Turn on ZeroRttResumption test.

Test change only. not protected.

PiperOrigin-RevId: 316779454
Change-Id: I71f3b96f48ad23636fe74cdbf3d3d986361e68f0
diff --git a/quic/core/http/quic_spdy_client_session_test.cc b/quic/core/http/quic_spdy_client_session_test.cc
index 5c0fdb8..824ff22 100644
--- a/quic/core/http/quic_spdy_client_session_test.cc
+++ b/quic/core/http/quic_spdy_client_session_test.cc
@@ -1370,6 +1370,7 @@
 
   CreateConnection();
   CompleteCryptoHandshake();
+  EXPECT_TRUE(session_->GetCryptoStream()->EarlyDataAccepted());
 
   EXPECT_CALL(*connection_, CloseConnection(QUIC_INTERNAL_ERROR, _, _))
       .WillOnce(testing::Invoke(connection_,
diff --git a/quic/core/tls_client_handshaker_test.cc b/quic/core/tls_client_handshaker_test.cc
index 1ec3d39..47989a7 100644
--- a/quic/core/tls_client_handshaker_test.cc
+++ b/quic/core/tls_client_handshaker_test.cc
@@ -347,15 +347,7 @@
   EXPECT_TRUE(stream()->IsResumption());
 }
 
-// TODO(b/152551499): This test is currently broken because the logic to reject
-// 0-RTT is overzealous. It currently requires a byte-for-byte match of the
-// Transport Parameters (between the ones that the server sent on the connection
-// where it issued a ticket, and the ones that the server is sending on the
-// connection where it is potentially accepting early data). This is broken
-// because the stateless reset token in the Transport Parameters necessarily
-// must be different between those two connections. Once that check is relaxed,
-// this test can be enabled.
-TEST_P(TlsClientHandshakerTest, DISABLED_ZeroRttResumption) {
+TEST_P(TlsClientHandshakerTest, ZeroRttResumption) {
   // Finish establishing the first connection:
   CompleteCryptoHandshake();