OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/quic/quic_packet_creator.h" | |
6 | |
7 #include "base/stl_util.h" | |
8 #include "net/quic/crypto/null_encrypter.h" | |
9 #include "net/quic/crypto/quic_decrypter.h" | |
10 #include "net/quic/crypto/quic_encrypter.h" | |
11 #include "net/quic/quic_utils.h" | |
12 #include "net/quic/test_tools/mock_random.h" | |
13 #include "net/quic/test_tools/quic_framer_peer.h" | |
14 #include "net/quic/test_tools/quic_packet_creator_peer.h" | |
15 #include "net/quic/test_tools/quic_test_utils.h" | |
16 #include "net/test/gtest_util.h" | |
17 #include "testing/gmock/include/gmock/gmock.h" | |
18 | |
19 using base::StringPiece; | |
20 using std::ostream; | |
21 using std::string; | |
22 using std::vector; | |
23 using testing::DoAll; | |
24 using testing::InSequence; | |
25 using testing::Return; | |
26 using testing::SaveArg; | |
27 using testing::_; | |
28 | |
29 namespace net { | |
30 namespace test { | |
31 namespace { | |
32 | |
33 // Run tests with combinations of {QuicVersion, ToggleVersionSerialization}. | |
34 struct TestParams { | |
35 TestParams(QuicVersion version, | |
36 bool version_serialization, | |
37 QuicConnectionIdLength length) | |
38 : version(version), | |
39 connection_id_length(length), | |
40 version_serialization(version_serialization) { | |
41 } | |
42 | |
43 friend ostream& operator<<(ostream& os, const TestParams& p) { | |
44 os << "{ client_version: " << QuicVersionToString(p.version) | |
45 << " connection id length: " << p.connection_id_length | |
46 << " include version: " << p.version_serialization << " }"; | |
47 return os; | |
48 } | |
49 | |
50 QuicVersion version; | |
51 QuicConnectionIdLength connection_id_length; | |
52 bool version_serialization; | |
53 }; | |
54 | |
55 // Constructs various test permutations. | |
56 vector<TestParams> GetTestParams() { | |
57 vector<TestParams> params; | |
58 QuicConnectionIdLength max = PACKET_8BYTE_CONNECTION_ID; | |
59 QuicVersionVector all_supported_versions = QuicSupportedVersions(); | |
60 for (size_t i = 0; i < all_supported_versions.size(); ++i) { | |
61 params.push_back(TestParams(all_supported_versions[i], true, max)); | |
62 params.push_back(TestParams(all_supported_versions[i], false, max)); | |
63 } | |
64 params.push_back(TestParams( | |
65 all_supported_versions[0], true, PACKET_0BYTE_CONNECTION_ID)); | |
66 params.push_back(TestParams( | |
67 all_supported_versions[0], true, PACKET_1BYTE_CONNECTION_ID)); | |
68 params.push_back(TestParams( | |
69 all_supported_versions[0], true, PACKET_4BYTE_CONNECTION_ID)); | |
70 return params; | |
71 } | |
72 | |
73 class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> { | |
74 protected: | |
75 QuicPacketCreatorTest() | |
76 : server_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(), | |
77 true), | |
78 client_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(), | |
79 false), | |
80 sequence_number_(0), | |
81 connection_id_(2), | |
82 data_("foo"), | |
83 creator_(connection_id_, &client_framer_, &mock_random_) { | |
84 creator_.set_connection_id_length(GetParam().connection_id_length); | |
85 client_framer_.set_visitor(&framer_visitor_); | |
86 client_framer_.set_received_entropy_calculator(&entropy_calculator_); | |
87 server_framer_.set_visitor(&framer_visitor_); | |
88 } | |
89 | |
90 ~QuicPacketCreatorTest() override {} | |
91 | |
92 void ProcessPacket(QuicEncryptedPacket* encrypted) { | |
93 server_framer_.ProcessPacket(*encrypted); | |
94 } | |
95 | |
96 void CheckStreamFrame(const QuicFrame& frame, | |
97 QuicStreamId stream_id, | |
98 const string& data, | |
99 QuicStreamOffset offset, | |
100 bool fin) { | |
101 EXPECT_EQ(STREAM_FRAME, frame.type); | |
102 ASSERT_TRUE(frame.stream_frame); | |
103 EXPECT_EQ(stream_id, frame.stream_frame->stream_id); | |
104 scoped_ptr<string> frame_data(frame.stream_frame->GetDataAsString()); | |
105 EXPECT_EQ(data, *frame_data); | |
106 EXPECT_EQ(offset, frame.stream_frame->offset); | |
107 EXPECT_EQ(fin, frame.stream_frame->fin); | |
108 } | |
109 | |
110 // Returns the number of bytes consumed by the header of packet, including | |
111 // the version. | |
112 size_t GetPacketHeaderOverhead(InFecGroup is_in_fec_group) { | |
113 return GetPacketHeaderSize(creator_.connection_id_length(), | |
114 kIncludeVersion, | |
115 creator_.next_sequence_number_length(), | |
116 is_in_fec_group); | |
117 } | |
118 | |
119 // Returns the number of bytes of overhead that will be added to a packet | |
120 // of maximum length. | |
121 size_t GetEncryptionOverhead() { | |
122 return creator_.max_packet_length() - client_framer_.GetMaxPlaintextSize( | |
123 creator_.max_packet_length()); | |
124 } | |
125 | |
126 // Returns the number of bytes consumed by the non-data fields of a stream | |
127 // frame, assuming it is the last frame in the packet | |
128 size_t GetStreamFrameOverhead(InFecGroup is_in_fec_group) { | |
129 return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset, | |
130 true, is_in_fec_group); | |
131 } | |
132 | |
133 // Enables and turns on FEC protection. Returns true if FEC protection is on. | |
134 bool SwitchFecProtectionOn(size_t max_packets_per_fec_group) { | |
135 creator_.set_max_packets_per_fec_group(max_packets_per_fec_group); | |
136 creator_.StartFecProtectingPackets(); | |
137 return creator_.IsFecProtected(); | |
138 } | |
139 | |
140 static const QuicStreamOffset kOffset = 1u; | |
141 | |
142 QuicFrames frames_; | |
143 QuicFramer server_framer_; | |
144 QuicFramer client_framer_; | |
145 testing::StrictMock<MockFramerVisitor> framer_visitor_; | |
146 QuicPacketSequenceNumber sequence_number_; | |
147 QuicConnectionId connection_id_; | |
148 string data_; | |
149 MockRandom mock_random_; | |
150 QuicPacketCreator creator_; | |
