Rename packet99 to packet_ietf in quic_framer_test.cc.

Per discussion with Ian about clarifying tests (prior to adding more).

PiperOrigin-RevId: 399769759
diff --git a/quic/core/quic_framer_test.cc b/quic/core/quic_framer_test.cc
index eae7e0e..a715d9b 100644
--- a/quic/core/quic_framer_test.cc
+++ b/quic/core/quic_framer_test.cc
@@ -2161,7 +2161,7 @@
     0x00, 0x00,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -2193,8 +2193,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -2282,7 +2282,7 @@
          'r',  'l',  'd',  '!'}},
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -2315,7 +2315,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -2605,7 +2605,7 @@
           'r',  'l',  'd',  '!'}},
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -2638,7 +2638,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -2724,7 +2724,7 @@
          'r',  'l',  'd',  '!'}},
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -2757,7 +2757,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -2902,7 +2902,7 @@
          'r',  'l',  'd',  '!'}},
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // public flags (long header with packet type ZERO_RTT_PROTECTED and
       // 4-byte packet number)
       {"",
@@ -2956,7 +2956,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasLongHeaderLengths()
                  ? packet49
                  : (framer_.version().HasIetfInvariantHeader() ? packet46
@@ -3151,7 +3151,7 @@
        {0x00}}
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short packet, 4 byte packet number)
       {"",
        {0x43}},
@@ -3189,7 +3189,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -3272,7 +3272,7 @@
        {0x00}}
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -3302,7 +3302,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -3322,7 +3322,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -3362,12 +3362,12 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_FALSE(framer_.ProcessPacket(*encrypted));
   EXPECT_EQ(
       framer_.detailed_error(),
       "Underflow with gap block length 30 previous ack block start is 30.");
-  CheckFramingBoundaries(packet99, QUIC_INVALID_ACK_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_ACK_DATA);
 }
 
 // This test checks that the ack frame processor correctly identifies
@@ -3382,7 +3382,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -3420,11 +3420,11 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_FALSE(framer_.ProcessPacket(*encrypted));
   EXPECT_EQ(framer_.detailed_error(),
             "Underflow with ack block length 31 latest ack block end is 25.");
-  CheckFramingBoundaries(packet99, QUIC_INVALID_ACK_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_ACK_DATA);
 }
 
 // Tests a variety of ack block wrap scenarios. For example, if the
@@ -3440,7 +3440,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -3474,11 +3474,11 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_FALSE(framer_.ProcessPacket(*encrypted));
   EXPECT_EQ(framer_.detailed_error(),
             "Underflow with gap block length 2 previous ack block start is 1.");
-  CheckFramingBoundaries(packet99, QUIC_INVALID_ACK_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_ACK_DATA);
 }
 
 // As AckBlockUnderflowGapWrap, but in this test, it's the ack
@@ -3492,7 +3492,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -3526,11 +3526,11 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_FALSE(framer_.ProcessPacket(*encrypted));
   EXPECT_EQ(framer_.detailed_error(),
             "Underflow with ack block length 10 latest ack block end is 1.");
-  CheckFramingBoundaries(packet99, QUIC_INVALID_ACK_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_ACK_DATA);
 }
 
 // An ack block that acks the entire range, 1...0x3fffffffffffffff
@@ -3543,7 +3543,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -3574,7 +3574,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
   EXPECT_EQ(1u, visitor_.ack_frames_.size());
   const QuicAckFrame& frame = *visitor_.ack_frames_[0];
@@ -3759,7 +3759,7 @@
        {0x00}}
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -3789,7 +3789,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -3951,7 +3951,7 @@
         { 0x32, 0x10 }},
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        { 0x43 }},
@@ -4010,7 +4010,7 @@
   // clang-format on
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
@@ -4341,7 +4341,7 @@
        {0x00, 0x00, 0x00, 0x06}}
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -4369,7 +4369,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -4446,7 +4446,7 @@
       }
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -4480,7 +4480,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -4571,7 +4571,7 @@
       }
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -4605,7 +4605,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -4701,7 +4701,7 @@
     }
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
     // type (short header, 4 byte packet number)
     {"",
      {0x43}},
@@ -4735,7 +4735,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -4778,7 +4778,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -4808,7 +4808,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -4827,7 +4827,7 @@
 
   ASSERT_EQ(0u, visitor_.ack_frames_.size());
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_CONNECTION_CLOSE_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_CONNECTION_CLOSE_DATA);
 }
 
