| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/quic_stream_factory.h" | 5 #include "net/quic/quic_stream_factory.h" |
| 6 | 6 |
| 7 #include "base/run_loop.h" | 7 #include "base/run_loop.h" |
| 8 #include "base/strings/string_util.h" | 8 #include "base/strings/string_util.h" |
| 9 #include "net/base/test_data_directory.h" | 9 #include "net/base/test_data_directory.h" |
| 10 #include "net/cert/cert_verifier.h" | 10 #include "net/cert/cert_verifier.h" |
| 11 #include "net/dns/mock_host_resolver.h" | 11 #include "net/dns/mock_host_resolver.h" |
| 12 #include "net/http/http_response_headers.h" | 12 #include "net/http/http_response_headers.h" |
| 13 #include "net/http/http_response_info.h" | 13 #include "net/http/http_response_info.h" |
| 14 #include "net/http/http_util.h" | 14 #include "net/http/http_util.h" |
| 15 #include "net/http/transport_security_state.h" | 15 #include "net/http/transport_security_state.h" |
| 16 #include "net/quic/crypto/crypto_handshake.h" | 16 #include "net/quic/crypto/crypto_handshake.h" |
| 17 #include "net/quic/crypto/proof_verifier_chromium.h" | 17 #include "net/quic/crypto/proof_verifier_chromium.h" |
| 18 #include "net/quic/crypto/quic_decrypter.h" | 18 #include "net/quic/crypto/quic_decrypter.h" |
| 19 #include "net/quic/crypto/quic_encrypter.h" | 19 #include "net/quic/crypto/quic_encrypter.h" |
| 20 #include "net/quic/quic_http_stream.h" | 20 #include "net/quic/quic_http_stream.h" |
| 21 #include "net/quic/quic_server_id.h" | 21 #include "net/quic/quic_server_id.h" |
| 22 #include "net/quic/test_tools/mock_clock.h" | 22 #include "net/quic/test_tools/mock_clock.h" |
| 23 #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" | 23 #include "net/quic/test_tools/mock_crypto_client_stream_factory.h" |
| 24 #include "net/quic/test_tools/mock_random.h" | 24 #include "net/quic/test_tools/mock_random.h" |
| 25 #include "net/quic/test_tools/quic_test_packet_maker.h" | 25 #include "net/quic/test_tools/quic_test_packet_maker.h" |
| 26 #include "net/quic/test_tools/quic_test_utils.h" | 26 #include "net/quic/test_tools/quic_test_utils.h" |
| 27 #include "net/socket/socket_test_util.h" | 27 #include "net/socket/socket_test_util.h" |
| 28 #include "net/spdy/spdy_test_utils.h" |
| 28 #include "net/ssl/channel_id_service.h" | 29 #include "net/ssl/channel_id_service.h" |
| 29 #include "net/ssl/default_channel_id_store.h" | 30 #include "net/ssl/default_channel_id_store.h" |
| 30 #include "net/test/cert_test_util.h" | 31 #include "net/test/cert_test_util.h" |
| 31 #include "testing/gtest/include/gtest/gtest.h" | 32 #include "testing/gtest/include/gtest/gtest.h" |
| 32 | 33 |
| 33 using base::StringPiece; | 34 using base::StringPiece; |
| 34 using std::string; | 35 using std::string; |
| 35 using std::vector; | 36 using std::vector; |
| 36 | 37 |
| 37 namespace net { | 38 namespace net { |
| (...skipping 315 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 353 &factory_, host_port_pair_, is_https_), | 354 &factory_, host_port_pair_, is_https_), |
| 354 QuicStreamFactoryPeer::GetActiveSession( | 355 QuicStreamFactoryPeer::GetActiveSession( |
| 355 &factory_, host_port_pair_, !is_https_)); | 356 &factory_, host_port_pair_, !is_https_)); |
| 356 | 357 |
| 357 EXPECT_TRUE(socket_data1.at_read_eof()); | 358 EXPECT_TRUE(socket_data1.at_read_eof()); |
| 358 EXPECT_TRUE(socket_data1.at_write_eof()); | 359 EXPECT_TRUE(socket_data1.at_write_eof()); |
| 359 EXPECT_TRUE(socket_data2.at_read_eof()); | 360 EXPECT_TRUE(socket_data2.at_read_eof()); |
| 360 EXPECT_TRUE(socket_data2.at_write_eof()); | 361 EXPECT_TRUE(socket_data2.at_write_eof()); |
| 361 } | 362 } |
| 362 | 363 |
| 363 // TODO(rch): re-enable this. | 364 TEST_P(QuicStreamFactoryTest, Pooling) { |
| 364 TEST_P(QuicStreamFactoryTest, DISABLED_Pooling) { | |
| 365 MockRead reads[] = { | 365 MockRead reads[] = { |
| 366 MockRead(ASYNC, OK, 0) // EOF | 366 MockRead(ASYNC, OK, 0) // EOF |
| 367 }; | 367 }; |
