Remove redundant webrtc:: prefixes in rtc_base

Created by
tools_webrtc/remove_extra_namespace.py --namespace webrtc

and manual adjustments.

This CL was uploaded by git cl split.

R=eshr@webrtc.org

No-IWYU: Refactoring
Bug: webrtc:42232595
Change-Id: I4dffbcd86aa0993d735ca3bbcfe9f66a42ceff3c
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/396203
Commit-Queue: Evan Shrubsole <eshr@webrtc.org>
Auto-Submit: Harald Alvestrand <hta@webrtc.org>
Commit-Queue: Harald Alvestrand <hta@webrtc.org>
Reviewed-by: Evan Shrubsole <eshr@webrtc.org>
Cr-Commit-Position: refs/heads/main@{#44901}
diff --git a/rtc_base/async_dns_resolver.cc b/rtc_base/async_dns_resolver.cc
index 9c9610d..9cca9a0 100644
--- a/rtc_base/async_dns_resolver.cc
+++ b/rtc_base/async_dns_resolver.cc
@@ -30,7 +30,7 @@
 #ifdef __native_client__
 int ResolveHostname(absl::string_view hostname,
                     int family,
-                    std::vector<webrtc::IPAddress>* addresses) {
+                    std::vector<IPAddress>* addresses) {
   RTC_DCHECK_NOTREACHED();
   RTC_LOG(LS_WARNING) << "ResolveHostname() is not implemented for NaCl";
   return -1;
diff --git a/rtc_base/async_dns_resolver.h b/rtc_base/async_dns_resolver.h
index 674e140..d8cb38f 100644
--- a/rtc_base/async_dns_resolver.h
+++ b/rtc_base/async_dns_resolver.h
@@ -21,7 +21,7 @@
 
 namespace webrtc {
 // This file contains a default implementation of
-// webrtc::AsyncDnsResolverInterface, for use when there is no need for special
+// AsyncDnsResolverInterface, for use when there is no need for special
 // treatment.
 
 class AsyncDnsResolverResultImpl : public AsyncDnsResolverResult {
@@ -32,7 +32,7 @@
 
  private:
   friend class AsyncDnsResolver;
-  RTC_NO_UNIQUE_ADDRESS webrtc::SequenceChecker sequence_checker_;
+  RTC_NO_UNIQUE_ADDRESS SequenceChecker sequence_checker_;
   SocketAddress addr_ RTC_GUARDED_BY(sequence_checker_);
   std::vector<IPAddress> addresses_ RTC_GUARDED_BY(sequence_checker_);
   int error_ RTC_GUARDED_BY(sequence_checker_);
diff --git a/rtc_base/async_packet_socket.h b/rtc_base/async_packet_socket.h
index e06de43..b1a2045 100644
--- a/rtc_base/async_packet_socket.h
+++ b/rtc_base/async_packet_socket.h
@@ -61,10 +61,10 @@
   // https://www.rfc-editor.org/rfc/rfc9331.html
   bool ecn_1 = false;
 
-  // When used with RTP packets (for example, webrtc::PacketOptions), the value
+  // When used with RTP packets (for example, PacketOptions), the value
   // should be 16 bits. A value of -1 represents "not set".
   int64_t packet_id = -1;
-  webrtc::PacketTimeUpdateParams packet_time_params;
+  PacketTimeUpdateParams packet_time_params;
   // PacketInfo is passed to SentPacket when signaling this packet is sent.
   PacketInfo info_signaled_after_sent;
   // True if this is a batchable packet. Batchable packets are collected at low
@@ -127,12 +127,11 @@
   // Register a callback to be called when the socket is closed.
   void SubscribeCloseEvent(
       const void* removal_tag,
-      std::function<void(webrtc::AsyncPacketSocket*, int)> callback);
+      std::function<void(AsyncPacketSocket*, int)> callback);
   void UnsubscribeCloseEvent(const void* removal_tag);
 
   void RegisterReceivedPacketCallback(
-      absl::AnyInvocable<void(webrtc::AsyncPacketSocket*,
-                              const webrtc::ReceivedIpPacket&)>
+      absl::AnyInvocable<void(AsyncPacketSocket*, const ReceivedIpPacket&)>
           received_packet_callback);
   void DeregisterReceivedPacketCallback();
 
@@ -173,8 +172,7 @@
  private:
   CallbackList<AsyncPacketSocket*, int> on_close_
       RTC_GUARDED_BY(&network_checker_);
-  absl::AnyInvocable<void(webrtc::AsyncPacketSocket*,
-                          const webrtc::ReceivedIpPacket&)>
+  absl::AnyInvocable<void(AsyncPacketSocket*, const ReceivedIpPacket&)>
       received_packet_callback_ RTC_GUARDED_BY(&network_checker_);
 };
 
diff --git a/rtc_base/async_tcp_socket_unittest.cc b/rtc_base/async_tcp_socket_unittest.cc
index 149780d..f531ed9 100644
--- a/rtc_base/async_tcp_socket_unittest.cc
+++ b/rtc_base/async_tcp_socket_unittest.cc
@@ -21,7 +21,7 @@
 class AsyncTCPSocketTest : public ::testing::Test, public sigslot::has_slots<> {
  public:
   AsyncTCPSocketTest()
-      : vss_(new webrtc::VirtualSocketServer()),
+      : vss_(new VirtualSocketServer()),
         socket_(vss_->CreateSocket(SOCK_STREAM)),
         tcp_socket_(new AsyncTCPSocket(socket_, true)),
         ready_to_send_(false) {
@@ -29,9 +29,7 @@
                                            &AsyncTCPSocketTest::OnReadyToSend);
   }
 
-  void OnReadyToSend(webrtc::AsyncPacketSocket* socket) {
-    ready_to_send_ = true;
-  }
+  void OnReadyToSend(AsyncPacketSocket* socket) { ready_to_send_ = true; }
 
  protected:
   std::unique_ptr<VirtualSocketServer> vss_;
diff --git a/rtc_base/bit_buffer.h b/rtc_base/bit_buffer.h
index 17084a4..870ddc8 100644
--- a/rtc_base/bit_buffer.h
+++ b/rtc_base/bit_buffer.h
@@ -25,7 +25,7 @@
 // Byte order is assumed big-endian/network.
 class BitBufferWriter {
  public:
-  static constexpr DataSize kMaxLeb128Length = webrtc::DataSize::Bytes(10);
+  static constexpr DataSize kMaxLeb128Length = DataSize::Bytes(10);
 
   // Constructs a bit buffer for the writable buffer of `bytes`.
   BitBufferWriter(uint8_t* bytes, size_t byte_count);
diff --git a/rtc_base/byte_buffer.h b/rtc_base/byte_buffer.h
index b962f45..edf236a 100644
--- a/rtc_base/byte_buffer.h
+++ b/rtc_base/byte_buffer.h
@@ -61,21 +61,21 @@
     WriteBytesInternal(reinterpret_cast<const value_type*>(&val), 1);
   }
   void WriteUInt16(uint16_t val) {
-    uint16_t v = webrtc::HostToNetwork16(val);
+    uint16_t v = HostToNetwork16(val);
     WriteBytesInternal(reinterpret_cast<const value_type*>(&v), 2);
   }
   void WriteUInt24(uint32_t val) {
-    uint32_t v = webrtc::HostToNetwork32(val);
+    uint32_t v = HostToNetwork32(val);
     value_type* start = reinterpret_cast<value_type*>(&v);
     ++start;
     WriteBytesInternal(start, 3);
   }
   void WriteUInt32(uint32_t val) {
-    uint32_t v = webrtc::HostToNetwork32(val);
+    uint32_t v = HostToNetwork32(val);
     WriteBytesInternal(reinterpret_cast<const value_type*>(&v), 4);
   }
   void WriteUInt64(uint64_t val) {
-    uint64_t v = webrtc::HostToNetwork64(val);
+    uint64_t v = HostToNetwork64(val);
     WriteBytesInternal(reinterpret_cast<const value_type*>(&v), 8);
   }
   // Serializes an unsigned varint in the format described by
diff --git a/rtc_base/copy_on_write_buffer.h b/rtc_base/copy_on_write_buffer.h
index 6dfa289..0429949 100644
--- a/rtc_base/copy_on_write_buffer.h
+++ b/rtc_base/copy_on_write_buffer.h
@@ -307,7 +307,7 @@
     }
   }
 
-  // buffer_ is either null, or points to an webrtc::Buffer with capacity > 0.
+  // buffer_ is either null, or points to an Buffer with capacity > 0.
   scoped_refptr<RefCountedBuffer> buffer_;
   // This buffer may represent a slice of a original data.
   size_t offset_;  // Offset of a current slice in the original data in buffer_.
diff --git a/rtc_base/deprecated/recursive_critical_section.h b/rtc_base/deprecated/recursive_critical_section.h
index e347e48..e4a2053 100644
--- a/rtc_base/deprecated/recursive_critical_section.h
+++ b/rtc_base/deprecated/recursive_critical_section.h
@@ -42,7 +42,7 @@
 
 namespace webrtc {
 
-// NOTE: This class is deprecated. Please use webrtc::Mutex instead!
+// NOTE: This class is deprecated. Please use Mutex instead!
 // Search using https://www.google.com/?q=recursive+lock+considered+harmful
 // to find the reasons.
 //
diff --git a/rtc_base/event.cc b/rtc_base/event.cc
index 7338670..e7ad91c 100644
--- a/rtc_base/event.cc
+++ b/rtc_base/event.cc
@@ -55,10 +55,9 @@
 
 bool Event::Wait(TimeDelta give_up_after, TimeDelta /*warn_after*/) {
   ScopedYieldPolicy::YieldExecution();
-  const DWORD ms =
-      give_up_after.IsPlusInfinity()
-          ? INFINITE
-          : give_up_after.RoundUpTo(webrtc::TimeDelta::Millis(1)).ms();
+  const DWORD ms = give_up_after.IsPlusInfinity()
+                       ? INFINITE
+                       : give_up_after.RoundUpTo(TimeDelta::Millis(1)).ms();
   return (WaitForSingleObject(event_handle_, ms) == WAIT_OBJECT_0);
 }
 
@@ -123,7 +122,7 @@
   timeval tv;
   gettimeofday(&tv, nullptr);
   ts.tv_sec = tv.tv_sec;
-  ts.tv_nsec = tv.tv_usec * webrtc::kNumNanosecsPerMicrosec;
+  ts.tv_nsec = tv.tv_usec * kNumNanosecsPerMicrosec;
 #endif
 
   // Add the specified number of milliseconds to it.
diff --git a/rtc_base/event.h b/rtc_base/event.h
index 0f5527e..908247a 100644
--- a/rtc_base/event.h
+++ b/rtc_base/event.h
@@ -27,8 +27,8 @@
 
 // RTC_DISALLOW_WAIT() utility
 //
-// Sets a stack-scoped flag that disallows use of `webrtc::Event::Wait` by means
-// of raising a DCHECK when a call to `webrtc::Event::Wait()` is made..
+// Sets a stack-scoped flag that disallows use of `Event::Wait` by means
+// of raising a DCHECK when a call to `Event::Wait()` is made..
 // This is useful to guard synchronization-free scopes against regressions.
 //
 // Example of what this would catch (`ScopeToProtect` calls `Foo`):
@@ -99,7 +99,7 @@
 };
 
 // These classes are provided for compatibility with Chromium.
-// The webrtc::Event implementation is overriden inside of Chromium for the
+// The Event implementation is overriden inside of Chromium for the
 // purposes of detecting when threads are blocked that shouldn't be as well as
 // to use the more accurate event implementation that's there than is provided
 // by default on some platforms (e.g. Windows).
@@ -128,7 +128,7 @@
    public:
     void YieldExecution() override { RTC_DCHECK_NOTREACHED(); }
   } handler_;
-  webrtc::ScopedYieldPolicy policy{&handler_};
+  ScopedYieldPolicy policy{&handler_};
 };
 #endif
 
diff --git a/rtc_base/event_unittest.cc b/rtc_base/event_unittest.cc
index 44a829f..8e64252 100644
--- a/rtc_base/event_unittest.cc
+++ b/rtc_base/event_unittest.cc
@@ -102,7 +102,7 @@
 }
 
 #if RTC_DCHECK_IS_ON && GTEST_HAS_DEATH_TEST && !defined(WEBRTC_ANDROID)
-// Tests that we crash if we attempt to call webrtc::Event::Wait while we're
+// Tests that we crash if we attempt to call Event::Wait while we're
 // not allowed to (as per `RTC_DISALLOW_WAIT()`).
 TEST(EventTestDeathTest, DisallowEventWait) {
   Event event;
diff --git a/rtc_base/fake_clock.h b/rtc_base/fake_clock.h
index 66050c7..a529b6c 100644
--- a/rtc_base/fake_clock.h
+++ b/rtc_base/fake_clock.h
@@ -24,7 +24,7 @@
 // Fake clock for use with unit tests, which does not tick on its own.
 // Starts at time 0.
 //
-// TODO(deadbeef): Unify with webrtc::SimulatedClock.
+// TODO(deadbeef): Unify with SimulatedClock.
 class FakeClock : public ClockInterface {
  public:
   FakeClock() = default;
diff --git a/rtc_base/fake_network.h b/rtc_base/fake_network.h
index b8c2213..7fede14 100644
--- a/rtc_base/fake_network.h
+++ b/rtc_base/fake_network.h
@@ -109,7 +109,7 @@
   using NetworkManagerBase::set_default_local_addresses;
   using NetworkManagerBase::set_enumeration_permission;
 
