Index: net/tools/quic/quic_client_bin.cc |
diff --git a/net/tools/quic/quic_client_bin.cc b/net/tools/quic/quic_client_bin.cc |
index 03e4415d96b6203912e12366b8a0209b49363615..dce9e52d26e43353d922b3d701294336445b8b86 100644 |
--- a/net/tools/quic/quic_client_bin.cc |
+++ b/net/tools/quic/quic_client_bin.cc |
@@ -165,10 +165,6 @@ int main(int argc, char *argv[]) { |
std::cerr << "--initial_mtu must be an integer\n"; |
return 1; |
} |
- } else { |
- // Default and initial maximum size in bytes of a QUIC packet, which is used |
- // to set connection's max_packet_length. |
- FLAGS_initial_mtu = net::kDefaultMaxPacketSize; |
} |
VLOG(1) << "server host: " << FLAGS_host << " port: " << FLAGS_port |
@@ -219,11 +215,10 @@ int main(int argc, char *argv[]) { |
versions, &epoll_server); |
scoped_ptr<CertVerifier> cert_verifier; |
scoped_ptr<TransportSecurityState> transport_security_state; |
- if (FLAGS_initial_mtu != 0) { |
- client.set_initial_max_packet_length(FLAGS_initial_mtu); |
- } |
+ client.set_initial_max_packet_length( |
+ FLAGS_initial_mtu != 0 ? FLAGS_initial_mtu : net::kDefaultMaxPacketSize); |
if (is_https) { |
- // For secure QUIC we need to verify the cert chain.a |
+ // For secure QUIC we need to verify the cert chain. |
cert_verifier.reset(CertVerifier::CreateDefault()); |
transport_security_state.reset(new TransportSecurityState); |
client.SetProofVerifier(new ProofVerifierChromium( |