OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/quic/quic_packet_creator.h" | |
6 | |
7 #include <cstdint> | |
8 #include <memory> | |
9 #include <string> | |
10 | |
11 #include "base/macros.h" | |
12 #include "base/stl_util.h" | |
13 #include "net/quic/crypto/null_encrypter.h" | |
14 #include "net/quic/crypto/quic_decrypter.h" | |
15 #include "net/quic/crypto/quic_encrypter.h" | |
16 #include "net/quic/quic_flags.h" | |
17 #include "net/quic/quic_simple_buffer_allocator.h" | |
18 #include "net/quic/quic_utils.h" | |
19 #include "net/quic/test_tools/mock_random.h" | |
20 #include "net/quic/test_tools/quic_framer_peer.h" | |
21 #include "net/quic/test_tools/quic_packet_creator_peer.h" | |
22 #include "net/quic/test_tools/quic_test_utils.h" | |
23 #include "net/test/gtest_util.h" | |
24 #include "testing/gmock/include/gmock/gmock.h" | |
25 | |
26 using base::StringPiece; | |
27 using std::ostream; | |
28 using std::string; | |
29 using std::vector; | |
30 using testing::DoAll; | |
31 using testing::InSequence; | |
32 using testing::Return; | |
33 using testing::SaveArg; | |
34 using testing::StrictMock; | |
35 using testing::_; | |
36 | |
37 namespace net { | |
38 namespace test { | |
39 namespace { | |
40 | |
41 // Run tests with combinations of {QuicVersion, ToggleVersionSerialization}. | |
42 struct TestParams { | |
43 TestParams(QuicVersion version, | |
44 bool version_serialization, | |
45 QuicConnectionIdLength length) | |
46 : version(version), | |
47 connection_id_length(length), | |
48 version_serialization(version_serialization) {} | |
49 | |
50 friend ostream& operator<<(ostream& os, const TestParams& p) { | |
51 os << "{ client_version: " << QuicVersionToString(p.version) | |
52 << " connection id length: " << p.connection_id_length | |
53 << " include version: " << p.version_serialization << " }"; | |
54 return os; | |
55 } | |
56 | |
57 QuicVersion version; | |
58 QuicConnectionIdLength connection_id_length; | |
59 bool version_serialization; | |
60 }; | |
61 | |
62 // Constructs various test permutations. | |
63 vector<TestParams> GetTestParams() { | |
64 vector<TestParams> params; | |
65 constexpr QuicConnectionIdLength kMax = PACKET_8BYTE_CONNECTION_ID; | |
66 QuicVersionVector all_supported_versions = QuicSupportedVersions(); | |
67 for (size_t i = 0; i < all_supported_versions.size(); ++i) { | |
68 params.push_back(TestParams(all_supported_versions[i], true, kMax)); | |
69 params.push_back(TestParams(all_supported_versions[i], false, kMax)); | |
70 } | |
71 params.push_back( | |
72 TestParams(all_supported_versions[0], true, PACKET_0BYTE_CONNECTION_ID)); | |
73 params.push_back(TestParams(all_supported_versions[0], true, kMax)); | |
74 return params; | |
75 } | |
76 | |
77 class MockDelegate : public QuicPacketCreator::DelegateInterface { | |
78 public: | |
79 MockDelegate() {} | |
80 ~MockDelegate() override {} | |
81 | |
82 MOCK_METHOD1(OnSerializedPacket, void(SerializedPacket* packet)); | |
83 MOCK_METHOD3(OnUnrecoverableError, | |
84 void(QuicErrorCode, | |
85 const string&, | |
86 ConnectionCloseSource source)); | |
87 | |
88 private: | |
89 DISALLOW_COPY_AND_ASSIGN(MockDelegate); | |
90 }; | |
91 | |
92 class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> { | |
93 public: | |
94 void ClearSerializedPacket(SerializedPacket* serialized_packet) { | |
95 if (serialized_packet == nullptr) { | |
96 return; | |
97 } | |
98 QuicUtils::ClearSerializedPacket(serialized_packet); | |
99 } | |
100 | |
101 void SaveSerializedPacket(SerializedPacket* serialized_packet) { | |
102 if (serialized_packet == nullptr) { | |
103 return; | |
104 } | |
105 delete[] serialized_packet_.encrypted_buffer; | |
106 serialized_packet_ = *serialized_packet; | |
107 serialized_packet_.encrypted_buffer = | |
108 QuicUtils::CopyBuffer(*serialized_packet); | |
109 serialized_packet->retransmittable_frames.clear(); | |
110 } | |
111 | |
112 void DeleteSerializedPacket() { | |
113 delete[] serialized_packet_.encrypted_buffer; | |
114 serialized_packet_.encrypted_buffer = nullptr; | |
115 ClearSerializedPacket(&serialized_packet_); | |
116 } | |
117 | |
118 protected: | |
119 QuicPacketCreatorTest() | |
120 : server_framer_(SupportedVersions(GetParam().version), | |
121 QuicTime::Zero(), | |
122 Perspective::IS_SERVER), | |
123 client_framer_(SupportedVersions(GetParam().version), | |
124 QuicTime::Zero(), | |
125 Perspective::IS_CLIENT), | |
126 connection_id_(2), | |
127 data_("foo"), | |
128 creator_(connection_id_, | |
129 &client_framer_, | |
130 &mock_random_, | |
131 &buffer_allocator_, | |
132 &delegate_), | |
133 serialized_packet_(creator_.NoPacket()) { | |
134 FLAGS_quic_always_log_bugs_for_tests = true; | |
135 creator_.set_connection_id_length(GetParam().connection_id_length); | |
136 | |
137 creator_.SetEncrypter(ENCRYPTION_INITIAL, new NullEncrypter()); | |
138 creator_.SetEncrypter(ENCRYPTION_FORWARD_SECURE, new NullEncrypter()); | |
139 client_framer_.set_visitor(&framer_visitor_); | |
140 client_framer_.set_received_entropy_calculator(&entropy_calculator_); | |
141 server_framer_.set_visitor(&framer_visitor_); | |
142 // TODO(ianswett): Fix this test so it uses a non-null encrypter. | |
143 FLAGS_quic_never_write_unencrypted_data = false; | |
144 } | |
145 | |
146 ~QuicPacketCreatorTest() override { | |
147 delete[] serialized_packet_.encrypted_buffer; | |
148 ClearSerializedPacket(&serialized_packet_); | |
149 } | |
150 | |
151 SerializedPacket SerializeAllFrames(const QuicFrames& frames) { | |
152 SerializedPacket packet = QuicPacketCreatorPeer::SerializeAllFrames( | |
153 &creator_, frames, buffer_, kMaxPacketSize); | |
154 EXPECT_EQ(QuicPacketCreatorPeer::GetEncryptionLevel(&creator_), | |
155 packet.encryption_level); | |
156 return packet; | |
157 } | |
158 | |
159 void ProcessPacket(const SerializedPacket& packet) { | |
160 QuicEncryptedPacket encrypted_packet(packet.encrypted_buffer, | |
161 packet.encrypted_length); | |
162 server_framer_.ProcessPacket(encrypted_packet); | |
163 } | |
164 | |
165 void CheckStreamFrame(const QuicFrame& frame, | |
166 QuicStreamId stream_id, | |
167 const string& data, | |
168 QuicStreamOffset offset, | |
169 bool fin) { | |
170 EXPECT_EQ(STREAM_FRAME, frame.type); | |
171 ASSERT_TRUE(frame.stream_frame); | |
172 EXPECT_EQ(stream_id, frame.stream_frame->stream_id); | |
173 EXPECT_EQ(data, StringPiece(frame.stream_frame->data_buffer, | |
174 frame.stream_frame->data_length)); | |
175 EXPECT_EQ(offset, frame.stream_frame->offset); | |
176 EXPECT_EQ(fin, frame.stream_frame->fin); | |
177 } | |
178 | |
179 // Returns the number of bytes consumed by the header of packet, including | |
180 // the version. | |
181 size_t GetPacketHeaderOverhead(QuicVersion version) { | |
182 if (FLAGS_quic_simple_packet_number_length) { | |
183 return GetPacketHeaderSize( | |
184 version, creator_.connection_id_length(), kIncludeVersion, | |
185 !kIncludePathId, !kIncludeDiversificationNonce, | |
186 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
187 } else { | |
188 return GetPacketHeaderSize( | |
189 version, creator_.connection_id_length(), kIncludeVersion, | |
190 !kIncludePathId, !kIncludeDiversificationNonce, | |
191 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
192 } | |
193 } | |
194 | |
