Generating an id should be fine in this context.
generator.Generate();
diff --git a/rtc_base/virtual_socket_server.cc b/rtc_base/virtual_socket_server.cc
index 9fad9df..20ae789 100644
--- a/rtc_base/virtual_socket_server.cc
+++ b/rtc_base/virtual_socket_server.cc
@@ -31,9 +31,6 @@
namespace webrtc {
-using ::webrtc::MutexLock;
-using ::webrtc::TaskQueueBase;
-using ::webrtc::TimeDelta;
#if defined(WEBRTC_WIN)
const in_addr kInitialNextIPv4 = {{{0x01, 0, 0, 0}}};
@@ -550,7 +547,7 @@
// If we have not been assigned a local port, then get one.
if (local_addr_.IsNil()) {
local_addr_ = server_->AssignBindAddress(
- webrtc::EmptySocketAddressWithFamily(addr.ipaddr().family()));
+ EmptySocketAddressWithFamily(addr.ipaddr().family()));
int result = server_->Bind(this, local_addr_);
if (result != 0) {
local_addr_.Clear();
@@ -681,8 +678,7 @@
IPAddress VirtualSocketServer::GetNextIP(int family) {
if (family == AF_INET) {
IPAddress next_ip(next_ipv4_);
- next_ipv4_.s_addr =
- webrtc::HostToNetwork32(webrtc::NetworkToHost32(next_ipv4_.s_addr) + 1);
+ next_ipv4_.s_addr = HostToNetwork32(NetworkToHost32(next_ipv4_.s_addr) + 1);
return next_ip;
} else if (family == AF_INET6) {
IPAddress next_ip(next_ipv6_);
@@ -791,7 +787,7 @@
const SocketAddress& addr) {
RTC_DCHECK(nullptr != socket);
// Address must be completely specified at this point
- RTC_DCHECK(!webrtc::IPIsUnspec(addr.ipaddr()));
+ RTC_DCHECK(!IPIsUnspec(addr.ipaddr()));
RTC_DCHECK(addr.port() != 0);
// Normalize the address (turns v6-mapped addresses into v4-addresses).
@@ -803,7 +799,7 @@
SocketAddress VirtualSocketServer::AssignBindAddress(
const SocketAddress& app_addr) {
- RTC_DCHECK(!webrtc::IPIsUnspec(app_addr.ipaddr()));
+ RTC_DCHECK(!IPIsUnspec(app_addr.ipaddr()));
// Normalize the IP.
SocketAddress addr;
@@ -840,12 +836,12 @@
}
IPAddress default_ip = GetDefaultSourceAddress(addr.ipaddr().family());
- if (!webrtc::IPIsUnspec(default_ip) && addr.ipaddr() == default_ip) {
+ if (!IPIsUnspec(default_ip) && addr.ipaddr() == default_ip) {
// If we can't find a binding for the packet which is sent to the interface
// corresponding to the default route, it should match a binding with the
// correct port to the any address.
SocketAddress sock_addr =
- webrtc::EmptySocketAddressWithFamily(addr.ipaddr().family());
+ EmptySocketAddressWithFamily(addr.ipaddr().family());
sock_addr.SetPort(addr.port());
return LookupBinding(sock_addr);
}
@@ -1096,7 +1092,7 @@
// route.
SocketAddress sender_addr = sender->GetLocalAddress();
IPAddress default_ip = GetDefaultSourceAddress(sender_addr.ipaddr().family());
- if (sender_addr.IsAnyIP() && !webrtc::IPIsUnspec(default_ip)) {
+ if (sender_addr.IsAnyIP() && !IPIsUnspec(default_ip)) {
sender_addr.SetIP(default_ip);
}
@@ -1285,15 +1281,13 @@
// If ip1 is IPv4 and ip2 is :: and ip2 is not IPV6_V6ONLY.
int remote_v6_only = 0;
remote->GetOption(Socket::OPT_IPV6_V6ONLY, &remote_v6_only);
- if (local_ip.family() == AF_INET && !remote_v6_only &&
- webrtc::IPIsAny(remote_ip)) {
+ if (local_ip.family() == AF_INET && !remote_v6_only && IPIsAny(remote_ip)) {
return true;
}
// Same check, backwards.
int local_v6_only = 0;
local->GetOption(Socket::OPT_IPV6_V6ONLY, &local_v6_only);
- if (remote_ip.family() == AF_INET && !local_v6_only &&
- webrtc::IPIsAny(local_ip)) {
+ if (remote_ip.family() == AF_INET && !local_v6_only && IPIsAny(local_ip)) {
return true;
}
@@ -1319,7 +1313,7 @@
return IPAddress();
}
void VirtualSocketServer::SetDefaultSourceAddress(const IPAddress& from_addr) {
- RTC_DCHECK(!webrtc::IPIsAny(from_addr));
+ RTC_DCHECK(!IPIsAny(from_addr));
if (from_addr.family() == AF_INET) {
default_source_address_v4_ = from_addr;
} else if (from_addr.family() == AF_INET6) {
diff --git a/rtc_base/virtual_socket_unittest.cc b/rtc_base/virtual_socket_unittest.cc
index c05f8d8..c623730 100644
--- a/rtc_base/virtual_socket_unittest.cc
+++ b/rtc_base/virtual_socket_unittest.cc
@@ -42,24 +42,24 @@
namespace webrtc {
namespace {
-using ::webrtc::testing::SSE_CLOSE;
-using ::webrtc::testing::SSE_ERROR;
-using ::webrtc::testing::SSE_OPEN;
-using ::webrtc::testing::SSE_READ;
-using ::webrtc::testing::SSE_WRITE;
-using ::webrtc::testing::StreamSink;
+using testing::SSE_CLOSE;
+using testing::SSE_ERROR;
+using testing::SSE_OPEN;
+using testing::SSE_READ;
+using testing::SSE_WRITE;
+using testing::StreamSink;
// Sends at a constant rate but with random packet sizes.
