Change default EncryptionLevel in QuicConnectionTest

ProcessPacket/ProcessDataPacket now default to using ENCRYPTION_FORWARD_SECURE
instead of ENCRYPTION_INITIAL.

gfe-relnote: test-only change to QuicConnectionTest
PiperOrigin-RevId: 247238431
Change-Id: I450a82386fc531a91dbe5c5ee6e6025b5f60a5f8
diff --git a/quic/core/quic_connection_test.cc b/quic/core/quic_connection_test.cc
index 80a7469..c401682 100644
--- a/quic/core/quic_connection_test.cc
+++ b/quic/core/quic_connection_test.cc
@@ -931,6 +931,11 @@
     SetQuicFlag(FLAGS_quic_supports_tls_handshake, true);
     connection_.set_defer_send_in_response_to_packets(GetParam().ack_response ==
                                                       AckResponse::kDefer);
+    for (EncryptionLevel level :
+         {ENCRYPTION_ZERO_RTT, ENCRYPTION_FORWARD_SECURE}) {
+      peer_creator_.SetEncrypter(
+          level, QuicMakeUnique<NullEncrypter>(peer_framer_.perspective()));
+    }
     QuicFramerPeer::SetLastSerializedConnectionId(
         QuicConnectionPeer::GetFramer(&connection_), connection_id_);
     if (version().transport_version > QUIC_VERSION_43) {
@@ -1051,14 +1056,6 @@
     frames.push_back(QuicFrame(frame));
     QuicPacketCreatorPeer::SetSendVersionInPacket(
         &peer_creator_, connection_.perspective() == Perspective::IS_SERVER);
-    EncryptionLevel peer_encryption_level =
-        QuicPacketCreatorPeer::GetEncryptionLevel(&peer_creator_);
-    if (peer_encryption_level > ENCRYPTION_INITIAL) {
-      // Set peer_framer_'s corresponding encrypter.
-      peer_creator_.SetEncrypter(
-          QuicPacketCreatorPeer::GetEncryptionLevel(&peer_creator_),
-          QuicMakeUnique<NullEncrypter>(peer_framer_.perspective()));
-    }
 
     char buffer[kMaxOutgoingPacketSize];
     SerializedPacket serialized_packet =
@@ -1163,11 +1160,12 @@
   }
 
   size_t ProcessDataPacket(uint64_t number) {
-    return ProcessDataPacketAtLevel(number, false, ENCRYPTION_INITIAL);
+    return ProcessDataPacketAtLevel(number, false, ENCRYPTION_FORWARD_SECURE);
   }
 
   size_t ProcessDataPacket(QuicPacketNumber packet_number) {
-    return ProcessDataPacketAtLevel(packet_number, false, ENCRYPTION_INITIAL);
+    return ProcessDataPacketAtLevel(packet_number, false,
+                                    ENCRYPTION_FORWARD_SECURE);
   }
 
   size_t ProcessDataPacketAtLevel(QuicPacketNumber packet_number,
@@ -2426,12 +2424,13 @@
   EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
   EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_UNENCRYPTED_STREAM_DATA, _,
                                            ConnectionCloseSource::FROM_SELF));
-  EXPECT_QUIC_PEER_BUG(ProcessDataPacket(1), "");
+  EXPECT_QUIC_PEER_BUG(ProcessDataPacketAtLevel(1, false, ENCRYPTION_INITIAL),
+                       "");
   EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
                nullptr);
   const std::vector<QuicConnectionCloseFrame>& connection_close_frames =
       writer_->connection_close_frames();
-  EXPECT_EQ(1u, connection_close_frames.size());
+  ASSERT_EQ(1u, connection_close_frames.size());
   EXPECT_EQ(QUIC_UNENCRYPTED_STREAM_DATA,
             connection_close_frames[0].quic_error_code);
 }
@@ -3018,7 +3017,7 @@
                             QuicMakeUnique<TaggingEncrypter>(0x01));
   SetDecrypter(ENCRYPTION_FORWARD_SECURE,
                QuicMakeUnique<StrictTaggingDecrypter>(0x01));
-  ProcessDataPacketAtLevel(2, false, ENCRYPTION_FORWARD_SECURE);
+  ProcessDataPacket(2);
 
   EXPECT_EQ(0u, connection_.NumQueuedPackets());
   EXPECT_FALSE(connection_.HasQueuedData());
@@ -6526,7 +6525,7 @@
                             QuicMakeUnique<TaggingEncrypter>(0x01));
   SetDecrypter(ENCRYPTION_FORWARD_SECURE,
                QuicMakeUnique<StrictTaggingDecrypter>(0x01));
-  ProcessDataPacketAtLevel(1, false, ENCRYPTION_FORWARD_SECURE);
+  ProcessDataPacket(1);
   connection_.SendStreamDataWithString(
       GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
       0, NO_FIN);
@@ -8864,7 +8863,7 @@
                QuicMakeUnique<StrictTaggingDecrypter>(0x02));
   // Verify zero rtt and forward secure packets get acked in the same packet.
   EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
-  ProcessDataPacketAtLevel(1003, false, ENCRYPTION_FORWARD_SECURE);
+  ProcessDataPacket(1003);
   EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
 }