In quic, consider frame expansion when extra padding is needed to meet the minimum plaintext size needed for header protection. protected by gfe2_reloadable_flag_quic_fix_extra_padding_bytes.
PiperOrigin-RevId: 318497490
Change-Id: If5ade70a1992e6daa7c6d116cb778cb88210981c
diff --git a/quic/core/quic_connection_test.cc b/quic/core/quic_connection_test.cc
index 7fc45ca..e751f7b 100644
--- a/quic/core/quic_connection_test.cc
+++ b/quic/core/quic_connection_test.cc
@@ -11366,7 +11366,8 @@
if (!connection_.version().CanSendCoalescedPackets()) {
return;
}
- if (GetQuicReloadableFlag(quic_fix_min_crypto_frame_size)) {
+ if (GetQuicReloadableFlag(quic_fix_extra_padding_bytes) ||
+ GetQuicReloadableFlag(quic_fix_min_crypto_frame_size)) {
EXPECT_CALL(visitor_, OnHandshakePacketSent()).Times(1);
} else {
EXPECT_CALL(visitor_, OnHandshakePacketSent()).Times(0);
@@ -11382,7 +11383,8 @@
SendStreamDataToPeer(2, std::string(1286, 'a'), 0, NO_FIN, nullptr);
connection_.SetDefaultEncryptionLevel(ENCRYPTION_HANDSHAKE);
// Try to coalesce a HANDSHAKE packet after 1-RTT packet.
- if (GetQuicReloadableFlag(quic_fix_min_crypto_frame_size)) {
+ if (GetQuicReloadableFlag(quic_fix_extra_padding_bytes) ||
+ GetQuicReloadableFlag(quic_fix_min_crypto_frame_size)) {
// Verify soft max packet length gets resumed and handshake packet gets
// successfully sent.
connection_.SendCryptoDataWithString("a", 0, ENCRYPTION_HANDSHAKE);