| Index: net/quic/core/quic_session_test.cc
|
| diff --git a/net/quic/core/quic_session_test.cc b/net/quic/core/quic_session_test.cc
|
| index 17bd3d0c4bb367d5a5da3782377f9efb25f1abdb..14b7d014682dede9a2c36d1792476ec71aac00a5 100644
|
| --- a/net/quic/core/quic_session_test.cc
|
| +++ b/net/quic/core/quic_session_test.cc
|
| @@ -69,6 +69,8 @@ class TestCryptoStream : public QuicCryptoStream {
|
| session()->config()->ProcessPeerHello(msg, CLIENT, &error_details);
|
| EXPECT_EQ(QUIC_NO_ERROR, error);
|
| session()->OnConfigNegotiated();
|
| + session()->connection()->SetDefaultEncryptionLevel(
|
| + ENCRYPTION_FORWARD_SECURE);
|
| session()->OnCryptoHandshakeEvent(QuicSession::HANDSHAKE_CONFIRMED);
|
| }
|
|
|
| @@ -515,6 +517,12 @@ TEST_P(QuicSessionTestServer, TestBatchedWrites) {
|
| TEST_P(QuicSessionTestServer, OnCanWriteBundlesStreams) {
|
| // Encryption needs to be established before data can be sent.
|
| CryptoHandshakeMessage msg;
|
| + MockPacketWriter* writer = static_cast<MockPacketWriter*>(
|
| + QuicConnectionPeer::GetWriter(session_.connection()));
|
| + if (FLAGS_quic_send_max_header_list_size) {
|
| + EXPECT_CALL(*writer, WritePacket(_, _, _, _, _))
|
| + .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 0)));
|
| + }
|
| session_.GetCryptoStream()->OnHandshakeMessage(msg);
|
|
|
| // Drive congestion control manually.
|
| @@ -550,8 +558,6 @@ TEST_P(QuicSessionTestServer, OnCanWriteBundlesStreams) {
|
|
|
| // Expect that we only send one packet, the writes from different streams
|
| // should be bundled together.
|
| - MockPacketWriter* writer = static_cast<MockPacketWriter*>(
|
| - QuicConnectionPeer::GetWriter(session_.connection()));
|
| EXPECT_CALL(*writer, WritePacket(_, _, _, _, _))
|
| .WillOnce(Return(WriteResult(WRITE_STATUS_OK, 0)));
|
| EXPECT_CALL(*send_algorithm, OnPacketSent(_, _, _, _, _));
|
|
|