 // Check that we can extract an error code from an application close.
@@ -4839,7 +4839,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -4870,7 +4870,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -4889,7 +4889,7 @@
 
   ASSERT_EQ(0u, visitor_.ack_frames_.size());
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_CONNECTION_CLOSE_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_CONNECTION_CLOSE_DATA);
 }
 
 TEST_P(QuicFramerTest, GoAwayFrame) {
@@ -5153,7 +5153,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -5174,7 +5174,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -5187,7 +5187,7 @@
             visitor_.window_update_frame_.stream_id);
   EXPECT_EQ(kStreamOffset, visitor_.window_update_frame_.max_data);
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_MAX_DATA_FRAME_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_MAX_DATA_FRAME_DATA);
 }
 
 TEST_P(QuicFramerTest, MaxStreamDataFrame) {
@@ -5197,7 +5197,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -5221,7 +5221,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -5233,7 +5233,7 @@
   EXPECT_EQ(kStreamId, visitor_.window_update_frame_.stream_id);
   EXPECT_EQ(kStreamOffset, visitor_.window_update_frame_.max_data);
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_MAX_STREAM_DATA_FRAME_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_MAX_STREAM_DATA_FRAME_DATA);
 }
 
 TEST_P(QuicFramerTest, BlockedFrame) {
@@ -5275,7 +5275,7 @@
        {0x01, 0x02, 0x03, 0x04}},
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -5299,7 +5299,7 @@
 
   PacketFragments& fragments =
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? packet99
+          ? packet_ietf
           : (framer_.version().HasIetfInvariantHeader() ? packet46 : packet);
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
@@ -5352,7 +5352,7 @@
      0x07,
     };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
      // type (short header, 4 byte packet number)
      0x43,
      // connection_id
@@ -5367,11 +5367,11 @@
 
   QuicEncryptedPacket encrypted(
       AsChars(VersionHasIetfQuicFrames(framer_.transport_version())
-                  ? packet99
+                  ? packet_ietf
                   : (framer_.version().HasIetfInvariantHeader() ? packet46
                                                                 : packet)),
       VersionHasIetfQuicFrames(framer_.transport_version())
-          ? ABSL_ARRAYSIZE(packet99)
+          ? ABSL_ARRAYSIZE(packet_ietf)
           : (framer_.version().HasIetfInvariantHeader()
                  ? ABSL_ARRAYSIZE(packet46)
                  : ABSL_ARRAYSIZE(packet)),
@@ -5498,7 +5498,7 @@
         {{},
          {'m', 'e', 's', 's', 'a', 'g', 'e', '2'}},
    };
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
        // type (short header, 4 byte packet number)
        {"",
         {0x43}},
@@ -5528,7 +5528,7 @@
 
   std::unique_ptr<QuicEncryptedPacket> encrypted;
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    encrypted = AssemblePacketFromFragments(packet99);
+    encrypted = AssemblePacketFromFragments(packet_ietf);
   } else {
     encrypted = AssemblePacketFromFragments(packet46);
   }
@@ -5545,7 +5545,7 @@
   EXPECT_EQ(8u, visitor_.message_frames_[1]->message_length);
 
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    CheckFramingBoundaries(packet99, QUIC_INVALID_MESSAGE_DATA);
+    CheckFramingBoundaries(packet_ietf, QUIC_INVALID_MESSAGE_DATA);
   } else {
     CheckFramingBoundaries(packet46, QUIC_INVALID_MESSAGE_DATA);
   }
@@ -6175,7 +6175,7 @@
     0x00, 0x00, 0x00, 0x00
   };
 
-  unsigned char packet99[kMaxOutgoingPacketSize] = {
+  unsigned char packet_ietf[kMaxOutgoingPacketSize] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -6191,7 +6191,7 @@
 
   unsigned char* p = packet;
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
+    p = packet_ietf;
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
   }
@@ -6280,7 +6280,7 @@
     0x00, 0x00,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -6314,8 +6314,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -6364,7 +6364,7 @@
     0x00, 0x00, 0x00, 0x00
   };
 
-  unsigned char packet99[kMaxOutgoingPacketSize] = {
+  unsigned char packet_ietf[kMaxOutgoingPacketSize] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -6380,7 +6380,7 @@
 
   unsigned char* p = packet;
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
+    p = packet_ietf;
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
   }
@@ -6439,7 +6439,7 @@
     0x00, 0x00, 0x00, 0x00
   };
 
