| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/quic/quic_packet_creator.h" | |
| 6 | |
| 7 #include "base/stl_util.h" | |
| 8 #include "net/quic/crypto/null_encrypter.h" | |
| 9 #include "net/quic/crypto/quic_decrypter.h" | |
| 10 #include "net/quic/crypto/quic_encrypter.h" | |
| 11 #include "net/quic/quic_utils.h" | |
| 12 #include "net/quic/test_tools/mock_random.h" | |
| 13 #include "net/quic/test_tools/quic_framer_peer.h" | |
| 14 #include "net/quic/test_tools/quic_packet_creator_peer.h" | |
| 15 #include "net/quic/test_tools/quic_test_utils.h" | |
| 16 #include "net/test/gtest_util.h" | |
| 17 #include "testing/gmock/include/gmock/gmock.h" | |
| 18 | |
| 19 using base::StringPiece; | |
| 20 using std::ostream; | |
| 21 using std::string; | |
| 22 using std::vector; | |
| 23 using testing::DoAll; | |
| 24 using testing::InSequence; | |
| 25 using testing::Return; | |
| 26 using testing::SaveArg; | |
| 27 using testing::_; | |
| 28 | |
| 29 namespace net { | |
| 30 namespace test { | |
| 31 namespace { | |
| 32 | |
| 33 // Run tests with combinations of {QuicVersion, ToggleVersionSerialization}. | |
| 34 struct TestParams { | |
| 35 TestParams(QuicVersion version, | |
| 36 bool version_serialization, | |
| 37 QuicConnectionIdLength length) | |
| 38 : version(version), | |
| 39 connection_id_length(length), | |
| 40 version_serialization(version_serialization) { | |
| 41 } | |
| 42 | |
| 43 friend ostream& operator<<(ostream& os, const TestParams& p) { | |
| 44 os << "{ client_version: " << QuicVersionToString(p.version) | |
| 45 << " connection id length: " << p.connection_id_length | |
| 46 << " include version: " << p.version_serialization << " }"; | |
| 47 return os; | |
| 48 } | |
| 49 | |
| 50 QuicVersion version; | |
| 51 QuicConnectionIdLength connection_id_length; | |
| 52 bool version_serialization; | |
| 53 }; | |
| 54 | |
| 55 // Constructs various test permutations. | |
| 56 vector<TestParams> GetTestParams() { | |
| 57 vector<TestParams> params; | |
| 58 QuicConnectionIdLength max = PACKET_8BYTE_CONNECTION_ID; | |
| 59 QuicVersionVector all_supported_versions = QuicSupportedVersions(); | |
| 60 for (size_t i = 0; i < all_supported_versions.size(); ++i) { | |
| 61 params.push_back(TestParams(all_supported_versions[i], true, max)); | |
| 62 params.push_back(TestParams(all_supported_versions[i], false, max)); | |
| 63 } | |
| 64 params.push_back(TestParams( | |
| 65 all_supported_versions[0], true, PACKET_0BYTE_CONNECTION_ID)); | |
| 66 params.push_back(TestParams( | |
| 67 all_supported_versions[0], true, PACKET_1BYTE_CONNECTION_ID)); | |
| 68 params.push_back(TestParams( | |
| 69 all_supported_versions[0], true, PACKET_4BYTE_CONNECTION_ID)); | |
| 70 return params; | |
| 71 } | |
| 72 | |
| 73 class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> { | |
| 74 protected: | |
| 75 QuicPacketCreatorTest() | |
| 76 : server_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(), | |
| 77 true), | |
| 78 client_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(), | |
| 79 false), | |
| 80 sequence_number_(0), | |
| 81 connection_id_(2), | |
| 82 data_("foo"), | |
| 83 creator_(connection_id_, &client_framer_, &mock_random_) { | |
| 84 creator_.set_connection_id_length(GetParam().connection_id_length); | |
| 85 client_framer_.set_visitor(&framer_visitor_); | |
| 86 client_framer_.set_received_entropy_calculator(&entropy_calculator_); | |
| 87 server_framer_.set_visitor(&framer_visitor_); | |
| 88 } | |
| 89 | |
| 90 ~QuicPacketCreatorTest() override {} | |
| 91 | |
| 92 void ProcessPacket(QuicEncryptedPacket* encrypted) { | |
| 93 server_framer_.ProcessPacket(*encrypted); | |
| 94 } | |
| 95 | |
| 96 void CheckStreamFrame(const QuicFrame& frame, | |
| 97 QuicStreamId stream_id, | |
| 98 const string& data, | |
| 99 QuicStreamOffset offset, | |
| 100 bool fin) { | |
| 101 EXPECT_EQ(STREAM_FRAME, frame.type); | |
| 102 ASSERT_TRUE(frame.stream_frame); | |
| 103 EXPECT_EQ(stream_id, frame.stream_frame->stream_id); | |
| 104 scoped_ptr<string> frame_data(frame.stream_frame->GetDataAsString()); | |
| 105 EXPECT_EQ(data, *frame_data); | |
| 106 EXPECT_EQ(offset, frame.stream_frame->offset); | |
| 107 EXPECT_EQ(fin, frame.stream_frame->fin); | |
| 108 } | |
| 109 | |
| 110 // Returns the number of bytes consumed by the header of packet, including | |
| 111 // the version. | |
| 112 size_t GetPacketHeaderOverhead(InFecGroup is_in_fec_group) { | |
| 113 return GetPacketHeaderSize(creator_.connection_id_length(), | |
| 114 kIncludeVersion, | |
| 115 creator_.next_sequence_number_length(), | |
| 116 is_in_fec_group); | |
| 117 } | |
| 118 | |
| 119 // Returns the number of bytes of overhead that will be added to a packet | |
| 120 // of maximum length. | |
| 121 size_t GetEncryptionOverhead() { | |
| 122 return creator_.max_packet_length() - client_framer_.GetMaxPlaintextSize( | |
| 123 creator_.max_packet_length()); | |
| 124 } | |
| 125 | |
| 126 // Returns the number of bytes consumed by the non-data fields of a stream | |
| 127 // frame, assuming it is the last frame in the packet | |
| 128 size_t GetStreamFrameOverhead(InFecGroup is_in_fec_group) { | |
| 129 return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset, | |
| 130 true, is_in_fec_group); | |
| 131 } | |
| 132 | |
| 133 // Enables and turns on FEC protection. Returns true if FEC protection is on. | |
| 134 bool SwitchFecProtectionOn(size_t max_packets_per_fec_group) { | |
