| Index: net/quic/quic_packet_creator_test.cc
|
| diff --git a/net/quic/quic_packet_creator_test.cc b/net/quic/quic_packet_creator_test.cc
|
| index 6d0ea5c8a0f7676880f07af59c12d7ea78cd3917..bc2d819af7f488a2daba8ac1de6e54f08841e487 100644
|
| --- a/net/quic/quic_packet_creator_test.cc
|
| +++ b/net/quic/quic_packet_creator_test.cc
|
| @@ -31,11 +31,8 @@ namespace {
|
|
|
| // Run tests with combinations of {QuicVersion, ToggleVersionSerialization}.
|
| struct TestParams {
|
| - TestParams(QuicVersion version,
|
| - bool version_serialization)
|
| - : version(version),
|
| - version_serialization(version_serialization) {
|
| - }
|
| + TestParams(QuicVersion version, bool version_serialization)
|
| + : version(version), version_serialization(version_serialization) {}
|
|
|
| friend ostream& operator<<(ostream& os, const TestParams& p) {
|
| os << "{ client_version: " << QuicVersionToString(p.version)
|
| @@ -61,9 +58,11 @@ vector<TestParams> GetTestParams() {
|
| class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> {
|
| protected:
|
| QuicPacketCreatorTest()
|
| - : server_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(),
|
| + : server_framer_(SupportedVersions(GetParam().version),
|
| + QuicTime::Zero(),
|
| true),
|
| - client_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(),
|
| + client_framer_(SupportedVersions(GetParam().version),
|
| + QuicTime::Zero(),
|
| false),
|
| sequence_number_(0),
|
| connection_id_(2),
|
| @@ -72,13 +71,11 @@ class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> {
|
| client_framer_.set_visitor(&framer_visitor_);
|
| server_framer_.set_visitor(&framer_visitor_);
|
| }
|
| - ~QuicPacketCreatorTest() {
|
| - }
|
| + ~QuicPacketCreatorTest() {}
|
|
|
| void ProcessPacket(QuicPacket* packet) {
|
| - scoped_ptr<QuicEncryptedPacket> encrypted(
|
| - server_framer_.EncryptPacket(ENCRYPTION_NONE, sequence_number_,
|
| - *packet));
|
| + scoped_ptr<QuicEncryptedPacket> encrypted(server_framer_.EncryptPacket(
|
| + ENCRYPTION_NONE, sequence_number_, *packet));
|
| server_framer_.ProcessPacket(*encrypted);
|
| }
|
|
|
| @@ -109,8 +106,8 @@ class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> {
|
| // of maximum length.
|
| size_t GetEncryptionOverhead() {
|
| return creator_.options()->max_packet_length -
|
| - client_framer_.GetMaxPlaintextSize(
|
| - creator_.options()->max_packet_length);
|
| + client_framer_.GetMaxPlaintextSize(
|
| + creator_.options()->max_packet_length);
|
| }
|
|
|
| // Returns the number of bytes consumed by the non-data fields of a stream
|
| @@ -140,7 +137,6 @@ INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests,
|
| QuicPacketCreatorTest,
|
| ::testing::ValuesIn(GetTestParams()));
|
|
|
| -
|
| TEST_P(QuicPacketCreatorTest, SerializeFrames) {
|
| frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u, 0u))));
|
| frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
|
| @@ -393,8 +389,8 @@ TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) {
|
|
|
| TEST_P(QuicPacketCreatorTest, CreateStreamFrame) {
|
| QuicFrame frame;
|
| - size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 0u,
|
| - false, &frame);
|
| + size_t consumed =
|
| + creator_.CreateStreamFrame(1u, MakeIOVector("test"), 0u, false, &frame);
|
| EXPECT_EQ(4u, consumed);
|
| CheckStreamFrame(frame, 1u, "test", 0u, false);
|
| delete frame.stream_frame;
|
| @@ -402,8 +398,8 @@ TEST_P(QuicPacketCreatorTest, CreateStreamFrame) {
|
|
|
| TEST_P(QuicPacketCreatorTest, CreateStreamFrameFin) {
|
| QuicFrame frame;
|
| - size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 10u,
|
| - true, &frame);
|
| + size_t consumed =
|
| + creator_.CreateStreamFrame(1u, MakeIOVector("test"), 10u, true, &frame);
|
| EXPECT_EQ(4u, consumed);
|
| CheckStreamFrame(frame, 1u, "test", 10u, true);
|
| delete frame.stream_frame;
|
| @@ -411,20 +407,20 @@ TEST_P(QuicPacketCreatorTest, CreateStreamFrameFin) {
|
|
|
| TEST_P(QuicPacketCreatorTest, CreateStreamFrameFinOnly) {
|
| QuicFrame frame;
|
| - size_t consumed = creator_.CreateStreamFrame(1u, IOVector(), 0u, true,
|
| - &frame);
|