-  // webrtc::NetworkManager override.
+  // NetworkManager override.
   MdnsResponderInterface* GetMdnsResponder() const override {
     return mdns_responder_.get();
   }
@@ -131,8 +131,7 @@
       } else if (it->socket_address.ipaddr().family() == AF_INET6) {
         prefix_length = kFakeIPv6NetworkPrefixLength;
       }
-      IPAddress prefix =
-          webrtc::TruncateIP(it->socket_address.ipaddr(), prefix_length);
+      IPAddress prefix = TruncateIP(it->socket_address.ipaddr(), prefix_length);
       auto net = std::make_unique<Network>(
           it->socket_address.hostname(), it->socket_address.hostname(), prefix,
           prefix_length, it->adapter_type);
diff --git a/rtc_base/internal/default_socket_server.cc b/rtc_base/internal/default_socket_server.cc
index 043c2ce..1ebe391 100644
--- a/rtc_base/internal/default_socket_server.cc
+++ b/rtc_base/internal/default_socket_server.cc
@@ -24,7 +24,7 @@
 
 std::unique_ptr<SocketServer> CreateDefaultSocketServer() {
 #if defined(__native_client__)
-  return std::unique_ptr<SocketServer>(new webrtc::NullSocketServer);
+  return std::unique_ptr<SocketServer>(new NullSocketServer);
 #else
   return std::unique_ptr<SocketServer>(new PhysicalSocketServer);
 #endif
diff --git a/rtc_base/ip_address.h b/rtc_base/ip_address.h
index 8636fc6..efcabcb 100644
--- a/rtc_base/ip_address.h
+++ b/rtc_base/ip_address.h
@@ -79,7 +79,7 @@
 
   explicit IPAddress(uint32_t ip_in_host_byte_order) : family_(AF_INET) {
     memset(&u_, 0, sizeof(u_));
-    u_.ip4.s_addr = webrtc::HostToNetwork32(ip_in_host_byte_order);
+    u_.ip4.s_addr = HostToNetwork32(ip_in_host_byte_order);
   }
 
   IPAddress(const IPAddress& other) : family_(other.family_) {
diff --git a/rtc_base/mdns_responder_interface.h b/rtc_base/mdns_responder_interface.h
index fb4c1c9..d70fdf9 100644
--- a/rtc_base/mdns_responder_interface.h
+++ b/rtc_base/mdns_responder_interface.h
@@ -24,7 +24,7 @@
 class MdnsResponderInterface {
  public:
   using NameCreatedCallback =
-      std::function<void(const webrtc::IPAddress&, absl::string_view)>;
+      std::function<void(const IPAddress&, absl::string_view)>;
   using NameRemovedCallback = std::function<void(bool)>;
 
   MdnsResponderInterface() = default;
diff --git a/rtc_base/memory/fifo_buffer.h b/rtc_base/memory/fifo_buffer.h
index a36717d..a153ddf 100644
--- a/rtc_base/memory/fifo_buffer.h
+++ b/rtc_base/memory/fifo_buffer.h
@@ -84,11 +84,10 @@
  private:
   void PostEvent(int events, int err) {
     RTC_DCHECK_RUN_ON(owner_);
-    owner_->PostTask(
-        webrtc::SafeTask(task_safety_.flag(), [this, events, err]() {
-          RTC_DCHECK_RUN_ON(&callback_sequence_);
-          FireEvent(events, err);
-        }));
+    owner_->PostTask(SafeTask(task_safety_.flag(), [this, events, err]() {
+      RTC_DCHECK_RUN_ON(&callback_sequence_);
+      FireEvent(events, err);
+    }));
   }
 
   // Helper method that implements Read. Caller must acquire a lock
diff --git a/rtc_base/network.cc b/rtc_base/network.cc
index edb78eb..5a0f0df 100644
--- a/rtc_base/network.cc
+++ b/rtc_base/network.cc
@@ -201,15 +201,14 @@
 }
 
 #if defined(WEBRTC_WIN)
-bool IpAddressAttributesEnabled(const webrtc::FieldTrialsView* field_trials) {
+bool IpAddressAttributesEnabled(const FieldTrialsView* field_trials) {
   // Field trial key reserved in bugs.webrtc.org/14334
   if (field_trials &&
       field_trials->IsEnabled("WebRTC-IPv6NetworkResolutionFixes")) {
-    webrtc::FieldTrialParameter<bool> ip_address_attributes_enabled(
+    FieldTrialParameter<bool> ip_address_attributes_enabled(
         "IpAddressAttributesEnabled", false);
-    webrtc::ParseFieldTrial(
-        {&ip_address_attributes_enabled},
-        field_trials->Lookup("WebRTC-IPv6NetworkResolutionFixes"));
+    ParseFieldTrial({&ip_address_attributes_enabled},
+                    field_trials->Lookup("WebRTC-IPv6NetworkResolutionFixes"));
     return ip_address_attributes_enabled;
   }
   return false;
@@ -628,7 +627,7 @@
       continue;
     }
     // Convert to InterfaceAddress.
-    // TODO(webrtc:13114): Convert ConvertIfAddrs to use webrtc::Netmask.
+    // TODO(webrtc:13114): Convert ConvertIfAddrs to use Netmask.
     if (!ifaddrs_converter->ConvertIfAddrsToIPAddress(cursor, &ip, &mask)) {
       continue;
     }
@@ -887,7 +886,7 @@
             adapter_type = ADAPTER_TYPE_VPN;
           }
           if (adapter_type != ADAPTER_TYPE_VPN &&
-              IsVpnMacAddress(webrtc::ArrayView<const uint8_t>(
+              IsVpnMacAddress(ArrayView<const uint8_t>(
                   reinterpret_cast<const uint8_t*>(
                       adapter_addrs->PhysicalAddress),
                   adapter_addrs->PhysicalAddressLength))) {
diff --git a/rtc_base/network.h b/rtc_base/network.h
index f8ccfc7..c87142e 100644
--- a/rtc_base/network.h
+++ b/rtc_base/network.h
@@ -52,7 +52,7 @@
 class Network;
 
 // By default, ignore loopback interfaces on the host.
-const int kDefaultNetworkIgnoreMask = webrtc::ADAPTER_TYPE_LOOPBACK;
+const int kDefaultNetworkIgnoreMask = ADAPTER_TYPE_LOOPBACK;
 
 namespace webrtc_network_internal {
 bool CompareNetworks(const std::unique_ptr<Network>& a,
@@ -201,7 +201,7 @@
                 description,
                 prefix,
                 prefix_length,
-                webrtc::ADAPTER_TYPE_UNKNOWN) {}
+                ADAPTER_TYPE_UNKNOWN) {}
 
   Network(absl::string_view name,
           absl::string_view description,
@@ -213,7 +213,7 @@
   ~Network();
 
   // This signal is fired whenever type() or underlying_type_for_vpn() changes.
-  // Mutable, to support connecting on the const Network passed to webrtc::Port
+  // Mutable, to support connecting on the const Network passed to Port
   // constructor.
   mutable sigslot::signal1<const Network*> SignalTypeChanged;
 
@@ -314,8 +314,8 @@
       return;
     }
     type_ = type;
-    if (type != webrtc::ADAPTER_TYPE_VPN) {
-      underlying_type_for_vpn_ = webrtc::ADAPTER_TYPE_UNKNOWN;
+    if (type != ADAPTER_TYPE_VPN) {
+      underlying_type_for_vpn_ = ADAPTER_TYPE_UNKNOWN;
     }
     SignalTypeChanged(this);
   }
@@ -328,17 +328,17 @@
     SignalTypeChanged(this);
   }
 
-  bool IsVpn() const { return type_ == webrtc::ADAPTER_TYPE_VPN; }
+  bool IsVpn() const { return type_ == ADAPTER_TYPE_VPN; }
 
   bool IsCellular() const { return IsCellular(type_); }
 
   static bool IsCellular(AdapterType type) {
     switch (type) {
-      case webrtc::ADAPTER_TYPE_CELLULAR:
-      case webrtc::ADAPTER_TYPE_CELLULAR_2G:
-      case webrtc::ADAPTER_TYPE_CELLULAR_3G:
-      case webrtc::ADAPTER_TYPE_CELLULAR_4G:
-      case webrtc::ADAPTER_TYPE_CELLULAR_5G:
+      case ADAPTER_TYPE_CELLULAR:
+      case ADAPTER_TYPE_CELLULAR_2G:
+      case ADAPTER_TYPE_CELLULAR_3G:
+      case ADAPTER_TYPE_CELLULAR_4G:
+      case ADAPTER_TYPE_CELLULAR_5G:
         return true;
       default:
         return false;
@@ -398,7 +398,7 @@
   int scope_id_;
   bool ignored_;
   AdapterType type_;
-  AdapterType underlying_type_for_vpn_ = webrtc::ADAPTER_TYPE_UNKNOWN;
+  AdapterType underlying_type_for_vpn_ = ADAPTER_TYPE_UNKNOWN;
   int preference_;
   bool active_ = true;
   uint16_t id_ = 0;
diff --git a/rtc_base/network/received_packet.h b/rtc_base/network/received_packet.h
index 5de54cd..b0cee33 100644
--- a/rtc_base/network/received_packet.h
+++ b/rtc_base/network/received_packet.h
@@ -38,24 +38,20 @@
   // Caller must keep memory pointed to by payload and address valid for the
   // lifetime of this ReceivedPacket.
   ReceivedIpPacket(ArrayView<const uint8_t> payload,
-                   const webrtc::SocketAddress& source_address,
-                   std::optional<webrtc::Timestamp> arrival_time = std::nullopt,
+                   const SocketAddress& source_address,
+                   std::optional<Timestamp> arrival_time = std::nullopt,
                    EcnMarking ecn = EcnMarking::kNotEct,
                    DecryptionInfo decryption = kNotDecrypted);
 
   ReceivedIpPacket CopyAndSet(DecryptionInfo decryption_info) const;
 
   // Address/port of the packet sender.
-  const webrtc::SocketAddress& source_address() const {
-    return source_address_;
-  }
+  const SocketAddress& source_address() const { return source_address_; }
   ArrayView<const uint8_t> payload() const { return payload_; }
 
   // Timestamp when this packet was received. Not available on all socket
   // implementations.
-  std::optional<webrtc::Timestamp> arrival_time() const {
-    return arrival_time_;
-  }
+  std::optional<Timestamp> arrival_time() const { return arrival_time_; }
 
   // L4S Explicit Congestion Notification.
   EcnMarking ecn() const { return ecn_; }
@@ -66,7 +62,7 @@
       const char* data,
       size_t size,
       int64_t packet_time_us,
-      const webrtc::SocketAddress& addr = webrtc::SocketAddress()) {
+      const SocketAddress& addr = SocketAddress()) {
     return CreateFromLegacy(reinterpret_cast<const uint8_t*>(data), size,
                             packet_time_us, addr);
   }
@@ -75,12 +71,12 @@
       const uint8_t* data,
       size_t size,
       int64_t packet_time_us,
-      const webrtc::SocketAddress& = webrtc::SocketAddress());
+      const SocketAddress& = SocketAddress());
 
  private:
   ArrayView<const uint8_t> payload_;
-  std::optional<webrtc::Timestamp> arrival_time_;
-  const webrtc::SocketAddress& source_address_;
+  std::optional<Timestamp> arrival_time_;
+  const SocketAddress& source_address_;
   EcnMarking ecn_;
   DecryptionInfo decryption_info_;
 };
diff --git a/rtc_base/network_monitor.h b/rtc_base/network_monitor.h
index f954a4d..02dc830 100644
--- a/rtc_base/network_monitor.h
+++ b/rtc_base/network_monitor.h
@@ -77,7 +77,7 @@
     AdapterType adapter_type;
 
     // Is ADAPTER_TYPE_UNKNOWN unless adapter_type == ADAPTER_TYPE_VPN.
-    AdapterType underlying_type_for_vpn = webrtc::ADAPTER_TYPE_UNKNOWN;
+    AdapterType underlying_type_for_vpn = ADAPTER_TYPE_UNKNOWN;
 
     // The OS/firmware specific preference of this interface.
     NetworkPreference network_preference = NetworkPreference::NEUTRAL;
diff --git a/rtc_base/network_route.h b/rtc_base/network_route.h
index 7f437cf..153836c 100644
--- a/rtc_base/network_route.h
+++ b/rtc_base/network_route.h
@@ -42,7 +42,7 @@
 
   // Used by tests.
   static RouteEndpoint CreateWithNetworkId(uint16_t network_id) {
-    return RouteEndpoint(webrtc::ADAPTER_TYPE_UNKNOWN,
+    return RouteEndpoint(ADAPTER_TYPE_UNKNOWN,
                          /* adapter_id = */ 0, network_id,
                          /* uses_turn = */ false);
   }
@@ -58,7 +58,7 @@
   bool operator==(const RouteEndpoint& other) const;
 
  private:
-  AdapterType adapter_type_ = webrtc::ADAPTER_TYPE_UNKNOWN;
+  AdapterType adapter_type_ = ADAPTER_TYPE_UNKNOWN;
   uint16_t adapter_id_ = 0;
   uint16_t network_id_ = 0;
   bool uses_turn_ = false;
@@ -78,10 +78,10 @@
     StringBuilder oss;
     oss << "[ connected: " << connected << " local: [ " << local.adapter_id()
         << "/" << local.network_id() << " "
-        << webrtc::AdapterTypeToString(local.adapter_type())
+        << AdapterTypeToString(local.adapter_type())
         << " turn: " << local.uses_turn() << " ] remote: [ "
         << remote.adapter_id() << "/" << remote.network_id() << " "
-        << webrtc::AdapterTypeToString(remote.adapter_type())
+        << AdapterTypeToString(remote.adapter_type())
         << " turn: " << remote.uses_turn()
         << " ] packet_overhead_bytes: " << packet_overhead << " ]";
     return oss.Release();
diff --git a/rtc_base/network_unittest.cc b/rtc_base/network_unittest.cc
index 8a754cc..dde29cb 100644
--- a/rtc_base/network_unittest.cc
+++ b/rtc_base/network_unittest.cc
@@ -401,7 +401,7 @@
     IPAddress ip = (*it)->GetBestIP();
     SocketAddress bindaddress(ip, 0);
     bindaddress.SetScopeID((*it)->scope_id());
-    // TODO(thaloun): Use webrtc::Socket once it supports IPv6.
+    // TODO(thaloun): Use Socket once it supports IPv6.
     int fd = static_cast<int>(socket(ip.family(), SOCK_STREAM, IPPROTO_TCP));
     if (fd > 0) {
       size_t ipsize = bindaddress.ToSockAddrStorage(&storage);
diff --git a/rtc_base/openssl_adapter.cc b/rtc_base/openssl_adapter.cc
index b25e9fb..b13778b 100644
--- a/rtc_base/openssl_adapter.cc
+++ b/rtc_base/openssl_adapter.cc
@@ -258,8 +258,8 @@
   identity_ =
       absl::WrapUnique(static_cast<BoringSSLIdentity*>(identity.release()));
 #else
-  identity_ = absl::WrapUnique(
-      static_cast<webrtc::OpenSSLIdentity*>(identity.release()));
+  identity_ =
+      absl::WrapUnique(static_cast<OpenSSLIdentity*>(identity.release()));
 #endif
 }
 