-  unsigned char packet99[kMaxOutgoingPacketSize] = {
+  unsigned char packet_ietf[kMaxOutgoingPacketSize] = {
     // type (short header, 2 byte packet number)
     0x41,
     // connection_id
@@ -6455,7 +6455,7 @@
 
   unsigned char* p = packet;
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
+    p = packet_ietf;
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
   }
@@ -6514,7 +6514,7 @@
     0x00, 0x00, 0x00, 0x00
   };
 
-  unsigned char packet99[kMaxOutgoingPacketSize] = {
+  unsigned char packet_ietf[kMaxOutgoingPacketSize] = {
     // type (short header, 1 byte packet number)
     0x40,
     // connection_id
@@ -6530,7 +6530,7 @@
 
   unsigned char* p = packet;
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
+    p = packet_ietf;
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
   }
@@ -6610,7 +6610,7 @@
     'r',  'l',  'd',  '!',
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -6638,8 +6638,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -6734,7 +6734,7 @@
       'h',  'e',  'l',  'l',  'o',  ' ',  'w',  'o',  'r', 'l', 'd', '!',
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
       // type (long header with packet type ZERO_RTT_PROTECTED)
       0xD3,
       // version tag
@@ -6768,8 +6768,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasLongHeaderLengths()) {
     p = packet49;
     p_size = ABSL_ARRAYSIZE(packet49);
@@ -6825,7 +6825,7 @@
     'r',  'l',  'd',  '!',
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -6850,8 +6850,8 @@
   unsigned char* packet = packet48;
   size_t packet_size = ABSL_ARRAYSIZE(packet48);
   if (framer_.version().HasIetfQuicFrames()) {
-    packet = packet99;
-    packet_size = ABSL_ARRAYSIZE(packet99);
+    packet = packet_ietf;
+    packet_size = ABSL_ARRAYSIZE(packet_ietf);
   }
 
   std::unique_ptr<QuicPacket> data(BuildDataPacket(header, frames));
@@ -6896,7 +6896,7 @@
         'r',  'l',  'd',  '!'}},
   };
 
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -6925,7 +6925,7 @@
   // clang-format on
 
   PacketFragments& fragments =
-      framer_.version().HasIetfQuicFrames() ? packet99 : packet48;
+      framer_.version().HasIetfQuicFrames() ? packet_ietf : packet48;
   std::unique_ptr<QuicEncryptedPacket> encrypted(
       AssemblePacketFromFragments(fragments));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
@@ -7100,7 +7100,7 @@
       0x00,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
       // type (short header, 4 byte packet number)
       0x43,
       // connection_id
@@ -7123,8 +7123,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -7193,7 +7193,7 @@
   };
 
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
       // type (short header, 4 byte packet number)
       0x43,
       // connection_id
@@ -7216,8 +7216,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -7326,7 +7326,7 @@
       0x00,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
       // type (short header, 4 byte packet number)
       0x43,
       // connection_id
@@ -7364,8 +7364,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -7585,7 +7585,7 @@
       0x00,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
       // type (short header, 4 byte packet number)
       0x43,
       // connection_id
@@ -7673,8 +7673,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -7784,7 +7784,7 @@
     0x05, 0x06, 0x07, 0x08,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short packet, 4 byte packet number)
     0x43,
     // connection_id
@@ -7811,8 +7811,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -7879,7 +7879,7 @@
     'n',
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -7906,8 +7906,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -7983,7 +7983,7 @@
     'n',
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -8012,8 +8012,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -8138,7 +8138,7 @@
     'A',  'A',  'A',  'A',  'A',  'A',  'A',  'A',
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -8193,8 +8193,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -8228,7 +8228,7 @@
 
   // clang-format off
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -8254,8 +8254,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, BuildTruncatedApplicationCloseFramePacket) {
@@ -8281,7 +8281,7 @@
   QuicFrames frames = {QuicFrame(&app_close_frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -8335,8 +8335,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, BuildGoAwayPacket) {
@@ -8607,7 +8607,7 @@
     0x55, 0x66, 0x77, 0x88,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -8631,8 +8631,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -8661,7 +8661,7 @@
   QuicFrames frames = {QuicFrame(&window_update_frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -8683,8 +8683,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, BuildMaxDataPacket) {
@@ -8707,7 +8707,7 @@
   QuicFrames frames = {QuicFrame(&window_update_frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -8727,8 +8727,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, BuildBlockedPacket) {
@@ -8782,7 +8782,7 @@
     0x01, 0x02, 0x03, 0x04,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short packet, 4 byte packet number)
     0x43,
     // connection_id
@@ -8803,8 +8803,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -8849,7 +8849,7 @@
     0x07,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -8864,7 +8864,7 @@
 