struct Sender {
- Sender(webrtc::Thread* th, webrtc::Socket* s, uint32_t rt)
+ Sender(Thread* th, Socket* s, uint32_t rt)
: thread(th),
- socket(std::make_unique<webrtc::AsyncUDPSocket>(s)),
+ socket(std::make_unique<AsyncUDPSocket>(s)),
rate(rt),
count(0) {
- last_send = webrtc::TimeMillis();
+ last_send = TimeMillis();
periodic = RepeatingTaskHandle::DelayedStart(thread, NextDelay(), [this] {
- int64_t cur_time = webrtc::TimeMillis();
+ int64_t cur_time = TimeMillis();
int64_t delay = cur_time - last_send;
uint32_t size =
std::clamp<uint32_t>(rate * delay / 1000, sizeof(uint32_t), 4096);
@@ -77,8 +77,8 @@
return TimeDelta::Seconds(1) * size / rate;
}
- webrtc::Thread* thread;
- std::unique_ptr<webrtc::AsyncUDPSocket> socket;
+ Thread* thread;
+ std::unique_ptr<AsyncUDPSocket> socket;
AsyncSocketPacketOptions options;
RepeatingTaskHandle periodic;
uint32_t rate; // bytes per second
@@ -88,9 +88,9 @@
};
struct Receiver : public sigslot::has_slots<> {
- Receiver(webrtc::Thread* th, webrtc::Socket* s, uint32_t bw)
+ Receiver(Thread* th, Socket* s, uint32_t bw)
: thread(th),
- socket(std::make_unique<webrtc::AsyncUDPSocket>(s)),
+ socket(std::make_unique<AsyncUDPSocket>(s)),
bandwidth(bw),
count(0),
sec_count(0),
@@ -115,8 +115,7 @@
~Receiver() override { periodic.Stop(); }
- void OnReadPacket(webrtc::AsyncPacketSocket* s,
- const ReceivedIpPacket& packet) {
+ void OnReadPacket(AsyncPacketSocket* s, const ReceivedIpPacket& packet) {
ASSERT_EQ(socket.get(), s);
ASSERT_GE(packet.payload().size(), 4U);
@@ -125,15 +124,15 @@
uint32_t send_time =
*reinterpret_cast<const uint32_t*>(packet.payload().data());
- uint32_t recv_time = webrtc::TimeMillis();
+ uint32_t recv_time = TimeMillis();
uint32_t delay = recv_time - send_time;
sum += delay;
sum_sq += delay * delay;
samples += 1;
}
- webrtc::Thread* thread;
- std::unique_ptr<webrtc::AsyncUDPSocket> socket;
+ Thread* thread;
+ std::unique_ptr<AsyncUDPSocket> socket;
uint32_t bandwidth;
RepeatingTaskHandle periodic;
size_t count;
@@ -149,14 +148,14 @@
VirtualSocketServerTest()
: ss_(&fake_clock_),
thread_(&ss_),
- kIPv4AnyAddress(webrtc::IPAddress(INADDR_ANY), 0),
- kIPv6AnyAddress(webrtc::IPAddress(in6addr_any), 0) {}
+ kIPv4AnyAddress(IPAddress(INADDR_ANY), 0),
+ kIPv6AnyAddress(IPAddress(in6addr_any), 0) {}
- void CheckPortIncrementalization(const webrtc::SocketAddress& post,
- const webrtc::SocketAddress& pre) {
+ void CheckPortIncrementalization(const SocketAddress& post,
+ const SocketAddress& pre) {
EXPECT_EQ(post.port(), pre.port() + 1);
- webrtc::IPAddress post_ip = post.ipaddr();
- webrtc::IPAddress pre_ip = pre.ipaddr();
+ IPAddress post_ip = post.ipaddr();
+ IPAddress pre_ip = pre.ipaddr();
EXPECT_EQ(pre_ip.family(), post_ip.family());
if (post_ip.family() == AF_INET) {
in_addr pre_ipv4 = pre_ip.ipv4_address();
@@ -174,79 +173,72 @@
// Test a client can bind to the any address, and all sent packets will have
// the default source address. Also, it can receive packets sent to the
// default address.
- void TestDefaultSourceAddress(const webrtc::IPAddress& default_address) {
+ void TestDefaultSourceAddress(const IPAddress& default_address) {
ss_.SetDefaultSourceAddress(default_address);
// Create client1 bound to the any address.
- webrtc::Socket* socket =
- ss_.CreateSocket(default_address.family(), SOCK_DGRAM);
- socket->Bind(
- webrtc::EmptySocketAddressWithFamily(default_address.family()));
- webrtc::SocketAddress client1_any_addr = socket->GetLocalAddress();
+ Socket* socket = ss_.CreateSocket(default_address.family(), SOCK_DGRAM);
+ socket->Bind(EmptySocketAddressWithFamily(default_address.family()));
+ SocketAddress client1_any_addr = socket->GetLocalAddress();
EXPECT_TRUE(client1_any_addr.IsAnyIP());
- auto client1 = std::make_unique<webrtc::TestClient>(
- std::make_unique<webrtc::AsyncUDPSocket>(socket), &fake_clock_);
+ auto client1 = std::make_unique<TestClient>(
+ std::make_unique<AsyncUDPSocket>(socket), &fake_clock_);
// Create client2 bound to the address route.