195 // Returns the number of bytes of overhead that will be added to a packet | |
196 // of maximum length. | |
197 size_t GetEncryptionOverhead() { | |
198 return creator_.max_packet_length() - | |
199 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
200 } | |
201 | |
202 // Returns the number of bytes consumed by the non-data fields of a stream | |
203 // frame, assuming it is the last frame in the packet | |
204 size_t GetStreamFrameOverhead() { | |
205 return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset, | |
206 true); | |
207 } | |
208 | |
209 QuicIOVector MakeIOVector(StringPiece s) { | |
210 return ::net::MakeIOVector(s, &iov_); | |
211 } | |
212 | |
213 PendingRetransmission CreateRetransmission( | |
214 const QuicFrames& retransmittable_frames, | |
215 bool has_crypto_handshake, | |
216 int num_padding_bytes, | |
217 EncryptionLevel encryption_level, | |
218 QuicPacketNumberLength packet_number_length) { | |
219 return PendingRetransmission(1u, 1u, NOT_RETRANSMISSION, | |
220 retransmittable_frames, has_crypto_handshake, | |
221 num_padding_bytes, encryption_level, | |
222 packet_number_length); | |
223 } | |
224 | |
225 static const QuicStreamOffset kOffset = 1u; | |
226 | |
227 char buffer_[kMaxPacketSize]; | |
228 QuicFrames frames_; | |
229 QuicFramer server_framer_; | |
230 QuicFramer client_framer_; | |
231 StrictMock<MockFramerVisitor> framer_visitor_; | |
232 StrictMock<MockDelegate> delegate_; | |
233 QuicConnectionId connection_id_; | |
234 string data_; | |
235 struct iovec iov_; | |
236 MockRandom mock_random_; | |
237 SimpleBufferAllocator buffer_allocator_; | |
238 QuicPacketCreator creator_; | |
239 MockEntropyCalculator entropy_calculator_; | |
240 SerializedPacket serialized_packet_; | |
241 }; | |
242 | |
243 // Run all packet creator tests with all supported versions of QUIC, and with | |
244 // and without version in the packet header, as well as doing a run for each | |
245 // length of truncated connection id. | |
246 INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests, | |
247 QuicPacketCreatorTest, | |
248 ::testing::ValuesIn(GetTestParams())); | |
249 | |
250 TEST_P(QuicPacketCreatorTest, SerializeFrames) { | |
251 for (int i = ENCRYPTION_NONE; i < NUM_ENCRYPTION_LEVELS; ++i) { | |
252 EncryptionLevel level = static_cast<EncryptionLevel>(i); | |
253 creator_.set_encryption_level(level); | |
254 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
255 frames_.push_back( | |
256 QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); | |
257 frames_.push_back( | |
258 QuicFrame(new QuicStreamFrame(0u, true, 0u, StringPiece()))); | |
259 SerializedPacket serialized = SerializeAllFrames(frames_); | |
260 EXPECT_EQ(level, serialized.encryption_level); | |
261 delete frames_[0].ack_frame; | |
262 delete frames_[1].stream_frame; | |
263 delete frames_[2].stream_frame; | |
264 frames_.clear(); | |
265 | |
266 { | |
267 InSequence s; | |
268 EXPECT_CALL(framer_visitor_, OnPacket()); | |
269 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
270 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
271 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
272 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
273 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
274 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
275 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
276 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
277 } | |
278 ProcessPacket(serialized); | |
279 } | |
280 } | |
281 | |
282 TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) { | |
283 FLAGS_quic_simple_packet_number_length = false; | |
284 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
285 creator_.AddSavedFrame(frames_[0]); | |
286 QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, | |
287 PACKET_4BYTE_PACKET_NUMBER); | |
288 | |
289 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
290 .WillRepeatedly( | |
291 Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
292 creator_.Flush(); | |
293 // The packet number length will not change mid-packet. | |
294 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
295 serialized_packet_.packet_number_length); | |
296 | |
297 { | |
298 InSequence s; | |
299 EXPECT_CALL(framer_visitor_, OnPacket()); | |
300 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
301 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
302 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
303 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
304 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
305 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
306 } | |
307 ProcessPacket(serialized_packet_); | |
308 DeleteSerializedPacket(); | |
309 | |
310 creator_.AddSavedFrame(frames_[0]); | |
311 creator_.Flush(); | |
312 // Now the actual packet number length should have changed. | |
313 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
314 serialized_packet_.packet_number_length); | |
315 delete frames_[0].ack_frame; | |
316 | |
317 { | |
318 InSequence s; | |
319 EXPECT_CALL(framer_visitor_, OnPacket()); | |
320 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
321 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
322 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
323 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
324 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
325 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
326 } | |
327 ProcessPacket(serialized_packet_); | |
328 DeleteSerializedPacket(); | |
329 } | |
330 | |
331 TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) { | |
332 FLAGS_quic_simple_packet_number_length = false; | |
333 // Changing the packet number length with queued frames in the creator | |
334 // should hold the change until after any currently queued frames are | |
335 // serialized. | |
336 | |
337 // Packet 1. | |
338 // Queue a frame in the creator. | |
339 EXPECT_FALSE(creator_.HasPendingFrames()); | |
340 QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); | |
341 creator_.AddSavedFrame(ack_frame); | |
342 | |
343 // Now change packet number length. | |
344 QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, | |
345 PACKET_4BYTE_PACKET_NUMBER); | |
346 | |
347 // Add a STOP_WAITING frame since it contains a packet number, | |
348 // whose length should be 1. | |
349 QuicStopWaitingFrame stop_waiting_frame; | |
350 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); | |
351 EXPECT_TRUE(creator_.HasPendingFrames()); | |
352 | |
353 // Ensure the packet is successfully created. | |
354 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
355 .WillRepeatedly( | |
356 Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
357 creator_.Flush(); | |
358 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
359 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
360 serialized_packet_.packet_number_length); | |
361 | |
362 // Verify that header in transmitted packet has 1 byte sequence length. | |
363 QuicPacketHeader header; | |
364 { | |
365 InSequence s; | |
366 EXPECT_CALL(framer_visitor_, OnPacket()); | |
367 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
368 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
369 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
370 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) | |
