OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/quic_chromium_client_session.h" | 5 #include "net/quic/quic_chromium_client_session.h" |
6 | 6 |
7 #include <vector> | 7 #include <vector> |
8 | 8 |
9 #include "base/base64.h" | 9 #include "base/base64.h" |
10 #include "base/files/file_path.h" | 10 #include "base/files/file_path.h" |
11 #include "base/rand_util.h" | 11 #include "base/rand_util.h" |
12 #include "base/thread_task_runner_handle.h" | 12 #include "base/thread_task_runner_handle.h" |
13 #include "net/base/socket_performance_watcher.h" | 13 #include "net/base/socket_performance_watcher.h" |
14 #include "net/base/test_completion_callback.h" | 14 #include "net/base/test_completion_callback.h" |
15 #include "net/base/test_data_directory.h" | 15 #include "net/base/test_data_directory.h" |
16 #include "net/cert/cert_verify_result.h" | 16 #include "net/cert/cert_verify_result.h" |
17 #include "net/http/transport_security_state.h" | 17 #include "net/http/transport_security_state.h" |
18 #include "net/log/test_net_log.h" | 18 #include "net/log/test_net_log.h" |
19 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h" | 19 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h" |
20 #include "net/quic/crypto/crypto_protocol.h" | 20 #include "net/quic/crypto/crypto_protocol.h" |
21 #include "net/quic/crypto/proof_verifier_chromium.h" | 21 #include "net/quic/crypto/proof_verifier_chromium.h" |
22 #include "net/quic/crypto/quic_decrypter.h" | 22 #include "net/quic/crypto/quic_decrypter.h" |
23 #include "net/quic/crypto/quic_encrypter.h" | 23 #include "net/quic/crypto/quic_encrypter.h" |
24 #include "net/quic/crypto/quic_server_info.h" | 24 #include "net/quic/crypto/quic_server_info.h" |
25 #include "net/quic/quic_connection_helper.h" | |
26 #include "net/quic/quic_default_packet_writer.h" | |
25 #include "net/quic/quic_flags.h" | 27 #include "net/quic/quic_flags.h" |
28 #include "net/quic/quic_http_utils.h" | |
26 #include "net/quic/quic_packet_reader.h" | 29 #include "net/quic/quic_packet_reader.h" |
30 #include "net/quic/quic_packet_writer.h" | |
27 #include "net/quic/quic_protocol.h" | 31 #include "net/quic/quic_protocol.h" |
28 #include "net/quic/test_tools/crypto_test_utils.h" | 32 #include "net/quic/test_tools/crypto_test_utils.h" |
33 #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" | |
29 #include "net/quic/test_tools/quic_chromium_client_session_peer.h" | 34 #include "net/quic/test_tools/quic_chromium_client_session_peer.h" |
30 #include "net/quic/test_tools/quic_spdy_session_peer.h" | 35 #include "net/quic/test_tools/quic_spdy_session_peer.h" |
36 #include "net/quic/test_tools/quic_test_packet_maker.h" | |
31 #include "net/quic/test_tools/quic_test_utils.h" | 37 #include "net/quic/test_tools/quic_test_utils.h" |
32 #include "net/quic/test_tools/simple_quic_framer.h" | 38 #include "net/quic/test_tools/simple_quic_framer.h" |
33 #include "net/socket/socket_test_util.h" | 39 #include "net/socket/socket_test_util.h" |
34 #include "net/spdy/spdy_test_utils.h" | 40 #include "net/spdy/spdy_test_utils.h" |
35 #include "net/test/cert_test_util.h" | 41 #include "net/test/cert_test_util.h" |
36 #include "net/udp/datagram_client_socket.h" | 42 #include "net/udp/datagram_client_socket.h" |
37 | 43 |
38 using testing::_; | 44 using testing::_; |
39 | 45 |
40 namespace net { | 46 namespace net { |
41 namespace test { | 47 namespace test { |
42 namespace { | 48 namespace { |
43 | 49 |
50 const IPEndPoint kIpEndPoint(IPAddressNumber(kIPv4AddressSize, 0), 0); | |
44 const char kServerHostname[] = "test.example.com"; | 51 const char kServerHostname[] = "test.example.com"; |