- webrtc::Socket* socket2 =
- ss_.CreateSocket(default_address.family(), SOCK_DGRAM);
- socket2->Bind(webrtc::SocketAddress(default_address, 0));
- webrtc::SocketAddress client2_addr = socket2->GetLocalAddress();
+ Socket* socket2 = ss_.CreateSocket(default_address.family(), SOCK_DGRAM);
+ socket2->Bind(SocketAddress(default_address, 0));
+ SocketAddress client2_addr = socket2->GetLocalAddress();
EXPECT_FALSE(client2_addr.IsAnyIP());
- auto client2 = std::make_unique<webrtc::TestClient>(
- std::make_unique<webrtc::AsyncUDPSocket>(socket2), &fake_clock_);
+ auto client2 = std::make_unique<TestClient>(
+ std::make_unique<AsyncUDPSocket>(socket2), &fake_clock_);
// Client1 sends to client2, client2 should see the default address as
// client1's address.
- webrtc::SocketAddress client1_addr;
+ SocketAddress client1_addr;
EXPECT_EQ(6, client1->SendTo("bizbaz", 6, client2_addr));
EXPECT_TRUE(client2->CheckNextPacket("bizbaz", 6, &client1_addr));
EXPECT_EQ(client1_addr,
- webrtc::SocketAddress(default_address, client1_any_addr.port()));
+ SocketAddress(default_address, client1_any_addr.port()));
// Client2 can send back to client1's default address.
EXPECT_EQ(3, client2->SendTo("foo", 3, client1_addr));
EXPECT_TRUE(client1->CheckNextPacket("foo", 3, &client2_addr));
}
- void BasicTest(const webrtc::SocketAddress& initial_addr) {
- webrtc::Socket* socket =
- ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
+ void BasicTest(const SocketAddress& initial_addr) {
+ Socket* socket = ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
socket->Bind(initial_addr);
- webrtc::SocketAddress server_addr = socket->GetLocalAddress();
+ SocketAddress server_addr = socket->GetLocalAddress();
// Make sure VSS didn't switch families on us.
EXPECT_EQ(server_addr.family(), initial_addr.family());
- auto client1 = std::make_unique<webrtc::TestClient>(
- std::make_unique<webrtc::AsyncUDPSocket>(socket), &fake_clock_);
- webrtc::Socket* socket2 =
- ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
- auto client2 = std::make_unique<webrtc::TestClient>(
- std::make_unique<webrtc::AsyncUDPSocket>(socket2), &fake_clock_);
+ auto client1 = std::make_unique<TestClient>(
+ std::make_unique<AsyncUDPSocket>(socket), &fake_clock_);
+ Socket* socket2 = ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
+ auto client2 = std::make_unique<TestClient>(
+ std::make_unique<AsyncUDPSocket>(socket2), &fake_clock_);
- webrtc::SocketAddress client2_addr;
+ SocketAddress client2_addr;
EXPECT_EQ(3, client2->SendTo("foo", 3, server_addr));
EXPECT_TRUE(client1->CheckNextPacket("foo", 3, &client2_addr));
- webrtc::SocketAddress client1_addr;
+ SocketAddress client1_addr;
EXPECT_EQ(6, client1->SendTo("bizbaz", 6, client2_addr));
EXPECT_TRUE(client2->CheckNextPacket("bizbaz", 6, &client1_addr));
EXPECT_EQ(client1_addr, server_addr);
- webrtc::SocketAddress empty =
- webrtc::EmptySocketAddressWithFamily(initial_addr.family());
+ SocketAddress empty = EmptySocketAddressWithFamily(initial_addr.family());
for (int i = 0; i < 10; i++) {
- client2 = std::make_unique<webrtc::TestClient>(
- absl::WrapUnique(webrtc::AsyncUDPSocket::Create(&ss_, empty)),
- &fake_clock_);
+ client2 = std::make_unique<TestClient>(
+ absl::WrapUnique(AsyncUDPSocket::Create(&ss_, empty)), &fake_clock_);
- webrtc::SocketAddress next_client2_addr;
+ SocketAddress next_client2_addr;
EXPECT_EQ(3, client2->SendTo("foo", 3, server_addr));
EXPECT_TRUE(client1->CheckNextPacket("foo", 3, &next_client2_addr));
CheckPortIncrementalization(next_client2_addr, client2_addr);
// EXPECT_EQ(next_client2_addr.port(), client2_addr.port() + 1);
- webrtc::SocketAddress server_addr2;
+ SocketAddress server_addr2;
EXPECT_EQ(6, client1->SendTo("bizbaz", 6, next_client2_addr));
EXPECT_TRUE(client2->CheckNextPacket("bizbaz", 6, &server_addr2));
EXPECT_EQ(server_addr2, server_addr);
@@ -256,28 +248,28 @@
}
// initial_addr should be made from either INADDR_ANY or in6addr_any.
