| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/quic/quic_packet_creator.h" | |
| 6 | |
| 7 #include <cstdint> | |
| 8 #include <memory> | |
| 9 #include <string> | |
| 10 | |
| 11 #include "base/macros.h" | |
| 12 #include "base/stl_util.h" | |
| 13 #include "net/quic/crypto/null_encrypter.h" | |
| 14 #include "net/quic/crypto/quic_decrypter.h" | |
| 15 #include "net/quic/crypto/quic_encrypter.h" | |
| 16 #include "net/quic/quic_flags.h" | |
| 17 #include "net/quic/quic_simple_buffer_allocator.h" | |
| 18 #include "net/quic/quic_utils.h" | |
| 19 #include "net/quic/test_tools/mock_random.h" | |
| 20 #include "net/quic/test_tools/quic_framer_peer.h" | |
| 21 #include "net/quic/test_tools/quic_packet_creator_peer.h" | |
| 22 #include "net/quic/test_tools/quic_test_utils.h" | |
| 23 #include "net/test/gtest_util.h" | |
| 24 #include "testing/gmock/include/gmock/gmock.h" | |
| 25 | |
| 26 using base::StringPiece; | |
| 27 using std::ostream; | |
| 28 using std::string; | |
| 29 using std::vector; | |
| 30 using testing::DoAll; | |
| 31 using testing::InSequence; | |
| 32 using testing::Return; | |
| 33 using testing::SaveArg; | |
| 34 using testing::StrictMock; | |
| 35 using testing::_; | |
| 36 | |
| 37 namespace net { | |
| 38 namespace test { | |
| 39 namespace { | |
| 40 | |
| 41 // Run tests with combinations of {QuicVersion, ToggleVersionSerialization}. | |
| 42 struct TestParams { | |
| 43 TestParams(QuicVersion version, | |
| 44 bool version_serialization, | |
| 45 QuicConnectionIdLength length) | |
| 46 : version(version), | |
| 47 connection_id_length(length), | |
| 48 version_serialization(version_serialization) {} | |
| 49 | |
| 50 friend ostream& operator<<(ostream& os, const TestParams& p) { | |
| 51 os << "{ client_version: " << QuicVersionToString(p.version) | |
| 52 << " connection id length: " << p.connection_id_length | |
| 53 << " include version: " << p.version_serialization << " }"; | |
| 54 return os; | |
| 55 } | |
| 56 | |
| 57 QuicVersion version; | |
| 58 QuicConnectionIdLength connection_id_length; | |
| 59 bool version_serialization; | |
| 60 }; | |
| 61 | |
| 62 // Constructs various test permutations. | |
| 63 vector<TestParams> GetTestParams() { | |
| 64 vector<TestParams> params; | |
| 65 constexpr QuicConnectionIdLength kMax = PACKET_8BYTE_CONNECTION_ID; | |
| 66 QuicVersionVector all_supported_versions = QuicSupportedVersions(); | |
| 67 for (size_t i = 0; i < all_supported_versions.size(); ++i) { | |
| 68 params.push_back(TestParams(all_supported_versions[i], true, kMax)); | |
| 69 params.push_back(TestParams(all_supported_versions[i], false, kMax)); | |
| 70 } | |
| 71 params.push_back( | |
| 72 TestParams(all_supported_versions[0], true, PACKET_0BYTE_CONNECTION_ID)); | |
| 73 params.push_back(TestParams(all_supported_versions[0], true, kMax)); | |
| 74 return params; | |
| 75 } | |
| 76 | |
| 77 class MockDelegate : public QuicPacketCreator::DelegateInterface { | |
| 78 public: | |
| 79 MockDelegate() {} | |
| 80 ~MockDelegate() override {} | |
| 81 | |
| 82 MOCK_METHOD1(OnSerializedPacket, void(SerializedPacket* packet)); | |
| 83 MOCK_METHOD3(OnUnrecoverableError, | |
| 84 void(QuicErrorCode, | |
| 85 const string&, | |
| 86 ConnectionCloseSource source)); | |
| 87 | |
| 88 private: | |
| 89 DISALLOW_COPY_AND_ASSIGN(MockDelegate); | |
| 90 }; | |
| 91 | |
| 92 class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> { | |
| 93 public: | |
| 94 void ClearSerializedPacket(SerializedPacket* serialized_packet) { | |
| 95 if (serialized_packet == nullptr) { | |
| 96 return; | |
| 97 } | |
| 98 QuicUtils::ClearSerializedPacket(serialized_packet); | |
| 99 } | |
| 100 | |
| 101 void SaveSerializedPacket(SerializedPacket* serialized_packet) { | |
| 102 if (serialized_packet == nullptr) { | |
| 103 return; | |
| 104 } | |
| 105 delete[] serialized_packet_.encrypted_buffer; | |
| 106 serialized_packet_ = *serialized_packet; | |
| 107 serialized_packet_.encrypted_buffer = | |
| 108 QuicUtils::CopyBuffer(*serialized_packet); | |
| 109 serialized_packet->retransmittable_frames.clear(); | |
| 110 } | |
| 111 | |
| 112 void DeleteSerializedPacket() { | |
| 113 delete[] serialized_packet_.encrypted_buffer; | |
| 114 serialized_packet_.encrypted_buffer = nullptr; | |
| 115 ClearSerializedPacket(&serialized_packet_); | |
| 116 } | |
| 117 | |
| 118 protected: | |
| 119 QuicPacketCreatorTest() | |
| 120 : server_framer_(SupportedVersions(GetParam().version), | |
| 121 QuicTime::Zero(), | |
| 122 Perspective::IS_SERVER), | |
| 123 client_framer_(SupportedVersions(GetParam().version), | |
| 124 QuicTime::Zero(), | |
| 125 Perspective::IS_CLIENT), | |
| 126 connection_id_(2), | |
| 127 data_("foo"), | |
| 128 creator_(connection_id_, | |
| 129 &client_framer_, | |
| 130 &mock_random_, | |
| 131 &buffer_allocator_, | |
| 132 &delegate_), | |
| 133 serialized_packet_(creator_.NoPacket()) { | |
| 134 FLAGS_quic_always_log_bugs_for_tests = true; | |
| 135 creator_.set_connection_id_length(GetParam().connection_id_length); | |
| 136 | |
| 137 creator_.SetEncrypter(ENCRYPTION_INITIAL, new NullEncrypter()); | |
| 138 creator_.SetEncrypter(ENCRYPTION_FORWARD_SECURE, new NullEncrypter()); | |
| 139 client_framer_.set_visitor(&framer_visitor_); | |
| 140 client_framer_.set_received_entropy_calculator(&entropy_calculator_); | |
| 141 server_framer_.set_visitor(&framer_visitor_); | |
| 142 // TODO(ianswett): Fix this test so it uses a non-null encrypter. | |
| 143 FLAGS_quic_never_write_unencrypted_data = false; | |
| 144 } | |
| 145 | |
| 146 ~QuicPacketCreatorTest() override { | |
| 147 delete[] serialized_packet_.encrypted_buffer; | |
| 148 ClearSerializedPacket(&serialized_packet_); | |
| 149 } | |
| 150 | |
| 151 SerializedPacket SerializeAllFrames(const QuicFrames& frames) { | |
| 152 SerializedPacket packet = QuicPacketCreatorPeer::SerializeAllFrames( | |
| 153 &creator_, frames, buffer_, kMaxPacketSize); | |
| 154 EXPECT_EQ(QuicPacketCreatorPeer::GetEncryptionLevel(&creator_), | |
| 155 packet.encryption_level); | |
| 156 return packet; | |
| 157 } | |
| 158 | |
| 159 void ProcessPacket(const SerializedPacket& packet) { | |
| 160 QuicEncryptedPacket encrypted_packet(packet.encrypted_buffer, | |
| 161 packet.encrypted_length); | |
| 162 server_framer_.ProcessPacket(encrypted_packet); | |
| 163 } | |
| 164 | |
| 165 void CheckStreamFrame(const QuicFrame& frame, | |
| 166 QuicStreamId stream_id, | |
| 167 const string& data, | |
| 168 QuicStreamOffset offset, | |
| 169 bool fin) { | |
| 170 EXPECT_EQ(STREAM_FRAME, frame.type); | |
| 171 ASSERT_TRUE(frame.stream_frame); | |
| 172 EXPECT_EQ(stream_id, frame.stream_frame->stream_id); | |
| 173 EXPECT_EQ(data, StringPiece(frame.stream_frame->data_buffer, | |
| 174 frame.stream_frame->data_length)); | |
| 175 EXPECT_EQ(offset, frame.stream_frame->offset); | |
| 176 EXPECT_EQ(fin, frame.stream_frame->fin); | |
| 177 } | |
| 178 | |
| 179 // Returns the number of bytes consumed by the header of packet, including | |
| 180 // the version. | |
| 181 size_t GetPacketHeaderOverhead(QuicVersion version) { | |
| 182 if (FLAGS_quic_simple_packet_number_length) { | |
| 183 return GetPacketHeaderSize( | |
| 184 version, creator_.connection_id_length(), kIncludeVersion, | |
| 185 !kIncludePathId, !kIncludeDiversificationNonce, | |
| 186 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 187 } else { | |
| 188 return GetPacketHeaderSize( | |
| 189 version, creator_.connection_id_length(), kIncludeVersion, | |
| 190 !kIncludePathId, !kIncludeDiversificationNonce, | |
| 191 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 192 } | |