45 const uint16_t kServerPort = 443; | 52 const uint16_t kServerPort = 443; |
53 const size_t kMaxReadersPerQuicSession = 5; | |
54 | |
55 class DefaultPacketWriterFactory : public QuicConnection::PacketWriterFactory { | |
56 public: | |
57 explicit DefaultPacketWriterFactory(DatagramClientSocket* socket) | |
58 : socket_(socket) {} | |
59 ~DefaultPacketWriterFactory() override {} | |
60 | |
61 QuicPacketWriter* Create(QuicConnection* connection) const override { | |
62 scoped_ptr<net::QuicDefaultPacketWriter> writer( | |
63 new net::QuicDefaultPacketWriter(socket_)); | |
64 writer->SetConnection(connection); | |
65 return writer.release(); | |
66 } | |
67 | |
68 private: | |
69 DatagramClientSocket* socket_; | |
70 }; | |
46 | 71 |
47 class QuicChromiumClientSessionTest | 72 class QuicChromiumClientSessionTest |
48 : public ::testing::TestWithParam<QuicVersion> { | 73 : public ::testing::TestWithParam<QuicVersion> { |
49 protected: | 74 protected: |
50 QuicChromiumClientSessionTest() | 75 QuicChromiumClientSessionTest() |
51 : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), | 76 : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), |
52 connection_(new PacketSavingConnection(&helper_, | 77 socket_(GetSocket()), |
53 Perspective::IS_CLIENT, | 78 random_(0), |
54 SupportedVersions(GetParam()))), | 79 helper_(base::ThreadTaskRunnerHandle::Get().get(), &clock_, &random_), |
80 writer_factory_(socket_.get()), | |
81 connection_(new QuicConnection(0, | |
82 kIpEndPoint, | |
83 &helper_, | |
84 writer_factory_, | |
85 true, | |
86 Perspective::IS_CLIENT, | |
87 SupportedVersions(GetParam()))), | |
55 session_( | 88 session_( |
56 connection_, | 89 connection_, |
57 GetSocket().Pass(), | 90 std::move(socket_), |
Ryan Hamilton
2016/01/08 05:01:06
I'm a bit confused by this. If you move socket_ in
Jana
2016/01/09 02:06:53
Not really -- it's initialized above and used here
| |
58 /*stream_factory=*/nullptr, | 91 /*stream_factory=*/nullptr, |
59 /*crypto_client_stream_factory=*/nullptr, | 92 &crypto_client_stream_factory_, |
60 &clock_, | 93 &clock_, |
61 &transport_security_state_, | 94 &transport_security_state_, |
62 make_scoped_ptr((QuicServerInfo*)nullptr), | 95 make_scoped_ptr((QuicServerInfo*)nullptr), |
63 QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED), | 96 QuicServerId(kServerHostname, kServerPort, PRIVACY_MODE_DISABLED), |
64 kQuicYieldAfterPacketsRead, | 97 kQuicYieldAfterPacketsRead, |
65 QuicTime::Delta::FromMilliseconds( | 98 QuicTime::Delta::FromMilliseconds( |
66 kQuicYieldAfterDurationMilliseconds), | 99 kQuicYieldAfterDurationMilliseconds), |
67 /*cert_verify_flags=*/0, | 100 /*cert_verify_flags=*/0, |
68 DefaultQuicConfig(), | 101 DefaultQuicConfig(), |
69 &crypto_config_, | 102 &crypto_config_, |
70 "CONNECTION_UNKNOWN", | 103 "CONNECTION_UNKNOWN", |
71 base::TimeTicks::Now(), | 104 base::TimeTicks::Now(), |
72 base::ThreadTaskRunnerHandle::Get().get(), | 105 base::ThreadTaskRunnerHandle::Get().get(), |
73 /*socket_performance_watcher=*/nullptr, | 106 /*socket_performance_watcher=*/nullptr, |
74 &net_log_) { | 107 &net_log_), |
108 maker_(GetParam(), 0, &clock_, kServerHostname) { | |
109 scoped_refptr<X509Certificate> cert( | |
110 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem")); | |
111 verify_details_.cert_verify_result.verified_cert = cert; | |
112 verify_details_.cert_verify_result.is_issued_by_known_root = true; | |
113 crypto_client_stream_factory_.AddProofVerifyDetails(&verify_details_); | |
114 // Advance the time, because timers do not like uninitialized times. | |