| 368 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); | 368 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); |
| 369 socket_factory_.AddSocketDataProvider(&socket_data); | 369 socket_factory_.AddSocketDataProvider(&socket_data); |
| 370 socket_data.StopAfter(1); | 370 socket_data.StopAfter(1); |
| 371 | 371 |
| 372 HostPortPair server2("mail.google.com", kDefaultServerPort); | 372 HostPortPair server2("mail.google.com", kDefaultServerPort); |
| 373 host_resolver_.set_synchronous_mode(true); | 373 host_resolver_.set_synchronous_mode(true); |
| 374 host_resolver_.rules()->AddIPLiteralRule( | 374 host_resolver_.rules()->AddIPLiteralRule( |
| (...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 470 | 470 |
| 471 EXPECT_TRUE(QuicStreamFactoryPeer::HasActiveSession( | 471 EXPECT_TRUE(QuicStreamFactoryPeer::HasActiveSession( |
| 472 &factory_, server2, is_https_)); | 472 &factory_, server2, is_https_)); |
| 473 | 473 |
| 474 EXPECT_TRUE(socket_data1.at_read_eof()); | 474 EXPECT_TRUE(socket_data1.at_read_eof()); |
| 475 EXPECT_TRUE(socket_data1.at_write_eof()); | 475 EXPECT_TRUE(socket_data1.at_write_eof()); |
| 476 EXPECT_TRUE(socket_data2.at_read_eof()); | 476 EXPECT_TRUE(socket_data2.at_read_eof()); |
| 477 EXPECT_TRUE(socket_data2.at_write_eof()); | 477 EXPECT_TRUE(socket_data2.at_write_eof()); |
| 478 } | 478 } |
| 479 | 479 |
| 480 // TODO(rch): re-enable this. | 480 TEST_P(QuicStreamFactoryTest, HttpsPooling) { |
| 481 TEST_P(QuicStreamFactoryTest, DISABLED_HttpsPooling) { | |
| 482 MockRead reads[] = { | 481 MockRead reads[] = { |
| 483 MockRead(ASYNC, OK, 0) // EOF | 482 MockRead(ASYNC, OK, 0) // EOF |
| 484 }; | 483 }; |
| 485 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); | 484 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); |
| 486 socket_factory_.AddSocketDataProvider(&socket_data); | 485 socket_factory_.AddSocketDataProvider(&socket_data); |
| 487 socket_data.StopAfter(1); | 486 socket_data.StopAfter(1); |
| 488 | 487 |
| 489 HostPortPair server1("www.example.org", 443); | 488 HostPortPair server1("www.example.org", 443); |
| 490 HostPortPair server2("mail.example.org", 443); | 489 HostPortPair server2("mail.example.org", 443); |
| 491 | 490 |
| 492 // Load a cert that is valid for: | 491 // Load a cert that is valid for: |
| 493 // www.example.org (server1) | 492 // www.example.org (server1) |
| 494 // mail.example.org (server2) | 493 // mail.example.org (server2) |
| 495 // www.example.com | 494 // www.example.com |
| 496 base::FilePath certs_dir = GetTestCertsDirectory(); | 495 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 497 scoped_refptr<X509Certificate> test_cert( | 496 scoped_refptr<X509Certificate> test_cert( |
| 498 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); | 497 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 499 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); | 498 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); |
| 500 ProofVerifyDetailsChromium verify_details; | 499 ProofVerifyDetailsChromium verify_details; |
| 501 verify_details.cert_verify_result.verified_cert = test_cert; | 500 verify_details.cert_verify_result.verified_cert = test_cert; |
| 501 verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 502 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); | 502 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 503 | 503 |
| 504 host_resolver_.set_synchronous_mode(true); | 504 host_resolver_.set_synchronous_mode(true); |
| 505 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); | 505 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| 506 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); | 506 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); |
| 507 | 507 |
| 508 QuicStreamRequest request(&factory_); | 508 QuicStreamRequest request(&factory_); |
| 509 is_https_ = true; | 509 is_https_ = true; |
| 510 EXPECT_EQ(OK, | 510 EXPECT_EQ(OK, |