| 193 } | |
| 194 | |
| 195 // Returns the number of bytes of overhead that will be added to a packet | |
| 196 // of maximum length. | |
| 197 size_t GetEncryptionOverhead() { | |
| 198 return creator_.max_packet_length() - | |
| 199 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
| 200 } | |
| 201 | |
| 202 // Returns the number of bytes consumed by the non-data fields of a stream | |
| 203 // frame, assuming it is the last frame in the packet | |
| 204 size_t GetStreamFrameOverhead() { | |
| 205 return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset, | |
| 206 true); | |
| 207 } | |
| 208 | |
| 209 QuicIOVector MakeIOVector(StringPiece s) { | |
| 210 return ::net::MakeIOVector(s, &iov_); | |
| 211 } | |
| 212 | |
| 213 PendingRetransmission CreateRetransmission( | |
| 214 const QuicFrames& retransmittable_frames, | |
| 215 bool has_crypto_handshake, | |
| 216 int num_padding_bytes, | |
| 217 EncryptionLevel encryption_level, | |
| 218 QuicPacketNumberLength packet_number_length) { | |
| 219 return PendingRetransmission(1u, 1u, NOT_RETRANSMISSION, | |
| 220 retransmittable_frames, has_crypto_handshake, | |
| 221 num_padding_bytes, encryption_level, | |
| 222 packet_number_length); | |
| 223 } | |
| 224 | |
| 225 static const QuicStreamOffset kOffset = 1u; | |
| 226 | |
| 227 char buffer_[kMaxPacketSize]; | |
| 228 QuicFrames frames_; | |
| 229 QuicFramer server_framer_; | |
| 230 QuicFramer client_framer_; | |
| 231 StrictMock<MockFramerVisitor> framer_visitor_; | |
| 232 StrictMock<MockDelegate> delegate_; | |
| 233 QuicConnectionId connection_id_; | |
| 234 string data_; | |
| 235 struct iovec iov_; | |
| 236 MockRandom mock_random_; | |
| 237 SimpleBufferAllocator buffer_allocator_; | |
| 238 QuicPacketCreator creator_; | |
| 239 MockEntropyCalculator entropy_calculator_; | |
| 240 SerializedPacket serialized_packet_; | |
| 241 }; | |
| 242 | |
| 243 // Run all packet creator tests with all supported versions of QUIC, and with | |
| 244 // and without version in the packet header, as well as doing a run for each | |
| 245 // length of truncated connection id. | |
| 246 INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests, | |
| 247 QuicPacketCreatorTest, | |
| 248 ::testing::ValuesIn(GetTestParams())); | |
| 249 | |
| 250 TEST_P(QuicPacketCreatorTest, SerializeFrames) { | |
| 251 for (int i = ENCRYPTION_NONE; i < NUM_ENCRYPTION_LEVELS; ++i) { | |
| 252 EncryptionLevel level = static_cast<EncryptionLevel>(i); | |
| 253 creator_.set_encryption_level(level); | |
| 254 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
| 255 frames_.push_back( | |
| 256 QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); | |
| 257 frames_.push_back( | |
| 258 QuicFrame(new QuicStreamFrame(0u, true, 0u, StringPiece()))); | |
| 259 SerializedPacket serialized = SerializeAllFrames(frames_); | |
| 260 EXPECT_EQ(level, serialized.encryption_level); | |
| 261 delete frames_[0].ack_frame; | |
| 262 delete frames_[1].stream_frame; | |
| 263 delete frames_[2].stream_frame; | |
| 264 frames_.clear(); | |
| 265 | |
| 266 { | |
| 267 InSequence s; | |
| 268 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 269 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 270 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 271 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 272 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 273 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 274 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 275 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 276 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 277 } | |
| 278 ProcessPacket(serialized); | |
| 279 } | |
| 280 } | |
| 281 | |
| 282 TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) { | |
| 283 FLAGS_quic_simple_packet_number_length = false; | |
| 284 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
| 285 creator_.AddSavedFrame(frames_[0]); | |
| 286 QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, | |
| 287 PACKET_4BYTE_PACKET_NUMBER); | |
| 288 | |
| 289 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 290 .WillRepeatedly( | |
| 291 Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 292 creator_.Flush(); | |
| 293 // The packet number length will not change mid-packet. | |
| 294 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 295 serialized_packet_.packet_number_length); | |
| 296 | |
| 297 { | |
| 298 InSequence s; | |
| 299 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 300 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 301 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 302 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 303 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 304 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 305 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 306 } | |
| 307 ProcessPacket(serialized_packet_); | |
| 308 DeleteSerializedPacket(); | |
| 309 | |
| 310 creator_.AddSavedFrame(frames_[0]); | |
| 311 creator_.Flush(); | |
| 312 // Now the actual packet number length should have changed. | |
| 313 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
| 314 serialized_packet_.packet_number_length); | |
| 315 delete frames_[0].ack_frame; | |
| 316 | |
| 317 { | |
| 318 InSequence s; | |
| 319 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 320 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 321 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 322 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 323 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 324 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 325 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 326 } | |
| 327 ProcessPacket(serialized_packet_); | |
| 328 DeleteSerializedPacket(); | |
| 329 } | |
| 330 | |
| 331 TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) { | |
| 332 FLAGS_quic_simple_packet_number_length = false; | |
| 333 // Changing the packet number length with queued frames in the creator | |
| 334 // should hold the change until after any currently queued frames are | |
| 335 // serialized. | |
| 336 | |
| 337 // Packet 1. | |
| 338 // Queue a frame in the creator. | |
| 339 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 340 QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); | |
| 341 creator_.AddSavedFrame(ack_frame); | |
| 342 | |
| 343 // Now change packet number length. | |
| 344 QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, | |
| 345 PACKET_4BYTE_PACKET_NUMBER); | |
| 346 | |
| 347 // Add a STOP_WAITING frame since it contains a packet number, | |
| 348 // whose length should be 1. | |
| 349 QuicStopWaitingFrame stop_waiting_frame; | |
| 350 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); | |
| 351 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 352 | |
| 353 // Ensure the packet is successfully created. | |
| 354 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 355 .WillRepeatedly( | |
| 356 Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 357 creator_.Flush(); | |
| 358 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 359 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 360 serialized_packet_.packet_number_length); | |
| 361 | |
| 362 // Verify that header in transmitted packet has 1 byte sequence length. | |
| 363 QuicPacketHeader header; | |
| 364 { | |
| 365 InSequence s; | |
| 366 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 367 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 368 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 369 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 370 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) | |
