OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/quic_stream_factory.h" | 5 #include "net/quic/quic_stream_factory.h" |
6 | 6 |
7 #include "base/run_loop.h" | 7 #include "base/run_loop.h" |
8 #include "base/strings/string_util.h" | 8 #include "base/strings/string_util.h" |
9 #include "net/base/test_data_directory.h" | 9 #include "net/base/test_data_directory.h" |
10 #include "net/cert/cert_verifier.h" | 10 #include "net/cert/cert_verifier.h" |
11 #include "net/dns/mock_host_resolver.h" | 11 #include "net/dns/mock_host_resolver.h" |
12 #include "net/http/http_response_headers.h" | 12 #include "net/http/http_response_headers.h" |
13 #include "net/http/http_response_info.h" | 13 #include "net/http/http_response_info.h" |
14 #include "net/http/http_util.h" | 14 #include "net/http/http_util.h" |
15 #include "net/http/transport_security_state.h" | 15 #include "net/http/transport_security_state.h" |
16 #include "net/quic/crypto/crypto_handshake.h" | 16 #include "net/quic/crypto/crypto_handshake.h" |
17 #include "net/quic/crypto/proof_verifier_chromium.h" | 17 #include "net/quic/crypto/proof_verifier_chromium.h" |
18 #include "net/quic/crypto/quic_decrypter.h" | 18 #include "net/quic/crypto/quic_decrypter.h" |
19 #include "net/quic/crypto/quic_encrypter.h" | 19 #include "net/quic/crypto/quic_encrypter.h" |
20 #include "net/quic/quic_http_stream.h" | 20 #include "net/quic/quic_http_stream.h" |
21 #include "net/quic/quic_server_id.h" | 21 #include "net/quic/quic_server_id.h" |
22 #include "net/quic/test_tools/mock_clock.h" | 22 #include "net/quic/test_tools/mock_clock.h" |
23 #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" | 23 #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" |
24 #include "net/quic/test_tools/mock_random.h" | 24 #include "net/quic/test_tools/mock_random.h" |
25 #include "net/quic/test_tools/quic_test_packet_maker.h" | 25 #include "net/quic/test_tools/quic_test_packet_maker.h" |
26 #include "net/quic/test_tools/quic_test_utils.h" | 26 #include "net/quic/test_tools/quic_test_utils.h" |
27 #include "net/socket/socket_test_util.h" | 27 #include "net/socket/socket_test_util.h" |
| 28 #include "net/spdy/spdy_test_utils.h" |
28 #include "net/ssl/channel_id_service.h" | 29 #include "net/ssl/channel_id_service.h" |
29 #include "net/ssl/default_channel_id_store.h" | 30 #include "net/ssl/default_channel_id_store.h" |
30 #include "net/test/cert_test_util.h" | 31 #include "net/test/cert_test_util.h" |
31 #include "testing/gtest/include/gtest/gtest.h" | 32 #include "testing/gtest/include/gtest/gtest.h" |
32 | 33 |
33 using base::StringPiece; | 34 using base::StringPiece; |
34 using std::string; | 35 using std::string; |
35 using std::vector; | 36 using std::vector; |
36 | 37 |
37 namespace net { | 38 namespace net { |
(...skipping 315 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
353 &factory_, host_port_pair_, is_https_), | 354 &factory_, host_port_pair_, is_https_), |
354 QuicStreamFactoryPeer::GetActiveSession( | 355 QuicStreamFactoryPeer::GetActiveSession( |
355 &factory_, host_port_pair_, !is_https_)); | 356 &factory_, host_port_pair_, !is_https_)); |
356 | 357 |
357 EXPECT_TRUE(socket_data1.at_read_eof()); | 358 EXPECT_TRUE(socket_data1.at_read_eof()); |
358 EXPECT_TRUE(socket_data1.at_write_eof()); | 359 EXPECT_TRUE(socket_data1.at_write_eof()); |
359 EXPECT_TRUE(socket_data2.at_read_eof()); | 360 EXPECT_TRUE(socket_data2.at_read_eof()); |
360 EXPECT_TRUE(socket_data2.at_write_eof()); | 361 EXPECT_TRUE(socket_data2.at_write_eof()); |
361 } | 362 } |
362 | 363 |
363 // TODO(rch): re-enable this. | 364 TEST_P(QuicStreamFactoryTest, Pooling) { |
364 TEST_P(QuicStreamFactoryTest, DISABLED_Pooling) { | |
365 MockRead reads[] = { | 365 MockRead reads[] = { |
366 MockRead(ASYNC, OK, 0) // EOF | 366 MockRead(ASYNC, OK, 0) // EOF |
367 }; | 367 }; |
