Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(80)

Side by Side Diff: net/quic/quic_packet_creator_test.cc

Issue 992733002: Remove //net (except for Android test stuff) and sdch (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/quic/quic_packet_creator.cc ('k') | net/quic/quic_packet_generator.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/quic/quic_packet_creator.h"
6
7 #include "base/stl_util.h"
8 #include "net/quic/crypto/null_encrypter.h"
9 #include "net/quic/crypto/quic_decrypter.h"
10 #include "net/quic/crypto/quic_encrypter.h"
11 #include "net/quic/quic_utils.h"
12 #include "net/quic/test_tools/mock_random.h"
13 #include "net/quic/test_tools/quic_framer_peer.h"
14 #include "net/quic/test_tools/quic_packet_creator_peer.h"
15 #include "net/quic/test_tools/quic_test_utils.h"
16 #include "net/test/gtest_util.h"
17 #include "testing/gmock/include/gmock/gmock.h"
18
19 using base::StringPiece;
20 using std::ostream;
21 using std::string;
22 using std::vector;
23 using testing::DoAll;
24 using testing::InSequence;
25 using testing::Return;
26 using testing::SaveArg;
27 using testing::_;
28
29 namespace net {
30 namespace test {
31 namespace {
32
33 // Run tests with combinations of {QuicVersion, ToggleVersionSerialization}.
34 struct TestParams {
35 TestParams(QuicVersion version,
36 bool version_serialization,
37 QuicConnectionIdLength length)
38 : version(version),
39 connection_id_length(length),
40 version_serialization(version_serialization) {
41 }
42
43 friend ostream& operator<<(ostream& os, const TestParams& p) {
44 os << "{ client_version: " << QuicVersionToString(p.version)
45 << " connection id length: " << p.connection_id_length
46 << " include version: " << p.version_serialization << " }";
47 return os;
48 }
49
50 QuicVersion version;
51 QuicConnectionIdLength connection_id_length;
52 bool version_serialization;
53 };
54
55 // Constructs various test permutations.
56 vector<TestParams> GetTestParams() {
57 vector<TestParams> params;
58 QuicConnectionIdLength max = PACKET_8BYTE_CONNECTION_ID;
59 QuicVersionVector all_supported_versions = QuicSupportedVersions();
60 for (size_t i = 0; i < all_supported_versions.size(); ++i) {
61 params.push_back(TestParams(all_supported_versions[i], true, max));
62 params.push_back(TestParams(all_supported_versions[i], false, max));
63 }
64 params.push_back(TestParams(
65 all_supported_versions[0], true, PACKET_0BYTE_CONNECTION_ID));
66 params.push_back(TestParams(
67 all_supported_versions[0], true, PACKET_1BYTE_CONNECTION_ID));
68 params.push_back(TestParams(
69 all_supported_versions[0], true, PACKET_4BYTE_CONNECTION_ID));
70 return params;
71 }
72
73 class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> {
74 protected:
75 QuicPacketCreatorTest()
76 : server_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(),
77 true),
78 client_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(),
79 false),
80 sequence_number_(0),
81 connection_id_(2),
82 data_("foo"),
83 creator_(connection_id_, &client_framer_, &mock_random_) {
84 creator_.set_connection_id_length(GetParam().connection_id_length);
85 client_framer_.set_visitor(&framer_visitor_);
86 client_framer_.set_received_entropy_calculator(&entropy_calculator_);
87 server_framer_.set_visitor(&framer_visitor_);
88 }
89
90 ~QuicPacketCreatorTest() override {}
91
92 void ProcessPacket(QuicEncryptedPacket* encrypted) {
93 server_framer_.ProcessPacket(*encrypted);
94 }
95
96 void CheckStreamFrame(const QuicFrame& frame,
97 QuicStreamId stream_id,
98 const string& data,
99 QuicStreamOffset offset,
100 bool fin) {
101 EXPECT_EQ(STREAM_FRAME, frame.type);
102 ASSERT_TRUE(frame.stream_frame);
103 EXPECT_EQ(stream_id, frame.stream_frame->stream_id);
104 scoped_ptr<string> frame_data(frame.stream_frame->GetDataAsString());
105 EXPECT_EQ(data, *frame_data);
106 EXPECT_EQ(offset, frame.stream_frame->offset);
107 EXPECT_EQ(fin, frame.stream_frame->fin);
108 }
109
110 // Returns the number of bytes consumed by the header of packet, including
111 // the version.
112 size_t GetPacketHeaderOverhead(InFecGroup is_in_fec_group) {
113 return GetPacketHeaderSize(creator_.connection_id_length(),
114 kIncludeVersion,
115 creator_.next_sequence_number_length(),
116 is_in_fec_group);
117 }
118
119 // Returns the number of bytes of overhead that will be added to a packet
120 // of maximum length.
121 size_t GetEncryptionOverhead() {
122 return creator_.max_packet_length() - client_framer_.GetMaxPlaintextSize(
123 creator_.max_packet_length());
124 }
125
126 // Returns the number of bytes consumed by the non-data fields of a stream
127 // frame, assuming it is the last frame in the packet
128 size_t GetStreamFrameOverhead(InFecGroup is_in_fec_group) {
129 return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset,
130 true, is_in_fec_group);
131 }
132
133 // Enables and turns on FEC protection. Returns true if FEC protection is on.
