Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(184)

Side by Side Diff: net/quic/quic_crypto_client_stream_test.cc

Issue 266243004: Clang format slam. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/quic_crypto_client_stream.h" 5 #include "net/quic/quic_crypto_client_stream.h"
6 6
7 #include "base/memory/scoped_ptr.h" 7 #include "base/memory/scoped_ptr.h"
8 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h" 8 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h"
9 #include "net/quic/crypto/quic_decrypter.h" 9 #include "net/quic/crypto/quic_decrypter.h"
10 #include "net/quic/crypto/quic_encrypter.h" 10 #include "net/quic/crypto/quic_encrypter.h"
(...skipping 12 matching lines...) Expand all
23 23
24 const char kServerHostname[] = "example.com"; 24 const char kServerHostname[] = "example.com";
25 const uint16 kServerPort = 80; 25 const uint16 kServerPort = 80;
26 26
27 class QuicCryptoClientStreamTest : public ::testing::Test { 27 class QuicCryptoClientStreamTest : public ::testing::Test {
28 public: 28 public:
29 QuicCryptoClientStreamTest() 29 QuicCryptoClientStreamTest()
30 : connection_(new PacketSavingConnection(false)), 30 : connection_(new PacketSavingConnection(false)),
31 session_(new TestClientSession(connection_, DefaultQuicConfig())), 31 session_(new TestClientSession(connection_, DefaultQuicConfig())),
32 server_id_(kServerHostname, kServerPort, false, PRIVACY_MODE_DISABLED), 32 server_id_(kServerHostname, kServerPort, false, PRIVACY_MODE_DISABLED),
33 stream_(new QuicCryptoClientStream( 33 stream_(new QuicCryptoClientStream(server_id_,
34 server_id_, session_.get(), NULL, &crypto_config_)) { 34 session_.get(),
35 NULL,
36 &crypto_config_)) {
35 session_->SetCryptoStream(stream_.get()); 37 session_->SetCryptoStream(stream_.get());
36 session_->config()->SetDefaults(); 38 session_->config()->SetDefaults();
37 crypto_config_.SetDefaults(); 39 crypto_config_.SetDefaults();
38 } 40 }
39 41
40 void CompleteCryptoHandshake() { 42 void CompleteCryptoHandshake() {
41 EXPECT_TRUE(stream_->CryptoConnect()); 43 EXPECT_TRUE(stream_->CryptoConnect());
42 CryptoTestUtils::HandshakeWithFakeServer(connection_, stream_.get()); 44 CryptoTestUtils::HandshakeWithFakeServer(connection_, stream_.get());
43 } 45 }
44 46
(...skipping 18 matching lines...) Expand all
63 65
64 TEST_F(QuicCryptoClientStreamTest, ConnectedAfterSHLO) { 66 TEST_F(QuicCryptoClientStreamTest, ConnectedAfterSHLO) {
65 CompleteCryptoHandshake(); 67 CompleteCryptoHandshake();
66 EXPECT_TRUE(stream_->encryption_established()); 68 EXPECT_TRUE(stream_->encryption_established());
67 EXPECT_TRUE(stream_->handshake_confirmed()); 69 EXPECT_TRUE(stream_->handshake_confirmed());
68 } 70 }
69 71
70 TEST_F(QuicCryptoClientStreamTest, MessageAfterHandshake) { 72 TEST_F(QuicCryptoClientStreamTest, MessageAfterHandshake) {
71 CompleteCryptoHandshake(); 73 CompleteCryptoHandshake();
72 74
73 EXPECT_CALL(*connection_, SendConnectionClose( 75 EXPECT_CALL(
74 QUIC_CRYPTO_MESSAGE_AFTER_HANDSHAKE_COMPLETE)); 76 *connection_,
77 SendConnectionClose(QUIC_CRYPTO_MESSAGE_AFTER_HANDSHAKE_COMPLETE));
75 message_.set_tag(kCHLO); 78 message_.set_tag(kCHLO);
76 ConstructHandshakeMessage(); 79 ConstructHandshakeMessage();
77 stream_->ProcessRawData(message_data_->data(), message_data_->length()); 80 stream_->ProcessRawData(message_data_->data(), message_data_->length());
78 } 81 }
79 82
80 TEST_F(QuicCryptoClientStreamTest, BadMessageType) { 83 TEST_F(QuicCryptoClientStreamTest, BadMessageType) {
81 EXPECT_TRUE(stream_->CryptoConnect()); 84 EXPECT_TRUE(stream_->CryptoConnect());
82 85
83 message_.set_tag(kCHLO); 86 message_.set_tag(kCHLO);
84 ConstructHandshakeMessage(); 87 ConstructHandshakeMessage();
85 88
86 EXPECT_CALL(*connection_, SendConnectionCloseWithDetails( 89 EXPECT_CALL(*connection_,
87 QUIC_INVALID_CRYPTO_MESSAGE_TYPE, "Expected REJ")); 90 SendConnectionCloseWithDetails(QUIC_INVALID_CRYPTO_MESSAGE_TYPE,
91 "Expected REJ"));
88 stream_->ProcessRawData(message_data_->data(), message_data_->length()); 92 stream_->ProcessRawData(message_data_->data(), message_data_->length());
89 } 93 }
90 94
91 TEST_F(QuicCryptoClientStreamTest, NegotiatedParameters) { 95 TEST_F(QuicCryptoClientStreamTest, NegotiatedParameters) {