| + size_t consumed =
|
| + creator_.CreateStreamFrame(1u, IOVector(), 0u, true, &frame);
|
| EXPECT_EQ(0u, consumed);
|
| CheckStreamFrame(frame, 1u, string(), 0u, true);
|
| delete frame.stream_frame;
|
| }
|
|
|
| TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) {
|
| - const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
|
| - + GetEncryptionOverhead();
|
| + const size_t overhead =
|
| + GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) + GetEncryptionOverhead();
|
| for (size_t i = overhead; i < overhead + 100; ++i) {
|
| creator_.options()->max_packet_length = i;
|
| - const bool should_have_room = i > overhead + GetStreamFrameOverhead(
|
| - NOT_IN_FEC_GROUP);
|
| + const bool should_have_room =
|
| + i > overhead + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
|
| ASSERT_EQ(should_have_room,
|
| creator_.HasRoomForStreamFrame(kStreamId, kOffset));
|
| if (should_have_room) {
|
| @@ -443,8 +439,9 @@ TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) {
|
|
|
| TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) {
|
| // Compute the total overhead for a single frame in packet.
|
| - const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
|
| - + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
|
| + const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) +
|
| + GetEncryptionOverhead() +
|
| + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
|
| size_t capacity = kDefaultMaxPacketSize - overhead;
|
| // Now, test various sizes around this size.
|
| for (int delta = -5; delta <= 5; ++delta) {
|
| @@ -472,8 +469,9 @@ TEST_P(QuicPacketCreatorTest, StreamFrameConsumptionWithFec) {
|
| // Turn on FEC protection.
|
| creator_.options()->max_packets_per_fec_group = 6;
|
| // Compute the total overhead for a single frame in packet.
|
| - const size_t overhead = GetPacketHeaderOverhead(IN_FEC_GROUP)
|
| - + GetEncryptionOverhead() + GetStreamFrameOverhead(IN_FEC_GROUP);
|
| + const size_t overhead = GetPacketHeaderOverhead(IN_FEC_GROUP) +
|
| + GetEncryptionOverhead() +
|
| + GetStreamFrameOverhead(IN_FEC_GROUP);
|
| size_t capacity = kDefaultMaxPacketSize - overhead;
|
| // Now, test various sizes around this size.
|
| for (int delta = -5; delta <= 5; ++delta) {
|
| @@ -500,8 +498,9 @@ TEST_P(QuicPacketCreatorTest, StreamFrameConsumptionWithFec) {
|
|
|
| TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) {
|
| // Compute the total overhead for a single frame in packet.
|
| - const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
|
| - + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
|
| + const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) +
|
| + GetEncryptionOverhead() +
|
| + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
|
| ASSERT_GT(kMaxPacketSize, overhead);
|
| size_t capacity = kDefaultMaxPacketSize - overhead;
|
| // Now, test various sizes around this size.
|
| @@ -520,8 +519,9 @@ TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) {
|
| // (1 byte) and to expand the stream frame (another 2 bytes) the packet
|
| // will not be padded.
|
| if (bytes_free < 3) {
|
| - EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize)
|
| - - bytes_free, serialized_packet.packet->length());
|
| + EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize) -
|
| + bytes_free,
|
| + serialized_packet.packet->length());
|
| } else {
|
| EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize),
|
| serialized_packet.packet->length());
|
| @@ -533,8 +533,9 @@ TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) {
|
|
|
| TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) {
|
| // Compute the total overhead for a single frame in packet.
|
| - const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
|
| - + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
|
| + const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) +
|
| + GetEncryptionOverhead() +
|
| + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
|
| ASSERT_GT(kDefaultMaxPacketSize, overhead);
|
| size_t capacity = kDefaultMaxPacketSize - overhead;
|
| // Now, test various sizes around this size.
