| Index: net/quic/quic_connection_test.cc
|
| diff --git a/net/quic/quic_connection_test.cc b/net/quic/quic_connection_test.cc
|
| index 3a0c172754504510c78a7ca3a05564e5ebc61d1d..a93905465995ed1fd950c83ffc71d1d6721f7ab0 100644
|
| --- a/net/quic/quic_connection_test.cc
|
| +++ b/net/quic/quic_connection_test.cc
|
| @@ -67,8 +67,7 @@ const QuicStreamId kStreamId5 = 5;
|
| class TestReceiveAlgorithm : public ReceiveAlgorithmInterface {
|
| public:
|
| explicit TestReceiveAlgorithm(QuicCongestionFeedbackFrame* feedback)
|
| - : feedback_(feedback) {
|
| - }
|
| + : feedback_(feedback) {}
|
|
|
| bool GenerateCongestionFeedback(
|
| QuicCongestionFeedbackFrame* congestion_feedback) {
|
| @@ -91,9 +90,7 @@ class TestReceiveAlgorithm : public ReceiveAlgorithmInterface {
|
| // TaggingEncrypter appends kTagSize bytes of |tag| to the end of each message.
|
| class TaggingEncrypter : public QuicEncrypter {
|
| public:
|
| - explicit TaggingEncrypter(uint8 tag)
|
| - : tag_(tag) {
|
| - }
|
| + explicit TaggingEncrypter(uint8 tag) : tag_(tag) {}
|
|
|
| virtual ~TaggingEncrypter() {}
|
|
|
| @@ -133,13 +130,9 @@ class TaggingEncrypter : public QuicEncrypter {
|
| return plaintext_size + kTagSize;
|
| }
|
|
|
| - virtual StringPiece GetKey() const OVERRIDE {
|
| - return StringPiece();
|
| - }
|
| + virtual StringPiece GetKey() const OVERRIDE { return StringPiece(); }
|
|
|
| - virtual StringPiece GetNoncePrefix() const OVERRIDE {
|
| - return StringPiece();
|
| - }
|
| + virtual StringPiece GetNoncePrefix() const OVERRIDE { return StringPiece(); }
|
|
|
| private:
|
| enum {
|
| @@ -191,8 +184,8 @@ class TaggingDecrypter : public QuicDecrypter {
|
| const size_t len = ciphertext.size() - kTagSize;
|
| uint8* buf = new uint8[len];
|
| memcpy(buf, ciphertext.data(), len);
|
| - return new QuicData(reinterpret_cast<char*>(buf), len,
|
| - true /* owns buffer */);
|
| + return new QuicData(
|
| + reinterpret_cast<char*>(buf), len, true /* owns buffer */);
|
| }
|
|
|
| virtual StringPiece GetKey() const OVERRIDE { return StringPiece(); }
|
| @@ -200,7 +193,7 @@ class TaggingDecrypter : public QuicDecrypter {
|
|
|
| protected:
|
| virtual uint8 GetTag(StringPiece ciphertext) {
|
| - return ciphertext.data()[ciphertext.size()-1];
|
| + return ciphertext.data()[ciphertext.size() - 1];
|
| }
|
|
|
| private:
|
| @@ -227,9 +220,7 @@ class StrictTaggingDecrypter : public TaggingDecrypter {
|
| virtual ~StrictTaggingDecrypter() {}
|
|
|
| // TaggingQuicDecrypter
|
| - virtual uint8 GetTag(StringPiece ciphertext) OVERRIDE {
|
| - return tag_;
|
| - }
|
| + virtual uint8 GetTag(StringPiece ciphertext) OVERRIDE { return tag_; }
|
|
|
| private:
|
| const uint8 tag_;
|
| @@ -239,9 +230,7 @@ class TestConnectionHelper : public QuicConnectionHelperInterface {
|
| public:
|
| class TestAlarm : public QuicAlarm {
|
| public:
|
| - explicit TestAlarm(QuicAlarm::Delegate* delegate)
|
| - : QuicAlarm(delegate) {
|
| - }
|
| + explicit TestAlarm(QuicAlarm::Delegate* delegate) : QuicAlarm(delegate) {}
|
|
|
| virtual void SetImpl() OVERRIDE {}
|
| virtual void CancelImpl() OVERRIDE {}
|
| @@ -249,15 +238,12 @@ class TestConnectionHelper : public QuicConnectionHelperInterface {
|
| };
|
|
|
| TestConnectionHelper(MockClock* clock, MockRandom* random_generator)
|
| - : clock_(clock),
|
| - random_generator_(random_generator) {
|
| + : clock_(clock), random_generator_(random_generator) {
|
| clock_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
|
| }
|
|
|
| // QuicConnectionHelperInterface
|
| - virtual const QuicClock* GetClock() const OVERRIDE {
|
| - return clock_;
|
| - }
|
| + virtual const QuicClock* GetClock() const OVERRIDE { return clock_; }
|
|
|
| virtual QuicRandom* GetRandomGenerator() OVERRIDE {
|
| return random_generator_;
|
| @@ -286,20 +272,20 @@ class TestPacketWriter : public QuicPacketWriter {
|
| final_bytes_of_last_packet_(0),
|
| final_bytes_of_previous_packet_(0),
|
| use_tagging_decrypter_(false),
|
| - packets_write_attempts_(0) {
|
| - }
|
| + packets_write_attempts_(0) {}
|
|
|
| // QuicPacketWriter interface
|
| - virtual WriteResult WritePacket(
|
| - const char* buffer, size_t buf_len,
|
| - const IPAddressNumber& self_address,
|
| - const IPEndPoint& peer_address) OVERRIDE {
|
| + virtual WriteResult WritePacket(const char* buffer,
|
| + size_t buf_len,
|
| + const IPAddressNumber& self_address,
|
| + const IPEndPoint& peer_address) OVERRIDE {
|
| QuicEncryptedPacket packet(buffer, buf_len);
|
| ++packets_write_attempts_;
|
|
|
| if (packet.length() >= sizeof(final_bytes_of_last_packet_)) {
|
| final_bytes_of_previous_packet_ = final_bytes_of_last_packet_;
|
| - memcpy(&final_bytes_of_last_packet_, packet.data() + packet.length() - 4,
|
| + memcpy(&final_bytes_of_last_packet_,
|
| + packet.data() + packet.length() - 4,
|
| sizeof(final_bytes_of_last_packet_));
|
| }
|
|
|
| @@ -356,9 +342,7 @@ class TestPacketWriter : public QuicPacketWriter {
|
| return framer_.ping_frames();
|
| }
|
|
|
| - size_t last_packet_size() {
|
| - return last_packet_size_;
|
| - }
|
| + size_t last_packet_size() { return last_packet_size_; }
|
|
|
| const QuicVersionNegotiationPacket* version_negotiation_packet() {
|
| return framer_.version_negotiation_packet();
|
| @@ -385,9 +369,7 @@ class TestPacketWriter : public QuicPacketWriter {
|
| return final_bytes_of_previous_packet_;
|
| }
|
|
|
| - void use_tagging_decrypter() {
|
| - use_tagging_decrypter_ = true;
|
| - }
|
| + void use_tagging_decrypter() { use_tagging_decrypter_ = true; }
|
|
|
| uint32 packets_write_attempts() { return packets_write_attempts_; }
|
|
|
| @@ -421,7 +403,11 @@ class TestConnection : public QuicConnection {
|
| bool is_server,
|
| QuicVersion version,
|
| uint32 flow_control_send_window)
|
| - : QuicConnection(connection_id, address, helper, writer, is_server,
|
| + : QuicConnection(connection_id,
|
| + address,
|
| + helper,
|
| + writer,
|
| + is_server,
|
| SupportedVersions(version),
|
| flow_control_send_window),
|
| writer_(writer) {
|
| @@ -431,12 +417,10 @@ class TestConnection : public QuicConnection {
|
| writer_->set_is_server(is_server);
|
| }
|
|
|
| - void SendAck() {
|
| - QuicConnectionPeer::SendAck(this);
|
| - }
|
| + void SendAck() { QuicConnectionPeer::SendAck(this); }
|
|
|
| void SetReceiveAlgorithm(TestReceiveAlgorithm* receive_algorithm) {
|
| - QuicConnectionPeer::SetReceiveAlgorithm(this, receive_algorithm);
|
| + QuicConnectionPeer::SetReceiveAlgorithm(this, receive_algorithm);
|
| }
|
|
|
| void SetSendAlgorithm(SendAlgorithmInterface* send_algorithm) {
|
| @@ -454,11 +438,14 @@ class TestConnection : public QuicConnection {
|
| QuicPacketEntropyHash entropy_hash,
|
| HasRetransmittableData retransmittable) {
|
| RetransmittableFrames* retransmittable_frames =
|
| - retransmittable == HAS_RETRANSMITTABLE_DATA ?
|
| - new RetransmittableFrames() : NULL;
|
| - OnSerializedPacket(
|
| - SerializedPacket(sequence_number, PACKET_6BYTE_SEQUENCE_NUMBER,
|
| - packet, entropy_hash, retransmittable_frames));
|
| + retransmittable == HAS_RETRANSMITTABLE_DATA
|
| + ? new RetransmittableFrames()
|
| + : NULL;
|
| + OnSerializedPacket(SerializedPacket(sequence_number,
|
| + PACKET_6BYTE_SEQUENCE_NUMBER,
|
| + packet,
|
| + entropy_hash,
|
| + retransmittable_frames));
|
| }
|
|
|
| QuicConsumedData SendStreamDataWithString(
|
| @@ -501,9 +488,7 @@ class TestConnection : public QuicConnection {
|
| return consumed;
|
| }
|
|
|
| - bool is_server() {
|
| - return QuicConnectionPeer::IsServer(this);
|
| - }
|
| + bool is_server() { return QuicConnectionPeer::IsServer(this); }
|
|
|
| void set_version(QuicVersion version) {
|
| QuicConnectionPeer::GetFramer(this)->set_version(version);
|
| @@ -569,9 +554,7 @@ class FecQuicConnectionDebugVisitor
|
| }
|
|
|
| // Public accessor method.
