| Index: net/quic/quic_packet_creator_test.cc
|
| diff --git a/net/quic/quic_packet_creator_test.cc b/net/quic/quic_packet_creator_test.cc
|
| deleted file mode 100644
|
| index df2e399ddc3675880bce35a2aca7ad885c0bce89..0000000000000000000000000000000000000000
|
| --- a/net/quic/quic_packet_creator_test.cc
|
| +++ /dev/null
|
| @@ -1,1337 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/quic/quic_packet_creator.h"
|
| -
|
| -#include <cstdint>
|
| -#include <memory>
|
| -#include <string>
|
| -
|
| -#include "base/macros.h"
|
| -#include "base/stl_util.h"
|
| -#include "net/quic/crypto/null_encrypter.h"
|
| -#include "net/quic/crypto/quic_decrypter.h"
|
| -#include "net/quic/crypto/quic_encrypter.h"
|
| -#include "net/quic/quic_flags.h"
|
| -#include "net/quic/quic_simple_buffer_allocator.h"
|
| -#include "net/quic/quic_utils.h"
|
| -#include "net/quic/test_tools/mock_random.h"
|
| -#include "net/quic/test_tools/quic_framer_peer.h"
|
| -#include "net/quic/test_tools/quic_packet_creator_peer.h"
|
| -#include "net/quic/test_tools/quic_test_utils.h"
|
| -#include "net/test/gtest_util.h"
|
| -#include "testing/gmock/include/gmock/gmock.h"
|
| -
|
| -using base::StringPiece;
|
| -using std::ostream;
|
| -using std::string;
|
| -using std::vector;
|
| -using testing::DoAll;
|
| -using testing::InSequence;
|
| -using testing::Return;
|
| -using testing::SaveArg;
|
| -using testing::StrictMock;
|
| -using testing::_;
|
| -
|
| -namespace net {
|
| -namespace test {
|
| -namespace {
|
| -
|
| -// Run tests with combinations of {QuicVersion, ToggleVersionSerialization}.
|
| -struct TestParams {
|
| - TestParams(QuicVersion version,
|
| - bool version_serialization,
|
| - QuicConnectionIdLength length)
|
| - : version(version),
|
| - connection_id_length(length),
|
| - version_serialization(version_serialization) {}
|
| -
|
| - friend ostream& operator<<(ostream& os, const TestParams& p) {
|
| - os << "{ client_version: " << QuicVersionToString(p.version)
|
| - << " connection id length: " << p.connection_id_length
|
| - << " include version: " << p.version_serialization << " }";
|
| - return os;
|
| - }
|
| -
|
| - QuicVersion version;
|
| - QuicConnectionIdLength connection_id_length;
|
| - bool version_serialization;
|
| -};
|
| -
|
| -// Constructs various test permutations.
|
| -vector<TestParams> GetTestParams() {
|
| - vector<TestParams> params;
|
| - constexpr QuicConnectionIdLength kMax = PACKET_8BYTE_CONNECTION_ID;
|
| - QuicVersionVector all_supported_versions = QuicSupportedVersions();
|
| - for (size_t i = 0; i < all_supported_versions.size(); ++i) {
|
| - params.push_back(TestParams(all_supported_versions[i], true, kMax));
|
| - params.push_back(TestParams(all_supported_versions[i], false, kMax));
|
| - }
|
| - params.push_back(
|
| - TestParams(all_supported_versions[0], true, PACKET_0BYTE_CONNECTION_ID));
|
| - params.push_back(TestParams(all_supported_versions[0], true, kMax));
|
| - return params;
|
| -}
|
| -
|
| -class MockDelegate : public QuicPacketCreator::DelegateInterface {
|
| - public:
|
| - MockDelegate() {}
|
| - ~MockDelegate() override {}
|
| -
|
| - MOCK_METHOD1(OnSerializedPacket, void(SerializedPacket* packet));
|
| - MOCK_METHOD3(OnUnrecoverableError,
|
| - void(QuicErrorCode,
|
| - const string&,
|
| - ConnectionCloseSource source));
|
| -
|
| - private:
|
| - DISALLOW_COPY_AND_ASSIGN(MockDelegate);
|
| -};
|
| -
|
| -class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> {
|
| - public:
|
| - void ClearSerializedPacket(SerializedPacket* serialized_packet) {
|
| - if (serialized_packet == nullptr) {
|
| - return;
|
| - }
|
| - QuicUtils::ClearSerializedPacket(serialized_packet);
|
| - }
|
| -
|
| - void SaveSerializedPacket(SerializedPacket* serialized_packet) {
|
| - if (serialized_packet == nullptr) {
|
| - return;
|
| - }
|
| - delete[] serialized_packet_.encrypted_buffer;
|
| - serialized_packet_ = *serialized_packet;
|
| - serialized_packet_.encrypted_buffer =
|
| - QuicUtils::CopyBuffer(*serialized_packet);
|
| - serialized_packet->retransmittable_frames.clear();
|
| - }
|
| -
|
| - void DeleteSerializedPacket() {
|
| - delete[] serialized_packet_.encrypted_buffer;
|
| - serialized_packet_.encrypted_buffer = nullptr;
|
| - ClearSerializedPacket(&serialized_packet_);
|
| - }
|
| -
|
| - protected:
|
| - QuicPacketCreatorTest()
|
| - : server_framer_(SupportedVersions(GetParam().version),
|
| - QuicTime::Zero(),
|
| - Perspective::IS_SERVER),
|
| - client_framer_(SupportedVersions(GetParam().version),
|
| - QuicTime::Zero(),
|
| - Perspective::IS_CLIENT),
|
| - connection_id_(2),
|
| - data_("foo"),
|
| - creator_(connection_id_,
|
| - &client_framer_,
|
| - &mock_random_,
|
| - &buffer_allocator_,
|
| - &delegate_),
|
| - serialized_packet_(creator_.NoPacket()) {
|
| - FLAGS_quic_always_log_bugs_for_tests = true;
|
| - creator_.set_connection_id_length(GetParam().connection_id_length);
|
| -
|
| - creator_.SetEncrypter(ENCRYPTION_INITIAL, new NullEncrypter());
|
| - creator_.SetEncrypter(ENCRYPTION_FORWARD_SECURE, new NullEncrypter());
|
| - client_framer_.set_visitor(&framer_visitor_);
|
| - client_framer_.set_received_entropy_calculator(&entropy_calculator_);
|
| - server_framer_.set_visitor(&framer_visitor_);
|
| - // TODO(ianswett): Fix this test so it uses a non-null encrypter.