371 .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); | |
372 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
373 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); | |
374 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
375 } | |
376 ProcessPacket(serialized_packet_); | |
377 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
378 header.public_header.packet_number_length); | |
379 DeleteSerializedPacket(); | |
380 | |
381 // Packet 2. | |
382 EXPECT_FALSE(creator_.HasPendingFrames()); | |
383 // Generate Packet 2 with one frame -- packet number length should now | |
384 // change to 4 bytes. | |
385 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); | |
386 EXPECT_TRUE(creator_.HasPendingFrames()); | |
387 | |
388 // Ensure the packet is successfully created. | |
389 creator_.Flush(); | |
390 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
391 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
392 serialized_packet_.packet_number_length); | |
393 | |
394 // Verify that header in transmitted packet has 4 byte sequence length. | |
395 { | |
396 InSequence s; | |
397 EXPECT_CALL(framer_visitor_, OnPacket()); | |
398 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
399 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
400 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
401 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) | |
402 .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); | |
403 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); | |
404 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
405 } | |
406 ProcessPacket(serialized_packet_); | |
407 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
408 header.public_header.packet_number_length); | |
409 | |
410 DeleteSerializedPacket(); | |
411 delete ack_frame.ack_frame; | |
412 } | |
413 | |
414 TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacketDoesNothing) { | |
415 FLAGS_quic_simple_packet_number_length = true; | |
416 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
417 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
418 // Changing the packet number length with queued frames in the creator | |
419 // should do nothing. | |
420 EXPECT_FALSE(creator_.HasPendingFrames()); | |
421 QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); | |
422 creator_.AddSavedFrame(ack_frame); | |
423 | |
424 // Now change packet number length and expect a QUIC_BUG and no change in | |
425 // packet number length. | |
426 EXPECT_DFATAL(creator_.UpdatePacketNumberLength(0, 256), | |
427 "Called UpdatePacketNumberLength with 1 queued_frames."); | |
428 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
429 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
430 delete ack_frame.ack_frame; | |
431 } | |
432 | |
433 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) { | |
434 // If the original packet number length, the current packet number | |
435 // length, and the configured send packet number length are different, the | |
436 // retransmit must sent with the original length and the others do not change. | |
437 if (!FLAGS_quic_simple_packet_number_length) { | |
438 QuicPacketCreatorPeer::SetNextPacketNumberLength( | |
439 &creator_, PACKET_4BYTE_PACKET_NUMBER); | |
440 } | |
441 QuicPacketCreatorPeer::SetPacketNumberLength(&creator_, | |
442 PACKET_2BYTE_PACKET_NUMBER); | |
443 QuicStreamFrame* stream_frame = | |
444 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece()); | |
445 QuicFrames frames; | |
446 frames.push_back(QuicFrame(stream_frame)); | |
447 char buffer[kMaxPacketSize]; | |
448 PendingRetransmission retransmission(CreateRetransmission( | |
449 frames, true /* has_crypto_handshake */, -1 /* needs full padding */, | |
450 ENCRYPTION_NONE, PACKET_1BYTE_PACKET_NUMBER)); | |
451 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
452 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
453 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
454 if (FLAGS_quic_simple_packet_number_length) { | |
455 // The packet number length is updated after every packet is sent, | |
456 // so there is no need to restore the old length after sending. | |
457 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
458 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
459 } else { | |
460 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
461 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
462 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
463 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
464 } | |
465 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
466 serialized_packet_.packet_number_length); | |
467 | |
468 { | |
469 InSequence s; | |
470 EXPECT_CALL(framer_visitor_, OnPacket()); | |
471 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
472 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
473 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
474 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
475 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
476 EXPECT_CALL(framer_visitor_, OnPaddingFrame(_)); | |
477 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
478 } | |
479 ProcessPacket(serialized_packet_); | |
480 delete stream_frame; | |
481 } | |
482 | |
483 TEST_P(QuicPacketCreatorTest, ReserializeCryptoFrameWithForwardSecurity) { | |
484 QuicStreamFrame* stream_frame = | |
485 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece()); | |
486 QuicFrames frames; | |
487 frames.push_back(QuicFrame(stream_frame)); | |
488 creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); | |
489 char buffer[kMaxPacketSize]; | |
490 PendingRetransmission retransmission(CreateRetransmission( | |
491 frames, true /* has_crypto_handshake */, -1 /* needs full padding */, | |
492 ENCRYPTION_NONE, | |
493 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
494 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
495 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
496 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
497 EXPECT_EQ(ENCRYPTION_NONE, serialized_packet_.encryption_level); | |
498 delete stream_frame; | |
499 } | |
500 | |
501 TEST_P(QuicPacketCreatorTest, ReserializeFrameWithForwardSecurity) { | |
502 QuicStreamFrame* stream_frame = | |
503 new QuicStreamFrame(0u, /*fin=*/false, 0u, StringPiece()); | |
504 QuicFrames frames; | |
505 frames.push_back(QuicFrame(stream_frame)); | |
506 creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); | |
507 char buffer[kMaxPacketSize]; | |
508 PendingRetransmission retransmission(CreateRetransmission( | |
509 frames, false /* has_crypto_handshake */, 0 /* no padding */, | |
510 ENCRYPTION_NONE, | |
511 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
512 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
513 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
514 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
515 EXPECT_EQ(ENCRYPTION_FORWARD_SECURE, serialized_packet_.encryption_level); | |
516 delete stream_frame; | |
517 } | |
518 | |
519 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPadding) { | |
520 QuicFrame frame; | |
521 QuicIOVector io_vector(MakeIOVector("fake handshake message data")); | |
522 QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId, | |
523 io_vector, 0u, 0u, false, &frame); | |