151 MockEntropyCalculator entropy_calculator_; | |
152 }; | |
153 | |
154 // Run all packet creator tests with all supported versions of QUIC, and with | |
155 // and without version in the packet header, as well as doing a run for each | |
156 // length of truncated connection id. | |
157 INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests, | |
158 QuicPacketCreatorTest, | |
159 ::testing::ValuesIn(GetTestParams())); | |
160 | |
161 TEST_P(QuicPacketCreatorTest, SerializeFrames) { | |
162 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
163 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
164 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, true, 0u, IOVector()))); | |
165 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
166 delete frames_[0].ack_frame; | |
167 delete frames_[1].stream_frame; | |
168 delete frames_[2].stream_frame; | |
169 | |
170 { | |
171 InSequence s; | |
172 EXPECT_CALL(framer_visitor_, OnPacket()); | |
173 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
174 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
175 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
176 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
177 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
178 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
179 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
180 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
181 } | |
182 ProcessPacket(serialized.packet); | |
183 delete serialized.packet; | |
184 } | |
185 | |
186 TEST_P(QuicPacketCreatorTest, SerializeWithFEC) { | |
187 // Enable FEC protection, and send FEC packet every 6 packets. | |
188 EXPECT_TRUE(SwitchFecProtectionOn(6)); | |
189 // Should return false since we do not have enough packets in the FEC group to | |
190 // trigger an FEC packet. | |
191 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
192 | |
193 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
194 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
195 delete frames_[0].stream_frame; | |
196 | |
197 { | |
198 InSequence s; | |
199 EXPECT_CALL(framer_visitor_, OnPacket()); | |
200 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
201 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
202 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
203 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
204 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_)); | |
205 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
206 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
207 } | |
208 ProcessPacket(serialized.packet); | |
209 delete serialized.packet; | |
210 | |
211 // Should return false since we do not have enough packets in the FEC group to | |
212 // trigger an FEC packet. | |
213 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
214 // Should return true since there are packets in the FEC group. | |
215 ASSERT_TRUE(creator_.ShouldSendFec(/*force_close=*/true)); | |
216 | |
217 serialized = creator_.SerializeFec(); | |
218 ASSERT_EQ(2u, serialized.sequence_number); | |
219 { | |
220 InSequence s; | |
221 EXPECT_CALL(framer_visitor_, OnPacket()); | |
222 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
223 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
224 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
225 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
226 EXPECT_CALL(framer_visitor_, OnFecData(_)); | |
227 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
228 } | |
229 ProcessPacket(serialized.packet); | |
230 delete serialized.packet; | |
231 } | |
232 | |
233 TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) { | |
234 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
235 creator_.AddSavedFrame(frames_[0]); | |
236 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER); | |
237 SerializedPacket serialized = creator_.SerializePacket(); | |
238 // The sequence number length will not change mid-packet. | |
239 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
240 | |
241 { | |
242 InSequence s; | |
243 EXPECT_CALL(framer_visitor_, OnPacket()); | |
244 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
245 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
246 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
247 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
248 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
249 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
250 } | |
251 ProcessPacket(serialized.packet); | |
252 delete serialized.packet; | |
253 | |
254 creator_.AddSavedFrame(frames_[0]); | |
255 serialized = creator_.SerializePacket(); | |
256 // Now the actual sequence number length should have changed. | |
257 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
258 delete frames_[0].ack_frame; | |
259 | |
260 { | |
261 InSequence s; | |
262 EXPECT_CALL(framer_visitor_, OnPacket()); | |
263 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
264 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
265 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
266 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
267 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
268 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
269 } | |
270 ProcessPacket(serialized.packet); | |
271 delete serialized.packet; | |
272 } | |
273 | |
274 TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) { | |
275 // Changing the sequence number length with queued frames in the creator | |
276 // should hold the change until after any currently queued frames are | |
277 // serialized. | |
278 | |
279 // Packet 1. | |
280 // Queue a frame in the creator. | |
281 EXPECT_FALSE(creator_.HasPendingFrames()); | |
282 QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); | |