|
| - QuicPacketHeader revived_header() const {
|
| - return revived_header_;
|
| - }
|
| + QuicPacketHeader revived_header() const { return revived_header_; }
|
|
|
| private:
|
| QuicPacketHeader revived_header_;
|
| @@ -587,8 +570,12 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| loss_algorithm_(new MockLossAlgorithm()),
|
| helper_(new TestConnectionHelper(&clock_, &random_generator_)),
|
| writer_(new TestPacketWriter(version())),
|
| - connection_(connection_id_, IPEndPoint(), helper_.get(),
|
| - writer_.get(), false, version(),
|
| + connection_(connection_id_,
|
| + IPEndPoint(),
|
| + helper_.get(),
|
| + writer_.get(),
|
| + false,
|
| + version(),
|
| kDefaultFlowControlSendWindow),
|
| frame1_(1, false, 0, MakeIOVector(data1)),
|
| frame2_(1, false, 3, MakeIOVector(data2)),
|
| @@ -600,17 +587,15 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| framer_.set_received_entropy_calculator(&entropy_calculator_);
|
| // Simplify tests by not sending feedback unless specifically configured.
|
| SetFeedback(NULL);
|
| - EXPECT_CALL(
|
| - *send_algorithm_, TimeUntilSend(_, _)).WillRepeatedly(Return(
|
| - QuicTime::Delta::Zero()));
|
| - EXPECT_CALL(*receive_algorithm_,
|
| - RecordIncomingPacket(_, _, _)).Times(AnyNumber());
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillRepeatedly(Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*receive_algorithm_, RecordIncomingPacket(_, _, _))
|
| .Times(AnyNumber());
|
| - EXPECT_CALL(*send_algorithm_, RetransmissionDelay()).WillRepeatedly(
|
| - Return(QuicTime::Delta::Zero()));
|
| - EXPECT_CALL(*send_algorithm_, GetCongestionWindow()).WillRepeatedly(
|
| - Return(kMaxPacketSize));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(AnyNumber());
|
| + EXPECT_CALL(*send_algorithm_, RetransmissionDelay())
|
| + .WillRepeatedly(Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
|
| + .WillRepeatedly(Return(kMaxPacketSize));
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| .WillByDefault(Return(true));
|
| EXPECT_CALL(visitor_, HasPendingWrites()).Times(AnyNumber());
|
| @@ -624,9 +609,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| .WillRepeatedly(Return(SequenceNumberSet()));
|
| }
|
|
|
| - QuicVersion version() {
|
| - return GetParam();
|
| - }
|
| + QuicVersion version() { return GetParam(); }
|
|
|
| QuicAckFrame* outgoing_ack() {
|
| outgoing_ack_.reset(QuicConnectionPeer::CreateAckFrame(&connection_));
|
| @@ -646,9 +629,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| return writer_->stop_waiting_frames()[0].least_unacked;
|
| }
|
|
|
| - void use_tagging_decrypter() {
|
| - writer_->use_tagging_decrypter();
|
| - }
|
| + void use_tagging_decrypter() { writer_->use_tagging_decrypter(); }
|
|
|
| void ProcessPacket(QuicPacketSequenceNumber number) {
|
| EXPECT_CALL(visitor_, OnStreamFrames(_)).Times(1);
|
| @@ -662,9 +643,8 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| connection_.is_server());
|
| SerializedPacket serialized_packet = creator_.SerializeAllFrames(frames);
|
| scoped_ptr<QuicPacket> packet(serialized_packet.packet);
|
| - scoped_ptr<QuicEncryptedPacket> encrypted(
|
| - framer_.EncryptPacket(ENCRYPTION_NONE,
|
| - serialized_packet.sequence_number, *packet));
|
| + scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
|
| + ENCRYPTION_NONE, serialized_packet.sequence_number, *packet));
|
| connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
|
| return serialized_packet.entropy_hash;
|
| }
|
| @@ -672,18 +652,18 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| size_t ProcessDataPacket(QuicPacketSequenceNumber number,
|
| QuicFecGroupNumber fec_group,
|
| bool entropy_flag) {
|
| - return ProcessDataPacketAtLevel(number, fec_group, entropy_flag,
|
| - ENCRYPTION_NONE);
|
| + return ProcessDataPacketAtLevel(
|
| + number, fec_group, entropy_flag, ENCRYPTION_NONE);
|
| }
|
|
|
| size_t ProcessDataPacketAtLevel(QuicPacketSequenceNumber number,
|
| QuicFecGroupNumber fec_group,
|
| bool entropy_flag,
|
| EncryptionLevel level) {
|
| - scoped_ptr<QuicPacket> packet(ConstructDataPacket(number, fec_group,
|
| - entropy_flag));
|
| - scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
|
| - level, number, *packet));
|
| + scoped_ptr<QuicPacket> packet(
|
| + ConstructDataPacket(number, fec_group, entropy_flag));
|
| + scoped_ptr<QuicEncryptedPacket> encrypted(
|
| + framer_.EncryptPacket(level, number, *packet));
|
| connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
|
| return encrypted->length();
|
| }
|
| @@ -691,18 +671,18 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| void ProcessClosePacket(QuicPacketSequenceNumber number,
|
| QuicFecGroupNumber fec_group) {
|
| scoped_ptr<QuicPacket> packet(ConstructClosePacket(number, fec_group));
|
| - scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
|
| - ENCRYPTION_NONE, number, *packet));
|
| + scoped_ptr<QuicEncryptedPacket> encrypted(
|
| + framer_.EncryptPacket(ENCRYPTION_NONE, number, *packet));
|
| connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
|
| }
|
|
|
| size_t ProcessFecProtectedPacket(QuicPacketSequenceNumber number,
|
| - bool expect_revival, bool entropy_flag) {
|
| + bool expect_revival,
|
| + bool entropy_flag) {
|
| if (expect_revival) {
|
| EXPECT_CALL(visitor_, OnStreamFrames(_)).Times(1);
|
| }
|
| - EXPECT_CALL(visitor_, OnStreamFrames(_)).Times(1).
|
| - RetiresOnSaturation();
|
| + EXPECT_CALL(visitor_, OnStreamFrames(_)).Times(1).RetiresOnSaturation();
|
| return ProcessDataPacket(number, 1, entropy_flag);
|
| }
|
|
|
| @@ -748,7 +728,8 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| header_.public_header.connection_id_length,
|
| header_.public_header.version_flag,
|
| header_.public_header.sequence_number_length);
|
| - i < data_packet->length(); ++i) {
|
| + i < data_packet->length();
|
| + ++i) {
|
| data_packet->mutable_data()[i] ^= data_packet->data()[i];
|
| }
|
| }
|
| @@ -776,16 +757,14 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| *last_packet =
|
| QuicConnectionPeer::GetPacketCreator(&connection_)->sequence_number();
|
| }
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .Times(AnyNumber());
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(AnyNumber());
|
| return packet_size;
|
| }
|
|
|
| void SendAckPacketToPeer() {
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(1);
|
| connection_.SendAck();
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .Times(AnyNumber());
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(AnyNumber());
|
| }
|
|
|
| QuicPacketEntropyHash ProcessAckPacket(QuicAckFrame* frame) {
|
| @@ -821,8 +800,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| QuicFrames frames;
|
| QuicFrame frame(&frame1_);
|
| frames.push_back(frame);
|
| - QuicPacket* packet =
|
| - framer_.BuildUnsizedDataPacket(header_, frames).packet;
|
| + QuicPacket* packet = framer_.BuildUnsizedDataPacket(header_, frames).packet;
|
| EXPECT_TRUE(packet != NULL);
|
| return packet;
|
| }
|
| @@ -844,8 +822,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| QuicFrames frames;
|
| QuicFrame frame(&qccf);
|
| frames.push_back(frame);
|
| - QuicPacket* packet =
|
| - framer_.BuildUnsizedDataPacket(header_, frames).packet;
|
| + QuicPacket* packet = framer_.BuildUnsizedDataPacket(header_, frames).packet;
|
| EXPECT_TRUE(packet != NULL);
|
| return packet;
|
| }
|
| @@ -860,7 +837,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| }
|
|
|
| QuicTime::Delta DefaultDelayedAckTime() {
|
| - return QuicTime::Delta::FromMilliseconds(kMinRetransmissionTimeMs/2);
|
| + return QuicTime::Delta::FromMilliseconds(kMinRetransmissionTimeMs / 2);
|
| }
|
|
|
| // Initialize a frame acknowledging all packets up to largest_observed.
|
| @@ -868,8 +845,8 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| QuicPacketSequenceNumber least_unacked) {
|
| QuicAckFrame frame(MakeAckFrame(largest_observed, least_unacked));
|
| if (largest_observed > 0) {
|
| - frame.received_info.entropy_hash =
|
| - QuicConnectionPeer::GetSentEntropyHash(&connection_, largest_observed);
|
| + frame.received_info.entropy_hash = QuicConnectionPeer::GetSentEntropyHash(
|
| + &connection_, largest_observed);
|
| }
|
| return frame;
|
| }
|
| @@ -884,10 +861,10 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| void NackPacket(QuicPacketSequenceNumber missing, QuicAckFrame* frame) {
|
| frame->received_info.missing_packets.insert(missing);
|
| frame->received_info.entropy_hash ^=
|
| - QuicConnectionPeer::GetSentEntropyHash(&connection_, missing);
|
| + QuicConnectionPeer::GetSentEntropyHash(&connection_, missing);
|
| if (missing > 1) {
|
| frame->received_info.entropy_hash ^=
|
| - QuicConnectionPeer::GetSentEntropyHash(&connection_, missing - 1);
|
| + QuicConnectionPeer::GetSentEntropyHash(&connection_, missing - 1);
|
| }
|
| }
|
|
|
| @@ -896,10 +873,10 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| EXPECT_THAT(frame->received_info.missing_packets, Contains(arrived));
|
| frame->received_info.missing_packets.erase(arrived);
|
| frame->received_info.entropy_hash ^=
|
| - QuicConnectionPeer::GetSentEntropyHash(&connection_, arrived);
|
| + QuicConnectionPeer::GetSentEntropyHash(&connection_, arrived);
|
| if (arrived > 1) {
|
| frame->received_info.entropy_hash ^=
|
| - QuicConnectionPeer::GetSentEntropyHash(&connection_, arrived - 1);
|
| + QuicConnectionPeer::GetSentEntropyHash(&connection_, arrived - 1);
|
| }
|
| }
|
|
|
| @@ -910,8 +887,8 @@ class QuicConnectionTest : public ::testing::TestWithParam<QuicVersion> {
|
| // Call ProcessDataPacket rather than ProcessPacket, as we should not get a
|
| // packet call to the visitor.
