| Index: net/quic/quic_session.cc
|
| diff --git a/net/quic/quic_session.cc b/net/quic/quic_session.cc
|
| index 4bae2f5e59c0fff226184300b5fcbfd43a2c444d..8d82662fc1a2c5a7f1e25fa463032094fda4f4e2 100644
|
| --- a/net/quic/quic_session.cc
|
| +++ b/net/quic/quic_session.cc
|
| @@ -127,7 +127,7 @@ QuicSession::QuicSession(QuicConnection* connection, const QuicConfig& config)
|
| void QuicSession::InitializeSession() {
|
| connection_->set_visitor(visitor_shim_.get());
|
| connection_->SetFromConfig(config_);
|
| - if (connection_->connected()) {
|
| + if (!FLAGS_quic_unified_timeouts && connection_->connected()) {
|
| connection_->SetOverallConnectionTimeout(
|
| config_.max_time_before_crypto_handshake());
|
| }
|
| @@ -570,7 +570,9 @@ void QuicSession::OnCryptoHandshakeEvent(CryptoHandshakeEvent event) {
|
| // Discard originally encrypted packets, since they can't be decrypted by
|
| // the peer.
|
| connection_->NeuterUnencryptedPackets();
|
| - connection_->SetOverallConnectionTimeout(QuicTime::Delta::Infinite());
|
| + if (!FLAGS_quic_unified_timeouts) {
|
| + connection_->SetOverallConnectionTimeout(QuicTime::Delta::Infinite());
|
| + }
|
| if (!FLAGS_quic_allow_more_open_streams) {
|
| max_open_streams_ = config_.MaxStreamsPerConnection();
|
| }
|
|
|