134 bool SwitchFecProtectionOn(size_t max_packets_per_fec_group) {
135 creator_.set_max_packets_per_fec_group(max_packets_per_fec_group);
136 creator_.StartFecProtectingPackets();
137 return creator_.IsFecProtected();
138 }
139
140 static const QuicStreamOffset kOffset = 1u;
141
142 QuicFrames frames_;
143 QuicFramer server_framer_;
144 QuicFramer client_framer_;
145 testing::StrictMock<MockFramerVisitor> framer_visitor_;
146 QuicPacketSequenceNumber sequence_number_;
147 QuicConnectionId connection_id_;
148 string data_;
149 MockRandom mock_random_;
150 QuicPacketCreator creator_;
151 MockEntropyCalculator entropy_calculator_;
152 };
153
154 // Run all packet creator tests with all supported versions of QUIC, and with
155 // and without version in the packet header, as well as doing a run for each
156 // length of truncated connection id.
157 INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests,
158 QuicPacketCreatorTest,
159 ::testing::ValuesIn(GetTestParams()));
160
161 TEST_P(QuicPacketCreatorTest, SerializeFrames) {
162 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u))));
163 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
164 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, true, 0u, IOVector())));
165 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
166 delete frames_[0].ack_frame;
167 delete frames_[1].stream_frame;
168 delete frames_[2].stream_frame;
169
170 {
171 InSequence s;
172 EXPECT_CALL(framer_visitor_, OnPacket());
173 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
174 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
175 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
176 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
177 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
178 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
179 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
180 EXPECT_CALL(framer_visitor_, OnPacketComplete());
181 }
182 ProcessPacket(serialized.packet);
183 delete serialized.packet;
184 }
185
186 TEST_P(QuicPacketCreatorTest, SerializeWithFEC) {
187 // Enable FEC protection, and send FEC packet every 6 packets.
188 EXPECT_TRUE(SwitchFecProtectionOn(6));
189 // Should return false since we do not have enough packets in the FEC group to
190 // trigger an FEC packet.
191 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
192
193 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
194 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
195 delete frames_[0].stream_frame;
196
197 {
198 InSequence s;
199 EXPECT_CALL(framer_visitor_, OnPacket());
200 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
201 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
202 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
203 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
204 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_));
205 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
206 EXPECT_CALL(framer_visitor_, OnPacketComplete());
207 }
208 ProcessPacket(serialized.packet);
209 delete serialized.packet;
210
211 // Should return false since we do not have enough packets in the FEC group to
212 // trigger an FEC packet.
213 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
214 // Should return true since there are packets in the FEC group.
215 ASSERT_TRUE(creator_.ShouldSendFec(/*force_close=*/true));
216
217 serialized = creator_.SerializeFec();
218 ASSERT_EQ(2u, serialized.sequence_number);
219 {
220 InSequence s;
221 EXPECT_CALL(framer_visitor_, OnPacket());
222 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
223 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
224 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
225 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
226 EXPECT_CALL(framer_visitor_, OnFecData(_));
227 EXPECT_CALL(framer_visitor_, OnPacketComplete());
228 }
229 ProcessPacket(serialized.packet);
230 delete serialized.packet;
231 }
232
233 TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) {
234 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u))));
235 creator_.AddSavedFrame(frames_[0]);
236 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER);
237 SerializedPacket serialized = creator_.SerializePacket();
238 // The sequence number length will not change mid-packet.
239 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
240
241 {
242 InSequence s;
243 EXPECT_CALL(framer_visitor_, OnPacket());
244 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
245 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
246 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
247 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
248 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
249 EXPECT_CALL(framer_visitor_, OnPacketComplete());
250 }
251 ProcessPacket(serialized.packet);
252 delete serialized.packet;
253
254 creator_.AddSavedFrame(frames_[0]);
255 serialized = creator_.SerializePacket();
256 // Now the actual sequence number length should have changed.
257 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
258 delete frames_[0].ack_frame;
259
260 {
261 InSequence s;
262 EXPECT_CALL(framer_visitor_, OnPacket());
263 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
264 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
265 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
266 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
267 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
268 EXPECT_CALL(framer_visitor_, OnPacketComplete());
269 }
270 ProcessPacket(serialized.packet);
271 delete serialized.packet;
272 }
273
274 TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) {
275 // Changing the sequence number length with queued frames in the creator
276 // should hold the change until after any currently queued frames are
277 // serialized.
278
279 // Packet 1.
280 // Queue a frame in the creator.
281 EXPECT_FALSE(creator_.HasPendingFrames());
282 QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u)));
283 creator_.AddSavedFrame(ack_frame);
284
285 // Now change sequence number length.
286 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER);
287
288 // Add a STOP_WAITING frame since it contains a packet sequence number,
289 // whose length should be 1.