368 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); | 368 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); |
369 socket_factory_.AddSocketDataProvider(&socket_data); | 369 socket_factory_.AddSocketDataProvider(&socket_data); |
370 socket_data.StopAfter(1); | 370 socket_data.StopAfter(1); |
371 | 371 |
372 HostPortPair server2("mail.google.com", kDefaultServerPort); | 372 HostPortPair server2("mail.google.com", kDefaultServerPort); |
373 host_resolver_.set_synchronous_mode(true); | 373 host_resolver_.set_synchronous_mode(true); |
374 host_resolver_.rules()->AddIPLiteralRule( | 374 host_resolver_.rules()->AddIPLiteralRule( |
(...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
470 | 470 |
471 EXPECT_TRUE(QuicStreamFactoryPeer::HasActiveSession( | 471 EXPECT_TRUE(QuicStreamFactoryPeer::HasActiveSession( |
472 &factory_, server2, is_https_)); | 472 &factory_, server2, is_https_)); |
473 | 473 |
474 EXPECT_TRUE(socket_data1.at_read_eof()); | 474 EXPECT_TRUE(socket_data1.at_read_eof()); |
475 EXPECT_TRUE(socket_data1.at_write_eof()); | 475 EXPECT_TRUE(socket_data1.at_write_eof()); |
476 EXPECT_TRUE(socket_data2.at_read_eof()); | 476 EXPECT_TRUE(socket_data2.at_read_eof()); |
477 EXPECT_TRUE(socket_data2.at_write_eof()); | 477 EXPECT_TRUE(socket_data2.at_write_eof()); |
478 } | 478 } |
479 | 479 |
480 // TODO(rch): re-enable this. | 480 TEST_P(QuicStreamFactoryTest, HttpsPooling) { |
481 TEST_P(QuicStreamFactoryTest, DISABLED_HttpsPooling) { | |
482 MockRead reads[] = { | 481 MockRead reads[] = { |
483 MockRead(ASYNC, OK, 0) // EOF | 482 MockRead(ASYNC, OK, 0) // EOF |
484 }; | 483 }; |
485 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); | 484 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); |
486 socket_factory_.AddSocketDataProvider(&socket_data); | 485 socket_factory_.AddSocketDataProvider(&socket_data); |
487 socket_data.StopAfter(1); | 486 socket_data.StopAfter(1); |
488 | 487 |
489 HostPortPair server1("www.example.org", 443); | 488 HostPortPair server1("www.example.org", 443); |
490 HostPortPair server2("mail.example.org", 443); | 489 HostPortPair server2("mail.example.org", 443); |
491 | 490 |
492 // Load a cert that is valid for: | 491 // Load a cert that is valid for: |
493 // www.example.org (server1) | 492 // www.example.org (server1) |
494 // mail.example.org (server2) | 493 // mail.example.org (server2) |
495 // www.example.com | 494 // www.example.com |
496 base::FilePath certs_dir = GetTestCertsDirectory(); | 495 base::FilePath certs_dir = GetTestCertsDirectory(); |
497 scoped_refptr<X509Certificate> test_cert( | 496 scoped_refptr<X509Certificate> test_cert( |
498 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); | 497 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
499 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); | 498 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); |
500 ProofVerifyDetailsChromium verify_details; | 499 ProofVerifyDetailsChromium verify_details; |
501 verify_details.cert_verify_result.verified_cert = test_cert; | 500 verify_details.cert_verify_result.verified_cert = test_cert; |
| 501 verify_details.cert_verify_result.is_issued_by_known_root = true; |
502 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); | 502 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
503 | 503 |
504 host_resolver_.set_synchronous_mode(true); | 504 host_resolver_.set_synchronous_mode(true); |
505 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); | 505 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
506 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); | 506 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); |
507 | 507 |
508 QuicStreamRequest request(&factory_); | 508 QuicStreamRequest request(&factory_); |
509 is_https_ = true; | 509 is_https_ = true; |
510 EXPECT_EQ(OK, | 510 EXPECT_EQ(OK, |
511 request.Request(server1, | 511 request.Request(server1, |