|
| @@ -550,8 +551,9 @@ TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) {
|
| SerializedPacket serialized_packet = creator_.SerializePacket();
|
| ASSERT_TRUE(serialized_packet.packet);
|
| if (bytes_free > 0) {
|
| - EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize)
|
| - - bytes_free, serialized_packet.packet->length());
|
| + EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize) -
|
| + bytes_free,
|
| + serialized_packet.packet->length());
|
| } else {
|
| EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize),
|
| serialized_packet.packet->length());
|
| @@ -655,8 +657,8 @@ TEST_P(QuicPacketCreatorTest, SerializeFrame) {
|
| EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
|
| EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
|
| EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
|
| - EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce(
|
| - DoAll(SaveArg<0>(&header), Return(true)));
|
| + EXPECT_CALL(framer_visitor_, OnPacketHeader(_))
|
| + .WillOnce(DoAll(SaveArg<0>(&header), Return(true)));
|
| EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
|
| EXPECT_CALL(framer_visitor_, OnPacketComplete());
|
| }
|
| @@ -675,7 +677,9 @@ TEST_P(QuicPacketCreatorTest, CreateStreamFrameTooLarge) {
|
| creator_.options()->max_packet_length = GetPacketLengthForOneStream(
|
| client_framer_.version(),
|
| QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
|
| - PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP, &payload_length);
|
| + PACKET_1BYTE_SEQUENCE_NUMBER,
|
| + NOT_IN_FEC_GROUP,
|
| + &payload_length);
|
| QuicFrame frame;
|
| const string too_long_payload(payload_length * 2, 'a');
|
| size_t consumed = creator_.CreateStreamFrame(
|
| @@ -694,10 +698,11 @@ TEST_P(QuicPacketCreatorTest, AddFrameAndSerialize) {
|
| client_framer_.GetMaxPlaintextSize(creator_.options()->max_packet_length);
|
| EXPECT_FALSE(creator_.HasPendingFrames());
|
| EXPECT_EQ(max_plaintext_size -
|
| - GetPacketHeaderSize(
|
| - creator_.options()->send_connection_id_length,
|
| - QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
|
| - PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP),
|
| + GetPacketHeaderSize(
|
| + creator_.options()->send_connection_id_length,
|
| + QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
|
| + PACKET_1BYTE_SEQUENCE_NUMBER,
|
| + NOT_IN_FEC_GROUP),
|
| creator_.BytesFree());
|
|
|
| // Add a variety of frame types and then a padding frame.
|
| @@ -711,8 +716,8 @@ TEST_P(QuicPacketCreatorTest, AddFrameAndSerialize) {
|
| EXPECT_TRUE(creator_.HasPendingFrames());
|
|
|
| QuicFrame frame;
|
| - size_t consumed = creator_.CreateStreamFrame(
|
| - 1u, MakeIOVector("test"), 0u, false, &frame);
|
| + size_t consumed =
|
| + creator_.CreateStreamFrame(1u, MakeIOVector("test"), 0u, false, &frame);
|
| EXPECT_EQ(4u, consumed);
|
| ASSERT_TRUE(frame.stream_frame);
|
| EXPECT_TRUE(creator_.AddSavedFrame(frame));
|
| @@ -738,11 +743,11 @@ TEST_P(QuicPacketCreatorTest, AddFrameAndSerialize) {
|
|
|
| EXPECT_FALSE(creator_.HasPendingFrames());
|
| EXPECT_EQ(max_plaintext_size -
|
| - GetPacketHeaderSize(
|
| - creator_.options()->send_connection_id_length,
|
| - QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
|
| - PACKET_1BYTE_SEQUENCE_NUMBER,
|
| - NOT_IN_FEC_GROUP),
|
| + GetPacketHeaderSize(
|
| + creator_.options()->send_connection_id_length,
|
| + QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
|
| + PACKET_1BYTE_SEQUENCE_NUMBER,
|
| + NOT_IN_FEC_GROUP),
|
| creator_.BytesFree());
|
| }
|
|
|
| @@ -756,8 +761,8 @@ TEST_P(QuicPacketCreatorTest, EntropyFlag) {
|
| bool expected_rand_bool =
|
| (mock_random_.RandUint64() & (GG_UINT64_C(1) << j)) != 0;
|
| bool observed_rand_bool =
|
| - (serialized.entropy_hash & (1 << ((j+1) % 8))) != 0;
|
| - uint8 rest_of_hash = serialized.entropy_hash & ~(1 << ((j+1) % 8));
|
| + (serialized.entropy_hash & (1 << ((j + 1) % 8))) != 0;
|
| + uint8 rest_of_hash = serialized.entropy_hash & ~(1 << ((j + 1) % 8));
|
| EXPECT_EQ(expected_rand_bool, observed_rand_bool);
|
| EXPECT_EQ(0, rest_of_hash);
|
| delete serialized.packet;
|
|
|