Index: net/quic/core/quic_session_test.cc |
diff --git a/net/quic/core/quic_session_test.cc b/net/quic/core/quic_session_test.cc |
index 17bd3d0c4bb367d5a5da3782377f9efb25f1abdb..14b7d014682dede9a2c36d1792476ec71aac00a5 100644 |
--- a/net/quic/core/quic_session_test.cc |
+++ b/net/quic/core/quic_session_test.cc |
@@ -69,6 +69,8 @@ class TestCryptoStream : public QuicCryptoStream { |
session()->config()->ProcessPeerHello(msg, CLIENT, &error_details); |
EXPECT_EQ(QUIC_NO_ERROR, error); |
session()->OnConfigNegotiated(); |
+ session()->connection()->SetDefaultEncryptionLevel( |
+ ENCRYPTION_FORWARD_SECURE); |
session()->OnCryptoHandshakeEvent(QuicSession::HANDSHAKE_CONFIRMED); |
} |
@@ -515,6 +517,12 @@ TEST_P(QuicSessionTestServer, TestBatchedWrites) { |
TEST_P(QuicSessionTestServer, OnCanWriteBundlesStreams) { |
// Encryption needs to be established before data can be sent. |
CryptoHandshakeMessage msg; |
+ MockPacketWriter* writer = static_cast<MockPacketWriter*>( |
+ QuicConnectionPeer::GetWriter(session_.connection())); |
+ if (FLAGS_quic_send_max_header_list_size) { |
+ EXPECT_CALL(*writer, WritePacket(_, _, _, _, _)) |
+ .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 0))); |
+ } |
session_.GetCryptoStream()->OnHandshakeMessage(msg); |
// Drive congestion control manually. |
@@ -550,8 +558,6 @@ TEST_P(QuicSessionTestServer, OnCanWriteBundlesStreams) { |
// Expect that we only send one packet, the writes from different streams |
// should be bundled together. |
- MockPacketWriter* writer = static_cast<MockPacketWriter*>( |
- QuicConnectionPeer::GetWriter(session_.connection())); |
EXPECT_CALL(*writer, WritePacket(_, _, _, _, _)) |
.WillOnce(Return(WriteResult(WRITE_STATUS_OK, 0))); |
EXPECT_CALL(*send_algorithm, OnPacketSent(_, _, _, _, _)); |