524 QuicFrames frames; | |
525 frames.push_back(frame); | |
526 char buffer[kMaxPacketSize]; | |
527 PendingRetransmission retransmission(CreateRetransmission( | |
528 frames, true /* has_crypto_handshake */, -1 /* needs full padding */, | |
529 ENCRYPTION_NONE, | |
530 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
531 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
532 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
533 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
534 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); | |
535 delete frame.stream_frame; | |
536 } | |
537 | |
538 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSpecifiedPadding) { | |
539 QuicFrame frame; | |
540 QuicIOVector io_vector(MakeIOVector("fake message data")); | |
541 QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId, | |
542 io_vector, 0u, 0u, false, &frame); | |
543 | |
544 const int kNumPaddingBytes1 = 4; | |
545 int packet_size = 0; | |
546 { | |
547 QuicFrames frames; | |
548 frames.push_back(frame); | |
549 char buffer[kMaxPacketSize]; | |
550 PendingRetransmission retransmission(CreateRetransmission( | |
551 frames, false /* has_crypto_handshake */, | |
552 kNumPaddingBytes1 /* padding bytes */, ENCRYPTION_NONE, | |
553 FLAGS_quic_simple_packet_number_length | |
554 ? QuicPacketCreatorPeer::GetPacketNumberLength(&creator_) | |
555 : QuicPacketCreatorPeer::NextPacketNumberLength(&creator_))); | |
556 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
557 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
558 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
559 packet_size = serialized_packet_.encrypted_length; | |
560 } | |
561 | |
562 const int kNumPaddingBytes2 = 44; | |
563 QuicFrames frames; | |
564 frames.push_back(frame); | |
565 char buffer[kMaxPacketSize]; | |
566 PendingRetransmission retransmission(CreateRetransmission( | |
567 frames, false /* has_crypto_handshake */, | |
568 kNumPaddingBytes2 /* padding bytes */, ENCRYPTION_NONE, | |
569 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
570 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
571 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
572 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
573 | |
574 EXPECT_EQ(packet_size + kNumPaddingBytes2 - kNumPaddingBytes1, | |
575 serialized_packet_.encrypted_length); | |
576 delete frame.stream_frame; | |
577 } | |
578 | |
579 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) { | |
580 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
581 GetEncryptionOverhead() + GetStreamFrameOverhead(); | |
582 size_t capacity = kDefaultMaxPacketSize - overhead; | |
583 for (int delta = -5; delta <= 0; ++delta) { | |
584 string data(capacity + delta, 'A'); | |
585 size_t bytes_free = 0 - delta; | |
586 | |
587 QuicFrame frame; | |
588 QuicIOVector io_vector(MakeIOVector(data)); | |
589 UniqueStreamBuffer stream_buffer; | |
590 QuicPacketCreatorPeer::CreateStreamFrame( | |
591 &creator_, kCryptoStreamId, io_vector, 0, kOffset, false, &frame); | |
592 QuicFrames frames; | |
593 frames.push_back(frame); | |
594 char buffer[kMaxPacketSize]; | |
595 PendingRetransmission retransmission(CreateRetransmission( | |
596 frames, true /* has_crypto_handshake */, -1 /* needs full padding */, | |
597 ENCRYPTION_NONE, | |
598 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); | |
599 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
600 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
601 creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); | |
602 | |
603 // If there is not enough space in the packet to fit a padding frame | |
604 // (1 byte) and to expand the stream frame (another 2 bytes) the packet | |
605 // will not be padded. | |
606 if (bytes_free < 3) { | |
607 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
608 serialized_packet_.encrypted_length); | |
609 } else { | |
610 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); | |
611 } | |
612 | |
613 delete frame.stream_frame; | |
614 frames_.clear(); | |
615 } | |
616 } | |
617 | |
618 TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) { | |
619 QuicConnectionCloseFrame frame; | |
620 frame.error_code = QUIC_NO_ERROR; | |
621 frame.error_details = "error"; | |
622 | |
623 QuicFrames frames; | |
624 frames.push_back(QuicFrame(&frame)); | |
625 SerializedPacket serialized = SerializeAllFrames(frames); | |
626 EXPECT_EQ(ENCRYPTION_NONE, serialized.encryption_level); | |
627 ASSERT_EQ(1u, serialized.packet_number); | |
628 ASSERT_EQ(1u, creator_.packet_number()); | |
629 | |
630 InSequence s; | |
631 EXPECT_CALL(framer_visitor_, OnPacket()); | |
632 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
633 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
634 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
635 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
636 EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_)); | |
637 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
638 | |
639 ProcessPacket(serialized); | |
640 } | |
641 | |
642 TEST_P(QuicPacketCreatorTest, ConsumeData) { | |
643 QuicFrame frame; | |
644 QuicIOVector io_vector(MakeIOVector("test")); | |
645 ASSERT_TRUE( | |
646 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
647 ASSERT_TRUE(frame.stream_frame); | |
648 size_t consumed = frame.stream_frame->data_length; | |
649 EXPECT_EQ(4u, consumed); | |
650 CheckStreamFrame(frame, 1u, "test", 0u, false); | |
651 EXPECT_TRUE(creator_.HasPendingFrames()); | |
652 } | |
653 | |
654 TEST_P(QuicPacketCreatorTest, ConsumeDataFin) { | |
655 QuicFrame frame; | |
656 QuicIOVector io_vector(MakeIOVector("test")); | |
657 ASSERT_TRUE( | |
658 creator_.ConsumeData(1u, io_vector, 0u, 10u, true, false, &frame)); | |
659 ASSERT_TRUE(frame.stream_frame); | |
660 size_t consumed = frame.stream_frame->data_length; | |
661 EXPECT_EQ(4u, consumed); | |
662 CheckStreamFrame(frame, 1u, "test", 10u, true); | |
663 EXPECT_TRUE(creator_.HasPendingFrames()); | |
664 } | |
665 | |
666 TEST_P(QuicPacketCreatorTest, ConsumeDataFinOnly) { | |
667 QuicFrame frame; | |
668 QuicIOVector io_vector(nullptr, 0, 0); | |
669 ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); | |
670 ASSERT_TRUE(frame.stream_frame); | |
671 size_t consumed = frame.stream_frame->data_length; | |
672 EXPECT_EQ(0u, consumed); | |
673 CheckStreamFrame(frame, 1u, string(), 0u, true); | |
674 EXPECT_TRUE(creator_.HasPendingFrames()); | |
675 } | |
676 | |
677 TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) { | |
678 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
679 GetEncryptionOverhead(); | |
680 for (size_t i = overhead; i < overhead + 100; ++i) { | |
681 creator_.SetMaxPacketLength(i); | |
682 const bool should_have_room = i > overhead + GetStreamFrameOverhead(); | |
683 ASSERT_EQ(should_have_room, | |
684 creator_.HasRoomForStreamFrame(kClientDataStreamId1, kOffset)); | |
685 if (should_have_room) { | |
686 QuicFrame frame; | |
687 QuicIOVector io_vector(MakeIOVector("testdata")); | |
688 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
689 .WillRepeatedly( | |
690 Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); | |
691 ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, | |
692 kOffset, false, false, &frame)); | |
