Turn on ZeroRttResumption test. Test change only. not protected. PiperOrigin-RevId: 316779454 Change-Id: I71f3b96f48ad23636fe74cdbf3d3d986361e68f0
diff --git a/quic/core/http/quic_spdy_client_session_test.cc b/quic/core/http/quic_spdy_client_session_test.cc index 5c0fdb8..824ff22 100644 --- a/quic/core/http/quic_spdy_client_session_test.cc +++ b/quic/core/http/quic_spdy_client_session_test.cc
@@ -1370,6 +1370,7 @@ CreateConnection(); CompleteCryptoHandshake(); + EXPECT_TRUE(session_->GetCryptoStream()->EarlyDataAccepted()); EXPECT_CALL(*connection_, CloseConnection(QUIC_INTERNAL_ERROR, _, _)) .WillOnce(testing::Invoke(connection_,
diff --git a/quic/core/tls_client_handshaker_test.cc b/quic/core/tls_client_handshaker_test.cc index 1ec3d39..47989a7 100644 --- a/quic/core/tls_client_handshaker_test.cc +++ b/quic/core/tls_client_handshaker_test.cc
@@ -347,15 +347,7 @@ EXPECT_TRUE(stream()->IsResumption()); } -// TODO(b/152551499): This test is currently broken because the logic to reject -// 0-RTT is overzealous. It currently requires a byte-for-byte match of the -// Transport Parameters (between the ones that the server sent on the connection -// where it issued a ticket, and the ones that the server is sending on the -// connection where it is potentially accepting early data). This is broken -// because the stateless reset token in the Transport Parameters necessarily -// must be different between those two connections. Once that check is relaxed, -// this test can be enabled. -TEST_P(TlsClientHandshakerTest, DISABLED_ZeroRttResumption) { +TEST_P(TlsClientHandshakerTest, ZeroRttResumption) { // Finish establishing the first connection: CompleteCryptoHandshake();