Index: net/quic/quic_packet_creator_test.cc |
diff --git a/net/quic/quic_packet_creator_test.cc b/net/quic/quic_packet_creator_test.cc |
deleted file mode 100644 |
index df2e399ddc3675880bce35a2aca7ad885c0bce89..0000000000000000000000000000000000000000 |
--- a/net/quic/quic_packet_creator_test.cc |
+++ /dev/null |
@@ -1,1337 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/quic/quic_packet_creator.h" |
- |
-#include <cstdint> |
-#include <memory> |
-#include <string> |
- |
-#include "base/macros.h" |
-#include "base/stl_util.h" |
-#include "net/quic/crypto/null_encrypter.h" |
-#include "net/quic/crypto/quic_decrypter.h" |
-#include "net/quic/crypto/quic_encrypter.h" |
-#include "net/quic/quic_flags.h" |
-#include "net/quic/quic_simple_buffer_allocator.h" |
-#include "net/quic/quic_utils.h" |
-#include "net/quic/test_tools/mock_random.h" |
-#include "net/quic/test_tools/quic_framer_peer.h" |
-#include "net/quic/test_tools/quic_packet_creator_peer.h" |
-#include "net/quic/test_tools/quic_test_utils.h" |
-#include "net/test/gtest_util.h" |
-#include "testing/gmock/include/gmock/gmock.h" |
- |
-using base::StringPiece; |
-using std::ostream; |
-using std::string; |
-using std::vector; |
-using testing::DoAll; |
-using testing::InSequence; |
-using testing::Return; |
-using testing::SaveArg; |
-using testing::StrictMock; |
-using testing::_; |
- |
-namespace net { |
-namespace test { |
-namespace { |
- |
-// Run tests with combinations of {QuicVersion, ToggleVersionSerialization}. |
-struct TestParams { |
- TestParams(QuicVersion version, |
- bool version_serialization, |
- QuicConnectionIdLength length) |
- : version(version), |
- connection_id_length(length), |
- version_serialization(version_serialization) {} |
- |
- friend ostream& operator<<(ostream& os, const TestParams& p) { |
- os << "{ client_version: " << QuicVersionToString(p.version) |
- << " connection id length: " << p.connection_id_length |
- << " include version: " << p.version_serialization << " }"; |
- return os; |
- } |
- |
- QuicVersion version; |
- QuicConnectionIdLength connection_id_length; |
- bool version_serialization; |
-}; |
- |
-// Constructs various test permutations. |
-vector<TestParams> GetTestParams() { |
- vector<TestParams> params; |
- constexpr QuicConnectionIdLength kMax = PACKET_8BYTE_CONNECTION_ID; |
- QuicVersionVector all_supported_versions = QuicSupportedVersions(); |
- for (size_t i = 0; i < all_supported_versions.size(); ++i) { |
- params.push_back(TestParams(all_supported_versions[i], true, kMax)); |
- params.push_back(TestParams(all_supported_versions[i], false, kMax)); |
- } |
- params.push_back( |
- TestParams(all_supported_versions[0], true, PACKET_0BYTE_CONNECTION_ID)); |
- params.push_back(TestParams(all_supported_versions[0], true, kMax)); |
- return params; |
-} |
- |
-class MockDelegate : public QuicPacketCreator::DelegateInterface { |
- public: |
- MockDelegate() {} |
- ~MockDelegate() override {} |
- |
- MOCK_METHOD1(OnSerializedPacket, void(SerializedPacket* packet)); |
- MOCK_METHOD3(OnUnrecoverableError, |
- void(QuicErrorCode, |
- const string&, |
- ConnectionCloseSource source)); |
- |
- private: |
- DISALLOW_COPY_AND_ASSIGN(MockDelegate); |
-}; |
- |
-class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> { |
- public: |
- void ClearSerializedPacket(SerializedPacket* serialized_packet) { |
- if (serialized_packet == nullptr) { |
- return; |
- } |
- QuicUtils::ClearSerializedPacket(serialized_packet); |
- } |
- |
- void SaveSerializedPacket(SerializedPacket* serialized_packet) { |
- if (serialized_packet == nullptr) { |
- return; |
- } |
- delete[] serialized_packet_.encrypted_buffer; |
- serialized_packet_ = *serialized_packet; |
- serialized_packet_.encrypted_buffer = |
- QuicUtils::CopyBuffer(*serialized_packet); |
- serialized_packet->retransmittable_frames.clear(); |
- } |
- |
- void DeleteSerializedPacket() { |
- delete[] serialized_packet_.encrypted_buffer; |
- serialized_packet_.encrypted_buffer = nullptr; |
- ClearSerializedPacket(&serialized_packet_); |
- } |
- |
- protected: |
- QuicPacketCreatorTest() |
- : server_framer_(SupportedVersions(GetParam().version), |
- QuicTime::Zero(), |
- Perspective::IS_SERVER), |
- client_framer_(SupportedVersions(GetParam().version), |
- QuicTime::Zero(), |
- Perspective::IS_CLIENT), |
- connection_id_(2), |
- data_("foo"), |
- creator_(connection_id_, |
- &client_framer_, |
- &mock_random_, |
- &buffer_allocator_, |
- &delegate_), |
- serialized_packet_(creator_.NoPacket()) { |
- FLAGS_quic_always_log_bugs_for_tests = true; |
- creator_.set_connection_id_length(GetParam().connection_id_length); |
- |
- creator_.SetEncrypter(ENCRYPTION_INITIAL, new NullEncrypter()); |
- creator_.SetEncrypter(ENCRYPTION_FORWARD_SECURE, new NullEncrypter()); |
- client_framer_.set_visitor(&framer_visitor_); |
- client_framer_.set_received_entropy_calculator(&entropy_calculator_); |
- server_framer_.set_visitor(&framer_visitor_); |
- // TODO(ianswett): Fix this test so it uses a non-null encrypter. |
- FLAGS_quic_never_write_unencrypted_data = false; |
- } |
- |
- ~QuicPacketCreatorTest() override { |
- delete[] serialized_packet_.encrypted_buffer; |
- ClearSerializedPacket(&serialized_packet_); |
- } |
- |
- SerializedPacket SerializeAllFrames(const QuicFrames& frames) { |
