| Index: net/quic/core/quic_connection_test.cc
|
| diff --git a/net/quic/core/quic_connection_test.cc b/net/quic/core/quic_connection_test.cc
|
| index 906850fd465f8149dcc9b68a0ef921ed31d97165..f19d61e129df507becd95c355511e2fca0fb11fb 100644
|
| --- a/net/quic/core/quic_connection_test.cc
|
| +++ b/net/quic/core/quic_connection_test.cc
|
| @@ -90,7 +90,6 @@ class TaggingEncrypter : public QuicEncrypter {
|
| bool SetNoncePrefix(StringPiece nonce_prefix) override { return true; }
|
|
|
| bool EncryptPacket(QuicVersion /*version*/,
|
| - QuicPathId path_id,
|
| QuicPacketNumber packet_number,
|
| StringPiece associated_data,
|
| StringPiece plaintext,
|
| @@ -155,7 +154,6 @@ class TaggingDecrypter : public QuicDecrypter {
|
| }
|
|
|
| bool DecryptPacket(QuicVersion /*version*/,
|
| - QuicPathId path_id,
|
| QuicPacketNumber packet_number,
|
| StringPiece associated_data,
|
| StringPiece ciphertext,
|
| @@ -499,8 +497,7 @@ class TestConnection : public QuicConnection {
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length =
|
| QuicConnectionPeer::GetFramer(this)->EncryptPayload(
|
| - ENCRYPTION_NONE, path_id, packet_number, *packet, buffer,
|
| - kMaxPacketSize);
|
| + ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize);
|
| delete packet;
|
| SerializedPacket serialized_packet(
|
| kDefaultPathId, packet_number, PACKET_6BYTE_PACKET_NUMBER, buffer,
|
| @@ -839,8 +836,8 @@ class QuicConnectionTest : public ::testing::TestWithParam<TestParams> {
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
|
|
| char buffer[kMaxPacketSize];
|
| - size_t encrypted_length = framer_.EncryptPayload(
|
| - level, path_id, number, *packet, buffer, kMaxPacketSize);
|
| + size_t encrypted_length =
|
| + framer_.EncryptPayload(level, number, *packet, buffer, kMaxPacketSize);
|
| connection_.ProcessUdpPacket(
|
| kSelfAddress, kPeerAddress,
|
| QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
|
| @@ -859,7 +856,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<TestParams> {
|
| ConstructDataPacket(path_id, number, has_stop_waiting));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - level, path_id, number, *packet, buffer, kMaxPacketSize);
|
| + level, number, *packet, buffer, kMaxPacketSize);
|
| connection_.ProcessUdpPacket(
|
| kSelfAddress, kPeerAddress,
|
| QuicReceivedPacket(buffer, encrypted_length, clock_.Now(), false));
|
| @@ -873,7 +870,7 @@ class QuicConnectionTest : public ::testing::TestWithParam<TestParams> {
|
| std::unique_ptr<QuicPacket> packet(ConstructClosePacket(number));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, path_id, number, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, number, *packet, buffer, kMaxPacketSize);
|
| connection_.ProcessUdpPacket(
|
| kSelfAddress, kPeerAddress,
|
| QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
|
| @@ -1216,7 +1213,7 @@ TEST_P(QuicConnectionTest, IncreaseServerMaxPacketSize) {
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, 12, *packet, buffer, kMaxPacketSize);
|
| EXPECT_EQ(kMaxPacketSize, encrypted_length);
|
|
|
| framer_.set_version(version());
|
| @@ -1250,7 +1247,7 @@ TEST_P(QuicConnectionTest, IncreaseServerMaxPacketSizeWhileWriterLimited) {
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, 12, *packet, buffer, kMaxPacketSize);
|
| EXPECT_EQ(kMaxPacketSize, encrypted_length);
|
|
|
| framer_.set_version(version());
|
| @@ -2042,7 +2039,6 @@ TEST_P(QuicConnectionTest, DoNotRetransmitForResetStreamOnRTO) {
|
| // Ensure that if the only data in flight is non-retransmittable, the
|
| // retransmission alarm is not set.
|
| TEST_P(QuicConnectionTest, CancelRetransmissionAlarmAfterResetStream) {
|
| - FLAGS_quic_reloadable_flag_quic_more_conservative_retransmission_alarm = true;
|
| QuicStreamId stream_id = 2;
|
| QuicPacketNumber last_data_packet;
|
| SendStreamDataToPeer(stream_id, "foo", 0, !kFin, &last_data_packet);
|
| @@ -2287,9 +2283,7 @@ TEST_P(QuicConnectionTest, RetransmitWriteBlockedAckedOriginalThenSent) {
|
| writer_->SetWritable();
|
| connection_.OnCanWrite();
|
| // There is now a pending packet, but with no retransmittable frames.
