Deprecate gfe2_reloadable_flag_quic_fix_min_crypto_frame_size.
PiperOrigin-RevId: 320957243
Change-Id: I61c4a2132b942eef6a0237a435937f7f10cf7173
diff --git a/quic/core/quic_connection_test.cc b/quic/core/quic_connection_test.cc
index 91d42db..62aa83f 100644
--- a/quic/core/quic_connection_test.cc
+++ b/quic/core/quic_connection_test.cc
@@ -11275,12 +11275,7 @@
if (!connection_.version().CanSendCoalescedPackets()) {
return;
}
- if (GetQuicReloadableFlag(quic_fix_extra_padding_bytes) ||
- GetQuicReloadableFlag(quic_fix_min_crypto_frame_size)) {
- EXPECT_CALL(visitor_, OnHandshakePacketSent()).Times(1);
- } else {
- EXPECT_CALL(visitor_, OnHandshakePacketSent()).Times(0);
- }
+ EXPECT_CALL(visitor_, OnHandshakePacketSent()).Times(1);
{
QuicConnection::ScopedPacketFlusher flusher(&connection_);
use_tagging_decrypter();
@@ -11292,21 +11287,9 @@
SendStreamDataToPeer(2, std::string(1286, 'a'), 0, NO_FIN, nullptr);
connection_.SetDefaultEncryptionLevel(ENCRYPTION_HANDSHAKE);
// Try to coalesce a HANDSHAKE packet after 1-RTT packet.
- if (GetQuicReloadableFlag(quic_fix_extra_padding_bytes) ||
- GetQuicReloadableFlag(quic_fix_min_crypto_frame_size)) {
- // Verify soft max packet length gets resumed and handshake packet gets
- // successfully sent.
- connection_.SendCryptoDataWithString("a", 0, ENCRYPTION_HANDSHAKE);
- } else {
- // Problematic: creator thinks there is space to consume 1-byte, however,
- // extra paddings make the serialization fail because of
- // MinPlaintextPacketSize.
- EXPECT_CALL(visitor_,
- OnConnectionClosed(_, ConnectionCloseSource::FROM_SELF));
- EXPECT_QUIC_BUG(
- connection_.SendCryptoDataWithString("a", 0, ENCRYPTION_HANDSHAKE),
- "AppendPaddingFrame of 3 failed");
- }
+ // Verify soft max packet length gets resumed and handshake packet gets
+ // successfully sent.
+ connection_.SendCryptoDataWithString("a", 0, ENCRYPTION_HANDSHAKE);
}
}