|
| - FLAGS_quic_never_write_unencrypted_data = false;
|
| - }
|
| -
|
| - ~QuicPacketCreatorTest() override {
|
| - delete[] serialized_packet_.encrypted_buffer;
|
| - ClearSerializedPacket(&serialized_packet_);
|
| - }
|
| -
|
| - SerializedPacket SerializeAllFrames(const QuicFrames& frames) {
|
| - SerializedPacket packet = QuicPacketCreatorPeer::SerializeAllFrames(
|
| - &creator_, frames, buffer_, kMaxPacketSize);
|
| - EXPECT_EQ(QuicPacketCreatorPeer::GetEncryptionLevel(&creator_),
|
| - packet.encryption_level);
|
| - return packet;
|
| - }
|
| -
|
| - void ProcessPacket(const SerializedPacket& packet) {
|
| - QuicEncryptedPacket encrypted_packet(packet.encrypted_buffer,
|
| - packet.encrypted_length);
|
| - server_framer_.ProcessPacket(encrypted_packet);
|
| - }
|
| -
|
| - void CheckStreamFrame(const QuicFrame& frame,
|
| - QuicStreamId stream_id,
|
| - const string& data,
|
| - QuicStreamOffset offset,
|
| - bool fin) {
|
| - EXPECT_EQ(STREAM_FRAME, frame.type);
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - EXPECT_EQ(stream_id, frame.stream_frame->stream_id);
|
| - EXPECT_EQ(data, StringPiece(frame.stream_frame->data_buffer,
|
| - frame.stream_frame->data_length));
|
| - EXPECT_EQ(offset, frame.stream_frame->offset);
|
| - EXPECT_EQ(fin, frame.stream_frame->fin);
|
| - }
|
| -
|
| - // Returns the number of bytes consumed by the header of packet, including
|
| - // the version.
|
| - size_t GetPacketHeaderOverhead(QuicVersion version) {
|
| - if (FLAGS_quic_simple_packet_number_length) {
|
| - return GetPacketHeaderSize(
|
| - version, creator_.connection_id_length(), kIncludeVersion,
|
| - !kIncludePathId, !kIncludeDiversificationNonce,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| - } else {
|
| - return GetPacketHeaderSize(
|
| - version, creator_.connection_id_length(), kIncludeVersion,
|
| - !kIncludePathId, !kIncludeDiversificationNonce,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| - }
|
| - }
|
| -
|
| - // Returns the number of bytes of overhead that will be added to a packet
|
| - // of maximum length.
|
| - size_t GetEncryptionOverhead() {
|
| - return creator_.max_packet_length() -
|
| - client_framer_.GetMaxPlaintextSize(creator_.max_packet_length());
|
| - }
|
| -
|
| - // Returns the number of bytes consumed by the non-data fields of a stream
|
| - // frame, assuming it is the last frame in the packet
|
| - size_t GetStreamFrameOverhead() {
|
| - return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset,
|
| - true);
|
| - }
|
| -
|
| - QuicIOVector MakeIOVector(StringPiece s) {
|
| - return ::net::MakeIOVector(s, &iov_);
|
| - }
|
| -
|
| - PendingRetransmission CreateRetransmission(
|
| - const QuicFrames& retransmittable_frames,
|
| - bool has_crypto_handshake,
|
| - int num_padding_bytes,
|
| - EncryptionLevel encryption_level,
|
| - QuicPacketNumberLength packet_number_length) {
|
| - return PendingRetransmission(1u, 1u, NOT_RETRANSMISSION,
|
| - retransmittable_frames, has_crypto_handshake,
|
| - num_padding_bytes, encryption_level,
|
| - packet_number_length);
|
| - }
|
| -
|
| - static const QuicStreamOffset kOffset = 1u;
|
| -
|
| - char buffer_[kMaxPacketSize];
|
| - QuicFrames frames_;
|
| - QuicFramer server_framer_;
|
| - QuicFramer client_framer_;
|
| - StrictMock<MockFramerVisitor> framer_visitor_;
|
| - StrictMock<MockDelegate> delegate_;
|
| - QuicConnectionId connection_id_;
|
| - string data_;
|
| - struct iovec iov_;
|
| - MockRandom mock_random_;
|
| - SimpleBufferAllocator buffer_allocator_;
|
| - QuicPacketCreator creator_;
|
| - MockEntropyCalculator entropy_calculator_;
|
| - SerializedPacket serialized_packet_;
|
| -};
|
| -
|
| -// Run all packet creator tests with all supported versions of QUIC, and with
|
| -// and without version in the packet header, as well as doing a run for each
|
| -// length of truncated connection id.