290 QuicStopWaitingFrame stop_waiting_frame;
291 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame)));
292 EXPECT_TRUE(creator_.HasPendingFrames());
293
294 // Ensure the packet is successfully created.
295 SerializedPacket serialized = creator_.SerializePacket();
296 ASSERT_TRUE(serialized.packet);
297 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
298
299 // Verify that header in transmitted packet has 1 byte sequence length.
300 QuicPacketHeader header;
301 {
302 InSequence s;
303 EXPECT_CALL(framer_visitor_, OnPacket());
304 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
305 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
306 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
307 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce(
308 DoAll(SaveArg<0>(&header), Return(true)));
309 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
310 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_));
311 EXPECT_CALL(framer_visitor_, OnPacketComplete());
312 }
313 ProcessPacket(serialized.packet);
314 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
315 header.public_header.sequence_number_length);
316 delete serialized.packet;
317
318 // Packet 2.
319 EXPECT_FALSE(creator_.HasPendingFrames());
320 // Generate Packet 2 with one frame -- sequence number length should now
321 // change to 4 bytes.
322 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame)));
323 EXPECT_TRUE(creator_.HasPendingFrames());
324
325 // Ensure the packet is successfully created.
326 serialized = creator_.SerializePacket();
327 ASSERT_TRUE(serialized.packet);
328 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
329
330 // Verify that header in transmitted packet has 4 byte sequence length.
331 {
332 InSequence s;
333 EXPECT_CALL(framer_visitor_, OnPacket());
334 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
335 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
336 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
337 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce(
338 DoAll(SaveArg<0>(&header), Return(true)));
339 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_));
340 EXPECT_CALL(framer_visitor_, OnPacketComplete());
341 }
342 ProcessPacket(serialized.packet);
343 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
344 header.public_header.sequence_number_length);
345
346 delete serialized.packet;
347 delete ack_frame.ack_frame;
348 }
349
350 TEST_P(QuicPacketCreatorTest, SerializeWithFECChangingSequenceNumberLength) {
351 // Test goal is to test the following sequence (P1 => generate Packet 1):
352 // P1 <change seq num length> P2 FEC,
353 // and we expect that sequence number length should not change until the end
354 // of the open FEC group.
355
356 // Enable FEC protection, and send FEC packet every 6 packets.
357 EXPECT_TRUE(SwitchFecProtectionOn(6));
358 // Should return false since we do not have enough packets in the FEC group to
359 // trigger an FEC packet.
360 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
361 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u))));
362
363 // Generate Packet 1.
364 creator_.AddSavedFrame(frames_[0]);
365 // Change the sequence number length mid-FEC group and it should not change.
366 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER);
367 SerializedPacket serialized = creator_.SerializePacket();
368 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
369
370 {
371 InSequence s;
372 EXPECT_CALL(framer_visitor_, OnPacket());
373 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
374 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
375 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
376 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
377 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_));
378 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
379 EXPECT_CALL(framer_visitor_, OnPacketComplete());
380 }
381 ProcessPacket(serialized.packet);
382 delete serialized.packet;
383
384 // Generate Packet 2.
385 creator_.AddSavedFrame(frames_[0]);
386 serialized = creator_.SerializePacket();
387 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
388
389 {
390 InSequence s;
391 EXPECT_CALL(framer_visitor_, OnPacket());
392 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
393 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
394 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
395 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
396 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_));
397 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
398 EXPECT_CALL(framer_visitor_, OnPacketComplete());
399 }
400 ProcessPacket(serialized.packet);
401 delete serialized.packet;
402
403 // Should return false since we do not have enough packets in the FEC group to
404 // trigger an FEC packet.
405 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
406 // Should return true since there are packets in the FEC group.
407 ASSERT_TRUE(creator_.ShouldSendFec(/*force_close=*/true));
408
409 // Force generation of FEC packet.
410 serialized = creator_.SerializeFec();
411 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
412 ASSERT_EQ(3u, serialized.sequence_number);
413
414 {
415 InSequence s;
416 EXPECT_CALL(framer_visitor_, OnPacket());
417 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
418 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
419 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
420 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
421 EXPECT_CALL(framer_visitor_, OnFecData(_));
422 EXPECT_CALL(framer_visitor_, OnPacketComplete());
423 }
424 ProcessPacket(serialized.packet);
425 delete serialized.packet;
426
427 // Ensure the next FEC group starts using the new sequence number length.
428 serialized = creator_.SerializeAllFrames(frames_);
429 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
430 delete frames_[0].ack_frame;
431 delete serialized.packet;
432 }
433
434 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) {
435 // If the original packet sequence number length, the current sequence number
436 // length, and the configured send sequence number length are different, the
437 // retransmit must sent with the original length and the others do not change.