115 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(1)); | |
75 session_.Initialize(); | 116 session_.Initialize(); |
76 // Advance the time, because timers do not like uninitialized times. | 117 session_.StartReading(); |
77 connection_->AdvanceTime(QuicTime::Delta::FromSeconds(1)); | |
78 } | 118 } |
79 | 119 |
80 void TearDown() override { | 120 void TearDown() override { |
81 session_.CloseSessionOnError(ERR_ABORTED, QUIC_INTERNAL_ERROR); | 121 session_.CloseSessionOnError(ERR_ABORTED, QUIC_INTERNAL_ERROR); |
82 } | 122 } |
83 | 123 |
84 scoped_ptr<DatagramClientSocket> GetSocket() { | 124 scoped_ptr<DatagramClientSocket> GetSocket() { |
85 socket_factory_.AddSocketDataProvider(&socket_data_); | 125 reads_[0] = MockRead(SYNCHRONOUS, ERR_IO_PENDING, 0); |
86 return socket_factory_.CreateDatagramClientSocket( | 126 socket_data_.reset( |
87 DatagramSocket::DEFAULT_BIND, base::Bind(&base::RandInt), &net_log_, | 127 new StaticSocketDataProvider(reads_, arraysize(reads_), nullptr, 0)); |
88 NetLog::Source()); | 128 socket_factory_.AddSocketDataProvider(socket_data_.get()); |
129 scoped_ptr<DatagramClientSocket> socket = | |
130 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
131 base::Bind(&base::RandInt), | |
132 &net_log_, NetLog::Source()); | |
133 socket->Connect(kIpEndPoint); | |
134 return socket; | |
89 } | 135 } |
90 | 136 |
91 void CompleteCryptoHandshake() { | 137 void CompleteCryptoHandshake() { |
92 ASSERT_EQ(ERR_IO_PENDING, | 138 ASSERT_EQ(OK, session_.CryptoConnect(false, callback_.callback())); |
93 session_.CryptoConnect(false, callback_.callback())); | |
94 CryptoTestUtils::FakeServerOptions server_options; | |
95 CryptoTestUtils::HandshakeWithFakeServer( | |
96 &helper_, connection_, session_.GetCryptoStream(), server_options); | |
97 ASSERT_EQ(OK, callback_.WaitForResult()); | |
98 } | 139 } |
99 | 140 |
100 MockConnectionHelper helper_; | 141 QuicPacketWriter* CreateQuicPacketWriter(DatagramClientSocket* socket, |
142 QuicConnection* connection) const { | |
143 scoped_ptr<QuicDefaultPacketWriter> writer( | |
144 new QuicDefaultPacketWriter(socket)); | |
145 writer->SetConnection(connection); | |
146 return writer.release(); | |
147 } | |
148 | |
149 scoped_ptr<QuicEncryptedPacket> ConstructGetRequestPacket( | |
150 QuicPacketNumber packet_number, | |
151 QuicStreamId stream_id, | |
152 bool should_include_version, | |
153 bool fin) { | |
154 SpdyHeaderBlock headers = maker_.GetRequestHeaders("GET", "https", "/"); | |
155 SpdyPriority priority = | |
156 ConvertRequestPriorityToQuicPriority(DEFAULT_PRIORITY); | |
157 return maker_.MakeRequestHeadersPacket(packet_number, stream_id, | |
158 should_include_version, fin, | |
159 priority, headers); | |
160 } | |
161 | |
162 scoped_ptr<QuicEncryptedPacket> ConstructOkResponsePacket( | |
163 QuicPacketNumber packet_number, | |
164 QuicStreamId stream_id, | |
165 bool should_include_version, | |
166 bool fin) { | |
167 SpdyHeaderBlock headers = maker_.GetResponseHeaders("200 OK"); | |
168 return maker_.MakeResponseHeadersPacket( | |
169 packet_number, stream_id, should_include_version, fin, headers); | |
170 } | |
171 | |
101 QuicCryptoClientConfig crypto_config_; | 172 QuicCryptoClientConfig crypto_config_; |
102 PacketSavingConnection* connection_; | |
103 TestNetLog net_log_; | 173 TestNetLog net_log_; |
174 BoundTestNetLog bound_net_log_; | |
104 MockClientSocketFactory socket_factory_; | 175 MockClientSocketFactory socket_factory_; |
105 StaticSocketDataProvider socket_data_; | 176 MockRead reads_[1]; |
Ryan Hamilton
2016/01/08 05:01:06
Does this need to be an array?