|
| -INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests,
|
| - QuicPacketCreatorTest,
|
| - ::testing::ValuesIn(GetTestParams()));
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializeFrames) {
|
| - for (int i = ENCRYPTION_NONE; i < NUM_ENCRYPTION_LEVELS; ++i) {
|
| - EncryptionLevel level = static_cast<EncryptionLevel>(i);
|
| - creator_.set_encryption_level(level);
|
| - frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u))));
|
| - frames_.push_back(
|
| - QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece())));
|
| - frames_.push_back(
|
| - QuicFrame(new QuicStreamFrame(0u, true, 0u, StringPiece())));
|
| - SerializedPacket serialized = SerializeAllFrames(frames_);
|
| - EXPECT_EQ(level, serialized.encryption_level);
|
| - delete frames_[0].ack_frame;
|
| - delete frames_[1].stream_frame;
|
| - delete frames_[2].stream_frame;
|
| - frames_.clear();
|
| -
|
| - {
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnAckFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| - }
|
| - ProcessPacket(serialized);
|
| - }
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) {
|
| - FLAGS_quic_simple_packet_number_length = false;
|
| - frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u))));
|
| - creator_.AddSavedFrame(frames_[0]);
|
| - QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_,
|
| - PACKET_4BYTE_PACKET_NUMBER);
|
| -
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillRepeatedly(
|
| - Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.Flush();
|
| - // The packet number length will not change mid-packet.
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - serialized_packet_.packet_number_length);
|
| -
|
| - {
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnAckFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| - }
|
| - ProcessPacket(serialized_packet_);
|
| - DeleteSerializedPacket();
|
| -
|
| - creator_.AddSavedFrame(frames_[0]);
|
| - creator_.Flush();
|
| - // Now the actual packet number length should have changed.
|
| - EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER,
|
| - serialized_packet_.packet_number_length);
|
| - delete frames_[0].ack_frame;
|
| -
|
| - {
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnAckFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| - }
|
| - ProcessPacket(serialized_packet_);
|
| - DeleteSerializedPacket();
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) {
|
| - FLAGS_quic_simple_packet_number_length = false;
|
| - // Changing the packet number length with queued frames in the creator
|
| - // should hold the change until after any currently queued frames are
|
| - // serialized.
|
| -
|
| - // Packet 1.
|
| - // Queue a frame in the creator.
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u)));
|
| - creator_.AddSavedFrame(ack_frame);
|
| -
|
| - // Now change packet number length.
|
| - QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_,
|
| - PACKET_4BYTE_PACKET_NUMBER);
|
| -
|
| - // Add a STOP_WAITING frame since it contains a packet number,
|
| - // whose length should be 1.
|
| - QuicStopWaitingFrame stop_waiting_frame;
|
| - EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame)));
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -
|
| - // Ensure the packet is successfully created.
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillRepeatedly(
|
| - Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.Flush();
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - serialized_packet_.packet_number_length);
|
| -
|
| - // Verify that header in transmitted packet has 1 byte sequence length.
|
| - QuicPacketHeader header;
|
| - {
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_))
|
| - .WillOnce(DoAll(SaveArg<0>(&header), Return(true)));
|
| - EXPECT_CALL(framer_visitor_, OnAckFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| - }
|
| - ProcessPacket(serialized_packet_);
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - header.public_header.packet_number_length);
|
| - DeleteSerializedPacket();
|
| -
|
| - // Packet 2.
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - // Generate Packet 2 with one frame -- packet number length should now
|
| - // change to 4 bytes.
|
| - EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame)));
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -
|
| - // Ensure the packet is successfully created.
|
| - creator_.Flush();
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER,
|
| - serialized_packet_.packet_number_length);
|
| -
|
| - // Verify that header in transmitted packet has 4 byte sequence length.
|
| - {
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_))
|
| - .WillOnce(DoAll(SaveArg<0>(&header), Return(true)));
|
| - EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| - }
|
| - ProcessPacket(serialized_packet_);
|
| - EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER,
|
| - header.public_header.packet_number_length);
|
| -
|
| - DeleteSerializedPacket();
|
| - delete ack_frame.ack_frame;
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacketDoesNothing) {
|
| - FLAGS_quic_simple_packet_number_length = true;
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| - // Changing the packet number length with queued frames in the creator
|
| - // should do nothing.