|
| - EXPECT_EQ(
|
| - FLAGS_quic_reloadable_flag_quic_more_conservative_retransmission_alarm,
|
| - !connection_.GetRetransmissionAlarm()->IsSet());
|
| + EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
|
| EXPECT_FALSE(QuicConnectionPeer::HasRetransmittableFrames(&connection_,
|
| ack.path_id, 2));
|
| }
|
| @@ -3501,42 +3495,6 @@ TEST_P(QuicConnectionTest, TimeoutAfter5ClientRTOs) {
|
| EXPECT_FALSE(connection_.connected());
|
| }
|
|
|
| -TEST_P(QuicConnectionTest, TimeoutAfter5ServerRTOs) {
|
| - FLAGS_quic_reloadable_flag_quic_only_5rto_client_side = true;
|
| - connection_.SetMaxTailLossProbes(2);
|
| - set_perspective(Perspective::IS_SERVER);
|
| - QuicFramerPeer::SetPerspective(QuicConnectionPeer::GetFramer(&connection_),
|
| - Perspective::IS_SERVER);
|
| - creator_->StopSendingVersion();
|
| - EXPECT_TRUE(connection_.connected());
|
| - EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
|
| - QuicConfig config;
|
| - QuicTagVector connection_options;
|
| - connection_options.push_back(k5RTO);
|
| - config.SetConnectionOptionsToSend(connection_options);
|
| - connection_.SetFromConfig(config);
|
| -
|
| - // Send stream data.
|
| - SendStreamDataToPeer(kClientDataStreamId1, "foo", 0, kFin, nullptr);
|
| -
|
| - EXPECT_CALL(visitor_, OnPathDegrading());
|
| - // Fire the retransmission alarm 6 times, twice for TLP and 4 times for RTO.
|
| - for (int i = 0; i < 6; ++i) {
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
|
| - connection_.GetRetransmissionAlarm()->Fire();
|
| - EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
|
| - EXPECT_TRUE(connection_.connected());
|
| - }
|
| -
|
| - EXPECT_EQ(2u, connection_.sent_packet_manager().GetConsecutiveTlpCount());
|
| - EXPECT_EQ(4u, connection_.sent_packet_manager().GetConsecutiveRtoCount());
|
| - // The 5th RTO should not time out server side.
|
| - EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
|
| - connection_.GetRetransmissionAlarm()->Fire();
|
| - EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
|
| - EXPECT_TRUE(connection_.connected());
|
| -}
|
| -
|
| TEST_P(QuicConnectionTest, SendScheduler) {
|
| // Test that if we send a packet without delay, it is not queued.
|
| QuicPacket* packet = ConstructDataPacket(kDefaultPathId, 1, !kHasStopWaiting);
|
| @@ -4332,8 +4290,8 @@ TEST_P(QuicConnectionTest, ServerSendsVersionNegotiationPacket) {
|
| frames.push_back(QuicFrame(&frame1_));
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| - size_t encrypted_length = framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + size_t encrypted_length = framer_.EncryptPayload(ENCRYPTION_NONE, 12, *packet,
|
| + buffer, kMaxPacketSize);
|
|
|
| framer_.set_version(version());
|
| connection_.ProcessUdpPacket(
|
| @@ -4367,8 +4325,8 @@ TEST_P(QuicConnectionTest, ServerSendsVersionNegotiationPacketSocketBlocked) {
|
| frames.push_back(QuicFrame(&frame1_));
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| - size_t encrypted_length = framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + size_t encrypted_length = framer_.EncryptPayload(ENCRYPTION_NONE, 12, *packet,
|
| + buffer, kMaxPacketSize);
|
|
|
| framer_.set_version(version());
|
| BlockOnNextWrite();
|
| @@ -4409,8 +4367,8 @@ TEST_P(QuicConnectionTest,
|
| frames.push_back(QuicFrame(&frame1_));
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| - size_t encryped_length = framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + size_t encryped_length = framer_.EncryptPayload(ENCRYPTION_NONE, 12, *packet,
|
| + buffer, kMaxPacketSize);
|
|
|
| framer_.set_version(version());
|
| set_perspective(Perspective::IS_SERVER);
|
| @@ -4448,7 +4406,7 @@ TEST_P(QuicConnectionTest, ClientHandlesVersionNegotiation) {
|
| std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 12, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, 12, *packet, buffer, kMaxPacketSize);
|
| ASSERT_NE(0u, encrypted_length);
|
| EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| @@ -4537,7 +4495,7 @@ TEST_P(QuicConnectionTest, ProcessFramesIfPacketClosedConnection) {
|
| EXPECT_TRUE(nullptr != packet.get());
|
| char buffer[kMaxPacketSize];
|
| size_t encrypted_length = peer_framer_.EncryptPayload(
|
| - ENCRYPTION_NONE, kDefaultPathId, 1, *packet, buffer, kMaxPacketSize);
|
| + ENCRYPTION_NONE, 1, *packet, buffer, kMaxPacketSize);
|
|
|
| EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PEER_GOING_AWAY, _,
|
| ConnectionCloseSource::FROM_PEER));
|
|
|