- SerializedPacket packet = QuicPacketCreatorPeer::SerializeAllFrames( |
- &creator_, frames, buffer_, kMaxPacketSize); |
- EXPECT_EQ(QuicPacketCreatorPeer::GetEncryptionLevel(&creator_), |
- packet.encryption_level); |
- return packet; |
- } |
- |
- void ProcessPacket(const SerializedPacket& packet) { |
- QuicEncryptedPacket encrypted_packet(packet.encrypted_buffer, |
- packet.encrypted_length); |
- server_framer_.ProcessPacket(encrypted_packet); |
- } |
- |
- void CheckStreamFrame(const QuicFrame& frame, |
- QuicStreamId stream_id, |
- const string& data, |
- QuicStreamOffset offset, |
- bool fin) { |
- EXPECT_EQ(STREAM_FRAME, frame.type); |
- ASSERT_TRUE(frame.stream_frame); |
- EXPECT_EQ(stream_id, frame.stream_frame->stream_id); |
- EXPECT_EQ(data, StringPiece(frame.stream_frame->data_buffer, |
- frame.stream_frame->data_length)); |
- EXPECT_EQ(offset, frame.stream_frame->offset); |
- EXPECT_EQ(fin, frame.stream_frame->fin); |
- } |
- |
- // Returns the number of bytes consumed by the header of packet, including |
- // the version. |
- size_t GetPacketHeaderOverhead(QuicVersion version) { |
- if (FLAGS_quic_simple_packet_number_length) { |
- return GetPacketHeaderSize( |
- version, creator_.connection_id_length(), kIncludeVersion, |
- !kIncludePathId, !kIncludeDiversificationNonce, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- } else { |
- return GetPacketHeaderSize( |
- version, creator_.connection_id_length(), kIncludeVersion, |
- !kIncludePathId, !kIncludeDiversificationNonce, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- } |
- } |
- |
- // Returns the number of bytes of overhead that will be added to a packet |
- // of maximum length. |
- size_t GetEncryptionOverhead() { |
- return creator_.max_packet_length() - |
- client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); |
- } |
- |
- // Returns the number of bytes consumed by the non-data fields of a stream |
- // frame, assuming it is the last frame in the packet |
- size_t GetStreamFrameOverhead() { |
- return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset, |
- true); |
- } |
- |
- QuicIOVector MakeIOVector(StringPiece s) { |
- return ::net::MakeIOVector(s, &iov_); |
- } |
- |
- PendingRetransmission CreateRetransmission( |
- const QuicFrames& retransmittable_frames, |
- bool has_crypto_handshake, |
- int num_padding_bytes, |
- EncryptionLevel encryption_level, |
- QuicPacketNumberLength packet_number_length) { |
- return PendingRetransmission(1u, 1u, NOT_RETRANSMISSION, |
- retransmittable_frames, has_crypto_handshake, |
- num_padding_bytes, encryption_level, |
- packet_number_length); |
- } |
- |
- static const QuicStreamOffset kOffset = 1u; |
- |
- char buffer_[kMaxPacketSize]; |
- QuicFrames frames_; |
- QuicFramer server_framer_; |
- QuicFramer client_framer_; |
- StrictMock<MockFramerVisitor> framer_visitor_; |
- StrictMock<MockDelegate> delegate_; |
- QuicConnectionId connection_id_; |
- string data_; |
- struct iovec iov_; |
- MockRandom mock_random_; |
- SimpleBufferAllocator buffer_allocator_; |
- QuicPacketCreator creator_; |
- MockEntropyCalculator entropy_calculator_; |
- SerializedPacket serialized_packet_; |
-}; |
- |
-// Run all packet creator tests with all supported versions of QUIC, and with |
-// and without version in the packet header, as well as doing a run for each |
-// length of truncated connection id. |
-INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests, |
- QuicPacketCreatorTest, |
- ::testing::ValuesIn(GetTestParams())); |
- |
-TEST_P(QuicPacketCreatorTest, SerializeFrames) { |
- for (int i = ENCRYPTION_NONE; i < NUM_ENCRYPTION_LEVELS; ++i) { |
- EncryptionLevel level = static_cast<EncryptionLevel>(i); |
- creator_.set_encryption_level(level); |
- frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); |
- frames_.push_back( |
- QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); |
- frames_.push_back( |
- QuicFrame(new QuicStreamFrame(0u, true, 0u, StringPiece()))); |
- SerializedPacket serialized = SerializeAllFrames(frames_); |
- EXPECT_EQ(level, serialized.encryption_level); |
- delete frames_[0].ack_frame; |
- delete frames_[1].stream_frame; |
- delete frames_[2].stream_frame; |
- frames_.clear(); |
- |
- { |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnAckFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketComplete()); |
- } |
- ProcessPacket(serialized); |
- } |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) { |
- FLAGS_quic_simple_packet_number_length = false; |
- frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); |
- creator_.AddSavedFrame(frames_[0]); |
- QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, |
- PACKET_4BYTE_PACKET_NUMBER); |
- |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillRepeatedly( |
- Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.Flush(); |
- // The packet number length will not change mid-packet. |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- serialized_packet_.packet_number_length); |
- |
- { |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnAckFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketComplete()); |
- } |
- ProcessPacket(serialized_packet_); |
- DeleteSerializedPacket(); |
- |
- creator_.AddSavedFrame(frames_[0]); |