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u)));
|
| - creator_.AddSavedFrame(ack_frame);
|
| -
|
| - // Now change packet number length and expect a QUIC_BUG and no change in
|
| - // packet number length.
|
| - EXPECT_DFATAL(creator_.UpdatePacketNumberLength(0, 256),
|
| - "Called UpdatePacketNumberLength with 1 queued_frames.");
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| - delete ack_frame.ack_frame;
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) {
|
| - // If the original packet number length, the current packet number
|
| - // length, and the configured send packet number length are different, the
|
| - // retransmit must sent with the original length and the others do not change.
|
| - if (!FLAGS_quic_simple_packet_number_length) {
|
| - QuicPacketCreatorPeer::SetNextPacketNumberLength(
|
| - &creator_, PACKET_4BYTE_PACKET_NUMBER);
|
| - }
|
| - QuicPacketCreatorPeer::SetPacketNumberLength(&creator_,
|
| - PACKET_2BYTE_PACKET_NUMBER);
|
| - QuicStreamFrame* stream_frame =
|
| - new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece());
|
| - QuicFrames frames;
|
| - frames.push_back(QuicFrame(stream_frame));
|
| - char buffer[kMaxPacketSize];
|
| - PendingRetransmission retransmission(CreateRetransmission(
|
| - frames, true /* has_crypto_handshake */, -1 /* needs full padding */,
|
| - ENCRYPTION_NONE, PACKET_1BYTE_PACKET_NUMBER));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize);
|
| - if (FLAGS_quic_simple_packet_number_length) {
|
| - // The packet number length is updated after every packet is sent,
|
| - // so there is no need to restore the old length after sending.
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| - } else {
|
| - EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| - EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| - }
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - serialized_packet_.packet_number_length);
|
| -
|
| - {
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPaddingFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| - }
|
| - ProcessPacket(serialized_packet_);
|
| - delete stream_frame;
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ReserializeCryptoFrameWithForwardSecurity) {
|
| - QuicStreamFrame* stream_frame =
|
| - new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece());
|
| - QuicFrames frames;
|
| - frames.push_back(QuicFrame(stream_frame));
|
| - creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE);
|
| - char buffer[kMaxPacketSize];
|
| - PendingRetransmission retransmission(CreateRetransmission(
|
| - frames, true /* has_crypto_handshake */, -1 /* needs full padding */,
|
| - ENCRYPTION_NONE,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize);
|
| - EXPECT_EQ(ENCRYPTION_NONE, serialized_packet_.encryption_level);
|
| - delete stream_frame;
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ReserializeFrameWithForwardSecurity) {
|
| - QuicStreamFrame* stream_frame =
|
| - new QuicStreamFrame(0u, /*fin=*/false, 0u, StringPiece());
|
| - QuicFrames frames;
|
| - frames.push_back(QuicFrame(stream_frame));
|
| - creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE);
|
| - char buffer[kMaxPacketSize];
|
| - PendingRetransmission retransmission(CreateRetransmission(
|
| - frames, false /* has_crypto_handshake */, 0 /* no padding */,
|
| - ENCRYPTION_NONE,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize);
|
| - EXPECT_EQ(ENCRYPTION_FORWARD_SECURE, serialized_packet_.encryption_level);
|
| - delete stream_frame;
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPadding) {
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("fake handshake message data"));
|
| - QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId,
|
| - io_vector, 0u, 0u, false, &frame);
|
| - QuicFrames frames;
|
| - frames.push_back(frame);
|
| - char buffer[kMaxPacketSize];
|
| - PendingRetransmission retransmission(CreateRetransmission(
|
| - frames, true /* has_crypto_handshake */, -1 /* needs full padding */,
|
| - ENCRYPTION_NONE,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize);
|
| - EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length);
|
| - delete frame.stream_frame;
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSpecifiedPadding) {
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("fake message data"));
|
| - QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId,
|
| - io_vector, 0u, 0u, false, &frame);
|
| -
|
| - const int kNumPaddingBytes1 = 4;
|
| - int packet_size = 0;
|
| - {
|
| - QuicFrames frames;
|
| - frames.push_back(frame);
|
| - char buffer[kMaxPacketSize];
|
| - PendingRetransmission retransmission(CreateRetransmission(
|
| - frames, false /* has_crypto_handshake */,
|
| - kNumPaddingBytes1 /* padding bytes */, ENCRYPTION_NONE,
|
| - FLAGS_quic_simple_packet_number_length
|
| - ? QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)
|
| - : QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize);
|
| - packet_size = serialized_packet_.encrypted_length;
|
| - }
|
| -
|
| - const int kNumPaddingBytes2 = 44;
|
| - QuicFrames frames;
|
| - frames.push_back(frame);
|
| - char buffer[kMaxPacketSize];
|
| - PendingRetransmission retransmission(CreateRetransmission(
|
| - frames, false /* has_crypto_handshake */,
|
| - kNumPaddingBytes2 /* padding bytes */, ENCRYPTION_NONE,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize);
|
| -
|
| - EXPECT_EQ(packet_size + kNumPaddingBytes2 - kNumPaddingBytes1,
|
| - serialized_packet_.encrypted_length);
|
| - delete frame.stream_frame;
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) {
|
| - const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) +
|
| - GetEncryptionOverhead() + GetStreamFrameOverhead();
|
| - size_t capacity = kDefaultMaxPacketSize - overhead;
|
| - for (int delta = -5; delta <= 0; ++delta) {
|
| - string data(capacity + delta, 'A');
|
| - size_t bytes_free = 0 - delta;
|
| -
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector(data));
|
| - UniqueStreamBuffer stream_buffer;
|
| - QuicPacketCreatorPeer::CreateStreamFrame(
|
| - &creator_, kCryptoStreamId, io_vector, 0, kOffset, false, &frame);
|
| - QuicFrames frames;
|
| - frames.push_back(frame);
|
| - char buffer[kMaxPacketSize];
|
| - PendingRetransmission retransmission(CreateRetransmission(
|
| - frames, true /* has_crypto_handshake */, -1 /* needs full padding */,
|
| - ENCRYPTION_NONE,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize);
|
| -
|
| - // If there is not enough space in the packet to fit a padding frame
|
| - // (1 byte) and to expand the stream frame (another 2 bytes) the packet
|
| - // will not be padded.
