diff --git a/UnitTest1/unittest1.cpp b/UnitTest1/unittest1.cpp
index 93ac067e4280089a17b92f3ff23e53cdb7544225..790238ef96c84b72279dfd082dae50b0142bb928 100644
--- a/UnitTest1/unittest1.cpp
+++ b/UnitTest1/unittest1.cpp
@@ -749,6 +749,13 @@ namespace UnitTest1
 
             Assert::AreEqual(ret, 0);
         }
+
+        TEST_METHOD(padding)
+        {
+            int ret = padding_test();
+
+            Assert::AreEqual(ret, 0);
+        }
         
         TEST_METHOD(stress)
         {
diff --git a/picoquic/picoquic.h b/picoquic/picoquic.h
index a83bb794ae779b95908db81062944bc156ffecb3..27db23154f8b22215471ce2dfd24739024cc36ed 100644
--- a/picoquic/picoquic.h
+++ b/picoquic/picoquic.h
@@ -349,6 +349,7 @@ int picoquic_set_verify_certificate_callback(picoquic_quic_t* quic, picoquic_ver
 void picoquic_set_client_authentication(picoquic_quic_t* quic, int client_authentication);
 
 /* Set default padding policy for the context */
+void picoquic_set_default_padding(picoquic_quic_t* quic, uint32_t padding_multiple, uint32_t padding_minsize);
 
 /* Connection context creation and registration */
 picoquic_cnx_t* picoquic_create_cnx(picoquic_quic_t* quic,
diff --git a/picoquic/sender.c b/picoquic/sender.c
index 0d438f06b710eb7222b3b3cb510912dd0f89d2ae..18a804063965ee1f29a5988f5dc668001f116fff 100644
--- a/picoquic/sender.c
+++ b/picoquic/sender.c
@@ -1199,9 +1199,6 @@ int picoquic_prepare_packet_0rtt(picoquic_cnx_t* cnx, picoquic_path_t * path_x,
         if (padding_required) {
             length = picoquic_pad_to_target_length(bytes, length, (uint32_t)(send_buffer_max - checksum_overhead));
         }
-        else {
-            length = picoquic_pad_to_policy(cnx, bytes, length, (uint32_t)(send_buffer_max - checksum_overhead));
-        }
     }
 
     picoquic_finalize_and_protect_packet(cnx, packet,
@@ -1516,9 +1513,6 @@ int picoquic_prepare_packet_client_init(picoquic_cnx_t* cnx, picoquic_path_t * p
                              * initial packet will be coalesced with 0-RTT packet */
                             length = picoquic_pad_to_target_length(bytes, length, (uint32_t)(send_buffer_max - checksum_overhead));
                         }
-                        else {
-                            length = picoquic_pad_to_policy(cnx, bytes, length, (uint32_t)(send_buffer_max - checksum_overhead));
-                        }
 
                         if (packet_type == picoquic_packet_0rtt_protected) {
                             cnx->nb_zero_rtt_sent++;
@@ -2303,7 +2297,7 @@ int picoquic_prepare_packet_ready(picoquic_cnx_t* cnx, picoquic_path_t * path_x,
                     }
 
                     if (length > header_length) {
-                        length = picoquic_pad_to_policy(cnx, bytes, length, (uint32_t)(send_buffer_max - checksum_overhead));
+                        length = picoquic_pad_to_policy(cnx, bytes, length, (uint32_t)(send_buffer_min_max - checksum_overhead));
                     }
                     else if (ret == 0 && send_buffer_max > path_x->send_mtu
                         && path_x->cwin > path_x->bytes_in_transit && picoquic_is_mtu_probe_needed(cnx, path_x)) {
diff --git a/picoquic_t/picoquic_t.c b/picoquic_t/picoquic_t.c
index 3feb742ffc0e82c4fd5e08045dc88190e254a41a..83f50e766bdd754ffb18178fdb137e9d42c73c46 100644
--- a/picoquic_t/picoquic_t.c
+++ b/picoquic_t/picoquic_t.c
@@ -147,6 +147,7 @@ static const picoquic_test_def_t test_table[] = {
     { "key_rotation_stress", key_rotation_stress_test },
     { "short_initial_cid", short_initial_cid_test },
     { "stream_id_max", stream_id_max_test },
+    { "padding_test", padding_test },
     { "stress", stress_test },
     { "fuzz", fuzz_test },
     { "fuzz_initial", fuzz_initial_test}
diff --git a/picoquictest/picoquictest.h b/picoquictest/picoquictest.h
index 310db4d6b83385a8c53fb3b0f8ec5f2b255a3a8e..fbda0c43b8eac32e221d07accc7504bba0c0ddcc 100644
--- a/picoquictest/picoquictest.h
+++ b/picoquictest/picoquictest.h
@@ -145,6 +145,7 @@ int key_rotation_stress_test();
 int short_initial_cid_test();
 int stream_id_max_test();
 int stream_id_to_rank_test();
+int padding_test();
 