|
| ProcessDataPacket(6000, 0, !kEntropyFlag);
|
| - EXPECT_FALSE(
|
| - QuicConnectionPeer::GetConnectionClosePacket(&connection_) == NULL);
|
| + EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
|
| + NULL);
|
| }
|
|
|
| void BlockOnNextWrite() {
|
| @@ -1032,24 +1009,23 @@ TEST_P(QuicConnectionTest, PacketsOutOfOrderWithAdditionsAndLeastAwaiting) {
|
| }
|
|
|
| TEST_P(QuicConnectionTest, RejectPacketTooFarOut) {
|
| - EXPECT_CALL(visitor_,
|
| - OnConnectionClosed(QUIC_INVALID_PACKET_HEADER, false));
|
| + EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_PACKET_HEADER, false));
|
| // Call ProcessDataPacket rather than ProcessPacket, as we should not get a
|
| // packet call to the visitor.
|
| ProcessDataPacket(6000, 0, !kEntropyFlag);
|
| - EXPECT_FALSE(
|
| - QuicConnectionPeer::GetConnectionClosePacket(&connection_) == NULL);
|
| + EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
|
| + NULL);
|
| }
|
|
|
| TEST_P(QuicConnectionTest, RejectUnencryptedStreamData) {
|
| // Process an unencrypted packet from the non-crypto stream.
|
| frame1_.stream_id = 3;
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| - EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_UNENCRYPTED_STREAM_DATA,
|
| - false));
|
| + EXPECT_CALL(visitor_,
|
| + OnConnectionClosed(QUIC_UNENCRYPTED_STREAM_DATA, false));
|
| ProcessDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_FALSE(
|
| - QuicConnectionPeer::GetConnectionClosePacket(&connection_) == NULL);
|
| + EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
|
| + NULL);
|
| const vector<QuicConnectionCloseFrame>& connection_close_frames =
|
| writer_->connection_close_frames();
|
| EXPECT_EQ(1u, connection_close_frames.size());
|
| @@ -1075,8 +1051,8 @@ TEST_P(QuicConnectionTest, TruncatedAck) {
|
| }
|
| EXPECT_CALL(*loss_algorithm_, DetectLostPackets(_, _, _, _))
|
| .WillOnce(Return(lost_packets));
|
| - EXPECT_CALL(entropy_calculator_,
|
| - EntropyHash(511)).WillOnce(testing::Return(0));
|
| + EXPECT_CALL(entropy_calculator_, EntropyHash(511))
|
| + .WillOnce(testing::Return(0));
|
| EXPECT_CALL(*send_algorithm_, OnRttUpdated(_));
|
| EXPECT_CALL(*send_algorithm_, OnPacketAcked(_, _)).Times(256);
|
| EXPECT_CALL(*send_algorithm_, OnPacketLost(_, _)).Times(255);
|
| @@ -1107,16 +1083,14 @@ TEST_P(QuicConnectionTest, AckReceiptCausesAckSendBadEntropy) {
|
|
|
| ProcessPacket(1);
|
| // Delay sending, then queue up an ack.
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| QuicConnectionPeer::SendAck(&connection_);
|
|
|
| // Process an ack with a least unacked of the received ack.
|
| // This causes an ack to be sent when TimeUntilSend returns 0.
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillRepeatedly(
|
| - testing::Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillRepeatedly(testing::Return(QuicTime::Delta::Zero()));
|
| // Skip a packet and then record an ack.
|
| creator_.set_sequence_number(2);
|
| QuicAckFrame frame = InitAckFrame(0, 3);
|
| @@ -1148,9 +1122,8 @@ TEST_P(QuicConnectionTest, AckReceiptCausesAckSend) {
|
|
|
| QuicPacketSequenceNumber original;
|
| QuicByteCount packet_size;
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .WillOnce(DoAll(SaveArg<1>(&original), SaveArg<2>(&packet_size),
|
| - Return(true)));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).WillOnce(
|
| + DoAll(SaveArg<1>(&original), SaveArg<2>(&packet_size), Return(true)));
|
| connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
| QuicAckFrame frame = InitAckFrame(original, 1);
|
| NackPacket(original, &frame);
|
| @@ -1180,8 +1153,8 @@ TEST_P(QuicConnectionTest, AckReceiptCausesAckSend) {
|
| // Now if the peer sends an ack which still reports the retransmitted packet
|
| // as missing, that will bundle an ack with data after two acks in a row
|
| // indicate the high water mark needs to be raised.
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _,
|
| - HAS_RETRANSMITTABLE_DATA));
|
| + EXPECT_CALL(*send_algorithm_,
|
| + OnPacketSent(_, _, _, HAS_RETRANSMITTABLE_DATA));
|
| connection_.SendStreamDataWithString(3, "foo", 3, !kFin, NULL);
|
| // No ack sent.
|
| EXPECT_EQ(1u, writer_->frame_count());
|
| @@ -1191,8 +1164,8 @@ TEST_P(QuicConnectionTest, AckReceiptCausesAckSend) {
|
| EXPECT_CALL(*loss_algorithm_, DetectLostPackets(_, _, _, _))
|
| .WillRepeatedly(Return(SequenceNumberSet()));
|
| ProcessAckPacket(&frame2);
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _,
|
| - HAS_RETRANSMITTABLE_DATA));
|
| + EXPECT_CALL(*send_algorithm_,
|
| + OnPacketSent(_, _, _, HAS_RETRANSMITTABLE_DATA));
|
| connection_.SendStreamDataWithString(3, "foo", 3, !kFin, NULL);
|
| // Ack bundled.
|
| if (version() > QUIC_VERSION_15) {
|
| @@ -1304,8 +1277,8 @@ TEST_P(QuicConnectionTest, SendingDifferentSequenceNumberLengthsBandwidth) {
|
| EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
|
| writer_->header().public_header.sequence_number_length);
|
|
|
| - EXPECT_CALL(*send_algorithm_, GetCongestionWindow()).WillRepeatedly(
|
| - Return(kMaxPacketSize * 256));
|
| + EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
|
| + .WillRepeatedly(Return(kMaxPacketSize * 256));
|
|
|
| SendStreamDataToPeer(1, "bar", 3, !kFin, &last_packet);
|
| EXPECT_EQ(2u, last_packet);
|
| @@ -1316,8 +1289,8 @@ TEST_P(QuicConnectionTest, SendingDifferentSequenceNumberLengthsBandwidth) {
|
| EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
|
| writer_->header().public_header.sequence_number_length);
|
|
|
| - EXPECT_CALL(*send_algorithm_, GetCongestionWindow()).WillRepeatedly(
|
| - Return(kMaxPacketSize * 256 * 256));
|
| + EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
|
| + .WillRepeatedly(Return(kMaxPacketSize * 256 * 256));
|
|
|
| SendStreamDataToPeer(1, "foo", 6, !kFin, &last_packet);
|
| EXPECT_EQ(3u, last_packet);
|
| @@ -1326,8 +1299,8 @@ TEST_P(QuicConnectionTest, SendingDifferentSequenceNumberLengthsBandwidth) {
|
| EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER,
|
| writer_->header().public_header.sequence_number_length);
|
|
|
| - EXPECT_CALL(*send_algorithm_, GetCongestionWindow()).WillRepeatedly(
|
| - Return(kMaxPacketSize * 256 * 256 * 256));
|
| + EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
|
| + .WillRepeatedly(Return(kMaxPacketSize * 256 * 256 * 256));
|
|
|
| SendStreamDataToPeer(1, "bar", 9, !kFin, &last_packet);
|
| EXPECT_EQ(4u, last_packet);
|
| @@ -1336,8 +1309,8 @@ TEST_P(QuicConnectionTest, SendingDifferentSequenceNumberLengthsBandwidth) {
|
| EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
|
| writer_->header().public_header.sequence_number_length);
|
|
|
| - EXPECT_CALL(*send_algorithm_, GetCongestionWindow()).WillRepeatedly(
|
| - Return(kMaxPacketSize * 256 * 256 * 256 * 256));
|
| + EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
|
| + .WillRepeatedly(Return(kMaxPacketSize * 256 * 256 * 256 * 256));
|
|
|
| SendStreamDataToPeer(1, "foo", 12, !kFin, &last_packet);
|
| EXPECT_EQ(5u, last_packet);
|
| @@ -1364,8 +1337,8 @@ TEST_P(QuicConnectionTest, SendingDifferentSequenceNumberLengthsUnackedDelta) {
|
| EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
|
| writer_->header().public_header.sequence_number_length);
|
|
|
| - QuicConnectionPeer::GetPacketCreator(&connection_)->set_sequence_number(
|
| - 100 * 256);
|
| + QuicConnectionPeer::GetPacketCreator(&connection_)
|
| + ->set_sequence_number(100 * 256);
|
|
|
| SendStreamDataToPeer(1, "foo", 6, !kFin, &last_packet);
|
| EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
|
| @@ -1373,8 +1346,8 @@ TEST_P(QuicConnectionTest, SendingDifferentSequenceNumberLengthsUnackedDelta) {
|
| EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER,
|
| writer_->header().public_header.sequence_number_length);
|
|
|
| - QuicConnectionPeer::GetPacketCreator(&connection_)->set_sequence_number(
|
| - 100 * 256 * 256);
|
| + QuicConnectionPeer::GetPacketCreator(&connection_)
|
| + ->set_sequence_number(100 * 256 * 256);
|
|
|
| SendStreamDataToPeer(1, "bar", 9, !kFin, &last_packet);
|
| EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
|
| @@ -1382,8 +1355,8 @@ TEST_P(QuicConnectionTest, SendingDifferentSequenceNumberLengthsUnackedDelta) {
|
| EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
|
| writer_->header().public_header.sequence_number_length);
|
|
|
| - QuicConnectionPeer::GetPacketCreator(&connection_)->set_sequence_number(
|
| - 100 * 256 * 256 * 256);
|
| + QuicConnectionPeer::GetPacketCreator(&connection_)
|
| + ->set_sequence_number(100 * 256 * 256 * 256);
|
|
|
| SendStreamDataToPeer(1, "foo", 12, !kFin, &last_packet);
|
| EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER,
|
| @@ -1452,9 +1425,11 @@ TEST_P(QuicConnectionTest, FECSending) {
|
| // All packets carry version info till version is negotiated.
