| Index: net/spdy/hpack/hpack_decoder_test.cc
|
| diff --git a/net/spdy/hpack/hpack_decoder_test.cc b/net/spdy/hpack/hpack_decoder_test.cc
|
| index 91f32dd59da862a2e0ba2d2460022fc7c79fb6f8..9313a73713be72d6382b3ee43ff1b0524ca2d8dc 100644
|
| --- a/net/spdy/hpack/hpack_decoder_test.cc
|
| +++ b/net/spdy/hpack/hpack_decoder_test.cc
|
| @@ -361,20 +361,6 @@ TEST_P(HpackDecoderTest, InvalidIndexedHeader) {
|
| // Test that a header block with a pseudo-header field following a regular one
|
| // is treated as malformed. (HTTP2 draft-14 8.1.2.1., HPACK draft-09 3.1.)
|
|
|
| -TEST_P(HpackDecoderTest, InvalidPseudoHeaderPositionStatic) {
|
| - // Okay: ":path" (static entry 4) followed by "allow" (static entry 20).
|
| - EXPECT_TRUE(DecodeHeaderBlock(a2b_hex("8494")));
|
| - // Malformed: "allow" (static entry 20) followed by ":path" (static entry 4).
|
| - EXPECT_FALSE(DecodeHeaderBlock(a2b_hex("9484")));
|
| -}
|
| -
|
| -TEST_P(HpackDecoderTest, InvalidPseudoHeaderPositionLiteral) {
|
| - // Okay: literal ":bar" followed by literal "foo".
|
| - EXPECT_TRUE(DecodeHeaderBlock(a2b_hex("40043a626172004003666f6f00")));
|
| - // Malformed: literal "foo" followed by literal ":bar".
|
| - EXPECT_FALSE(DecodeHeaderBlock(a2b_hex("4003666f6f0040043a62617200")));
|
| -}
|
| -
|
| TEST_P(HpackDecoderTest, ContextUpdateMaximumSize) {
|
| EXPECT_EQ(kDefaultHeaderTableSizeSetting,
|
| decoder_peer_.header_table()->max_size());
|
|
|