283 creator_.AddSavedFrame(ack_frame); | |
284 | |
285 // Now change sequence number length. | |
286 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER); | |
287 | |
288 // Add a STOP_WAITING frame since it contains a packet sequence number, | |
289 // whose length should be 1. | |
290 QuicStopWaitingFrame stop_waiting_frame; | |
291 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); | |
292 EXPECT_TRUE(creator_.HasPendingFrames()); | |
293 | |
294 // Ensure the packet is successfully created. | |
295 SerializedPacket serialized = creator_.SerializePacket(); | |
296 ASSERT_TRUE(serialized.packet); | |
297 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
298 | |
299 // Verify that header in transmitted packet has 1 byte sequence length. | |
300 QuicPacketHeader header; | |
301 { | |
302 InSequence s; | |
303 EXPECT_CALL(framer_visitor_, OnPacket()); | |
304 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
305 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
306 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
307 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce( | |
308 DoAll(SaveArg<0>(&header), Return(true))); | |
309 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
310 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); | |
311 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
312 } | |
313 ProcessPacket(serialized.packet); | |
314 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
315 header.public_header.sequence_number_length); | |
316 delete serialized.packet; | |
317 | |
318 // Packet 2. | |
319 EXPECT_FALSE(creator_.HasPendingFrames()); | |
320 // Generate Packet 2 with one frame -- sequence number length should now | |
321 // change to 4 bytes. | |
322 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); | |
323 EXPECT_TRUE(creator_.HasPendingFrames()); | |
324 | |
325 // Ensure the packet is successfully created. | |
326 serialized = creator_.SerializePacket(); | |
327 ASSERT_TRUE(serialized.packet); | |
328 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
329 | |
330 // Verify that header in transmitted packet has 4 byte sequence length. | |
331 { | |
332 InSequence s; | |
333 EXPECT_CALL(framer_visitor_, OnPacket()); | |
334 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
335 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
336 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
337 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce( | |
338 DoAll(SaveArg<0>(&header), Return(true))); | |
339 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); | |
340 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
341 } | |
342 ProcessPacket(serialized.packet); | |
343 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, | |
344 header.public_header.sequence_number_length); | |
345 | |
346 delete serialized.packet; | |
347 delete ack_frame.ack_frame; | |
348 } | |
349 | |
350 TEST_P(QuicPacketCreatorTest, SerializeWithFECChangingSequenceNumberLength) { | |
351 // Test goal is to test the following sequence (P1 => generate Packet 1): | |
352 // P1 <change seq num length> P2 FEC, | |
353 // and we expect that sequence number length should not change until the end | |
354 // of the open FEC group. | |
355 | |
356 // Enable FEC protection, and send FEC packet every 6 packets. | |
357 EXPECT_TRUE(SwitchFecProtectionOn(6)); | |
358 // Should return false since we do not have enough packets in the FEC group to | |
359 // trigger an FEC packet. | |
360 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
361 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
362 | |
363 // Generate Packet 1. | |
364 creator_.AddSavedFrame(frames_[0]); | |
365 // Change the sequence number length mid-FEC group and it should not change. | |
366 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER); | |
367 SerializedPacket serialized = creator_.SerializePacket(); | |
368 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
369 | |
370 { | |
371 InSequence s; | |
372 EXPECT_CALL(framer_visitor_, OnPacket()); | |
373 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
374 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
375 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
376 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
377 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_)); | |
378 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
379 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
380 } | |
381 ProcessPacket(serialized.packet); | |
382 delete serialized.packet; | |
383 | |
384 // Generate Packet 2. | |
385 creator_.AddSavedFrame(frames_[0]); | |
386 serialized = creator_.SerializePacket(); | |
387 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
388 | |
389 { | |
390 InSequence s; | |
391 EXPECT_CALL(framer_visitor_, OnPacket()); | |
392 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
393 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
394 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
395 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
396 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_)); | |
397 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
398 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
399 } | |
400 ProcessPacket(serialized.packet); | |
401 delete serialized.packet; | |
402 | |
403 // Should return false since we do not have enough packets in the FEC group to | |
404 // trigger an FEC packet. | |
405 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
406 // Should return true since there are packets in the FEC group. | |
407 ASSERT_TRUE(creator_.ShouldSendFec(/*force_close=*/true)); | |
408 | |
409 // Force generation of FEC packet. | |
410 serialized = creator_.SerializeFec(); | |
