| Index: net/quic/crypto/crypto_server_test.cc
|
| diff --git a/net/quic/crypto/crypto_server_test.cc b/net/quic/crypto/crypto_server_test.cc
|
| index 430bcf191dd4859229eed7afe918b0662224b80b..48232016aa2af8ce390103feb71b3584953b0331 100644
|
| --- a/net/quic/crypto/crypto_server_test.cc
|
| +++ b/net/quic/crypto/crypto_server_test.cc
|
| @@ -296,6 +296,7 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
|
| bool should_succeed,
|
| const char* error_substr) {
|
| IPAddress server_ip;
|
| + DiversificationNonce diversification_nonce;
|
| string error_details;
|
| QuicConnectionId server_designated_connection_id =
|
| rand_for_id_generation_.RandUint64();
|
| @@ -304,7 +305,7 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
|
| supported_versions_.front(), supported_versions_,
|
| use_stateless_rejects_, server_designated_connection_id, &clock_, rand_,
|
| &compressed_certs_cache_, ¶ms_, &crypto_proof_, &out_,
|
| - &error_details);
|
| + &diversification_nonce, &error_details);
|
|
|
| if (should_succeed) {
|
| ASSERT_EQ(error, QUIC_NO_ERROR) << "Message failed with error "
|
| @@ -817,10 +818,17 @@ TEST_P(CryptoServerTest, NoServerNonce) {
|
|
|
| ShouldSucceed(msg);
|
|
|
| - CheckRejectTag();
|
| - const HandshakeFailureReason kRejectReasons[] = {
|
| - SERVER_NONCE_REQUIRED_FAILURE};
|
| - CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| + if (client_version_ <= QUIC_VERSION_32) {
|
| + CheckRejectTag();
|
| + const HandshakeFailureReason kRejectReasons[] = {
|
| + SERVER_NONCE_REQUIRED_FAILURE};
|
| + CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| + } else {
|
| + // Even without a server nonce, this ClientHello should be accepted in
|
| + // version 33.
|
| + ASSERT_EQ(kSHLO, out_.tag());
|
| + CheckServerHello(out_);
|
| + }
|
| }
|
|
|
| TEST_P(CryptoServerTest, ProofForSuppliedServerConfig) {
|
|
|