- creator_.Flush(); |
- // Now the actual packet number length should have changed. |
- EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, |
- serialized_packet_.packet_number_length); |
- delete frames_[0].ack_frame; |
- |
- { |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnAckFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketComplete()); |
- } |
- ProcessPacket(serialized_packet_); |
- DeleteSerializedPacket(); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) { |
- FLAGS_quic_simple_packet_number_length = false; |
- // Changing the packet number length with queued frames in the creator |
- // should hold the change until after any currently queued frames are |
- // serialized. |
- |
- // Packet 1. |
- // Queue a frame in the creator. |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); |
- creator_.AddSavedFrame(ack_frame); |
- |
- // Now change packet number length. |
- QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, |
- PACKET_4BYTE_PACKET_NUMBER); |
- |
- // Add a STOP_WAITING frame since it contains a packet number, |
- // whose length should be 1. |
- QuicStopWaitingFrame stop_waiting_frame; |
- EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- |
- // Ensure the packet is successfully created. |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillRepeatedly( |
- Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.Flush(); |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- serialized_packet_.packet_number_length); |
- |
- // Verify that header in transmitted packet has 1 byte sequence length. |
- QuicPacketHeader header; |
- { |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) |
- .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); |
- EXPECT_CALL(framer_visitor_, OnAckFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketComplete()); |
- } |
- ProcessPacket(serialized_packet_); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- header.public_header.packet_number_length); |
- DeleteSerializedPacket(); |
- |
- // Packet 2. |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- // Generate Packet 2 with one frame -- packet number length should now |
- // change to 4 bytes. |
- EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- |
- // Ensure the packet is successfully created. |
- creator_.Flush(); |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, |
- serialized_packet_.packet_number_length); |
- |
- // Verify that header in transmitted packet has 4 byte sequence length. |
- { |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) |
- .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); |
- EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketComplete()); |
- } |
- ProcessPacket(serialized_packet_); |
- EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, |
- header.public_header.packet_number_length); |
- |
- DeleteSerializedPacket(); |
- delete ack_frame.ack_frame; |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacketDoesNothing) { |
- FLAGS_quic_simple_packet_number_length = true; |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- // Changing the packet number length with queued frames in the creator |
- // should do nothing. |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); |
- creator_.AddSavedFrame(ack_frame); |
- |
- // Now change packet number length and expect a QUIC_BUG and no change in |
- // packet number length. |
- EXPECT_DFATAL(creator_.UpdatePacketNumberLength(0, 256), |
- "Called UpdatePacketNumberLength with 1 queued_frames."); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- delete ack_frame.ack_frame; |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) { |
- // If the original packet number length, the current packet number |
- // length, and the configured send packet number length are different, the |
- // retransmit must sent with the original length and the others do not change. |
- if (!FLAGS_quic_simple_packet_number_length) { |
- QuicPacketCreatorPeer::SetNextPacketNumberLength( |
- &creator_, PACKET_4BYTE_PACKET_NUMBER); |
- } |
- QuicPacketCreatorPeer::SetPacketNumberLength(&creator_, |
- PACKET_2BYTE_PACKET_NUMBER); |
- QuicStreamFrame* stream_frame = |
- new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece()); |
- QuicFrames frames; |
- frames.push_back(QuicFrame(stream_frame)); |
- char buffer[kMaxPacketSize]; |
- PendingRetransmission retransmission(CreateRetransmission( |
- frames, true /* has_crypto_handshake */, -1 /* needs full padding */, |
- ENCRYPTION_NONE, PACKET_1BYTE_PACKET_NUMBER)); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); |
- if (FLAGS_quic_simple_packet_number_length) { |
- // The packet number length is updated after every packet is sent, |
- // so there is no need to restore the old length after sending. |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- } else { |
- EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- } |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- serialized_packet_.packet_number_length); |
- |
- { |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPaddingFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketComplete()); |
- } |
- ProcessPacket(serialized_packet_); |
- delete stream_frame; |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ReserializeCryptoFrameWithForwardSecurity) { |