- void ConnectTest(const webrtc::SocketAddress& initial_addr) {
+ void ConnectTest(const SocketAddress& initial_addr) {
StreamSink sink;
- webrtc::SocketAddress accept_addr;
- const webrtc::SocketAddress kEmptyAddr =
- webrtc::EmptySocketAddressWithFamily(initial_addr.family());
+ SocketAddress accept_addr;
+ const SocketAddress kEmptyAddr =
+ EmptySocketAddressWithFamily(initial_addr.family());
// Create client
- std::unique_ptr<webrtc::Socket> client =
+ std::unique_ptr<Socket> client =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(client.get());
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(client->GetState(), Socket::CS_CLOSED);
EXPECT_TRUE(client->GetLocalAddress().IsNil());
// Create server
- std::unique_ptr<webrtc::Socket> server =
+ std::unique_ptr<Socket> server =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(server.get());
EXPECT_NE(0, server->Listen(5)); // Bind required
EXPECT_EQ(0, server->Bind(initial_addr));
EXPECT_EQ(server->GetLocalAddress().family(), initial_addr.family());
EXPECT_EQ(0, server->Listen(5));
- EXPECT_EQ(server->GetState(), webrtc::Socket::CS_CONNECTING);
+ EXPECT_EQ(server->GetState(), Socket::CS_CONNECTING);
// No pending server connections
EXPECT_FALSE(sink.Check(server.get(), SSE_READ));
@@ -291,53 +283,53 @@
EXPECT_NE(client->GetLocalAddress(), server->GetLocalAddress());
// Client is connecting
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CONNECTING);
+ EXPECT_EQ(client->GetState(), Socket::CS_CONNECTING);
EXPECT_FALSE(sink.Check(client.get(), SSE_OPEN));
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
ss_.ProcessMessagesUntilIdle();
// Client still connecting
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CONNECTING);
+ EXPECT_EQ(client->GetState(), Socket::CS_CONNECTING);
EXPECT_FALSE(sink.Check(client.get(), SSE_OPEN));
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
// Server has pending connection
EXPECT_TRUE(sink.Check(server.get(), SSE_READ));
- std::unique_ptr<webrtc::Socket> accepted =
+ std::unique_ptr<Socket> accepted =
absl::WrapUnique(server->Accept(&accept_addr));
EXPECT_TRUE(nullptr != accepted);
EXPECT_NE(accept_addr, kEmptyAddr);
EXPECT_EQ(accepted->GetRemoteAddress(), accept_addr);
- EXPECT_EQ(accepted->GetState(), webrtc::Socket::CS_CONNECTED);
+ EXPECT_EQ(accepted->GetState(), Socket::CS_CONNECTED);
EXPECT_EQ(accepted->GetLocalAddress(), server->GetLocalAddress());
EXPECT_EQ(accepted->GetRemoteAddress(), client->GetLocalAddress());
ss_.ProcessMessagesUntilIdle();
// Client has connected
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CONNECTED);
+ EXPECT_EQ(client->GetState(), Socket::CS_CONNECTED);
EXPECT_TRUE(sink.Check(client.get(), SSE_OPEN));
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
EXPECT_EQ(client->GetRemoteAddress(), server->GetLocalAddress());
EXPECT_EQ(client->GetRemoteAddress(), accepted->GetLocalAddress());
}
- void ConnectToNonListenerTest(const webrtc::SocketAddress& initial_addr) {
+ void ConnectToNonListenerTest(const SocketAddress& initial_addr) {
StreamSink sink;
- webrtc::SocketAddress accept_addr;
- const webrtc::SocketAddress nil_addr;
- const webrtc::SocketAddress empty_addr =
- webrtc::EmptySocketAddressWithFamily(initial_addr.family());
+ SocketAddress accept_addr;
+ const SocketAddress nil_addr;
+ const SocketAddress empty_addr =
+ EmptySocketAddressWithFamily(initial_addr.family());
// Create client
- std::unique_ptr<webrtc::Socket> client =
+ std::unique_ptr<Socket> client =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(client.get());
// Create server
- std::unique_ptr<webrtc::Socket> server =
+ std::unique_ptr<Socket> server =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(server.get());
EXPECT_EQ(0, server->Bind(initial_addr));
@@ -353,23 +345,23 @@
EXPECT_EQ(accept_addr, nil_addr);
// Connection failed
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(client->GetState(), Socket::CS_CLOSED);
EXPECT_FALSE(sink.Check(client.get(), SSE_OPEN));
EXPECT_TRUE(sink.Check(client.get(), SSE_ERROR));
EXPECT_EQ(client->GetRemoteAddress(), nil_addr);
}
- void CloseDuringConnectTest(const webrtc::SocketAddress& initial_addr) {
+ void CloseDuringConnectTest(const SocketAddress& initial_addr) {
StreamSink sink;
- webrtc::SocketAddress accept_addr;
- const webrtc::SocketAddress empty_addr =
- webrtc::EmptySocketAddressWithFamily(initial_addr.family());
+ SocketAddress accept_addr;
+ const SocketAddress empty_addr =
+ EmptySocketAddressWithFamily(initial_addr.family());
// Create client and server
- std::unique_ptr<webrtc::Socket> client(
+ std::unique_ptr<Socket> client(
ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(client.get());
- std::unique_ptr<webrtc::Socket> server(
+ std::unique_ptr<Socket> server(
ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(server.get());
@@ -387,7 +379,7 @@
ss_.ProcessMessagesUntilIdle();
// Result: connection failed
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(client->GetState(), Socket::CS_CLOSED);
EXPECT_TRUE(sink.Check(client.get(), SSE_ERROR));
server.reset(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
@@ -409,7 +401,7 @@
ss_.ProcessMessagesUntilIdle();
// Result: connection failed
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(client->GetState(), Socket::CS_CLOSED);
EXPECT_TRUE(sink.Check(client.get(), SSE_ERROR));
// New server
@@ -427,37 +419,37 @@
// Server accepts connection
EXPECT_TRUE(sink.Check(server.get(), SSE_READ));
- std::unique_ptr<webrtc::Socket> accepted(server->Accept(&accept_addr));
+ std::unique_ptr<Socket> accepted(server->Accept(&accept_addr));
ASSERT_TRUE(nullptr != accepted.get());
sink.Monitor(accepted.get());
// Client closes before connection complets
- EXPECT_EQ(accepted->GetState(), webrtc::Socket::CS_CONNECTED);
+ EXPECT_EQ(accepted->GetState(), Socket::CS_CONNECTED);
// Connected message has not been processed yet.