| 371 .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); | |
| 372 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 373 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); | |
| 374 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 375 } | |
| 376 ProcessPacket(serialized_packet_); | |
| 377 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 378 header.public_header.packet_number_length); | |
| 379 DeleteSerializedPacket(); | |
| 380 | |
| 381 // Packet 2. | |
| 382 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 383 // Generate Packet 2 with one frame -- packet number length should now | |
| 384 // change to 4 bytes. | |
| 385 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); | |
| 386 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 387 | |
| 388 // Ensure the packet is successfully created. | |
| 389 creator_.Flush(); | |
| 390 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 391 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
| 392 serialized_packet_.packet_number_length); | |
| 393 | |
| 394 // Verify that header in transmitted packet has 4 byte sequence length. | |
| 395 { | |
| 396 InSequence s; | |
| 397 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 398 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 399 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 400 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 401 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) | |
| 402 .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); | |
| 403 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); | |
| 404 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 405 } | |
| 406 ProcessPacket(serialized_packet_); | |
| 407 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
| 408 header.public_header.packet_number_length); | |
| 409 | |
| 410 DeleteSerializedPacket(); | |
| 411 delete ack_frame.ack_frame; | |
| 412 } | |
| 413 | |
| 414 TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacketDoesNothing) { | |
| 415 FLAGS_quic_simple_packet_number_length = true; | |
| 416 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 417 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 418 // Changing the packet number length with queued frames in the creator | |
| 419 // should do nothing. | |
| 420 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 421 QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); | |
| 422 creator_.AddSavedFrame(ack_frame); | |
| 423 | |
| 424 // Now change packet number length and expect a QUIC_BUG and no change in | |
| 425 // packet number length. | |
| 426 EXPECT_DFATAL(creator_.UpdatePacketNumberLength(0, 256), | |
| 427 "Called UpdatePacketNumberLength with 1 queued_frames."); | |
| 428 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 429 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 430 delete ack_frame.ack_frame; | |
| 431 } | |
| 432 | |
| 433 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) { | |
| 434 // If the original packet number length, the current packet number | |
| 435 // length, and the configured send packet number length are different, the | |
| 436 // retransmit must sent with the original length and the others do not change. | |
| 437 if (!FLAGS_quic_simple_packet_number_length) { | |
| 438 QuicPacketCreatorPeer::SetNextPacketNumberLength( | |
| 439 &creator_, PACKET_4BYTE_PACKET_NUMBER); | |
| 440 } | |
| 441 QuicPacketCreatorPeer::SetPacketNumberLength(&creator_, | |
| 442 PACKET_2BYTE_PACKET_NUMBER); | |
| 443 QuicStreamFrame* stream_frame = | |
| 444 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece()); | |
| 445 QuicFrames frames; | |
| 446 frames.push_back(QuicFrame(stream_frame)); | |
| 447 char buffer[kMaxPacketSize]; | |
| 448 PendingRetransmission retransmission(CreateRetransmission( | |
| 449 frames, true /* has_crypto_handshake */, -1 /* needs full padding */, | |
| 450 ENCRYPTION_NONE, PACKET_1BYTE_PACKET_NUMBER)); | |
| 451 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 452 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 453 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
| 454 if (FLAGS_quic_simple_packet_number_length) { | |
| 455 // The packet number length is updated after every packet is sent, | |
| 456 // so there is no need to restore the old length after sending. | |
| 457 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 458 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 459 } else { | |
| 460 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
| 461 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 462 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
| 463 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 464 } | |
| 465 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 466 serialized_packet_.packet_number_length); | |
| 467 | |
| 468 { | |
| 469 InSequence s; | |
| 470 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 471 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 472 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 473 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 474 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 475 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 476 EXPECT_CALL(framer_visitor_, OnPaddingFrame(_)); | |
| 477 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 478 } | |
| 479 ProcessPacket(serialized_packet_); | |
| 480 delete stream_frame; | |
| 481 } | |
| 482 | |
| 483 TEST_P(QuicPacketCreatorTest, ReserializeCryptoFrameWithForwardSecurity) { | |
| 484 QuicStreamFrame* stream_frame = | |
| 485 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece()); | |
| 486 QuicFrames frames; | |
| 487 frames.push_back(QuicFrame(stream_frame)); | |
| 488 creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); | |
| 489 char buffer[kMaxPacketSize]; | |
| 490 PendingRetransmission retransmission(CreateRetransmission( | |
| 491 frames, true /* has_crypto_handshake */, -1 /* needs full padding */, | |
| 492 ENCRYPTION_NONE, | |
| 493 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
| 494 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 495 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 496 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
| 497 EXPECT_EQ(ENCRYPTION_NONE, serialized_packet_.encryption_level); | |
| 498 delete stream_frame; | |
| 499 } | |
| 500 | |
| 501 TEST_P(QuicPacketCreatorTest, ReserializeFrameWithForwardSecurity) { | |
| 502 QuicStreamFrame* stream_frame = | |
| 503 new QuicStreamFrame(0u, /*fin=*/false, 0u, StringPiece()); | |
| 504 QuicFrames frames; | |
| 505 frames.push_back(QuicFrame(stream_frame)); | |
| 506 creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); | |
| 507 char buffer[kMaxPacketSize]; | |
| 508 PendingRetransmission retransmission(CreateRetransmission( | |
| 509 frames, false /* has_crypto_handshake */, 0 /* no padding */, | |
| 510 ENCRYPTION_NONE, | |
| 511 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
| 512 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 513 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 514 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
| 515 EXPECT_EQ(ENCRYPTION_FORWARD_SECURE, serialized_packet_.encryption_level); | |
| 516 delete stream_frame; | |
| 517 } | |
| 518 | |
| 519 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPadding) { | |
| 520 QuicFrame frame; | |
| 521 QuicIOVector io_vector(MakeIOVector("fake handshake message data")); | |