Jana
2016/01/09 02:06:53
Good point -- changed to scoped_ptr
| |
106 TransportSecurityState transport_security_state_; | 177 scoped_ptr<StaticSocketDataProvider> socket_data_; |
107 QuicChromiumClientSession session_; | 178 scoped_ptr<DatagramClientSocket> socket_; |
108 MockClock clock_; | 179 MockClock clock_; |
109 MockRandom random_; | 180 MockRandom random_; |
181 QuicConnectionHelper helper_; | |
182 DefaultPacketWriterFactory writer_factory_; | |
183 QuicConnection* connection_; | |
184 TransportSecurityState transport_security_state_; | |
185 MockCryptoClientStreamFactory crypto_client_stream_factory_; | |
186 QuicChromiumClientSession session_; | |
110 QuicConnectionVisitorInterface* visitor_; | 187 QuicConnectionVisitorInterface* visitor_; |
111 TestCompletionCallback callback_; | 188 TestCompletionCallback callback_; |
189 QuicTestPacketMaker maker_; | |
190 ProofVerifyDetailsChromium verify_details_; | |
112 }; | 191 }; |
113 | 192 |
114 INSTANTIATE_TEST_CASE_P(Tests, | 193 INSTANTIATE_TEST_CASE_P(Tests, |
115 QuicChromiumClientSessionTest, | 194 QuicChromiumClientSessionTest, |
116 ::testing::ValuesIn(QuicSupportedVersions())); | 195 ::testing::ValuesIn(QuicSupportedVersions())); |
117 | 196 |
118 TEST_P(QuicChromiumClientSessionTest, CryptoConnect) { | 197 TEST_P(QuicChromiumClientSessionTest, CryptoConnect) { |
119 CompleteCryptoHandshake(); | 198 CompleteCryptoHandshake(); |
120 } | 199 } |
121 | 200 |
122 TEST_P(QuicChromiumClientSessionTest, MaxNumStreams) { | 201 TEST_P(QuicChromiumClientSessionTest, MaxNumStreams) { |
123 CompleteCryptoHandshake(); | 202 CompleteCryptoHandshake(); |
203 const size_t kMaxOpenStreams = session_.get_max_open_streams(); | |
124 | 204 |
125 std::vector<QuicReliableClientStream*> streams; | 205 std::vector<QuicReliableClientStream*> streams; |
126 for (size_t i = 0; i < kDefaultMaxStreamsPerConnection; i++) { | 206 for (size_t i = 0; i < kMaxOpenStreams; i++) { |
127 QuicReliableClientStream* stream = | 207 QuicReliableClientStream* stream = |
128 session_.CreateOutgoingDynamicStream(kDefaultPriority); | 208 session_.CreateOutgoingDynamicStream(kDefaultPriority); |
129 EXPECT_TRUE(stream); | 209 EXPECT_TRUE(stream); |
130 streams.push_back(stream); | 210 streams.push_back(stream); |
131 } | 211 } |
132 EXPECT_FALSE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 212 EXPECT_FALSE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); |
133 | 213 |
134 EXPECT_EQ(kDefaultMaxStreamsPerConnection, | 214 EXPECT_EQ(kMaxOpenStreams, session_.GetNumOpenOutgoingStreams()); |
135 session_.GetNumOpenOutgoingStreams()); | |
136 | 215 |
137 // Close a stream and ensure I can now open a new one. | 216 // Close a stream and ensure I can now open a new one. |
138 QuicStreamId stream_id = streams[0]->id(); | 217 QuicStreamId stream_id = streams[0]->id(); |
139 session_.CloseStream(stream_id); | 218 session_.CloseStream(stream_id); |
140 | 219 |
141 EXPECT_FALSE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 220 EXPECT_FALSE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); |
142 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); | 221 QuicRstStreamFrame rst1(stream_id, QUIC_STREAM_NO_ERROR, 0); |
143 session_.OnRstStream(rst1); | 222 session_.OnRstStream(rst1); |
144 EXPECT_EQ(kDefaultMaxStreamsPerConnection - 1, | 223 EXPECT_EQ(kMaxOpenStreams - 1, session_.GetNumOpenOutgoingStreams()); |