- QuicStreamFrame* stream_frame = |
- new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece()); |
- QuicFrames frames; |
- frames.push_back(QuicFrame(stream_frame)); |
- creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); |
- char buffer[kMaxPacketSize]; |
- PendingRetransmission retransmission(CreateRetransmission( |
- frames, true /* has_crypto_handshake */, -1 /* needs full padding */, |
- ENCRYPTION_NONE, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); |
- EXPECT_EQ(ENCRYPTION_NONE, serialized_packet_.encryption_level); |
- delete stream_frame; |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ReserializeFrameWithForwardSecurity) { |
- QuicStreamFrame* stream_frame = |
- new QuicStreamFrame(0u, /*fin=*/false, 0u, StringPiece()); |
- QuicFrames frames; |
- frames.push_back(QuicFrame(stream_frame)); |
- creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); |
- char buffer[kMaxPacketSize]; |
- PendingRetransmission retransmission(CreateRetransmission( |
- frames, false /* has_crypto_handshake */, 0 /* no padding */, |
- ENCRYPTION_NONE, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); |
- EXPECT_EQ(ENCRYPTION_FORWARD_SECURE, serialized_packet_.encryption_level); |
- delete stream_frame; |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPadding) { |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("fake handshake message data")); |
- QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId, |
- io_vector, 0u, 0u, false, &frame); |
- QuicFrames frames; |
- frames.push_back(frame); |
- char buffer[kMaxPacketSize]; |
- PendingRetransmission retransmission(CreateRetransmission( |
- frames, true /* has_crypto_handshake */, -1 /* needs full padding */, |
- ENCRYPTION_NONE, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); |
- EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); |
- delete frame.stream_frame; |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSpecifiedPadding) { |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("fake message data")); |
- QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId, |
- io_vector, 0u, 0u, false, &frame); |
- |
- const int kNumPaddingBytes1 = 4; |
- int packet_size = 0; |
- { |
- QuicFrames frames; |
- frames.push_back(frame); |
- char buffer[kMaxPacketSize]; |
- PendingRetransmission retransmission(CreateRetransmission( |
- frames, false /* has_crypto_handshake */, |
- kNumPaddingBytes1 /* padding bytes */, ENCRYPTION_NONE, |
- FLAGS_quic_simple_packet_number_length |
- ? QuicPacketCreatorPeer::GetPacketNumberLength(&creator_) |
- : QuicPacketCreatorPeer::NextPacketNumberLength(&creator_))); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); |
- packet_size = serialized_packet_.encrypted_length; |
- } |
- |
- const int kNumPaddingBytes2 = 44; |
- QuicFrames frames; |
- frames.push_back(frame); |
- char buffer[kMaxPacketSize]; |
- PendingRetransmission retransmission(CreateRetransmission( |
- frames, false /* has_crypto_handshake */, |
- kNumPaddingBytes2 /* padding bytes */, ENCRYPTION_NONE, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); |
- |
- EXPECT_EQ(packet_size + kNumPaddingBytes2 - kNumPaddingBytes1, |
- serialized_packet_.encrypted_length); |
- delete frame.stream_frame; |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) { |
- const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + |
- GetEncryptionOverhead() + GetStreamFrameOverhead(); |
- size_t capacity = kDefaultMaxPacketSize - overhead; |
- for (int delta = -5; delta <= 0; ++delta) { |
- string data(capacity + delta, 'A'); |
- size_t bytes_free = 0 - delta; |
- |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector(data)); |
- UniqueStreamBuffer stream_buffer; |
- QuicPacketCreatorPeer::CreateStreamFrame( |
- &creator_, kCryptoStreamId, io_vector, 0, kOffset, false, &frame); |
- QuicFrames frames; |
- frames.push_back(frame); |
- char buffer[kMaxPacketSize]; |
- PendingRetransmission retransmission(CreateRetransmission( |
- frames, true /* has_crypto_handshake */, -1 /* needs full padding */, |
- ENCRYPTION_NONE, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_))); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); |
- |
- // If there is not enough space in the packet to fit a padding frame |
- // (1 byte) and to expand the stream frame (another 2 bytes) the packet |
- // will not be padded. |
- if (bytes_free < 3) { |
- EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, |
- serialized_packet_.encrypted_length); |
- } else { |
- EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); |
- } |
- |
- delete frame.stream_frame; |
- frames_.clear(); |
- } |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) { |
- QuicConnectionCloseFrame frame; |
- frame.error_code = QUIC_NO_ERROR; |
- frame.error_details = "error"; |
- |
- QuicFrames frames; |
- frames.push_back(QuicFrame(&frame)); |
- SerializedPacket serialized = SerializeAllFrames(frames); |
- EXPECT_EQ(ENCRYPTION_NONE, serialized.encryption_level); |
- ASSERT_EQ(1u, serialized.packet_number); |
- ASSERT_EQ(1u, creator_.packet_number()); |
- |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketComplete()); |
- |
- ProcessPacket(serialized); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ConsumeData) { |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(4u, consumed); |