438 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER);
439 QuicPacketCreatorPeer::SetSequenceNumberLength(&creator_,
440 PACKET_2BYTE_SEQUENCE_NUMBER);
441 QuicStreamFrame* stream_frame =
442 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, IOVector());
443 RetransmittableFrames frames;
444 frames.set_encryption_level(ENCRYPTION_NONE);
445 frames.AddStreamFrame(stream_frame);
446 SerializedPacket serialized =
447 creator_.ReserializeAllFrames(frames, PACKET_1BYTE_SEQUENCE_NUMBER);
448 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
449 creator_.next_sequence_number_length());
450 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER,
451 QuicPacketCreatorPeer::GetSequenceNumberLength(&creator_));
452 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
453
454 {
455 InSequence s;
456 EXPECT_CALL(framer_visitor_, OnPacket());
457 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
458 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
459 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
460 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
461 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
462 EXPECT_CALL(framer_visitor_, OnPacketComplete());
463 }
464 ProcessPacket(serialized.packet);
465 delete serialized.packet;
466 }
467
468 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithPadding) {
469 QuicStreamFrame* stream_frame =
470 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, /*offset=*/0,
471 MakeIOVector("fake handshake message data"));
472 RetransmittableFrames frames;
473 frames.set_encryption_level(ENCRYPTION_NONE);
474 frames.AddStreamFrame(stream_frame);
475 SerializedPacket serialized = creator_.ReserializeAllFrames(
476 frames, creator_.next_sequence_number_length());
477 EXPECT_EQ(kDefaultMaxPacketSize, serialized.packet->length());
478 delete serialized.packet;
479 }
480
481 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) {
482 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
483 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
484 size_t capacity = kDefaultMaxPacketSize - overhead;
485 for (int delta = -5; delta <= 0; ++delta) {
486 string data(capacity + delta, 'A');
487 size_t bytes_free = 0 - delta;
488
489 QuicStreamFrame* stream_frame = new QuicStreamFrame(
490 kCryptoStreamId, /*fin=*/false, kOffset, MakeIOVector(data));
491 RetransmittableFrames frames;
492 frames.set_encryption_level(ENCRYPTION_NONE);
493 frames.AddStreamFrame(stream_frame);
494 SerializedPacket serialized = creator_.ReserializeAllFrames(
495 frames, creator_.next_sequence_number_length());
496
497 // If there is not enough space in the packet to fit a padding frame
498 // (1 byte) and to expand the stream frame (another 2 bytes) the packet
499 // will not be padded.
500 if (bytes_free < 3) {
501 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free,
502 serialized.packet->length());
503 } else {
504 EXPECT_EQ(kDefaultMaxPacketSize, serialized.packet->length());
505 }
506
507 delete serialized.packet;
508 frames_.clear();
509 }
510 }
511
512 TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) {
513 QuicConnectionCloseFrame frame;
514 frame.error_code = QUIC_NO_ERROR;
515 frame.error_details = "error";
516
517 SerializedPacket serialized = creator_.SerializeConnectionClose(&frame);
518 ASSERT_EQ(1u, serialized.sequence_number);
519 ASSERT_EQ(1u, creator_.sequence_number());
520
521 InSequence s;
522 EXPECT_CALL(framer_visitor_, OnPacket());
523 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
524 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
525 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
526 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
527 EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_));
528 EXPECT_CALL(framer_visitor_, OnPacketComplete());
529
530 ProcessPacket(serialized.packet);
531 delete serialized.packet;
532 }
533
534 TEST_P(QuicPacketCreatorTest, SwitchFecOnOffWithNoGroup) {
535 // Enable FEC protection.
536 creator_.set_max_packets_per_fec_group(6);
537 EXPECT_TRUE(creator_.IsFecEnabled());
538 EXPECT_FALSE(creator_.IsFecProtected());
539
540 // Turn on FEC protection.
541 creator_.StartFecProtectingPackets();
542 EXPECT_TRUE(creator_.IsFecProtected());
543 // We have no packets in the FEC group, so no FEC packet can be created.
544 EXPECT_FALSE(creator_.ShouldSendFec(/*force_close=*/true));
545 // Since no packets are in FEC group yet, we should be able to turn FEC
546 // off with no trouble.
547 creator_.StopFecProtectingPackets();
548 EXPECT_FALSE(creator_.IsFecProtected());
549 }
550
551 TEST_P(QuicPacketCreatorTest, SwitchFecOnOffWithGroupInProgress) {
552 // Enable FEC protection, and send FEC packet every 6 packets.
553 EXPECT_TRUE(SwitchFecProtectionOn(6));
554 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
555 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
556 delete frames_[0].stream_frame;
557 delete serialized.packet;
558
559 EXPECT_TRUE(creator_.IsFecProtected());
560 // We do not have enough packets in the FEC group to trigger an FEC packet.
561 EXPECT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
562 // Should return true since there are packets in the FEC group.
563 EXPECT_TRUE(creator_.ShouldSendFec(/*force_close=*/true));
564
565 // Switching FEC off should not change creator state, since there is an
566 // FEC packet under construction.
567 EXPECT_DFATAL(creator_.StopFecProtectingPackets(),
568 "Cannot stop FEC protection with open FEC group.");
569 EXPECT_TRUE(creator_.IsFecProtected());
570 // Confirm that FEC packet is still under construction.