| 522 QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId, | |
| 523 io_vector, 0u, 0u, false, &frame); | |
| 524 QuicFrames frames; | |
| 525 frames.push_back(frame); | |
| 526 char buffer[kMaxPacketSize]; | |
| 527 PendingRetransmission retransmission(CreateRetransmission( | |
| 528 frames, true /* has_crypto_handshake */, -1 /* needs full padding */, | |
| 529 ENCRYPTION_NONE, | |
| 530 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
| 531 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 532 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 533 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
| 534 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); | |
| 535 delete frame.stream_frame; | |
| 536 } | |
| 537 | |
| 538 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSpecifiedPadding) { | |
| 539 QuicFrame frame; | |
| 540 QuicIOVector io_vector(MakeIOVector("fake message data")); | |
| 541 QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId, | |
| 542 io_vector, 0u, 0u, false, &frame); | |
| 543 | |
| 544 const int kNumPaddingBytes1 = 4; | |
| 545 int packet_size = 0; | |
| 546 { | |
| 547 QuicFrames frames; | |
| 548 frames.push_back(frame); | |
| 549 char buffer[kMaxPacketSize]; | |
| 550 PendingRetransmission retransmission(CreateRetransmission( | |
| 551 frames, false /* has_crypto_handshake */, | |
| 552 kNumPaddingBytes1 /* padding bytes */, ENCRYPTION_NONE, | |
| 553 FLAGS_quic_simple_packet_number_length | |
| 554 ? QuicPacketCreatorPeer::GetPacketNumberLength(&creator_) | |
| 555 : QuicPacketCreatorPeer::NextPacketNumberLength(&creator_))); | |
| 556 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 557 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 558 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
| 559 packet_size = serialized_packet_.encrypted_length; | |
| 560 } | |
| 561 | |
| 562 const int kNumPaddingBytes2 = 44; | |
| 563 QuicFrames frames; | |
| 564 frames.push_back(frame); | |
| 565 char buffer[kMaxPacketSize]; | |
| 566 PendingRetransmission retransmission(CreateRetransmission( | |
| 567 frames, false /* has_crypto_handshake */, | |
| 568 kNumPaddingBytes2 /* padding bytes */, ENCRYPTION_NONE, | |
| 569 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
| 570 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 571 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 572 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
| 573 | |
| 574 EXPECT_EQ(packet_size + kNumPaddingBytes2 - kNumPaddingBytes1, | |
| 575 serialized_packet_.encrypted_length); | |
| 576 delete frame.stream_frame; | |
| 577 } | |
| 578 | |
| 579 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) { | |
| 580 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
| 581 GetEncryptionOverhead() + GetStreamFrameOverhead(); | |
| 582 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 583 for (int delta = -5; delta <= 0; ++delta) { | |
| 584 string data(capacity + delta, 'A'); | |
| 585 size_t bytes_free = 0 - delta; | |
| 586 | |
| 587 QuicFrame frame; | |
| 588 QuicIOVector io_vector(MakeIOVector(data)); | |
| 589 UniqueStreamBuffer stream_buffer; | |
| 590 QuicPacketCreatorPeer::CreateStreamFrame( | |
| 591 &creator_, kCryptoStreamId, io_vector, 0, kOffset, false, &frame); | |
| 592 QuicFrames frames; | |
| 593 frames.push_back(frame); | |
| 594 char buffer[kMaxPacketSize]; | |
| 595 PendingRetransmission retransmission(CreateRetransmission( | |
| 596 frames, true /* has_crypto_handshake */, -1 /* needs full padding */, | |
| 597 ENCRYPTION_NONE, | |
| 598 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
| 599 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 600 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 601 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
| 602 | |
| 603 // If there is not enough space in the packet to fit a padding frame | |
| 604 // (1 byte) and to expand the stream frame (another 2 bytes) the packet | |
| 605 // will not be padded. | |
| 606 if (bytes_free < 3) { | |
| 607 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
| 608 serialized_packet_.encrypted_length); | |
| 609 } else { | |
| 610 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); | |
| 611 } | |
| 612 | |
| 613 delete frame.stream_frame; | |
| 614 frames_.clear(); | |
| 615 } | |
| 616 } | |
| 617 | |
| 618 TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) { | |
| 619 QuicConnectionCloseFrame frame; | |
| 620 frame.error_code = QUIC_NO_ERROR; | |
| 621 frame.error_details = "error"; | |
| 622 | |
| 623 QuicFrames frames; | |
| 624 frames.push_back(QuicFrame(&frame)); | |
| 625 SerializedPacket serialized = SerializeAllFrames(frames); | |
| 626 EXPECT_EQ(ENCRYPTION_NONE, serialized.encryption_level); | |
| 627 ASSERT_EQ(1u, serialized.packet_number); | |
| 628 ASSERT_EQ(1u, creator_.packet_number()); | |
| 629 | |
| 630 InSequence s; | |
| 631 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 632 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 633 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 634 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 635 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 636 EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_)); | |
| 637 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 638 | |
| 639 ProcessPacket(serialized); | |
| 640 } | |
| 641 | |
| 642 TEST_P(QuicPacketCreatorTest, ConsumeData) { | |
| 643 QuicFrame frame; | |
| 644 QuicIOVector io_vector(MakeIOVector("test")); | |
| 645 ASSERT_TRUE( | |
| 646 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
| 647 ASSERT_TRUE(frame.stream_frame); | |
| 648 size_t consumed = frame.stream_frame->data_length; | |
| 649 EXPECT_EQ(4u, consumed); | |
| 650 CheckStreamFrame(frame, 1u, "test", 0u, false); | |
| 651 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 652 } | |
| 653 | |
| 654 TEST_P(QuicPacketCreatorTest, ConsumeDataFin) { | |
| 655 QuicFrame frame; | |
| 656 QuicIOVector io_vector(MakeIOVector("test")); | |
| 657 ASSERT_TRUE( | |
| 658 creator_.ConsumeData(1u, io_vector, 0u, 10u, true, false, &frame)); | |
| 659 ASSERT_TRUE(frame.stream_frame); | |
| 660 size_t consumed = frame.stream_frame->data_length; | |
| 661 EXPECT_EQ(4u, consumed); | |
| 662 CheckStreamFrame(frame, 1u, "test", 10u, true); | |
| 663 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 664 } | |
| 665 | |
| 666 TEST_P(QuicPacketCreatorTest, ConsumeDataFinOnly) { | |
| 667 QuicFrame frame; | |
| 668 QuicIOVector io_vector(nullptr, 0, 0); | |
| 669 ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); | |
| 670 ASSERT_TRUE(frame.stream_frame); | |
| 671 size_t consumed = frame.stream_frame->data_length; | |
| 672 EXPECT_EQ(0u, consumed); | |
| 673 CheckStreamFrame(frame, 1u, string(), 0u, true); | |
| 674 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 675 } | |
| 676 | |
| 677 TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) { | |
| 678 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
| 679 GetEncryptionOverhead(); | |
| 680 for (size_t i = overhead; i < overhead + 100; ++i) { | |
| 681 creator_.SetMaxPacketLength(i); | |
| 682 const bool should_have_room = i > overhead + GetStreamFrameOverhead(); | |
| 683 ASSERT_EQ(should_have_room, | |
| 684 creator_.HasRoomForStreamFrame(kClientDataStreamId1, kOffset)); | |
| 685 if (should_have_room) { | |
| 686 QuicFrame frame; | |
| 687 QuicIOVector io_vector(MakeIOVector("testdata")); | |
| 688 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 689 .WillRepeatedly( | |
| 690 Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); | |