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CONNECTING);
+ EXPECT_EQ(client->GetState(), Socket::CS_CONNECTING);
client->Close();
ss_.ProcessMessagesUntilIdle();
// Result: accepted socket closes
- EXPECT_EQ(accepted->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(accepted->GetState(), Socket::CS_CLOSED);
EXPECT_TRUE(sink.Check(accepted.get(), SSE_CLOSE));
EXPECT_FALSE(sink.Check(client.get(), SSE_CLOSE));
}
- void CloseTest(const webrtc::SocketAddress& initial_addr) {
+ void CloseTest(const SocketAddress& initial_addr) {
StreamSink sink;
- const webrtc::SocketAddress kEmptyAddr;
+ const SocketAddress kEmptyAddr;
// Create clients
- std::unique_ptr<webrtc::Socket> a =
+ std::unique_ptr<Socket> a =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(a.get());
a->Bind(initial_addr);
EXPECT_EQ(a->GetLocalAddress().family(), initial_addr.family());
- std::unique_ptr<webrtc::Socket> b =
+ std::unique_ptr<Socket> b =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(b.get());
b->Bind(initial_addr);
@@ -469,11 +461,11 @@
ss_.ProcessMessagesUntilIdle();
EXPECT_TRUE(sink.Check(a.get(), SSE_OPEN));
- EXPECT_EQ(a->GetState(), webrtc::Socket::CS_CONNECTED);
+ EXPECT_EQ(a->GetState(), Socket::CS_CONNECTED);
EXPECT_EQ(a->GetRemoteAddress(), b->GetLocalAddress());
EXPECT_TRUE(sink.Check(b.get(), SSE_OPEN));
- EXPECT_EQ(b->GetState(), webrtc::Socket::CS_CONNECTED);
+ EXPECT_EQ(b->GetState(), Socket::CS_CONNECTED);
EXPECT_EQ(b->GetRemoteAddress(), a->GetLocalAddress());
EXPECT_EQ(1, a->Send("a", 1));
@@ -487,27 +479,27 @@
EXPECT_EQ(-1, b->Recv(buffer, 10, nullptr));
EXPECT_TRUE(sink.Check(a.get(), SSE_CLOSE));
- EXPECT_EQ(a->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(a->GetState(), Socket::CS_CLOSED);
EXPECT_EQ(a->GetRemoteAddress(), kEmptyAddr);
// No signal for Closer
EXPECT_FALSE(sink.Check(b.get(), SSE_CLOSE));
- EXPECT_EQ(b->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(b->GetState(), Socket::CS_CLOSED);
EXPECT_EQ(b->GetRemoteAddress(), kEmptyAddr);
}
- void TcpSendTest(const webrtc::SocketAddress& initial_addr) {
+ void TcpSendTest(const SocketAddress& initial_addr) {
StreamSink sink;
- const webrtc::SocketAddress kEmptyAddr;
+ const SocketAddress kEmptyAddr;
// Connect two sockets
- std::unique_ptr<webrtc::Socket> a =
+ std::unique_ptr<Socket> a =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(a.get());
a->Bind(initial_addr);
EXPECT_EQ(a->GetLocalAddress().family(), initial_addr.family());
- std::unique_ptr<webrtc::Socket> b =
+ std::unique_ptr<Socket> b =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
sink.Monitor(b.get());
b->Bind(initial_addr);
@@ -619,13 +611,13 @@
EXPECT_EQ(0, memcmp(recv_buffer, send_buffer, kDataSize));
}
- void TcpSendsPacketsInOrderTest(const webrtc::SocketAddress& initial_addr) {
- const webrtc::SocketAddress kEmptyAddr;
+ void TcpSendsPacketsInOrderTest(const SocketAddress& initial_addr) {
+ const SocketAddress kEmptyAddr;
// Connect two sockets
- std::unique_ptr<webrtc::Socket> a =
+ std::unique_ptr<Socket> a =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
- std::unique_ptr<webrtc::Socket> b =
+ std::unique_ptr<Socket> b =
absl::WrapUnique(ss_.CreateSocket(initial_addr.family(), SOCK_STREAM));
a->Bind(initial_addr);
EXPECT_EQ(a->GetLocalAddress().family(), initial_addr.family());
@@ -676,11 +668,9 @@
// It is important that initial_addr's port has to be 0 such that the
// incremental port behavior could ensure the 2 Binds result in different
// address.
- void BandwidthTest(const webrtc::SocketAddress& initial_addr) {
- webrtc::Socket* send_socket =
- ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
- webrtc::Socket* recv_socket =
- ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
+ void BandwidthTest(const SocketAddress& initial_addr) {
+ Socket* send_socket = ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
+ Socket* recv_socket = ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
ASSERT_EQ(0, send_socket->Bind(initial_addr));
ASSERT_EQ(0, recv_socket->Bind(initial_addr));
EXPECT_EQ(send_socket->GetLocalAddress().family(), initial_addr.family());
@@ -690,7 +680,7 @@
uint32_t bandwidth = 64 * 1024;
ss_.set_bandwidth(bandwidth);
- webrtc::Thread* pthMain = webrtc::Thread::Current();
+ Thread* pthMain = Thread::Current();
Sender sender(pthMain, send_socket, 80 * 1024);
Receiver receiver(pthMain, recv_socket, bandwidth);
@@ -710,7 +700,7 @@
// It is important that initial_addr's port has to be 0 such that the
// incremental port behavior could ensure the 2 Binds result in different
// address.
- void DelayTest(const webrtc::SocketAddress& initial_addr) {
+ void DelayTest(const SocketAddress& initial_addr) {
time_t seed = ::time(nullptr);
RTC_LOG(LS_VERBOSE) << "seed = " << seed;
srand(static_cast<unsigned int>(seed));
@@ -722,17 +712,15 @@
ss_.set_delay_stddev(stddev);
ss_.UpdateDelayDistribution();
- webrtc::Socket* send_socket =
- ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
- webrtc::Socket* recv_socket =
- ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
+ Socket* send_socket = ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
+ Socket* recv_socket = ss_.CreateSocket(initial_addr.family(), SOCK_DGRAM);
ASSERT_EQ(0, send_socket->Bind(initial_addr));
ASSERT_EQ(0, recv_socket->Bind(initial_addr));
EXPECT_EQ(send_socket->GetLocalAddress().family(), initial_addr.family());
EXPECT_EQ(recv_socket->GetLocalAddress().family(), initial_addr.family());
ASSERT_EQ(0, send_socket->Connect(recv_socket->GetLocalAddress()));
- webrtc::Thread* pthMain = webrtc::Thread::Current();
+ Thread* pthMain = Thread::Current();
// Avg packet size is 2K, so at 200KB/s for 10s, we should see about
// 1000 packets, which is necessary to get a good distribution.
