| Index: net/tools/quic/quic_client_session_test.cc
|
| diff --git a/net/tools/quic/quic_client_session_test.cc b/net/tools/quic/quic_client_session_test.cc
|
| index b6cae3945b47ab9a213365568fa009be7cf52fab..ac65bf5998316296f3c481394d3a6813978f4a4b 100644
|
| --- a/net/tools/quic/quic_client_session_test.cc
|
| +++ b/net/tools/quic/quic_client_session_test.cc
|
| @@ -69,7 +69,9 @@ class TestQuicClientSession : public QuicClientSession {
|
|
|
| MockQuicSpdyClientStream* CreateIncomingDynamicStream(
|
| QuicStreamId id) override {
|
| - return new MockQuicSpdyClientStream(id, this);
|
| + MockQuicSpdyClientStream* stream = new MockQuicSpdyClientStream(id, this);
|
| + ActivateStream(stream);
|
| + return stream;
|
| }
|
| };
|
|
|
| @@ -231,28 +233,6 @@ TEST_P(QuicClientSessionTest, GoAwayReceived) {
|
| EXPECT_EQ(nullptr, session_->CreateOutgoingDynamicStream(kDefaultPriority));
|
| }
|
|
|
| -TEST_P(QuicClientSessionTest, SetFecProtectionFromConfig) {
|
| - ValueRestore<bool> old_flag(&FLAGS_enable_quic_fec, true);
|
| -
|
| - // Set FEC config in client's connection options.
|
| - QuicTagVector copt;
|
| - copt.push_back(kFHDR);
|
| - session_->config()->SetConnectionOptionsToSend(copt);
|
| -
|
| - // Doing the handshake should set up FEC config correctly.
|
| - CompleteCryptoHandshake();
|
| -
|
| - // Verify that headers stream is always protected and data streams are
|
| - // optionally protected.
|
| - EXPECT_EQ(
|
| - FEC_PROTECT_ALWAYS,
|
| - QuicSpdySessionPeer::GetHeadersStream(session_.get())->fec_policy());
|
| - QuicSpdyClientStream* stream =
|
| - session_->CreateOutgoingDynamicStream(kDefaultPriority);
|
| - ASSERT_TRUE(stream);
|
| - EXPECT_EQ(FEC_PROTECT_OPTIONAL, stream->fec_policy());
|
| -}
|
| -
|
| static bool CheckForDecryptionError(QuicFramer* framer) {
|
| return framer->error() == QUIC_DECRYPTION_FAILURE;
|
| }
|
|
|