|
| - if (bytes_free < 3) {
|
| - EXPECT_EQ(kDefaultMaxPacketSize - bytes_free,
|
| - serialized_packet_.encrypted_length);
|
| - } else {
|
| - EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length);
|
| - }
|
| -
|
| - delete frame.stream_frame;
|
| - frames_.clear();
|
| - }
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) {
|
| - QuicConnectionCloseFrame frame;
|
| - frame.error_code = QUIC_NO_ERROR;
|
| - frame.error_details = "error";
|
| -
|
| - QuicFrames frames;
|
| - frames.push_back(QuicFrame(&frame));
|
| - SerializedPacket serialized = SerializeAllFrames(frames);
|
| - EXPECT_EQ(ENCRYPTION_NONE, serialized.encryption_level);
|
| - ASSERT_EQ(1u, serialized.packet_number);
|
| - ASSERT_EQ(1u, creator_.packet_number());
|
| -
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| -
|
| - ProcessPacket(serialized);
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ConsumeData) {
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("test"));
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(4u, consumed);
|
| - CheckStreamFrame(frame, 1u, "test", 0u, false);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ConsumeDataFin) {
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("test"));
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(1u, io_vector, 0u, 10u, true, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(4u, consumed);
|
| - CheckStreamFrame(frame, 1u, "test", 10u, true);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ConsumeDataFinOnly) {
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(nullptr, 0, 0);
|
| - ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(0u, consumed);
|
| - CheckStreamFrame(frame, 1u, string(), 0u, true);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) {
|
| - const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) +
|
| - GetEncryptionOverhead();
|
| - for (size_t i = overhead; i < overhead + 100; ++i) {
|
| - creator_.SetMaxPacketLength(i);
|
| - const bool should_have_room = i > overhead + GetStreamFrameOverhead();
|
| - ASSERT_EQ(should_have_room,
|
| - creator_.HasRoomForStreamFrame(kClientDataStreamId1, kOffset));
|
| - if (should_have_room) {
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("testdata"));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillRepeatedly(
|
| - Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket));
|
| - ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u,
|
| - kOffset, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t bytes_consumed = frame.stream_frame->data_length;
|
| - EXPECT_LT(0u, bytes_consumed);
|
| - creator_.Flush();
|
| - }
|
| - }
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) {
|
| - // Compute the total overhead for a single frame in packet.
|
| - const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) +
|
| - GetEncryptionOverhead() + GetStreamFrameOverhead();
|
| - size_t capacity = kDefaultMaxPacketSize - overhead;
|
| - // Now, test various sizes around this size.
|
| - for (int delta = -5; delta <= 5; ++delta) {
|
| - string data(capacity + delta, 'A');
|
| - size_t bytes_free = delta > 0 ? 0 : 0 - delta;
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector(data));
|
| - ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u,
|
| - kOffset, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| -
|
| - // BytesFree() returns bytes available for the next frame, which will
|
| - // be two bytes smaller since the stream frame would need to be grown.
|
| - EXPECT_EQ(2u, creator_.ExpansionOnNewFrame());
|
| - size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2;
|
| - EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta;
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.Flush();
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - DeleteSerializedPacket();
|
| - }
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) {
|
| - // Compute the total overhead for a single frame in packet.
|
| - const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) +
|
| - GetEncryptionOverhead() + GetStreamFrameOverhead();
|
| - ASSERT_GT(kMaxPacketSize, overhead);
|
| - size_t capacity = kDefaultMaxPacketSize - overhead;
|
| - // Now, test various sizes around this size.
|
| - for (int delta = -5; delta <= 5; ++delta) {
|
| - string data(capacity + delta, 'A');
|
| - size_t bytes_free = delta > 0 ? 0 : 0 - delta;
|
| -
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector(data));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillRepeatedly(
|
| - Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, kOffset,
|
| - false, true, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t bytes_consumed = frame.stream_frame->data_length;
|
| - EXPECT_LT(0u, bytes_consumed);
|
| - creator_.Flush();
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - // If there is not enough space in the packet to fit a padding frame
|
| - // (1 byte) and to expand the stream frame (another 2 bytes) the packet
|
| - // will not be padded.
|
| - if (bytes_free < 3) {
|
| - EXPECT_EQ(kDefaultMaxPacketSize - bytes_free,
|
| - serialized_packet_.encrypted_length);
|
| - } else {
|
| - EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length);
|
| - }
|
| - DeleteSerializedPacket();
|
| - }
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) {
|
| - // Compute the total overhead for a single frame in packet.
|
| - const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) +
|
| - GetEncryptionOverhead() + GetStreamFrameOverhead();
|
| - ASSERT_GT(kDefaultMaxPacketSize, overhead);
|
| - size_t capacity = kDefaultMaxPacketSize - overhead;
|
| - // Now, test various sizes around this size.