- CheckStreamFrame(frame, 1u, "test", 0u, false); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ConsumeDataFin) { |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 10u, true, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(4u, consumed); |
- CheckStreamFrame(frame, 1u, "test", 10u, true); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ConsumeDataFinOnly) { |
- QuicFrame frame; |
- QuicIOVector io_vector(nullptr, 0, 0); |
- ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(0u, consumed); |
- CheckStreamFrame(frame, 1u, string(), 0u, true); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) { |
- const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + |
- GetEncryptionOverhead(); |
- for (size_t i = overhead; i < overhead + 100; ++i) { |
- creator_.SetMaxPacketLength(i); |
- const bool should_have_room = i > overhead + GetStreamFrameOverhead(); |
- ASSERT_EQ(should_have_room, |
- creator_.HasRoomForStreamFrame(kClientDataStreamId1, kOffset)); |
- if (should_have_room) { |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("testdata")); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillRepeatedly( |
- Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); |
- ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, |
- kOffset, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t bytes_consumed = frame.stream_frame->data_length; |
- EXPECT_LT(0u, bytes_consumed); |
- creator_.Flush(); |
- } |
- } |
-} |
- |
-TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) { |
- // Compute the total overhead for a single frame in packet. |
- const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + |
- GetEncryptionOverhead() + GetStreamFrameOverhead(); |
- size_t capacity = kDefaultMaxPacketSize - overhead; |
- // Now, test various sizes around this size. |
- for (int delta = -5; delta <= 5; ++delta) { |
- string data(capacity + delta, 'A'); |
- size_t bytes_free = delta > 0 ? 0 : 0 - delta; |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector(data)); |
- ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, |
- kOffset, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- |
- // BytesFree() returns bytes available for the next frame, which will |
- // be two bytes smaller since the stream frame would need to be grown. |
- EXPECT_EQ(2u, creator_.ExpansionOnNewFrame()); |
- size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2; |
- EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta; |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.Flush(); |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- DeleteSerializedPacket(); |
- } |
-} |
- |
-TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) { |
- // Compute the total overhead for a single frame in packet. |
- const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + |
- GetEncryptionOverhead() + GetStreamFrameOverhead(); |
- ASSERT_GT(kMaxPacketSize, overhead); |
- size_t capacity = kDefaultMaxPacketSize - overhead; |
- // Now, test various sizes around this size. |
- for (int delta = -5; delta <= 5; ++delta) { |
- string data(capacity + delta, 'A'); |
- size_t bytes_free = delta > 0 ? 0 : 0 - delta; |
- |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector(data)); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillRepeatedly( |
- Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, kOffset, |
- false, true, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t bytes_consumed = frame.stream_frame->data_length; |
- EXPECT_LT(0u, bytes_consumed); |
- creator_.Flush(); |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- // If there is not enough space in the packet to fit a padding frame |
- // (1 byte) and to expand the stream frame (another 2 bytes) the packet |
- // will not be padded. |
- if (bytes_free < 3) { |
- EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, |
- serialized_packet_.encrypted_length); |
- } else { |
- EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); |
- } |
- DeleteSerializedPacket(); |
- } |
-} |
- |
-TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) { |
- // Compute the total overhead for a single frame in packet. |
- const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + |
- GetEncryptionOverhead() + GetStreamFrameOverhead(); |
- ASSERT_GT(kDefaultMaxPacketSize, overhead); |
- size_t capacity = kDefaultMaxPacketSize - overhead; |
- // Now, test various sizes around this size. |
- for (int delta = -5; delta <= 5; ++delta) { |
- string data(capacity + delta, 'A'); |
- size_t bytes_free = delta > 0 ? 0 : 0 - delta; |
- |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector(data)); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, |
- kOffset, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t bytes_consumed = frame.stream_frame->data_length; |
- EXPECT_LT(0u, bytes_consumed); |
- creator_.Flush(); |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- if (bytes_free > 0) { |
- EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, |
- serialized_packet_.encrypted_length); |
- } else { |
- EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); |
- } |
- DeleteSerializedPacket(); |
- } |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) { |
- QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_SERVER); |
- QuicVersionVector versions; |
- versions.push_back(test::QuicVersionMax()); |
- std::unique_ptr<QuicEncryptedPacket> encrypted( |
- creator_.SerializeVersionNegotiationPacket(versions)); |
- |
- { |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_)); |
- } |
- QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_CLIENT); |
- client_framer_.ProcessPacket(*encrypted); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, UpdatePacketNumberLengthLeastAwaiting_Old) { |
- FLAGS_quic_simple_packet_number_length = false; |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, |
- UINT64_C(64) * 256 * 256 * 256 * 256); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth_old) { |
- FLAGS_quic_simple_packet_number_length = false; |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- creator_.UpdatePacketNumberLength(1, |
- 10000 * 256 * 256 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- creator_.UpdatePacketNumberLength( |
- 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) { |
- FLAGS_quic_simple_packet_number_length = true; |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, |
- UINT64_C(64) * 256 * 256 * 256 * 256); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthCwnd) { |
- FLAGS_quic_simple_packet_number_length = true; |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- creator_.UpdatePacketNumberLength(1, |
- 10000 * 256 * 256 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- creator_.UpdatePacketNumberLength( |
- 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SerializeFrame) { |
- if (!GetParam().version_serialization) { |
- creator_.StopSendingVersion(); |
- } |
- frames_.push_back( |
- QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); |
- SerializedPacket serialized = SerializeAllFrames(frames_); |
- delete frames_[0].stream_frame; |
- |
- QuicPacketHeader header; |
- { |
- InSequence s; |
- EXPECT_CALL(framer_visitor_, OnPacket()); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); |
- EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) |
- .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); |
- EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); |
- EXPECT_CALL(framer_visitor_, OnPacketComplete()); |
- } |
- ProcessPacket(serialized); |
- EXPECT_EQ(GetParam().version_serialization, |
- header.public_header.version_flag); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ConsumeDataLargerThanOneStreamFrame) { |
- if (!GetParam().version_serialization) { |
- creator_.StopSendingVersion(); |
- } |
- // A string larger than fits into a frame. |
- size_t payload_length; |
- creator_.SetMaxPacketLength(GetPacketLengthForOneStream( |
- client_framer_.version(), |
- QuicPacketCreatorPeer::SendVersionInPacket(&creator_), |
- QuicPacketCreatorPeer::SendPathIdInPacket(&creator_), |
- !kIncludeDiversificationNonce, creator_.connection_id_length(), |
- PACKET_1BYTE_PACKET_NUMBER, &payload_length)); |
- QuicFrame frame; |
- const string too_long_payload(payload_length * 2, 'a'); |
- QuicIOVector io_vector(MakeIOVector(too_long_payload)); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(payload_length, consumed); |
- const string payload(payload_length, 'a'); |
- CheckStreamFrame(frame, 1u, payload, 0u, false); |
- creator_.Flush(); |
- DeleteSerializedPacket(); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, AddFrameAndFlush) { |
- if (!GetParam().version_serialization) { |
- creator_.StopSendingVersion(); |
- } |
- const size_t max_plaintext_size = |
- client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- EXPECT_EQ(max_plaintext_size - |
- GetPacketHeaderSize( |
- client_framer_.version(), creator_.connection_id_length(), |
- QuicPacketCreatorPeer::SendVersionInPacket(&creator_), |
- QuicPacketCreatorPeer::SendPathIdInPacket(&creator_), |
- !kIncludeDiversificationNonce, PACKET_1BYTE_PACKET_NUMBER), |
- creator_.BytesFree()); |
- |
- // Add a variety of frame types and then a padding frame. |
- QuicAckFrame ack_frame(MakeAckFrame(0u)); |
- EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(4u, consumed); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- |
- QuicPaddingFrame padding_frame; |
- EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(padding_frame))); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- EXPECT_EQ(0u, creator_.BytesFree()); |
- |
- // Packet is full. Creator will flush. |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); |
- |
- // Ensure the packet is successfully created. |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty()); |
- const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames; |
- ASSERT_EQ(1u, retransmittable.size()); |
- EXPECT_EQ(STREAM_FRAME, retransmittable[0].type); |
- ASSERT_TRUE(retransmittable[0].stream_frame); |
- DeleteSerializedPacket(); |
- |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- EXPECT_EQ(max_plaintext_size - |
- GetPacketHeaderSize( |
- client_framer_.version(), creator_.connection_id_length(), |
- QuicPacketCreatorPeer::SendVersionInPacket(&creator_), |
- /*include_path_id=*/false, !kIncludeDiversificationNonce, |
- PACKET_1BYTE_PACKET_NUMBER), |
- creator_.BytesFree()); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SerializeAndSendStreamFrame) { |