|
| size_t payload_length;
|
| connection_.options()->max_packet_length =
|
| - GetPacketLengthForOneStream(
|
| - connection_.version(), kIncludeVersion, PACKET_1BYTE_SEQUENCE_NUMBER,
|
| - IN_FEC_GROUP, &payload_length);
|
| + GetPacketLengthForOneStream(connection_.version(),
|
| + kIncludeVersion,
|
| + PACKET_1BYTE_SEQUENCE_NUMBER,
|
| + IN_FEC_GROUP,
|
| + &payload_length);
|
| // And send FEC every two packets.
|
| connection_.options()->max_packets_per_fec_group = 2;
|
|
|
| @@ -1474,9 +1449,11 @@ TEST_P(QuicConnectionTest, FECQueueing) {
|
| // All packets carry version info till version is negotiated.
|
| size_t payload_length;
|
| connection_.options()->max_packet_length =
|
| - GetPacketLengthForOneStream(
|
| - connection_.version(), kIncludeVersion, PACKET_1BYTE_SEQUENCE_NUMBER,
|
| - IN_FEC_GROUP, &payload_length);
|
| + GetPacketLengthForOneStream(connection_.version(),
|
| + kIncludeVersion,
|
| + PACKET_1BYTE_SEQUENCE_NUMBER,
|
| + IN_FEC_GROUP,
|
| + &payload_length);
|
| // And send FEC every two packets.
|
| connection_.options()->max_packets_per_fec_group = 2;
|
|
|
| @@ -1591,11 +1568,11 @@ TEST_P(QuicConnectionTest, FramePacking) {
|
|
|
| // Send an ack and two stream frames in 1 packet by queueing them.
|
| connection_.SendAck();
|
| - EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(DoAll(
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData3)),
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData5))));
|
| + EXPECT_CALL(visitor_, OnCanWrite())
|
| + .WillOnce(DoAll(IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData3)),
|
| + IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData5))));
|
|
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(1);
|
| // Unblock the connection.
|
| @@ -1626,8 +1603,8 @@ TEST_P(QuicConnectionTest, FramePackingNonCryptoThenCrypto) {
|
| // packets by queueing them.
|
| connection_.SendAck();
|
| EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(DoAll(
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData3)),
|
| + IgnoreResult(
|
| + InvokeWithoutArgs(&connection_, &TestConnection::SendStreamData3)),
|
| IgnoreResult(InvokeWithoutArgs(&connection_,
|
| &TestConnection::SendCryptoStreamData))));
|
|
|
| @@ -1651,11 +1628,11 @@ TEST_P(QuicConnectionTest, FramePackingCryptoThenNonCrypto) {
|
| // Send an ack and two stream frames (one crypto, then one non-crypto) in 3
|
| // packets by queueing them.
|
| connection_.SendAck();
|
| - EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(DoAll(
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendCryptoStreamData)),
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData3))));
|
| + EXPECT_CALL(visitor_, OnCanWrite())
|
| + .WillOnce(DoAll(IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendCryptoStreamData)),
|
| + IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData3))));
|
|
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(3);
|
| // Unblock the connection.
|
| @@ -1681,11 +1658,11 @@ TEST_P(QuicConnectionTest, FramePackingFEC) {
|
|
|
| // Send an ack and two stream frames in 1 packet by queueing them.
|
| connection_.SendAck();
|
| - EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(DoAll(
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData3)),
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData5))));
|
| + EXPECT_CALL(visitor_, OnCanWrite())
|
| + .WillOnce(DoAll(IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData3)),
|
| + IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData5))));
|
|
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(2);
|
| // Unblock the connection.
|
| @@ -1704,11 +1681,11 @@ TEST_P(QuicConnectionTest, FramePackingAckResponse) {
|
| EXPECT_CALL(visitor_, OnStreamFrames(_)).Times(1);
|
| ProcessDataPacket(1, 1, kEntropyFlag);
|
|
|
| - EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(DoAll(
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData3)),
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData5))));
|
| + EXPECT_CALL(visitor_, OnCanWrite())
|
| + .WillOnce(DoAll(IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData3)),
|
| + IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData5))));
|
|
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(1);
|
|
|
| @@ -1754,9 +1731,9 @@ TEST_P(QuicConnectionTest, FramePackingSendv) {
|
| EXPECT_EQ(1u, writer_->stream_frames().size());
|
| QuicStreamFrame frame = writer_->stream_frames()[0];
|
| EXPECT_EQ(1u, frame.stream_id);
|
| - EXPECT_EQ("ABCD", string(static_cast<char*>
|
| - (frame.data.iovec()[0].iov_base),
|
| - (frame.data.iovec()[0].iov_len)));
|
| + EXPECT_EQ("ABCD",
|
| + string(static_cast<char*>(frame.data.iovec()[0].iov_base),
|
| + (frame.data.iovec()[0].iov_len)));
|
| }
|
|
|
| TEST_P(QuicConnectionTest, FramePackingSendvQueued) {
|
| @@ -1802,15 +1779,14 @@ TEST_P(QuicConnectionTest, SendingZeroBytes) {
|
|
|
| TEST_P(QuicConnectionTest, OnCanWrite) {
|
| // Visitor's OnCanWrite will send data, but will have more pending writes.
|
| - EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(DoAll(
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData3)),
|
| - IgnoreResult(InvokeWithoutArgs(&connection_,
|
| - &TestConnection::SendStreamData5))));
|
| + EXPECT_CALL(visitor_, OnCanWrite())
|
| + .WillOnce(DoAll(IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData3)),
|
| + IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::SendStreamData5))));
|
| EXPECT_CALL(visitor_, HasPendingWrites()).WillOnce(Return(true));
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillRepeatedly(
|
| - testing::Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillRepeatedly(testing::Return(QuicTime::Delta::Zero()));
|
|
|
| connection_.OnCanWrite();
|
|
|
| @@ -1828,7 +1804,7 @@ TEST_P(QuicConnectionTest, RetransmitOnNack) {
|
| SendStreamDataToPeer(3, "foo", 0, !kFin, &last_packet); // Packet 1
|
| second_packet_size =
|
| SendStreamDataToPeer(3, "foos", 3, !kFin, &last_packet); // Packet 2
|
| - SendStreamDataToPeer(3, "fooos", 7, !kFin, &last_packet); // Packet 3
|
| + SendStreamDataToPeer(3, "fooos", 7, !kFin, &last_packet); // Packet 3
|
|
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| @@ -1850,15 +1826,15 @@ TEST_P(QuicConnectionTest, RetransmitOnNack) {
|
| EXPECT_CALL(*send_algorithm_, OnPacketLost(2, _)).Times(1);
|
| EXPECT_CALL(*send_algorithm_, OnPacketAbandoned(2, _)).Times(1);
|
| EXPECT_CALL(*send_algorithm_,
|
| - OnPacketSent(_, _, second_packet_size - kQuicVersionSize, _)).
|
| - Times(1);
|
| + OnPacketSent(_, _, second_packet_size - kQuicVersionSize, _))
|
| + .Times(1);
|
| ProcessAckPacket(&nack_two);
|
| }
|
|
|
| TEST_P(QuicConnectionTest, DiscardRetransmit) {
|
| QuicPacketSequenceNumber last_packet;
|
| - SendStreamDataToPeer(1, "foo", 0, !kFin, &last_packet); // Packet 1
|
| - SendStreamDataToPeer(1, "foos", 3, !kFin, &last_packet); // Packet 2
|
| + SendStreamDataToPeer(1, "foo", 0, !kFin, &last_packet); // Packet 1
|
| + SendStreamDataToPeer(1, "foos", 3, !kFin, &last_packet); // Packet 2
|
| SendStreamDataToPeer(1, "fooos", 7, !kFin, &last_packet); // Packet 3
|
|
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| @@ -1889,8 +1865,7 @@ TEST_P(QuicConnectionTest, DiscardRetransmit) {
|
| // Unblock the socket and attempt to send the queued packets. However,
|
| // since the previous transmission has been acked, we will not
|
| // send the retransmission.
|
| - EXPECT_CALL(*send_algorithm_,
|
| - OnPacketSent(_, _, _, _)).Times(0);
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(0);
|
|
|
| writer_->SetWritable();
|
| connection_.OnCanWrite();
|
| @@ -1902,9 +1877,8 @@ TEST_P(QuicConnectionTest, RetransmitNackedLargestObserved) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| QuicPacketSequenceNumber largest_observed;
|
| QuicByteCount packet_size;
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .WillOnce(DoAll(SaveArg<1>(&largest_observed), SaveArg<2>(&packet_size),
|
| - Return(true)));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).WillOnce(DoAll(
|
| + SaveArg<1>(&largest_observed), SaveArg<2>(&packet_size), Return(true)));
|
| connection_.SendStreamDataWithString(3, "foo", 0, !kFin, NULL);
|
|
|
| QuicAckFrame frame = InitAckFrame(1, largest_observed);
|
| @@ -2052,7 +2026,7 @@ TEST_P(QuicConnectionTest, MultipleAcks) {
|
| EXPECT_EQ(1u, last_packet);
|
| SendStreamDataToPeer(3, "foo", 0, !kFin, &last_packet); // Packet 2
|
| EXPECT_EQ(2u, last_packet);
|
| - SendAckPacketToPeer(); // Packet 3
|
| + SendAckPacketToPeer(); // Packet 3
|
| SendStreamDataToPeer(5, "foo", 0, !kFin, &last_packet); // Packet 4
|
| EXPECT_EQ(4u, last_packet);
|
| SendStreamDataToPeer(1, "foo", 3, !kFin, &last_packet); // Packet 5
|
| @@ -2081,7 +2055,7 @@ TEST_P(QuicConnectionTest, DontLatchUnackedPacket) {
|
| SendStreamDataToPeer(1, "foo", 0, !kFin, NULL); // Packet 1;
|
| // From now on, we send acks, so the send algorithm won't mark them pending.
