| Index: net/tools/quic/end_to_end_test.cc
|
| diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc
|
| index f5cdb6c34d2dbc15b46c0493de66409346d2bf61..3ad5c0533215ec41fa5dc18bf0c6c1e6f754b5a7 100644
|
| --- a/net/tools/quic/end_to_end_test.cc
|
| +++ b/net/tools/quic/end_to_end_test.cc
|
| @@ -153,9 +153,8 @@ std::vector<TestParams> GetTestParams() {
|
| QuicVersionVector version_buckets[1];
|
|
|
| for (const QuicVersion version : all_supported_versions) {
|
| - // Versions: 34+
|
| - // QUIC_VERSION_34 deprecates entropy and uses new ack and stop waiting
|
| - // wire formats.
|
| + // Versions: 35+
|
| + // QUIC_VERSION_35 allows endpoints to independently set stream limit.
|
| version_buckets[0].push_back(version);
|
| }
|
|
|
| @@ -1279,41 +1278,6 @@ TEST_P(EndToEndTest, Timeout) {
|
| }
|
| }
|
|
|
| -TEST_P(EndToEndTest, NegotiateMaxOpenStreams) {
|
| - // Negotiate 1 max open stream.
|
| - client_config_.SetMaxStreamsPerConnection(1, 1);
|
| - ASSERT_TRUE(Initialize());
|
| - EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| -
|
| - if (negotiated_version_ > QUIC_VERSION_34) {
|
| - // Newer versions use max incoming dynamic streams.
|
| - return;
|
| - }
|
| -
|
| - // Make the client misbehave after negotiation.
|
| - const int kServerMaxStreams = kMaxStreamsMinimumIncrement + 1;
|
| - QuicSessionPeer::SetMaxOpenOutgoingStreams(client_->client()->session(),
|
| - kServerMaxStreams + 1);
|
| -
|
| - SpdyHeaderBlock headers;
|
| - headers[":method"] = "POST";
|
| - headers[":path"] = "/foo";
|
| - headers[":scheme"] = "https";
|
| - headers[":authority"] = server_hostname_;
|
| - headers["content-length"] = "3";
|
| -
|
| - // The server supports a small number of additional streams beyond the
|
| - // negotiated limit. Open enough streams to go beyond that limit.
|
| - for (int i = 0; i < kServerMaxStreams + 1; ++i) {
|
| - client_->SendMessage(headers, "", /*fin=*/false);
|
| - }
|
| - client_->WaitForResponse();
|
| -
|
| - EXPECT_TRUE(client_->connected());
|
| - EXPECT_EQ(QUIC_REFUSED_STREAM, client_->stream_error());
|
| - EXPECT_EQ(QUIC_NO_ERROR, client_->connection_error());
|
| -}
|
| -
|
| TEST_P(EndToEndTest, MaxIncomingDynamicStreamsLimitRespected) {
|
| // Set a limit on maximum number of incoming dynamic streams.
|
| // Make sure the limit is respected.
|
| @@ -1323,11 +1287,6 @@ TEST_P(EndToEndTest, MaxIncomingDynamicStreamsLimitRespected) {
|
| ASSERT_TRUE(Initialize());
|
| EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| - if (negotiated_version_ <= QUIC_VERSION_34) {
|
| - // Earlier versions negotiated max open streams.
|
| - return;
|
| - }
|
| -
|
| // Make the client misbehave after negotiation.
|
| const int kServerMaxStreams =
|
| kMaxStreamsMinimumIncrement + kServerMaxIncomingDynamicStreams;
|
| @@ -1364,11 +1323,6 @@ TEST_P(EndToEndTest, SetIndependentMaxIncomingDynamicStreamsLimits) {
|
| ASSERT_TRUE(Initialize());
|
| EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
|
|
| - if (negotiated_version_ <= QUIC_VERSION_34) {
|
| - // Earlier versions negotiated max open streams.
|
| - return;
|
| - }
|
| -
|
| // The client has received the server's limit and vice versa.
|
| EXPECT_EQ(kServerMaxIncomingDynamicStreams,
|
| client_->client()->session()->max_open_outgoing_streams());
|
| @@ -1409,22 +1363,6 @@ TEST_P(EndToEndTest, NegotiateCongestionControl) {
|
| server_thread_->Resume();
|
| }
|
|
|
| -TEST_P(EndToEndTest, LimitMaxOpenStreams) {
|
| - // Server limits the number of max streams to 2.
|
| - server_config_.SetMaxStreamsPerConnection(2, 2);
|
| - // Client tries to negotiate for 10.
|
| - client_config_.SetMaxStreamsPerConnection(10, 5);
|
| -
|
| - ASSERT_TRUE(Initialize());
|
| - EXPECT_TRUE(client_->client()->WaitForCryptoHandshakeConfirmed());
|
| - if (negotiated_version_ > QUIC_VERSION_34) {
|
| - // No negotiated max streams beyond version 34.
|
| - return;
|
| - }
|
| - QuicConfig* client_negotiated_config = client_->client()->session()->config();
|
| - EXPECT_EQ(2u, client_negotiated_config->MaxStreamsPerConnection());
|
| -}
|
| -
|
| TEST_P(EndToEndTest, ClientSuggestsRTT) {
|
| // Client suggests initial RTT, verify it is used.
|
| const uint32_t kInitialRTT = 20000;
|
|
|