| Index: net/tools/quic/end_to_end_test.cc
|
| diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc
|
| index 0f4c1534c2cff3a1c14a3fc4e5515bcf53d87811..aca08397a9645dcb2ca0d821ffac7a458206c269 100644
|
| --- a/net/tools/quic/end_to_end_test.cc
|
| +++ b/net/tools/quic/end_to_end_test.cc
|
| @@ -35,6 +35,7 @@
|
| #include "net/quic/test_tools/quic_sent_packet_manager_peer.h"
|
| #include "net/quic/test_tools/quic_session_peer.h"
|
| #include "net/quic/test_tools/quic_spdy_session_peer.h"
|
| +#include "net/quic/test_tools/quic_stream_sequencer_peer.h"
|
| #include "net/quic/test_tools/quic_test_utils.h"
|
| #include "net/quic/test_tools/reliable_quic_stream_peer.h"
|
| #include "net/test/gtest_util.h"
|
| @@ -659,6 +660,27 @@ INSTANTIATE_TEST_CASE_P(EndToEndTests,
|
| EndToEndTest,
|
| ::testing::ValuesIn(GetTestParams()));
|
|
|
| +TEST_P(EndToEndTest, HandshakeSuccessful) {
|
| + ASSERT_TRUE(Initialize());
|
| + client_->client()->WaitForCryptoHandshakeConfirmed();
|
| + QuicCryptoStream* crypto_stream =
|
| + QuicSessionPeer::GetCryptoStream(client_->client()->session());
|
| + QuicStreamSequencer* sequencer =
|
| + ReliableQuicStreamPeer::sequencer(crypto_stream);
|
| + EXPECT_NE(FLAGS_quic_release_crypto_stream_buffer &&
|
| + FLAGS_quic_reduce_sequencer_buffer_memory_life_time,
|
| + QuicStreamSequencerPeer::IsUnderlyingBufferAllocated(sequencer));
|
| + server_thread_->Pause();
|
| + QuicDispatcher* dispatcher =
|
| + QuicServerPeer::GetDispatcher(server_thread_->server());
|
| + QuicSession* server_session = dispatcher->session_map().begin()->second;
|
| + crypto_stream = QuicSessionPeer::GetCryptoStream(server_session);
|
| + sequencer = ReliableQuicStreamPeer::sequencer(crypto_stream);
|
| + EXPECT_NE(FLAGS_quic_release_crypto_stream_buffer &&
|
| + FLAGS_quic_reduce_sequencer_buffer_memory_life_time,
|
| + QuicStreamSequencerPeer::IsUnderlyingBufferAllocated(sequencer));
|
| +}
|
| +
|
| TEST_P(EndToEndTest, SimpleRequestResponse) {
|
| ASSERT_TRUE(Initialize());
|
|
|
|
|