|
| - for (int delta = -5; delta <= 5; ++delta) {
|
| - string data(capacity + delta, 'A');
|
| - size_t bytes_free = delta > 0 ? 0 : 0 - delta;
|
| -
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector(data));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u,
|
| - kOffset, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t bytes_consumed = frame.stream_frame->data_length;
|
| - EXPECT_LT(0u, bytes_consumed);
|
| - creator_.Flush();
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - if (bytes_free > 0) {
|
| - EXPECT_EQ(kDefaultMaxPacketSize - bytes_free,
|
| - serialized_packet_.encrypted_length);
|
| - } else {
|
| - EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length);
|
| - }
|
| - DeleteSerializedPacket();
|
| - }
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) {
|
| - QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_SERVER);
|
| - QuicVersionVector versions;
|
| - versions.push_back(test::QuicVersionMax());
|
| - std::unique_ptr<QuicEncryptedPacket> encrypted(
|
| - creator_.SerializeVersionNegotiationPacket(versions));
|
| -
|
| - {
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_));
|
| - }
|
| - QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_CLIENT);
|
| - client_framer_.ProcessPacket(*encrypted);
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, UpdatePacketNumberLengthLeastAwaiting_Old) {
|
| - FLAGS_quic_simple_packet_number_length = false;
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64);
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256);
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256);
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_,
|
| - UINT64_C(64) * 256 * 256 * 256 * 256);
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth_old) {
|
| - FLAGS_quic_simple_packet_number_length = false;
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - creator_.UpdatePacketNumberLength(1,
|
| - 10000 * 256 * 256 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - creator_.UpdatePacketNumberLength(
|
| - 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) {
|
| - FLAGS_quic_simple_packet_number_length = true;
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64);
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256);
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256);
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_,
|
| - UINT64_C(64) * 256 * 256 * 256 * 256);
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthCwnd) {
|
| - FLAGS_quic_simple_packet_number_length = true;
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - creator_.UpdatePacketNumberLength(1,
|
| - 10000 * 256 * 256 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - creator_.UpdatePacketNumberLength(
|
| - 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializeFrame) {
|
| - if (!GetParam().version_serialization) {
|
| - creator_.StopSendingVersion();
|
| - }
|
| - frames_.push_back(
|
| - QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece())));
|
| - SerializedPacket serialized = SerializeAllFrames(frames_);
|
| - delete frames_[0].stream_frame;
|
| -
|
| - QuicPacketHeader header;
|
| - {
|
| - InSequence s;
|
| - EXPECT_CALL(framer_visitor_, OnPacket());
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| - EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_))
|
| - .WillOnce(DoAll(SaveArg<0>(&header), Return(true)));
|
| - EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| - }
|
| - ProcessPacket(serialized);
|
| - EXPECT_EQ(GetParam().version_serialization,
|
| - header.public_header.version_flag);
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ConsumeDataLargerThanOneStreamFrame) {
|
| - if (!GetParam().version_serialization) {
|
| - creator_.StopSendingVersion();
|
| - }
|
| - // A string larger than fits into a frame.
|
| - size_t payload_length;
|
| - creator_.SetMaxPacketLength(GetPacketLengthForOneStream(
|
| - client_framer_.version(),
|
| - QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
|
| - QuicPacketCreatorPeer::SendPathIdInPacket(&creator_),
|
| - !kIncludeDiversificationNonce, creator_.connection_id_length(),
|
| - PACKET_1BYTE_PACKET_NUMBER, &payload_length));
|
| - QuicFrame frame;
|
| - const string too_long_payload(payload_length * 2, 'a');
|
| - QuicIOVector io_vector(MakeIOVector(too_long_payload));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(payload_length, consumed);
|
| - const string payload(payload_length, 'a');
|
| - CheckStreamFrame(frame, 1u, payload, 0u, false);
|
| - creator_.Flush();
|
| - DeleteSerializedPacket();
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, AddFrameAndFlush) {
|
| - if (!GetParam().version_serialization) {
|
| - creator_.StopSendingVersion();
|
| - }
|
| - const size_t max_plaintext_size =
|
| - client_framer_.GetMaxPlaintextSize(creator_.max_packet_length());
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(max_plaintext_size -
|
| - GetPacketHeaderSize(
|
| - client_framer_.version(), creator_.connection_id_length(),
|
| - QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
|
| - QuicPacketCreatorPeer::SendPathIdInPacket(&creator_),
|
| - !kIncludeDiversificationNonce, PACKET_1BYTE_PACKET_NUMBER),
|
| - creator_.BytesFree());
|
| -
|
| - // Add a variety of frame types and then a padding frame.
|
| - QuicAckFrame ack_frame(MakeAckFrame(0u));
|
| - EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("test"));
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(4u, consumed);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -
|
| - QuicPaddingFrame padding_frame;
|
| - EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(padding_frame)));
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(0u, creator_.BytesFree());
|
| -
|
| - // Packet is full. Creator will flush.
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
|
| -
|
| - // Ensure the packet is successfully created.
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty());
|
| - const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames;
|
| - ASSERT_EQ(1u, retransmittable.size());
|
| - EXPECT_EQ(STREAM_FRAME, retransmittable[0].type);
|
| - ASSERT_TRUE(retransmittable[0].stream_frame);
|
| - DeleteSerializedPacket();
|
| -
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(max_plaintext_size -
|
| - GetPacketHeaderSize(
|
| - client_framer_.version(), creator_.connection_id_length(),
|
| - QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
|
| - /*include_path_id=*/false, !kIncludeDiversificationNonce,
|
| - PACKET_1BYTE_PACKET_NUMBER),
|
| - creator_.BytesFree());
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializeAndSendStreamFrame) {
|
| - if (!GetParam().version_serialization) {
|
| - creator_.StopSendingVersion();
|
| - }
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| -
|
| - QuicIOVector iov(MakeIOVector("test"));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - ALIGNAS(64) char encrypted_buffer[kMaxPacketSize];
|
| - size_t num_bytes_consumed;
|
| - creator_.CreateAndSerializeStreamFrame(kHeadersStreamId, iov, 0, 0, true,
|
| - nullptr, encrypted_buffer,
|
| - kMaxPacketSize, &num_bytes_consumed);
|
| - EXPECT_EQ(static_cast<size_t>(4), num_bytes_consumed);
|
| -
|
| - // Ensure the packet is successfully created.