Sender sender(pthMain, send_socket, 100 * 2 * 1024);
@@ -767,24 +755,24 @@
// Test cross-family communication between a client bound to client_addr and a
// server bound to server_addr. shouldSucceed indicates if communication is
// expected to work or not.
- void CrossFamilyConnectionTest(const webrtc::SocketAddress& client_addr,
- const webrtc::SocketAddress& server_addr,
+ void CrossFamilyConnectionTest(const SocketAddress& client_addr,
+ const SocketAddress& server_addr,
bool shouldSucceed) {
StreamSink sink;
- webrtc::SocketAddress accept_address;
- const webrtc::SocketAddress kEmptyAddr;
+ SocketAddress accept_address;
+ const SocketAddress kEmptyAddr;
// Client gets a IPv4 address
- std::unique_ptr<webrtc::Socket> client =
+ std::unique_ptr<Socket> client =
absl::WrapUnique(ss_.CreateSocket(client_addr.family(), SOCK_STREAM));
sink.Monitor(client.get());
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(client->GetState(), Socket::CS_CLOSED);
EXPECT_EQ(client->GetLocalAddress(), kEmptyAddr);
client->Bind(client_addr);
// Server gets a non-mapped non-any IPv6 address.
// IPv4 sockets should not be able to connect to this.
- std::unique_ptr<webrtc::Socket> server =
+ std::unique_ptr<Socket> server =
absl::WrapUnique(ss_.CreateSocket(server_addr.family(), SOCK_STREAM));
sink.Monitor(server.get());
server->Bind(server_addr);
@@ -794,7 +782,7 @@
EXPECT_EQ(0, client->Connect(server->GetLocalAddress()));
ss_.ProcessMessagesUntilIdle();
EXPECT_TRUE(sink.Check(server.get(), SSE_READ));
- std::unique_ptr<webrtc::Socket> accepted =
+ std::unique_ptr<Socket> accepted =
absl::WrapUnique(server->Accept(&accept_address));
EXPECT_TRUE(nullptr != accepted);
EXPECT_NE(kEmptyAddr, accept_address);
@@ -809,7 +797,7 @@
EXPECT_FALSE(sink.Check(server.get(), SSE_READ));
EXPECT_TRUE(nullptr == server->Accept(&accept_address));
EXPECT_EQ(accept_address, kEmptyAddr);
- EXPECT_EQ(client->GetState(), webrtc::Socket::CS_CLOSED);
+ EXPECT_EQ(client->GetState(), Socket::CS_CLOSED);
EXPECT_FALSE(sink.Check(client.get(), SSE_OPEN));
EXPECT_EQ(client->GetRemoteAddress(), kEmptyAddr);
}
@@ -818,25 +806,25 @@
// Test cross-family datagram sending between a client bound to client_addr
// and a server bound to server_addr. shouldSucceed indicates if sending is
// expected to succeed or not.
- void CrossFamilyDatagramTest(const webrtc::SocketAddress& client_addr,
- const webrtc::SocketAddress& server_addr,
+ void CrossFamilyDatagramTest(const SocketAddress& client_addr,
+ const SocketAddress& server_addr,
bool shouldSucceed) {
- webrtc::Socket* socket = ss_.CreateSocket(AF_INET, SOCK_DGRAM);
+ Socket* socket = ss_.CreateSocket(AF_INET, SOCK_DGRAM);
socket->Bind(server_addr);
- webrtc::SocketAddress bound_server_addr = socket->GetLocalAddress();
- auto client1 = std::make_unique<webrtc::TestClient>(
- std::make_unique<webrtc::AsyncUDPSocket>(socket), &fake_clock_);
+ SocketAddress bound_server_addr = socket->GetLocalAddress();
+ auto client1 = std::make_unique<TestClient>(
+ std::make_unique<AsyncUDPSocket>(socket), &fake_clock_);
- webrtc::Socket* socket2 = ss_.CreateSocket(AF_INET, SOCK_DGRAM);
+ Socket* socket2 = ss_.CreateSocket(AF_INET, SOCK_DGRAM);
socket2->Bind(client_addr);
- auto client2 = std::make_unique<webrtc::TestClient>(
- std::make_unique<webrtc::AsyncUDPSocket>(socket2), &fake_clock_);
- webrtc::SocketAddress client2_addr;
+ auto client2 = std::make_unique<TestClient>(
+ std::make_unique<AsyncUDPSocket>(socket2), &fake_clock_);
+ SocketAddress client2_addr;
if (shouldSucceed) {
EXPECT_EQ(3, client2->SendTo("foo", 3, bound_server_addr));
EXPECT_TRUE(client1->CheckNextPacket("foo", 3, &client2_addr));
- webrtc::SocketAddress client1_addr;
+ SocketAddress client1_addr;
EXPECT_EQ(6, client1->SendTo("bizbaz", 6, client2_addr));
EXPECT_TRUE(client2->CheckNextPacket("bizbaz", 6, &client1_addr));