145 session_.GetNumOpenOutgoingStreams()); | |
146 EXPECT_TRUE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); | 224 EXPECT_TRUE(session_.CreateOutgoingDynamicStream(kDefaultPriority)); |
147 } | 225 } |
148 | 226 |
149 TEST_P(QuicChromiumClientSessionTest, MaxNumStreamsViaRequest) { | 227 TEST_P(QuicChromiumClientSessionTest, MaxNumStreamsViaRequest) { |
150 CompleteCryptoHandshake(); | 228 CompleteCryptoHandshake(); |
229 const size_t kMaxOpenStreams = session_.get_max_open_streams(); | |
151 | 230 |
152 std::vector<QuicReliableClientStream*> streams; | 231 std::vector<QuicReliableClientStream*> streams; |
153 for (size_t i = 0; i < kDefaultMaxStreamsPerConnection; i++) { | 232 for (size_t i = 0; i < kMaxOpenStreams; i++) { |
154 QuicReliableClientStream* stream = | 233 QuicReliableClientStream* stream = |
155 session_.CreateOutgoingDynamicStream(kDefaultPriority); | 234 session_.CreateOutgoingDynamicStream(kDefaultPriority); |
156 EXPECT_TRUE(stream); | 235 EXPECT_TRUE(stream); |
157 streams.push_back(stream); | 236 streams.push_back(stream); |
158 } | 237 } |
159 | 238 |
160 QuicReliableClientStream* stream; | 239 QuicReliableClientStream* stream; |
161 QuicChromiumClientSession::StreamRequest stream_request; | 240 QuicChromiumClientSession::StreamRequest stream_request; |
162 TestCompletionCallback callback; | 241 TestCompletionCallback callback; |
163 ASSERT_EQ(ERR_IO_PENDING, | 242 ASSERT_EQ(ERR_IO_PENDING, |
(...skipping 103 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
267 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 346 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
268 | 347 |
269 CompleteCryptoHandshake(); | 348 CompleteCryptoHandshake(); |
270 session_.OnProofVerifyDetailsAvailable(details); | 349 session_.OnProofVerifyDetailsAvailable(details); |
271 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 350 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); |
272 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 351 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); |
273 | 352 |
274 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 353 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
275 } | 354 } |
276 | 355 |
356 TEST_P(QuicChromiumClientSessionTest, MigrateToSocket) { | |
357 CompleteCryptoHandshake(); | |
358 | |
359 char data[] = "ABCD"; | |
360 scoped_ptr<QuicEncryptedPacket> ping_in( | |
361 maker_.MakePingPacket(1, /*include_version=*/false)); | |
362 scoped_ptr<QuicEncryptedPacket> ping_out( | |
363 maker_.MakePingPacket(1, /*include_version=*/false)); | |
Ryan Hamilton
2016/01/08 05:01:06
Since this is the same packet as ping_in, you can
Jana
2016/01/09 02:06:53
Ah -- yes, of course. Left over from changing this
| |
364 scoped_ptr<QuicEncryptedPacket> ack_and_data_out(maker_.MakeAckAndDataPacket( | |
365 2, false, 5, 1, 1, false, 0, StringPiece(data))); | |
366 MockRead reads[] = { | |
367 MockRead(SYNCHRONOUS, ping_in->data(), ping_in->length(), 0), | |
368 MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; | |
369 MockWrite writes[] = { | |
370 MockWrite(SYNCHRONOUS, ping_out->data(), ping_out->length(), 2), | |
371 MockWrite(SYNCHRONOUS, ack_and_data_out->data(), | |
372 ack_and_data_out->length(), 3)}; | |
373 StaticSocketDataProvider socket_data(reads, arraysize(reads), writes, | |
374 arraysize(writes)); | |
375 socket_factory_.AddSocketDataProvider(&socket_data); | |