@@ -912,7 +912,7 @@
   }
   const BoringSSLCertificate cert(std::move(crypto_buffer));
 #else
-  const webrtc::OpenSSLCertificate cert(X509_STORE_CTX_get_current_cert(store));
+  const OpenSSLCertificate cert(X509_STORE_CTX_get_current_cert(store));
 #endif
   if (!ssl_cert_verifier_->Verify(cert)) {
     RTC_LOG(LS_INFO) << "Failed to verify certificate using custom callback";
diff --git a/rtc_base/openssl_adapter.h b/rtc_base/openssl_adapter.h
index 479b1a6..3f3951d 100644
--- a/rtc_base/openssl_adapter.h
+++ b/rtc_base/openssl_adapter.h
@@ -148,7 +148,7 @@
 #ifdef OPENSSL_IS_BORINGSSL
   std::unique_ptr<BoringSSLIdentity> identity_;
 #else
-  std::unique_ptr<webrtc::OpenSSLIdentity> identity_;
+  std::unique_ptr<OpenSSLIdentity> identity_;
 #endif
   // Indicates whethere this is a client or a server.
   SSLRole role_;
@@ -211,8 +211,8 @@
 
  private:
   // Holds the SSLMode (DTLS,TLS) that will be used to set the session cache.
-  SSLMode ssl_mode_ = webrtc::SSL_MODE_TLS;
-  SSLRole ssl_role_ = webrtc::SSL_CLIENT;
+  SSLMode ssl_mode_ = SSL_MODE_TLS;
+  SSLRole ssl_role_ = SSL_CLIENT;
   bool ignore_bad_cert_ = false;
 
   std::unique_ptr<SSLIdentity> identity_;
diff --git a/rtc_base/openssl_identity.cc b/rtc_base/openssl_identity.cc
index 32b8b3b..11b8aa8 100644
--- a/rtc_base/openssl_identity.cc
+++ b/rtc_base/openssl_identity.cc
@@ -115,9 +115,8 @@
 std::unique_ptr<SSLIdentity> OpenSSLIdentity::CreateFromPEMChainStrings(
     absl::string_view private_key,
     absl::string_view certificate_chain) {
-  BIO* bio =
-      BIO_new_mem_buf(certificate_chain.data(),
-                      webrtc::dchecked_cast<int>(certificate_chain.size()));
+  BIO* bio = BIO_new_mem_buf(certificate_chain.data(),
+                             dchecked_cast<int>(certificate_chain.size()));
   if (!bio)
     return nullptr;
   BIO_set_mem_eof_return(bio, 0);
diff --git a/rtc_base/openssl_stream_adapter.cc b/rtc_base/openssl_stream_adapter.cc
index 944567b..ef704d3 100644
--- a/rtc_base/openssl_stream_adapter.cc
+++ b/rtc_base/openssl_stream_adapter.cc
@@ -317,7 +317,7 @@
 #ifdef OPENSSL_IS_BORINGSSL
   identity_.reset(static_cast<BoringSSLIdentity*>(identity.release()));
 #else
-  identity_.reset(static_cast<webrtc::OpenSSLIdentity*>(identity.release()));
+  identity_.reset(static_cast<OpenSSLIdentity*>(identity.release()));
 #endif
 }
 
@@ -1203,7 +1203,7 @@
   // Record the peer's certificate.
   X509* cert = X509_STORE_CTX_get0_cert(store);
   stream->peer_cert_chain_.reset(
-      new SSLCertChain(std::make_unique<webrtc::OpenSSLCertificate>(cert)));
+      new SSLCertChain(std::make_unique<OpenSSLCertificate>(cert)));
 
   // If the peer certificate digest isn't known yet, we'll wait to verify
   // until it's known, and for now just return a success status.
diff --git a/rtc_base/openssl_stream_adapter.h b/rtc_base/openssl_stream_adapter.h
index 257f100..2cce9c1 100644
--- a/rtc_base/openssl_stream_adapter.h
+++ b/rtc_base/openssl_stream_adapter.h
@@ -79,7 +79,7 @@
   SSLIdentity* GetIdentityForTesting() const override;
 
   // Default argument is for compatibility
-  void SetServerRole(SSLRole role = webrtc::SSL_SERVER) override;
+  void SetServerRole(SSLRole role = SSL_SERVER) override;
   SSLPeerCertificateDigestError SetPeerCertificateDigest(
       absl::string_view digest_alg,
       ArrayView<const uint8_t> digest_val) override;
@@ -232,7 +232,7 @@
 #ifdef OPENSSL_IS_BORINGSSL
   std::unique_ptr<BoringSSLIdentity> identity_;
 #else
-  std::unique_ptr<webrtc::OpenSSLIdentity> identity_;
+  std::unique_ptr<OpenSSLIdentity> identity_;
 #endif
   // The certificate chain that the peer presented. Initially null, until the
   // connection is established.
diff --git a/rtc_base/physical_socket_server.cc b/rtc_base/physical_socket_server.cc
index b18052a..fa4e15dd 100644
--- a/rtc_base/physical_socket_server.cc
+++ b/rtc_base/physical_socket_server.cc
@@ -1825,7 +1825,7 @@
   int64_t msStop = -1;
   if (cmsWait != kForeverMs) {
     msWait = cmsWait;
-    msStop = webrtc::TimeAfter(cmsWait);
+    msStop = TimeAfter(cmsWait);
   }
 
   std::vector<pollfd> pollfds;
@@ -1833,7 +1833,7 @@
 
   while (fWait_) {
     {
-      webrtc::CritScope cr(&crit_);
+      CritScope cr(&crit_);
       current_dispatcher_keys_.clear();
       pollfds.clear();
       pollfds.reserve(dispatcher_by_key_.size());
@@ -1867,7 +1867,7 @@
       return true;
     } else {
       // We have signaled descriptors
-      webrtc::CritScope cr(&crit_);
+      CritScope cr(&crit_);
       // Iterate only on the dispatchers whose file descriptors were passed into
       // poll; this avoids the ABA problem (a socket being destroyed and a new
       // one created with the same file descriptor).
@@ -1880,7 +1880,7 @@
     }
 
     if (cmsWait != kForeverMs) {
-      msWait = webrtc::TimeDiff(msStop, webrtc::TimeMillis());
+      msWait = TimeDiff(msStop, TimeMillis());
       if (msWait < 0) {
         // Return success on timeout.
         return true;
@@ -1896,8 +1896,7 @@
 #endif  // WEBRTC_POSIX
 
 #if defined(WEBRTC_WIN)
-bool PhysicalSocketServer::Wait(webrtc::TimeDelta max_wait_duration,
-                                bool process_io) {
+bool PhysicalSocketServer::Wait(TimeDelta max_wait_duration, bool process_io) {
   // We don't support reentrant waiting.
   RTC_DCHECK(!waiting_);
   ScopedSetTrue set(&waiting_);
@@ -1905,7 +1904,7 @@
   int cmsWait = ToCmsWait(max_wait_duration);
   int64_t cmsTotal = cmsWait;
   int64_t cmsElapsed = 0;
-  int64_t msStart = webrtc::Time();
+  int64_t msStart = Time();
 
   fWait_ = true;
   while (fWait_) {
@@ -1915,7 +1914,7 @@
     events.push_back(socket_ev_);
 
     {
-      webrtc::CritScope cr(&crit_);
+      CritScope cr(&crit_);
       // Get a snapshot of all current dispatchers; this is used to avoid the
       // ABA problem (see later comment) and avoids the dispatcher_by_key_
       // iterator being invalidated by calling CheckSignalClose, which may
@@ -1971,7 +1970,7 @@
       return true;
     } else {
       // Figure out which one it is and call it
-      webrtc::CritScope cr(&crit_);
+      CritScope cr(&crit_);
       int index = dw - WSA_WAIT_EVENT_0;
       if (index > 0) {
         --index;  // The first event is the socket event
@@ -2064,7 +2063,7 @@
     // Break?
     if (!fWait_)
       break;
-    cmsElapsed = webrtc::TimeSince(msStart);
+    cmsElapsed = TimeSince(msStart);
     if ((cmsWait != kForeverMs) && (cmsElapsed >= cmsWait)) {
       break;
     }
diff --git a/rtc_base/ref_counted_object.h b/rtc_base/ref_counted_object.h
index 032e9ad..79c2d12 100644
--- a/rtc_base/ref_counted_object.h
+++ b/rtc_base/ref_counted_object.h
@@ -54,7 +54,7 @@
  protected:
   ~RefCountedObject() override {}
 
-  mutable webrtc::webrtc_impl::RefCounter ref_count_{0};
+  mutable webrtc_impl::RefCounter ref_count_{0};
 };
 
 template <class T>
@@ -81,7 +81,7 @@
  private:
   ~FinalRefCountedObject() = default;
 
-  mutable webrtc::webrtc_impl::RefCounter ref_count_{0};
+  mutable webrtc_impl::RefCounter ref_count_{0};
 };
 
 }  // namespace webrtc
diff --git a/rtc_base/rtc_certificate_generator.h b/rtc_base/rtc_certificate_generator.h
index ca5d419..b5be206 100644
--- a/rtc_base/rtc_certificate_generator.h
+++ b/rtc_base/rtc_certificate_generator.h
@@ -30,8 +30,7 @@
  public:
   // Functor that will be called when certificate is generated asynchroniosly.
   // Called with nullptr as the parameter on failure.
-  using Callback =
-      absl::AnyInvocable<void(scoped_refptr<webrtc::RTCCertificate>) &&>;
+  using Callback = absl::AnyInvocable<void(scoped_refptr<RTCCertificate>) &&>;
 
   virtual ~RTCCertificateGeneratorInterface() = default;
 
diff --git a/rtc_base/ssl_certificate.cc b/rtc_base/ssl_certificate.cc
index 7db106c..d6c170d 100644
--- a/rtc_base/ssl_certificate.cc
+++ b/rtc_base/ssl_certificate.cc
@@ -138,7 +138,7 @@
 #ifdef OPENSSL_IS_BORINGSSL
   return BoringSSLCertificate::FromPEMString(pem_string);
 #else
-  return webrtc::OpenSSLCertificate::FromPEMString(pem_string);
+  return OpenSSLCertificate::FromPEMString(pem_string);
 #endif
 }
 
diff --git a/rtc_base/ssl_stream_adapter.h b/rtc_base/ssl_stream_adapter.h
index f8f8173..baa4912 100644
--- a/rtc_base/ssl_stream_adapter.h
+++ b/rtc_base/ssl_stream_adapter.h
@@ -125,8 +125,7 @@
   // Caller is responsible for freeing the returned object.
   static std::unique_ptr<SSLStreamAdapter> Create(
       std::unique_ptr<StreamInterface> stream,
-      absl::AnyInvocable<void(webrtc::SSLHandshakeError)> handshake_error =
-          nullptr,
+      absl::AnyInvocable<void(SSLHandshakeError)> handshake_error = nullptr,
       const FieldTrialsView* field_trials = nullptr);
 
   SSLStreamAdapter() = default;
diff --git a/rtc_base/ssl_stream_adapter_unittest.cc b/rtc_base/ssl_stream_adapter_unittest.cc
index ac0714e..6de76994 100644
--- a/rtc_base/ssl_stream_adapter_unittest.cc
+++ b/rtc_base/ssl_stream_adapter_unittest.cc
@@ -209,9 +209,9 @@
 // This is needed because in this file, tests connect both client and server
 // streams (SSLDummyStream) to the same underlying `stream` objects
 // (see CreateClientStream() and CreateServerStream()).
-class StreamWrapper : public webrtc::StreamInterface {
+class StreamWrapper : public StreamInterface {
  public:
-  explicit StreamWrapper(std::unique_ptr<webrtc::StreamInterface> stream)
+  explicit StreamWrapper(std::unique_ptr<StreamInterface> stream)
       : stream_(std::move(stream)) {
     stream_->SetEventCallback([this](int events, int err) {
       RTC_DCHECK_RUN_ON(&callback_sequence_);
@@ -229,28 +229,28 @@
     callbacks_.RemoveReceivers(removal_tag);
   }
 
-  webrtc::StreamState GetState() const override { return stream_->GetState(); }
+  StreamState GetState() const override { return stream_->GetState(); }
 
   void Close() override { stream_->Close(); }
 
-  webrtc::StreamResult Read(webrtc::ArrayView<uint8_t> buffer,
-                            size_t& read,
-                            int& error) override {
+  StreamResult Read(ArrayView<uint8_t> buffer,
+                    size_t& read,
+                    int& error) override {
     return stream_->Read(buffer, read, error);
   }
 
-  webrtc::StreamResult Write(webrtc::ArrayView<const uint8_t> data,
-                             size_t& written,
-                             int& error) override {
+  StreamResult Write(ArrayView<const uint8_t> data,
+                     size_t& written,
+                     int& error) override {
     return stream_->Write(data, written, error);
   }
 
  private:
-  const std::unique_ptr<webrtc::StreamInterface> stream_;
-  webrtc::CallbackList<int, int> callbacks_;
+  const std::unique_ptr<StreamInterface> stream_;
+  CallbackList<int, int> callbacks_;
 };
 
-class SSLDummyStream final : public webrtc::StreamInterface {
+class SSLDummyStream final : public StreamInterface {
  public:
   SSLDummyStream(SSLStreamAdapterTestBase* test,
                  absl::string_view side,
@@ -270,30 +270,30 @@
     out_->UnsubscribeStreamEvent(this);
   }
 
-  webrtc::StreamState GetState() const override { return webrtc::SS_OPEN; }
+  StreamState GetState() const override { return SS_OPEN; }
 