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty());
|
| - const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames;
|
| - ASSERT_EQ(1u, retransmittable.size());
|
| - EXPECT_EQ(STREAM_FRAME, retransmittable[0].type);
|
| - ASSERT_TRUE(retransmittable[0].stream_frame);
|
| - DeleteSerializedPacket();
|
| -
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) {
|
| - if (!GetParam().version_serialization) {
|
| - creator_.StopSendingVersion();
|
| - }
|
| - creator_.SetMaxPacketLength(kMaxPacketSize);
|
| -
|
| - // Serialized length of ack frame with 2000 nack ranges should be limited by
|
| - // the number of nack ranges that can be fit in an ack frame.
|
| - QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u);
|
| - size_t frame_len = client_framer_.GetSerializedFrameLength(
|
| - QuicFrame(&ack_frame), creator_.BytesFree(), true, true,
|
| - PACKET_1BYTE_PACKET_NUMBER);
|
| - EXPECT_GT(creator_.BytesFree(), frame_len);
|
| - EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize());
|
| -
|
| - // Add ack frame to creator.
|
| - EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| - EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize());
|
| - EXPECT_LT(0u, creator_.BytesFree());
|
| -
|
| - // Make sure that an additional stream frame can be added to the packet.
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("test"));
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(2u, io_vector, 0u, 0u, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(4u, consumed);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -
|
| - // Ensure the packet is successfully created, and the packet size estimate
|
| - // matches the serialized packet length.
|
| - if (GetParam().version <= QUIC_VERSION_33) {
|
| - EXPECT_CALL(entropy_calculator_, EntropyHash(_))
|
| - .WillOnce(testing::Return(0));
|
| - }
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - size_t est_packet_size = creator_.PacketSize();
|
| - creator_.Flush();
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - EXPECT_EQ(est_packet_size, client_framer_.GetMaxPlaintextSize(
|
| - serialized_packet_.encrypted_length));
|
| - DeleteSerializedPacket();
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) {
|
| - if (!GetParam().version_serialization) {
|
| - creator_.StopSendingVersion();
|
| - }
|
| - creator_.SetMaxPacketLength(500u);
|
| -
|
| - const size_t max_plaintext_size =
|
| - client_framer_.GetMaxPlaintextSize(creator_.max_packet_length());
|
| - EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree());
|
| -
|
| - // Serialized length of ack frame with 2000 nack ranges should be limited by
|
| - // the packet size.
|
| - QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u);
|
| - size_t frame_len = client_framer_.GetSerializedFrameLength(
|
| - QuicFrame(&ack_frame), creator_.BytesFree(), true, true,
|
| - PACKET_1BYTE_PACKET_NUMBER);
|
| - EXPECT_EQ(creator_.BytesFree(), frame_len);
|
| -
|
| - // Add ack frame to creator.
|
| - EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()),
|
| - creator_.PacketSize());
|
| - EXPECT_EQ(0u, creator_.BytesFree());
|
| -
|
| - // Ensure the packet is successfully created, and the packet size estimate
|
| - // may not match the serialized packet length.
|
| - if (GetParam().version <= QUIC_VERSION_33) {
|
| - EXPECT_CALL(entropy_calculator_, EntropyHash(_)).WillOnce(Return(0));
|
| - }
|
| - size_t est_packet_size = creator_.PacketSize();
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.Flush();
|
| - ASSERT_TRUE(serialized_packet_.encrypted_buffer);
|
| - EXPECT_GE(est_packet_size, client_framer_.GetMaxPlaintextSize(
|
| - serialized_packet_.encrypted_length));
|
| - DeleteSerializedPacket();
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, EntropyFlag) {
|
| - frames_.push_back(
|
| - QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece())));
|
| -
|
| - for (int i = 0; i < 2; ++i) {
|
| - for (int j = 0; j < 64; ++j) {
|
| - SerializedPacket serialized = SerializeAllFrames(frames_);
|
| - // Verify both BoolSource and hash algorithm.
|
| - bool expected_rand_bool =
|
| - (mock_random_.RandUint64() & (UINT64_C(1) << j)) != 0;
|
| - bool observed_rand_bool =
|
| - (serialized.entropy_hash & (1 << ((j + 1) % 8))) != 0;
|
| - uint8_t rest_of_hash = serialized.entropy_hash & ~(1 << ((j + 1) % 8));
|
| - EXPECT_EQ(expected_rand_bool, observed_rand_bool);
|
| - EXPECT_EQ(0, rest_of_hash);
|
| - }
|
| - // After 64 calls, BoolSource will refresh the bucket - make sure it does.
|
| - mock_random_.ChangeValue();
|
| - }
|
| -
|
| - delete frames_[0].stream_frame;
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SetCurrentPath) {
|
| - // Current path is the default path.
|
| - EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_));
|
| - EXPECT_EQ(0u, creator_.packet_number());
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| - // Add a stream frame to the creator.