| 691 ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, | |
| 692 kOffset, false, false, &frame)); | |
| 693 ASSERT_TRUE(frame.stream_frame); | |
| 694 size_t bytes_consumed = frame.stream_frame->data_length; | |
| 695 EXPECT_LT(0u, bytes_consumed); | |
| 696 creator_.Flush(); | |
| 697 } | |
| 698 } | |
| 699 } | |
| 700 | |
| 701 TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) { | |
| 702 // Compute the total overhead for a single frame in packet. | |
| 703 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
| 704 GetEncryptionOverhead() + GetStreamFrameOverhead(); | |
| 705 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 706 // Now, test various sizes around this size. | |
| 707 for (int delta = -5; delta <= 5; ++delta) { | |
| 708 string data(capacity + delta, 'A'); | |
| 709 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
| 710 QuicFrame frame; | |
| 711 QuicIOVector io_vector(MakeIOVector(data)); | |
| 712 ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, | |
| 713 kOffset, false, false, &frame)); | |
| 714 ASSERT_TRUE(frame.stream_frame); | |
| 715 | |
| 716 // BytesFree() returns bytes available for the next frame, which will | |
| 717 // be two bytes smaller since the stream frame would need to be grown. | |
| 718 EXPECT_EQ(2u, creator_.ExpansionOnNewFrame()); | |
| 719 size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2; | |
| 720 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta; | |
| 721 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 722 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 723 creator_.Flush(); | |
| 724 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 725 DeleteSerializedPacket(); | |
| 726 } | |
| 727 } | |
| 728 | |
| 729 TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) { | |
| 730 // Compute the total overhead for a single frame in packet. | |
| 731 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
| 732 GetEncryptionOverhead() + GetStreamFrameOverhead(); | |
| 733 ASSERT_GT(kMaxPacketSize, overhead); | |
| 734 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 735 // Now, test various sizes around this size. | |
| 736 for (int delta = -5; delta <= 5; ++delta) { | |
| 737 string data(capacity + delta, 'A'); | |
| 738 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
| 739 | |
| 740 QuicFrame frame; | |
| 741 QuicIOVector io_vector(MakeIOVector(data)); | |
| 742 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 743 .WillRepeatedly( | |
| 744 Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 745 ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, kOffset, | |
| 746 false, true, &frame)); | |
| 747 ASSERT_TRUE(frame.stream_frame); | |
| 748 size_t bytes_consumed = frame.stream_frame->data_length; | |
| 749 EXPECT_LT(0u, bytes_consumed); | |
| 750 creator_.Flush(); | |
| 751 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 752 // If there is not enough space in the packet to fit a padding frame | |
| 753 // (1 byte) and to expand the stream frame (another 2 bytes) the packet | |
| 754 // will not be padded. | |
| 755 if (bytes_free < 3) { | |
| 756 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
| 757 serialized_packet_.encrypted_length); | |
| 758 } else { | |
| 759 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); | |
| 760 } | |
| 761 DeleteSerializedPacket(); | |
| 762 } | |
| 763 } | |
| 764 | |
| 765 TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) { | |
| 766 // Compute the total overhead for a single frame in packet. | |
| 767 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
| 768 GetEncryptionOverhead() + GetStreamFrameOverhead(); | |
| 769 ASSERT_GT(kDefaultMaxPacketSize, overhead); | |
| 770 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 771 // Now, test various sizes around this size. | |
| 772 for (int delta = -5; delta <= 5; ++delta) { | |
| 773 string data(capacity + delta, 'A'); | |
| 774 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
| 775 | |
| 776 QuicFrame frame; | |
| 777 QuicIOVector io_vector(MakeIOVector(data)); | |
| 778 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 779 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 780 ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, | |
| 781 kOffset, false, false, &frame)); | |
| 782 ASSERT_TRUE(frame.stream_frame); | |
| 783 size_t bytes_consumed = frame.stream_frame->data_length; | |
| 784 EXPECT_LT(0u, bytes_consumed); | |
| 785 creator_.Flush(); | |
| 786 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 787 if (bytes_free > 0) { | |
| 788 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
| 789 serialized_packet_.encrypted_length); | |
| 790 } else { | |
| 791 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); | |
| 792 } | |
| 793 DeleteSerializedPacket(); | |
| 794 } | |
| 795 } | |
| 796 | |
| 797 TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) { | |
| 798 QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_SERVER); | |
| 799 QuicVersionVector versions; | |
| 800 versions.push_back(test::QuicVersionMax()); | |
| 801 std::unique_ptr<QuicEncryptedPacket> encrypted( | |
| 802 creator_.SerializeVersionNegotiationPacket(versions)); | |
| 803 | |
| 804 { | |
| 805 InSequence s; | |
| 806 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 807 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 808 EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_)); | |
| 809 } | |
| 810 QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_CLIENT); | |
| 811 client_framer_.ProcessPacket(*encrypted); | |
| 812 } | |
| 813 | |
| 814 TEST_P(QuicPacketCreatorTest, UpdatePacketNumberLengthLeastAwaiting_Old) { | |
| 815 FLAGS_quic_simple_packet_number_length = false; | |
| 816 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 817 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 818 | |
| 819 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64); | |
| 820 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 821 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 822 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 823 | |
| 824 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256); | |
| 825 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 826 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
| 827 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 828 | |
| 829 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256); | |
| 830 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 831 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
| 832 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 833 | |
| 834 QuicPacketCreatorPeer::SetPacketNumber(&creator_, | |
| 835 UINT64_C(64) * 256 * 256 * 256 * 256); | |
| 836 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 837 EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, | |
| 838 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 839 } | |
| 840 | |
| 841 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth_old) { | |
| 842 FLAGS_quic_simple_packet_number_length = false; | |
| 843 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 844 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 845 | |
| 846 creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize); | |
| 847 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 848 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 849 | |
| 850 creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); | |
| 851 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
| 852 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 853 | |
| 854 creator_.UpdatePacketNumberLength(1, | |