EXPECT_EQ(client1_addr, bound_server_addr);
@@ -847,32 +835,32 @@
}
protected:
- webrtc::ScopedFakeClock fake_clock_;
- webrtc::VirtualSocketServer ss_;
- webrtc::AutoSocketServerThread thread_;
- const webrtc::SocketAddress kIPv4AnyAddress;
- const webrtc::SocketAddress kIPv6AnyAddress;
+ ScopedFakeClock fake_clock_;
+ VirtualSocketServer ss_;
+ AutoSocketServerThread thread_;
+ const SocketAddress kIPv4AnyAddress;
+ const SocketAddress kIPv6AnyAddress;
};
TEST_F(VirtualSocketServerTest, basic_v4) {
- webrtc::SocketAddress ipv4_test_addr(webrtc::IPAddress(INADDR_ANY), 5000);
+ SocketAddress ipv4_test_addr(IPAddress(INADDR_ANY), 5000);
BasicTest(ipv4_test_addr);
}
TEST_F(VirtualSocketServerTest, basic_v6) {
- webrtc::SocketAddress ipv6_test_addr(webrtc::IPAddress(in6addr_any), 5000);
+ SocketAddress ipv6_test_addr(IPAddress(in6addr_any), 5000);
BasicTest(ipv6_test_addr);
}
TEST_F(VirtualSocketServerTest, TestDefaultRoute_v4) {
- webrtc::IPAddress ipv4_default_addr(0x01020304);
+ IPAddress ipv4_default_addr(0x01020304);
TestDefaultSourceAddress(ipv4_default_addr);
}
TEST_F(VirtualSocketServerTest, TestDefaultRoute_v6) {
- webrtc::IPAddress ipv6_default_addr;
- EXPECT_TRUE(webrtc::IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3",
- &ipv6_default_addr));
+ IPAddress ipv6_default_addr;
+ EXPECT_TRUE(
+ IPFromString("2401:fa00:4:1000:be30:5bff:fee5:c3", &ipv6_default_addr));
TestDefaultSourceAddress(ipv6_default_addr);
}
@@ -942,105 +930,100 @@
// Works, receiving socket sees 127.0.0.2.
TEST_F(VirtualSocketServerTest, CanConnectFromMappedIPv6ToIPv4Any) {
- CrossFamilyConnectionTest(webrtc::SocketAddress("::ffff:127.0.0.2", 0),
- webrtc::SocketAddress("0.0.0.0", 5000), true);
+ CrossFamilyConnectionTest(SocketAddress("::ffff:127.0.0.2", 0),
+ SocketAddress("0.0.0.0", 5000), true);
}
// Fails.
TEST_F(VirtualSocketServerTest, CantConnectFromUnMappedIPv6ToIPv4Any) {
- CrossFamilyConnectionTest(webrtc::SocketAddress("::2", 0),
- webrtc::SocketAddress("0.0.0.0", 5000), false);
+ CrossFamilyConnectionTest(SocketAddress("::2", 0),
+ SocketAddress("0.0.0.0", 5000), false);
}
// Fails.
TEST_F(VirtualSocketServerTest, CantConnectFromUnMappedIPv6ToMappedIPv6) {
- CrossFamilyConnectionTest(webrtc::SocketAddress("::2", 0),
- webrtc::SocketAddress("::ffff:127.0.0.1", 5000),
- false);
+ CrossFamilyConnectionTest(SocketAddress("::2", 0),
+ SocketAddress("::ffff:127.0.0.1", 5000), false);
}
// Works. receiving socket sees ::ffff:127.0.0.2.
TEST_F(VirtualSocketServerTest, CanConnectFromIPv4ToIPv6Any) {
- CrossFamilyConnectionTest(webrtc::SocketAddress("127.0.0.2", 0),
- webrtc::SocketAddress("::", 5000), true);
+ CrossFamilyConnectionTest(SocketAddress("127.0.0.2", 0),
+ SocketAddress("::", 5000), true);
}
// Fails.
TEST_F(VirtualSocketServerTest, CantConnectFromIPv4ToUnMappedIPv6) {
- CrossFamilyConnectionTest(webrtc::SocketAddress("127.0.0.2", 0),
- webrtc::SocketAddress("::1", 5000), false);
+ CrossFamilyConnectionTest(SocketAddress("127.0.0.2", 0),
+ SocketAddress("::1", 5000), false);
}
// Works. Receiving socket sees ::ffff:127.0.0.1.
TEST_F(VirtualSocketServerTest, CanConnectFromIPv4ToMappedIPv6) {
- CrossFamilyConnectionTest(webrtc::SocketAddress("127.0.0.1", 0),
- webrtc::SocketAddress("::ffff:127.0.0.2", 5000),
- true);
+ CrossFamilyConnectionTest(SocketAddress("127.0.0.1", 0),
+ SocketAddress("::ffff:127.0.0.2", 5000), true);
}
// Works, receiving socket sees a result from GetNextIP.
TEST_F(VirtualSocketServerTest, CanConnectFromUnboundIPv6ToIPv4Any) {
- CrossFamilyConnectionTest(webrtc::SocketAddress("::", 0),
- webrtc::SocketAddress("0.0.0.0", 5000), true);
+ CrossFamilyConnectionTest(SocketAddress("::", 0),
+ SocketAddress("0.0.0.0", 5000), true);
}
// Works, receiving socket sees whatever GetNextIP gave the client.
