Index: net/quic/core/quic_packet_creator_test.cc |
diff --git a/net/quic/core/quic_packet_creator_test.cc b/net/quic/core/quic_packet_creator_test.cc |
index bf099f61d86a30d2bd93d53238486bce9b75779c..01bd50e5f96edf426134259813c5c9f8b1f55ec8 100644 |
--- a/net/quic/core/quic_packet_creator_test.cc |
+++ b/net/quic/core/quic_packet_creator_test.cc |
@@ -138,8 +138,6 @@ class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> { |
client_framer_.set_visitor(&framer_visitor_); |
client_framer_.set_received_entropy_calculator(&entropy_calculator_); |
server_framer_.set_visitor(&framer_visitor_); |
- // TODO(ianswett): Fix this test so it uses a non-null encrypter. |
- FLAGS_quic_never_write_unencrypted_data = false; |
} |
~QuicPacketCreatorTest() override { |
@@ -252,10 +250,10 @@ TEST_P(QuicPacketCreatorTest, SerializeFrames) { |
EncryptionLevel level = static_cast<EncryptionLevel>(i); |
creator_.set_encryption_level(level); |
frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); |
- frames_.push_back( |
- QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); |
- frames_.push_back( |
- QuicFrame(new QuicStreamFrame(0u, true, 0u, StringPiece()))); |
+ frames_.push_back(QuicFrame( |
+ new QuicStreamFrame(kCryptoStreamId, false, 0u, StringPiece()))); |
+ frames_.push_back(QuicFrame( |
+ new QuicStreamFrame(kCryptoStreamId, true, 0u, StringPiece()))); |
SerializedPacket serialized = SerializeAllFrames(frames_); |
EXPECT_EQ(level, serialized.encryption_level); |
delete frames_[0].ack_frame; |
@@ -641,8 +639,8 @@ TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) { |
TEST_P(QuicPacketCreatorTest, ConsumeData) { |
QuicFrame frame; |
QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, false, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
size_t consumed = frame.stream_frame->data_length; |
EXPECT_EQ(4u, consumed); |
@@ -653,8 +651,8 @@ TEST_P(QuicPacketCreatorTest, ConsumeData) { |
TEST_P(QuicPacketCreatorTest, ConsumeDataFin) { |
QuicFrame frame; |
QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 10u, true, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 10u, true, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
size_t consumed = frame.stream_frame->data_length; |
EXPECT_EQ(4u, consumed); |
@@ -665,7 +663,8 @@ TEST_P(QuicPacketCreatorTest, ConsumeDataFin) { |
TEST_P(QuicPacketCreatorTest, ConsumeDataFinOnly) { |
QuicFrame frame; |
QuicIOVector io_vector(nullptr, 0, 0); |
- ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, true, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
size_t consumed = frame.stream_frame->data_length; |
EXPECT_EQ(0u, consumed); |
@@ -674,6 +673,7 @@ TEST_P(QuicPacketCreatorTest, ConsumeDataFinOnly) { |
} |
TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) { |
+ creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); |
const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + |
GetEncryptionOverhead(); |
for (size_t i = overhead; i < overhead + 100; ++i) { |
@@ -698,6 +698,7 @@ TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) { |
} |
TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) { |
+ creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); |
// Compute the total overhead for a single frame in packet. |
const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + |
GetEncryptionOverhead() + GetStreamFrameOverhead(); |
@@ -762,6 +763,7 @@ TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) { |
} |
TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) { |
+ creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); |
// Compute the total overhead for a single frame in packet. |
const size_t overhead = GetPacketHeaderOverhead(client_framer_.version()) + |
GetEncryptionOverhead() + GetStreamFrameOverhead(); |
@@ -916,8 +918,8 @@ TEST_P(QuicPacketCreatorTest, SerializeFrame) { |
if (!GetParam().version_serialization) { |
creator_.StopSendingVersion(); |
} |
- frames_.push_back( |
- QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); |
+ frames_.push_back(QuicFrame( |
+ new QuicStreamFrame(kCryptoStreamId, false, 0u, StringPiece()))); |
SerializedPacket serialized = SerializeAllFrames(frames_); |
delete frames_[0].stream_frame; |