- if (!GetParam().version_serialization) { |
- creator_.StopSendingVersion(); |
- } |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- |
- QuicIOVector iov(MakeIOVector("test")); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- ALIGNAS(64) char encrypted_buffer[kMaxPacketSize]; |
- size_t num_bytes_consumed; |
- creator_.CreateAndSerializeStreamFrame(kHeadersStreamId, iov, 0, 0, true, |
- nullptr, encrypted_buffer, |
- kMaxPacketSize, &num_bytes_consumed); |
- EXPECT_EQ(static_cast<size_t>(4), num_bytes_consumed); |
- |
- // Ensure the packet is successfully created. |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty()); |
- const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames; |
- ASSERT_EQ(1u, retransmittable.size()); |
- EXPECT_EQ(STREAM_FRAME, retransmittable[0].type); |
- ASSERT_TRUE(retransmittable[0].stream_frame); |
- DeleteSerializedPacket(); |
- |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) { |
- if (!GetParam().version_serialization) { |
- creator_.StopSendingVersion(); |
- } |
- creator_.SetMaxPacketLength(kMaxPacketSize); |
- |
- // Serialized length of ack frame with 2000 nack ranges should be limited by |
- // the number of nack ranges that can be fit in an ack frame. |
- QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); |
- size_t frame_len = client_framer_.GetSerializedFrameLength( |
- QuicFrame(&ack_frame), creator_.BytesFree(), true, true, |
- PACKET_1BYTE_PACKET_NUMBER); |
- EXPECT_GT(creator_.BytesFree(), frame_len); |
- EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); |
- |
- // Add ack frame to creator. |
- EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); |
- EXPECT_LT(0u, creator_.BytesFree()); |
- |
- // Make sure that an additional stream frame can be added to the packet. |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(2u, io_vector, 0u, 0u, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(4u, consumed); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- |
- // Ensure the packet is successfully created, and the packet size estimate |
- // matches the serialized packet length. |
- if (GetParam().version <= QUIC_VERSION_33) { |
- EXPECT_CALL(entropy_calculator_, EntropyHash(_)) |
- .WillOnce(testing::Return(0)); |
- } |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- size_t est_packet_size = creator_.PacketSize(); |
- creator_.Flush(); |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- EXPECT_EQ(est_packet_size, client_framer_.GetMaxPlaintextSize( |
- serialized_packet_.encrypted_length)); |
- DeleteSerializedPacket(); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) { |
- if (!GetParam().version_serialization) { |
- creator_.StopSendingVersion(); |
- } |
- creator_.SetMaxPacketLength(500u); |
- |
- const size_t max_plaintext_size = |
- client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); |
- EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree()); |
- |
- // Serialized length of ack frame with 2000 nack ranges should be limited by |
- // the packet size. |
- QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); |
- size_t frame_len = client_framer_.GetSerializedFrameLength( |
- QuicFrame(&ack_frame), creator_.BytesFree(), true, true, |
- PACKET_1BYTE_PACKET_NUMBER); |
- EXPECT_EQ(creator_.BytesFree(), frame_len); |
- |
- // Add ack frame to creator. |
- EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- EXPECT_EQ(client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()), |
- creator_.PacketSize()); |
- EXPECT_EQ(0u, creator_.BytesFree()); |
- |
- // Ensure the packet is successfully created, and the packet size estimate |
- // may not match the serialized packet length. |
- if (GetParam().version <= QUIC_VERSION_33) { |
- EXPECT_CALL(entropy_calculator_, EntropyHash(_)).WillOnce(Return(0)); |
- } |
- size_t est_packet_size = creator_.PacketSize(); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.Flush(); |
- ASSERT_TRUE(serialized_packet_.encrypted_buffer); |
- EXPECT_GE(est_packet_size, client_framer_.GetMaxPlaintextSize( |
- serialized_packet_.encrypted_length)); |
- DeleteSerializedPacket(); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, EntropyFlag) { |
- frames_.push_back( |
- QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); |
- |
- for (int i = 0; i < 2; ++i) { |
- for (int j = 0; j < 64; ++j) { |
- SerializedPacket serialized = SerializeAllFrames(frames_); |
- // Verify both BoolSource and hash algorithm. |
- bool expected_rand_bool = |
- (mock_random_.RandUint64() & (UINT64_C(1) << j)) != 0; |
- bool observed_rand_bool = |
- (serialized.entropy_hash & (1 << ((j + 1) % 8))) != 0; |
- uint8_t rest_of_hash = serialized.entropy_hash & ~(1 << ((j + 1) % 8)); |
- EXPECT_EQ(expected_rand_bool, observed_rand_bool); |
- EXPECT_EQ(0, rest_of_hash); |
- } |
- // After 64 calls, BoolSource will refresh the bucket - make sure it does. |
- mock_random_.ChangeValue(); |
- } |
- |
- delete frames_[0].stream_frame; |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SetCurrentPath) { |
- // Current path is the default path. |
- EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); |
- EXPECT_EQ(0u, creator_.packet_number()); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- // Add a stream frame to the creator. |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(4u, consumed); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- EXPECT_EQ(0u, creator_.packet_number()); |
