gfe-relnote: Use encryption level instead of looking for the string "CHLO" to identify the QUIC ClientHello. Client side change only, not flag protected.
PiperOrigin-RevId: 241995962
Change-Id: I840eb7531ef55f32c7bb06bc08bcdb947459e732
diff --git a/quic/core/quic_packet_creator_test.cc b/quic/core/quic_packet_creator_test.cc
index 1cdc3e4..aea0540 100644
--- a/quic/core/quic_packet_creator_test.cc
+++ b/quic/core/quic_packet_creator_test.cc
@@ -97,7 +97,7 @@
if (data_length > 0) {
producer_->SaveStreamData(id, iov, iov_count, iov_offset, data_length);
}
- return QuicPacketCreator::ConsumeData(id, data_length, iov_offset, offset,
+ return QuicPacketCreator::ConsumeData(id, data_length - iov_offset, offset,
fin, needs_full_padding,
transmission_type, frame);
}
@@ -693,6 +693,9 @@
}
TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) {
+ // This test serializes crypto payloads slightly larger than a packet, which
+ // Causes the multi-packet ClientHello check to fail.
+ FLAGS_quic_enforce_single_packet_chlo = false;
// Compute the total overhead for a single frame in packet.
size_t overhead =
GetPacketHeaderOverhead(client_framer_.transport_version()) +