-  webrtc::StreamResult Read(webrtc::ArrayView<uint8_t> buffer,
-                            size_t& read,
-                            int& error) override {
-    webrtc::StreamResult r;
+  StreamResult Read(ArrayView<uint8_t> buffer,
+                    size_t& read,
+                    int& error) override {
+    StreamResult r;
 
     r = in_->Read(buffer, read, error);
-    if (r == webrtc::SR_BLOCK)
-      return webrtc::SR_BLOCK;
-    if (r == webrtc::SR_EOS)
-      return webrtc::SR_EOS;
+    if (r == SR_BLOCK)
+      return SR_BLOCK;
+    if (r == SR_EOS)
+      return SR_EOS;
 
-    if (r != webrtc::SR_SUCCESS) {
+    if (r != SR_SUCCESS) {
       ADD_FAILURE();
-      return webrtc::SR_ERROR;
+      return SR_ERROR;
     }
 
-    return webrtc::SR_SUCCESS;
+    return SR_SUCCESS;
   }
 
   // Catch readability events on in and pass them up.
   void OnEventIn(int sig, int err) {
-    int mask = (webrtc::SE_READ | webrtc::SE_CLOSE);
+    int mask = (SE_READ | SE_CLOSE);
 
     if (sig & mask) {
       RTC_LOG(LS_VERBOSE) << "SSLDummyStream::OnEventIn side=" << side_
@@ -304,24 +304,24 @@
 
   // Catch writeability events on out and pass them up.
   void OnEventOut(int sig, int err) {
-    if (sig & webrtc::SE_WRITE) {
+    if (sig & SE_WRITE) {
       RTC_LOG(LS_VERBOSE) << "SSLDummyStream::OnEventOut side=" << side_
                           << " sig=" << sig << " forwarding upward";
 
-      PostEvent(sig & webrtc::SE_WRITE, 0);
+      PostEvent(sig & SE_WRITE, 0);
     }
   }
 
   // Write to the outgoing FifoBuffer
-  webrtc::StreamResult WriteData(webrtc::ArrayView<const uint8_t> data,
-                                 size_t& written,
-                                 int& error) {
+  StreamResult WriteData(ArrayView<const uint8_t> data,
+                         size_t& written,
+                         int& error) {
     return out_->Write(data, written, error);
   }
 
-  webrtc::StreamResult Write(webrtc::ArrayView<const uint8_t> data,
-                             size_t& written,
-                             int& error) override;
+  StreamResult Write(ArrayView<const uint8_t> data,
+                     size_t& written,
+                     int& error) override;
 
   void Close() override {
     RTC_LOG(LS_INFO) << "Closing outbound stream";
@@ -336,8 +336,8 @@
     }));
   }
 
-  webrtc::ScopedTaskSafety task_safety_;
-  webrtc::Thread* const thread_ = webrtc::Thread::Current();
+  ScopedTaskSafety task_safety_;
+  Thread* const thread_ = Thread::Current();
   SSLStreamAdapterTestBase* test_base_;
   const std::string side_;
   StreamWrapper* const in_;
@@ -345,7 +345,7 @@
   bool first_packet_;
 };
 
-class BufferQueueStream : public webrtc::StreamInterface {
+class BufferQueueStream : public StreamInterface {
  public:
   BufferQueueStream(size_t capacity, size_t default_size)
       : buffer_(capacity, default_size) {}
@@ -353,42 +353,42 @@
   // Implementation of abstract StreamInterface methods.
 
   // A buffer queue stream is always "open".
-  webrtc::StreamState GetState() const override { return webrtc::SS_OPEN; }
+  StreamState GetState() const override { return SS_OPEN; }
 
   // Reading a buffer queue stream will either succeed or block.
-  webrtc::StreamResult Read(webrtc::ArrayView<uint8_t> buffer,
-                            size_t& read,
-                            int& error) override {
+  StreamResult Read(ArrayView<uint8_t> buffer,
+                    size_t& read,
+                    int& error) override {
     const bool was_writable = buffer_.is_writable();
     if (!buffer_.ReadFront(buffer.data(), buffer.size(), &read))
-      return webrtc::SR_BLOCK;
+      return SR_BLOCK;
 
     if (!was_writable)
       NotifyWritableForTest();
 
-    return webrtc::SR_SUCCESS;
+    return SR_SUCCESS;
   }
 
   // Writing to a buffer queue stream will either succeed or block.
-  webrtc::StreamResult Write(webrtc::ArrayView<const uint8_t> data,
-                             size_t& written,
-                             int& error) override {
+  StreamResult Write(ArrayView<const uint8_t> data,
+                     size_t& written,
+                     int& error) override {
     const bool was_readable = buffer_.is_readable();
     if (!buffer_.WriteBack(data.data(), data.size(), &written))
-      return webrtc::SR_BLOCK;
+      return SR_BLOCK;
 
     if (!was_readable)
       NotifyReadableForTest();
 
-    return webrtc::SR_SUCCESS;
+    return SR_SUCCESS;
   }
 
   // A buffer queue stream can not be closed.
   void Close() override {}
 
  protected:
-  void NotifyReadableForTest() { PostEvent(webrtc::SE_READ, 0); }
-  void NotifyWritableForTest() { PostEvent(webrtc::SE_WRITE, 0); }
+  void NotifyReadableForTest() { PostEvent(SE_READ, 0); }
+  void NotifyWritableForTest() { PostEvent(SE_WRITE, 0); }
 
  private:
   void PostEvent(int events, int err) {
@@ -398,9 +398,9 @@
     }));
   }
 
-  webrtc::Thread* const thread_ = webrtc::Thread::Current();
-  webrtc::ScopedTaskSafety task_safety_;
-  webrtc::BufferQueue buffer_;
+  Thread* const thread_ = Thread::Current();
+  ScopedTaskSafety task_safety_;
+  BufferQueue buffer_;
 };
 
 static const int kBufferCapacity = 1;
@@ -409,14 +409,14 @@
 class SSLStreamAdapterTestBase : public ::testing::Test,
                                  public sigslot::has_slots<> {
  public:
-  SSLStreamAdapterTestBase(
-      absl::string_view client_cert_pem,
-      absl::string_view client_private_key_pem,
-      bool dtls,
-      webrtc::KeyParams client_key_type = webrtc::KeyParams(webrtc::KT_DEFAULT),
-      webrtc::KeyParams server_key_type = webrtc::KeyParams(webrtc::KT_DEFAULT),
-      std::pair<std::string, size_t> digest =
-          std::make_pair(webrtc::DIGEST_SHA_256, SHA256_DIGEST_LENGTH))
+  SSLStreamAdapterTestBase(absl::string_view client_cert_pem,
+                           absl::string_view client_private_key_pem,
+                           bool dtls,
+                           KeyParams client_key_type = KeyParams(KT_DEFAULT),
+                           KeyParams server_key_type = KeyParams(KT_DEFAULT),
+                           std::pair<std::string, size_t> digest =
+                               std::make_pair(DIGEST_SHA_256,
+                                              SHA256_DIGEST_LENGTH))
       : client_cert_pem_(client_cert_pem),
         client_private_key_pem_(client_private_key_pem),
         client_key_type_(client_key_type),
@@ -429,29 +429,28 @@
         lose_first_packet_(false),
         damage_(false),
         dtls_(dtls),
-        handshake_wait_(webrtc::TimeDelta::Millis(5000)),
+        handshake_wait_(TimeDelta::Millis(5000)),
         identities_set_(false) {
     // Set use of the test RNG to get predictable loss patterns.
-    webrtc::SetRandomTestMode(true);
+    SetRandomTestMode(true);
   }
 
   ~SSLStreamAdapterTestBase() override {
     // Put it back for the next test.
-    webrtc::SetRandomTestMode(false);
+    SetRandomTestMode(false);
   }
 
   void SetUp() override {
     InitializeClientAndServerStreams();
 
-    std::unique_ptr<webrtc::SSLIdentity> client_identity;
+    std::unique_ptr<SSLIdentity> client_identity;
     if (!client_cert_pem_.empty() && !client_private_key_pem_.empty()) {
-      client_identity = webrtc::SSLIdentity::CreateFromPEMStrings(
+      client_identity = SSLIdentity::CreateFromPEMStrings(
           client_private_key_pem_, client_cert_pem_);
     } else {
-      client_identity = webrtc::SSLIdentity::Create("client", client_key_type_);
+      client_identity = SSLIdentity::Create("client", client_key_type_);
     }
-    auto server_identity =
-        webrtc::SSLIdentity::Create("server", server_key_type_);
+    auto server_identity = SSLIdentity::Create("server", server_key_type_);
 
     client_ssl_->SetIdentity(std::move(client_identity));
     server_ssl_->SetIdentity(std::move(server_identity));
@@ -462,8 +461,8 @@
     server_ssl_.reset(nullptr);
   }
 
-  virtual std::unique_ptr<webrtc::StreamInterface> CreateClientStream() = 0;
-  virtual std::unique_ptr<webrtc::StreamInterface> CreateServerStream() = 0;
+  virtual std::unique_ptr<StreamInterface> CreateClientStream() = 0;
+  virtual std::unique_ptr<StreamInterface> CreateServerStream() = 0;
 
   void InitializeClientAndServerStreams(
       absl::string_view client_experiment = "",
@@ -473,13 +472,13 @@
     // The field trials are read when the OpenSSLStreamAdapter is initialized.
     {
       FieldTrials trial = CreateTestFieldTrials(client_experiment);
-      client_ssl_ = webrtc::SSLStreamAdapter::Create(CreateClientStream(),
-                                                     nullptr, &trial);
+      client_ssl_ =
+          SSLStreamAdapter::Create(CreateClientStream(), nullptr, &trial);
     }
     {
       FieldTrials trial = CreateTestFieldTrials(server_experiment);
-      server_ssl_ = webrtc::SSLStreamAdapter::Create(CreateServerStream(),
-                                                     nullptr, &trial);
+      server_ssl_ =
+          SSLStreamAdapter::Create(CreateServerStream(), nullptr, &trial);
     }
     client_ssl_->SetEventCallback(
         [this](int events, int err) { OnClientEvent(events, err); });
@@ -495,32 +494,31 @@
 
     time_t now = time(nullptr);
 
-    webrtc::SSLIdentityParams client_params;
-    client_params.key_params = webrtc::KeyParams(webrtc::KT_DEFAULT);
+    SSLIdentityParams client_params;
+    client_params.key_params = KeyParams(KT_DEFAULT);
     client_params.common_name = "client";
     client_params.not_before = now + not_before;
     client_params.not_after = now + not_after;
-    auto client_identity = webrtc::SSLIdentity::CreateForTest(client_params);
+    auto client_identity = SSLIdentity::CreateForTest(client_params);
 
-    webrtc::SSLIdentityParams server_params;
-    server_params.key_params = webrtc::KeyParams(webrtc::KT_DEFAULT);
+    SSLIdentityParams server_params;
+    server_params.key_params = KeyParams(KT_DEFAULT);
     server_params.common_name = "server";
     server_params.not_before = now + not_before;
     server_params.not_after = now + not_after;
-    auto server_identity = webrtc::SSLIdentity::CreateForTest(server_params);
+    auto server_identity = SSLIdentity::CreateForTest(server_params);
 
     client_ssl_->SetIdentity(std::move(client_identity));
     server_ssl_->SetIdentity(std::move(server_identity));
   }
 
   void SetPeerIdentitiesByDigest(bool correct, bool expect_success) {
-    webrtc::Buffer server_digest(0, EVP_MAX_MD_SIZE);
-    webrtc::Buffer client_digest(0, EVP_MAX_MD_SIZE);
-    webrtc::SSLPeerCertificateDigestError err;
-    webrtc::SSLPeerCertificateDigestError expected_err =
-        expect_success
-            ? webrtc::SSLPeerCertificateDigestError::NONE
-            : webrtc::SSLPeerCertificateDigestError::VERIFICATION_FAILED;
+    Buffer server_digest(0, EVP_MAX_MD_SIZE);
+    Buffer client_digest(0, EVP_MAX_MD_SIZE);
+    SSLPeerCertificateDigestError err;
+    SSLPeerCertificateDigestError expected_err =
+        expect_success ? SSLPeerCertificateDigestError::NONE
+                       : SSLPeerCertificateDigestError::VERIFICATION_FAILED;
 
     RTC_LOG(LS_INFO) << "Setting peer identities by digest";
     RTC_DCHECK(server_identity());
@@ -550,8 +548,8 @@
     identities_set_ = true;
   }
 
-  void SetupProtocolVersions(webrtc::SSLProtocolVersion server_version,
-                             webrtc::SSLProtocolVersion client_version) {
+  void SetupProtocolVersions(SSLProtocolVersion server_version,
+                             SSLProtocolVersion client_version) {
     server_ssl_->SetMaxProtocolVersion(server_version);
     client_ssl_->SetMaxProtocolVersion(client_version);
   }
@@ -581,20 +579,19 @@
 
     // Now run the handshake
     if (expect_success) {
-      EXPECT_THAT(webrtc::WaitUntil(
+      EXPECT_THAT(WaitUntil(
                       [&] {
-                        return (client_ssl_->GetState() == webrtc::SS_OPEN) &&
-                               (server_ssl_->GetState() == webrtc::SS_OPEN);
+                        return (client_ssl_->GetState() == SS_OPEN) &&
+                               (server_ssl_->GetState() == SS_OPEN);
                       },
                       ::testing::IsTrue(),
                       {.timeout = handshake_wait_, .clock = &clock_}),
-                  webrtc::IsRtcOk());
+                  IsRtcOk());
     } else {
-      EXPECT_THAT(
-          webrtc::WaitUntil([&] { return client_ssl_->GetState(); },
-                            ::testing::Eq(webrtc::SS_CLOSED),
+      EXPECT_THAT(WaitUntil([&] { return client_ssl_->GetState(); },
+                            ::testing::Eq(SS_CLOSED),
                             {.timeout = handshake_wait_, .clock = &clock_}),
-          webrtc::IsRtcOk());
+                  IsRtcOk());
     }
   }
 