411 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
412 ASSERT_EQ(3u, serialized.sequence_number); | |
413 | |
414 { | |
415 InSequence s; | |
416 EXPECT_CALL(framer_visitor_, OnPacket()); | |
417 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
418 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
419 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
420 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
421 EXPECT_CALL(framer_visitor_, OnFecData(_)); | |
422 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
423 } | |
424 ProcessPacket(serialized.packet); | |
425 delete serialized.packet; | |
426 | |
427 // Ensure the next FEC group starts using the new sequence number length. | |
428 serialized = creator_.SerializeAllFrames(frames_); | |
429 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
430 delete frames_[0].ack_frame; | |
431 delete serialized.packet; | |
432 } | |
433 | |
434 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) { | |
435 // If the original packet sequence number length, the current sequence number | |
436 // length, and the configured send sequence number length are different, the | |
437 // retransmit must sent with the original length and the others do not change. | |
438 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER); | |
439 QuicPacketCreatorPeer::SetSequenceNumberLength(&creator_, | |
440 PACKET_2BYTE_SEQUENCE_NUMBER); | |
441 QuicStreamFrame* stream_frame = | |
442 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, IOVector()); | |
443 RetransmittableFrames frames; | |
444 frames.set_encryption_level(ENCRYPTION_NONE); | |
445 frames.AddStreamFrame(stream_frame); | |
446 SerializedPacket serialized = | |
447 creator_.ReserializeAllFrames(frames, PACKET_1BYTE_SEQUENCE_NUMBER); | |
448 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, | |
449 creator_.next_sequence_number_length()); | |
450 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER, | |
451 QuicPacketCreatorPeer::GetSequenceNumberLength(&creator_)); | |
452 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
453 | |
454 { | |
455 InSequence s; | |
456 EXPECT_CALL(framer_visitor_, OnPacket()); | |
457 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
458 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
459 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
460 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
461 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
462 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
463 } | |
464 ProcessPacket(serialized.packet); | |
465 delete serialized.packet; | |
466 } | |
467 | |
468 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithPadding) { | |
469 QuicStreamFrame* stream_frame = | |
470 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, /*offset=*/0, | |
471 MakeIOVector("fake handshake message data")); | |
472 RetransmittableFrames frames; | |
473 frames.set_encryption_level(ENCRYPTION_NONE); | |
474 frames.AddStreamFrame(stream_frame); | |
475 SerializedPacket serialized = creator_.ReserializeAllFrames( | |
476 frames, creator_.next_sequence_number_length()); | |
477 EXPECT_EQ(kDefaultMaxPacketSize, serialized.packet->length()); | |
478 delete serialized.packet; | |
479 } | |
480 | |
481 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) { | |
482 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
483 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP); | |
484 size_t capacity = kDefaultMaxPacketSize - overhead; | |
485 for (int delta = -5; delta <= 0; ++delta) { | |
486 string data(capacity + delta, 'A'); | |
487 size_t bytes_free = 0 - delta; | |
488 | |
489 QuicStreamFrame* stream_frame = new QuicStreamFrame( | |
490 kCryptoStreamId, /*fin=*/false, kOffset, MakeIOVector(data)); | |
491 RetransmittableFrames frames; | |
492 frames.set_encryption_level(ENCRYPTION_NONE); | |
493 frames.AddStreamFrame(stream_frame); | |
494 SerializedPacket serialized = creator_.ReserializeAllFrames( | |
495 frames, creator_.next_sequence_number_length()); | |
496 | |
497 // If there is not enough space in the packet to fit a padding frame | |
498 // (1 byte) and to expand the stream frame (another 2 bytes) the packet | |
499 // will not be padded. | |
500 if (bytes_free < 3) { | |
501 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
502 serialized.packet->length()); | |
503 } else { | |
504 EXPECT_EQ(kDefaultMaxPacketSize, serialized.packet->length()); | |
505 } | |
506 | |
507 delete serialized.packet; | |
508 frames_.clear(); | |
509 } | |
510 } | |
511 | |
512 TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) { | |
513 QuicConnectionCloseFrame frame; | |
514 frame.error_code = QUIC_NO_ERROR; | |
515 frame.error_details = "error"; | |
516 | |
517 SerializedPacket serialized = creator_.SerializeConnectionClose(&frame); | |
518 ASSERT_EQ(1u, serialized.sequence_number); | |
519 ASSERT_EQ(1u, creator_.sequence_number()); | |
520 | |
521 InSequence s; | |
522 EXPECT_CALL(framer_visitor_, OnPacket()); | |
523 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
524 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
525 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
526 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
527 EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_)); | |
528 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
529 | |
530 ProcessPacket(serialized.packet); | |
531 delete serialized.packet; | |
532 } | |
533 | |
534 TEST_P(QuicPacketCreatorTest, SwitchFecOnOffWithNoGroup) { | |
535 // Enable FEC protection. | |
536 creator_.set_max_packets_per_fec_group(6); | |
537 EXPECT_TRUE(creator_.IsFecEnabled()); | |
538 EXPECT_FALSE(creator_.IsFecProtected()); | |
539 | |
540 // Turn on FEC protection. | |