   unsigned char* p = packet;
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
+    p = packet_ietf;
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
   }
@@ -8995,7 +8995,7 @@
     'm', 'e', 's', 's', 'a', 'g', 'e', '2'
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -9018,7 +9018,7 @@
 
   unsigned char* p = packet46;
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
+    p = packet_ietf;
   }
 
   std::unique_ptr<QuicPacket> data(BuildDataPacket(header, frames));
@@ -9065,7 +9065,7 @@
     0x07,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -9083,7 +9083,7 @@
 
   unsigned char* p = packet;
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
+    p = packet_ietf;
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
   }
@@ -9748,7 +9748,7 @@
     0x9A, 0xBE,
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -9800,8 +9800,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -9917,7 +9917,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -9937,7 +9937,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -9948,7 +9948,7 @@
 
   EXPECT_EQ(kStreamOffset, visitor_.blocked_frame_.offset);
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_BLOCKED_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_BLOCKED_DATA);
 }
 
 TEST_P(QuicFramerTest, BuildIetfBlockedPacket) {
@@ -9969,7 +9969,7 @@
   QuicFrames frames = {QuicFrame(&frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -9988,8 +9988,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, IetfStreamBlockedFrame) {
@@ -10000,7 +10000,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10022,7 +10022,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10034,7 +10034,7 @@
   EXPECT_EQ(kStreamId, visitor_.blocked_frame_.stream_id);
   EXPECT_EQ(kStreamOffset, visitor_.blocked_frame_.offset);
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_STREAM_BLOCKED_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_STREAM_BLOCKED_DATA);
 }
 
 TEST_P(QuicFramerTest, BuildIetfStreamBlockedPacket) {
@@ -10055,7 +10055,7 @@
   QuicFrames frames = {QuicFrame(&frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -10076,8 +10076,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, BiDiMaxStreamsFrame) {
@@ -10088,7 +10088,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10108,7 +10108,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10119,7 +10119,7 @@
 
   EXPECT_EQ(3u, visitor_.max_streams_frame_.stream_count);
   EXPECT_FALSE(visitor_.max_streams_frame_.unidirectional);
-  CheckFramingBoundaries(packet99, QUIC_MAX_STREAMS_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_MAX_STREAMS_DATA);
 }
 
 TEST_P(QuicFramerTest, UniDiMaxStreamsFrame) {
@@ -10130,7 +10130,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10148,7 +10148,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   QuicFramerPeer::SetPerspective(&framer_, Perspective::IS_CLIENT);
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
@@ -10160,7 +10160,7 @@
 
   EXPECT_EQ(3u, visitor_.max_streams_frame_.stream_count);
   EXPECT_TRUE(visitor_.max_streams_frame_.unidirectional);
-  CheckFramingBoundaries(packet99, QUIC_MAX_STREAMS_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_MAX_STREAMS_DATA);
 }
 
 TEST_P(QuicFramerTest, ServerUniDiMaxStreamsFrame) {
@@ -10171,7 +10171,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10191,7 +10191,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10202,7 +10202,7 @@
 
   EXPECT_EQ(3u, visitor_.max_streams_frame_.stream_count);
   EXPECT_TRUE(visitor_.max_streams_frame_.unidirectional);
-  CheckFramingBoundaries(packet99, QUIC_MAX_STREAMS_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_MAX_STREAMS_DATA);
 }
 
 TEST_P(QuicFramerTest, ClientUniDiMaxStreamsFrame) {
@@ -10213,7 +10213,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10231,7 +10231,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   QuicFramerPeer::SetPerspective(&framer_, Perspective::IS_CLIENT);
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
@@ -10243,7 +10243,7 @@
 
   EXPECT_EQ(3u, visitor_.max_streams_frame_.stream_count);
   EXPECT_TRUE(visitor_.max_streams_frame_.unidirectional);
-  CheckFramingBoundaries(packet99, QUIC_MAX_STREAMS_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_MAX_STREAMS_DATA);
 }
 
 // The following four tests ensure that the framer can deserialize a stream
@@ -10260,7 +10260,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -10277,8 +10277,8 @@
   };
   // clang-format on
 
