| Index: net/tools/quic/quic_client_bin.cc
|
| diff --git a/net/tools/quic/quic_client_bin.cc b/net/tools/quic/quic_client_bin.cc
|
| index 03e4415d96b6203912e12366b8a0209b49363615..dce9e52d26e43353d922b3d701294336445b8b86 100644
|
| --- a/net/tools/quic/quic_client_bin.cc
|
| +++ b/net/tools/quic/quic_client_bin.cc
|
| @@ -165,10 +165,6 @@ int main(int argc, char *argv[]) {
|
| std::cerr << "--initial_mtu must be an integer\n";
|
| return 1;
|
| }
|
| - } else {
|
| - // Default and initial maximum size in bytes of a QUIC packet, which is used
|
| - // to set connection's max_packet_length.
|
| - FLAGS_initial_mtu = net::kDefaultMaxPacketSize;
|
| }
|
|
|
| VLOG(1) << "server host: " << FLAGS_host << " port: " << FLAGS_port
|
| @@ -219,11 +215,10 @@ int main(int argc, char *argv[]) {
|
| versions, &epoll_server);
|
| scoped_ptr<CertVerifier> cert_verifier;
|
| scoped_ptr<TransportSecurityState> transport_security_state;
|
| - if (FLAGS_initial_mtu != 0) {
|
| - client.set_initial_max_packet_length(FLAGS_initial_mtu);
|
| - }
|
| + client.set_initial_max_packet_length(
|
| + FLAGS_initial_mtu != 0 ? FLAGS_initial_mtu : net::kDefaultMaxPacketSize);
|
| if (is_https) {
|
| - // For secure QUIC we need to verify the cert chain.a
|
| + // For secure QUIC we need to verify the cert chain.
|
| cert_verifier.reset(CertVerifier::CreateDefault());
|
| transport_security_state.reset(new TransportSecurityState);
|
| client.SetProofVerifier(new ProofVerifierChromium(
|
|
|