571 EXPECT_TRUE(creator_.ShouldSendFec(/*force_close=*/true));
572
573 serialized = creator_.SerializeFec();
574 delete serialized.packet;
575
576 // Switching FEC on/off should work now.
577 creator_.StopFecProtectingPackets();
578 EXPECT_FALSE(creator_.IsFecProtected());
579 creator_.StartFecProtectingPackets();
580 EXPECT_TRUE(creator_.IsFecProtected());
581 }
582
583 TEST_P(QuicPacketCreatorTest, SwitchFecOnWithStreamFrameQueued) {
584 // Add a stream frame to the creator.
585 QuicFrame frame;
586 size_t consumed = creator_.CreateStreamFrame(
587 1u, MakeIOVector("test"), 0u, false, &frame);
588 EXPECT_EQ(4u, consumed);
589 ASSERT_TRUE(frame.stream_frame);
590 EXPECT_TRUE(creator_.AddSavedFrame(frame));
591 EXPECT_TRUE(creator_.HasPendingFrames());
592
593 // Enable FEC protection, and send FEC packet every 6 packets.
594 creator_.set_max_packets_per_fec_group(6);
595 EXPECT_TRUE(creator_.IsFecEnabled());
596 EXPECT_DFATAL(creator_.StartFecProtectingPackets(),
597 "Cannot start FEC protection with pending frames.");
598 EXPECT_FALSE(creator_.IsFecProtected());
599
600 // Serialize packet for transmission.
601 SerializedPacket serialized = creator_.SerializePacket();
602 delete serialized.packet;
603 delete serialized.retransmittable_frames;
604 EXPECT_FALSE(creator_.HasPendingFrames());
605
606 // Since all pending frames have been serialized, turning FEC on should work.
607 creator_.StartFecProtectingPackets();
608 EXPECT_TRUE(creator_.IsFecProtected());
609 }
610
611 TEST_P(QuicPacketCreatorTest, CreateStreamFrame) {
612 QuicFrame frame;
613 size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 0u,
614 false, &frame);
615 EXPECT_EQ(4u, consumed);
616 CheckStreamFrame(frame, 1u, "test", 0u, false);
617 delete frame.stream_frame;
618 }
619
620 TEST_P(QuicPacketCreatorTest, CreateStreamFrameFin) {
621 QuicFrame frame;
622 size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 10u,
623 true, &frame);
624 EXPECT_EQ(4u, consumed);
625 CheckStreamFrame(frame, 1u, "test", 10u, true);
626 delete frame.stream_frame;
627 }
628
629 TEST_P(QuicPacketCreatorTest, CreateStreamFrameFinOnly) {
630 QuicFrame frame;
631 size_t consumed = creator_.CreateStreamFrame(1u, IOVector(), 0u, true,
632 &frame);
633 EXPECT_EQ(0u, consumed);
634 CheckStreamFrame(frame, 1u, string(), 0u, true);
635 delete frame.stream_frame;
636 }
637
638 TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) {
639 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
640 + GetEncryptionOverhead();
641 for (size_t i = overhead; i < overhead + 100; ++i) {
642 creator_.set_max_packet_length(i);
643 const bool should_have_room = i > overhead + GetStreamFrameOverhead(
644 NOT_IN_FEC_GROUP);
645 ASSERT_EQ(should_have_room, creator_.HasRoomForStreamFrame(
646 kClientDataStreamId1, kOffset));
647 if (should_have_room) {
648 QuicFrame frame;
649 size_t bytes_consumed = creator_.CreateStreamFrame(
650 kClientDataStreamId1, MakeIOVector("testdata"), kOffset, false,
651 &frame);
652 EXPECT_LT(0u, bytes_consumed);
653 ASSERT_TRUE(creator_.AddSavedFrame(frame));
654 SerializedPacket serialized_packet = creator_.SerializePacket();
655 ASSERT_TRUE(serialized_packet.packet);
656 delete serialized_packet.packet;
657 delete serialized_packet.retransmittable_frames;
658 }
659 }
660 }
661
662 TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) {
663 // Compute the total overhead for a single frame in packet.
664 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
665 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
666 size_t capacity = kDefaultMaxPacketSize - overhead;
667 // Now, test various sizes around this size.
668 for (int delta = -5; delta <= 5; ++delta) {
669 string data(capacity + delta, 'A');
670 size_t bytes_free = delta > 0 ? 0 : 0 - delta;
671 QuicFrame frame;
672 size_t bytes_consumed = creator_.CreateStreamFrame(
673 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame);
674 EXPECT_EQ(capacity - bytes_free, bytes_consumed);
675
676 ASSERT_TRUE(creator_.AddSavedFrame(frame));
677 // BytesFree() returns bytes available for the next frame, which will
678 // be two bytes smaller since the stream frame would need to be grown.
679 EXPECT_EQ(2u, creator_.ExpansionOnNewFrame());
680 size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2;
681 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta;
682 SerializedPacket serialized_packet = creator_.SerializePacket();
683 ASSERT_TRUE(serialized_packet.packet);
684 delete serialized_packet.packet;
685 delete serialized_packet.retransmittable_frames;
686 }
687 }
688
689 TEST_P(QuicPacketCreatorTest, StreamFrameConsumptionWithFec) {
690 // Enable FEC protection, and send FEC packet every 6 packets.