| 511 request.Request(server1, | 511 request.Request(server1, |
| (...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 598 &factory_, server1, is_https_), | 598 &factory_, server1, is_https_), |
| 599 QuicStreamFactoryPeer::GetActiveSession( | 599 QuicStreamFactoryPeer::GetActiveSession( |
| 600 &factory_, server2, is_https_)); | 600 &factory_, server2, is_https_)); |
| 601 | 601 |
| 602 EXPECT_TRUE(socket_data1.at_read_eof()); | 602 EXPECT_TRUE(socket_data1.at_read_eof()); |
| 603 EXPECT_TRUE(socket_data1.at_write_eof()); | 603 EXPECT_TRUE(socket_data1.at_write_eof()); |
| 604 EXPECT_TRUE(socket_data2.at_read_eof()); | 604 EXPECT_TRUE(socket_data2.at_read_eof()); |
| 605 EXPECT_TRUE(socket_data2.at_write_eof()); | 605 EXPECT_TRUE(socket_data2.at_write_eof()); |
| 606 } | 606 } |
| 607 | 607 |
| 608 TEST_P(QuicStreamFactoryTest, HttpsPoolingWithMatchingPins) { |
| 609 MockRead reads[] = { |
| 610 MockRead(ASYNC, OK, 0) // EOF |
| 611 }; |
| 612 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); |
| 613 socket_factory_.AddSocketDataProvider(&socket_data); |
| 614 socket_data.StopAfter(1); |
| 615 |
| 616 HostPortPair server1("www.example.org", 443); |
| 617 HostPortPair server2("mail.example.org", 443); |
| 618 uint8 primary_pin = 1; |
| 619 uint8 backup_pin = 2; |
| 620 test::AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 621 backup_pin); |
| 622 |
| 623 // Load a cert that is valid for: |
| 624 // www.example.org (server1) |
| 625 // mail.example.org (server2) |
| 626 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 627 scoped_refptr<X509Certificate> test_cert( |
| 628 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 629 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); |
| 630 ProofVerifyDetailsChromium verify_details; |
| 631 verify_details.cert_verify_result.verified_cert = test_cert; |
| 632 verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 633 verify_details.cert_verify_result.public_key_hashes.push_back( |
| 634 test::GetTestHashValue(primary_pin)); |
| 635 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 636 |
| 637 |
| 638 host_resolver_.set_synchronous_mode(true); |
| 639 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| 640 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); |
| 641 |
| 642 QuicStreamRequest request(&factory_); |
| 643 is_https_ = true; |
| 644 EXPECT_EQ(OK, |
| 645 request.Request(server1, |
| 646 is_https_, |
| 647 privacy_mode_, |
| 648 "GET", |
| 649 net_log_, |
| 650 callback_.callback())); |
| 651 scoped_ptr<QuicHttpStream> stream = request.ReleaseStream(); |
| 652 EXPECT_TRUE(stream.get()); |
| 653 |
| 654 TestCompletionCallback callback; |
| 655 QuicStreamRequest request2(&factory_); |
| 656 EXPECT_EQ(OK, |
| 657 request2.Request(server2, |
| 658 is_https_, |
| 659 privacy_mode_, |
| 660 "GET", |
| 661 net_log_, |
| 662 callback_.callback())); |
| 663 scoped_ptr<QuicHttpStream> stream2 = request2.ReleaseStream(); |
| 664 EXPECT_TRUE(stream2.get()); |
| 665 |
| 666 EXPECT_EQ(QuicStreamFactoryPeer::GetActiveSession( |
| 667 &factory_, server1, is_https_), |
| 668 QuicStreamFactoryPeer::GetActiveSession( |
| 669 &factory_, server2, is_https_)); |
| 670 |
| 671 EXPECT_TRUE(socket_data.at_read_eof()); |
| 672 EXPECT_TRUE(socket_data.at_write_eof()); |
| 673 } |
| 674 |
| 675 TEST_P(QuicStreamFactoryTest, NoHttpsPoolingWithDifferentPins) { |
| 676 MockRead reads[] = { |
| 677 MockRead(ASYNC, OK, 0) // EOF |
| 678 }; |
| 679 DeterministicSocketData socket_data1(reads, arraysize(reads), NULL, 0); |
| 680 DeterministicSocketData socket_data2(reads, arraysize(reads), NULL, 0); |
| 681 socket_factory_.AddSocketDataProvider(&socket_data1); |
| 682 socket_factory_.AddSocketDataProvider(&socket_data2); |
| 683 socket_data1.StopAfter(1); |
| 684 socket_data2.StopAfter(1); |
| 685 |
| 686 HostPortPair server1("www.example.org", 443); |
| 687 HostPortPair server2("mail.example.org", 443); |
| 688 uint8 primary_pin = 1; |