(...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
598 &factory_, server1, is_https_), | 598 &factory_, server1, is_https_), |
599 QuicStreamFactoryPeer::GetActiveSession( | 599 QuicStreamFactoryPeer::GetActiveSession( |
600 &factory_, server2, is_https_)); | 600 &factory_, server2, is_https_)); |
601 | 601 |
602 EXPECT_TRUE(socket_data1.at_read_eof()); | 602 EXPECT_TRUE(socket_data1.at_read_eof()); |
603 EXPECT_TRUE(socket_data1.at_write_eof()); | 603 EXPECT_TRUE(socket_data1.at_write_eof()); |
604 EXPECT_TRUE(socket_data2.at_read_eof()); | 604 EXPECT_TRUE(socket_data2.at_read_eof()); |
605 EXPECT_TRUE(socket_data2.at_write_eof()); | 605 EXPECT_TRUE(socket_data2.at_write_eof()); |
606 } | 606 } |
607 | 607 |
| 608 TEST_P(QuicStreamFactoryTest, HttpsPoolingWithMatchingPins) { |
| 609 MockRead reads[] = { |
| 610 MockRead(ASYNC, OK, 0) // EOF |
| 611 }; |
| 612 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); |
| 613 socket_factory_.AddSocketDataProvider(&socket_data); |
| 614 socket_data.StopAfter(1); |
| 615 |
| 616 HostPortPair server1("www.example.org", 443); |
| 617 HostPortPair server2("mail.example.org", 443); |
| 618 uint8 primary_pin = 1; |
| 619 uint8 backup_pin = 2; |
| 620 test::AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 621 backup_pin); |
| 622 |
| 623 // Load a cert that is valid for: |
| 624 // www.example.org (server1) |
| 625 // mail.example.org (server2) |
| 626 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 627 scoped_refptr<X509Certificate> test_cert( |
| 628 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 629 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); |
| 630 ProofVerifyDetailsChromium verify_details; |
| 631 verify_details.cert_verify_result.verified_cert = test_cert; |
| 632 verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 633 verify_details.cert_verify_result.public_key_hashes.push_back( |
| 634 test::GetTestHashValue(primary_pin)); |
| 635 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 636 |
| 637 |
| 638 host_resolver_.set_synchronous_mode(true); |
| 639 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| 640 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); |
| 641 |
| 642 QuicStreamRequest request(&factory_); |
| 643 is_https_ = true; |
| 644 EXPECT_EQ(OK, |
| 645 request.Request(server1, |
| 646 is_https_, |
| 647 privacy_mode_, |
| 648 "GET", |
| 649 net_log_, |
| 650 callback_.callback())); |
| 651 scoped_ptr<QuicHttpStream> stream = request.ReleaseStream(); |
| 652 EXPECT_TRUE(stream.get()); |
| 653 |
| 654 TestCompletionCallback callback; |
| 655 QuicStreamRequest request2(&factory_); |
| 656 EXPECT_EQ(OK, |
| 657 request2.Request(server2, |
| 658 is_https_, |
| 659 privacy_mode_, |
| 660 "GET", |
| 661 net_log_, |
| 662 callback_.callback())); |
| 663 scoped_ptr<QuicHttpStream> stream2 = request2.ReleaseStream(); |
| 664 EXPECT_TRUE(stream2.get()); |
| 665 |
| 666 EXPECT_EQ(QuicStreamFactoryPeer::GetActiveSession( |
| 667 &factory_, server1, is_https_), |
| 668 QuicStreamFactoryPeer::GetActiveSession( |
| 669 &factory_, server2, is_https_)); |
| 670 |
| 671 EXPECT_TRUE(socket_data.at_read_eof()); |
| 672 EXPECT_TRUE(socket_data.at_write_eof()); |
| 673 } |
| 674 |
| 675 TEST_P(QuicStreamFactoryTest, NoHttpsPoolingWithDifferentPins) { |
| 676 MockRead reads[] = { |
| 677 MockRead(ASYNC, OK, 0) // EOF |
| 678 }; |
| 679 DeterministicSocketData socket_data1(reads, arraysize(reads), NULL, 0); |
| 680 DeterministicSocketData socket_data2(reads, arraysize(reads), NULL, 0); |
| 681 socket_factory_.AddSocketDataProvider(&socket_data1); |
| 682 socket_factory_.AddSocketDataProvider(&socket_data2); |
| 683 socket_data1.StopAfter(1); |
| 684 socket_data2.StopAfter(1); |
| 685 |
| 686 HostPortPair server1("www.example.org", 443); |
| 687 HostPortPair server2("mail.example.org", 443); |
| 688 uint8 primary_pin = 1; |
