Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(453)

Side by Side Diff: net/socket/ssl_client_socket_unittest.cc

Issue 988223004: Make SSLClientSocketFalseStartTest.NoSessionResumptionBeforeFinish not a no-op. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: sleevi comments, also appease windows Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/socket/ssl_client_socket.h" 5 #include "net/socket/ssl_client_socket.h"
6 6
7 #include "base/callback_helpers.h" 7 #include "base/callback_helpers.h"
8 #include "base/memory/ref_counted.h" 8 #include "base/memory/ref_counted.h"
9 #include "base/run_loop.h" 9 #include "base/run_loop.h"
10 #include "base/time/time.h" 10 #include "base/time/time.h"
(...skipping 3152 matching lines...) Expand 10 before | Expand all | Expand 10 after
3163 server_options.bulk_ciphers = 3163 server_options.bulk_ciphers =
3164 SpawnedTestServer::SSLOptions::BULK_CIPHER_AES128GCM; 3164 SpawnedTestServer::SSLOptions::BULK_CIPHER_AES128GCM;
3165 server_options.enable_npn = true; 3165 server_options.enable_npn = true;
3166 ASSERT_TRUE(StartTestServer(server_options)); 3166 ASSERT_TRUE(StartTestServer(server_options));
3167 3167
3168 SSLConfig client_config; 3168 SSLConfig client_config;
3169 client_config.next_protos.push_back(kProtoHTTP11); 3169 client_config.next_protos.push_back(kProtoHTTP11);
3170 3170
3171 // Start a handshake up to the server Finished message. 3171 // Start a handshake up to the server Finished message.
3172 TestCompletionCallback callback; 3172 TestCompletionCallback callback;
3173 FakeBlockingStreamSocket* raw_transport1; 3173 FakeBlockingStreamSocket* raw_transport1 = NULL;
3174 scoped_ptr<SSLClientSocket> sock1; 3174 scoped_ptr<SSLClientSocket> sock1;
3175 ASSERT_NO_FATAL_FAILURE(CreateAndConnectUntilServerFinishedReceived( 3175 ASSERT_NO_FATAL_FAILURE(CreateAndConnectUntilServerFinishedReceived(
3176 client_config, &callback, &raw_transport1, &sock1)); 3176 client_config, &callback, &raw_transport1, &sock1));
3177 // Although raw_transport1 has the server Finished blocked, the handshake 3177 // Although raw_transport1 has the server Finished blocked, the handshake
3178 // still completes. 3178 // still completes.
3179 EXPECT_EQ(OK, callback.WaitForResult()); 3179 EXPECT_EQ(OK, callback.WaitForResult());
3180 3180
3181 // Continue to block the client (|sock1|) from processing the Finished
3182 // message, but allow it to arrive on the socket. This ensures that, from the
3183 // server's point of view, it has completed the handshake and added the
3184 // session to its session cache.
3185 //
3186 // The actual read on |sock1| will not complete until the Finished message is
3187 // processed; however, pump the underlying transport so that it is read from
3188 // the socket. This still has the potential to race, but is generally unlikely
3189 // due to socket buffer sizes.
3190 scoped_refptr<IOBuffer> buf(new IOBuffer(4096));
3191 int rv = sock1->Read(buf.get(), 4096, callback.callback());
3192 EXPECT_EQ(ERR_IO_PENDING, rv);
3193 raw_transport1->WaitForReadResult();
3194
3181 // Drop the old socket. This is needed because the Python test server can't 3195 // Drop the old socket. This is needed because the Python test server can't
3182 // service two sockets in parallel. 3196 // service two sockets in parallel.
3183 sock1.reset(); 3197 sock1.reset();
3184 3198
3185 // Start a second connection. 3199 // Start a second connection.
3186 scoped_ptr<StreamSocket> transport2( 3200 scoped_ptr<StreamSocket> transport2(
3187 new TCPClientSocket(addr(), &log_, NetLog::Source())); 3201 new TCPClientSocket(addr(), &log_, NetLog::Source()));
3188 EXPECT_EQ(OK, callback.GetResult(transport2->Connect(callback.callback()))); 3202 EXPECT_EQ(OK, callback.GetResult(transport2->Connect(callback.callback())));
3189 scoped_ptr<SSLClientSocket> sock2 = CreateSSLClientSocket( 3203 scoped_ptr<SSLClientSocket> sock2 = CreateSSLClientSocket(
3190 transport2.Pass(), test_server()->host_port_pair(), client_config); 3204 transport2.Pass(), test_server()->host_port_pair(), client_config);
(...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after
3252 ssl_config.channel_id_enabled = true; 3266 ssl_config.channel_id_enabled = true;
3253 3267
3254 int rv; 3268 int rv;
3255 ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv)); 3269 ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
3256 3270
3257 EXPECT_EQ(ERR_UNEXPECTED, rv); 3271 EXPECT_EQ(ERR_UNEXPECTED, rv);
3258 EXPECT_FALSE(sock_->IsConnected()); 3272 EXPECT_FALSE(sock_->IsConnected());
3259 } 3273 }
3260 3274
3261 } // namespace net 3275 } // namespace net
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698