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .WillByDefault(Return(false));
|
| + .WillByDefault(Return(false));
|
| SendAckPacketToPeer(); // Packet 2
|
|
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| @@ -2112,18 +2086,18 @@ TEST_P(QuicConnectionTest, DontLatchUnackedPacket) {
|
| ProcessAckPacket(&frame);
|
|
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .WillByDefault(Return(true));
|
| + .WillByDefault(Return(true));
|
| SendStreamDataToPeer(1, "bar", 3, false, NULL); // Packet 4
|
| EXPECT_EQ(4u, outgoing_ack()->sent_info.least_unacked);
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .WillByDefault(Return(false));
|
| + .WillByDefault(Return(false));
|
| SendAckPacketToPeer(); // Packet 5
|
| EXPECT_EQ(4u, least_unacked());
|
|
|
| // Send two data packets at the end, and ensure if the last one is acked,
|
| // the least unacked is raised above the ack packets.
|
| ON_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .WillByDefault(Return(true));
|
| + .WillByDefault(Return(true));
|
| SendStreamDataToPeer(1, "bar", 6, false, NULL); // Packet 6
|
| SendStreamDataToPeer(1, "bar", 9, false, NULL); // Packet 7
|
|
|
| @@ -2156,15 +2130,14 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketWithVaryingSeqNumLengths) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| // Set up a debug visitor to the connection.
|
| - scoped_ptr<FecQuicConnectionDebugVisitor>
|
| - fec_visitor(new FecQuicConnectionDebugVisitor);
|
| + scoped_ptr<FecQuicConnectionDebugVisitor> fec_visitor(
|
| + new FecQuicConnectionDebugVisitor);
|
| connection_.set_debug_visitor(fec_visitor.get());
|
|
|
| QuicPacketSequenceNumber fec_packet = 0;
|
| - QuicSequenceNumberLength lengths[] = {PACKET_6BYTE_SEQUENCE_NUMBER,
|
| - PACKET_4BYTE_SEQUENCE_NUMBER,
|
| - PACKET_2BYTE_SEQUENCE_NUMBER,
|
| - PACKET_1BYTE_SEQUENCE_NUMBER};
|
| + QuicSequenceNumberLength lengths[] = {
|
| + PACKET_6BYTE_SEQUENCE_NUMBER, PACKET_4BYTE_SEQUENCE_NUMBER,
|
| + PACKET_2BYTE_SEQUENCE_NUMBER, PACKET_1BYTE_SEQUENCE_NUMBER};
|
| // For each sequence number length size, revive a packet and check sequence
|
| // number length in the revived packet.
|
| for (size_t i = 0; i < arraysize(lengths); ++i) {
|
| @@ -2172,12 +2145,16 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketWithVaryingSeqNumLengths) {
|
| sequence_number_length_ = lengths[i];
|
| fec_packet += 2;
|
| // Don't send missing packet, but send fec packet right after it.
|
| - ProcessFecPacket(/*seq_num=*/fec_packet, /*fec_group=*/fec_packet - 1,
|
| - true, !kEntropyFlag, NULL);
|
| + ProcessFecPacket(/*seq_num=*/fec_packet,
|
| + /*fec_group=*/fec_packet - 1,
|
| + true,
|
| + !kEntropyFlag,
|
| + NULL);
|
| // Sequence number length in the revived header should be the same as
|
| // in the original data/fec packet headers.
|
| - EXPECT_EQ(sequence_number_length_, fec_visitor->revived_header().
|
| - public_header.sequence_number_length);
|
| + EXPECT_EQ(
|
| + sequence_number_length_,
|
| + fec_visitor->revived_header().public_header.sequence_number_length);
|
| }
|
| }
|
|
|
| @@ -2188,15 +2165,14 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketWithVaryingConnectionIdLengths) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| // Set up a debug visitor to the connection.
|
| - scoped_ptr<FecQuicConnectionDebugVisitor>
|
| - fec_visitor(new FecQuicConnectionDebugVisitor);
|
| + scoped_ptr<FecQuicConnectionDebugVisitor> fec_visitor(
|
| + new FecQuicConnectionDebugVisitor);
|
| connection_.set_debug_visitor(fec_visitor.get());
|
|
|
| QuicPacketSequenceNumber fec_packet = 0;
|
| - QuicConnectionIdLength lengths[] = {PACKET_8BYTE_CONNECTION_ID,
|
| - PACKET_4BYTE_CONNECTION_ID,
|
| - PACKET_1BYTE_CONNECTION_ID,
|
| - PACKET_0BYTE_CONNECTION_ID};
|
| + QuicConnectionIdLength lengths[] = {
|
| + PACKET_8BYTE_CONNECTION_ID, PACKET_4BYTE_CONNECTION_ID,
|
| + PACKET_1BYTE_CONNECTION_ID, PACKET_0BYTE_CONNECTION_ID};
|
| // For each connection id length size, revive a packet and check connection
|
| // id length in the revived packet.
|
| for (size_t i = 0; i < arraysize(lengths); ++i) {
|
| @@ -2204,8 +2180,11 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketWithVaryingConnectionIdLengths) {
|
| connection_id_length_ = lengths[i];
|
| fec_packet += 2;
|
| // Don't send missing packet, but send fec packet right after it.
|
| - ProcessFecPacket(/*seq_num=*/fec_packet, /*fec_group=*/fec_packet - 1,
|
| - true, !kEntropyFlag, NULL);
|
| + ProcessFecPacket(/*seq_num=*/fec_packet,
|
| + /*fec_group=*/fec_packet - 1,
|
| + true,
|
| + !kEntropyFlag,
|
| + NULL);
|
| // Connection id length in the revived header should be the same as
|
| // in the original data/fec packet headers.
|
| EXPECT_EQ(connection_id_length_,
|
| @@ -2273,8 +2252,8 @@ TEST_P(QuicConnectionTest, ReviveMissingPacketAfterDataPackets) {
|
| }
|
|
|
| TEST_P(QuicConnectionTest, RTO) {
|
| - QuicTime default_retransmission_time = clock_.ApproximateNow().Add(
|
| - DefaultRetransmissionTime());
|
| + QuicTime default_retransmission_time =
|
| + clock_.ApproximateNow().Add(DefaultRetransmissionTime());
|
| SendStreamDataToPeer(3, "foo", 0, !kFin, NULL);
|
| EXPECT_EQ(1u, outgoing_ack()->sent_info.least_unacked);
|
|
|
| @@ -2292,8 +2271,8 @@ TEST_P(QuicConnectionTest, RTO) {
|
| }
|
|
|
| TEST_P(QuicConnectionTest, RTOWithSameEncryptionLevel) {
|
| - QuicTime default_retransmission_time = clock_.ApproximateNow().Add(
|
| - DefaultRetransmissionTime());
|
| + QuicTime default_retransmission_time =
|
| + clock_.ApproximateNow().Add(DefaultRetransmissionTime());
|
| use_tagging_decrypter();
|
|
|
| // A TaggingEncrypter puts kTagSize copies of the given byte (0x01 here) at
|
| @@ -2334,9 +2313,8 @@ TEST_P(QuicConnectionTest, SendHandshakeMessages) {
|
| connection_.SetEncrypter(ENCRYPTION_NONE, new TaggingEncrypter(0x01));
|
|
|
| // Attempt to send a handshake message and have the socket block.
