| Index: net/quic/crypto/crypto_server_test.cc
|
| diff --git a/net/quic/crypto/crypto_server_test.cc b/net/quic/crypto/crypto_server_test.cc
|
| index 8c0e3ee1e5d997115e3f66a184502fce07634114..4a65f874ab8c8daf23ae6c6bbd98ae18481b8158 100644
|
| --- a/net/quic/crypto/crypto_server_test.cc
|
| +++ b/net/quic/crypto/crypto_server_test.cc
|
| @@ -507,7 +507,6 @@ TEST_P(CryptoServerTest, RejectTooLarge) {
|
| }
|
|
|
| TEST_P(CryptoServerTest, RejectTooLargeButValidSTK) {
|
| - ValueRestore<bool> old_flag(&FLAGS_quic_validate_stk_without_scid, true);
|
| // Check that the server replies with no certificate when a CHLO is
|
| // constructed with a PDMD but no SKT when the REJ would be too large.
|
| // clang-format off
|
| @@ -540,37 +539,6 @@ TEST_P(CryptoServerTest, RejectTooLargeButValidSTK) {
|
| CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| }
|
|
|
| -TEST_P(CryptoServerTest, RejectTooLargeButValidSTKWithoutFlag) {
|
| - ValueRestore<bool> old_flag(&FLAGS_quic_validate_stk_without_scid, false);
|
| - // Check that the server replies with no certificate when a CHLO is
|
| - // constructed with a PDMD but no SKT when the REJ would be too large.
|
| - // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| - "CHLO",
|
| - "AEAD", "AESG",
|
| - "KEXS", "C255",
|
| - "PUBS", pub_hex_.c_str(),
|
| - "NONC", nonce_hex_.c_str(),
|
| - "#004b5453", srct_hex_.c_str(),
|
| - "PDMD", "X509",
|
| - "VER\0", client_version_string_.c_str(),
|
| - "$padding", static_cast<int>(kClientHelloMinimumSize),
|
| - nullptr);
|
| - // clang-format on
|
| -
|
| - // The REJ will be larger than the CHLO so no PROF or CRT will be sent.
|
| - config_.set_chlo_multiplier(1);
|
| -
|
| - ShouldSucceed(msg);
|
| - StringPiece cert, proof, cert_sct;
|
| - EXPECT_FALSE(out_.GetStringPiece(kCertificateTag, &cert));
|
| - EXPECT_FALSE(out_.GetStringPiece(kPROF, &proof));
|
| - EXPECT_FALSE(out_.GetStringPiece(kCertificateSCTTag, &cert_sct));
|
| - const HandshakeFailureReason kRejectReasons[] = {
|
| - SERVER_CONFIG_INCHOATE_HELLO_FAILURE};
|
| - CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| -}
|
| -
|
| TEST_P(CryptoServerTest, TooSmall) {
|
| // clang-format off
|
| ShouldFailMentioning("too small", CryptoTestUtils::Message(
|
|
|