TEST_F(VirtualSocketServerTest, CanConnectFromUnboundIPv4ToIPv6Any) {
- CrossFamilyConnectionTest(webrtc::SocketAddress("0.0.0.0", 0),
- webrtc::SocketAddress("::", 5000), true);
+ CrossFamilyConnectionTest(SocketAddress("0.0.0.0", 0),
+ SocketAddress("::", 5000), true);
}
TEST_F(VirtualSocketServerTest, CanSendDatagramFromUnboundIPv4ToIPv6Any) {
- CrossFamilyDatagramTest(webrtc::SocketAddress("0.0.0.0", 0),
- webrtc::SocketAddress("::", 5000), true);
+ CrossFamilyDatagramTest(SocketAddress("0.0.0.0", 0),
+ SocketAddress("::", 5000), true);
}
TEST_F(VirtualSocketServerTest, CanSendDatagramFromMappedIPv6ToIPv4Any) {
- CrossFamilyDatagramTest(webrtc::SocketAddress("::ffff:127.0.0.1", 0),
- webrtc::SocketAddress("0.0.0.0", 5000), true);
+ CrossFamilyDatagramTest(SocketAddress("::ffff:127.0.0.1", 0),
+ SocketAddress("0.0.0.0", 5000), true);
}
TEST_F(VirtualSocketServerTest, CantSendDatagramFromUnMappedIPv6ToIPv4Any) {
- CrossFamilyDatagramTest(webrtc::SocketAddress("::2", 0),
- webrtc::SocketAddress("0.0.0.0", 5000), false);
+ CrossFamilyDatagramTest(SocketAddress("::2", 0),
+ SocketAddress("0.0.0.0", 5000), false);
}
TEST_F(VirtualSocketServerTest, CantSendDatagramFromUnMappedIPv6ToMappedIPv6) {
- CrossFamilyDatagramTest(webrtc::SocketAddress("::2", 0),
- webrtc::SocketAddress("::ffff:127.0.0.1", 5000),
- false);
+ CrossFamilyDatagramTest(SocketAddress("::2", 0),
+ SocketAddress("::ffff:127.0.0.1", 5000), false);
}
TEST_F(VirtualSocketServerTest, CanSendDatagramFromIPv4ToIPv6Any) {
- CrossFamilyDatagramTest(webrtc::SocketAddress("127.0.0.2", 0),
- webrtc::SocketAddress("::", 5000), true);
+ CrossFamilyDatagramTest(SocketAddress("127.0.0.2", 0),
+ SocketAddress("::", 5000), true);
}
TEST_F(VirtualSocketServerTest, CantSendDatagramFromIPv4ToUnMappedIPv6) {
- CrossFamilyDatagramTest(webrtc::SocketAddress("127.0.0.2", 0),
- webrtc::SocketAddress("::1", 5000), false);
+ CrossFamilyDatagramTest(SocketAddress("127.0.0.2", 0),
+ SocketAddress("::1", 5000), false);
}
TEST_F(VirtualSocketServerTest, CanSendDatagramFromIPv4ToMappedIPv6) {
- CrossFamilyDatagramTest(webrtc::SocketAddress("127.0.0.1", 0),
- webrtc::SocketAddress("::ffff:127.0.0.2", 5000),
- true);
+ CrossFamilyDatagramTest(SocketAddress("127.0.0.1", 0),
+ SocketAddress("::ffff:127.0.0.2", 5000), true);
}
TEST_F(VirtualSocketServerTest, CanSendDatagramFromUnboundIPv6ToIPv4Any) {
- CrossFamilyDatagramTest(webrtc::SocketAddress("::", 0),
- webrtc::SocketAddress("0.0.0.0", 5000), true);
+ CrossFamilyDatagramTest(SocketAddress("::", 0),
+ SocketAddress("0.0.0.0", 5000), true);
}
TEST_F(VirtualSocketServerTest, SetSendingBlockedWithUdpSocket) {
- webrtc::Socket* socket1 =
- ss_.CreateSocket(kIPv4AnyAddress.family(), SOCK_DGRAM);
- std::unique_ptr<webrtc::Socket> socket2 =
+ Socket* socket1 = ss_.CreateSocket(kIPv4AnyAddress.family(), SOCK_DGRAM);
+ std::unique_ptr<Socket> socket2 =
absl::WrapUnique(ss_.CreateSocket(kIPv4AnyAddress.family(), SOCK_DGRAM));
socket1->Bind(kIPv4AnyAddress);
socket2->Bind(kIPv4AnyAddress);
- auto client1 = std::make_unique<webrtc::TestClient>(
- std::make_unique<webrtc::AsyncUDPSocket>(socket1), &fake_clock_);
+ auto client1 = std::make_unique<TestClient>(
+ std::make_unique<AsyncUDPSocket>(socket1), &fake_clock_);
ss_.SetSendingBlocked(true);
EXPECT_EQ(-1, client1->SendTo("foo", 3, socket2->GetLocalAddress()));
@@ -1058,9 +1041,9 @@
ss_.set_recv_buffer_capacity(kBufferSize);
StreamSink sink;
- std::unique_ptr<webrtc::Socket> socket1 =
+ std::unique_ptr<Socket> socket1 =
absl::WrapUnique(ss_.CreateSocket(kIPv4AnyAddress.family(), SOCK_STREAM));
- std::unique_ptr<webrtc::Socket> socket2 =
+ std::unique_ptr<Socket> socket2 =
absl::WrapUnique(ss_.CreateSocket(kIPv4AnyAddress.family(), SOCK_STREAM));
sink.Monitor(socket1.get());
sink.Monitor(socket2.get());
@@ -1107,9 +1090,9 @@
ASSERT_LT(0u, kTestSamples[sidx]);
const uint32_t kStdDev =
static_cast<uint32_t>(kTestDev[didx] * kTestMean[midx]);
- std::unique_ptr<webrtc::VirtualSocketServer::Function> f =
- webrtc::VirtualSocketServer::CreateDistribution(
- kTestMean[midx], kStdDev, kTestSamples[sidx]);
+ std::unique_ptr<VirtualSocketServer::Function> f =
+ VirtualSocketServer::CreateDistribution(kTestMean[midx], kStdDev,
+ kTestSamples[sidx]);
ASSERT_TRUE(nullptr != f.get());
ASSERT_EQ(kTestSamples[sidx], f->size());
double sum = 0;