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillRepeatedly(
|
| - testing::Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillRepeatedly(testing::Return(QuicTime::Delta::Zero()));
|
| BlockOnNextWrite();
|
| connection_.SendStreamDataWithString(1, "foo", 0, !kFin, NULL);
|
| // The packet should be serialized, but not queued.
|
| @@ -2370,8 +2348,8 @@ TEST_P(QuicConnectionTest,
|
| EXPECT_CALL(*send_algorithm_, OnRetransmissionTimeout(true));
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(0);
|
|
|
| - QuicTime default_retransmission_time = clock_.ApproximateNow().Add(
|
| - DefaultRetransmissionTime());
|
| + QuicTime default_retransmission_time =
|
| + clock_.ApproximateNow().Add(DefaultRetransmissionTime());
|
|
|
| EXPECT_EQ(default_retransmission_time,
|
| connection_.GetRetransmissionAlarm()->deadline());
|
| @@ -2412,8 +2390,7 @@ TEST_P(QuicConnectionTest, BufferNonDecryptablePackets) {
|
| // Transition to the new encryption state and process another
|
| // encrypted packet which should result in the original packet being
|
| // processed.
|
| - connection_.SetDecrypter(new StrictTaggingDecrypter(tag),
|
| - ENCRYPTION_INITIAL);
|
| + connection_.SetDecrypter(new StrictTaggingDecrypter(tag), ENCRYPTION_INITIAL);
|
| connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL);
|
| connection_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(tag));
|
| EXPECT_CALL(visitor_, OnStreamFrames(_)).Times(2);
|
| @@ -2427,13 +2404,13 @@ TEST_P(QuicConnectionTest, BufferNonDecryptablePackets) {
|
|
|
| TEST_P(QuicConnectionTest, TestRetransmitOrder) {
|
| QuicByteCount first_packet_size;
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).WillOnce(
|
| - DoAll(SaveArg<2>(&first_packet_size), Return(true)));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| + .WillOnce(DoAll(SaveArg<2>(&first_packet_size), Return(true)));
|
|
|
| connection_.SendStreamDataWithString(3, "first_packet", 0, !kFin, NULL);
|
| QuicByteCount second_packet_size;
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).WillOnce(
|
| - DoAll(SaveArg<2>(&second_packet_size), Return(true)));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| + .WillOnce(DoAll(SaveArg<2>(&second_packet_size), Return(true)));
|
| connection_.SendStreamDataWithString(3, "second_packet", 12, !kFin, NULL);
|
| EXPECT_NE(first_packet_size, second_packet_size);
|
| // Advance the clock by huge time to make sure packets will be retransmitted.
|
| @@ -2441,10 +2418,8 @@ TEST_P(QuicConnectionTest, TestRetransmitOrder) {
|
| EXPECT_CALL(*send_algorithm_, OnRetransmissionTimeout(true));
|
| {
|
| InSequence s;
|
| - EXPECT_CALL(*send_algorithm_,
|
| - OnPacketSent(_, _, first_packet_size, _));
|
| - EXPECT_CALL(*send_algorithm_,
|
| - OnPacketSent(_, _, second_packet_size, _));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, first_packet_size, _));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, second_packet_size, _));
|
| }
|
| connection_.GetRetransmissionAlarm()->Fire();
|
|
|
| @@ -2453,10 +2428,8 @@ TEST_P(QuicConnectionTest, TestRetransmitOrder) {
|
| EXPECT_CALL(*send_algorithm_, OnRetransmissionTimeout(true));
|
| {
|
| InSequence s;
|
| - EXPECT_CALL(*send_algorithm_,
|
| - OnPacketSent(_, _, first_packet_size, _));
|
| - EXPECT_CALL(*send_algorithm_,
|
| - OnPacketSent(_, _, second_packet_size, _));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, first_packet_size, _));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, second_packet_size, _));
|
| }
|
| connection_.GetRetransmissionAlarm()->Fire();
|
| }
|
| @@ -2470,8 +2443,8 @@ TEST_P(QuicConnectionTest, RetransmissionCountCalculation) {
|
|
|
| EXPECT_TRUE(QuicConnectionPeer::IsSavedForRetransmission(
|
| &connection_, original_sequence_number));
|
| - EXPECT_FALSE(QuicConnectionPeer::IsRetransmission(
|
| - &connection_, original_sequence_number));
|
| + EXPECT_FALSE(QuicConnectionPeer::IsRetransmission(&connection_,
|
| + original_sequence_number));
|
| // Force retransmission due to RTO.
|
| clock_.AdvanceTime(QuicTime::Delta::FromSeconds(10));
|
| EXPECT_CALL(*send_algorithm_, OnRetransmissionTimeout(true));
|
| @@ -2483,8 +2456,8 @@ TEST_P(QuicConnectionTest, RetransmissionCountCalculation) {
|
| &connection_, original_sequence_number));
|
| ASSERT_TRUE(QuicConnectionPeer::IsSavedForRetransmission(
|
| &connection_, rto_sequence_number));
|
| - EXPECT_TRUE(QuicConnectionPeer::IsRetransmission(
|
| - &connection_, rto_sequence_number));
|
| + EXPECT_TRUE(
|
| + QuicConnectionPeer::IsRetransmission(&connection_, rto_sequence_number));
|
| // Once by explicit nack.
|
| SequenceNumberSet lost_packets;
|
| lost_packets.insert(rto_sequence_number);
|
| @@ -2492,13 +2465,12 @@ TEST_P(QuicConnectionTest, RetransmissionCountCalculation) {
|
| .WillOnce(Return(lost_packets));
|
| EXPECT_CALL(*send_algorithm_, OnRttUpdated(_)).Times(1);
|
| EXPECT_CALL(*send_algorithm_, OnPacketLost(rto_sequence_number, _)).Times(1);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - OnPacketAbandoned(rto_sequence_number, _)).Times(1);
|
| + EXPECT_CALL(*send_algorithm_, OnPacketAbandoned(rto_sequence_number, _))
|
| + .Times(1);
|
| QuicPacketSequenceNumber nack_sequence_number = 0;
|
| // Ack packets might generate some other packets, which are not
|
| // retransmissions. (More ack packets).
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .Times(AnyNumber());
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(AnyNumber());
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| .WillOnce(DoAll(SaveArg<1>(&nack_sequence_number), Return(true)));
|
| QuicAckFrame ack = InitAckFrame(rto_sequence_number, 0);
|
| @@ -2512,8 +2484,8 @@ TEST_P(QuicConnectionTest, RetransmissionCountCalculation) {
|
| &connection_, rto_sequence_number));
|
| ASSERT_TRUE(QuicConnectionPeer::IsSavedForRetransmission(
|
| &connection_, nack_sequence_number));
|
| - EXPECT_TRUE(QuicConnectionPeer::IsRetransmission(
|
| - &connection_, nack_sequence_number));
|
| + EXPECT_TRUE(
|
| + QuicConnectionPeer::IsRetransmission(&connection_, nack_sequence_number));
|
| }
|
|
|
| TEST_P(QuicConnectionTest, SetRTOAfterWritingToSocket) {
|
| @@ -2530,8 +2502,7 @@ TEST_P(QuicConnectionTest, SetRTOAfterWritingToSocket) {
|
|
|
| TEST_P(QuicConnectionTest, DelayRTOWithAckReceipt) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _))
|
| - .Times(2);
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(2);
|
| connection_.SendStreamDataWithString(2, "foo", 0, !kFin, NULL);
|
| connection_.SendStreamDataWithString(3, "bar", 0, !kFin, NULL);
|
| QuicAlarm* retransmission_alarm = connection_.GetRetransmissionAlarm();
|
| @@ -2648,8 +2619,7 @@ TEST_P(QuicConnectionTest, InitialTimeout) {
|
| EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
|
|
|
| // Simulate the timeout alarm firing.
|
| - clock_.AdvanceTime(
|
| - QuicTime::Delta::FromSeconds(kDefaultInitialTimeoutSecs));
|
| + clock_.AdvanceTime(QuicTime::Delta::FromSeconds(kDefaultInitialTimeoutSecs));
|
| connection_.GetTimeoutAlarm()->Fire();
|
| EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
|
| EXPECT_FALSE(connection_.connected());
|
| @@ -2747,9 +2717,8 @@ TEST_P(QuicConnectionTest, TimeoutAfterSend) {
|
| TEST_P(QuicConnectionTest, SendScheduler) {
|
| // Test that if we send a packet without delay, it is not queued.
|
| QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::Zero()));
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _));
|
| connection_.SendPacket(
|
| ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| @@ -2759,9 +2728,8 @@ TEST_P(QuicConnectionTest, SendScheduler) {
|
| TEST_P(QuicConnectionTest, SendSchedulerDelay) {
|
| // Test that if we send a packet with a delay, it ends up queued.
|
| QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, 1, _, _)).Times(0);
|
| connection_.SendPacket(
|
| ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| @@ -2771,9 +2739,8 @@ TEST_P(QuicConnectionTest, SendSchedulerDelay) {
|
| TEST_P(QuicConnectionTest, SendSchedulerEAGAIN) {
|
| QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
|
| BlockOnNextWrite();
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::Zero()));
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, 1, _, _)).Times(0);
|
| connection_.SendPacket(
|
| ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| @@ -2783,18 +2750,16 @@ TEST_P(QuicConnectionTest, SendSchedulerEAGAIN) {
|
| TEST_P(QuicConnectionTest, SendSchedulerDelayThenSend) {
|
| // Test that if we send a packet with a delay, it ends up queued.
|
| QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| connection_.SendPacket(
|
| - ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| + ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
|
|
| // Advance the clock to fire the alarm, and configure the scheduler
|
| // to permit the packet to be sent.
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillRepeatedly(
|
| - testing::Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillRepeatedly(testing::Return(QuicTime::Delta::Zero()));
|
| clock_.AdvanceTime(QuicTime::Delta::FromMicroseconds(1));
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _));
|
| connection_.GetSendAlarm()->Fire();
|
| @@ -2812,17 +2777,15 @@ TEST_P(QuicConnectionTest, SendSchedulerDelayThenRetransmit) {
|
| // Test that if we send a retransmit with a delay, it ends up queued in the
|
| // sent packet manager, but not yet serialized.
|
| EXPECT_CALL(*send_algorithm_, OnRetransmissionTimeout(true));
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| connection_.GetRetransmissionAlarm()->Fire();
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
|
|
| // Advance the clock to fire the alarm, and configure the scheduler
|
| // to permit the packet to be sent.
