| Index: net/quic/core/crypto/crypto_utils_test.cc
 | 
| diff --git a/net/quic/core/crypto/crypto_utils_test.cc b/net/quic/core/crypto/crypto_utils_test.cc
 | 
| index 340352337991288683669744c7bcb179d7f76c83..1b34c50696073f2c0a0755120e8923860ba489f0 100644
 | 
| --- a/net/quic/core/crypto/crypto_utils_test.cc
 | 
| +++ b/net/quic/core/crypto/crypto_utils_test.cc
 | 
| @@ -4,6 +4,7 @@
 | 
|  
 | 
|  #include "net/quic/core/crypto/crypto_utils.h"
 | 
|  
 | 
| +#include "net/quic/core/quic_utils.h"
 | 
|  #include "net/quic/test_tools/quic_test_utils.h"
 | 
|  #include "testing/gtest/include/gtest/gtest.h"
 | 
|  
 | 
| @@ -18,9 +19,8 @@ TEST(CryptoUtilsTest, IsValidSNI) {
 | 
|    EXPECT_FALSE(CryptoUtils::IsValidSNI("192.168.0.1"));
 | 
|    // SNI without any dot.
 | 
|    EXPECT_FALSE(CryptoUtils::IsValidSNI("somedomain"));
 | 
| -  // Invalid RFC2396 hostname
 | 
| -  // TODO(rtenneti): Support RFC2396 hostname.
 | 
| -  // EXPECT_FALSE(CryptoUtils::IsValidSNI("some_domain.com"));
 | 
| +  // Invalid by RFC2396 but unfortunately domains of this form exist.
 | 
| +  EXPECT_TRUE(CryptoUtils::IsValidSNI("some_domain.com"));
 | 
|    // An empty string must be invalid otherwise the QUIC client will try sending
 | 
|    // it.
 | 
|    EXPECT_FALSE(CryptoUtils::IsValidSNI(""));
 | 
| 
 |