693 ASSERT_TRUE(frame.stream_frame); | |
694 size_t bytes_consumed = frame.stream_frame->data_length; | |
695 EXPECT_LT(0u, bytes_consumed); | |
696 creator_.Flush(); | |
697 } | |
698 } | |
699 } | |
700 | |
701 TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) { | |
702 // Compute the total overhead for a single frame in packet. | |
703 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
704 GetEncryptionOverhead() + GetStreamFrameOverhead(); | |
705 size_t capacity = kDefaultMaxPacketSize - overhead; | |
706 // Now, test various sizes around this size. | |
707 for (int delta = -5; delta <= 5; ++delta) { | |
708 string data(capacity + delta, 'A'); | |
709 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
710 QuicFrame frame; | |
711 QuicIOVector io_vector(MakeIOVector(data)); | |
712 ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, | |
713 kOffset, false, false, &frame)); | |
714 ASSERT_TRUE(frame.stream_frame); | |
715 | |
716 // BytesFree() returns bytes available for the next frame, which will | |
717 // be two bytes smaller since the stream frame would need to be grown. | |
718 EXPECT_EQ(2u, creator_.ExpansionOnNewFrame()); | |
719 size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2; | |
720 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta; | |
721 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
722 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
723 creator_.Flush(); | |
724 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
725 DeleteSerializedPacket(); | |
726 } | |
727 } | |
728 | |
729 TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) { | |
730 // Compute the total overhead for a single frame in packet. | |
731 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
732 GetEncryptionOverhead() + GetStreamFrameOverhead(); | |
733 ASSERT_GT(kMaxPacketSize, overhead); | |
734 size_t capacity = kDefaultMaxPacketSize - overhead; | |
735 // Now, test various sizes around this size. | |
736 for (int delta = -5; delta <= 5; ++delta) { | |
737 string data(capacity + delta, 'A'); | |
738 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
739 | |
740 QuicFrame frame; | |
741 QuicIOVector io_vector(MakeIOVector(data)); | |
742 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
743 .WillRepeatedly( | |
744 Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
745 ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, kOffset, | |
746 false, true, &frame)); | |
747 ASSERT_TRUE(frame.stream_frame); | |
748 size_t bytes_consumed = frame.stream_frame->data_length; | |
749 EXPECT_LT(0u, bytes_consumed); | |
750 creator_.Flush(); | |
751 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
752 // If there is not enough space in the packet to fit a padding frame | |
753 // (1 byte) and to expand the stream frame (another 2 bytes) the packet | |
754 // will not be padded. | |
755 if (bytes_free < 3) { | |
756 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
757 serialized_packet_.encrypted_length); | |
758 } else { | |
759 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); | |
760 } | |
761 DeleteSerializedPacket(); | |
762 } | |
763 } | |
764 | |
765 TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) { | |
766 // Compute the total overhead for a single frame in packet. | |
767 const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + | |
768 GetEncryptionOverhead() + GetStreamFrameOverhead(); | |
769 ASSERT_GT(kDefaultMaxPacketSize, overhead); | |
770 size_t capacity = kDefaultMaxPacketSize - overhead; | |
771 // Now, test various sizes around this size. | |
772 for (int delta = -5; delta <= 5; ++delta) { | |
773 string data(capacity + delta, 'A'); | |
774 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
775 | |
776 QuicFrame frame; | |
777 QuicIOVector io_vector(MakeIOVector(data)); | |
778 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
779 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
780 ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, | |
781 kOffset, false, false, &frame)); | |
782 ASSERT_TRUE(frame.stream_frame); | |
783 size_t bytes_consumed = frame.stream_frame->data_length; | |
784 EXPECT_LT(0u, bytes_consumed); | |
785 creator_.Flush(); | |
786 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
787 if (bytes_free > 0) { | |
788 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
789 serialized_packet_.encrypted_length); | |
790 } else { | |
791 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); | |
792 } | |
793 DeleteSerializedPacket(); | |
794 } | |
795 } | |
796 | |
797 TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) { | |
798 QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_SERVER); | |
799 QuicVersionVector versions; | |
800 versions.push_back(test::QuicVersionMax()); | |
801 std::unique_ptr<QuicEncryptedPacket> encrypted( | |
802 creator_.SerializeVersionNegotiationPacket(versions)); | |
803 | |
804 { | |
805 InSequence s; | |
806 EXPECT_CALL(framer_visitor_, OnPacket()); | |
807 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
808 EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_)); | |
809 } | |
810 QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_CLIENT); | |
811 client_framer_.ProcessPacket(*encrypted); | |
812 } | |
813 | |
814 TEST_P(QuicPacketCreatorTest, UpdatePacketNumberLengthLeastAwaiting_Old) { | |
815 FLAGS_quic_simple_packet_number_length = false; | |
816 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
817 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
818 | |
819 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64); | |
820 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
821 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
822 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
823 | |
824 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256); | |
825 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
826 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
827 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
828 | |
829 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256); | |
830 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
831 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
832 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
833 | |
834 QuicPacketCreatorPeer::SetPacketNumber(&creator_, | |
835 UINT64_C(64) * 256 * 256 * 256 * 256); | |
836 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
837 EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, | |
838 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
839 } | |
840 | |
841 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth_old) { | |
842 FLAGS_quic_simple_packet_number_length = false; | |
843 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
844 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
845 | |
846 creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize); | |
847 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
848 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
849 | |
850 creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); | |
851 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
852 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
853 | |
854 creator_.UpdatePacketNumberLength(1, | |
855 10000 * 256 * 256 / kDefaultMaxPacketSize); | |