541 creator_.StartFecProtectingPackets(); | |
542 EXPECT_TRUE(creator_.IsFecProtected()); | |
543 // We have no packets in the FEC group, so no FEC packet can be created. | |
544 EXPECT_FALSE(creator_.ShouldSendFec(/*force_close=*/true)); | |
545 // Since no packets are in FEC group yet, we should be able to turn FEC | |
546 // off with no trouble. | |
547 creator_.StopFecProtectingPackets(); | |
548 EXPECT_FALSE(creator_.IsFecProtected()); | |
549 } | |
550 | |
551 TEST_P(QuicPacketCreatorTest, SwitchFecOnOffWithGroupInProgress) { | |
552 // Enable FEC protection, and send FEC packet every 6 packets. | |
553 EXPECT_TRUE(SwitchFecProtectionOn(6)); | |
554 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
555 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
556 delete frames_[0].stream_frame; | |
557 delete serialized.packet; | |
558 | |
559 EXPECT_TRUE(creator_.IsFecProtected()); | |
560 // We do not have enough packets in the FEC group to trigger an FEC packet. | |
561 EXPECT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
562 // Should return true since there are packets in the FEC group. | |
563 EXPECT_TRUE(creator_.ShouldSendFec(/*force_close=*/true)); | |
564 | |
565 // Switching FEC off should not change creator state, since there is an | |
566 // FEC packet under construction. | |
567 EXPECT_DFATAL(creator_.StopFecProtectingPackets(), | |
568 "Cannot stop FEC protection with open FEC group."); | |
569 EXPECT_TRUE(creator_.IsFecProtected()); | |
570 // Confirm that FEC packet is still under construction. | |
571 EXPECT_TRUE(creator_.ShouldSendFec(/*force_close=*/true)); | |
572 | |
573 serialized = creator_.SerializeFec(); | |
574 delete serialized.packet; | |
575 | |
576 // Switching FEC on/off should work now. | |
577 creator_.StopFecProtectingPackets(); | |
578 EXPECT_FALSE(creator_.IsFecProtected()); | |
579 creator_.StartFecProtectingPackets(); | |
580 EXPECT_TRUE(creator_.IsFecProtected()); | |
581 } | |
582 | |
583 TEST_P(QuicPacketCreatorTest, SwitchFecOnWithStreamFrameQueued) { | |
584 // Add a stream frame to the creator. | |
585 QuicFrame frame; | |
586 size_t consumed = creator_.CreateStreamFrame( | |
587 1u, MakeIOVector("test"), 0u, false, &frame); | |
588 EXPECT_EQ(4u, consumed); | |
589 ASSERT_TRUE(frame.stream_frame); | |
590 EXPECT_TRUE(creator_.AddSavedFrame(frame)); | |
591 EXPECT_TRUE(creator_.HasPendingFrames()); | |
592 | |
593 // Enable FEC protection, and send FEC packet every 6 packets. | |
594 creator_.set_max_packets_per_fec_group(6); | |
595 EXPECT_TRUE(creator_.IsFecEnabled()); | |
596 EXPECT_DFATAL(creator_.StartFecProtectingPackets(), | |
597 "Cannot start FEC protection with pending frames."); | |
598 EXPECT_FALSE(creator_.IsFecProtected()); | |
599 | |
600 // Serialize packet for transmission. | |
601 SerializedPacket serialized = creator_.SerializePacket(); | |
602 delete serialized.packet; | |
603 delete serialized.retransmittable_frames; | |
604 EXPECT_FALSE(creator_.HasPendingFrames()); | |
605 | |
606 // Since all pending frames have been serialized, turning FEC on should work. | |
607 creator_.StartFecProtectingPackets(); | |
608 EXPECT_TRUE(creator_.IsFecProtected()); | |
609 } | |
610 | |
611 TEST_P(QuicPacketCreatorTest, CreateStreamFrame) { | |
612 QuicFrame frame; | |
613 size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 0u, | |
614 false, &frame); | |
615 EXPECT_EQ(4u, consumed); | |
616 CheckStreamFrame(frame, 1u, "test", 0u, false); | |
617 delete frame.stream_frame; | |
618 } | |
619 | |
620 TEST_P(QuicPacketCreatorTest, CreateStreamFrameFin) { | |
621 QuicFrame frame; | |
622 size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 10u, | |
623 true, &frame); | |
624 EXPECT_EQ(4u, consumed); | |
625 CheckStreamFrame(frame, 1u, "test", 10u, true); | |
626 delete frame.stream_frame; | |
627 } | |
628 | |
629 TEST_P(QuicPacketCreatorTest, CreateStreamFrameFinOnly) { | |
630 QuicFrame frame; | |
631 size_t consumed = creator_.CreateStreamFrame(1u, IOVector(), 0u, true, | |
632 &frame); | |
633 EXPECT_EQ(0u, consumed); | |
634 CheckStreamFrame(frame, 1u, string(), 0u, true); | |
635 delete frame.stream_frame; | |
636 } | |
637 | |
638 TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) { | |
639 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
640 + GetEncryptionOverhead(); | |
641 for (size_t i = overhead; i < overhead + 100; ++i) { | |
642 creator_.set_max_packet_length(i); | |
643 const bool should_have_room = i > overhead + GetStreamFrameOverhead( | |
644 NOT_IN_FEC_GROUP); | |
645 ASSERT_EQ(should_have_room, creator_.HasRoomForStreamFrame( | |
646 kClientDataStreamId1, kOffset)); | |
647 if (should_have_room) { | |
648 QuicFrame frame; | |
649 size_t bytes_consumed = creator_.CreateStreamFrame( | |
650 kClientDataStreamId1, MakeIOVector("testdata"), kOffset, false, | |
651 &frame); | |
652 EXPECT_LT(0u, bytes_consumed); | |
653 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
654 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
655 ASSERT_TRUE(serialized_packet.packet); | |
656 delete serialized_packet.packet; | |
657 delete serialized_packet.retransmittable_frames; | |
658 } | |
659 } | |
660 } | |
661 | |
662 TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) { | |
663 // Compute the total overhead for a single frame in packet. | |
664 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
665 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP); | |
666 size_t capacity = kDefaultMaxPacketSize - overhead; | |
667 // Now, test various sizes around this size. | |
668 for (int delta = -5; delta <= 5; ++delta) { | |
669 string data(capacity + delta, 'A'); | |
670 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
671 QuicFrame frame; | |
672 size_t bytes_consumed = creator_.CreateStreamFrame( | |
