Ensure we can decrypt the first packet

At the IETF interop in London we noticed that our server would always fail to decrypt the first packet when TLS is in use. This CL fixes that issue by installing the decrypter immediately on connection creation, and creates a test to make sure it doesn't happen again.

gfe-relnote: ensure first packet is decrypted, protected by disabled flag quic_supports_tls_handshake
PiperOrigin-RevId: 249437099
Change-Id: Iebcc0f5c18642a4f3db3265ab7bf669dd76e782b
diff --git a/quic/core/quic_connection_test.cc b/quic/core/quic_connection_test.cc
index 0d09430..3e03e1f 100644
--- a/quic/core/quic_connection_test.cc
+++ b/quic/core/quic_connection_test.cc
@@ -938,6 +938,14 @@
       peer_creator_.SetEncrypter(
           level, QuicMakeUnique<NullEncrypter>(peer_framer_.perspective()));
     }
+    if (version().handshake_protocol == PROTOCOL_TLS1_3) {
+      connection_.SetEncrypter(
+          ENCRYPTION_INITIAL,
+          QuicMakeUnique<NullEncrypter>(Perspective::IS_CLIENT));
+      connection_.InstallDecrypter(
+          ENCRYPTION_INITIAL,
+          QuicMakeUnique<NullDecrypter>(Perspective::IS_CLIENT));
+    }
     QuicFramerPeer::SetLastSerializedServerConnectionId(
         QuicConnectionPeer::GetFramer(&connection_), connection_id_);
     if (version().transport_version > QUIC_VERSION_43) {