| 689 uint8 backup_pin = 2; |
| 690 uint8 bad_pin = 3; |
| 691 test::AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 692 backup_pin); |
| 693 |
| 694 // Load a cert that is valid for: |
| 695 // www.example.org (server1) |
| 696 // mail.example.org (server2) |
| 697 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 698 scoped_refptr<X509Certificate> test_cert( |
| 699 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 700 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); |
| 701 ProofVerifyDetailsChromium verify_details; |
| 702 verify_details.cert_verify_result.verified_cert = test_cert; |
| 703 verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 704 verify_details.cert_verify_result.public_key_hashes.push_back( |
| 705 test::GetTestHashValue(bad_pin)); |
| 706 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 707 |
| 708 |
| 709 host_resolver_.set_synchronous_mode(true); |
| 710 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| 711 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); |
| 712 |
| 713 QuicStreamRequest request(&factory_); |
| 714 is_https_ = true; |
| 715 EXPECT_EQ(OK, |
| 716 request.Request(server1, |
| 717 is_https_, |
| 718 privacy_mode_, |
| 719 "GET", |
| 720 net_log_, |
| 721 callback_.callback())); |
| 722 scoped_ptr<QuicHttpStream> stream = request.ReleaseStream(); |
| 723 EXPECT_TRUE(stream.get()); |
| 724 |
| 725 TestCompletionCallback callback; |
| 726 QuicStreamRequest request2(&factory_); |
| 727 EXPECT_EQ(OK, |
| 728 request2.Request(server2, |
| 729 is_https_, |
| 730 privacy_mode_, |
| 731 "GET", |
| 732 net_log_, |
| 733 callback_.callback())); |
| 734 scoped_ptr<QuicHttpStream> stream2 = request2.ReleaseStream(); |
| 735 EXPECT_TRUE(stream2.get()); |
| 736 |
| 737 EXPECT_NE(QuicStreamFactoryPeer::GetActiveSession( |
| 738 &factory_, server1, is_https_), |
| 739 QuicStreamFactoryPeer::GetActiveSession( |
| 740 &factory_, server2, is_https_)); |
| 741 |
| 742 EXPECT_TRUE(socket_data1.at_read_eof()); |
| 743 EXPECT_TRUE(socket_data1.at_write_eof()); |
| 744 EXPECT_TRUE(socket_data2.at_read_eof()); |
| 745 EXPECT_TRUE(socket_data2.at_write_eof()); |
| 746 } |
| 747 |
| 608 TEST_P(QuicStreamFactoryTest, Goaway) { | 748 TEST_P(QuicStreamFactoryTest, Goaway) { |
| 609 MockRead reads[] = { | 749 MockRead reads[] = { |
| 610 MockRead(ASYNC, OK, 0) // EOF | 750 MockRead(ASYNC, OK, 0) // EOF |
| 611 }; | 751 }; |
| 612 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); | 752 DeterministicSocketData socket_data(reads, arraysize(reads), NULL, 0); |
| 613 socket_data.StopAfter(1); | 753 socket_data.StopAfter(1); |
| 614 socket_factory_.AddSocketDataProvider(&socket_data); | 754 socket_factory_.AddSocketDataProvider(&socket_data); |
| 615 DeterministicSocketData socket_data2(reads, arraysize(reads), NULL, 0); | 755 DeterministicSocketData socket_data2(reads, arraysize(reads), NULL, 0); |
| 616 socket_data2.StopAfter(1); | 756 socket_data2.StopAfter(1); |
| 617 socket_factory_.AddSocketDataProvider(&socket_data2); | 757 socket_factory_.AddSocketDataProvider(&socket_data2); |
| (...skipping 533 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1151 QuicCryptoClientConfig::CachedState* cached2 = | 1291 QuicCryptoClientConfig::CachedState* cached2 = |
| 1152 crypto_config->LookupOrCreate(server_id2); | 1292 crypto_config->LookupOrCreate(server_id2); |
| 1153 EXPECT_NE(cached1->source_address_token(), cached2->source_address_token()); | 1293 EXPECT_NE(cached1->source_address_token(), cached2->source_address_token()); |
| 1154 EXPECT_TRUE(cached2->source_address_token().empty()); | 1294 EXPECT_TRUE(cached2->source_address_token().empty()); |
| 1155 EXPECT_FALSE(cached2->proof_valid()); | 1295 EXPECT_FALSE(cached2->proof_valid()); |
| 1156 } | 1296 } |
| 1157 } | 1297 } |
| 1158 | 1298 |
| 1159 } // namespace test | 1299 } // namespace test |
| 1160 } // namespace net | 1300 } // namespace net |
| OLD | NEW |