| 135 creator_.set_max_packets_per_fec_group(max_packets_per_fec_group); | |
| 136 creator_.StartFecProtectingPackets(); | |
| 137 return creator_.IsFecProtected(); | |
| 138 } | |
| 139 | |
| 140 static const QuicStreamOffset kOffset = 1u; | |
| 141 | |
| 142 QuicFrames frames_; | |
| 143 QuicFramer server_framer_; | |
| 144 QuicFramer client_framer_; | |
| 145 testing::StrictMock<MockFramerVisitor> framer_visitor_; | |
| 146 QuicPacketSequenceNumber sequence_number_; | |
| 147 QuicConnectionId connection_id_; | |
| 148 string data_; | |
| 149 MockRandom mock_random_; | |
| 150 QuicPacketCreator creator_; | |
| 151 MockEntropyCalculator entropy_calculator_; | |
| 152 }; | |
| 153 | |
| 154 // Run all packet creator tests with all supported versions of QUIC, and with | |
| 155 // and without version in the packet header, as well as doing a run for each | |
| 156 // length of truncated connection id. | |
| 157 INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests, | |
| 158 QuicPacketCreatorTest, | |
| 159 ::testing::ValuesIn(GetTestParams())); | |
| 160 | |
| 161 TEST_P(QuicPacketCreatorTest, SerializeFrames) { | |
| 162 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
| 163 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
| 164 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, true, 0u, IOVector()))); | |
| 165 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
| 166 delete frames_[0].ack_frame; | |
| 167 delete frames_[1].stream_frame; | |
| 168 delete frames_[2].stream_frame; | |
| 169 | |
| 170 { | |
| 171 InSequence s; | |
| 172 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 173 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 174 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 175 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 176 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 177 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 178 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 179 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 180 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 181 } | |
| 182 ProcessPacket(serialized.packet); | |
| 183 delete serialized.packet; | |
| 184 } | |
| 185 | |
| 186 TEST_P(QuicPacketCreatorTest, SerializeWithFEC) { | |
| 187 // Enable FEC protection, and send FEC packet every 6 packets. | |
| 188 EXPECT_TRUE(SwitchFecProtectionOn(6)); | |
| 189 // Should return false since we do not have enough packets in the FEC group to | |
| 190 // trigger an FEC packet. | |
| 191 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
| 192 | |
| 193 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
| 194 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
| 195 delete frames_[0].stream_frame; | |
| 196 | |
| 197 { | |
| 198 InSequence s; | |
| 199 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 200 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 201 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 202 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 203 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 204 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_)); | |
| 205 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 206 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 207 } | |
| 208 ProcessPacket(serialized.packet); | |
| 209 delete serialized.packet; | |
| 210 | |
| 211 // Should return false since we do not have enough packets in the FEC group to | |
| 212 // trigger an FEC packet. | |
| 213 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
| 214 // Should return true since there are packets in the FEC group. | |
| 215 ASSERT_TRUE(creator_.ShouldSendFec(/*force_close=*/true)); | |
| 216 | |
| 217 serialized = creator_.SerializeFec(); | |
| 218 ASSERT_EQ(2u, serialized.sequence_number); | |
| 219 { | |
| 220 InSequence s; | |
| 221 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 222 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 223 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 224 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 225 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 226 EXPECT_CALL(framer_visitor_, OnFecData(_)); | |
| 227 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 228 } | |
| 229 ProcessPacket(serialized.packet); | |
| 230 delete serialized.packet; | |
| 231 } | |
| 232 | |
| 233 TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) { | |
| 234 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
| 235 creator_.AddSavedFrame(frames_[0]); | |
| 236 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER); | |
| 237 SerializedPacket serialized = creator_.SerializePacket(); | |
| 238 // The sequence number length will not change mid-packet. | |
| 239 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 240 | |
| 241 { | |
| 242 InSequence s; | |
| 243 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 244 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 245 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 246 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 247 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 248 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 249 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 250 } | |
| 251 ProcessPacket(serialized.packet); | |
| 252 delete serialized.packet; | |
| 253 | |
| 254 creator_.AddSavedFrame(frames_[0]); | |
| 255 serialized = creator_.SerializePacket(); | |
