| Index: net/tools/quic/quic_client_session_test.cc
|
| diff --git a/net/tools/quic/quic_client_session_test.cc b/net/tools/quic/quic_client_session_test.cc
|
| index 6dd53568d9b4d5e6bf44e278abe90e8838445f6b..ac65bf5998316296f3c481394d3a6813978f4a4b 100644
|
| --- a/net/tools/quic/quic_client_session_test.cc
|
| +++ b/net/tools/quic/quic_client_session_test.cc
|
| @@ -233,28 +233,6 @@ TEST_P(QuicClientSessionTest, GoAwayReceived) {
|
| EXPECT_EQ(nullptr, session_->CreateOutgoingDynamicStream(kDefaultPriority));
|
| }
|
|
|
| -TEST_P(QuicClientSessionTest, SetFecProtectionFromConfig) {
|
| - ValueRestore<bool> old_flag(&FLAGS_enable_quic_fec, true);
|
| -
|
| - // Set FEC config in client's connection options.
|
| - QuicTagVector copt;
|
| - copt.push_back(kFHDR);
|
| - session_->config()->SetConnectionOptionsToSend(copt);
|
| -
|
| - // Doing the handshake should set up FEC config correctly.
|
| - CompleteCryptoHandshake();
|
| -
|
| - // Verify that headers stream is always protected and data streams are
|
| - // optionally protected.
|
| - EXPECT_EQ(
|
| - FEC_PROTECT_ALWAYS,
|
| - QuicSpdySessionPeer::GetHeadersStream(session_.get())->fec_policy());
|
| - QuicSpdyClientStream* stream =
|
| - session_->CreateOutgoingDynamicStream(kDefaultPriority);
|
| - ASSERT_TRUE(stream);
|
| - EXPECT_EQ(FEC_PROTECT_OPTIONAL, stream->fec_policy());
|
| -}
|
| -
|
| static bool CheckForDecryptionError(QuicFramer* framer) {
|
| return framer->error() == QUIC_DECRYPTION_FAILURE;
|
| }
|
|
|