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).Times(3).
|
| - WillRepeatedly(testing::Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _)).Times(3).WillRepeatedly(
|
| + testing::Return(QuicTime::Delta::Zero()));
|
|
|
| // Ensure the scheduler is notified this is a retransmit.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _));
|
| @@ -2833,9 +2796,8 @@ TEST_P(QuicConnectionTest, SendSchedulerDelayThenRetransmit) {
|
|
|
| TEST_P(QuicConnectionTest, SendSchedulerDelayAndQueue) {
|
| QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| connection_.SendPacket(
|
| ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
| @@ -2850,9 +2812,8 @@ TEST_P(QuicConnectionTest, SendSchedulerDelayAndQueue) {
|
| TEST_P(QuicConnectionTest, SendSchedulerDelayThenAckAndSend) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| connection_.SendPacket(
|
| ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
| @@ -2860,11 +2821,9 @@ TEST_P(QuicConnectionTest, SendSchedulerDelayThenAckAndSend) {
|
| // Now send non-retransmitting information, that we're not going to
|
| // retransmit 3. The far end should stop waiting for it.
|
| QuicAckFrame frame = InitAckFrame(0, 1);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillRepeatedly(
|
| - testing::Return(QuicTime::Delta::Zero()));
|
| - EXPECT_CALL(*send_algorithm_,
|
| - OnPacketSent(_, _, _, _));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillRepeatedly(testing::Return(QuicTime::Delta::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _));
|
| ProcessAckPacket(&frame);
|
|
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| @@ -2875,9 +2834,8 @@ TEST_P(QuicConnectionTest, SendSchedulerDelayThenAckAndSend) {
|
| TEST_P(QuicConnectionTest, SendSchedulerDelayThenAckAndHold) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| connection_.SendPacket(
|
| ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
| @@ -2885,9 +2843,8 @@ TEST_P(QuicConnectionTest, SendSchedulerDelayThenAckAndHold) {
|
| // Now send non-retransmitting information, that we're not going to
|
| // retransmit 3. The far end should stop waiting for it.
|
| QuicAckFrame frame = InitAckFrame(0, 1);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(1)));
|
| ProcessAckPacket(&frame);
|
|
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
| @@ -2897,9 +2854,8 @@ TEST_P(QuicConnectionTest, SendSchedulerDelayThenOnCanWrite) {
|
| // TODO(ianswett): This test is unrealistic, because we would not serialize
|
| // new data if the send algorithm said not to.
|
| QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| connection_.SendPacket(
|
| ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
|
| EXPECT_EQ(1u, connection_.NumQueuedPackets());
|
| @@ -2914,18 +2870,19 @@ TEST_P(QuicConnectionTest, TestQueueLimitsOnSendStreamData) {
|
| // All packets carry version info till version is negotiated.
|
| size_t payload_length;
|
| connection_.options()->max_packet_length =
|
| - GetPacketLengthForOneStream(
|
| - connection_.version(), kIncludeVersion, PACKET_1BYTE_SEQUENCE_NUMBER,
|
| - NOT_IN_FEC_GROUP, &payload_length);
|
| + GetPacketLengthForOneStream(connection_.version(),
|
| + kIncludeVersion,
|
| + PACKET_1BYTE_SEQUENCE_NUMBER,
|
| + NOT_IN_FEC_GROUP,
|
| + &payload_length);
|
|
|
| // Queue the first packet.
|
| - EXPECT_CALL(*send_algorithm_,
|
| - TimeUntilSend(_, _)).WillOnce(
|
| - testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| + EXPECT_CALL(*send_algorithm_, TimeUntilSend(_, _))
|
| + .WillOnce(testing::Return(QuicTime::Delta::FromMicroseconds(10)));
|
| const string payload(payload_length, 'a');
|
| EXPECT_EQ(0u,
|
| - connection_.SendStreamDataWithString(3, payload, 0,
|
| - !kFin, NULL).bytes_consumed);
|
| + connection_.SendStreamDataWithString(3, payload, 0, !kFin, NULL)
|
| + .bytes_consumed);
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| }
|
|
|
| @@ -2933,17 +2890,19 @@ TEST_P(QuicConnectionTest, LoopThroughSendingPackets) {
|
| // All packets carry version info till version is negotiated.
|
| size_t payload_length;
|
| connection_.options()->max_packet_length =
|
| - GetPacketLengthForOneStream(
|
| - connection_.version(), kIncludeVersion, PACKET_1BYTE_SEQUENCE_NUMBER,
|
| - NOT_IN_FEC_GROUP, &payload_length);
|
| + GetPacketLengthForOneStream(connection_.version(),
|
| + kIncludeVersion,
|
| + PACKET_1BYTE_SEQUENCE_NUMBER,
|
| + NOT_IN_FEC_GROUP,
|
| + &payload_length);
|
|
|
| // Queue the first packet.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _)).Times(7);
|
| // The first stream frame will consume 2 fewer bytes than the other six.
|
| const string payload(payload_length * 7 - 12, 'a');
|
| EXPECT_EQ(payload.size(),
|
| - connection_.SendStreamDataWithString(1, payload, 0,
|
| - !kFin, NULL).bytes_consumed);
|
| + connection_.SendStreamDataWithString(1, payload, 0, !kFin, NULL)
|
| + .bytes_consumed);
|
| }
|
|
|
| TEST_P(QuicConnectionTest, SendDelayedAck) {
|
| @@ -2951,8 +2910,7 @@ TEST_P(QuicConnectionTest, SendDelayedAck) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
|
| const uint8 tag = 0x07;
|
| - connection_.SetDecrypter(new StrictTaggingDecrypter(tag),
|
| - ENCRYPTION_INITIAL);
|
| + connection_.SetDecrypter(new StrictTaggingDecrypter(tag), ENCRYPTION_INITIAL);
|
| framer_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(tag));
|
| // Process a packet from the non-crypto stream.
|
| frame1_.stream_id = 3;
|
| @@ -3107,10 +3065,8 @@ TEST_P(QuicConnectionTest, BundleAckWithDataOnIncomingAck) {
|
| NackPacket(1, &ack);
|
| EXPECT_CALL(*loss_algorithm_, DetectLostPackets(_, _, _, _))
|
| .WillOnce(Return(SequenceNumberSet()));
|
| - EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(
|
| - IgnoreResult(InvokeWithoutArgs(
|
| - &connection_,
|
| - &TestConnection::EnsureWritableAndSendStreamData5)));
|
| + EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(IgnoreResult(InvokeWithoutArgs(
|
| + &connection_, &TestConnection::EnsureWritableAndSendStreamData5)));
|
| ProcessAckPacket(&ack);
|
|
|
| // Check that ack is bundled with outgoing data and the delayed ack
|
| @@ -3189,8 +3145,7 @@ TEST_P(QuicConnectionTest, Blocked) {
|
| }
|
|
|
| TEST_P(QuicConnectionTest, InvalidPacket) {
|
| - EXPECT_CALL(visitor_,
|
| - OnConnectionClosed(QUIC_INVALID_PACKET_HEADER, false));
|
| + EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_PACKET_HEADER, false));
|
| QuicEncryptedPacket encrypted(NULL, 0);
|
| connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), encrypted);
|
| // The connection close packet should have error details.
|
| @@ -3314,8 +3269,8 @@ TEST_P(QuicConnectionTest, EntropyCalculationForTruncatedAck) {
|
| }
|
| // Till 50 since 50th packet is not sent.
|
| for (int i = 1; i < 50; ++i) {
|
| - EXPECT_EQ(entropy[i], QuicConnectionPeer::ReceivedEntropyHash(
|
| - &connection_, i));
|
| + EXPECT_EQ(entropy[i],
|
| + QuicConnectionPeer::ReceivedEntropyHash(&connection_, i));
|
| }
|
| }
|
|
|
| @@ -3332,11 +3287,13 @@ TEST_P(QuicConnectionTest, CheckSentEntropyHash) {
|
| packet_entropy_hash = 1 << (i % 8);
|
| }
|
| QuicPacket* packet = ConstructDataPacket(i, 0, entropy_flag);
|
| - connection_.SendPacket(
|
| - ENCRYPTION_NONE, i, packet, packet_entropy_hash,
|
| - HAS_RETRANSMITTABLE_DATA);
|
| + connection_.SendPacket(ENCRYPTION_NONE,
|
| + i,
|
| + packet,
|
| + packet_entropy_hash,
|
| + HAS_RETRANSMITTABLE_DATA);
|
|
|
| - if (is_missing) {
|
| + if (is_missing) {
|
| missing_packets.insert(i);
|
| continue;
|
| }
|
| @@ -3463,8 +3420,8 @@ TEST_P(QuicConnectionTest,
|
|
|
| TEST_P(QuicConnectionTest, ClientHandlesVersionNegotiation) {
|
| // Start out with some unsupported version.
|
| - QuicConnectionPeer::GetFramer(&connection_)->set_version_for_tests(
|
| - QUIC_VERSION_UNSUPPORTED);
|
| + QuicConnectionPeer::GetFramer(&connection_)
|
| + ->set_version_for_tests(QUIC_VERSION_UNSUPPORTED);
|
|
|
| QuicPacketHeader header;
|
| header.public_header.connection_id = connection_id_;
|
| @@ -3482,8 +3439,8 @@ TEST_P(QuicConnectionTest, ClientHandlesVersionNegotiation) {
|
|
|
| // Send a version negotiation packet.
|
| scoped_ptr<QuicEncryptedPacket> encrypted(
|
| - framer_.BuildVersionNegotiationPacket(
|
| - header.public_header, supported_versions));
|
| + framer_.BuildVersionNegotiationPacket(header.public_header,
|
| + supported_versions));
|
| connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
|
|
|
| // Now force another packet. The connection should transition into
|
| @@ -3520,12 +3477,12 @@ TEST_P(QuicConnectionTest, BadVersionNegotiation) {
|
|
|
| // Send a version negotiation packet with the version the client started with.
|
| // It should be rejected.