376 | |
377 // Create connected socket. | |
378 scoped_ptr<DatagramClientSocket> new_socket = | |
379 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
380 base::Bind(&base::RandInt), | |
381 &net_log_, NetLog::Source()); | |
382 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
383 | |
384 // Create reader and writer. | |
385 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
386 new_socket.get(), &clock_, &session_, kQuicYieldAfterPacketsRead, | |
387 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
388 bound_net_log_.bound())); | |
389 scoped_ptr<QuicPacketWriter> new_writer( | |
390 CreateQuicPacketWriter(new_socket.get(), session_.connection())); | |
391 | |
392 // Migrate session. | |
393 EXPECT_TRUE(session_.MigrateToSocket( | |
394 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
395 | |
396 // Write data to session. | |
397 struct iovec iov[1]; | |
398 iov[0].iov_base = data; | |
399 iov[0].iov_len = 4; | |
400 session_.WritevData(5, QuicIOVector(iov, arraysize(iov), 4), 0, false, | |
401 MAY_FEC_PROTECT, nullptr); | |
402 | |
403 EXPECT_TRUE(socket_data.AllReadDataConsumed()); | |
404 EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | |
405 } | |
406 | |
407 TEST_P(QuicChromiumClientSessionTest, MigrateToSocketMaxReaders) { | |
408 CompleteCryptoHandshake(); | |
409 | |
410 for (size_t i = 0; i < kMaxReadersPerQuicSession; ++i) { | |
411 MockRead reads[] = {MockRead(SYNCHRONOUS, ERR_IO_PENDING, 1)}; | |
412 scoped_ptr<QuicEncryptedPacket> ping_out( | |
413 maker_.MakePingPacket(i + 1, /*include_version=*/true)); | |
414 MockWrite writes[] = { | |
415 MockWrite(SYNCHRONOUS, ping_out->data(), ping_out->length(), i + 2)}; | |
416 StaticSocketDataProvider socket_data(reads, arraysize(reads), writes, | |
417 arraysize(writes)); | |
418 socket_factory_.AddSocketDataProvider(&socket_data); | |
419 | |
420 // Create connected socket. | |
421 scoped_ptr<DatagramClientSocket> new_socket = | |
422 socket_factory_.CreateDatagramClientSocket(DatagramSocket::DEFAULT_BIND, | |
423 base::Bind(&base::RandInt), | |
424 &net_log_, NetLog::Source()); | |
425 EXPECT_EQ(OK, new_socket->Connect(kIpEndPoint)); | |
426 | |
427 // Create reader and writer. | |
428 scoped_ptr<QuicPacketReader> new_reader(new QuicPacketReader( | |
429 new_socket.get(), &clock_, &session_, kQuicYieldAfterPacketsRead, | |
430 QuicTime::Delta::FromMilliseconds(kQuicYieldAfterDurationMilliseconds), | |
431 bound_net_log_.bound())); | |
432 scoped_ptr<QuicPacketWriter> new_writer( | |
433 CreateQuicPacketWriter(new_socket.get(), session_.connection())); | |
434 | |
435 // Migrate session. | |
436 if (i < kMaxReadersPerQuicSession - 1) { | |
437 EXPECT_TRUE(session_.MigrateToSocket( | |
438 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
439 EXPECT_TRUE(socket_data.AllReadDataConsumed()); | |
440 EXPECT_TRUE(socket_data.AllWriteDataConsumed()); | |
441 } else { | |
442 // Max readers exceeded. | |
443 EXPECT_FALSE(session_.MigrateToSocket( | |
444 std::move(new_socket), std::move(new_reader), std::move(new_writer))); | |
445 | |
446 EXPECT_FALSE(socket_data.AllReadDataConsumed()); | |
447 EXPECT_FALSE(socket_data.AllWriteDataConsumed()); | |
448 } | |
449 } | |
450 } | |
451 | |
277 } // namespace | 452 } // namespace |
278 } // namespace test | 453 } // namespace test |
279 } // namespace net | 454 } // namespace net |
OLD | NEW |