691 EXPECT_TRUE(SwitchFecProtectionOn(6));
692 // Compute the total overhead for a single frame in packet.
693 const size_t overhead = GetPacketHeaderOverhead(IN_FEC_GROUP)
694 + GetEncryptionOverhead() + GetStreamFrameOverhead(IN_FEC_GROUP);
695 size_t capacity = kDefaultMaxPacketSize - overhead;
696 // Now, test various sizes around this size.
697 for (int delta = -5; delta <= 5; ++delta) {
698 string data(capacity + delta, 'A');
699 size_t bytes_free = delta > 0 ? 0 : 0 - delta;
700 QuicFrame frame;
701 size_t bytes_consumed = creator_.CreateStreamFrame(
702 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame);
703 EXPECT_EQ(capacity - bytes_free, bytes_consumed);
704
705 ASSERT_TRUE(creator_.AddSavedFrame(frame));
706 // BytesFree() returns bytes available for the next frame. Since stream
707 // frame does not grow for FEC protected packets, this should be the same
708 // as bytes_free (bound by 0).
709 EXPECT_EQ(0u, creator_.ExpansionOnNewFrame());
710 size_t expected_bytes_free = bytes_free > 0 ? bytes_free : 0;
711 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta;
712 SerializedPacket serialized_packet = creator_.SerializePacket();
713 ASSERT_TRUE(serialized_packet.packet);
714 delete serialized_packet.packet;
715 delete serialized_packet.retransmittable_frames;
716 }
717 }
718
719 TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) {
720 // Compute the total overhead for a single frame in packet.
721 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
722 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
723 ASSERT_GT(kMaxPacketSize, overhead);
724 size_t capacity = kDefaultMaxPacketSize - overhead;
725 // Now, test various sizes around this size.
726 for (int delta = -5; delta <= 5; ++delta) {
727 string data(capacity + delta, 'A');
728 size_t bytes_free = delta > 0 ? 0 : 0 - delta;
729
730 QuicFrame frame;
731 size_t bytes_consumed = creator_.CreateStreamFrame(
732 kCryptoStreamId, MakeIOVector(data), kOffset, false, &frame);
733 EXPECT_LT(0u, bytes_consumed);
734 ASSERT_TRUE(creator_.AddSavedFrame(frame));
735 SerializedPacket serialized_packet = creator_.SerializePacket();
736 ASSERT_TRUE(serialized_packet.packet);
737 // If there is not enough space in the packet to fit a padding frame
738 // (1 byte) and to expand the stream frame (another 2 bytes) the packet
739 // will not be padded.
740 if (bytes_free < 3) {
741 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free,
742 serialized_packet.packet->length());
743 } else {
744 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet.packet->length());
745 }
746 delete serialized_packet.packet;
747 delete serialized_packet.retransmittable_frames;
748 }
749 }
750
751 TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) {
752 // Compute the total overhead for a single frame in packet.
753 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
754 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
755 ASSERT_GT(kDefaultMaxPacketSize, overhead);
756 size_t capacity = kDefaultMaxPacketSize - overhead;
757 // Now, test various sizes around this size.
758 for (int delta = -5; delta <= 5; ++delta) {
759 string data(capacity + delta, 'A');
760 size_t bytes_free = delta > 0 ? 0 : 0 - delta;
761
762 QuicFrame frame;
763 size_t bytes_consumed = creator_.CreateStreamFrame(
764 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame);
765 EXPECT_LT(0u, bytes_consumed);
766 ASSERT_TRUE(creator_.AddSavedFrame(frame));
767 SerializedPacket serialized_packet = creator_.SerializePacket();
768 ASSERT_TRUE(serialized_packet.packet);
769 if (bytes_free > 0) {
770 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free,
771 serialized_packet.packet->length());
772 } else {
773 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet.packet->length());
774 }
775 delete serialized_packet.packet;
776 delete serialized_packet.retransmittable_frames;
777 }
778 }
779
780 TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) {
781 QuicFramerPeer::SetIsServer(&client_framer_, true);
782 QuicVersionVector versions;
783 versions.push_back(test::QuicVersionMax());
784 scoped_ptr<QuicEncryptedPacket> encrypted(
785 creator_.SerializeVersionNegotiationPacket(versions));
786
787 {
788 InSequence s;
789 EXPECT_CALL(framer_visitor_, OnPacket());
790 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
791 EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_));
792 }
793 QuicFramerPeer::SetIsServer(&client_framer_, false);
794 client_framer_.ProcessPacket(*encrypted);
795 }
796
797 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) {
798 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
799 creator_.next_sequence_number_length());
800
801 size_t max_packets_per_fec_group = 10;
802 creator_.set_max_packets_per_fec_group(max_packets_per_fec_group);
803 creator_.set_sequence_number(64 - max_packets_per_fec_group);
804 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize);
805 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
806 creator_.next_sequence_number_length());
807
808 creator_.set_sequence_number(64 * 256 - max_packets_per_fec_group);
809 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize);
810 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER,
811 creator_.next_sequence_number_length());
812
813 creator_.set_sequence_number(64 * 256 * 256 - max_packets_per_fec_group);
814 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize);
815 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
816 creator_.next_sequence_number_length());
817
818 creator_.set_sequence_number(