| 256 // Now the actual sequence number length should have changed. | |
| 257 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 258 delete frames_[0].ack_frame; | |
| 259 | |
| 260 { | |
| 261 InSequence s; | |
| 262 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 263 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 264 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 265 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 266 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 267 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 268 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 269 } | |
| 270 ProcessPacket(serialized.packet); | |
| 271 delete serialized.packet; | |
| 272 } | |
| 273 | |
| 274 TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) { | |
| 275 // Changing the sequence number length with queued frames in the creator | |
| 276 // should hold the change until after any currently queued frames are | |
| 277 // serialized. | |
| 278 | |
| 279 // Packet 1. | |
| 280 // Queue a frame in the creator. | |
| 281 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 282 QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); | |
| 283 creator_.AddSavedFrame(ack_frame); | |
| 284 | |
| 285 // Now change sequence number length. | |
| 286 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER); | |
| 287 | |
| 288 // Add a STOP_WAITING frame since it contains a packet sequence number, | |
| 289 // whose length should be 1. | |
| 290 QuicStopWaitingFrame stop_waiting_frame; | |
| 291 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); | |
| 292 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 293 | |
| 294 // Ensure the packet is successfully created. | |
| 295 SerializedPacket serialized = creator_.SerializePacket(); | |
| 296 ASSERT_TRUE(serialized.packet); | |
| 297 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 298 | |
| 299 // Verify that header in transmitted packet has 1 byte sequence length. | |
| 300 QuicPacketHeader header; | |
| 301 { | |
| 302 InSequence s; | |
| 303 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 304 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 305 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 306 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 307 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce( | |
| 308 DoAll(SaveArg<0>(&header), Return(true))); | |
| 309 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 310 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); | |
| 311 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 312 } | |
| 313 ProcessPacket(serialized.packet); | |
| 314 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
| 315 header.public_header.sequence_number_length); | |
| 316 delete serialized.packet; | |
| 317 | |
| 318 // Packet 2. | |
| 319 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 320 // Generate Packet 2 with one frame -- sequence number length should now | |
| 321 // change to 4 bytes. | |
| 322 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); | |
| 323 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 324 | |
| 325 // Ensure the packet is successfully created. | |
| 326 serialized = creator_.SerializePacket(); | |
| 327 ASSERT_TRUE(serialized.packet); | |
| 328 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 329 | |
| 330 // Verify that header in transmitted packet has 4 byte sequence length. | |
| 331 { | |
| 332 InSequence s; | |
| 333 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 334 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 335 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 336 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 337 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce( | |
| 338 DoAll(SaveArg<0>(&header), Return(true))); | |
| 339 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); | |
| 340 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 341 } | |
| 342 ProcessPacket(serialized.packet); | |
| 343 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, | |
| 344 header.public_header.sequence_number_length); | |
| 345 | |
| 346 delete serialized.packet; | |
| 347 delete ack_frame.ack_frame; | |
| 348 } | |
| 349 | |
| 350 TEST_P(QuicPacketCreatorTest, SerializeWithFECChangingSequenceNumberLength) { | |
| 351 // Test goal is to test the following sequence (P1 => generate Packet 1): | |
| 352 // P1 <change seq num length> P2 FEC, | |
| 353 // and we expect that sequence number length should not change until the end | |
| 354 // of the open FEC group. | |
| 355 | |
| 356 // Enable FEC protection, and send FEC packet every 6 packets. | |
| 357 EXPECT_TRUE(SwitchFecProtectionOn(6)); | |
| 358 // Should return false since we do not have enough packets in the FEC group to | |
| 359 // trigger an FEC packet. | |
| 360 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
| 361 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); | |
| 362 | |
| 363 // Generate Packet 1. | |
| 364 creator_.AddSavedFrame(frames_[0]); | |
| 365 // Change the sequence number length mid-FEC group and it should not change. | |
| 366 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER); | |
| 367 SerializedPacket serialized = creator_.SerializePacket(); | |
| 368 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 369 | |
| 370 { | |
| 371 InSequence s; | |
