| Index: net/quic/core/crypto/crypto_server_test.cc
|
| diff --git a/net/quic/core/crypto/crypto_server_test.cc b/net/quic/core/crypto/crypto_server_test.cc
|
| index 76c17974c53377bb62f387a0cf1b7188bded812e..2ec666f0b932b21f612bff441f3a4122ea7d1d18 100644
|
| --- a/net/quic/core/crypto/crypto_server_test.cc
|
| +++ b/net/quic/core/crypto/crypto_server_test.cc
|
| @@ -827,16 +827,9 @@ TEST_P(CryptoServerTest, CorruptMultipleTags) {
|
| ShouldSucceed(msg);
|
| CheckRejectTag();
|
|
|
| - if (client_version_ <= QUIC_VERSION_32) {
|
| - const HandshakeFailureReason kRejectReasons[] = {
|
| - SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE, CLIENT_NONCE_INVALID_FAILURE,
|
| - SERVER_NONCE_DECRYPTION_FAILURE};
|
| - CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| - } else {
|
| - const HandshakeFailureReason kRejectReasons[] = {
|
| - SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE, CLIENT_NONCE_INVALID_FAILURE};
|
| - CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| - };
|
| + const HandshakeFailureReason kRejectReasons[] = {
|
| + SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE, CLIENT_NONCE_INVALID_FAILURE};
|
| + CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| }
|
|
|
| TEST_P(CryptoServerTest, NoServerNonce) {
|
| @@ -861,17 +854,10 @@ TEST_P(CryptoServerTest, NoServerNonce) {
|
|
|
| ShouldSucceed(msg);
|
|
|
| - if (client_version_ <= QUIC_VERSION_32) {
|
| - CheckRejectTag();
|
| - const HandshakeFailureReason kRejectReasons[] = {
|
| - SERVER_NONCE_REQUIRED_FAILURE};
|
| - CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| - } else {
|
| - // Even without a server nonce, this ClientHello should be accepted in
|
| - // version 33.
|
| - ASSERT_EQ(kSHLO, out_.tag());
|
| - CheckServerHello(out_);
|
| - }
|
| + // Even without a server nonce, this ClientHello should be accepted in
|
| + // version 33.
|
| + ASSERT_EQ(kSHLO, out_.tag());
|
| + CheckServerHello(out_);
|
| }
|
|
|
| TEST_P(CryptoServerTest, ProofForSuppliedServerConfig) {
|
| @@ -1272,19 +1258,8 @@ TEST_P(AsyncStrikeServerVerificationTest, RequireHandshakeCofirmationPre33) {
|
|
|
| ShouldSucceed(msg);
|
|
|
| - if (client_version_ <= QUIC_VERSION_32) {
|
| - // clang-format off
|
| - const HandshakeFailureReason kRejectReasons[] = {
|
| - SERVER_NONCE_REQUIRED_FAILURE
|
| - };
|
| - // clang-format on
|
| - CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
| - EXPECT_EQ(0, strike_register_client_->PendingVerifications());
|
| - } else {
|
| - // version 33.
|
| - ASSERT_EQ(kSHLO, out_.tag());
|
| - CheckServerHello(out_);
|
| - }
|
| + ASSERT_EQ(kSHLO, out_.tag());
|
| + CheckServerHello(out_);
|
| }
|
|
|
| } // namespace test
|
|
|