@@ -602,7 +599,7 @@
   // Only works for BoringSSL which allows advancing the fake clock.
   void TestHandshakeTimeout() {
     int64_t time_start = clock_.TimeNanos();
-    webrtc::TimeDelta time_increment = webrtc::TimeDelta::Millis(1000);
+    TimeDelta time_increment = TimeDelta::Millis(1000);
 
     if (!dtls_) {
       // Make sure we simulate a reliable network for TLS.
@@ -628,19 +625,19 @@
 
     // Now wait for the handshake to timeout (or fail after an hour of simulated
     // time).
-    while (client_ssl_->GetState() == webrtc::SS_OPENING &&
-           (webrtc::TimeDiff(clock_.TimeNanos(), time_start) <
-            3600 * webrtc::kNumNanosecsPerSec)) {
-      EXPECT_THAT(webrtc::WaitUntil(
+    while (client_ssl_->GetState() == SS_OPENING &&
+           (TimeDiff(clock_.TimeNanos(), time_start) <
+            3600 * kNumNanosecsPerSec)) {
+      EXPECT_THAT(WaitUntil(
                       [&] {
-                        return !((client_ssl_->GetState() == webrtc::SS_OPEN) &&
-                                 (server_ssl_->GetState() == webrtc::SS_OPEN));
+                        return !((client_ssl_->GetState() == SS_OPEN) &&
+                                 (server_ssl_->GetState() == SS_OPEN));
                       },
                       ::testing::IsTrue(), {.clock = &clock_}),
-                  webrtc::IsRtcOk());
+                  IsRtcOk());
       clock_.AdvanceTime(time_increment);
     }
-    EXPECT_EQ(client_ssl_->GetState(), webrtc::SS_CLOSED);
+    EXPECT_EQ(client_ssl_->GetState(), SS_CLOSED);
   }
 
   // This tests that the handshake can complete before the identity is verified,
@@ -662,30 +659,30 @@
     ASSERT_EQ(0, client_ssl_->StartSSL());
 
     // Now run the handshake.
-    EXPECT_THAT(webrtc::WaitUntil(
+    EXPECT_THAT(WaitUntil(
                     [&] {
                       return client_ssl_->IsTlsConnected() &&
                              server_ssl_->IsTlsConnected();
                     },
                     ::testing::IsTrue(),
                     {.timeout = handshake_wait_, .clock = &clock_}),
-                webrtc::IsRtcOk());
+                IsRtcOk());
 
     // Until the identity has been verified, the state should still be
     // SS_OPENING and writes should return SR_BLOCK.
-    EXPECT_EQ(webrtc::SS_OPENING, client_ssl_->GetState());
-    EXPECT_EQ(webrtc::SS_OPENING, server_ssl_->GetState());
+    EXPECT_EQ(SS_OPENING, client_ssl_->GetState());
+    EXPECT_EQ(SS_OPENING, server_ssl_->GetState());
     uint8_t packet[1] = {0};
     size_t sent;
     size_t read;
     int error;
-    EXPECT_EQ(webrtc::SR_BLOCK, client_ssl_->Write(packet, sent, error));
-    EXPECT_EQ(webrtc::SR_BLOCK, server_ssl_->Write(packet, sent, error));
+    EXPECT_EQ(SR_BLOCK, client_ssl_->Write(packet, sent, error));
+    EXPECT_EQ(SR_BLOCK, server_ssl_->Write(packet, sent, error));
 
     // Collect both of the certificate digests; needs to be done before calling
     // SetPeerCertificateDigest as that may reset the identity.
-    webrtc::Buffer server_digest(0, EVP_MAX_MD_SIZE);
-    webrtc::Buffer client_digest(0, EVP_MAX_MD_SIZE);
+    Buffer server_digest(0, EVP_MAX_MD_SIZE);
+    Buffer client_digest(0, EVP_MAX_MD_SIZE);
 
     ASSERT_THAT(server_identity(), NotNull());
     ASSERT_TRUE(server_identity()->certificate().ComputeDigest(
@@ -702,24 +699,23 @@
     }
 
     // Set the peer certificate digest for the client.
-    webrtc::SSLPeerCertificateDigestError err;
-    webrtc::SSLPeerCertificateDigestError expected_err =
-        valid_identity
-            ? webrtc::SSLPeerCertificateDigestError::NONE
-            : webrtc::SSLPeerCertificateDigestError::VERIFICATION_FAILED;
+    SSLPeerCertificateDigestError err;
+    SSLPeerCertificateDigestError expected_err =
+        valid_identity ? SSLPeerCertificateDigestError::NONE
+                       : SSLPeerCertificateDigestError::VERIFICATION_FAILED;
     err =
         client_ssl_->SetPeerCertificateDigest(digest_algorithm_, server_digest);
     EXPECT_EQ(expected_err, err);
     // State should then transition to SS_OPEN or SS_CLOSED based on validation
     // of the identity.
     if (valid_identity) {
-      EXPECT_EQ(webrtc::SS_OPEN, client_ssl_->GetState());
+      EXPECT_EQ(SS_OPEN, client_ssl_->GetState());
       // If the client sends a packet while the server still hasn't verified the
       // client identity, the server should continue to return SR_BLOCK.
-      EXPECT_EQ(webrtc::SR_SUCCESS, client_ssl_->Write(packet, sent, error));
-      EXPECT_EQ(webrtc::SR_BLOCK, server_ssl_->Read(packet, read, error));
+      EXPECT_EQ(SR_SUCCESS, client_ssl_->Write(packet, sent, error));
+      EXPECT_EQ(SR_BLOCK, server_ssl_->Read(packet, read, error));
     } else {
-      EXPECT_EQ(webrtc::SS_CLOSED, client_ssl_->GetState());
+      EXPECT_EQ(SS_CLOSED, client_ssl_->GetState());
     }
 
     // Set the peer certificate digest for the server.
@@ -727,27 +723,27 @@
         server_ssl_->SetPeerCertificateDigest(digest_algorithm_, client_digest);
     EXPECT_EQ(expected_err, err);
     if (valid_identity) {
-      EXPECT_EQ(webrtc::SS_OPEN, server_ssl_->GetState());
+      EXPECT_EQ(SS_OPEN, server_ssl_->GetState());
     } else {
-      EXPECT_EQ(webrtc::SS_CLOSED, server_ssl_->GetState());
+      EXPECT_EQ(SS_CLOSED, server_ssl_->GetState());
     }
   }
 
-  webrtc::StreamResult DataWritten(SSLDummyStream* from,
-                                   const void* data,
-                                   size_t data_len,
-                                   size_t& written,
-                                   int& error) {
+  StreamResult DataWritten(SSLDummyStream* from,
+                           const void* data,
+                           size_t data_len,
+                           size_t& written,
+                           int& error) {
     // Randomly drop loss_ percent of packets
-    if (webrtc::CreateRandomId() % 100 < static_cast<uint32_t>(loss_)) {
+    if (CreateRandomId() % 100 < static_cast<uint32_t>(loss_)) {
       RTC_LOG(LS_VERBOSE) << "Randomly dropping packet, size=" << data_len;
       written = data_len;
-      return webrtc::SR_SUCCESS;
+      return SR_SUCCESS;
     }
     if (dtls_ && (data_len > mtu_)) {
       RTC_LOG(LS_VERBOSE) << "Dropping packet > mtu, size=" << data_len;
       written = data_len;
-      return webrtc::SR_SUCCESS;
+      return SR_SUCCESS;
     }
     max_seen_mtu_ = std::max(max_seen_mtu_, data_len);
 
@@ -760,12 +756,11 @@
       RTC_LOG(LS_VERBOSE) << "Damaging packet";
       memcpy(&buf[0], data, data_len);
       buf[data_len - 1]++;
-      return from->WriteData(webrtc::MakeArrayView(&buf[0], data_len), written,
-                             error);
+      return from->WriteData(MakeArrayView(&buf[0], data_len), written, error);
     }
 
     return from->WriteData(
-        webrtc::MakeArrayView(reinterpret_cast<const uint8_t*>(data), data_len),
+        MakeArrayView(reinterpret_cast<const uint8_t*>(data), data_len),
         written, error);
   }
 
@@ -782,9 +777,7 @@
   void SetMtu(size_t mtu) { mtu_ = mtu; }
   size_t GetMaxSeenMtu() const { return max_seen_mtu_; }
 
-  void SetHandshakeWait(int wait) {
-    handshake_wait_ = webrtc::TimeDelta::Millis(wait);
-  }
+  void SetHandshakeWait(int wait) { handshake_wait_ = TimeDelta::Millis(wait); }
 
   void SetDtlsSrtpCryptoSuites(const std::vector<int>& ciphers, bool client) {
     if (client)
@@ -800,8 +793,8 @@
       return server_ssl_->GetDtlsSrtpCryptoSuite(retval);
   }
 
-  std::unique_ptr<webrtc::SSLCertificate> GetPeerCertificate(bool client) {
-    std::unique_ptr<webrtc::SSLCertChain> chain;
+  std::unique_ptr<SSLCertificate> GetPeerCertificate(bool client) {
+    std::unique_ptr<SSLCertChain> chain;
     if (client)
       chain = client_ssl_->GetPeerSSLCertChain();
     else
@@ -825,7 +818,7 @@
 
   // To be implemented by subclasses.
   virtual void WriteData() = 0;
-  virtual void ReadData(webrtc::StreamInterface* stream) = 0;
+  virtual void ReadData(StreamInterface* stream) = 0;
   virtual void TestTransfer(int size) = 0;
 
  private:
@@ -833,11 +826,11 @@
     RTC_LOG(LS_VERBOSE) << "SSLStreamAdapterTestBase::OnClientEvent sig="
                         << sig;
 
-    if (sig & webrtc::SE_READ) {
+    if (sig & SE_READ) {
       ReadData(client_ssl_.get());
     }
 
-    if (sig & webrtc::SE_WRITE) {
+    if (sig & SE_WRITE) {
       WriteData();
     }
   }
@@ -845,35 +838,35 @@
   void OnServerEvent(int sig, int err) {
     RTC_LOG(LS_VERBOSE) << "SSLStreamAdapterTestBase::OnServerEvent sig="
                         << sig;
-    if (sig & webrtc::SE_READ) {
+    if (sig & SE_READ) {
       ReadData(server_ssl_.get());
     }
   }
 
  protected:
-  webrtc::SSLIdentity* client_identity() const {
+  SSLIdentity* client_identity() const {
     if (!client_ssl_) {
       return nullptr;
     }
     return client_ssl_->GetIdentityForTesting();
   }
-  webrtc::SSLIdentity* server_identity() const {
+  SSLIdentity* server_identity() const {
     if (!server_ssl_) {
       return nullptr;
     }
     return server_ssl_->GetIdentityForTesting();
   }
 
-  webrtc::AutoThread main_thread_;
-  webrtc::ScopedFakeClock clock_;
+  AutoThread main_thread_;
+  ScopedFakeClock clock_;
   std::string client_cert_pem_;
   std::string client_private_key_pem_;
-  webrtc::KeyParams client_key_type_;
-  webrtc::KeyParams server_key_type_;
+  KeyParams client_key_type_;
+  KeyParams server_key_type_;
   std::string digest_algorithm_;
   size_t digest_length_;
-  std::unique_ptr<webrtc::SSLStreamAdapter> client_ssl_;
-  std::unique_ptr<webrtc::SSLStreamAdapter> server_ssl_;
+  std::unique_ptr<SSLStreamAdapter> client_ssl_;
+  std::unique_ptr<SSLStreamAdapter> server_ssl_;
   int delay_;
   size_t mtu_;
   size_t max_seen_mtu_ = 0;
@@ -881,14 +874,14 @@
   bool lose_first_packet_;
   bool damage_;
   bool dtls_;
-  webrtc::TimeDelta handshake_wait_;
+  TimeDelta handshake_wait_;
   bool identities_set_;
 };
 
 class SSLStreamAdapterTestDTLSBase : public SSLStreamAdapterTestBase {
  public:
-  SSLStreamAdapterTestDTLSBase(webrtc::KeyParams param1,
-                               webrtc::KeyParams param2,
+  SSLStreamAdapterTestDTLSBase(KeyParams param1,
+                               KeyParams param2,
                                std::pair<std::string, size_t> digest)
       : SSLStreamAdapterTestBase("", "", true, param1, param2, digest),
         packet_size_(1000),
@@ -902,12 +895,12 @@
         count_(0),
         sent_(0) {}
 
-  std::unique_ptr<webrtc::StreamInterface> CreateClientStream() override final {
+  std::unique_ptr<StreamInterface> CreateClientStream() override final {
     return absl::WrapUnique(
         new SSLDummyStream(this, "c2s", &client_buffer_, &server_buffer_));
   }
 
-  std::unique_ptr<webrtc::StreamInterface> CreateServerStream() override final {
+  std::unique_ptr<StreamInterface> CreateServerStream() override final {
     return absl::WrapUnique(
         new SSLDummyStream(this, "s2c", &server_buffer_, &client_buffer_));
   }
@@ -926,12 +919,12 @@
 
       size_t sent;
       int error;
-      webrtc::StreamResult rv = client_ssl_->Write(
-          webrtc::MakeArrayView(packet, packet_size_), sent, error);
-      if (rv == webrtc::SR_SUCCESS) {
+      StreamResult rv =
+          client_ssl_->Write(MakeArrayView(packet, packet_size_), sent, error);
+      if (rv == SR_SUCCESS) {
         RTC_LOG(LS_VERBOSE) << "Sent: " << sent_;
         sent_++;
-      } else if (rv == webrtc::SR_BLOCK) {
+      } else if (rv == SR_BLOCK) {
         RTC_LOG(LS_VERBOSE) << "Blocked...";
         break;
       } else {
@@ -943,26 +936,26 @@
     delete[] packet;
   }
 
-  void ReadData(webrtc::StreamInterface* stream) override final {
+  void ReadData(StreamInterface* stream) override final {
     uint8_t buffer[2000];
     size_t bread;
     int err2;
-    webrtc::StreamResult r;
+    StreamResult r;
 
     for (;;) {
       r = stream->Read(buffer, bread, err2);
 