| 372 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 373 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 374 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 375 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 376 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 377 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_)); | |
| 378 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 379 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 380 } | |
| 381 ProcessPacket(serialized.packet); | |
| 382 delete serialized.packet; | |
| 383 | |
| 384 // Generate Packet 2. | |
| 385 creator_.AddSavedFrame(frames_[0]); | |
| 386 serialized = creator_.SerializePacket(); | |
| 387 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 388 | |
| 389 { | |
| 390 InSequence s; | |
| 391 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 392 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 393 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 394 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 395 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 396 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_)); | |
| 397 EXPECT_CALL(framer_visitor_, OnAckFrame(_)); | |
| 398 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 399 } | |
| 400 ProcessPacket(serialized.packet); | |
| 401 delete serialized.packet; | |
| 402 | |
| 403 // Should return false since we do not have enough packets in the FEC group to | |
| 404 // trigger an FEC packet. | |
| 405 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
| 406 // Should return true since there are packets in the FEC group. | |
| 407 ASSERT_TRUE(creator_.ShouldSendFec(/*force_close=*/true)); | |
| 408 | |
| 409 // Force generation of FEC packet. | |
| 410 serialized = creator_.SerializeFec(); | |
| 411 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 412 ASSERT_EQ(3u, serialized.sequence_number); | |
| 413 | |
| 414 { | |
| 415 InSequence s; | |
| 416 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 417 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 418 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 419 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 420 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 421 EXPECT_CALL(framer_visitor_, OnFecData(_)); | |
| 422 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 423 } | |
| 424 ProcessPacket(serialized.packet); | |
| 425 delete serialized.packet; | |
| 426 | |
| 427 // Ensure the next FEC group starts using the new sequence number length. | |
| 428 serialized = creator_.SerializeAllFrames(frames_); | |
| 429 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 430 delete frames_[0].ack_frame; | |
| 431 delete serialized.packet; | |
| 432 } | |
| 433 | |
| 434 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) { | |
| 435 // If the original packet sequence number length, the current sequence number | |
| 436 // length, and the configured send sequence number length are different, the | |
| 437 // retransmit must sent with the original length and the others do not change. | |
| 438 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER); | |
| 439 QuicPacketCreatorPeer::SetSequenceNumberLength(&creator_, | |
| 440 PACKET_2BYTE_SEQUENCE_NUMBER); | |
| 441 QuicStreamFrame* stream_frame = | |
| 442 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, IOVector()); | |
| 443 RetransmittableFrames frames; | |
| 444 frames.set_encryption_level(ENCRYPTION_NONE); | |
| 445 frames.AddStreamFrame(stream_frame); | |
| 446 SerializedPacket serialized = | |
| 447 creator_.ReserializeAllFrames(frames, PACKET_1BYTE_SEQUENCE_NUMBER); | |
| 448 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, | |
| 449 creator_.next_sequence_number_length()); | |
| 450 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER, | |
| 451 QuicPacketCreatorPeer::GetSequenceNumberLength(&creator_)); | |
| 452 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length); | |
| 453 | |
| 454 { | |
| 455 InSequence s; | |
| 456 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 457 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 458 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 459 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 460 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 461 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 462 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 463 } | |
| 464 ProcessPacket(serialized.packet); | |
| 465 delete serialized.packet; | |
| 466 } | |
| 467 | |
| 468 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithPadding) { | |
| 469 QuicStreamFrame* stream_frame = | |
| 470 new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, /*offset=*/0, | |
| 471 MakeIOVector("fake handshake message data")); | |
| 472 RetransmittableFrames frames; | |
| 473 frames.set_encryption_level(ENCRYPTION_NONE); | |
| 474 frames.AddStreamFrame(stream_frame); | |
| 475 SerializedPacket serialized = creator_.ReserializeAllFrames( | |
| 476 frames, creator_.next_sequence_number_length()); | |
| 477 EXPECT_EQ(kDefaultMaxPacketSize, serialized.packet->length()); | |
| 478 delete serialized.packet; | |
| 479 } | |
| 480 | |
| 481 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) { | |
| 482 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
| 483 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP); | |
| 484 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 485 for (int delta = -5; delta <= 0; ++delta) { | |
