| Index: net/quic/core/quic_connection_test.cc
|
| diff --git a/net/quic/core/quic_connection_test.cc b/net/quic/core/quic_connection_test.cc
|
| index c9ecbef75cf9c16fa7aedd1f012b01a16f161782..0ba92aeb7219650f3df856172f81b9d6b58b895c 100644
|
| --- a/net/quic/core/quic_connection_test.cc
|
| +++ b/net/quic/core/quic_connection_test.cc
|
| @@ -2644,61 +2644,6 @@ TEST_P(QuicConnectionTest, RetransmitPacketsWithInitialEncryption) {
|
| connection_.RetransmitUnackedPackets(ALL_INITIAL_RETRANSMISSION);
|
| }
|
|
|
| -TEST_P(QuicConnectionTest, DelayForwardSecureEncryptionUntilClientIsReady) {
|
| - FLAGS_quic_remove_obsolete_forward_secure = false;
|
| - // A TaggingEncrypter puts kTagSize copies of the given byte (0x02 here) at
|
| - // the end of the packet. We can test this to check which encrypter was used.
|
| - use_tagging_decrypter();
|
| - connection_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(0x02));
|
| - connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL);
|
| - SendAckPacketToPeer();
|
| - EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet());
|
| -
|
| - // Set a forward-secure encrypter but do not make it the default, and verify
|
| - // that it is not yet used.
|
| - connection_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
|
| - new TaggingEncrypter(0x03));
|
| - SendAckPacketToPeer();
|
| - EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet());
|
| -
|
| - // Now simulate receipt of a forward-secure packet and verify that the
|
| - // forward-secure encrypter is now used.
|
| - connection_.OnDecryptedPacket(ENCRYPTION_FORWARD_SECURE);
|
| - SendAckPacketToPeer();
|
| - EXPECT_EQ(0x03030303u, writer_->final_bytes_of_last_packet());
|
| -}
|
| -
|
| -TEST_P(QuicConnectionTest, DelayForwardSecureEncryptionUntilManyPacketSent) {
|
| - FLAGS_quic_remove_obsolete_forward_secure = false;
|
| - // Set a congestion window of 10 packets.
|
| - QuicPacketCount congestion_window = 10;
|
| - EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
|
| - .WillRepeatedly(Return(congestion_window * kDefaultMaxPacketSize));
|
| -
|
| - // A TaggingEncrypter puts kTagSize copies of the given byte (0x02 here) at
|
| - // the end of the packet. We can test this to check which encrypter was used.
|
| - use_tagging_decrypter();
|
| - connection_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(0x02));
|
| - connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL);
|
| - SendAckPacketToPeer();
|
| - EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet());
|
| -
|
| - // Set a forward-secure encrypter but do not make it the default, and
|
| - // verify that it is not yet used.
|
| - connection_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
|
| - new TaggingEncrypter(0x03));
|
| - SendAckPacketToPeer();
|
| - EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet());
|
| -
|
| - // Now send a packet "Far enough" after the encrypter was set and verify that
|
| - // the forward-secure encrypter is now used.
|
| - for (uint64_t i = 0; i < 3 * congestion_window - 1; ++i) {
|
| - EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet());
|
| - SendAckPacketToPeer();
|
| - }
|
| - EXPECT_EQ(0x03030303u, writer_->final_bytes_of_last_packet());
|
| -}
|
| -
|
| TEST_P(QuicConnectionTest, BufferNonDecryptablePackets) {
|
| // SetFromConfig is always called after construction from InitializeSession.
|
| EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
|
|
|