| 855 10000 * 256 * 256 / kDefaultMaxPacketSize); | |
| 856 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
| 857 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 858 | |
| 859 creator_.UpdatePacketNumberLength( | |
| 860 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); | |
| 861 EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, | |
| 862 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 863 } | |
| 864 | |
| 865 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) { | |
| 866 FLAGS_quic_simple_packet_number_length = true; | |
| 867 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 868 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 869 | |
| 870 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64); | |
| 871 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 872 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 873 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 874 | |
| 875 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256); | |
| 876 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 877 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
| 878 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 879 | |
| 880 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256); | |
| 881 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 882 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
| 883 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 884 | |
| 885 QuicPacketCreatorPeer::SetPacketNumber(&creator_, | |
| 886 UINT64_C(64) * 256 * 256 * 256 * 256); | |
| 887 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 888 EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, | |
| 889 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 890 } | |
| 891 | |
| 892 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthCwnd) { | |
| 893 FLAGS_quic_simple_packet_number_length = true; | |
| 894 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 895 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 896 | |
| 897 creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize); | |
| 898 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 899 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 900 | |
| 901 creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); | |
| 902 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
| 903 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 904 | |
| 905 creator_.UpdatePacketNumberLength(1, | |
| 906 10000 * 256 * 256 / kDefaultMaxPacketSize); | |
| 907 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
| 908 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 909 | |
| 910 creator_.UpdatePacketNumberLength( | |
| 911 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); | |
| 912 EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, | |
| 913 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 914 } | |
| 915 | |
| 916 TEST_P(QuicPacketCreatorTest, SerializeFrame) { | |
| 917 if (!GetParam().version_serialization) { | |
| 918 creator_.StopSendingVersion(); | |
| 919 } | |
| 920 frames_.push_back( | |
| 921 QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); | |
| 922 SerializedPacket serialized = SerializeAllFrames(frames_); | |
| 923 delete frames_[0].stream_frame; | |
| 924 | |
| 925 QuicPacketHeader header; | |
| 926 { | |
| 927 InSequence s; | |
| 928 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 929 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 930 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 931 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 932 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) | |
| 933 .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); | |
| 934 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 935 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 936 } | |
| 937 ProcessPacket(serialized); | |
| 938 EXPECT_EQ(GetParam().version_serialization, | |
| 939 header.public_header.version_flag); | |
| 940 } | |
| 941 | |
| 942 TEST_P(QuicPacketCreatorTest, ConsumeDataLargerThanOneStreamFrame) { | |
| 943 if (!GetParam().version_serialization) { | |
| 944 creator_.StopSendingVersion(); | |
| 945 } | |
| 946 // A string larger than fits into a frame. | |
| 947 size_t payload_length; | |
| 948 creator_.SetMaxPacketLength(GetPacketLengthForOneStream( | |
| 949 client_framer_.version(), | |
| 950 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
| 951 QuicPacketCreatorPeer::SendPathIdInPacket(&creator_), | |
| 952 !kIncludeDiversificationNonce, creator_.connection_id_length(), | |
| 953 PACKET_1BYTE_PACKET_NUMBER, &payload_length)); | |
| 954 QuicFrame frame; | |
| 955 const string too_long_payload(payload_length * 2, 'a'); | |
| 956 QuicIOVector io_vector(MakeIOVector(too_long_payload)); | |
| 957 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 958 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 959 ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); | |
| 960 ASSERT_TRUE(frame.stream_frame); | |
| 961 size_t consumed = frame.stream_frame->data_length; | |
| 962 EXPECT_EQ(payload_length, consumed); | |
| 963 const string payload(payload_length, 'a'); | |
| 964 CheckStreamFrame(frame, 1u, payload, 0u, false); | |
| 965 creator_.Flush(); | |
| 966 DeleteSerializedPacket(); | |
| 967 } | |
| 968 | |
| 969 TEST_P(QuicPacketCreatorTest, AddFrameAndFlush) { | |
| 970 if (!GetParam().version_serialization) { | |
| 971 creator_.StopSendingVersion(); | |
| 972 } | |
| 973 const size_t max_plaintext_size = | |
| 974 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
| 975 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 976 EXPECT_EQ(max_plaintext_size - | |
| 977 GetPacketHeaderSize( | |
| 978 client_framer_.version(), creator_.connection_id_length(), | |
| 979 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
| 980 QuicPacketCreatorPeer::SendPathIdInPacket(&creator_), | |
| 981 !kIncludeDiversificationNonce, PACKET_1BYTE_PACKET_NUMBER), | |
| 982 creator_.BytesFree()); | |
| 983 | |
| 984 // Add a variety of frame types and then a padding frame. | |
| 985 QuicAckFrame ack_frame(MakeAckFrame(0u)); | |
| 986 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
| 987 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 988 | |
| 989 QuicFrame frame; | |
| 990 QuicIOVector io_vector(MakeIOVector("test")); | |
| 991 ASSERT_TRUE( | |
| 992 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
| 993 ASSERT_TRUE(frame.stream_frame); | |
| 994 size_t consumed = frame.stream_frame->data_length; | |
| 995 EXPECT_EQ(4u, consumed); | |
| 996 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 997 | |
| 998 QuicPaddingFrame padding_frame; | |
| 999 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(padding_frame))); | |
| 1000 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1001 EXPECT_EQ(0u, creator_.BytesFree()); | |
| 1002 | |
| 1003 // Packet is full. Creator will flush. | |
| 1004 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 1005 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 1006 EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
| 1007 | |
| 1008 // Ensure the packet is successfully created. | |
| 1009 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 1010 ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty()); | |
| 1011 const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames; | |
| 1012 ASSERT_EQ(1u, retransmittable.size()); | |
| 1013 EXPECT_EQ(STREAM_FRAME, retransmittable[0].type); | |
| 1014 ASSERT_TRUE(retransmittable[0].stream_frame); | |
| 1015 DeleteSerializedPacket(); | |
| 1016 | |