| 486 string data(capacity + delta, 'A'); | |
| 487 size_t bytes_free = 0 - delta; | |
| 488 | |
| 489 QuicStreamFrame* stream_frame = new QuicStreamFrame( | |
| 490 kCryptoStreamId, /*fin=*/false, kOffset, MakeIOVector(data)); | |
| 491 RetransmittableFrames frames; | |
| 492 frames.set_encryption_level(ENCRYPTION_NONE); | |
| 493 frames.AddStreamFrame(stream_frame); | |
| 494 SerializedPacket serialized = creator_.ReserializeAllFrames( | |
| 495 frames, creator_.next_sequence_number_length()); | |
| 496 | |
| 497 // If there is not enough space in the packet to fit a padding frame | |
| 498 // (1 byte) and to expand the stream frame (another 2 bytes) the packet | |
| 499 // will not be padded. | |
| 500 if (bytes_free < 3) { | |
| 501 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
| 502 serialized.packet->length()); | |
| 503 } else { | |
| 504 EXPECT_EQ(kDefaultMaxPacketSize, serialized.packet->length()); | |
| 505 } | |
| 506 | |
| 507 delete serialized.packet; | |
| 508 frames_.clear(); | |
| 509 } | |
| 510 } | |
| 511 | |
| 512 TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) { | |
| 513 QuicConnectionCloseFrame frame; | |
| 514 frame.error_code = QUIC_NO_ERROR; | |
| 515 frame.error_details = "error"; | |
| 516 | |
| 517 SerializedPacket serialized = creator_.SerializeConnectionClose(&frame); | |
| 518 ASSERT_EQ(1u, serialized.sequence_number); | |
| 519 ASSERT_EQ(1u, creator_.sequence_number()); | |
| 520 | |
| 521 InSequence s; | |
| 522 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 523 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 524 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 525 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 526 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); | |
| 527 EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_)); | |
| 528 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 529 | |
| 530 ProcessPacket(serialized.packet); | |
| 531 delete serialized.packet; | |
| 532 } | |
| 533 | |
| 534 TEST_P(QuicPacketCreatorTest, SwitchFecOnOffWithNoGroup) { | |
| 535 // Enable FEC protection. | |
| 536 creator_.set_max_packets_per_fec_group(6); | |
| 537 EXPECT_TRUE(creator_.IsFecEnabled()); | |
| 538 EXPECT_FALSE(creator_.IsFecProtected()); | |
| 539 | |
| 540 // Turn on FEC protection. | |
| 541 creator_.StartFecProtectingPackets(); | |
| 542 EXPECT_TRUE(creator_.IsFecProtected()); | |
| 543 // We have no packets in the FEC group, so no FEC packet can be created. | |
| 544 EXPECT_FALSE(creator_.ShouldSendFec(/*force_close=*/true)); | |
| 545 // Since no packets are in FEC group yet, we should be able to turn FEC | |
| 546 // off with no trouble. | |
| 547 creator_.StopFecProtectingPackets(); | |
| 548 EXPECT_FALSE(creator_.IsFecProtected()); | |
| 549 } | |
| 550 | |
| 551 TEST_P(QuicPacketCreatorTest, SwitchFecOnOffWithGroupInProgress) { | |
| 552 // Enable FEC protection, and send FEC packet every 6 packets. | |
| 553 EXPECT_TRUE(SwitchFecProtectionOn(6)); | |
| 554 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
| 555 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
| 556 delete frames_[0].stream_frame; | |
| 557 delete serialized.packet; | |
| 558 | |
| 559 EXPECT_TRUE(creator_.IsFecProtected()); | |
| 560 // We do not have enough packets in the FEC group to trigger an FEC packet. | |
| 561 EXPECT_FALSE(creator_.ShouldSendFec(/*force_close=*/false)); | |
| 562 // Should return true since there are packets in the FEC group. | |
| 563 EXPECT_TRUE(creator_.ShouldSendFec(/*force_close=*/true)); | |
| 564 | |
| 565 // Switching FEC off should not change creator state, since there is an | |
| 566 // FEC packet under construction. | |
| 567 EXPECT_DFATAL(creator_.StopFecProtectingPackets(), | |
| 568 "Cannot stop FEC protection with open FEC group."); | |
| 569 EXPECT_TRUE(creator_.IsFecProtected()); | |
| 570 // Confirm that FEC packet is still under construction. | |
| 571 EXPECT_TRUE(creator_.ShouldSendFec(/*force_close=*/true)); | |
| 572 | |
| 573 serialized = creator_.SerializeFec(); | |
| 574 delete serialized.packet; | |
| 575 | |
| 576 // Switching FEC on/off should work now. | |
| 577 creator_.StopFecProtectingPackets(); | |
| 578 EXPECT_FALSE(creator_.IsFecProtected()); | |
| 579 creator_.StartFecProtectingPackets(); | |
| 580 EXPECT_TRUE(creator_.IsFecProtected()); | |
| 581 } | |
| 582 | |
| 583 TEST_P(QuicPacketCreatorTest, SwitchFecOnWithStreamFrameQueued) { | |
| 584 // Add a stream frame to the creator. | |
| 585 QuicFrame frame; | |
| 586 size_t consumed = creator_.CreateStreamFrame( | |
| 587 1u, MakeIOVector("test"), 0u, false, &frame); | |
| 588 EXPECT_EQ(4u, consumed); | |
| 589 ASSERT_TRUE(frame.stream_frame); | |
| 590 EXPECT_TRUE(creator_.AddSavedFrame(frame)); | |
| 591 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 592 | |
| 593 // Enable FEC protection, and send FEC packet every 6 packets. | |
| 594 creator_.set_max_packets_per_fec_group(6); | |
| 595 EXPECT_TRUE(creator_.IsFecEnabled()); | |
| 596 EXPECT_DFATAL(creator_.StartFecProtectingPackets(), | |
| 597 "Cannot start FEC protection with pending frames."); | |
| 598 EXPECT_FALSE(creator_.IsFecProtected()); | |
| 599 | |
| 600 // Serialize packet for transmission. | |
| 601 SerializedPacket serialized = creator_.SerializePacket(); | |
| 602 delete serialized.packet; | |
| 603 delete serialized.retransmittable_frames; | |