673 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame); | |
674 EXPECT_EQ(capacity - bytes_free, bytes_consumed); | |
675 | |
676 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
677 // BytesFree() returns bytes available for the next frame, which will | |
678 // be two bytes smaller since the stream frame would need to be grown. | |
679 EXPECT_EQ(2u, creator_.ExpansionOnNewFrame()); | |
680 size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2; | |
681 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta; | |
682 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
683 ASSERT_TRUE(serialized_packet.packet); | |
684 delete serialized_packet.packet; | |
685 delete serialized_packet.retransmittable_frames; | |
686 } | |
687 } | |
688 | |
689 TEST_P(QuicPacketCreatorTest, StreamFrameConsumptionWithFec) { | |
690 // Enable FEC protection, and send FEC packet every 6 packets. | |
691 EXPECT_TRUE(SwitchFecProtectionOn(6)); | |
692 // Compute the total overhead for a single frame in packet. | |
693 const size_t overhead = GetPacketHeaderOverhead(IN_FEC_GROUP) | |
694 + GetEncryptionOverhead() + GetStreamFrameOverhead(IN_FEC_GROUP); | |
695 size_t capacity = kDefaultMaxPacketSize - overhead; | |
696 // Now, test various sizes around this size. | |
697 for (int delta = -5; delta <= 5; ++delta) { | |
698 string data(capacity + delta, 'A'); | |
699 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
700 QuicFrame frame; | |
701 size_t bytes_consumed = creator_.CreateStreamFrame( | |
702 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame); | |
703 EXPECT_EQ(capacity - bytes_free, bytes_consumed); | |
704 | |
705 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
706 // BytesFree() returns bytes available for the next frame. Since stream | |
707 // frame does not grow for FEC protected packets, this should be the same | |
708 // as bytes_free (bound by 0). | |
709 EXPECT_EQ(0u, creator_.ExpansionOnNewFrame()); | |
710 size_t expected_bytes_free = bytes_free > 0 ? bytes_free : 0; | |
711 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta; | |
712 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
713 ASSERT_TRUE(serialized_packet.packet); | |
714 delete serialized_packet.packet; | |
715 delete serialized_packet.retransmittable_frames; | |
716 } | |
717 } | |
718 | |
719 TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) { | |
720 // Compute the total overhead for a single frame in packet. | |
721 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
722 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP); | |
723 ASSERT_GT(kMaxPacketSize, overhead); | |
724 size_t capacity = kDefaultMaxPacketSize - overhead; | |
725 // Now, test various sizes around this size. | |
726 for (int delta = -5; delta <= 5; ++delta) { | |
727 string data(capacity + delta, 'A'); | |
728 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
729 | |
730 QuicFrame frame; | |
731 size_t bytes_consumed = creator_.CreateStreamFrame( | |
732 kCryptoStreamId, MakeIOVector(data), kOffset, false, &frame); | |
733 EXPECT_LT(0u, bytes_consumed); | |
734 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
735 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
736 ASSERT_TRUE(serialized_packet.packet); | |
737 // If there is not enough space in the packet to fit a padding frame | |
738 // (1 byte) and to expand the stream frame (another 2 bytes) the packet | |
739 // will not be padded. | |
740 if (bytes_free < 3) { | |
741 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
742 serialized_packet.packet->length()); | |
743 } else { | |
744 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet.packet->length()); | |
745 } | |
746 delete serialized_packet.packet; | |
747 delete serialized_packet.retransmittable_frames; | |
748 } | |
749 } | |
750 | |
751 TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) { | |
752 // Compute the total overhead for a single frame in packet. | |
753 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
754 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP); | |
755 ASSERT_GT(kDefaultMaxPacketSize, overhead); | |
756 size_t capacity = kDefaultMaxPacketSize - overhead; | |
757 // Now, test various sizes around this size. | |
758 for (int delta = -5; delta <= 5; ++delta) { | |
759 string data(capacity + delta, 'A'); | |
760 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
761 | |
762 QuicFrame frame; | |
763 size_t bytes_consumed = creator_.CreateStreamFrame( | |
764 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame); | |
765 EXPECT_LT(0u, bytes_consumed); | |
766 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
767 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
768 ASSERT_TRUE(serialized_packet.packet); | |
769 if (bytes_free > 0) { | |
770 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
771 serialized_packet.packet->length()); | |
772 } else { | |
773 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet.packet->length()); | |
774 } | |
775 delete serialized_packet.packet; | |
776 delete serialized_packet.retransmittable_frames; | |
777 } | |
778 } | |
779 | |
780 TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) { | |
781 QuicFramerPeer::SetIsServer(&client_framer_, true); | |
782 QuicVersionVector versions; | |
783 versions.push_back(test::QuicVersionMax()); | |
784 scoped_ptr<QuicEncryptedPacket> encrypted( | |
785 creator_.SerializeVersionNegotiationPacket(versions)); | |
786 | |
787 { | |
788 InSequence s; | |
789 EXPECT_CALL(framer_visitor_, OnPacket()); | |
790 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
791 EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_)); | |
792 } | |
793 QuicFramerPeer::SetIsServer(&client_framer_, false); | |
794 client_framer_.ProcessPacket(*encrypted); | |