856 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
857 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
858 | |
859 creator_.UpdatePacketNumberLength( | |
860 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); | |
861 EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, | |
862 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
863 } | |
864 | |
865 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) { | |
866 FLAGS_quic_simple_packet_number_length = true; | |
867 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
868 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
869 | |
870 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64); | |
871 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
872 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
873 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
874 | |
875 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256); | |
876 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
877 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
878 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
879 | |
880 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256); | |
881 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
882 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
883 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
884 | |
885 QuicPacketCreatorPeer::SetPacketNumber(&creator_, | |
886 UINT64_C(64) * 256 * 256 * 256 * 256); | |
887 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
888 EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, | |
889 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
890 } | |
891 | |
892 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthCwnd) { | |
893 FLAGS_quic_simple_packet_number_length = true; | |
894 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
895 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
896 | |
897 creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize); | |
898 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
899 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
900 | |
901 creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); | |
902 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
903 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
904 | |
905 creator_.UpdatePacketNumberLength(1, | |
906 10000 * 256 * 256 / kDefaultMaxPacketSize); | |
907 EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, | |
908 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
909 | |
910 creator_.UpdatePacketNumberLength( | |
911 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); | |
912 EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, | |
913 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
914 } | |
915 | |
916 TEST_P(QuicPacketCreatorTest, SerializeFrame) { | |
917 if (!GetParam().version_serialization) { | |
918 creator_.StopSendingVersion(); | |
919 } | |
920 frames_.push_back( | |
921 QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); | |
922 SerializedPacket serialized = SerializeAllFrames(frames_); | |
923 delete frames_[0].stream_frame; | |
924 | |
925 QuicPacketHeader header; | |
926 { | |
927 InSequence s; | |
928 EXPECT_CALL(framer_visitor_, OnPacket()); | |
929 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
930 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
931 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
932 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) | |
933 .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); | |
934 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
935 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
936 } | |
937 ProcessPacket(serialized); | |
938 EXPECT_EQ(GetParam().version_serialization, | |
939 header.public_header.version_flag); | |
940 } | |
941 | |
942 TEST_P(QuicPacketCreatorTest, ConsumeDataLargerThanOneStreamFrame) { | |
943 if (!GetParam().version_serialization) { | |
944 creator_.StopSendingVersion(); | |
945 } | |
946 // A string larger than fits into a frame. | |
947 size_t payload_length; | |
948 creator_.SetMaxPacketLength(GetPacketLengthForOneStream( | |
949 client_framer_.version(), | |
950 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
951 QuicPacketCreatorPeer::SendPathIdInPacket(&creator_), | |
952 !kIncludeDiversificationNonce, creator_.connection_id_length(), | |
953 PACKET_1BYTE_PACKET_NUMBER, &payload_length)); | |
954 QuicFrame frame; | |
955 const string too_long_payload(payload_length * 2, 'a'); | |
956 QuicIOVector io_vector(MakeIOVector(too_long_payload)); | |
957 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
958 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
959 ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); | |
960 ASSERT_TRUE(frame.stream_frame); | |
961 size_t consumed = frame.stream_frame->data_length; | |
962 EXPECT_EQ(payload_length, consumed); | |
963 const string payload(payload_length, 'a'); | |
964 CheckStreamFrame(frame, 1u, payload, 0u, false); | |
965 creator_.Flush(); | |
966 DeleteSerializedPacket(); | |
967 } | |
968 | |
969 TEST_P(QuicPacketCreatorTest, AddFrameAndFlush) { | |
970 if (!GetParam().version_serialization) { | |
971 creator_.StopSendingVersion(); | |
972 } | |
973 const size_t max_plaintext_size = | |
974 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
975 EXPECT_FALSE(creator_.HasPendingFrames()); | |
976 EXPECT_EQ(max_plaintext_size - | |
977 GetPacketHeaderSize( | |
978 client_framer_.version(), creator_.connection_id_length(), | |
979 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
980 QuicPacketCreatorPeer::SendPathIdInPacket(&creator_), | |
981 !kIncludeDiversificationNonce, PACKET_1BYTE_PACKET_NUMBER), | |
982 creator_.BytesFree()); | |
983 | |
984 // Add a variety of frame types and then a padding frame. | |
985 QuicAckFrame ack_frame(MakeAckFrame(0u)); | |
986 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
987 EXPECT_TRUE(creator_.HasPendingFrames()); | |
988 | |
989 QuicFrame frame; | |
990 QuicIOVector io_vector(MakeIOVector("test")); | |
991 ASSERT_TRUE( | |
992 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
993 ASSERT_TRUE(frame.stream_frame); | |
994 size_t consumed = frame.stream_frame->data_length; | |
995 EXPECT_EQ(4u, consumed); | |
996 EXPECT_TRUE(creator_.HasPendingFrames()); | |
997 | |
998 QuicPaddingFrame padding_frame; | |
999 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(padding_frame))); | |
1000 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1001 EXPECT_EQ(0u, creator_.BytesFree()); | |
1002 | |
1003 // Packet is full. Creator will flush. | |
1004 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
1005 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
1006 EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
1007 | |
1008 // Ensure the packet is successfully created. | |
1009 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
1010 ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty()); | |
1011 const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames; | |
1012 ASSERT_EQ(1u, retransmittable.size()); | |
1013 EXPECT_EQ(STREAM_FRAME, retransmittable[0].type); | |
1014 ASSERT_TRUE(retransmittable[0].stream_frame); | |
1015 DeleteSerializedPacket(); | |
1016 | |
1017 EXPECT_FALSE(creator_.HasPendingFrames()); | |