-  QuicEncryptedPacket encrypted(AsChars(packet99), ABSL_ARRAYSIZE(packet99),
-                                false);
+  QuicEncryptedPacket encrypted(AsChars(packet_ietf),
+                                ABSL_ARRAYSIZE(packet_ietf), false);
   EXPECT_TRUE(framer_.ProcessPacket(encrypted));
   EXPECT_THAT(framer_.error(), IsQuicNoError());
   ASSERT_TRUE(visitor_.header_.get());
@@ -10298,7 +10298,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // Test runs in client mode, no connection id
@@ -10314,8 +10314,8 @@
   };
   // clang-format on
 
-  QuicEncryptedPacket encrypted(AsChars(packet99), ABSL_ARRAYSIZE(packet99),
-                                false);
+  QuicEncryptedPacket encrypted(AsChars(packet_ietf),
+                                ABSL_ARRAYSIZE(packet_ietf), false);
   QuicFramerPeer::SetPerspective(&framer_, Perspective::IS_CLIENT);
   EXPECT_TRUE(framer_.ProcessPacket(encrypted));
 
@@ -10337,7 +10337,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -10354,8 +10354,8 @@
   };
   // clang-format on
 
-  QuicEncryptedPacket encrypted(AsChars(packet99), ABSL_ARRAYSIZE(packet99),
-                                false);
+  QuicEncryptedPacket encrypted(AsChars(packet_ietf),
+                                ABSL_ARRAYSIZE(packet_ietf), false);
   EXPECT_TRUE(framer_.ProcessPacket(encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10376,7 +10376,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // Test runs in client mode, no connection id
@@ -10392,8 +10392,8 @@
   };
   // clang-format on
 
-  QuicEncryptedPacket encrypted(AsChars(packet99), ABSL_ARRAYSIZE(packet99),
-                                false);
+  QuicEncryptedPacket encrypted(AsChars(packet_ietf),
+                                ABSL_ARRAYSIZE(packet_ietf), false);
   QuicFramerPeer::SetPerspective(&framer_, Perspective::IS_CLIENT);
   EXPECT_TRUE(framer_.ProcessPacket(encrypted));
 
@@ -10416,7 +10416,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -10430,8 +10430,8 @@
   };
   // clang-format on
 
-  QuicEncryptedPacket encrypted(AsChars(packet99), ABSL_ARRAYSIZE(packet99),
-                                false);
+  QuicEncryptedPacket encrypted(AsChars(packet_ietf),
+                                ABSL_ARRAYSIZE(packet_ietf), false);
   EXPECT_TRUE(framer_.ProcessPacket(encrypted));
 }
 
@@ -10443,7 +10443,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10463,7 +10463,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10475,7 +10475,7 @@
   EXPECT_EQ(0u, visitor_.max_streams_frame_.stream_count);
   EXPECT_TRUE(visitor_.max_streams_frame_.unidirectional);
 
-  CheckFramingBoundaries(packet99, QUIC_MAX_STREAMS_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_MAX_STREAMS_DATA);
 }
 
 TEST_P(QuicFramerTest, BiDiStreamsBlockedFrame) {
@@ -10486,7 +10486,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10507,7 +10507,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10519,7 +10519,7 @@
   EXPECT_EQ(3u, visitor_.streams_blocked_frame_.stream_count);
   EXPECT_FALSE(visitor_.streams_blocked_frame_.unidirectional);
 
-  CheckFramingBoundaries(packet99, QUIC_STREAMS_BLOCKED_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_STREAMS_BLOCKED_DATA);
 }
 
 TEST_P(QuicFramerTest, UniDiStreamsBlockedFrame) {
@@ -10530,7 +10530,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10551,7 +10551,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10562,7 +10562,7 @@
 
   EXPECT_EQ(3u, visitor_.streams_blocked_frame_.stream_count);
   EXPECT_TRUE(visitor_.streams_blocked_frame_.unidirectional);
-  CheckFramingBoundaries(packet99, QUIC_STREAMS_BLOCKED_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_STREAMS_BLOCKED_DATA);
 }
 
 TEST_P(QuicFramerTest, ClientUniDiStreamsBlockedFrame) {
@@ -10573,7 +10573,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10592,7 +10592,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   QuicFramerPeer::SetPerspective(&framer_, Perspective::IS_CLIENT);
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
@@ -10604,7 +10604,7 @@
 
   EXPECT_EQ(3u, visitor_.streams_blocked_frame_.stream_count);
   EXPECT_TRUE(visitor_.streams_blocked_frame_.unidirectional);
-  CheckFramingBoundaries(packet99, QUIC_STREAMS_BLOCKED_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_STREAMS_BLOCKED_DATA);
 }
 