795 } | |
796 | |
797 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) { | |
798 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
799 creator_.next_sequence_number_length()); | |
800 | |
801 size_t max_packets_per_fec_group = 10; | |
802 creator_.set_max_packets_per_fec_group(max_packets_per_fec_group); | |
803 creator_.set_sequence_number(64 - max_packets_per_fec_group); | |
804 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
805 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
806 creator_.next_sequence_number_length()); | |
807 | |
808 creator_.set_sequence_number(64 * 256 - max_packets_per_fec_group); | |
809 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
810 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER, | |
811 creator_.next_sequence_number_length()); | |
812 | |
813 creator_.set_sequence_number(64 * 256 * 256 - max_packets_per_fec_group); | |
814 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
815 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, | |
816 creator_.next_sequence_number_length()); | |
817 | |
818 creator_.set_sequence_number( | |
819 GG_UINT64_C(64) * 256 * 256 * 256 * 256 - max_packets_per_fec_group); | |
820 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
821 EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER, | |
822 creator_.next_sequence_number_length()); | |
823 } | |
824 | |
825 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth) { | |
826 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
827 creator_.next_sequence_number_length()); | |
828 | |
829 creator_.UpdateSequenceNumberLength(1, 10000 / kDefaultMaxPacketSize); | |
830 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
831 creator_.next_sequence_number_length()); | |
832 | |
833 creator_.UpdateSequenceNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); | |
834 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER, | |
835 creator_.next_sequence_number_length()); | |
836 | |
837 creator_.UpdateSequenceNumberLength( | |
838 1, 10000 * 256 * 256 / kDefaultMaxPacketSize); | |
839 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, | |
840 creator_.next_sequence_number_length()); | |
841 | |
842 creator_.UpdateSequenceNumberLength( | |
843 1, GG_UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); | |
844 EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER, | |
845 creator_.next_sequence_number_length()); | |
846 } | |
847 | |
848 TEST_P(QuicPacketCreatorTest, SerializeFrame) { | |
849 if (!GetParam().version_serialization) { | |
850 creator_.StopSendingVersion(); | |
851 } | |
852 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
853 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
854 delete frames_[0].stream_frame; | |
855 | |
856 QuicPacketHeader header; | |
857 { | |
858 InSequence s; | |
859 EXPECT_CALL(framer_visitor_, OnPacket()); | |
860 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
861 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
862 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
863 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce( | |
864 DoAll(SaveArg<0>(&header), Return(true))); | |
865 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
866 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
867 } | |
868 ProcessPacket(serialized.packet); | |
869 EXPECT_EQ(GetParam().version_serialization, | |
870 header.public_header.version_flag); | |
871 delete serialized.packet; | |
872 } | |
873 | |
874 TEST_P(QuicPacketCreatorTest, CreateStreamFrameTooLarge) { | |
875 if (!GetParam().version_serialization) { | |
876 creator_.StopSendingVersion(); | |
877 } | |
878 // A string larger than fits into a frame. | |
879 size_t payload_length; | |
880 creator_.set_max_packet_length(GetPacketLengthForOneStream( | |
881 client_framer_.version(), | |
882 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
883 creator_.connection_id_length(), | |
884 PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP, &payload_length)); | |
885 QuicFrame frame; | |
886 const string too_long_payload(payload_length * 2, 'a'); | |
887 size_t consumed = creator_.CreateStreamFrame( | |
888 1u, MakeIOVector(too_long_payload), 0u, true, &frame); | |
889 EXPECT_EQ(payload_length, consumed); | |
890 const string payload(payload_length, 'a'); | |
891 CheckStreamFrame(frame, 1u, payload, 0u, false); | |
892 delete frame.stream_frame; | |
893 } | |
894 | |
895 TEST_P(QuicPacketCreatorTest, AddFrameAndSerialize) { | |
896 if (!GetParam().version_serialization) { | |
897 creator_.StopSendingVersion(); | |
898 } | |
899 const size_t max_plaintext_size = | |
900 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
901 EXPECT_FALSE(creator_.HasPendingFrames()); | |
902 EXPECT_EQ(max_plaintext_size - | |
903 GetPacketHeaderSize( | |
904 creator_.connection_id_length(), | |
905 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
906 PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP), | |
907 creator_.BytesFree()); | |
908 | |
909 // Add a variety of frame types and then a padding frame. | |
910 QuicAckFrame ack_frame(MakeAckFrame(0u)); | |
911 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
912 EXPECT_TRUE(creator_.HasPendingFrames()); | |
913 | |
914 QuicFrame frame; | |
915 size_t consumed = creator_.CreateStreamFrame( | |
916 1u, MakeIOVector("test"), 0u, false, &frame); | |
917 EXPECT_EQ(4u, consumed); | |
918 ASSERT_TRUE(frame.stream_frame); | |
919 EXPECT_TRUE(creator_.AddSavedFrame(frame)); | |
920 EXPECT_TRUE(creator_.HasPendingFrames()); | |
921 | |
922 QuicPaddingFrame padding_frame; | |
923 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&padding_frame))); | |
924 EXPECT_TRUE(creator_.HasPendingFrames()); | |
925 EXPECT_EQ(0u, creator_.BytesFree()); | |