-      if (r == webrtc::SR_ERROR) {
+      if (r == SR_ERROR) {
         // Unfortunately, errors are the way that the stream adapter
         // signals close right now
         stream->Close();
         return;
       }
 
-      if (r == webrtc::SR_BLOCK)
+      if (r == SR_BLOCK)
         break;
 
-      ASSERT_EQ(webrtc::SR_SUCCESS, r);
+      ASSERT_EQ(SR_SUCCESS, r);
       RTC_LOG(LS_VERBOSE) << "Read " << bread;
 
       // Now parse the datagram
@@ -984,20 +977,20 @@
 
     WriteData();
 
-    EXPECT_THAT(webrtc::WaitUntil([&] { return sent_; }, ::testing::Eq(count_),
-                                  {.timeout = webrtc::TimeDelta::Millis(10000),
-                                   .clock = &clock_}),
-                webrtc::IsRtcOk());
+    EXPECT_THAT(
+        WaitUntil([&] { return sent_; }, ::testing::Eq(count_),
+                  {.timeout = TimeDelta::Millis(10000), .clock = &clock_}),
+        IsRtcOk());
     RTC_LOG(LS_INFO) << "sent_ == " << sent_;
 
     if (damage_) {
-      clock_.AdvanceTime(webrtc::TimeDelta::Millis(2000));
+      clock_.AdvanceTime(TimeDelta::Millis(2000));
       EXPECT_EQ(0U, received_.size());
     } else if (loss_ == 0) {
-      EXPECT_THAT(webrtc::WaitUntil([&] { return received_.size(); },
-                                    ::testing::Eq(static_cast<size_t>(sent_)),
-                                    {.clock = &clock_}),
-                  webrtc::IsRtcOk());
+      EXPECT_THAT(WaitUntil([&] { return received_.size(); },
+                            ::testing::Eq(static_cast<size_t>(sent_)),
+                            {.clock = &clock_}),
+                  IsRtcOk());
     } else {
       RTC_LOG(LS_INFO) << "Sent " << sent_ << " packets; received "
                        << received_.size();
@@ -1017,10 +1010,9 @@
   std::set<int> received_;
 };
 
-webrtc::StreamResult SSLDummyStream::Write(
-    webrtc::ArrayView<const uint8_t> data,
-    size_t& written,
-    int& error) {
+webrtc::StreamResult SSLDummyStream::Write(ArrayView<const uint8_t> data,
+                                           size_t& written,
+                                           int& error) {
   RTC_LOG(LS_VERBOSE) << "Writing to loopback " << data.size();
 
   if (first_packet_) {
@@ -1028,7 +1020,7 @@
     if (test_base_->GetLoseFirstPacket()) {
       RTC_LOG(LS_INFO) << "Losing initial packet of length " << data.size();
       written = data.size();  // Fake successful writing also to writer.
-      return webrtc::SR_SUCCESS;
+      return SR_SUCCESS;
     }
   }
 
@@ -1049,12 +1041,12 @@
     client_ssl_->SetInitialRetransmissionTimeout(/*timeout_ms=*/1000);
     server_ssl_->SetInitialRetransmissionTimeout(/*timeout_ms=*/1000);
 
-    std::unique_ptr<webrtc::SSLIdentity> client_identity;
+    std::unique_ptr<SSLIdentity> client_identity;
     if (!client_cert_pem_.empty() && !client_private_key_pem_.empty()) {
-      client_identity = webrtc::SSLIdentity::CreateFromPEMStrings(
+      client_identity = SSLIdentity::CreateFromPEMStrings(
           client_private_key_pem_, client_cert_pem_);
     } else {
-      client_identity = webrtc::SSLIdentity::Create("client", client_key_type_);
+      client_identity = SSLIdentity::Create("client", client_key_type_);
     }
 
     client_ssl_->SetIdentity(std::move(client_identity));
@@ -1062,11 +1054,11 @@
 };
 
 TEST_F(SSLStreamAdapterTestDTLSCertChain, TwoCertHandshake) {
-  auto server_identity = webrtc::SSLIdentity::CreateFromPEMChainStrings(
+  auto server_identity = SSLIdentity::CreateFromPEMChainStrings(
       kRSA_PRIVATE_KEY_PEM, std::string(kCERT_PEM) + kCACert);
   server_ssl_->SetIdentity(std::move(server_identity));
   TestHandshake();
-  std::unique_ptr<webrtc::SSLCertChain> peer_cert_chain =
+  std::unique_ptr<SSLCertChain> peer_cert_chain =
       client_ssl_->GetPeerSSLCertChain();
   ASSERT_NE(nullptr, peer_cert_chain);
   EXPECT_EQ(kCERT_PEM, peer_cert_chain->Get(0).ToPEMString());
@@ -1079,10 +1071,10 @@
 }
 
 TEST_F(SSLStreamAdapterTestDTLSCertChain, TwoCertHandshakeWithCopy) {
-  server_ssl_->SetIdentity(webrtc::SSLIdentity::CreateFromPEMChainStrings(
+  server_ssl_->SetIdentity(SSLIdentity::CreateFromPEMChainStrings(
       kRSA_PRIVATE_KEY_PEM, std::string(kCERT_PEM) + kCACert));
   TestHandshake();
-  std::unique_ptr<webrtc::SSLCertChain> peer_cert_chain =
+  std::unique_ptr<SSLCertChain> peer_cert_chain =
       client_ssl_->GetPeerSSLCertChain();
   ASSERT_NE(nullptr, peer_cert_chain);
   EXPECT_EQ(kCERT_PEM, peer_cert_chain->Get(0).ToPEMString());
@@ -1095,10 +1087,10 @@
 }
 
 TEST_F(SSLStreamAdapterTestDTLSCertChain, ThreeCertHandshake) {
-  server_ssl_->SetIdentity(webrtc::SSLIdentity::CreateFromPEMChainStrings(
+  server_ssl_->SetIdentity(SSLIdentity::CreateFromPEMChainStrings(
       kRSA_PRIVATE_KEY_PEM, std::string(kCERT_PEM) + kIntCert1 + kCACert));
   TestHandshake();
-  std::unique_ptr<webrtc::SSLCertChain> peer_cert_chain =
+  std::unique_ptr<SSLCertChain> peer_cert_chain =
       client_ssl_->GetPeerSSLCertChain();
   ASSERT_NE(nullptr, peer_cert_chain);
   EXPECT_EQ(kCERT_PEM, peer_cert_chain->Get(0).ToPEMString());
@@ -1113,9 +1105,8 @@
 
 class SSLStreamAdapterTestDTLSHandshake
     : public SSLStreamAdapterTestDTLSBase,
-      public WithParamInterface<tuple<webrtc::KeyParams,
-                                      webrtc::KeyParams,
-                                      std::pair<std::string, size_t>>> {
+      public WithParamInterface<
+          tuple<KeyParams, KeyParams, std::pair<std::string, size_t>>> {
  public:
   SSLStreamAdapterTestDTLSHandshake()
       : SSLStreamAdapterTestDTLSBase(::testing::get<0>(GetParam()),
@@ -1131,8 +1122,7 @@
 // Test getting the used DTLS ciphers.
 // DTLS 1.2 has different cipher suite than 1.3.
 TEST_P(SSLStreamAdapterTestDTLSHandshake, TestGetSslCipherSuite) {
-  SetupProtocolVersions(webrtc::SSL_PROTOCOL_DTLS_12,
-                        webrtc::SSL_PROTOCOL_DTLS_12);
+  SetupProtocolVersions(SSL_PROTOCOL_DTLS_12, SSL_PROTOCOL_DTLS_12);
   TestHandshake();
 
   int client_cipher;
@@ -1141,7 +1131,7 @@
   ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
 
   ASSERT_EQ(client_cipher, server_cipher);
-  ASSERT_TRUE(webrtc::SSLStreamAdapter::IsAcceptableCipher(
+  ASSERT_TRUE(SSLStreamAdapter::IsAcceptableCipher(
       server_cipher, ::testing::get<1>(GetParam()).type()));
 }
 
@@ -1152,36 +1142,33 @@
 INSTANTIATE_TEST_SUITE_P(
     SSLStreamAdapterTestDTLSHandshakeKeyParameters,
     SSLStreamAdapterTestDTLSHandshake,
-    Values(std::make_tuple(webrtc::KeyParams::ECDSA(webrtc::EC_NIST_P256),
-                           webrtc::KeyParams::RSA(webrtc::kRsaDefaultModSize,
-                                                  webrtc::kRsaDefaultExponent),
-                           std::make_pair(webrtc::DIGEST_SHA_256,
-                                          SHA256_DIGEST_LENGTH)),
-           std::make_tuple(
-               webrtc::KeyParams::RSA(1152, webrtc::kRsaDefaultExponent),
-               webrtc::KeyParams::ECDSA(webrtc::EC_NIST_P256),
-               std::make_pair(webrtc::DIGEST_SHA_256, SHA256_DIGEST_LENGTH))));
+    Values(
+        std::make_tuple(KeyParams::ECDSA(EC_NIST_P256),
+                        KeyParams::RSA(kRsaDefaultModSize, kRsaDefaultExponent),
+                        std::make_pair(DIGEST_SHA_256, SHA256_DIGEST_LENGTH)),
+        std::make_tuple(KeyParams::RSA(1152, kRsaDefaultExponent),
+                        KeyParams::ECDSA(EC_NIST_P256),
+                        std::make_pair(DIGEST_SHA_256, SHA256_DIGEST_LENGTH))));
 
 INSTANTIATE_TEST_SUITE_P(
     SSLStreamAdapterTestDTLSHandshakeSignatureAlgorithms,
     SSLStreamAdapterTestDTLSHandshake,
-    Combine(Values(webrtc::KeyParams::ECDSA(webrtc::EC_NIST_P256)),
-            Values(webrtc::KeyParams::ECDSA(webrtc::EC_NIST_P256)),
-            Values(std::make_pair(webrtc::DIGEST_SHA_1, SHA_DIGEST_LENGTH),
-                   std::make_pair(webrtc::DIGEST_SHA_224, SHA224_DIGEST_LENGTH),
-                   std::make_pair(webrtc::DIGEST_SHA_256, SHA256_DIGEST_LENGTH),
-                   std::make_pair(webrtc::DIGEST_SHA_384, SHA384_DIGEST_LENGTH),
-                   std::make_pair(webrtc::DIGEST_SHA_512,
-                                  SHA512_DIGEST_LENGTH))));
+    Combine(Values(KeyParams::ECDSA(EC_NIST_P256)),
+            Values(KeyParams::ECDSA(EC_NIST_P256)),
+            Values(std::make_pair(DIGEST_SHA_1, SHA_DIGEST_LENGTH),
+                   std::make_pair(DIGEST_SHA_224, SHA224_DIGEST_LENGTH),
+                   std::make_pair(DIGEST_SHA_256, SHA256_DIGEST_LENGTH),
+                   std::make_pair(DIGEST_SHA_384, SHA384_DIGEST_LENGTH),
+                   std::make_pair(DIGEST_SHA_512, SHA512_DIGEST_LENGTH))));
 
 // Basic tests done with ECDSA certificates and SHA-256.
 class SSLStreamAdapterTestDTLS : public SSLStreamAdapterTestDTLSBase {
  public:
   SSLStreamAdapterTestDTLS()
       : SSLStreamAdapterTestDTLSBase(
-            webrtc::KeyParams::ECDSA(webrtc::EC_NIST_P256),
-            webrtc::KeyParams::ECDSA(webrtc::EC_NIST_P256),
-            std::make_pair(webrtc::DIGEST_SHA_256, SHA256_DIGEST_LENGTH)) {}
+            KeyParams::ECDSA(EC_NIST_P256),
+            KeyParams::ECDSA(EC_NIST_P256),
+            std::make_pair(DIGEST_SHA_256, SHA256_DIGEST_LENGTH)) {}
 };
 
 #ifdef OPENSSL_IS_BORINGSSL
@@ -1273,7 +1260,7 @@
 
 // Test DTLS-SRTP with SrtpAes128CmSha1_80
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpAes128CmSha1_80) {
-  const std::vector<int> crypto_suites = {webrtc::kSrtpAes128CmSha1_80};
+  const std::vector<int> crypto_suites = {kSrtpAes128CmSha1_80};
   SetDtlsSrtpCryptoSuites(crypto_suites, true);
   SetDtlsSrtpCryptoSuites(crypto_suites, false);
   TestHandshake();
@@ -1284,12 +1271,12 @@
   ASSERT_TRUE(GetDtlsSrtpCryptoSuite(false, &server_cipher));
 
   ASSERT_EQ(client_cipher, server_cipher);
-  ASSERT_EQ(client_cipher, webrtc::kSrtpAes128CmSha1_80);
+  ASSERT_EQ(client_cipher, kSrtpAes128CmSha1_80);
 }
 
 // Test DTLS-SRTP with SrtpAes128CmSha1_32
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpAes128CmSha1_32) {
-  const std::vector<int> crypto_suites = {webrtc::kSrtpAes128CmSha1_32};
+  const std::vector<int> crypto_suites = {kSrtpAes128CmSha1_32};
   SetDtlsSrtpCryptoSuites(crypto_suites, true);
   SetDtlsSrtpCryptoSuites(crypto_suites, false);
   TestHandshake();
@@ -1300,13 +1287,13 @@
   ASSERT_TRUE(GetDtlsSrtpCryptoSuite(false, &server_cipher));
 
   ASSERT_EQ(client_cipher, server_cipher);
-  ASSERT_EQ(client_cipher, webrtc::kSrtpAes128CmSha1_32);
+  ASSERT_EQ(client_cipher, kSrtpAes128CmSha1_32);
 }
 