- |
- // Change current path. |
- QuicPathId kPathId1 = 1; |
- EXPECT_DFATAL(creator_.SetCurrentPath(kPathId1, 1, 0), |
- "Unable to change paths when a packet is under construction"); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .Times(1) |
- .WillRepeatedly( |
- Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); |
- creator_.Flush(); |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- creator_.SetCurrentPath(kPathId1, 1, 0); |
- EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- EXPECT_EQ(0u, creator_.packet_number()); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- // Change current path back. |
- creator_.SetCurrentPath(kDefaultPathId, 2, 1); |
- EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); |
- EXPECT_EQ(1u, creator_.packet_number()); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- // Add a stream frame to the creator. |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(4u, consumed); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- |
- // Does not change current path. |
- creator_.SetCurrentPath(kDefaultPathId, 2, 0); |
- EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- EXPECT_EQ(1u, creator_.packet_number()); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, |
- SetCurrentPathAndUpdatePacketSequenceNumberLength) { |
- FLAGS_quic_simple_packet_number_length = false; |
- // Current path is the default path. |
- EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 - 2); |
- // Add a stream frame to the creator and send the packet. |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .Times(1) |
- .WillRepeatedly( |
- Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); |
- creator_.Flush(); |
- EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number()); |
- creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- // Change current path. |
- QuicPathId kPathId1 = 1; |
- creator_.SetCurrentPath(kPathId1, 1, 0); |
- EXPECT_EQ(0u, creator_.packet_number()); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
- |
- // Change current path back. |
- creator_.SetCurrentPath(kDefaultPathId, 2, 10000 / kDefaultMaxPacketSize); |
- EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number()); |
- EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, SerializePacketOnDifferentPath) { |
- // Current path is the default path. |
- EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); |
- EXPECT_EQ(0u, creator_.packet_number()); |
- // Add a stream frame to the creator and flush the packet. |
- QuicFrame frame; |
- QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- size_t consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(4u, consumed); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- EXPECT_EQ(0u, creator_.packet_number()); |
- EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
- .WillRepeatedly( |
- Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- creator_.Flush(); |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- EXPECT_EQ(1u, creator_.packet_number()); |
- // Verify serialized data packet's path id. |
- EXPECT_EQ(kDefaultPathId, serialized_packet_.path_id); |
- DeleteSerializedPacket(); |
- |
- // Change to path 1. |
- QuicPathId kPathId1 = 1; |
- creator_.SetCurrentPath(kPathId1, 1, 0); |
- EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); |
- EXPECT_FALSE(creator_.HasPendingFrames()); |
- EXPECT_EQ(0u, creator_.packet_number()); |
- EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
- QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
- |
- // Add a stream frame to the creator and flush the packet. |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
- ASSERT_TRUE(frame.stream_frame); |
- consumed = frame.stream_frame->data_length; |
- EXPECT_EQ(4u, consumed); |
- EXPECT_TRUE(creator_.HasPendingFrames()); |
- creator_.Flush(); |
- // Verify serialized data packet's path id. |
- EXPECT_EQ(kPathId1, serialized_packet_.path_id); |
- DeleteSerializedPacket(); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, AddUnencryptedStreamDataClosesConnection) { |
- FLAGS_quic_never_write_unencrypted_data = true; |
- EXPECT_CALL(delegate_, OnUnrecoverableError(_, _, _)); |
- QuicStreamFrame stream_frame(kHeadersStreamId, /*fin=*/false, 0u, |
- StringPiece()); |
- EXPECT_DFATAL(creator_.AddSavedFrame(QuicFrame(&stream_frame)), |
- "Cannot send stream data without encryption."); |
-} |
- |
-TEST_P(QuicPacketCreatorTest, ChloTooLarge) { |
- CryptoHandshakeMessage message; |
- message.set_tag(kCHLO); |
- message.set_minimum_size(kMaxPacketSize); |
- CryptoFramer framer; |
- std::unique_ptr<QuicData> message_data; |
- message_data.reset(framer.ConstructHandshakeMessage(message)); |
- |
- struct iovec iov; |
- QuicIOVector data_iovec(::net::MakeIOVector( |
- StringPiece(message_data->data(), message_data->length()), &iov)); |
- QuicFrame frame; |
- EXPECT_CALL(delegate_, |
- OnUnrecoverableError(QUIC_CRYPTO_CHLO_TOO_LARGE, _, _)); |
- EXPECT_DFATAL( |
- creator_.ConsumeData(1u, data_iovec, 0u, 0u, false, false, &frame), |
- "Client hello won't fit in a single packet."); |
-} |
- |
-} // namespace |
-} // namespace test |
-} // namespace net |