| Index: net/tools/quic/end_to_end_test.cc
|
| diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc
|
| index c6621adcdaf38daff03e8f9e1c1d45f73fd3fc6b..88788cca68b354dca035875ab0f7f491af9f0e30 100644
|
| --- a/net/tools/quic/end_to_end_test.cc
|
| +++ b/net/tools/quic/end_to_end_test.cc
|
| @@ -657,15 +657,13 @@ TEST_P(EndToEndTest, LargePostFEC) {
|
| VerifyCleanConnection(true);
|
| }
|
|
|
| -// TODO(rtenneti): DISABLED_LargePostLargeBuffer seems to be flaky.
|
| -// http://crbug.com/370087.
|
| -TEST_P(EndToEndTest, DISABLED_LargePostLargeBuffer) {
|
| +TEST_P(EndToEndTest, LargePostSmallBandwidthLargeBuffer) {
|
| ASSERT_TRUE(Initialize());
|
| SetPacketSendDelay(QuicTime::Delta::FromMicroseconds(1));
|
| - // 256KB per second with a 128k buffer from server to client. Wireless
|
| + // 256KB per second with a 256k buffer from server to client. Wireless
|
| // clients commonly have larger buffers, but our max CWND is 200.
|
| server_writer_->set_max_bandwidth_and_buffer_size(
|
| - QuicBandwidth::FromBytesPerSecond(256 * 1024), 128 * 1024);
|
| + QuicBandwidth::FromBytesPerSecond(256 * 1024), 256 * 1024);
|
|
|
| client_->client()->WaitForCryptoHandshakeConfirmed();
|
|
|
| @@ -678,6 +676,8 @@ TEST_P(EndToEndTest, DISABLED_LargePostLargeBuffer) {
|
| request.AddBody(body, true);
|
|
|
| EXPECT_EQ(kFooResponseBody, client_->SendCustomSynchronousRequest(request));
|
| + // This connection will not drop packets, because the buffer size is larger
|
| + // than the default receive window.
|
| VerifyCleanConnection(false);
|
| }
|
|
|
|
|