Index: net/quic/test_tools/crypto_test_utils.cc |
diff --git a/net/quic/test_tools/crypto_test_utils.cc b/net/quic/test_tools/crypto_test_utils.cc |
index f285e254e9f568f20144a01b0dfb47cdb5b8a1c6..c451aa6274714a89dcbec00f247d9c18a09dd9e8 100644 |
--- a/net/quic/test_tools/crypto_test_utils.cc |
+++ b/net/quic/test_tools/crypto_test_utils.cc |
@@ -302,7 +302,8 @@ class FullChloGenerator : public ValidateClientHelloResultCallback { |
client_addr_, QuicSupportedVersions().front(), QuicSupportedVersions(), |
/*use_stateless_rejects=*/true, /*server_designated_connection_id=*/0, |
clock_, QuicRandom::GetInstance(), compressed_certs_cache_, ¶ms, |
- proof_, &rej, &diversification_nonce, &error_details); |
+ proof_, /*total_framing_overhead=*/50, kDefaultMaxPacketSize, &rej, |
+ &diversification_nonce, &error_details); |
// Verify output is a REJ or SREJ. |
EXPECT_THAT(rej.tag(), |
testing::AnyOf(testing::Eq(kSREJ), testing::Eq(kREJ))); |
@@ -883,6 +884,8 @@ void CryptoTestUtils::MovePackets(PacketSavingConnection* source_conn, |
StringPiece(stream_frame->data_buffer, stream_frame->data_length))); |
ASSERT_FALSE(crypto_visitor.error()); |
} |
+ QuicConnectionPeer::SetCurrentPacket( |
+ dest_conn, source_conn->encrypted_packets_[index]->AsStringPiece()); |
} |
*inout_packet_index = index; |
@@ -893,6 +896,7 @@ void CryptoTestUtils::MovePackets(PacketSavingConnection* source_conn, |
for (const CryptoHandshakeMessage& message : crypto_visitor.messages()) { |
dest_stream->OnHandshakeMessage(message); |
} |
+ QuicConnectionPeer::SetCurrentPacket(dest_conn, StringPiece(nullptr, 0)); |
} |
// static |