| Index: net/quic/core/crypto/crypto_utils_test.cc
|
| diff --git a/net/quic/core/crypto/crypto_utils_test.cc b/net/quic/core/crypto/crypto_utils_test.cc
|
| index 340352337991288683669744c7bcb179d7f76c83..1b34c50696073f2c0a0755120e8923860ba489f0 100644
|
| --- a/net/quic/core/crypto/crypto_utils_test.cc
|
| +++ b/net/quic/core/crypto/crypto_utils_test.cc
|
| @@ -4,6 +4,7 @@
|
|
|
| #include "net/quic/core/crypto/crypto_utils.h"
|
|
|
| +#include "net/quic/core/quic_utils.h"
|
| #include "net/quic/test_tools/quic_test_utils.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| @@ -18,9 +19,8 @@ TEST(CryptoUtilsTest, IsValidSNI) {
|
| EXPECT_FALSE(CryptoUtils::IsValidSNI("192.168.0.1"));
|
| // SNI without any dot.
|
| EXPECT_FALSE(CryptoUtils::IsValidSNI("somedomain"));
|
| - // Invalid RFC2396 hostname
|
| - // TODO(rtenneti): Support RFC2396 hostname.
|
| - // EXPECT_FALSE(CryptoUtils::IsValidSNI("some_domain.com"));
|
| + // Invalid by RFC2396 but unfortunately domains of this form exist.
|
| + EXPECT_TRUE(CryptoUtils::IsValidSNI("some_domain.com"));
|
| // An empty string must be invalid otherwise the QUIC client will try sending
|
| // it.
|
| EXPECT_FALSE(CryptoUtils::IsValidSNI(""));
|
|
|