 // Check that when we get a STREAMS_BLOCKED frame that specifies too large
@@ -10619,7 +10619,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // Test runs in client mode, no connection id
@@ -10635,8 +10635,8 @@
   };
   // clang-format on
 
-  QuicEncryptedPacket encrypted(AsChars(packet99), ABSL_ARRAYSIZE(packet99),
-                                false);
+  QuicEncryptedPacket encrypted(AsChars(packet_ietf),
+                                ABSL_ARRAYSIZE(packet_ietf), false);
   QuicFramerPeer::SetPerspective(&framer_, Perspective::IS_CLIENT);
   EXPECT_FALSE(framer_.ProcessPacket(encrypted));
 
@@ -10655,7 +10655,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10676,7 +10676,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10688,7 +10688,7 @@
   EXPECT_EQ(0u, visitor_.streams_blocked_frame_.stream_count);
   EXPECT_TRUE(visitor_.streams_blocked_frame_.unidirectional);
 
-  CheckFramingBoundaries(packet99, QUIC_STREAMS_BLOCKED_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_STREAMS_BLOCKED_DATA);
 }
 
 TEST_P(QuicFramerTest, BuildBiDiStreamsBlockedPacket) {
@@ -10710,7 +10710,7 @@
   QuicFrames frames = {QuicFrame(frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -10729,8 +10729,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, BuildUniStreamsBlockedPacket) {
@@ -10752,7 +10752,7 @@
   QuicFrames frames = {QuicFrame(frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -10771,8 +10771,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, BuildBiDiMaxStreamsPacket) {
@@ -10794,7 +10794,7 @@
   QuicFrames frames = {QuicFrame(frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -10813,8 +10813,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, BuildUniDiMaxStreamsPacket) {
@@ -10839,7 +10839,7 @@
   QuicFrames frames = {QuicFrame(frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -10858,8 +10858,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, NewConnectionIdFrame) {
@@ -10869,7 +10869,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10898,7 +10898,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10918,7 +10918,7 @@
 
   ASSERT_EQ(0u, visitor_.ack_frames_.size());
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_NEW_CONNECTION_ID_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_NEW_CONNECTION_ID_DATA);
 }
 
 TEST_P(QuicFramerTest, NewConnectionIdFrameVariableLength) {
@@ -10928,7 +10928,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -10957,7 +10957,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -10977,7 +10977,7 @@
 
   ASSERT_EQ(0u, visitor_.ack_frames_.size());
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_NEW_CONNECTION_ID_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_NEW_CONNECTION_ID_DATA);
 }
 
 // Verifies that parsing a NEW_CONNECTION_ID frame with a length above the
@@ -10989,7 +10989,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -11025,7 +11025,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_FALSE(framer_.ProcessPacket(*encrypted));
   EXPECT_THAT(framer_.error(), IsError(QUIC_INVALID_NEW_CONNECTION_ID_DATA));
   EXPECT_EQ("Invalid new connection ID length for version.",
@@ -11041,7 +11041,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -11070,7 +11070,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_FALSE(framer_.ProcessPacket(*encrypted));
   EXPECT_THAT(framer_.error(), IsError(QUIC_INVALID_NEW_CONNECTION_ID_DATA));
   EXPECT_EQ("Retire_prior_to > sequence_number.", framer_.detailed_error());
@@ -11099,7 +11099,7 @@
   QuicFrames frames = {QuicFrame(&frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -11127,8 +11127,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, NewTokenFrame) {
@@ -11234,7 +11234,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -11256,7 +11256,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -11271,7 +11271,7 @@
   EXPECT_EQ(static_cast<uint64_t>(0x7654),
             visitor_.stop_sending_frame_.ietf_error_code);
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_STOP_SENDING_FRAME_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_STOP_SENDING_FRAME_DATA);
 }
 
 TEST_P(QuicFramerTest, BuildIetfStopSendingPacket) {
@@ -11294,7 +11294,7 @@
   QuicFrames frames = {QuicFrame(&frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -11315,8 +11315,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, IetfPathChallengeFrame) {
@@ -11327,7 +11327,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -11347,7 +11347,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -11359,7 +11359,7 @@
   EXPECT_EQ(QuicPathFrameBuffer({{0, 1, 2, 3, 4, 5, 6, 7}}),
             visitor_.path_challenge_frame_.data_buffer);
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_PATH_CHALLENGE_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_PATH_CHALLENGE_DATA);
 }
 