819 GG_UINT64_C(64) * 256 * 256 * 256 * 256 - max_packets_per_fec_group);
820 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize);
821 EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER,
822 creator_.next_sequence_number_length());
823 }
824
825 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth) {
826 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
827 creator_.next_sequence_number_length());
828
829 creator_.UpdateSequenceNumberLength(1, 10000 / kDefaultMaxPacketSize);
830 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
831 creator_.next_sequence_number_length());
832
833 creator_.UpdateSequenceNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize);
834 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER,
835 creator_.next_sequence_number_length());
836
837 creator_.UpdateSequenceNumberLength(
838 1, 10000 * 256 * 256 / kDefaultMaxPacketSize);
839 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
840 creator_.next_sequence_number_length());
841
842 creator_.UpdateSequenceNumberLength(
843 1, GG_UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize);
844 EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER,
845 creator_.next_sequence_number_length());
846 }
847
848 TEST_P(QuicPacketCreatorTest, SerializeFrame) {
849 if (!GetParam().version_serialization) {
850 creator_.StopSendingVersion();
851 }
852 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
853 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
854 delete frames_[0].stream_frame;
855
856 QuicPacketHeader header;
857 {
858 InSequence s;
859 EXPECT_CALL(framer_visitor_, OnPacket());
860 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
861 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
862 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
863 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce(
864 DoAll(SaveArg<0>(&header), Return(true)));
865 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
866 EXPECT_CALL(framer_visitor_, OnPacketComplete());
867 }
868 ProcessPacket(serialized.packet);
869 EXPECT_EQ(GetParam().version_serialization,
870 header.public_header.version_flag);
871 delete serialized.packet;
872 }
873
874 TEST_P(QuicPacketCreatorTest, CreateStreamFrameTooLarge) {
875 if (!GetParam().version_serialization) {
876 creator_.StopSendingVersion();
877 }
878 // A string larger than fits into a frame.
879 size_t payload_length;
880 creator_.set_max_packet_length(GetPacketLengthForOneStream(
881 client_framer_.version(),
882 QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
883 creator_.connection_id_length(),
884 PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP, &payload_length));
885 QuicFrame frame;
886 const string too_long_payload(payload_length * 2, 'a');
887 size_t consumed = creator_.CreateStreamFrame(
888 1u, MakeIOVector(too_long_payload), 0u, true, &frame);
889 EXPECT_EQ(payload_length, consumed);
890 const string payload(payload_length, 'a');
891 CheckStreamFrame(frame, 1u, payload, 0u, false);
892 delete frame.stream_frame;
893 }
894
895 TEST_P(QuicPacketCreatorTest, AddFrameAndSerialize) {
896 if (!GetParam().version_serialization) {
897 creator_.StopSendingVersion();
898 }
899 const size_t max_plaintext_size =
900 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length());
901 EXPECT_FALSE(creator_.HasPendingFrames());
902 EXPECT_EQ(max_plaintext_size -
903 GetPacketHeaderSize(
904 creator_.connection_id_length(),
905 QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
906 PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP),
907 creator_.BytesFree());
908
909 // Add a variety of frame types and then a padding frame.
910 QuicAckFrame ack_frame(MakeAckFrame(0u));
911 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
912 EXPECT_TRUE(creator_.HasPendingFrames());
913
914 QuicFrame frame;
915 size_t consumed = creator_.CreateStreamFrame(
916 1u, MakeIOVector("test"), 0u, false, &frame);
917 EXPECT_EQ(4u, consumed);
918 ASSERT_TRUE(frame.stream_frame);
919 EXPECT_TRUE(creator_.AddSavedFrame(frame));
920 EXPECT_TRUE(creator_.HasPendingFrames());
921
922 QuicPaddingFrame padding_frame;
923 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&padding_frame)));
924 EXPECT_TRUE(creator_.HasPendingFrames());
925 EXPECT_EQ(0u, creator_.BytesFree());
926
927 EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
928
929 // Ensure the packet is successfully created.
930 SerializedPacket serialized = creator_.SerializePacket();
931 ASSERT_TRUE(serialized.packet);
932 delete serialized.packet;
933 ASSERT_TRUE(serialized.retransmittable_frames);
934 RetransmittableFrames* retransmittable = serialized.retransmittable_frames;
935 ASSERT_EQ(1u, retransmittable->frames().size());
936 EXPECT_EQ(STREAM_FRAME, retransmittable->frames()[0].type);
937 ASSERT_TRUE(retransmittable->frames()[0].stream_frame);
938 delete serialized.retransmittable_frames;
939
940 EXPECT_FALSE(creator_.HasPendingFrames());
941 EXPECT_EQ(max_plaintext_size -
942 GetPacketHeaderSize(
943 creator_.connection_id_length(),
944 QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
945 PACKET_1BYTE_SEQUENCE_NUMBER,
946 NOT_IN_FEC_GROUP),
947 creator_.BytesFree());
948 }
949
950 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) {
951 if (!GetParam().version_serialization) {
952 creator_.StopSendingVersion();
953 }
954 creator_.set_max_packet_length(kMaxPacketSize);
955
956 // Serialized length of ack frame with 2000 nack ranges should be limited by
957 // the number of nack ranges that can be fit in an ack frame.