| 604 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 605 | |
| 606 // Since all pending frames have been serialized, turning FEC on should work. | |
| 607 creator_.StartFecProtectingPackets(); | |
| 608 EXPECT_TRUE(creator_.IsFecProtected()); | |
| 609 } | |
| 610 | |
| 611 TEST_P(QuicPacketCreatorTest, CreateStreamFrame) { | |
| 612 QuicFrame frame; | |
| 613 size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 0u, | |
| 614 false, &frame); | |
| 615 EXPECT_EQ(4u, consumed); | |
| 616 CheckStreamFrame(frame, 1u, "test", 0u, false); | |
| 617 delete frame.stream_frame; | |
| 618 } | |
| 619 | |
| 620 TEST_P(QuicPacketCreatorTest, CreateStreamFrameFin) { | |
| 621 QuicFrame frame; | |
| 622 size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 10u, | |
| 623 true, &frame); | |
| 624 EXPECT_EQ(4u, consumed); | |
| 625 CheckStreamFrame(frame, 1u, "test", 10u, true); | |
| 626 delete frame.stream_frame; | |
| 627 } | |
| 628 | |
| 629 TEST_P(QuicPacketCreatorTest, CreateStreamFrameFinOnly) { | |
| 630 QuicFrame frame; | |
| 631 size_t consumed = creator_.CreateStreamFrame(1u, IOVector(), 0u, true, | |
| 632 &frame); | |
| 633 EXPECT_EQ(0u, consumed); | |
| 634 CheckStreamFrame(frame, 1u, string(), 0u, true); | |
| 635 delete frame.stream_frame; | |
| 636 } | |
| 637 | |
| 638 TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) { | |
| 639 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
| 640 + GetEncryptionOverhead(); | |
| 641 for (size_t i = overhead; i < overhead + 100; ++i) { | |
| 642 creator_.set_max_packet_length(i); | |
| 643 const bool should_have_room = i > overhead + GetStreamFrameOverhead( | |
| 644 NOT_IN_FEC_GROUP); | |
| 645 ASSERT_EQ(should_have_room, creator_.HasRoomForStreamFrame( | |
| 646 kClientDataStreamId1, kOffset)); | |
| 647 if (should_have_room) { | |
| 648 QuicFrame frame; | |
| 649 size_t bytes_consumed = creator_.CreateStreamFrame( | |
| 650 kClientDataStreamId1, MakeIOVector("testdata"), kOffset, false, | |
| 651 &frame); | |
| 652 EXPECT_LT(0u, bytes_consumed); | |
| 653 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
| 654 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
| 655 ASSERT_TRUE(serialized_packet.packet); | |
| 656 delete serialized_packet.packet; | |
| 657 delete serialized_packet.retransmittable_frames; | |
| 658 } | |
| 659 } | |
| 660 } | |
| 661 | |
| 662 TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) { | |
| 663 // Compute the total overhead for a single frame in packet. | |
| 664 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
| 665 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP); | |
| 666 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 667 // Now, test various sizes around this size. | |
| 668 for (int delta = -5; delta <= 5; ++delta) { | |
| 669 string data(capacity + delta, 'A'); | |
| 670 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
| 671 QuicFrame frame; | |
| 672 size_t bytes_consumed = creator_.CreateStreamFrame( | |
| 673 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame); | |
| 674 EXPECT_EQ(capacity - bytes_free, bytes_consumed); | |
| 675 | |
| 676 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
| 677 // BytesFree() returns bytes available for the next frame, which will | |
| 678 // be two bytes smaller since the stream frame would need to be grown. | |
| 679 EXPECT_EQ(2u, creator_.ExpansionOnNewFrame()); | |
| 680 size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2; | |
| 681 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta; | |
| 682 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
| 683 ASSERT_TRUE(serialized_packet.packet); | |
| 684 delete serialized_packet.packet; | |
| 685 delete serialized_packet.retransmittable_frames; | |
| 686 } | |
| 687 } | |
| 688 | |
| 689 TEST_P(QuicPacketCreatorTest, StreamFrameConsumptionWithFec) { | |
| 690 // Enable FEC protection, and send FEC packet every 6 packets. | |
| 691 EXPECT_TRUE(SwitchFecProtectionOn(6)); | |
| 692 // Compute the total overhead for a single frame in packet. | |
| 693 const size_t overhead = GetPacketHeaderOverhead(IN_FEC_GROUP) | |
| 694 + GetEncryptionOverhead() + GetStreamFrameOverhead(IN_FEC_GROUP); | |
| 695 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 696 // Now, test various sizes around this size. | |
| 697 for (int delta = -5; delta <= 5; ++delta) { | |
| 698 string data(capacity + delta, 'A'); | |
| 699 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
| 700 QuicFrame frame; | |
| 701 size_t bytes_consumed = creator_.CreateStreamFrame( | |
| 702 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame); | |
| 703 EXPECT_EQ(capacity - bytes_free, bytes_consumed); | |
| 704 | |
| 705 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
| 706 // BytesFree() returns bytes available for the next frame. Since stream | |
| 707 // frame does not grow for FEC protected packets, this should be the same | |
| 708 // as bytes_free (bound by 0). | |
| 709 EXPECT_EQ(0u, creator_.ExpansionOnNewFrame()); | |
| 710 size_t expected_bytes_free = bytes_free > 0 ? bytes_free : 0; | |
| 711 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta; | |
| 712 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
| 713 ASSERT_TRUE(serialized_packet.packet); | |
| 714 delete serialized_packet.packet; | |
| 715 delete serialized_packet.retransmittable_frames; | |
| 716 } | |
| 717 } | |
| 718 | |
| 719 TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) { | |
