| Index: net/quic/test_tools/crypto_test_utils.cc
|
| diff --git a/net/quic/test_tools/crypto_test_utils.cc b/net/quic/test_tools/crypto_test_utils.cc
|
| index f285e254e9f568f20144a01b0dfb47cdb5b8a1c6..c451aa6274714a89dcbec00f247d9c18a09dd9e8 100644
|
| --- a/net/quic/test_tools/crypto_test_utils.cc
|
| +++ b/net/quic/test_tools/crypto_test_utils.cc
|
| @@ -302,7 +302,8 @@ class FullChloGenerator : public ValidateClientHelloResultCallback {
|
| client_addr_, QuicSupportedVersions().front(), QuicSupportedVersions(),
|
| /*use_stateless_rejects=*/true, /*server_designated_connection_id=*/0,
|
| clock_, QuicRandom::GetInstance(), compressed_certs_cache_, ¶ms,
|
| - proof_, &rej, &diversification_nonce, &error_details);
|
| + proof_, /*total_framing_overhead=*/50, kDefaultMaxPacketSize, &rej,
|
| + &diversification_nonce, &error_details);
|
| // Verify output is a REJ or SREJ.
|
| EXPECT_THAT(rej.tag(),
|
| testing::AnyOf(testing::Eq(kSREJ), testing::Eq(kREJ)));
|
| @@ -883,6 +884,8 @@ void CryptoTestUtils::MovePackets(PacketSavingConnection* source_conn,
|
| StringPiece(stream_frame->data_buffer, stream_frame->data_length)));
|
| ASSERT_FALSE(crypto_visitor.error());
|
| }
|
| + QuicConnectionPeer::SetCurrentPacket(
|
| + dest_conn, source_conn->encrypted_packets_[index]->AsStringPiece());
|
| }
|
| *inout_packet_index = index;
|
|
|
| @@ -893,6 +896,7 @@ void CryptoTestUtils::MovePackets(PacketSavingConnection* source_conn,
|
| for (const CryptoHandshakeMessage& message : crypto_visitor.messages()) {
|
| dest_stream->OnHandshakeMessage(message);
|
| }
|
| + QuicConnectionPeer::SetCurrentPacket(dest_conn, StringPiece(nullptr, 0));
|
| }
|
|
|
| // static
|
|
|