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("test"));
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(4u, consumed);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(0u, creator_.packet_number());
|
| -
|
| - // Change current path.
|
| - QuicPathId kPathId1 = 1;
|
| - EXPECT_DFATAL(creator_.SetCurrentPath(kPathId1, 1, 0),
|
| - "Unable to change paths when a packet is under construction");
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .Times(1)
|
| - .WillRepeatedly(
|
| - Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket));
|
| - creator_.Flush();
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - creator_.SetCurrentPath(kPathId1, 1, 0);
|
| - EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_));
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(0u, creator_.packet_number());
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - // Change current path back.
|
| - creator_.SetCurrentPath(kDefaultPathId, 2, 1);
|
| - EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_));
|
| - EXPECT_EQ(1u, creator_.packet_number());
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| - // Add a stream frame to the creator.
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(4u, consumed);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| -
|
| - // Does not change current path.
|
| - creator_.SetCurrentPath(kDefaultPathId, 2, 0);
|
| - EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_));
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(1u, creator_.packet_number());
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest,
|
| - SetCurrentPathAndUpdatePacketSequenceNumberLength) {
|
| - FLAGS_quic_simple_packet_number_length = false;
|
| - // Current path is the default path.
|
| - EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_));
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| - QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 - 2);
|
| - // Add a stream frame to the creator and send the packet.
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("test"));
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame));
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .Times(1)
|
| - .WillRepeatedly(
|
| - Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket));
|
| - creator_.Flush();
|
| - EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number());
|
| - creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - // Change current path.
|
| - QuicPathId kPathId1 = 1;
|
| - creator_.SetCurrentPath(kPathId1, 1, 0);
|
| - EXPECT_EQ(0u, creator_.packet_number());
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -
|
| - // Change current path back.
|
| - creator_.SetCurrentPath(kDefaultPathId, 2, 10000 / kDefaultMaxPacketSize);
|
| - EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number());
|
| - EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::NextPacketNumberLength(&creator_));
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, SerializePacketOnDifferentPath) {
|
| - // Current path is the default path.
|
| - EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_));
|
| - EXPECT_EQ(0u, creator_.packet_number());
|
| - // Add a stream frame to the creator and flush the packet.
|
| - QuicFrame frame;
|
| - QuicIOVector io_vector(MakeIOVector("test"));
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - size_t consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(4u, consumed);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(0u, creator_.packet_number());
|
| - EXPECT_CALL(delegate_, OnSerializedPacket(_))
|
| - .WillRepeatedly(
|
| - Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket));
|
| - creator_.Flush();
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(1u, creator_.packet_number());
|
| - // Verify serialized data packet's path id.
|
| - EXPECT_EQ(kDefaultPathId, serialized_packet_.path_id);
|
| - DeleteSerializedPacket();
|
| -
|
| - // Change to path 1.
|
| - QuicPathId kPathId1 = 1;
|
| - creator_.SetCurrentPath(kPathId1, 1, 0);
|
| - EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_));
|
| - EXPECT_FALSE(creator_.HasPendingFrames());
|
| - EXPECT_EQ(0u, creator_.packet_number());
|
| - EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER,
|
| - QuicPacketCreatorPeer::GetPacketNumberLength(&creator_));
|
| -
|
| - // Add a stream frame to the creator and flush the packet.
|
| - ASSERT_TRUE(
|
| - creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame));
|
| - ASSERT_TRUE(frame.stream_frame);
|
| - consumed = frame.stream_frame->data_length;
|
| - EXPECT_EQ(4u, consumed);
|
| - EXPECT_TRUE(creator_.HasPendingFrames());
|
| - creator_.Flush();
|
| - // Verify serialized data packet's path id.
|
| - EXPECT_EQ(kPathId1, serialized_packet_.path_id);
|
| - DeleteSerializedPacket();
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, AddUnencryptedStreamDataClosesConnection) {
|
| - FLAGS_quic_never_write_unencrypted_data = true;
|
| - EXPECT_CALL(delegate_, OnUnrecoverableError(_, _, _));
|
| - QuicStreamFrame stream_frame(kHeadersStreamId, /*fin=*/false, 0u,
|
| - StringPiece());
|
| - EXPECT_DFATAL(creator_.AddSavedFrame(QuicFrame(&stream_frame)),
|
| - "Cannot send stream data without encryption.");
|
| -}
|
| -
|
| -TEST_P(QuicPacketCreatorTest, ChloTooLarge) {
|
| - CryptoHandshakeMessage message;
|
| - message.set_tag(kCHLO);
|
| - message.set_minimum_size(kMaxPacketSize);
|
| - CryptoFramer framer;
|
| - std::unique_ptr<QuicData> message_data;
|
| - message_data.reset(framer.ConstructHandshakeMessage(message));
|
| -
|
| - struct iovec iov;
|
| - QuicIOVector data_iovec(::net::MakeIOVector(
|
| - StringPiece(message_data->data(), message_data->length()), &iov));
|
| - QuicFrame frame;
|
| - EXPECT_CALL(delegate_,
|
| - OnUnrecoverableError(QUIC_CRYPTO_CHLO_TOO_LARGE, _, _));
|
| - EXPECT_DFATAL(
|
| - creator_.ConsumeData(1u, data_iovec, 0u, 0u, false, false, &frame),
|
| - "Client hello won't fit in a single packet.");
|
| -}
|
| -
|
| -} // namespace
|
| -} // namespace test
|
| -} // namespace net
|
|
|