| 720 // Compute the total overhead for a single frame in packet. | |
| 721 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
| 722 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP); | |
| 723 ASSERT_GT(kMaxPacketSize, overhead); | |
| 724 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 725 // Now, test various sizes around this size. | |
| 726 for (int delta = -5; delta <= 5; ++delta) { | |
| 727 string data(capacity + delta, 'A'); | |
| 728 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
| 729 | |
| 730 QuicFrame frame; | |
| 731 size_t bytes_consumed = creator_.CreateStreamFrame( | |
| 732 kCryptoStreamId, MakeIOVector(data), kOffset, false, &frame); | |
| 733 EXPECT_LT(0u, bytes_consumed); | |
| 734 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
| 735 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
| 736 ASSERT_TRUE(serialized_packet.packet); | |
| 737 // If there is not enough space in the packet to fit a padding frame | |
| 738 // (1 byte) and to expand the stream frame (another 2 bytes) the packet | |
| 739 // will not be padded. | |
| 740 if (bytes_free < 3) { | |
| 741 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
| 742 serialized_packet.packet->length()); | |
| 743 } else { | |
| 744 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet.packet->length()); | |
| 745 } | |
| 746 delete serialized_packet.packet; | |
| 747 delete serialized_packet.retransmittable_frames; | |
| 748 } | |
| 749 } | |
| 750 | |
| 751 TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) { | |
| 752 // Compute the total overhead for a single frame in packet. | |
| 753 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP) | |
| 754 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP); | |
| 755 ASSERT_GT(kDefaultMaxPacketSize, overhead); | |
| 756 size_t capacity = kDefaultMaxPacketSize - overhead; | |
| 757 // Now, test various sizes around this size. | |
| 758 for (int delta = -5; delta <= 5; ++delta) { | |
| 759 string data(capacity + delta, 'A'); | |
| 760 size_t bytes_free = delta > 0 ? 0 : 0 - delta; | |
| 761 | |
| 762 QuicFrame frame; | |
| 763 size_t bytes_consumed = creator_.CreateStreamFrame( | |
| 764 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame); | |
| 765 EXPECT_LT(0u, bytes_consumed); | |
| 766 ASSERT_TRUE(creator_.AddSavedFrame(frame)); | |
| 767 SerializedPacket serialized_packet = creator_.SerializePacket(); | |
| 768 ASSERT_TRUE(serialized_packet.packet); | |
| 769 if (bytes_free > 0) { | |
| 770 EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, | |
| 771 serialized_packet.packet->length()); | |
| 772 } else { | |
| 773 EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet.packet->length()); | |
| 774 } | |
| 775 delete serialized_packet.packet; | |
| 776 delete serialized_packet.retransmittable_frames; | |
| 777 } | |
| 778 } | |
| 779 | |
| 780 TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) { | |
| 781 QuicFramerPeer::SetIsServer(&client_framer_, true); | |
| 782 QuicVersionVector versions; | |
| 783 versions.push_back(test::QuicVersionMax()); | |
| 784 scoped_ptr<QuicEncryptedPacket> encrypted( | |
| 785 creator_.SerializeVersionNegotiationPacket(versions)); | |
| 786 | |
| 787 { | |
| 788 InSequence s; | |
| 789 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 790 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 791 EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_)); | |
| 792 } | |
| 793 QuicFramerPeer::SetIsServer(&client_framer_, false); | |
| 794 client_framer_.ProcessPacket(*encrypted); | |
| 795 } | |
| 796 | |
| 797 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) { | |
| 798 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
| 799 creator_.next_sequence_number_length()); | |
| 800 | |
| 801 size_t max_packets_per_fec_group = 10; | |
| 802 creator_.set_max_packets_per_fec_group(max_packets_per_fec_group); | |
| 803 creator_.set_sequence_number(64 - max_packets_per_fec_group); | |
| 804 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 805 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
| 806 creator_.next_sequence_number_length()); | |
| 807 | |
| 808 creator_.set_sequence_number(64 * 256 - max_packets_per_fec_group); | |
| 809 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 810 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER, | |
| 811 creator_.next_sequence_number_length()); | |
| 812 | |
| 813 creator_.set_sequence_number(64 * 256 * 256 - max_packets_per_fec_group); | |
| 814 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 815 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, | |
| 816 creator_.next_sequence_number_length()); | |
| 817 | |
| 818 creator_.set_sequence_number( | |
| 819 GG_UINT64_C(64) * 256 * 256 * 256 * 256 - max_packets_per_fec_group); | |
| 820 creator_.UpdateSequenceNumberLength(2, 10000 / kDefaultMaxPacketSize); | |
| 821 EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER, | |
| 822 creator_.next_sequence_number_length()); | |
| 823 } | |
| 824 | |
| 825 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth) { | |
| 826 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
| 827 creator_.next_sequence_number_length()); | |
| 828 | |
| 829 creator_.UpdateSequenceNumberLength(1, 10000 / kDefaultMaxPacketSize); | |
| 830 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, | |
| 831 creator_.next_sequence_number_length()); | |
| 832 | |