 TEST_P(QuicFramerTest, BuildIetfPathChallengePacket) {
@@ -11379,7 +11379,7 @@
   QuicFrames frames = {QuicFrame(&frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -11398,8 +11398,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, IetfPathResponseFrame) {
@@ -11410,7 +11410,7 @@
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
 
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -11430,7 +11430,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -11442,7 +11442,7 @@
   EXPECT_EQ(QuicPathFrameBuffer({{0, 1, 2, 3, 4, 5, 6, 7}}),
             visitor_.path_response_frame_.data_buffer);
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_PATH_RESPONSE_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_PATH_RESPONSE_DATA);
 }
 
 TEST_P(QuicFramerTest, BuildIetfPathResponsePacket) {
@@ -11462,7 +11462,7 @@
   QuicFrames frames = {QuicFrame(&frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -11481,8 +11481,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, GetRetransmittableControlFrameSize) {
@@ -12212,7 +12212,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  PacketFragments packet99 = {
+  PacketFragments packet_ietf = {
       // type (short header, 4 byte packet number)
       {"",
        {0x43}},
@@ -12232,7 +12232,7 @@
   // clang-format on
 
   std::unique_ptr<QuicEncryptedPacket> encrypted(
-      AssemblePacketFromFragments(packet99));
+      AssemblePacketFromFragments(packet_ietf));
   EXPECT_TRUE(framer_.ProcessPacket(*encrypted));
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -12247,7 +12247,7 @@
 
   ASSERT_EQ(0u, visitor_.ack_frames_.size());
 
-  CheckFramingBoundaries(packet99, QUIC_INVALID_RETIRE_CONNECTION_ID_DATA);
+  CheckFramingBoundaries(packet_ietf, QUIC_INVALID_RETIRE_CONNECTION_ID_DATA);
 }
 
 TEST_P(QuicFramerTest, BuildRetireConnectionIdFramePacket) {
@@ -12268,7 +12268,7 @@
   QuicFrames frames = {QuicFrame(&frame)};
 
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -12287,8 +12287,8 @@
   ASSERT_TRUE(data != nullptr);
 
   quiche::test::CompareCharArraysWithHexError(
-      "constructed packet", data->data(), data->length(), AsChars(packet99),
-      ABSL_ARRAYSIZE(packet99));
+      "constructed packet", data->data(), data->length(), AsChars(packet_ietf),
+      ABSL_ARRAYSIZE(packet_ietf));
 }
 
 TEST_P(QuicFramerTest, AckFrameWithInvalidLargestObserved) {
@@ -12334,7 +12334,7 @@
     0x00
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -12358,8 +12358,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
   }
@@ -12412,7 +12412,7 @@
     0x00
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -12436,8 +12436,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -12512,7 +12512,7 @@
     0x00
   };
 
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -12544,8 +12544,8 @@
   unsigned char* p = packet;
   size_t p_size = ABSL_ARRAYSIZE(packet);
   if (VersionHasIetfQuicFrames(framer_.transport_version())) {
-    p = packet99;
-    p_size = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_size = ABSL_ARRAYSIZE(packet_ietf);
   } else if (framer_.version().HasIetfInvariantHeader()) {
     p = packet46;
     p_size = ABSL_ARRAYSIZE(packet46);
@@ -12626,7 +12626,7 @@
       'O',  '_',  'W',  'O',
       'R',  'L',  'D',  '?',
   };
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // first coalesced packet
       // public flags (long header with packet type ZERO_RTT_PROTECTED and
       // 4-byte packet number)
@@ -12691,8 +12691,8 @@
   unsigned char* p = packet;
   size_t p_length = ABSL_ARRAYSIZE(packet);
   if (framer_.version().HasIetfQuicFrames()) {
-    p = packet99;
-    p_length = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_length = ABSL_ARRAYSIZE(packet_ietf);
   }
 
   QuicEncryptedPacket encrypted(AsChars(p), p_length, false);
@@ -12768,7 +12768,7 @@
     0x00, 0x00, 0x00, 0x00,
     0x00, 0x00, 0x00, 0x00,
   };
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // first coalesced packet
       // public flags (long header with packet type ZERO_RTT_PROTECTED and
       // 4-byte packet number)
@@ -12810,8 +12810,8 @@
   unsigned char* p = packet;
   size_t p_length = ABSL_ARRAYSIZE(packet);
   if (framer_.version().HasIetfQuicFrames()) {
-    p = packet99;
-    p_length = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_length = ABSL_ARRAYSIZE(packet_ietf);
   }
 