| 1017 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 1018 EXPECT_EQ(max_plaintext_size - | |
| 1019 GetPacketHeaderSize( | |
| 1020 client_framer_.version(), creator_.connection_id_length(), | |
| 1021 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
| 1022 /*include_path_id=*/false, !kIncludeDiversificationNonce, | |
| 1023 PACKET_1BYTE_PACKET_NUMBER), | |
| 1024 creator_.BytesFree()); | |
| 1025 } | |
| 1026 | |
| 1027 TEST_P(QuicPacketCreatorTest, SerializeAndSendStreamFrame) { | |
| 1028 if (!GetParam().version_serialization) { | |
| 1029 creator_.StopSendingVersion(); | |
| 1030 } | |
| 1031 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 1032 | |
| 1033 QuicIOVector iov(MakeIOVector("test")); | |
| 1034 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 1035 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 1036 ALIGNAS(64) char encrypted_buffer[kMaxPacketSize]; | |
| 1037 size_t num_bytes_consumed; | |
| 1038 creator_.CreateAndSerializeStreamFrame(kHeadersStreamId, iov, 0, 0, true, | |
| 1039 nullptr, encrypted_buffer, | |
| 1040 kMaxPacketSize, &num_bytes_consumed); | |
| 1041 EXPECT_EQ(static_cast<size_t>(4), num_bytes_consumed); | |
| 1042 | |
| 1043 // Ensure the packet is successfully created. | |
| 1044 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 1045 ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty()); | |
| 1046 const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames; | |
| 1047 ASSERT_EQ(1u, retransmittable.size()); | |
| 1048 EXPECT_EQ(STREAM_FRAME, retransmittable[0].type); | |
| 1049 ASSERT_TRUE(retransmittable[0].stream_frame); | |
| 1050 DeleteSerializedPacket(); | |
| 1051 | |
| 1052 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 1053 } | |
| 1054 | |
| 1055 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) { | |
| 1056 if (!GetParam().version_serialization) { | |
| 1057 creator_.StopSendingVersion(); | |
| 1058 } | |
| 1059 creator_.SetMaxPacketLength(kMaxPacketSize); | |
| 1060 | |
| 1061 // Serialized length of ack frame with 2000 nack ranges should be limited by | |
| 1062 // the number of nack ranges that can be fit in an ack frame. | |
| 1063 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); | |
| 1064 size_t frame_len = client_framer_.GetSerializedFrameLength( | |
| 1065 QuicFrame(&ack_frame), creator_.BytesFree(), true, true, | |
| 1066 PACKET_1BYTE_PACKET_NUMBER); | |
| 1067 EXPECT_GT(creator_.BytesFree(), frame_len); | |
| 1068 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); | |
| 1069 | |
| 1070 // Add ack frame to creator. | |
| 1071 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
| 1072 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1073 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); | |
| 1074 EXPECT_LT(0u, creator_.BytesFree()); | |
| 1075 | |
| 1076 // Make sure that an additional stream frame can be added to the packet. | |
| 1077 QuicFrame frame; | |
| 1078 QuicIOVector io_vector(MakeIOVector("test")); | |
| 1079 ASSERT_TRUE( | |
| 1080 creator_.ConsumeData(2u, io_vector, 0u, 0u, false, false, &frame)); | |
| 1081 ASSERT_TRUE(frame.stream_frame); | |
| 1082 size_t consumed = frame.stream_frame->data_length; | |
| 1083 EXPECT_EQ(4u, consumed); | |
| 1084 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1085 | |
| 1086 // Ensure the packet is successfully created, and the packet size estimate | |
| 1087 // matches the serialized packet length. | |
| 1088 if (GetParam().version <= QUIC_VERSION_33) { | |
| 1089 EXPECT_CALL(entropy_calculator_, EntropyHash(_)) | |
| 1090 .WillOnce(testing::Return(0)); | |
| 1091 } | |
| 1092 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 1093 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 1094 size_t est_packet_size = creator_.PacketSize(); | |
| 1095 creator_.Flush(); | |
| 1096 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 1097 EXPECT_EQ(est_packet_size, client_framer_.GetMaxPlaintextSize( | |
| 1098 serialized_packet_.encrypted_length)); | |
| 1099 DeleteSerializedPacket(); | |
| 1100 } | |
| 1101 | |
| 1102 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) { | |
| 1103 if (!GetParam().version_serialization) { | |
| 1104 creator_.StopSendingVersion(); | |
| 1105 } | |
| 1106 creator_.SetMaxPacketLength(500u); | |
| 1107 | |
| 1108 const size_t max_plaintext_size = | |
| 1109 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
| 1110 EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree()); | |
| 1111 | |
| 1112 // Serialized length of ack frame with 2000 nack ranges should be limited by | |
| 1113 // the packet size. | |
| 1114 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); | |
| 1115 size_t frame_len = client_framer_.GetSerializedFrameLength( | |
| 1116 QuicFrame(&ack_frame), creator_.BytesFree(), true, true, | |
| 1117 PACKET_1BYTE_PACKET_NUMBER); | |
| 1118 EXPECT_EQ(creator_.BytesFree(), frame_len); | |
| 1119 | |
| 1120 // Add ack frame to creator. | |
| 1121 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
| 1122 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1123 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()), | |
| 1124 creator_.PacketSize()); | |
| 1125 EXPECT_EQ(0u, creator_.BytesFree()); | |
| 1126 | |
| 1127 // Ensure the packet is successfully created, and the packet size estimate | |
| 1128 // may not match the serialized packet length. | |
| 1129 if (GetParam().version <= QUIC_VERSION_33) { | |
| 1130 EXPECT_CALL(entropy_calculator_, EntropyHash(_)).WillOnce(Return(0)); | |
| 1131 } | |
| 1132 size_t est_packet_size = creator_.PacketSize(); | |
| 1133 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 1134 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 1135 creator_.Flush(); | |
| 1136 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
| 1137 EXPECT_GE(est_packet_size, client_framer_.GetMaxPlaintextSize( | |
| 1138 serialized_packet_.encrypted_length)); | |
| 1139 DeleteSerializedPacket(); | |
| 1140 } | |
| 1141 | |
| 1142 TEST_P(QuicPacketCreatorTest, EntropyFlag) { | |
| 1143 frames_.push_back( | |
| 1144 QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); | |
| 1145 | |
| 1146 for (int i = 0; i < 2; ++i) { | |
| 1147 for (int j = 0; j < 64; ++j) { | |
| 1148 SerializedPacket serialized = SerializeAllFrames(frames_); | |
| 1149 // Verify both BoolSource and hash algorithm. | |
| 1150 bool expected_rand_bool = | |
| 1151 (mock_random_.RandUint64() & (UINT64_C(1) << j)) != 0; | |
| 1152 bool observed_rand_bool = | |
| 1153 (serialized.entropy_hash & (1 << ((j + 1) % 8))) != 0; | |
| 1154 uint8_t rest_of_hash = serialized.entropy_hash & ~(1 << ((j + 1) % 8)); | |
| 1155 EXPECT_EQ(expected_rand_bool, observed_rand_bool); | |
| 1156 EXPECT_EQ(0, rest_of_hash); | |
| 1157 } | |
| 1158 // After 64 calls, BoolSource will refresh the bucket - make sure it does. | |
| 1159 mock_random_.ChangeValue(); | |
| 1160 } | |
| 1161 | |
| 1162 delete frames_[0].stream_frame; | |
| 1163 } | |
| 1164 | |
| 1165 TEST_P(QuicPacketCreatorTest, SetCurrentPath) { | |
| 1166 // Current path is the default path. | |
| 1167 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
| 1168 EXPECT_EQ(0u, creator_.packet_number()); | |
| 1169 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 1170 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 1171 // Add a stream frame to the creator. | |
| 1172 QuicFrame frame; | |
| 1173 QuicIOVector io_vector(MakeIOVector("test")); | |
| 1174 ASSERT_TRUE( | |
| 1175 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
| 1176 ASSERT_TRUE(frame.stream_frame); | |