 #ifdef __cplusplus
 }
diff --git a/picoquictest/tls_api_test.c b/picoquictest/tls_api_test.c
index 5d462b9ff0026e5ec37fb3f2a00a1fd09792c5ea..93cda6aa48a9172792579d9a3a32851a31f8d71e 100644
--- a/picoquictest/tls_api_test.c
+++ b/picoquictest/tls_api_test.c
@@ -158,10 +158,10 @@ static test_api_stream_desc_t test_scenario_many_streams[] = {
     { 8, 0, 32, 1000 },
     { 12, 0, 32, 1000 },
     { 16, 0, 32, 1000 },
-    { 20, 0, 32, 1000 },
-    { 24, 0, 32, 1000 },
-    { 28, 0, 32, 1000 },
-    { 32, 0, 32, 1000 }
+    { 20, 0, 32, 350 },
+    { 24, 0, 32, 225 },
+    { 28, 0, 32, 700 },
+    { 32, 0, 32, 1500 }
 };
 
 static int test_api_init_stream_buffers(size_t len, uint8_t** src_bytes, uint8_t** rcv_bytes)
@@ -1237,17 +1237,15 @@ int tls_api_wrong_alpn_test()
  * Scenario based transmission tests.
  */
 
-int tls_api_one_scenario_test(test_api_stream_desc_t* scenario,
-    size_t sizeof_scenario, uint64_t init_loss_mask, uint64_t max_data, uint64_t queue_delay_max,
-    uint32_t proposed_version, uint64_t max_completion_microsec,
+int tls_api_one_scenario_init(
+    picoquic_test_tls_api_ctx_t** p_test_ctx, uint64_t * simulated_time,
+    uint32_t proposed_version,
     picoquic_tp_t * client_params, picoquic_tp_t * server_params)
 {
-    uint64_t simulated_time = 0;
     uint64_t loss_mask = 0;
-    picoquic_test_tls_api_ctx_t* test_ctx = NULL;
-    int ret = tls_api_init_ctx(&test_ctx,
+    int ret = tls_api_init_ctx(p_test_ctx,
         (proposed_version == 0) ? PICOQUIC_INTERNAL_TEST_VERSION_1 : proposed_version,
-        PICOQUIC_TEST_SNI, PICOQUIC_TEST_ALPN, &simulated_time, NULL, 0, 1, 0);
+        PICOQUIC_TEST_SNI, PICOQUIC_TEST_ALPN, simulated_time, NULL, 0, 1, 0);
 
     if (ret != 0)
     {
@@ -1255,24 +1253,36 @@ int tls_api_one_scenario_test(test_api_stream_desc_t* scenario,
     }
 
     if (ret == 0 && client_params != NULL) {
-        picoquic_set_transport_parameters(test_ctx->cnx_client, client_params);
+        picoquic_set_transport_parameters((*p_test_ctx)->cnx_client, client_params);
     }
 
     if (ret == 0 && server_params != NULL) {
-        ret = picoquic_set_default_tp(test_ctx->qserver, server_params);
+        ret = picoquic_set_default_tp((*p_test_ctx)->qserver, server_params);
     }
 
+    return ret;
+}
+
+int tls_api_one_scenario_body(picoquic_test_tls_api_ctx_t* test_ctx, 
+    uint64_t * simulated_time, 
+    test_api_stream_desc_t* scenario,
+    size_t sizeof_scenario, uint64_t init_loss_mask, uint64_t max_data, uint64_t queue_delay_max,
+    uint64_t max_completion_microsec)
+{
+    int ret = 0;
+    uint64_t loss_mask = 0;
+
     if (ret == 0) {
         ret = picoquic_start_client_cnx(test_ctx->cnx_client);
         if (ret != 0)
         {
-            DBG_PRINTF("%s", "Could not initialize stream zero for the client\n");
+            DBG_PRINTF("%s", "Could not initialize connection for the client\n");
         }
 
     }
-         
+
     if (ret == 0) {
-        ret = tls_api_connection_loop(test_ctx, &loss_mask, queue_delay_max, &simulated_time);
+        ret = tls_api_connection_loop(test_ctx, &loss_mask, queue_delay_max, simulated_time);
 
         if (ret != 0)
         {
@@ -1300,7 +1310,7 @@ int tls_api_one_scenario_test(test_api_stream_desc_t* scenario,
 