 // Test DTLS-SRTP with incompatible cipher suites -- should not converge.
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpIncompatibleCipherSuites) {
-  SetDtlsSrtpCryptoSuites({webrtc::kSrtpAes128CmSha1_80}, true);
-  SetDtlsSrtpCryptoSuites({webrtc::kSrtpAes128CmSha1_32}, false);
+  SetDtlsSrtpCryptoSuites({kSrtpAes128CmSha1_80}, true);
+  SetDtlsSrtpCryptoSuites({kSrtpAes128CmSha1_32}, false);
   TestHandshake();
 
   int client_cipher;
@@ -1318,8 +1305,8 @@
 // Test DTLS-SRTP with each side being mixed -- should select the stronger
 // cipher.
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpMixed) {
-  const std::vector<int> crypto_suites = {webrtc::kSrtpAes128CmSha1_80,
-                                          webrtc::kSrtpAes128CmSha1_32};
+  const std::vector<int> crypto_suites = {kSrtpAes128CmSha1_80,
+                                          kSrtpAes128CmSha1_32};
   SetDtlsSrtpCryptoSuites(crypto_suites, true);
   SetDtlsSrtpCryptoSuites(crypto_suites, false);
   TestHandshake();
@@ -1330,12 +1317,12 @@
   ASSERT_TRUE(GetDtlsSrtpCryptoSuite(false, &server_cipher));
 
   ASSERT_EQ(client_cipher, server_cipher);
-  ASSERT_EQ(client_cipher, webrtc::kSrtpAes128CmSha1_80);
+  ASSERT_EQ(client_cipher, kSrtpAes128CmSha1_80);
 }
 
 // Test DTLS-SRTP with SrtpAeadAes128Gcm.
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpAeadAes128Gcm) {
-  std::vector<int> crypto_suites = {webrtc::kSrtpAeadAes128Gcm};
+  std::vector<int> crypto_suites = {kSrtpAeadAes128Gcm};
   SetDtlsSrtpCryptoSuites(crypto_suites, true);
   SetDtlsSrtpCryptoSuites(crypto_suites, false);
   TestHandshake();
@@ -1346,12 +1333,12 @@
   ASSERT_TRUE(GetDtlsSrtpCryptoSuite(false, &server_cipher));
 
   ASSERT_EQ(client_cipher, server_cipher);
-  ASSERT_EQ(client_cipher, webrtc::kSrtpAeadAes128Gcm);
+  ASSERT_EQ(client_cipher, kSrtpAeadAes128Gcm);
 }
 
 // Test DTLS-SRTP with all GCM-256 ciphers.
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpGCM256) {
-  std::vector<int> crypto_suites = {webrtc::kSrtpAeadAes256Gcm};
+  std::vector<int> crypto_suites = {kSrtpAeadAes256Gcm};
   SetDtlsSrtpCryptoSuites(crypto_suites, true);
   SetDtlsSrtpCryptoSuites(crypto_suites, false);
   TestHandshake();
@@ -1362,13 +1349,13 @@
   ASSERT_TRUE(GetDtlsSrtpCryptoSuite(false, &server_cipher));
 
   ASSERT_EQ(client_cipher, server_cipher);
-  ASSERT_EQ(client_cipher, webrtc::kSrtpAeadAes256Gcm);
+  ASSERT_EQ(client_cipher, kSrtpAeadAes256Gcm);
 }
 
 // Test DTLS-SRTP with incompatbile GCM-128/-256 ciphers -- should not converge.
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpIncompatibleGcmCipherSuites) {
-  SetDtlsSrtpCryptoSuites({webrtc::kSrtpAeadAes128Gcm}, true);
-  SetDtlsSrtpCryptoSuites({webrtc::kSrtpAeadAes256Gcm}, false);
+  SetDtlsSrtpCryptoSuites({kSrtpAeadAes128Gcm}, true);
+  SetDtlsSrtpCryptoSuites({kSrtpAeadAes256Gcm}, false);
   TestHandshake();
 
   int client_cipher;
@@ -1379,8 +1366,7 @@
 
 // Test DTLS-SRTP with both GCM-128/-256 ciphers -- should select GCM-256.
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpGCMMixed) {
-  std::vector<int> crypto_suites = {webrtc::kSrtpAeadAes256Gcm,
-                                    webrtc::kSrtpAeadAes128Gcm};
+  std::vector<int> crypto_suites = {kSrtpAeadAes256Gcm, kSrtpAeadAes128Gcm};
   SetDtlsSrtpCryptoSuites(crypto_suites, true);
   SetDtlsSrtpCryptoSuites(crypto_suites, false);
   TestHandshake();
@@ -1391,7 +1377,7 @@
   ASSERT_TRUE(GetDtlsSrtpCryptoSuite(false, &server_cipher));
 
   ASSERT_EQ(client_cipher, server_cipher);
-  ASSERT_EQ(client_cipher, webrtc::kSrtpAeadAes256Gcm);
+  ASSERT_EQ(client_cipher, kSrtpAeadAes256Gcm);
 }
 
 // Test SRTP cipher suite lengths.
@@ -1399,33 +1385,33 @@
   int key_len;
   int salt_len;
 
-  ASSERT_FALSE(webrtc::GetSrtpKeyAndSaltLengths(webrtc::kSrtpInvalidCryptoSuite,
-                                                &key_len, &salt_len));
+  ASSERT_FALSE(
+      GetSrtpKeyAndSaltLengths(kSrtpInvalidCryptoSuite, &key_len, &salt_len));
 
-  ASSERT_TRUE(webrtc::GetSrtpKeyAndSaltLengths(webrtc::kSrtpAes128CmSha1_32,
-                                               &key_len, &salt_len));
+  ASSERT_TRUE(
+      GetSrtpKeyAndSaltLengths(kSrtpAes128CmSha1_32, &key_len, &salt_len));
   ASSERT_EQ(128 / 8, key_len);
   ASSERT_EQ(112 / 8, salt_len);
 
-  ASSERT_TRUE(webrtc::GetSrtpKeyAndSaltLengths(webrtc::kSrtpAes128CmSha1_80,
-                                               &key_len, &salt_len));
+  ASSERT_TRUE(
+      GetSrtpKeyAndSaltLengths(kSrtpAes128CmSha1_80, &key_len, &salt_len));
   ASSERT_EQ(128 / 8, key_len);
   ASSERT_EQ(112 / 8, salt_len);
 
-  ASSERT_TRUE(webrtc::GetSrtpKeyAndSaltLengths(webrtc::kSrtpAeadAes128Gcm,
-                                               &key_len, &salt_len));
+  ASSERT_TRUE(
+      GetSrtpKeyAndSaltLengths(kSrtpAeadAes128Gcm, &key_len, &salt_len));
   ASSERT_EQ(128 / 8, key_len);
   ASSERT_EQ(96 / 8, salt_len);
 
-  ASSERT_TRUE(webrtc::GetSrtpKeyAndSaltLengths(webrtc::kSrtpAeadAes256Gcm,
-                                               &key_len, &salt_len));
+  ASSERT_TRUE(
+      GetSrtpKeyAndSaltLengths(kSrtpAeadAes256Gcm, &key_len, &salt_len));
   ASSERT_EQ(256 / 8, key_len);
   ASSERT_EQ(96 / 8, salt_len);
 }
 
 // Test the DTLS-SRTP key exporter
 TEST_F(SSLStreamAdapterTestDTLS, TestDTLSSrtpExporter) {
-  const std::vector<int> crypto_suites = {webrtc::kSrtpAes128CmSha1_80};
+  const std::vector<int> crypto_suites = {kSrtpAes128CmSha1_80};
   SetDtlsSrtpCryptoSuites(crypto_suites, true);
   SetDtlsSrtpCryptoSuites(crypto_suites, false);
 
@@ -1434,10 +1420,10 @@
   EXPECT_TRUE(GetDtlsSrtpCryptoSuite(/*client=*/false, &selected_crypto_suite));
   int key_len;
   int salt_len;
-  ASSERT_TRUE(webrtc::GetSrtpKeyAndSaltLengths(selected_crypto_suite, &key_len,
-                                               &salt_len));
-  webrtc::ZeroOnFreeBuffer<uint8_t> client_out(2 * (key_len + salt_len));
-  webrtc::ZeroOnFreeBuffer<uint8_t> server_out(2 * (key_len + salt_len));
+  ASSERT_TRUE(
+      GetSrtpKeyAndSaltLengths(selected_crypto_suite, &key_len, &salt_len));
+  ZeroOnFreeBuffer<uint8_t> client_out(2 * (key_len + salt_len));
+  ZeroOnFreeBuffer<uint8_t> server_out(2 * (key_len + salt_len));
 
   EXPECT_TRUE(client_ssl_->ExportSrtpKeyingMaterial(client_out));
   EXPECT_TRUE(server_ssl_->ExportSrtpKeyingMaterial(server_out));
@@ -1482,8 +1468,7 @@
   TestHandshake();
 
   // The client should have a peer certificate after the handshake.
-  std::unique_ptr<webrtc::SSLCertificate> client_peer_cert =
-      GetPeerCertificate(true);
+  std::unique_ptr<SSLCertificate> client_peer_cert = GetPeerCertificate(true);
   ASSERT_TRUE(client_peer_cert);
 
   // It's not kCERT_PEM.
@@ -1491,8 +1476,7 @@
   ASSERT_NE(kCERT_PEM, client_peer_string);
 
   // The server should have a peer certificate after the handshake.
-  std::unique_ptr<webrtc::SSLCertificate> server_peer_cert =
-      GetPeerCertificate(false);
+  std::unique_ptr<SSLCertificate> server_peer_cert = GetPeerCertificate(false);
   ASSERT_TRUE(server_peer_cert);
 
   // It's kCERT_PEM
@@ -1503,23 +1487,22 @@
 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
 TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings,
        DeprecatedSetPeerCertificateDigest) {
-  webrtc::SSLPeerCertificateDigestError error;
+  SSLPeerCertificateDigestError error;
   // Pass in a wrong length to trigger an error.
-  bool ret = client_ssl_->SetPeerCertificateDigest(webrtc::DIGEST_SHA_256, {},
+  bool ret = client_ssl_->SetPeerCertificateDigest(DIGEST_SHA_256, {},
                                                    /*length=*/0, &error);
   EXPECT_FALSE(ret);
-  EXPECT_EQ(error, webrtc::SSLPeerCertificateDigestError::INVALID_LENGTH);
+  EXPECT_EQ(error, SSLPeerCertificateDigestError::INVALID_LENGTH);
 }
 #pragma clang diagnostic pop
 
 struct SSLStreamAdapterTestDTLSHandshakeVersion
     : public SSLStreamAdapterTestDTLS,
       public WithParamInterface<std::tuple<
-          /* client*/ webrtc::SSLProtocolVersion,
-          /* server*/ webrtc::SSLProtocolVersion>> {
-  webrtc::SSLProtocolVersion GetMin(
-      const std::vector<webrtc::SSLProtocolVersion>& array) {
-    webrtc::SSLProtocolVersion min = array[0];
+          /* client*/ SSLProtocolVersion,
+          /* server*/ SSLProtocolVersion>> {
+  SSLProtocolVersion GetMin(const std::vector<SSLProtocolVersion>& array) {
+    SSLProtocolVersion min = array[0];
     for (const auto& e : array) {
       if (static_cast<int>(e) < static_cast<int>(min)) {
         min = e;
@@ -1527,14 +1510,14 @@
     }
     return min;
   }
-  uint16_t AsDtlsVersionBytes(webrtc::SSLProtocolVersion version) {
+  uint16_t AsDtlsVersionBytes(SSLProtocolVersion version) {
     switch (version) {
-      case webrtc::SSL_PROTOCOL_DTLS_10:
-        return webrtc::kDtls10VersionBytes;
-      case webrtc::SSL_PROTOCOL_DTLS_12:
-        return webrtc::kDtls12VersionBytes;
-      case webrtc::SSL_PROTOCOL_DTLS_13:
-        return webrtc::kDtls13VersionBytes;
+      case SSL_PROTOCOL_DTLS_10:
+        return kDtls10VersionBytes;
+      case SSL_PROTOCOL_DTLS_12:
+        return kDtls12VersionBytes;
+      case SSL_PROTOCOL_DTLS_13:
+        return kDtls13VersionBytes;
       default:
         break;
     }
@@ -1542,12 +1525,11 @@
   }
 };
 
-INSTANTIATE_TEST_SUITE_P(SSLStreamAdapterTestDTLSHandshakeVersion,
-                         SSLStreamAdapterTestDTLSHandshakeVersion,
-                         Combine(Values(webrtc::SSL_PROTOCOL_DTLS_12,
-                                        webrtc::SSL_PROTOCOL_DTLS_13),
-                                 Values(webrtc::SSL_PROTOCOL_DTLS_12,
-                                        webrtc::SSL_PROTOCOL_DTLS_13)));
+INSTANTIATE_TEST_SUITE_P(
+    SSLStreamAdapterTestDTLSHandshakeVersion,
+    SSLStreamAdapterTestDTLSHandshakeVersion,
+    Combine(Values(SSL_PROTOCOL_DTLS_12, SSL_PROTOCOL_DTLS_13),
+            Values(SSL_PROTOCOL_DTLS_12, SSL_PROTOCOL_DTLS_13)));
 
 TEST_P(SSLStreamAdapterTestDTLSHandshakeVersion, TestGetSslVersionBytes) {
   auto client = ::testing::get<0>(GetParam());
@@ -1560,9 +1542,8 @@
   ASSERT_TRUE(GetSslVersionBytes(true, &client_version));
   ASSERT_TRUE(GetSslVersionBytes(false, &server_version));
 
-  webrtc::SSLProtocolVersion expect =
-      GetMin({client, server,
-              webrtc::SSLStreamAdapter::GetMaxSupportedDTLSProtocolVersion()});
+  SSLProtocolVersion expect = GetMin(
+      {client, server, SSLStreamAdapter::GetMaxSupportedDTLSProtocolVersion()});
 
   auto expect_bytes = AsDtlsVersionBytes(expect);
   EXPECT_EQ(client_version, expect_bytes);
@@ -1581,8 +1562,7 @@
   ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
 
   ASSERT_EQ(client_cipher, server_cipher);
-  ASSERT_TRUE(webrtc::SSLStreamAdapter::IsAcceptableCipher(server_cipher,
-                                                           webrtc::KT_DEFAULT));
+  ASSERT_TRUE(SSLStreamAdapter::IsAcceptableCipher(server_cipher, KT_DEFAULT));
 }
 