| 1177 size_t consumed = frame.stream_frame->data_length; | |
| 1178 EXPECT_EQ(4u, consumed); | |
| 1179 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1180 EXPECT_EQ(0u, creator_.packet_number()); | |
| 1181 | |
| 1182 // Change current path. | |
| 1183 QuicPathId kPathId1 = 1; | |
| 1184 EXPECT_DFATAL(creator_.SetCurrentPath(kPathId1, 1, 0), | |
| 1185 "Unable to change paths when a packet is under construction"); | |
| 1186 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 1187 .Times(1) | |
| 1188 .WillRepeatedly( | |
| 1189 Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); | |
| 1190 creator_.Flush(); | |
| 1191 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 1192 creator_.SetCurrentPath(kPathId1, 1, 0); | |
| 1193 EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
| 1194 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 1195 EXPECT_EQ(0u, creator_.packet_number()); | |
| 1196 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 1197 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 1198 | |
| 1199 // Change current path back. | |
| 1200 creator_.SetCurrentPath(kDefaultPathId, 2, 1); | |
| 1201 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
| 1202 EXPECT_EQ(1u, creator_.packet_number()); | |
| 1203 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 1204 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 1205 // Add a stream frame to the creator. | |
| 1206 ASSERT_TRUE( | |
| 1207 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
| 1208 ASSERT_TRUE(frame.stream_frame); | |
| 1209 consumed = frame.stream_frame->data_length; | |
| 1210 EXPECT_EQ(4u, consumed); | |
| 1211 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1212 | |
| 1213 // Does not change current path. | |
| 1214 creator_.SetCurrentPath(kDefaultPathId, 2, 0); | |
| 1215 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
| 1216 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1217 EXPECT_EQ(1u, creator_.packet_number()); | |
| 1218 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 1219 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 1220 } | |
| 1221 | |
| 1222 TEST_P(QuicPacketCreatorTest, | |
| 1223 SetCurrentPathAndUpdatePacketSequenceNumberLength) { | |
| 1224 FLAGS_quic_simple_packet_number_length = false; | |
| 1225 // Current path is the default path. | |
| 1226 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
| 1227 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 1228 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 1229 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 1230 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 1231 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 - 2); | |
| 1232 // Add a stream frame to the creator and send the packet. | |
| 1233 QuicFrame frame; | |
| 1234 QuicIOVector io_vector(MakeIOVector("test")); | |
| 1235 ASSERT_TRUE( | |
| 1236 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
| 1237 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 1238 .Times(1) | |
| 1239 .WillRepeatedly( | |
| 1240 Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); | |
| 1241 creator_.Flush(); | |
| 1242 EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number()); | |
| 1243 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 1244 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
| 1245 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 1246 | |
| 1247 // Change current path. | |
| 1248 QuicPathId kPathId1 = 1; | |
| 1249 creator_.SetCurrentPath(kPathId1, 1, 0); | |
| 1250 EXPECT_EQ(0u, creator_.packet_number()); | |
| 1251 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 1252 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 1253 | |
| 1254 // Change current path back. | |
| 1255 creator_.SetCurrentPath(kDefaultPathId, 2, 10000 / kDefaultMaxPacketSize); | |
| 1256 EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number()); | |
| 1257 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
| 1258 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
| 1259 } | |
| 1260 | |
| 1261 TEST_P(QuicPacketCreatorTest, SerializePacketOnDifferentPath) { | |
| 1262 // Current path is the default path. | |
| 1263 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
| 1264 EXPECT_EQ(0u, creator_.packet_number()); | |
| 1265 // Add a stream frame to the creator and flush the packet. | |
| 1266 QuicFrame frame; | |
| 1267 QuicIOVector io_vector(MakeIOVector("test")); | |
| 1268 ASSERT_TRUE( | |
| 1269 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
| 1270 ASSERT_TRUE(frame.stream_frame); | |
| 1271 size_t consumed = frame.stream_frame->data_length; | |
| 1272 EXPECT_EQ(4u, consumed); | |
| 1273 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1274 EXPECT_EQ(0u, creator_.packet_number()); | |
| 1275 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
| 1276 .WillRepeatedly( | |
| 1277 Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
| 1278 creator_.Flush(); | |
| 1279 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 1280 EXPECT_EQ(1u, creator_.packet_number()); | |
| 1281 // Verify serialized data packet's path id. | |
| 1282 EXPECT_EQ(kDefaultPathId, serialized_packet_.path_id); | |
| 1283 DeleteSerializedPacket(); | |
| 1284 | |
| 1285 // Change to path 1. | |
| 1286 QuicPathId kPathId1 = 1; | |
| 1287 creator_.SetCurrentPath(kPathId1, 1, 0); | |
| 1288 EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
| 1289 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 1290 EXPECT_EQ(0u, creator_.packet_number()); | |
| 1291 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
| 1292 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
| 1293 | |
| 1294 // Add a stream frame to the creator and flush the packet. | |
| 1295 ASSERT_TRUE( | |
| 1296 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
| 1297 ASSERT_TRUE(frame.stream_frame); | |
| 1298 consumed = frame.stream_frame->data_length; | |
| 1299 EXPECT_EQ(4u, consumed); | |
| 1300 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1301 creator_.Flush(); | |
| 1302 // Verify serialized data packet's path id. | |
| 1303 EXPECT_EQ(kPathId1, serialized_packet_.path_id); | |
| 1304 DeleteSerializedPacket(); | |
| 1305 } | |
| 1306 | |
| 1307 TEST_P(QuicPacketCreatorTest, AddUnencryptedStreamDataClosesConnection) { | |
| 1308 FLAGS_quic_never_write_unencrypted_data = true; | |
| 1309 EXPECT_CALL(delegate_, OnUnrecoverableError(_, _, _)); | |
| 1310 QuicStreamFrame stream_frame(kHeadersStreamId, /*fin=*/false, 0u, | |
| 1311 StringPiece()); | |
| 1312 EXPECT_DFATAL(creator_.AddSavedFrame(QuicFrame(&stream_frame)), | |
| 1313 "Cannot send stream data without encryption."); | |
| 1314 } | |
| 1315 | |
| 1316 TEST_P(QuicPacketCreatorTest, ChloTooLarge) { | |
| 1317 CryptoHandshakeMessage message; | |
| 1318 message.set_tag(kCHLO); | |
| 1319 message.set_minimum_size(kMaxPacketSize); | |
| 1320 CryptoFramer framer; | |
| 1321 std::unique_ptr<QuicData> message_data; | |
| 1322 message_data.reset(framer.ConstructHandshakeMessage(message)); | |
| 1323 | |
| 1324 struct iovec iov; | |
| 1325 QuicIOVector data_iovec(::net::MakeIOVector( | |
| 1326 StringPiece(message_data->data(), message_data->length()), &iov)); | |
| 1327 QuicFrame frame; | |
| 1328 EXPECT_CALL(delegate_, | |
| 1329 OnUnrecoverableError(QUIC_CRYPTO_CHLO_TOO_LARGE, _, _)); | |
| 1330 EXPECT_DFATAL( | |
| 1331 creator_.ConsumeData(1u, data_iovec, 0u, 0u, false, false, &frame), | |
| 1332 "Client hello won't fit in a single packet."); | |
| 1333 } | |
| 1334 | |
| 1335 } // namespace | |
| 1336 } // namespace test | |
| 1337 } // namespace net | |
| OLD | NEW |