     /* Perform a data sending loop */
     if (ret == 0) {
-        ret = tls_api_data_sending_loop(test_ctx, &loss_mask, &simulated_time, 0);
+        ret = tls_api_data_sending_loop(test_ctx, &loss_mask, simulated_time, 0);
 
         if (ret != 0)
         {
@@ -1311,15 +1321,19 @@ int tls_api_one_scenario_test(test_api_stream_desc_t* scenario,
     if (ret == 0) {
         if (test_ctx->server_callback.error_detected) {
             ret = -1;
-        } else if (test_ctx->client_callback.error_detected) {
+        }
+        else if (test_ctx->client_callback.error_detected) {
             ret = -1;
-        } else {
+        }
+        else {
             for (size_t i = 0; ret == 0 && i < test_ctx->nb_test_streams; i++) {
                 if (test_ctx->test_stream[i].q_recv_nb != test_ctx->test_stream[i].q_len) {
                     ret = -1;
-                } else if (test_ctx->test_stream[i].r_recv_nb != test_ctx->test_stream[i].r_len) {
+                }
+                else if (test_ctx->test_stream[i].r_recv_nb != test_ctx->test_stream[i].r_len) {
                     ret = -1;
-                } else if (test_ctx->test_stream[i].q_received == 0 || test_ctx->test_stream[i].r_received == 0) {
+                }
+                else if (test_ctx->test_stream[i].q_received == 0 || test_ctx->test_stream[i].r_received == 0) {
                     ret = -1;
                 }
             }
@@ -1339,13 +1353,34 @@ int tls_api_one_scenario_test(test_api_stream_desc_t* scenario,
     }
 
     if (ret == 0 && max_completion_microsec != 0) {
-        if (simulated_time > max_completion_microsec)
+        if (*simulated_time > max_completion_microsec)
         {
-            DBG_PRINTF("Scenario completes in %llu microsec, more than %llu\n", simulated_time, max_completion_microsec);
+            DBG_PRINTF("Scenario completes in %llu microsec, more than %llu\n", 
+                (unsigned long long)*simulated_time, (unsigned long long)max_completion_microsec);
             ret = -1;
         }
     }
 
+    return ret;
+}
+
+int tls_api_one_scenario_test(test_api_stream_desc_t* scenario,
+    size_t sizeof_scenario, uint64_t init_loss_mask, uint64_t max_data, uint64_t queue_delay_max,
+    uint32_t proposed_version, uint64_t max_completion_microsec,
+    picoquic_tp_t * client_params, picoquic_tp_t * server_params) 
+{
+    uint64_t simulated_time = 0;
+    picoquic_test_tls_api_ctx_t* test_ctx = NULL;
+
+    int ret = tls_api_one_scenario_init(&test_ctx, &simulated_time,
+        proposed_version, client_params, server_params);
+
+    if (ret == 0) {
+        ret = tls_api_one_scenario_body(test_ctx, &simulated_time,
+            scenario, sizeof_scenario, init_loss_mask, max_data, queue_delay_max,
+            max_completion_microsec);
+    }
+
     if (test_ctx != NULL) {
         tls_api_delete_ctx(test_ctx);
         test_ctx = NULL;
@@ -4842,4 +4877,45 @@ int stream_id_max_test()
     test_parameters.initial_max_stream_id_bidir = 4;
 
     return tls_api_one_scenario_test(test_scenario_many_streams, sizeof(test_scenario_many_streams), 0, 0, 0, 0, 250000, NULL, &test_parameters);
+}
+
+/*
+ * Test whether padding policy is correctly applied, and whether the corresponding
+ * connection succeeds.
+ */
+
+int padding_test()
+{
+    uint64_t simulated_time = 0;
+    uint64_t loss_mask = 0;
+    picoquic_test_tls_api_ctx_t* test_ctx = NULL;
+    int ret = tls_api_init_ctx(&test_ctx, PICOQUIC_INTERNAL_TEST_VERSION_1, PICOQUIC_TEST_SNI, PICOQUIC_TEST_ALPN, &simulated_time, NULL, 0, 1, 0);
+
+    if (ret == 0 && test_ctx == NULL) {
+        ret = -1;
+    }
+
+    /* Set the padding policy in the server context and in the client connection
+     */
+    if (ret == 0) {
+        picoquic_set_default_padding(test_ctx->qserver, 128, 64);
+        picoquic_cnx_set_padding_policy(test_ctx->cnx_client, 128, 64);
+    }
+
+    /* Run a basic test scenario
+     */
+    if (ret == 0) {
+        ret = tls_api_one_scenario_body(test_ctx, &simulated_time,
+            test_scenario_many_streams, sizeof(test_scenario_many_streams), 0, 0, 0, 250000);
+    }
+
+    /* And then free the resource
+     */
+
+    if (test_ctx != NULL) {
+        tls_api_delete_ctx(test_ctx);
+        test_ctx = NULL;
+    }
+
+    return ret;
 }
\ No newline at end of file