1018 EXPECT_EQ(max_plaintext_size - | |
1019 GetPacketHeaderSize( | |
1020 client_framer_.version(), creator_.connection_id_length(), | |
1021 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
1022 /*include_path_id=*/false, !kIncludeDiversificationNonce, | |
1023 PACKET_1BYTE_PACKET_NUMBER), | |
1024 creator_.BytesFree()); | |
1025 } | |
1026 | |
1027 TEST_P(QuicPacketCreatorTest, SerializeAndSendStreamFrame) { | |
1028 if (!GetParam().version_serialization) { | |
1029 creator_.StopSendingVersion(); | |
1030 } | |
1031 EXPECT_FALSE(creator_.HasPendingFrames()); | |
1032 | |
1033 QuicIOVector iov(MakeIOVector("test")); | |
1034 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
1035 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
1036 ALIGNAS(64) char encrypted_buffer[kMaxPacketSize]; | |
1037 size_t num_bytes_consumed; | |
1038 creator_.CreateAndSerializeStreamFrame(kHeadersStreamId, iov, 0, 0, true, | |
1039 nullptr, encrypted_buffer, | |
1040 kMaxPacketSize, &num_bytes_consumed); | |
1041 EXPECT_EQ(static_cast<size_t>(4), num_bytes_consumed); | |
1042 | |
1043 // Ensure the packet is successfully created. | |
1044 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
1045 ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty()); | |
1046 const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames; | |
1047 ASSERT_EQ(1u, retransmittable.size()); | |
1048 EXPECT_EQ(STREAM_FRAME, retransmittable[0].type); | |
1049 ASSERT_TRUE(retransmittable[0].stream_frame); | |
1050 DeleteSerializedPacket(); | |
1051 | |
1052 EXPECT_FALSE(creator_.HasPendingFrames()); | |
1053 } | |
1054 | |
1055 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) { | |
1056 if (!GetParam().version_serialization) { | |
1057 creator_.StopSendingVersion(); | |
1058 } | |
1059 creator_.SetMaxPacketLength(kMaxPacketSize); | |
1060 | |
1061 // Serialized length of ack frame with 2000 nack ranges should be limited by | |
1062 // the number of nack ranges that can be fit in an ack frame. | |
1063 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); | |
1064 size_t frame_len = client_framer_.GetSerializedFrameLength( | |
1065 QuicFrame(&ack_frame), creator_.BytesFree(), true, true, | |
1066 PACKET_1BYTE_PACKET_NUMBER); | |
1067 EXPECT_GT(creator_.BytesFree(), frame_len); | |
1068 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); | |
1069 | |
1070 // Add ack frame to creator. | |
1071 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
1072 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1073 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); | |
1074 EXPECT_LT(0u, creator_.BytesFree()); | |
1075 | |
1076 // Make sure that an additional stream frame can be added to the packet. | |
1077 QuicFrame frame; | |
1078 QuicIOVector io_vector(MakeIOVector("test")); | |
1079 ASSERT_TRUE( | |
1080 creator_.ConsumeData(2u, io_vector, 0u, 0u, false, false, &frame)); | |
1081 ASSERT_TRUE(frame.stream_frame); | |
1082 size_t consumed = frame.stream_frame->data_length; | |
1083 EXPECT_EQ(4u, consumed); | |
1084 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1085 | |
1086 // Ensure the packet is successfully created, and the packet size estimate | |
1087 // matches the serialized packet length. | |
1088 if (GetParam().version <= QUIC_VERSION_33) { | |
1089 EXPECT_CALL(entropy_calculator_, EntropyHash(_)) | |
1090 .WillOnce(testing::Return(0)); | |
1091 } | |
1092 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
1093 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
1094 size_t est_packet_size = creator_.PacketSize(); | |
1095 creator_.Flush(); | |
1096 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
1097 EXPECT_EQ(est_packet_size, client_framer_.GetMaxPlaintextSize( | |
1098 serialized_packet_.encrypted_length)); | |
1099 DeleteSerializedPacket(); | |
1100 } | |
1101 | |
1102 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) { | |
1103 if (!GetParam().version_serialization) { | |
1104 creator_.StopSendingVersion(); | |
1105 } | |
1106 creator_.SetMaxPacketLength(500u); | |
1107 | |
1108 const size_t max_plaintext_size = | |
1109 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
1110 EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree()); | |
1111 | |
1112 // Serialized length of ack frame with 2000 nack ranges should be limited by | |
1113 // the packet size. | |
1114 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); | |
1115 size_t frame_len = client_framer_.GetSerializedFrameLength( | |
1116 QuicFrame(&ack_frame), creator_.BytesFree(), true, true, | |
1117 PACKET_1BYTE_PACKET_NUMBER); | |
1118 EXPECT_EQ(creator_.BytesFree(), frame_len); | |
1119 | |
1120 // Add ack frame to creator. | |
1121 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
1122 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1123 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()), | |
1124 creator_.PacketSize()); | |
1125 EXPECT_EQ(0u, creator_.BytesFree()); | |
1126 | |
1127 // Ensure the packet is successfully created, and the packet size estimate | |
1128 // may not match the serialized packet length. | |
1129 if (GetParam().version <= QUIC_VERSION_33) { | |
1130 EXPECT_CALL(entropy_calculator_, EntropyHash(_)).WillOnce(Return(0)); | |
1131 } | |
1132 size_t est_packet_size = creator_.PacketSize(); | |
1133 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
1134 .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
1135 creator_.Flush(); | |
1136 ASSERT_TRUE(serialized_packet_.encrypted_buffer); | |
1137 EXPECT_GE(est_packet_size, client_framer_.GetMaxPlaintextSize( | |
1138 serialized_packet_.encrypted_length)); | |
1139 DeleteSerializedPacket(); | |
1140 } | |
1141 | |
1142 TEST_P(QuicPacketCreatorTest, EntropyFlag) { | |
1143 frames_.push_back( | |
1144 QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); | |
1145 | |
1146 for (int i = 0; i < 2; ++i) { | |
1147 for (int j = 0; j < 64; ++j) { | |
1148 SerializedPacket serialized = SerializeAllFrames(frames_); | |
1149 // Verify both BoolSource and hash algorithm. | |
1150 bool expected_rand_bool = | |
1151 (mock_random_.RandUint64() & (UINT64_C(1) << j)) != 0; | |
1152 bool observed_rand_bool = | |
1153 (serialized.entropy_hash & (1 << ((j + 1) % 8))) != 0; | |
1154 uint8_t rest_of_hash = serialized.entropy_hash & ~(1 << ((j + 1) % 8)); | |
1155 EXPECT_EQ(expected_rand_bool, observed_rand_bool); | |
1156 EXPECT_EQ(0, rest_of_hash); | |
1157 } | |
1158 // After 64 calls, BoolSource will refresh the bucket - make sure it does. | |
1159 mock_random_.ChangeValue(); | |
1160 } | |
1161 | |
1162 delete frames_[0].stream_frame; | |
1163 } | |
1164 | |
1165 TEST_P(QuicPacketCreatorTest, SetCurrentPath) { | |
1166 // Current path is the default path. | |
1167 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
1168 EXPECT_EQ(0u, creator_.packet_number()); | |
1169 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
1170 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
1171 // Add a stream frame to the creator. | |
1172 QuicFrame frame; | |
1173 QuicIOVector io_vector(MakeIOVector("test")); | |
1174 ASSERT_TRUE( | |
1175 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
1176 ASSERT_TRUE(frame.stream_frame); | |
1177 size_t consumed = frame.stream_frame->data_length; | |