   QuicEncryptedPacket encrypted(AsChars(p), p_length, false);
@@ -12896,7 +12896,7 @@
       'O',  '_',  'W',  'O',
       'R',  'L',  'D',  '?',
   };
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // first coalesced packet
       // public flags (long header with packet type ZERO_RTT_PROTECTED and
       // 4-byte packet number)
@@ -12961,8 +12961,8 @@
   unsigned char* p = packet;
   size_t p_length = ABSL_ARRAYSIZE(packet);
   if (framer_.version().HasIetfQuicFrames()) {
-    p = packet99;
-    p_length = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_length = ABSL_ARRAYSIZE(packet_ietf);
   }
 
   QuicEncryptedPacket encrypted(AsChars(p), p_length, false);
@@ -13268,7 +13268,7 @@
       'O',  '_',  'W',  'O',
       'R',  'L',  'D',  '?',
   };
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // first coalesced packet
       // public flags (long header with packet type HANDSHAKE and
       // 4-byte packet number)
@@ -13334,8 +13334,8 @@
   unsigned char* p = packet;
   size_t p_length = ABSL_ARRAYSIZE(packet);
   if (framer_.version().HasIetfQuicFrames()) {
-    p = packet99;
-    p_length = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_length = ABSL_ARRAYSIZE(packet_ietf);
   }
 
   QuicEncryptedPacket encrypted(AsChars(p), p_length, false);
@@ -13436,7 +13436,7 @@
       'O',  '_',  'W',  'O',
       'R',  'L',  'D',  '?',
   };
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // first coalesced packet
       // public flags (long header with packet type ZERO_RTT_PROTECTED and
       // 4-byte packet number)
@@ -13501,8 +13501,8 @@
   unsigned char* p = packet;
   size_t p_length = ABSL_ARRAYSIZE(packet);
   if (framer_.version().HasIetfQuicFrames()) {
-    p = packet99;
-    p_length = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_length = ABSL_ARRAYSIZE(packet_ietf);
   }
 
   QuicEncryptedPacket encrypted(AsChars(p), p_length, false);
@@ -13565,7 +13565,7 @@
       0xD3,
       // version would be here but we cut off the invalid coalesced header.
   };
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // first coalesced packet
       // public flags (long header with packet type ZERO_RTT_PROTECTED and
       // 4-byte packet number)
@@ -13606,8 +13606,8 @@
   unsigned char* p = packet;
   size_t p_length = ABSL_ARRAYSIZE(packet);
   if (framer_.version().HasIetfQuicFrames()) {
-    p = packet99;
-    p_length = ABSL_ARRAYSIZE(packet99);
+    p = packet_ietf;
+    p_length = ABSL_ARRAYSIZE(packet_ietf);
   }
 
   QuicEncryptedPacket encrypted(AsChars(p), p_length, false);
@@ -13799,7 +13799,7 @@
        // padding frame
        0x00,
    };
-  unsigned char long_header_packet99[] = {
+  unsigned char long_header_packet_ietf[] = {
        // public flags (long header with packet type ZERO_RTT_PROTECTED and
        // 4-byte packet number)
        0xD3,
@@ -13834,8 +13834,8 @@
                             ABSL_ARRAYSIZE(long_header_packet), false)));
   } else {
     EXPECT_TRUE(framer_.ProcessPacket(
-        QuicEncryptedPacket(AsChars(long_header_packet99),
-                            ABSL_ARRAYSIZE(long_header_packet99), false)));
+        QuicEncryptedPacket(AsChars(long_header_packet_ietf),
+                            ABSL_ARRAYSIZE(long_header_packet_ietf), false)));
   }
 
   EXPECT_THAT(framer_.error(), IsQuicNoError());
@@ -14623,7 +14623,7 @@
   }
   SetDecrypterLevel(ENCRYPTION_FORWARD_SECURE);
   // clang-format off
-  unsigned char packet99[] = {
+  unsigned char packet_ietf[] = {
     // type (short header, 4 byte packet number)
     0x43,
     // connection_id
@@ -14644,8 +14644,8 @@
   };
   // clang-format on
 
-  framer_.ProcessPacket(
-      QuicEncryptedPacket(AsChars(packet99), ABSL_ARRAYSIZE(packet99), false));
+  framer_.ProcessPacket(QuicEncryptedPacket(
+      AsChars(packet_ietf), ABSL_ARRAYSIZE(packet_ietf), false));
   ASSERT_EQ(1u, visitor_.ack_frames_.size());
   // Verify ack_delay_time is set correctly.
   EXPECT_EQ(QuicTime::Delta::Infinite(),