@@ -955,7 +957,8 @@ TEST_P(QuicPacketCreatorTest, ConsumeDataLargerThanOneStreamFrame) { |
QuicIOVector io_vector(MakeIOVector(too_long_payload)); |
EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
.WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); |
- ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, true, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
size_t consumed = frame.stream_frame->data_length; |
EXPECT_EQ(payload_length, consumed); |
@@ -987,8 +990,8 @@ TEST_P(QuicPacketCreatorTest, AddFrameAndFlush) { |
QuicFrame frame; |
QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, false, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
size_t consumed = frame.stream_frame->data_length; |
EXPECT_EQ(4u, consumed); |
@@ -1050,6 +1053,7 @@ TEST_P(QuicPacketCreatorTest, SerializeAndSendStreamFrame) { |
} |
TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) { |
+ creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); |
if (!GetParam().version_serialization) { |
creator_.StopSendingVersion(); |
} |
@@ -1137,8 +1141,8 @@ TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) { |
} |
TEST_P(QuicPacketCreatorTest, EntropyFlag) { |
- frames_.push_back( |
- QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); |
+ frames_.push_back(QuicFrame( |
+ new QuicStreamFrame(kCryptoStreamId, false, 0u, StringPiece()))); |
for (int i = 0; i < 2; ++i) { |
for (int j = 0; j < 64; ++j) { |
@@ -1168,8 +1172,8 @@ TEST_P(QuicPacketCreatorTest, SetCurrentPath) { |
// Add a stream frame to the creator. |
QuicFrame frame; |
QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, false, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
size_t consumed = frame.stream_frame->data_length; |
EXPECT_EQ(4u, consumed); |
@@ -1200,8 +1204,8 @@ TEST_P(QuicPacketCreatorTest, SetCurrentPath) { |
EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, |
QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
// Add a stream frame to the creator. |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, false, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
consumed = frame.stream_frame->data_length; |
EXPECT_EQ(4u, consumed); |
@@ -1229,8 +1233,8 @@ TEST_P(QuicPacketCreatorTest, |
// Add a stream frame to the creator and send the packet. |
QuicFrame frame; |
QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, false, |
+ false, &frame)); |
EXPECT_CALL(delegate_, OnSerializedPacket(_)) |
.Times(1) |
.WillRepeatedly( |
@@ -1262,8 +1266,8 @@ TEST_P(QuicPacketCreatorTest, SerializePacketOnDifferentPath) { |
// Add a stream frame to the creator and flush the packet. |
QuicFrame frame; |
QuicIOVector io_vector(MakeIOVector("test")); |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, false, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
size_t consumed = frame.stream_frame->data_length; |
EXPECT_EQ(4u, consumed); |
@@ -1289,8 +1293,8 @@ TEST_P(QuicPacketCreatorTest, SerializePacketOnDifferentPath) { |
QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); |
// Add a stream frame to the creator and flush the packet. |
- ASSERT_TRUE( |
- creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); |
+ ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, 0u, false, |
+ false, &frame)); |
ASSERT_TRUE(frame.stream_frame); |
consumed = frame.stream_frame->data_length; |
EXPECT_EQ(4u, consumed); |
@@ -1302,7 +1306,7 @@ TEST_P(QuicPacketCreatorTest, SerializePacketOnDifferentPath) { |
} |
TEST_P(QuicPacketCreatorTest, AddUnencryptedStreamDataClosesConnection) { |
- FLAGS_quic_never_write_unencrypted_data = true; |
+ creator_.set_encryption_level(ENCRYPTION_NONE); |
EXPECT_CALL(delegate_, OnUnrecoverableError(_, _, _)); |
QuicStreamFrame stream_frame(kHeadersStreamId, /*fin=*/false, 0u, |
StringPiece()); |
@@ -1324,9 +1328,9 @@ TEST_P(QuicPacketCreatorTest, ChloTooLarge) { |
QuicFrame frame; |
EXPECT_CALL(delegate_, |
OnUnrecoverableError(QUIC_CRYPTO_CHLO_TOO_LARGE, _, _)); |
- EXPECT_QUIC_BUG( |
- creator_.ConsumeData(1u, data_iovec, 0u, 0u, false, false, &frame), |
- "Client hello won't fit in a single packet."); |
+ EXPECT_QUIC_BUG(creator_.ConsumeData(kCryptoStreamId, data_iovec, 0u, 0u, |
+ false, false, &frame), |
+ "Client hello won't fit in a single packet."); |
} |
} // namespace |