92 CompleteCryptoHandshake(); 96 CompleteCryptoHandshake();
93 97
94 const QuicConfig* config = session_->config(); 98 const QuicConfig* config = session_->config();
95 EXPECT_EQ(FLAGS_enable_quic_pacing ? kPACE : kQBIC, 99 EXPECT_EQ(FLAGS_enable_quic_pacing ? kPACE : kQBIC,
96 config->congestion_control()); 100 config->congestion_control());
97 EXPECT_EQ(kDefaultTimeoutSecs, 101 EXPECT_EQ(kDefaultTimeoutSecs,
98 config->idle_connection_state_lifetime().ToSeconds()); 102 config->idle_connection_state_lifetime().ToSeconds());
99 EXPECT_EQ(kDefaultMaxStreamsPerConnection, 103 EXPECT_EQ(kDefaultMaxStreamsPerConnection,
100 config->max_streams_per_connection()); 104 config->max_streams_per_connection());
101 EXPECT_EQ(0, config->keepalive_timeout().ToSeconds()); 105 EXPECT_EQ(0, config->keepalive_timeout().ToSeconds());
102 106
103 const QuicCryptoNegotiatedParameters& crypto_params( 107 const QuicCryptoNegotiatedParameters& crypto_params(
104 stream_->crypto_negotiated_params()); 108 stream_->crypto_negotiated_params());
105 EXPECT_EQ(crypto_config_.aead[0], crypto_params.aead); 109 EXPECT_EQ(crypto_config_.aead[0], crypto_params.aead);
106 EXPECT_EQ(crypto_config_.kexs[0], crypto_params.key_exchange); 110 EXPECT_EQ(crypto_config_.kexs[0], crypto_params.key_exchange);
107 } 111 }
108 112
109 TEST_F(QuicCryptoClientStreamTest, InvalidHostname) { 113 TEST_F(QuicCryptoClientStreamTest, InvalidHostname) {
110 QuicServerId server_id("invalid", 80, false, PRIVACY_MODE_DISABLED); 114 QuicServerId server_id("invalid", 80, false, PRIVACY_MODE_DISABLED);
111 stream_.reset(new QuicCryptoClientStream(server_id, session_.get(), NULL, 115 stream_.reset(new QuicCryptoClientStream(
112 &crypto_config_)); 116 server_id, session_.get(), NULL, &crypto_config_));
113 session_->SetCryptoStream(stream_.get()); 117 session_->SetCryptoStream(stream_.get());
114 118
115 CompleteCryptoHandshake(); 119 CompleteCryptoHandshake();
116 EXPECT_TRUE(stream_->encryption_established()); 120 EXPECT_TRUE(stream_->encryption_established());
117 EXPECT_TRUE(stream_->handshake_confirmed()); 121 EXPECT_TRUE(stream_->handshake_confirmed());
118 } 122 }
119 123
120 TEST_F(QuicCryptoClientStreamTest, ExpiredServerConfig) { 124 TEST_F(QuicCryptoClientStreamTest, ExpiredServerConfig) {
121 // Seed the config with a cached server config. 125 // Seed the config with a cached server config.
122 CompleteCryptoHandshake(); 126 CompleteCryptoHandshake();
123 127
124 connection_ = new PacketSavingConnection(true); 128 connection_ = new PacketSavingConnection(true);
125 session_.reset(new TestClientSession(connection_, DefaultQuicConfig())); 129 session_.reset(new TestClientSession(connection_, DefaultQuicConfig()));
126 stream_.reset(new QuicCryptoClientStream(server_id_, session_.get(), NULL, 130 stream_.reset(new QuicCryptoClientStream(
127 &crypto_config_)); 131 server_id_, session_.get(), NULL, &crypto_config_));
128 132
129 session_->SetCryptoStream(stream_.get()); 133 session_->SetCryptoStream(stream_.get());
130 session_->config()->SetDefaults(); 134 session_->config()->SetDefaults();
131 135
132 // Advance time 5 years to ensure that we pass the expiry time of the cached 136 // Advance time 5 years to ensure that we pass the expiry time of the cached
133 // server config. 137 // server config.
134 reinterpret_cast<MockClock*>(const_cast<QuicClock*>(connection_->clock())) 138 reinterpret_cast<MockClock*>(const_cast<QuicClock*>(connection_->clock()))
135 ->AdvanceTime(QuicTime::Delta::FromSeconds(60 * 60 * 24 * 365 * 5)); 139 ->AdvanceTime(QuicTime::Delta::FromSeconds(60 * 60 * 24 * 365 * 5));
136 140
137 // Check that a client hello was sent and that CryptoConnect doesn't fail 141 // Check that a client hello was sent and that CryptoConnect doesn't fail
138 // with an error. 142 // with an error.
139 EXPECT_TRUE(stream_->CryptoConnect()); 143 EXPECT_TRUE(stream_->CryptoConnect());
140 ASSERT_EQ(1u, connection_->packets_.size()); 144 ASSERT_EQ(1u, connection_->packets_.size());
141 } 145 }
142 146
143 } // namespace 147 } // namespace
144 } // namespace test 148 } // namespace test
145 } // namespace net 149 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698