Index: net/tools/quic/end_to_end_test.cc |
diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc |
index f5cdb6c34d2dbc15b46c0493de66409346d2bf61..3ad5c0533215ec41fa5dc18bf0c6c1e6f754b5a7 100644 |
--- a/net/tools/quic/end_to_end_test.cc |
+++ b/net/tools/quic/end_to_end_test.cc |
@@ -153,9 +153,8 @@ std::vector<TestParams> GetTestParams() { |
QuicVersionVector version_buckets[1]; |
for (const QuicVersion version : all_supported_versions) { |
- // Versions: 34+ |
- // QUIC_VERSION_34 deprecates entropy and uses new ack and stop waiting |
- // wire formats. |
+ // Versions: 35+ |
+ // QUIC_VERSION_35 allows endpoints to independently set stream limit. |
version_buckets[0].push_back(version); |
} |
@@ -1279,41 +1278,6 @@ TEST_P(EndToEndTest, Timeout) { |
} |
} |
-TEST_P(EndToEndTest, NegotiateMaxOpenStreams) { |
- // Negotiate 1 max open stream. |
- client_config_.SetMaxStreamsPerConnection(1, 1); |
- ASSERT_TRUE(Initialize()); |
- EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed()); |
- |
- if (negotiated_version_ > QUIC_VERSION_34) { |
- // Newer versions use max incoming dynamic streams. |
- return; |
- } |
- |
- // Make the client misbehave after negotiation. |
- const int kServerMaxStreams = kMaxStreamsMinimumIncrement + 1; |
- QuicSessionPeer::SetMaxOpenOutgoingStreams(client_->client()->session(), |
- kServerMaxStreams + 1); |
- |
- SpdyHeaderBlock headers; |
- headers[":method"] = "POST"; |
- headers[":path"] = "/foo"; |
- headers[":scheme"] = "https"; |
- headers[":authority"] = server_hostname_; |
- headers["content-length"] = "3"; |
- |
- // The server supports a small number of additional streams beyond the |
- // negotiated limit. Open enough streams to go beyond that limit. |
- for (int i = 0; i < kServerMaxStreams + 1; ++i) { |
- client_->SendMessage(headers, "", /*fin=*/false); |
- } |
- client_->WaitForResponse(); |
- |
- EXPECT_TRUE(client_->connected()); |
- EXPECT_EQ(QUIC_REFUSED_STREAM, client_->stream_error()); |
- EXPECT_EQ(QUIC_NO_ERROR, client_->connection_error()); |
-} |
- |
TEST_P(EndToEndTest, MaxIncomingDynamicStreamsLimitRespected) { |
// Set a limit on maximum number of incoming dynamic streams. |
// Make sure the limit is respected. |
@@ -1323,11 +1287,6 @@ TEST_P(EndToEndTest, MaxIncomingDynamicStreamsLimitRespected) { |
ASSERT_TRUE(Initialize()); |
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed()); |
- if (negotiated_version_ <= QUIC_VERSION_34) { |
- // Earlier versions negotiated max open streams. |
- return; |
- } |
- |
// Make the client misbehave after negotiation. |
const int kServerMaxStreams = |
kMaxStreamsMinimumIncrement + kServerMaxIncomingDynamicStreams; |
@@ -1364,11 +1323,6 @@ TEST_P(EndToEndTest, SetIndependentMaxIncomingDynamicStreamsLimits) { |
ASSERT_TRUE(Initialize()); |
EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed()); |
- if (negotiated_version_ <= QUIC_VERSION_34) { |
- // Earlier versions negotiated max open streams. |
- return; |
- } |
- |
// The client has received the server's limit and vice versa. |
EXPECT_EQ(kServerMaxIncomingDynamicStreams, |
client_->client()->session()->max_open_outgoing_streams()); |
@@ -1409,22 +1363,6 @@ TEST_P(EndToEndTest, NegotiateCongestionControl) { |
server_thread_->Resume(); |
} |
-TEST_P(EndToEndTest, LimitMaxOpenStreams) { |
- // Server limits the number of max streams to 2. |
- server_config_.SetMaxStreamsPerConnection(2, 2); |
- // Client tries to negotiate for 10. |
- client_config_.SetMaxStreamsPerConnection(10, 5); |
- |
- ASSERT_TRUE(Initialize()); |
- EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed()); |
- if (negotiated_version_ > QUIC_VERSION_34) { |
- // No negotiated max streams beyond version 34. |
- return; |
- } |
- QuicConfig* client_negotiated_config = client_->client()->session()->config(); |
- EXPECT_EQ(2u, client_negotiated_config->MaxStreamsPerConnection()); |
-} |
- |
TEST_P(EndToEndTest, ClientSuggestsRTT) { |
// Client suggests initial RTT, verify it is used. |
const uint32_t kInitialRTT = 20000; |