| 689 uint8 backup_pin = 2; |
| 690 uint8 bad_pin = 3; |
| 691 test::AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 692 backup_pin); |
| 693 |
| 694 // Load a cert that is valid for: |
| 695 // www.example.org (server1) |
| 696 // mail.example.org (server2) |
| 697 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 698 scoped_refptr<X509Certificate> test_cert( |
| 699 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 700 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); |
| 701 ProofVerifyDetailsChromium verify_details; |
| 702 verify_details.cert_verify_result.verified_cert = test_cert; |
| 703 verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 704 verify_details.cert_verify_result.public_key_hashes.push_back( |
| 705 test::GetTestHashValue(bad_pin)); |
| 706 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 707 |
| 708 |
| 709 host_resolver_.set_synchronous_mode(true); |
| 710 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| 711 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); |
| 712 |
| 713 QuicStreamRequest request(&factory_); |
| 714 is_https_ = true; |
| 715 EXPECT_EQ(OK, |
| 716 request.Request(server1, |
| 717 is_https_, |
| 718 privacy_mode_, |
| 719 "GET", |
| 720 net_log_, |
| 721 callback_.callback())); |
| 722 scoped_ptr<QuicHttpStream> stream = request.ReleaseStream(); |
| 723 EXPECT_TRUE(stream.get()); |
| 724 |
| 725 TestCompletionCallback callback; |
| 726 QuicStreamRequest request2(&factory_); |
| 727 EXPECT_EQ(OK, |
| 728 request2.Request(server2, |
| 729 is_https_, |
| 730 privacy_mode_, |
| 731 "GET", |
| 732 net_log_, |
| 733 callback_.callback())); |
| 734 scoped_ptr<QuicHttpStream> stream2 = request2.ReleaseStream(); |
| 735 EXPECT_TRUE(stream2.get()); |
| 736 |
| 737 EXPECT_NE(QuicStreamFactoryPeer::GetActiveSession( |
| 738 &factory_, server1, is_https_), |
| 739 QuicStreamFactoryPeer::GetActiveSession( |
| 740 &factory_, server2, is_https_)); |
| 741 |
| 742 EXPECT_TRUE(socket_data1.at_read_eof()); |
| 743 EXPECT_TRUE(socket_data1.at_write_eof()); |
| 744 EXPECT_TRUE(socket_data2.at_read_eof()); |
| 745 EXPECT_TRUE(socket_data2.at_write_eof()); |
| 746 } |
| 747 |
608 TEST_P(QuicStreamFactoryTest, Goaway) { | 748 TEST_P(QuicStreamFactoryTest, Goaway) { |
609 MockRead reads[] = { | 749 MockRead reads[] = { |
610 MockRead(ASYNC, OK, 0) // EOF | 750 MockRead(ASYNC, OK, 0) // EOF |
611 }; | 751 }; |
612 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); | 752 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); |
613 socket_data.StopAfter(1); | 753 socket_data.StopAfter(1); |
614 socket_factory_.AddSocketDataProvider(&socket_data); | 754 socket_factory_.AddSocketDataProvider(&socket_data); |
615 DeterministicSocketData socket_data2(reads, arraysize(reads), NULL, 0); | 755 DeterministicSocketData socket_data2(reads, arraysize(reads), NULL, 0); |
616 socket_data2.StopAfter(1); | 756 socket_data2.StopAfter(1); |
617 socket_factory_.AddSocketDataProvider(&socket_data2); | 757 socket_factory_.AddSocketDataProvider(&socket_data2); |
(...skipping 533 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1151 QuicCryptoClientConfig::CachedState* cached2 = | 1291 QuicCryptoClientConfig::CachedState* cached2 = |
1152 crypto_config->LookupOrCreate(server_id2); | 1292 crypto_config->LookupOrCreate(server_id2); |
1153 EXPECT_NE(cached1->source_address_token(), cached2->source_address_token()); | 1293 EXPECT_NE(cached1->source_address_token(), cached2->source_address_token()); |
1154 EXPECT_TRUE(cached2->source_address_token().empty()); | 1294 EXPECT_TRUE(cached2->source_address_token().empty()); |
1155 EXPECT_FALSE(cached2->proof_valid()); | 1295 EXPECT_FALSE(cached2->proof_valid()); |
1156 } | 1296 } |
1157 } | 1297 } |
1158 | 1298 |
1159 } // namespace test | 1299 } // namespace test |
1160 } // namespace net | 1300 } // namespace net |
OLD | NEW |