958 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u);
959 size_t frame_len = client_framer_.GetSerializedFrameLength(
960 QuicFrame(&ack_frame), creator_.BytesFree(), true, true,
961 NOT_IN_FEC_GROUP, PACKET_1BYTE_SEQUENCE_NUMBER);
962 EXPECT_GT(creator_.BytesFree(), frame_len);
963 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize());
964
965 // Add ack frame to creator.
966 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
967 EXPECT_TRUE(creator_.HasPendingFrames());
968 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize());
969 EXPECT_LT(0u, creator_.BytesFree());
970
971 // Make sure that an additional stream frame can be added to the packet.
972 QuicFrame stream_frame;
973 size_t consumed = creator_.CreateStreamFrame(
974 2u, MakeIOVector("test"), 0u, false, &stream_frame);
975 EXPECT_EQ(4u, consumed);
976 ASSERT_TRUE(stream_frame.stream_frame);
977 EXPECT_TRUE(creator_.AddSavedFrame(stream_frame));
978 EXPECT_TRUE(creator_.HasPendingFrames());
979
980 // Ensure the packet is successfully created, and the packet size estimate
981 // matches the serialized packet length.
982 EXPECT_CALL(entropy_calculator_,
983 EntropyHash(_)).WillOnce(testing::Return(0));
984 size_t est_packet_size = creator_.PacketSize();
985 SerializedPacket serialized = creator_.SerializePacket();
986 ASSERT_TRUE(serialized.packet);
987 EXPECT_EQ(est_packet_size,
988 client_framer_.GetMaxPlaintextSize(serialized.packet->length()));
989 delete serialized.retransmittable_frames;
990 delete serialized.packet;
991 }
992
993 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) {
994 if (!GetParam().version_serialization) {
995 creator_.StopSendingVersion();
996 }
997 creator_.set_max_packet_length(500u);
998
999 const size_t max_plaintext_size =
1000 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length());
1001 EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree());
1002
1003 // Serialized length of ack frame with 2000 nack ranges should be limited by
1004 // the packet size.
1005 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u);
1006 size_t frame_len = client_framer_.GetSerializedFrameLength(
1007 QuicFrame(&ack_frame), creator_.BytesFree(), true, true,
1008 NOT_IN_FEC_GROUP, PACKET_1BYTE_SEQUENCE_NUMBER);
1009 EXPECT_EQ(creator_.BytesFree(), frame_len);
1010
1011 // Add ack frame to creator.
1012 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
1013 EXPECT_TRUE(creator_.HasPendingFrames());
1014 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()),
1015 creator_.PacketSize());
1016 EXPECT_EQ(0u, creator_.BytesFree());
1017
1018 // Ensure the packet is successfully created, and the packet size estimate
1019 // may not match the serialized packet length.
1020 EXPECT_CALL(entropy_calculator_,
1021 EntropyHash(_)).WillOnce(Return(0));
1022 size_t est_packet_size = creator_.PacketSize();
1023 SerializedPacket serialized = creator_.SerializePacket();
1024 ASSERT_TRUE(serialized.packet);
1025 EXPECT_GE(est_packet_size,
1026 client_framer_.GetMaxPlaintextSize(serialized.packet->length()));
1027 delete serialized.packet;
1028 }
1029
1030
1031 TEST_P(QuicPacketCreatorTest, EntropyFlag) {
1032 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
1033
1034 for (int i = 0; i < 2; ++i) {
1035 for (int j = 0; j < 64; ++j) {
1036 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
1037 // Verify both BoolSource and hash algorithm.
1038 bool expected_rand_bool =
1039 (mock_random_.RandUint64() & (GG_UINT64_C(1) << j)) != 0;
1040 bool observed_rand_bool =
1041 (serialized.entropy_hash & (1 << ((j+1) % 8))) != 0;
1042 uint8 rest_of_hash = serialized.entropy_hash & ~(1 << ((j+1) % 8));
1043 EXPECT_EQ(expected_rand_bool, observed_rand_bool);
1044 EXPECT_EQ(0, rest_of_hash);
1045 delete serialized.packet;
1046 }
1047 // After 64 calls, BoolSource will refresh the bucket - make sure it does.
1048 mock_random_.ChangeValue();
1049 }
1050
1051 delete frames_[0].stream_frame;
1052 }
1053
1054 } // namespace
1055 } // namespace test
1056 } // namespace net
OLDNEW
« no previous file with comments | « net/quic/quic_packet_creator.cc ('k') | net/quic/quic_packet_generator.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698