Index: net/tools/quic/end_to_end_test.cc |
diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc |
index c6621adcdaf38daff03e8f9e1c1d45f73fd3fc6b..88788cca68b354dca035875ab0f7f491af9f0e30 100644 |
--- a/net/tools/quic/end_to_end_test.cc |
+++ b/net/tools/quic/end_to_end_test.cc |
@@ -657,15 +657,13 @@ TEST_P(EndToEndTest, LargePostFEC) { |
VerifyCleanConnection(true); |
} |
-// TODO(rtenneti): DISABLED_LargePostLargeBuffer seems to be flaky. |
-// http://crbug.com/370087. |
-TEST_P(EndToEndTest, DISABLED_LargePostLargeBuffer) { |
+TEST_P(EndToEndTest, LargePostSmallBandwidthLargeBuffer) { |
ASSERT_TRUE(Initialize()); |
SetPacketSendDelay(QuicTime::Delta::FromMicroseconds(1)); |
- // 256KB per second with a 128k buffer from server to client. Wireless |
+ // 256KB per second with a 256k buffer from server to client. Wireless |
// clients commonly have larger buffers, but our max CWND is 200. |
server_writer_->set_max_bandwidth_and_buffer_size( |
- QuicBandwidth::FromBytesPerSecond(256 * 1024), 128 * 1024); |
+ QuicBandwidth::FromBytesPerSecond(256 * 1024), 256 * 1024); |
client_->client()->WaitForCryptoHandshakeConfirmed(); |
@@ -678,6 +676,8 @@ TEST_P(EndToEndTest, DISABLED_LargePostLargeBuffer) { |
request.AddBody(body, true); |
EXPECT_EQ(kFooResponseBody, client_->SendCustomSynchronousRequest(request)); |
+ // This connection will not drop packets, because the buffer size is larger |
+ // than the default receive window. |
VerifyCleanConnection(false); |
} |