Index: net/quic/core/quic_connection_test.cc |
diff --git a/net/quic/core/quic_connection_test.cc b/net/quic/core/quic_connection_test.cc |
index c9ecbef75cf9c16fa7aedd1f012b01a16f161782..0ba92aeb7219650f3df856172f81b9d6b58b895c 100644 |
--- a/net/quic/core/quic_connection_test.cc |
+++ b/net/quic/core/quic_connection_test.cc |
@@ -2644,61 +2644,6 @@ TEST_P(QuicConnectionTest, RetransmitPacketsWithInitialEncryption) { |
connection_.RetransmitUnackedPackets(ALL_INITIAL_RETRANSMISSION); |
} |
-TEST_P(QuicConnectionTest, DelayForwardSecureEncryptionUntilClientIsReady) { |
- FLAGS_quic_remove_obsolete_forward_secure = false; |
- // A TaggingEncrypter puts kTagSize copies of the given byte (0x02 here) at |
- // the end of the packet. We can test this to check which encrypter was used. |
- use_tagging_decrypter(); |
- connection_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(0x02)); |
- connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL); |
- SendAckPacketToPeer(); |
- EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet()); |
- |
- // Set a forward-secure encrypter but do not make it the default, and verify |
- // that it is not yet used. |
- connection_.SetEncrypter(ENCRYPTION_FORWARD_SECURE, |
- new TaggingEncrypter(0x03)); |
- SendAckPacketToPeer(); |
- EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet()); |
- |
- // Now simulate receipt of a forward-secure packet and verify that the |
- // forward-secure encrypter is now used. |
- connection_.OnDecryptedPacket(ENCRYPTION_FORWARD_SECURE); |
- SendAckPacketToPeer(); |
- EXPECT_EQ(0x03030303u, writer_->final_bytes_of_last_packet()); |
-} |
- |
-TEST_P(QuicConnectionTest, DelayForwardSecureEncryptionUntilManyPacketSent) { |
- FLAGS_quic_remove_obsolete_forward_secure = false; |
- // Set a congestion window of 10 packets. |
- QuicPacketCount congestion_window = 10; |
- EXPECT_CALL(*send_algorithm_, GetCongestionWindow()) |
- .WillRepeatedly(Return(congestion_window * kDefaultMaxPacketSize)); |
- |
- // A TaggingEncrypter puts kTagSize copies of the given byte (0x02 here) at |
- // the end of the packet. We can test this to check which encrypter was used. |
- use_tagging_decrypter(); |
- connection_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(0x02)); |
- connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL); |
- SendAckPacketToPeer(); |
- EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet()); |
- |
- // Set a forward-secure encrypter but do not make it the default, and |
- // verify that it is not yet used. |
- connection_.SetEncrypter(ENCRYPTION_FORWARD_SECURE, |
- new TaggingEncrypter(0x03)); |
- SendAckPacketToPeer(); |
- EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet()); |
- |
- // Now send a packet "Far enough" after the encrypter was set and verify that |
- // the forward-secure encrypter is now used. |
- for (uint64_t i = 0; i < 3 * congestion_window - 1; ++i) { |
- EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet()); |
- SendAckPacketToPeer(); |
- } |
- EXPECT_EQ(0x03030303u, writer_->final_bytes_of_last_packet()); |
-} |
- |
TEST_P(QuicConnectionTest, BufferNonDecryptablePackets) { |
// SetFromConfig is always called after construction from InitializeSession. |
EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _)); |