Index: net/tools/quic/end_to_end_test.cc |
diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc |
index 9a7ca65cde1163f0afc96524351def15fa0b15f8..cfb5f3168ae125353e97ee8438619e3bb9bc0784 100644 |
--- a/net/tools/quic/end_to_end_test.cc |
+++ b/net/tools/quic/end_to_end_test.cc |
@@ -1322,9 +1322,6 @@ TEST_P(EndToEndTest, SetIndependentMaxIncomingDynamicStreamsLimits) { |
TEST_P(EndToEndTest, NegotiateCongestionControl) { |
FLAGS_quic_reloadable_flag_quic_allow_new_bbr = true; |
- // Disable this flag because if connection uses multipath sent packet manager, |
- // static_cast here does not work. |
- FLAGS_quic_reloadable_flag_quic_enable_multipath = false; |
ASSERT_TRUE(Initialize()); |
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed()); |
@@ -2205,7 +2202,7 @@ TEST_P(EndToEndTest, BadEncryptedData) { |
std::unique_ptr<QuicEncryptedPacket> packet(ConstructEncryptedPacket( |
client_->client()->session()->connection()->connection_id(), false, false, |
- false, 1, "At least 20 characters.", PACKET_8BYTE_CONNECTION_ID, |
+ 1, "At least 20 characters.", PACKET_8BYTE_CONNECTION_ID, |
PACKET_6BYTE_PACKET_NUMBER)); |
// Damage the encrypted data. |
string damaged_packet(packet->data(), packet->length()); |