| Index: net/tools/quic/end_to_end_test.cc
|
| diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc
|
| index 1740eede05a9cda6b8a7f9218da3bd9e5d7d5623..0fccff9b12f3ea6e1cb869f7f366d01d277b223b 100644
|
| --- a/net/tools/quic/end_to_end_test.cc
|
| +++ b/net/tools/quic/end_to_end_test.cc
|
| @@ -943,13 +943,11 @@ TEST_P(EndToEndTest, LimitMaxOpenStreams) {
|
| EXPECT_EQ(2u, client_negotiated_config->max_streams_per_connection());
|
| }
|
|
|
| -// TODO(rtenneti): DISABLED_LimitCongestionWindowAndRTT seems to be flaky.
|
| -// http://crbug.com/321870.
|
| -TEST_P(EndToEndTest, DISABLED_LimitCongestionWindowAndRTT) {
|
| +TEST_P(EndToEndTest, LimitCongestionWindowAndRTT) {
|
| // Client tries to request twice the server's max initial window, and the
|
| // server limits it to the max.
|
| client_config_.SetInitialCongestionWindowToSend(2 * kMaxInitialWindow);
|
| - client_config_.SetInitialRoundTripTimeUsToSend(1);
|
| + client_config_.SetInitialRoundTripTimeUsToSend(1000);
|
|
|
| ASSERT_TRUE(Initialize());
|
| client_->client()->WaitForCryptoHandshakeConfirmed();
|
| @@ -974,9 +972,9 @@ TEST_P(EndToEndTest, DISABLED_LimitCongestionWindowAndRTT) {
|
| EXPECT_EQ(GetParam().use_pacing, server_sent_packet_manager.using_pacing());
|
| EXPECT_EQ(GetParam().use_pacing, client_sent_packet_manager.using_pacing());
|
|
|
| - EXPECT_EQ(100000u,
|
| - client_sent_packet_manager.GetRttStats()->initial_rtt_us());
|
| - EXPECT_EQ(1u, server_sent_packet_manager.GetRttStats()->initial_rtt_us());
|
| + // The client *should* set the intitial RTT.
|
| + EXPECT_EQ(1000u, client_sent_packet_manager.GetRttStats()->initial_rtt_us());
|
| + EXPECT_EQ(1000u, server_sent_packet_manager.GetRttStats()->initial_rtt_us());
|
|
|
| // Now use the negotiated limits with packet loss.
|
| SetPacketLossPercentage(30);
|
|
|