|
| - EXPECT_CALL(visitor_,
|
| - OnConnectionClosed(QUIC_INVALID_VERSION_NEGOTIATION_PACKET,
|
| - false));
|
| + EXPECT_CALL(
|
| + visitor_,
|
| + OnConnectionClosed(QUIC_INVALID_VERSION_NEGOTIATION_PACKET, false));
|
| scoped_ptr<QuicEncryptedPacket> encrypted(
|
| - framer_.BuildVersionNegotiationPacket(
|
| - header.public_header, supported_versions));
|
| + framer_.BuildVersionNegotiationPacket(header.public_header,
|
| + supported_versions));
|
| connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
|
| }
|
|
|
| @@ -3534,8 +3491,7 @@ TEST_P(QuicConnectionTest, CheckSendStats) {
|
| connection_.SendStreamDataWithString(3, "first", 0, !kFin, NULL);
|
| size_t first_packet_size = writer_->last_packet_size();
|
|
|
| - EXPECT_CALL(*send_algorithm_,
|
| - OnPacketSent(_, _, _, _));
|
| + EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _));
|
| connection_.SendStreamDataWithString(5, "second", 0, !kFin, NULL);
|
| size_t second_packet_size = writer_->last_packet_size();
|
|
|
| @@ -3564,8 +3520,8 @@ TEST_P(QuicConnectionTest, CheckSendStats) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| ProcessAckPacket(&nack_three);
|
|
|
| - EXPECT_CALL(*send_algorithm_, BandwidthEstimate()).WillOnce(
|
| - Return(QuicBandwidth::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, BandwidthEstimate())
|
| + .WillOnce(Return(QuicBandwidth::Zero()));
|
|
|
| const QuicConnectionStats& stats = connection_.GetStats();
|
| EXPECT_EQ(3 * first_packet_size + 2 * second_packet_size - kQuicVersionSize,
|
| @@ -3590,8 +3546,8 @@ TEST_P(QuicConnectionTest, CheckReceiveStats) {
|
| received_bytes += ProcessDataPacket(3, 1, !kEntropyFlag);
|
| received_bytes += ProcessFecPacket(4, 1, true, !kEntropyFlag, NULL);
|
|
|
| - EXPECT_CALL(*send_algorithm_, BandwidthEstimate()).WillOnce(
|
| - Return(QuicBandwidth::Zero()));
|
| + EXPECT_CALL(*send_algorithm_, BandwidthEstimate())
|
| + .WillOnce(Return(QuicBandwidth::Zero()));
|
|
|
| const QuicConnectionStats& stats = connection_.GetStats();
|
| EXPECT_EQ(received_bytes, stats.bytes_received);
|
| @@ -3644,8 +3600,8 @@ TEST_P(QuicConnectionTest, ProcessFramesIfPacketClosedConnection) {
|
| scoped_ptr<QuicPacket> packet(
|
| framer_.BuildUnsizedDataPacket(header_, frames).packet);
|
| EXPECT_TRUE(NULL != packet.get());
|
| - scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
|
| - ENCRYPTION_NONE, 1, *packet));
|
| + scoped_ptr<QuicEncryptedPacket> encrypted(
|
| + framer_.EncryptPacket(ENCRYPTION_NONE, 1, *packet));
|
|
|
| EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PEER_GOING_AWAY, true));
|
| EXPECT_CALL(visitor_, OnStreamFrames(_)).Times(1);
|
| @@ -3808,8 +3764,8 @@ TEST_P(QuicConnectionTest, AckNotifierCallbackForAckAfterRTO) {
|
| scoped_refptr<MockAckNotifierDelegate> delegate(
|
| new StrictMock<MockAckNotifierDelegate>);
|
|
|
| - QuicTime default_retransmission_time = clock_.ApproximateNow().Add(
|
| - DefaultRetransmissionTime());
|
| + QuicTime default_retransmission_time =
|
| + clock_.ApproximateNow().Add(DefaultRetransmissionTime());
|
| connection_.SendStreamDataWithString(3, "foo", 0, !kFin, delegate.get());
|
| EXPECT_EQ(1u, outgoing_ack()->sent_info.least_unacked);
|
|
|
| @@ -3897,8 +3853,7 @@ TEST_P(QuicConnectionTest, AckNotifierFECTriggerCallback) {
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
|
|
| // Create a delegate which we expect to be called.
|
| - scoped_refptr<MockAckNotifierDelegate> delegate(
|
| - new MockAckNotifierDelegate);
|
| + scoped_refptr<MockAckNotifierDelegate> delegate(new MockAckNotifierDelegate);
|
| EXPECT_CALL(*delegate, OnAckNotification(_, _, _, _, _)).Times(1);
|
|
|
| // Send some data, which will register the delegate to be notified.
|
| @@ -3966,8 +3921,7 @@ TEST_P(QuicConnectionTest, AckNotifierCallbackAfterFECRecovery) {
|
| class MockQuicConnectionDebugVisitor
|
| : public QuicConnectionDebugVisitorInterface {
|
| public:
|
| - MOCK_METHOD1(OnFrameAddedToPacket,
|
| - void(const QuicFrame&));
|
| + MOCK_METHOD1(OnFrameAddedToPacket, void(const QuicFrame&));
|
|
|
| MOCK_METHOD5(OnPacketSent,
|
| void(QuicPacketSequenceNumber,
|
| @@ -3977,40 +3931,31 @@ class MockQuicConnectionDebugVisitor
|
| WriteResult));
|
|
|
| MOCK_METHOD2(OnPacketRetransmitted,
|
| - void(QuicPacketSequenceNumber,
|
| - QuicPacketSequenceNumber));
|
| + void(QuicPacketSequenceNumber, QuicPacketSequenceNumber));
|
|
|
| MOCK_METHOD3(OnPacketReceived,
|
| void(const IPEndPoint&,
|
| const IPEndPoint&,
|
| const QuicEncryptedPacket&));
|
|
|
| - MOCK_METHOD1(OnProtocolVersionMismatch,
|
| - void(QuicVersion));
|
| + MOCK_METHOD1(OnProtocolVersionMismatch, void(QuicVersion));
|
|
|
| - MOCK_METHOD1(OnPacketHeader,
|
| - void(const QuicPacketHeader& header));
|
| + MOCK_METHOD1(OnPacketHeader, void(const QuicPacketHeader& header));
|
|
|
| - MOCK_METHOD1(OnStreamFrame,
|
| - void(const QuicStreamFrame&));
|
| + MOCK_METHOD1(OnStreamFrame, void(const QuicStreamFrame&));
|
|
|
| - MOCK_METHOD1(OnAckFrame,
|
| - void(const QuicAckFrame& frame));
|
| + MOCK_METHOD1(OnAckFrame, void(const QuicAckFrame& frame));
|
|
|
| MOCK_METHOD1(OnCongestionFeedbackFrame,
|
| void(const QuicCongestionFeedbackFrame&));
|
|
|
| - MOCK_METHOD1(OnStopWaitingFrame,
|
| - void(const QuicStopWaitingFrame&));
|
| + MOCK_METHOD1(OnStopWaitingFrame, void(const QuicStopWaitingFrame&));
|
|
|
| - MOCK_METHOD1(OnRstStreamFrame,
|
| - void(const QuicRstStreamFrame&));
|
| + MOCK_METHOD1(OnRstStreamFrame, void(const QuicRstStreamFrame&));
|
|
|
| - MOCK_METHOD1(OnConnectionCloseFrame,
|
| - void(const QuicConnectionCloseFrame&));
|
| + MOCK_METHOD1(OnConnectionCloseFrame, void(const QuicConnectionCloseFrame&));
|
|
|
| - MOCK_METHOD1(OnPublicResetPacket,
|
| - void(const QuicPublicResetPacket&));
|
| + MOCK_METHOD1(OnPublicResetPacket, void(const QuicPublicResetPacket&));
|
|
|
| MOCK_METHOD1(OnVersionNegotiationPacket,
|
| void(const QuicVersionNegotiationPacket&));
|
| @@ -4022,8 +3967,8 @@ class MockQuicConnectionDebugVisitor
|
| TEST_P(QuicConnectionTest, OnPacketHeaderDebugVisitor) {
|
| QuicPacketHeader header;
|
|
|
| - scoped_ptr<MockQuicConnectionDebugVisitor>
|
| - debug_visitor(new StrictMock<MockQuicConnectionDebugVisitor>);
|
| + scoped_ptr<MockQuicConnectionDebugVisitor> debug_visitor(
|
| + new StrictMock<MockQuicConnectionDebugVisitor>);
|
| connection_.set_debug_visitor(debug_visitor.get());
|
| EXPECT_CALL(*debug_visitor, OnPacketHeader(Ref(header))).Times(1);
|
| connection_.OnPacketHeader(header);
|
| @@ -4032,11 +3977,19 @@ TEST_P(QuicConnectionTest, OnPacketHeaderDebugVisitor) {
|
| TEST_P(QuicConnectionTest, Pacing) {
|
| ValueRestore<bool> old_flag(&FLAGS_enable_quic_pacing, true);
|
|
|
| - TestConnection server(connection_id_, IPEndPoint(), helper_.get(),
|
| - writer_.get(), true, version(),
|
| + TestConnection server(connection_id_,
|
| + IPEndPoint(),
|
| + helper_.get(),
|
| + writer_.get(),
|
| + true,
|
| + version(),
|
| kDefaultFlowControlSendWindow);
|
| - TestConnection client(connection_id_, IPEndPoint(), helper_.get(),
|
| - writer_.get(), false, version(),
|
| + TestConnection client(connection_id_,
|
| + IPEndPoint(),
|
| + helper_.get(),
|
| + writer_.get(),
|
| + false,
|
| + version(),
|
| kDefaultFlowControlSendWindow);
|
| EXPECT_TRUE(client.sent_packet_manager().using_pacing());
|
| EXPECT_FALSE(server.sent_packet_manager().using_pacing());
|
| @@ -4069,8 +4022,12 @@ TEST_P(QuicConnectionTest, InvalidFlowControlWindow) {
|
| ValueRestore<bool> old_flag(&FLAGS_enable_quic_pacing, true);
|
|
|
| const uint32 kSmallerFlowControlWindow = kDefaultFlowControlSendWindow - 1;
|
| - TestConnection connection(connection_id_, IPEndPoint(), helper_.get(),
|
| - writer_.get(), true, version(),
|
| + TestConnection connection(connection_id_,
|
| + IPEndPoint(),
|
| + helper_.get(),
|
| + writer_.get(),
|
| + true,
|
| + version(),
|
| kSmallerFlowControlWindow);
|
| EXPECT_EQ(kDefaultFlowControlSendWindow,
|
| connection.max_flow_control_receive_window_bytes());
|
|
|