1178 EXPECT_EQ(4u, consumed); | |
1179 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1180 EXPECT_EQ(0u, creator_.packet_number()); | |
1181 | |
1182 // Change current path. | |
1183 QuicPathId kPathId1 = 1; | |
1184 EXPECT_DFATAL(creator_.SetCurrentPath(kPathId1, 1, 0), | |
1185 "Unable to change paths when a packet is under construction"); | |
1186 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
1187 .Times(1) | |
1188 .WillRepeatedly( | |
1189 Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); | |
1190 creator_.Flush(); | |
1191 EXPECT_FALSE(creator_.HasPendingFrames()); | |
1192 creator_.SetCurrentPath(kPathId1, 1, 0); | |
1193 EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
1194 EXPECT_FALSE(creator_.HasPendingFrames()); | |
1195 EXPECT_EQ(0u, creator_.packet_number()); | |
1196 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
1197 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
1198 | |
1199 // Change current path back. | |
1200 creator_.SetCurrentPath(kDefaultPathId, 2, 1); | |
1201 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
1202 EXPECT_EQ(1u, creator_.packet_number()); | |
1203 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
1204 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
1205 // Add a stream frame to the creator. | |
1206 ASSERT_TRUE( | |
1207 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
1208 ASSERT_TRUE(frame.stream_frame); | |
1209 consumed = frame.stream_frame->data_length; | |
1210 EXPECT_EQ(4u, consumed); | |
1211 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1212 | |
1213 // Does not change current path. | |
1214 creator_.SetCurrentPath(kDefaultPathId, 2, 0); | |
1215 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
1216 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1217 EXPECT_EQ(1u, creator_.packet_number()); | |
1218 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
1219 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
1220 } | |
1221 | |
1222 TEST_P(QuicPacketCreatorTest, | |
1223 SetCurrentPathAndUpdatePacketSequenceNumberLength) { | |
1224 FLAGS_quic_simple_packet_number_length = false; | |
1225 // Current path is the default path. | |
1226 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
1227 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
1228 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
1229 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
1230 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
1231 QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 - 2); | |
1232 // Add a stream frame to the creator and send the packet. | |
1233 QuicFrame frame; | |
1234 QuicIOVector io_vector(MakeIOVector("test")); | |
1235 ASSERT_TRUE( | |
1236 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
1237 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
1238 .Times(1) | |
1239 .WillRepeatedly( | |
1240 Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); | |
1241 creator_.Flush(); | |
1242 EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number()); | |
1243 creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
1244 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
1245 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
1246 | |
1247 // Change current path. | |
1248 QuicPathId kPathId1 = 1; | |
1249 creator_.SetCurrentPath(kPathId1, 1, 0); | |
1250 EXPECT_EQ(0u, creator_.packet_number()); | |
1251 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
1252 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
1253 | |
1254 // Change current path back. | |
1255 creator_.SetCurrentPath(kDefaultPathId, 2, 10000 / kDefaultMaxPacketSize); | |
1256 EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number()); | |
1257 EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, | |
1258 QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); | |
1259 } | |
1260 | |
1261 TEST_P(QuicPacketCreatorTest, SerializePacketOnDifferentPath) { | |
1262 // Current path is the default path. | |
1263 EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
1264 EXPECT_EQ(0u, creator_.packet_number()); | |
1265 // Add a stream frame to the creator and flush the packet. | |
1266 QuicFrame frame; | |
1267 QuicIOVector io_vector(MakeIOVector("test")); | |
1268 ASSERT_TRUE( | |
1269 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
1270 ASSERT_TRUE(frame.stream_frame); | |
1271 size_t consumed = frame.stream_frame->data_length; | |
1272 EXPECT_EQ(4u, consumed); | |
1273 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1274 EXPECT_EQ(0u, creator_.packet_number()); | |
1275 EXPECT_CALL(delegate_, OnSerializedPacket(_)) | |
1276 .WillRepeatedly( | |
1277 Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); | |
1278 creator_.Flush(); | |
1279 EXPECT_FALSE(creator_.HasPendingFrames()); | |
1280 EXPECT_EQ(1u, creator_.packet_number()); | |
1281 // Verify serialized data packet's path id. | |
1282 EXPECT_EQ(kDefaultPathId, serialized_packet_.path_id); | |
1283 DeleteSerializedPacket(); | |
1284 | |
1285 // Change to path 1. | |
1286 QuicPathId kPathId1 = 1; | |
1287 creator_.SetCurrentPath(kPathId1, 1, 0); | |
1288 EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); | |
1289 EXPECT_FALSE(creator_.HasPendingFrames()); | |
1290 EXPECT_EQ(0u, creator_.packet_number()); | |
1291 EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, | |
1292 QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); | |
1293 | |
1294 // Add a stream frame to the creator and flush the packet. | |
1295 ASSERT_TRUE( | |
1296 creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); | |
1297 ASSERT_TRUE(frame.stream_frame); | |
1298 consumed = frame.stream_frame->data_length; | |
1299 EXPECT_EQ(4u, consumed); | |
1300 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1301 creator_.Flush(); | |
1302 // Verify serialized data packet's path id. | |
1303 EXPECT_EQ(kPathId1, serialized_packet_.path_id); | |
1304 DeleteSerializedPacket(); | |
1305 } | |
1306 | |
1307 TEST_P(QuicPacketCreatorTest, AddUnencryptedStreamDataClosesConnection) { | |
1308 FLAGS_quic_never_write_unencrypted_data = true; | |
1309 EXPECT_CALL(delegate_, OnUnrecoverableError(_, _, _)); | |
1310 QuicStreamFrame stream_frame(kHeadersStreamId, /*fin=*/false, 0u, | |
1311 StringPiece()); | |
1312 EXPECT_DFATAL(creator_.AddSavedFrame(QuicFrame(&stream_frame)), | |
1313 "Cannot send stream data without encryption."); | |
1314 } | |
1315 | |
1316 TEST_P(QuicPacketCreatorTest, ChloTooLarge) { | |
1317 CryptoHandshakeMessage message; | |
1318 message.set_tag(kCHLO); | |
1319 message.set_minimum_size(kMaxPacketSize); | |
1320 CryptoFramer framer; | |
1321 std::unique_ptr<QuicData> message_data; | |
1322 message_data.reset(framer.ConstructHandshakeMessage(message)); | |
1323 | |
1324 struct iovec iov; | |
1325 QuicIOVector data_iovec(::net::MakeIOVector( | |
1326 StringPiece(message_data->data(), message_data->length()), &iov)); | |
1327 QuicFrame frame; | |
1328 EXPECT_CALL(delegate_, | |
1329 OnUnrecoverableError(QUIC_CRYPTO_CHLO_TOO_LARGE, _, _)); | |
1330 EXPECT_DFATAL( | |
1331 creator_.ConsumeData(1u, data_iovec, 0u, 0u, false, false, &frame), | |
1332 "Client hello won't fit in a single packet."); | |
1333 } | |
1334 | |
1335 } // namespace | |
1336 } // namespace test | |
1337 } // namespace net | |
OLD | NEW |