Index: net/quic/quic_connection_test.cc |
diff --git a/net/quic/quic_connection_test.cc b/net/quic/quic_connection_test.cc |
index 6381c16b4401f25891d568973ee46afaef62a40c..fe117665ec2b2ddfe1a0fee20faa54cef5a84e29 100644 |
--- a/net/quic/quic_connection_test.cc |
+++ b/net/quic/quic_connection_test.cc |
@@ -1346,11 +1346,8 @@ TEST_P(QuicConnectionTest, TooManySentPackets) { |
// Ack packet 1, which leaves more than the limit outstanding. |
EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _)); |
- if (FLAGS_quic_too_many_outstanding_packets) { |
- EXPECT_CALL(visitor_, |
- OnConnectionClosed(QUIC_TOO_MANY_OUTSTANDING_SENT_PACKETS, |
- false)); |
- } |
+ EXPECT_CALL(visitor_, OnConnectionClosed( |
+ QUIC_TOO_MANY_OUTSTANDING_SENT_PACKETS, false)); |
// We're receive buffer limited, so the connection won't try to write more. |
EXPECT_CALL(visitor_, OnCanWrite()).Times(0); |
@@ -1364,12 +1361,8 @@ TEST_P(QuicConnectionTest, TooManySentPackets) { |
TEST_P(QuicConnectionTest, TooManyReceivedPackets) { |
EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_)); |
- |
- if (FLAGS_quic_too_many_outstanding_packets) { |
- EXPECT_CALL(visitor_, |
- OnConnectionClosed(QUIC_TOO_MANY_OUTSTANDING_RECEIVED_PACKETS, |
- false)); |
- } |
+ EXPECT_CALL(visitor_, OnConnectionClosed( |
+ QUIC_TOO_MANY_OUTSTANDING_RECEIVED_PACKETS, false)); |
// Miss every other packet for 1000 packets. |
for (QuicPacketSequenceNumber i = 1; i < 1000; ++i) { |
@@ -2543,8 +2536,6 @@ TEST_P(QuicConnectionTest, RetransmitPacketsWithInitialEncryption) { |
} |
TEST_P(QuicConnectionTest, DelayForwardSecureEncryptionUntilClientIsReady) { |
- ValueRestore<bool> old_flag(&FLAGS_enable_quic_delay_forward_security, true); |
- |
// A TaggingEncrypter puts kTagSize copies of the given byte (0x02 here) at |
// the end of the packet. We can test this to check which encrypter was used. |
use_tagging_decrypter(); |
@@ -2568,8 +2559,6 @@ TEST_P(QuicConnectionTest, DelayForwardSecureEncryptionUntilClientIsReady) { |
} |
TEST_P(QuicConnectionTest, DelayForwardSecureEncryptionUntilManyPacketSent) { |
- ValueRestore<bool> old_flag(&FLAGS_enable_quic_delay_forward_security, true); |
- |
// Set a congestion window of 10 packets. |
QuicPacketCount congestion_window = 10; |
EXPECT_CALL(*send_algorithm_, GetCongestionWindow()).WillRepeatedly( |