 #ifdef OPENSSL_IS_BORINGSSL
@@ -1591,15 +1571,15 @@
   auto server_version = ::testing::get<1>(GetParam());
   SetupProtocolVersions(client_version, server_version);
 
-  webrtc::CryptoOptions::EphemeralKeyExchangeCipherGroups groups;
+  CryptoOptions::EphemeralKeyExchangeCipherGroups groups;
   std::vector<uint16_t> enabled = groups.GetEnabled();
   std::vector<uint16_t> groups_with_pqc;
-  if (std::find(enabled.begin(), enabled.end(),
-                webrtc::CryptoOptions::EphemeralKeyExchangeCipherGroups::
-                    kX25519_MLKEM768) == enabled.end()) {
+  if (std::find(
+          enabled.begin(), enabled.end(),
+          CryptoOptions::EphemeralKeyExchangeCipherGroups::kX25519_MLKEM768) ==
+      enabled.end()) {
     groups_with_pqc.push_back(
-        webrtc::CryptoOptions::EphemeralKeyExchangeCipherGroups::
-            kX25519_MLKEM768);
+        CryptoOptions::EphemeralKeyExchangeCipherGroups::kX25519_MLKEM768);
   }
   for (auto val : enabled) {
     groups_with_pqc.push_back(val);
@@ -1611,19 +1591,19 @@
   EXPECT_EQ(server_ssl_->GetSslGroupId(), 0);
 
   TestHandshake();
-  if (client_version == webrtc::SSL_PROTOCOL_DTLS_13 &&
-      server_version == webrtc::SSL_PROTOCOL_DTLS_13) {
-    EXPECT_EQ(client_ssl_->GetSslGroupId(),
-              webrtc::CryptoOptions::EphemeralKeyExchangeCipherGroups::
-                  kX25519_MLKEM768);
-    EXPECT_EQ(server_ssl_->GetSslGroupId(),
-              webrtc::CryptoOptions::EphemeralKeyExchangeCipherGroups::
-                  kX25519_MLKEM768);
+  if (client_version == SSL_PROTOCOL_DTLS_13 &&
+      server_version == SSL_PROTOCOL_DTLS_13) {
+    EXPECT_EQ(
+        client_ssl_->GetSslGroupId(),
+        CryptoOptions::EphemeralKeyExchangeCipherGroups::kX25519_MLKEM768);
+    EXPECT_EQ(
+        server_ssl_->GetSslGroupId(),
+        CryptoOptions::EphemeralKeyExchangeCipherGroups::kX25519_MLKEM768);
   } else {
     EXPECT_EQ(client_ssl_->GetSslGroupId(),
-              webrtc::CryptoOptions::EphemeralKeyExchangeCipherGroups::kX25519);
+              CryptoOptions::EphemeralKeyExchangeCipherGroups::kX25519);
     EXPECT_EQ(server_ssl_->GetSslGroupId(),
-              webrtc::CryptoOptions::EphemeralKeyExchangeCipherGroups::kX25519);
+              CryptoOptions::EphemeralKeyExchangeCipherGroups::kX25519);
   }
 }
 #endif
diff --git a/rtc_base/stream.h b/rtc_base/stream.h
index 9bee2be..938f70c 100644
--- a/rtc_base/stream.h
+++ b/rtc_base/stream.h
@@ -140,7 +140,7 @@
   }
 
   RTC_NO_UNIQUE_ADDRESS SequenceChecker callback_sequence_{
-      webrtc::SequenceChecker::kDetached};
+      SequenceChecker::kDetached};
 
  private:
   absl::AnyInvocable<void(int, int)> callback_
diff --git a/rtc_base/string_encode.h b/rtc_base/string_encode.h
index 4d6fc0c..d1f03e3 100644
--- a/rtc_base/string_encode.h
+++ b/rtc_base/string_encode.h
@@ -75,7 +75,7 @@
                                   int>::type = 0>
 static bool FromString(absl::string_view s, T* t) {
   RTC_DCHECK(t);
-  std::optional<T> result = webrtc::StringToNumber<T>(s);
+  std::optional<T> result = StringToNumber<T>(s);
 
   if (result)
     *t = *result;
diff --git a/rtc_base/string_utils.h b/rtc_base/string_utils.h
index ca2607b..3c6d190 100644
--- a/rtc_base/string_utils.h
+++ b/rtc_base/string_utils.h
@@ -37,7 +37,7 @@
 // std::map that support heterogenous lookup.
 //
 // Example usage:
-// std::map<std::string, int, webrtc::AbslStringViewCmp> my_map;
+// std::map<std::string, int, AbslStringViewCmp> my_map;
 struct AbslStringViewCmp {
   using is_transparent = void;
   bool operator()(absl::string_view a, absl::string_view b) const {
diff --git a/rtc_base/system_time.cc b/rtc_base/system_time.cc
index c6a9b7b..83a08f6 100644
--- a/rtc_base/system_time.cc
+++ b/rtc_base/system_time.cc
@@ -56,7 +56,7 @@
     RTC_DCHECK_NE(b, 0);
     RTC_DCHECK_LE(a, std::numeric_limits<int64_t>::max() / b)
         << "The multiplication " << a << " * " << b << " overflows";
-    return webrtc::dchecked_cast<int64_t>(a * b);
+    return dchecked_cast<int64_t>(a * b);
   };
   ticks = mul(mach_absolute_time(), timebase.numer) / timebase.denom;
 #elif defined(WEBRTC_POSIX)
@@ -90,7 +90,7 @@
   ticks = now + (num_wrap_timegettime << 32);
   // TODO(deadbeef): Calculate with nanosecond precision. Otherwise, we're
   // just wasting a multiply and divide when doing Time() on Windows.
-  ticks = ticks * webrtc::kNumNanosecsPerMillisec;
+  ticks = ticks * kNumNanosecsPerMillisec;
 #pragma clang diagnostic pop
 #else
 #error Unsupported platform.
diff --git a/rtc_base/task_queue_for_test.h b/rtc_base/task_queue_for_test.h
index 2f1ca08..cdbf925 100644
--- a/rtc_base/task_queue_for_test.h
+++ b/rtc_base/task_queue_for_test.h
@@ -52,21 +52,19 @@
   // Returns non-owning pointer to the task queue implementation.
   TaskQueueBase* Get() { return impl_.get(); }
 
-  void PostTask(
-      absl::AnyInvocable<void() &&> task,
-      const webrtc::Location& location = webrtc::Location::Current()) {
+  void PostTask(absl::AnyInvocable<void() &&> task,
+                const Location& location = Location::Current()) {
     impl_->PostTask(std::move(task), location);
   }
-  void PostDelayedTask(
-      absl::AnyInvocable<void() &&> task,
-      webrtc::TimeDelta delay,
-      const webrtc::Location& location = webrtc::Location::Current()) {
+  void PostDelayedTask(absl::AnyInvocable<void() &&> task,
+                       TimeDelta delay,
+                       const Location& location = Location::Current()) {
     impl_->PostDelayedTask(std::move(task), delay, location);
   }
   void PostDelayedHighPrecisionTask(
       absl::AnyInvocable<void() &&> task,
-      webrtc::TimeDelta delay,
-      const webrtc::Location& location = webrtc::Location::Current()) {
+      TimeDelta delay,
+      const Location& location = Location::Current()) {
     impl_->PostDelayedHighPrecisionTask(std::move(task), delay, location);
   }
 
diff --git a/rtc_base/task_queue_win.cc b/rtc_base/task_queue_win.cc
index 67aa8fe..490ea83 100644
--- a/rtc_base/task_queue_win.cc
+++ b/rtc_base/task_queue_win.cc
@@ -50,7 +50,7 @@
 void CALLBACK InitializeQueueThread(ULONG_PTR param) {
   MSG msg;
   ::PeekMessage(&msg, nullptr, WM_USER, WM_USER, PM_NOREMOVE);
-  webrtc::Event* data = reinterpret_cast<webrtc::Event*>(param);
+  Event* data = reinterpret_cast<Event*>(param);
   data->Set();
 }
 
@@ -197,9 +197,9 @@
                            ThreadPriority priority)
     : in_queue_(::CreateEvent(nullptr, true, false, nullptr)) {
   RTC_DCHECK(in_queue_);
-  thread_ = webrtc::PlatformThread::SpawnJoinable(
-      [this] { RunThreadMain(); }, queue_name,
-      webrtc::ThreadAttributes().SetPriority(priority));
+  thread_ =
+      PlatformThread::SpawnJoinable([this] { RunThreadMain(); }, queue_name,
+                                    ThreadAttributes().SetPriority(priority));
 
   Event event(false, false);
   RTC_CHECK(thread_.QueueAPC(&InitializeQueueThread,
diff --git a/rtc_base/thread.cc b/rtc_base/thread.cc
index 6599615..815ac34 100644
--- a/rtc_base/thread.cc
+++ b/rtc_base/thread.cc
@@ -906,7 +906,7 @@
     : Thread(CreateDefaultSocketServer(), /*do_init=*/false) {
   if (!ThreadManager::Instance()->CurrentThread()) {
     // DoInit registers with ThreadManager. Do that only if we intend to
-    // be webrtc::Thread::Current(), otherwise ProcessAllMessageQueuesInternal
+    // be Thread::Current(), otherwise ProcessAllMessageQueuesInternal
     // will post a message to a queue that no running thread is serving.
     DoInit();
     ThreadManager::Instance()->SetCurrentThread(this);
diff --git a/rtc_base/thread.h b/rtc_base/thread.h
index 69c74fe..ef970b4 100644
--- a/rtc_base/thread.h
+++ b/rtc_base/thread.h
@@ -366,7 +366,7 @@
   // These functions are public to avoid injecting test hooks. Don't call them
   // outside of tests.
   // This method should be called when thread is created using non standard
-  // method, like derived implementation of webrtc::Thread and it can not be
+  // method, like derived implementation of Thread and it can not be
   // started by calling Start(). This will set started flag to true and
   // owned to false. This must be called from the current thread.
   bool WrapCurrent();
diff --git a/rtc_base/time_utils.h b/rtc_base/time_utils.h
index 30cb8b8..d4dbb2b 100644
--- a/rtc_base/time_utils.h
+++ b/rtc_base/time_utils.h
@@ -127,7 +127,7 @@
 // Note that this function obeys the system's idea about what the time
 // is. It is not guaranteed to be monotonic; it will jump in case the
 // system time is changed, e.g., by some other process calling
-// settimeofday. Always use webrtc::TimeMicros(), not this function, for
+// settimeofday. Always use TimeMicros(), not this function, for
 // measuring time intervals and timeouts.
 RTC_EXPORT int64_t TimeUTCMicros();
 
diff --git a/rtc_base/timestamp_aligner.h b/rtc_base/timestamp_aligner.h
index d060a35..a3eda6c 100644
--- a/rtc_base/timestamp_aligner.h
+++ b/rtc_base/timestamp_aligner.h
@@ -19,13 +19,13 @@
 namespace webrtc {
 
 // The TimestampAligner class helps translating timestamps of a capture system
-// into the same timescale as is used by webrtc::TimeMicros(). Some capture
+// into the same timescale as is used by TimeMicros(). Some capture
 // systems provide timestamps, which comes from the capturing hardware (camera
 // or sound card) or stamped close to the capturing hardware. Such timestamps
 // are more accurate (less jittery) than reading the system clock, but may have
 // a different epoch and unknown clock drift. Frame timestamps in webrtc should
-// use webrtc::TimeMicros (system monotonic time), and this class provides a
-// filter which lets us use the webrtc::TimeMicros timescale, and at the same
+// use TimeMicros (system monotonic time), and this class provides a
+// filter which lets us use the TimeMicros timescale, and at the same
 // time take advantage of higher accuracy of the capturer's clock.
 
 // This class is not thread safe, so all calls to it must be synchronized
@@ -46,9 +46,9 @@
   static constexpr int64_t kMinFrameIntervalUs = kNumMicrosecsPerMillisec;
 
   // Translates timestamps of a capture system to the same timescale as is used
-  // by webrtc::TimeMicros(). `capturer_time_us` is assumed to be accurate, but
+  // by TimeMicros(). `capturer_time_us` is assumed to be accurate, but
   // with an unknown epoch and clock drift. `system_time_us` is
-  // time according to webrtc::TimeMicros(), preferably read as soon as
+  // time according to TimeMicros(), preferably read as soon as
   // possible when the frame is captured. It may have poor accuracy
   // due to poor resolution or scheduling delays. Returns the
   // translated timestamp.
diff --git a/rtc_base/unique_id_generator.h b/rtc_base/unique_id_generator.h
index 5fe3366..7047c15 100644
--- a/rtc_base/unique_id_generator.h
+++ b/rtc_base/unique_id_generator.h
@@ -54,7 +54,7 @@
 
  private:
   RTC_NO_UNIQUE_ADDRESS SequenceChecker sequence_checker_{
-      webrtc::SequenceChecker::kDetached};
+      SequenceChecker::kDetached};
   static_assert(std::is_integral<TIntegral>::value, "Must be integral type.");
   TIntegral counter_ RTC_GUARDED_BY(sequence_checker_);
   std::set<TIntegral> known_ids_ RTC_GUARDED_BY(sequence_checker_);
diff --git a/rtc_base/win32.cc b/rtc_base/win32.cc
index d7105fc6..a505017 100644
--- a/rtc_base/win32.cc
+++ b/rtc_base/win32.cc
@@ -137,7 +137,7 @@
     for (int i = 0; i < run_array_size; ++i) {
       if (runpos[i] == -1) {
         cursor += snprintf(cursor, INET6_ADDRSTRLEN - (cursor - dst), "%x",
-                           webrtc::NetworkToHost16(as_shorts[i]));
+                           NetworkToHost16(as_shorts[i]));
         if (i != 7 && runpos[i + 1] != 1) {
           *cursor++ = ':';
         }
@@ -292,7 +292,7 @@
       if (sscanf(readcursor, "%4hx%n", &word, &bytesread) != 1) {
         return 0;
       } else {
-        *addr_cursor = webrtc::HostToNetwork16(word);
+        *addr_cursor = HostToNetwork16(word);
         ++addr_cursor;
         readcursor += bytesread;
         if (*readcursor != ':' && *readcursor != '\0') {