926 | |
927 EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
928 | |
929 // Ensure the packet is successfully created. | |
930 SerializedPacket serialized = creator_.SerializePacket(); | |
931 ASSERT_TRUE(serialized.packet); | |
932 delete serialized.packet; | |
933 ASSERT_TRUE(serialized.retransmittable_frames); | |
934 RetransmittableFrames* retransmittable = serialized.retransmittable_frames; | |
935 ASSERT_EQ(1u, retransmittable->frames().size()); | |
936 EXPECT_EQ(STREAM_FRAME, retransmittable->frames()[0].type); | |
937 ASSERT_TRUE(retransmittable->frames()[0].stream_frame); | |
938 delete serialized.retransmittable_frames; | |
939 | |
940 EXPECT_FALSE(creator_.HasPendingFrames()); | |
941 EXPECT_EQ(max_plaintext_size - | |
942 GetPacketHeaderSize( | |
943 creator_.connection_id_length(), | |
944 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
945 PACKET_1BYTE_SEQUENCE_NUMBER, | |
946 NOT_IN_FEC_GROUP), | |
947 creator_.BytesFree()); | |
948 } | |
949 | |
950 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) { | |
951 if (!GetParam().version_serialization) { | |
952 creator_.StopSendingVersion(); | |
953 } | |
954 creator_.set_max_packet_length(kMaxPacketSize); | |
955 | |
956 // Serialized length of ack frame with 2000 nack ranges should be limited by | |
957 // the number of nack ranges that can be fit in an ack frame. | |
958 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); | |
959 size_t frame_len = client_framer_.GetSerializedFrameLength( | |
960 QuicFrame(&ack_frame), creator_.BytesFree(), true, true, | |
961 NOT_IN_FEC_GROUP, PACKET_1BYTE_SEQUENCE_NUMBER); | |
962 EXPECT_GT(creator_.BytesFree(), frame_len); | |
963 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); | |
964 | |
965 // Add ack frame to creator. | |
966 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
967 EXPECT_TRUE(creator_.HasPendingFrames()); | |
968 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); | |
969 EXPECT_LT(0u, creator_.BytesFree()); | |
970 | |
971 // Make sure that an additional stream frame can be added to the packet. | |
972 QuicFrame stream_frame; | |
973 size_t consumed = creator_.CreateStreamFrame( | |
974 2u, MakeIOVector("test"), 0u, false, &stream_frame); | |
975 EXPECT_EQ(4u, consumed); | |
976 ASSERT_TRUE(stream_frame.stream_frame); | |
977 EXPECT_TRUE(creator_.AddSavedFrame(stream_frame)); | |
978 EXPECT_TRUE(creator_.HasPendingFrames()); | |
979 | |
980 // Ensure the packet is successfully created, and the packet size estimate | |
981 // matches the serialized packet length. | |
982 EXPECT_CALL(entropy_calculator_, | |
983 EntropyHash(_)).WillOnce(testing::Return(0)); | |
984 size_t est_packet_size = creator_.PacketSize(); | |
985 SerializedPacket serialized = creator_.SerializePacket(); | |
986 ASSERT_TRUE(serialized.packet); | |
987 EXPECT_EQ(est_packet_size, | |
988 client_framer_.GetMaxPlaintextSize(serialized.packet->length())); | |
989 delete serialized.retransmittable_frames; | |
990 delete serialized.packet; | |
991 } | |
992 | |
993 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) { | |
994 if (!GetParam().version_serialization) { | |
995 creator_.StopSendingVersion(); | |
996 } | |
997 creator_.set_max_packet_length(500u); | |
998 | |
999 const size_t max_plaintext_size = | |
1000 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
1001 EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree()); | |
1002 | |
1003 // Serialized length of ack frame with 2000 nack ranges should be limited by | |
1004 // the packet size. | |
1005 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); | |
1006 size_t frame_len = client_framer_.GetSerializedFrameLength( | |
1007 QuicFrame(&ack_frame), creator_.BytesFree(), true, true, | |
1008 NOT_IN_FEC_GROUP, PACKET_1BYTE_SEQUENCE_NUMBER); | |
1009 EXPECT_EQ(creator_.BytesFree(), frame_len); | |
1010 | |
1011 // Add ack frame to creator. | |
1012 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
1013 EXPECT_TRUE(creator_.HasPendingFrames()); | |
1014 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()), | |
1015 creator_.PacketSize()); | |
1016 EXPECT_EQ(0u, creator_.BytesFree()); | |
1017 | |
1018 // Ensure the packet is successfully created, and the packet size estimate | |
1019 // may not match the serialized packet length. | |
1020 EXPECT_CALL(entropy_calculator_, | |
1021 EntropyHash(_)).WillOnce(Return(0)); | |
1022 size_t est_packet_size = creator_.PacketSize(); | |
1023 SerializedPacket serialized = creator_.SerializePacket(); | |
1024 ASSERT_TRUE(serialized.packet); | |
1025 EXPECT_GE(est_packet_size, | |
1026 client_framer_.GetMaxPlaintextSize(serialized.packet->length())); | |
1027 delete serialized.packet; | |
1028 } | |
1029 | |
1030 | |
1031 TEST_P(QuicPacketCreatorTest, EntropyFlag) { | |
1032 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
1033 | |
1034 for (int i = 0; i < 2; ++i) { | |
1035 for (int j = 0; j < 64; ++j) { | |
1036 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
1037 // Verify both BoolSource and hash algorithm. | |
1038 bool expected_rand_bool = | |
1039 (mock_random_.RandUint64() & (GG_UINT64_C(1) << j)) != 0; | |
1040 bool observed_rand_bool = | |
1041 (serialized.entropy_hash & (1 << ((j+1) % 8))) != 0; | |
1042 uint8 rest_of_hash = serialized.entropy_hash & ~(1 << ((j+1) % 8)); | |
1043 EXPECT_EQ(expected_rand_bool, observed_rand_bool); | |
1044 EXPECT_EQ(0, rest_of_hash); | |
1045 delete serialized.packet; | |
1046 } | |
1047 // After 64 calls, BoolSource will refresh the bucket - make sure it does. | |
1048 mock_random_.ChangeValue(); | |
1049 } | |
1050 | |
1051 delete frames_[0].stream_frame; | |
1052 } | |
1053 | |
1054 } // namespace | |
1055 } // namespace test | |
1056 } // namespace net | |
OLD | NEW |