| 833 creator_.UpdateSequenceNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); | |
| 834 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER, | |
| 835 creator_.next_sequence_number_length()); | |
| 836 | |
| 837 creator_.UpdateSequenceNumberLength( | |
| 838 1, 10000 * 256 * 256 / kDefaultMaxPacketSize); | |
| 839 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, | |
| 840 creator_.next_sequence_number_length()); | |
| 841 | |
| 842 creator_.UpdateSequenceNumberLength( | |
| 843 1, GG_UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); | |
| 844 EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER, | |
| 845 creator_.next_sequence_number_length()); | |
| 846 } | |
| 847 | |
| 848 TEST_P(QuicPacketCreatorTest, SerializeFrame) { | |
| 849 if (!GetParam().version_serialization) { | |
| 850 creator_.StopSendingVersion(); | |
| 851 } | |
| 852 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
| 853 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
| 854 delete frames_[0].stream_frame; | |
| 855 | |
| 856 QuicPacketHeader header; | |
| 857 { | |
| 858 InSequence s; | |
| 859 EXPECT_CALL(framer_visitor_, OnPacket()); | |
| 860 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); | |
| 861 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); | |
| 862 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); | |
| 863 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce( | |
| 864 DoAll(SaveArg<0>(&header), Return(true))); | |
| 865 EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); | |
| 866 EXPECT_CALL(framer_visitor_, OnPacketComplete()); | |
| 867 } | |
| 868 ProcessPacket(serialized.packet); | |
| 869 EXPECT_EQ(GetParam().version_serialization, | |
| 870 header.public_header.version_flag); | |
| 871 delete serialized.packet; | |
| 872 } | |
| 873 | |
| 874 TEST_P(QuicPacketCreatorTest, CreateStreamFrameTooLarge) { | |
| 875 if (!GetParam().version_serialization) { | |
| 876 creator_.StopSendingVersion(); | |
| 877 } | |
| 878 // A string larger than fits into a frame. | |
| 879 size_t payload_length; | |
| 880 creator_.set_max_packet_length(GetPacketLengthForOneStream( | |
| 881 client_framer_.version(), | |
| 882 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
| 883 creator_.connection_id_length(), | |
| 884 PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP, &payload_length)); | |
| 885 QuicFrame frame; | |
| 886 const string too_long_payload(payload_length * 2, 'a'); | |
| 887 size_t consumed = creator_.CreateStreamFrame( | |
| 888 1u, MakeIOVector(too_long_payload), 0u, true, &frame); | |
| 889 EXPECT_EQ(payload_length, consumed); | |
| 890 const string payload(payload_length, 'a'); | |
| 891 CheckStreamFrame(frame, 1u, payload, 0u, false); | |
| 892 delete frame.stream_frame; | |
| 893 } | |
| 894 | |
| 895 TEST_P(QuicPacketCreatorTest, AddFrameAndSerialize) { | |
| 896 if (!GetParam().version_serialization) { | |
| 897 creator_.StopSendingVersion(); | |
| 898 } | |
| 899 const size_t max_plaintext_size = | |
| 900 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
| 901 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 902 EXPECT_EQ(max_plaintext_size - | |
| 903 GetPacketHeaderSize( | |
| 904 creator_.connection_id_length(), | |
| 905 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
| 906 PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP), | |
| 907 creator_.BytesFree()); | |
| 908 | |
| 909 // Add a variety of frame types and then a padding frame. | |
| 910 QuicAckFrame ack_frame(MakeAckFrame(0u)); | |
| 911 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
| 912 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 913 | |
| 914 QuicFrame frame; | |
| 915 size_t consumed = creator_.CreateStreamFrame( | |
| 916 1u, MakeIOVector("test"), 0u, false, &frame); | |
| 917 EXPECT_EQ(4u, consumed); | |
| 918 ASSERT_TRUE(frame.stream_frame); | |
| 919 EXPECT_TRUE(creator_.AddSavedFrame(frame)); | |
| 920 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 921 | |
| 922 QuicPaddingFrame padding_frame; | |
| 923 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&padding_frame))); | |
| 924 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 925 EXPECT_EQ(0u, creator_.BytesFree()); | |
| 926 | |
| 927 EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
| 928 | |
| 929 // Ensure the packet is successfully created. | |
| 930 SerializedPacket serialized = creator_.SerializePacket(); | |
| 931 ASSERT_TRUE(serialized.packet); | |
| 932 delete serialized.packet; | |
| 933 ASSERT_TRUE(serialized.retransmittable_frames); | |
| 934 RetransmittableFrames* retransmittable = serialized.retransmittable_frames; | |
| 935 ASSERT_EQ(1u, retransmittable->frames().size()); | |
| 936 EXPECT_EQ(STREAM_FRAME, retransmittable->frames()[0].type); | |
| 937 ASSERT_TRUE(retransmittable->frames()[0].stream_frame); | |
| 938 delete serialized.retransmittable_frames; | |
| 939 | |
| 940 EXPECT_FALSE(creator_.HasPendingFrames()); | |
| 941 EXPECT_EQ(max_plaintext_size - | |
| 942 GetPacketHeaderSize( | |
| 943 creator_.connection_id_length(), | |
| 944 QuicPacketCreatorPeer::SendVersionInPacket(&creator_), | |
| 945 PACKET_1BYTE_SEQUENCE_NUMBER, | |
| 946 NOT_IN_FEC_GROUP), | |
| 947 creator_.BytesFree()); | |
| 948 } | |
| 949 | |
| 950 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) { | |
| 951 if (!GetParam().version_serialization) { | |
| 952 creator_.StopSendingVersion(); | |
| 953 } | |
| 954 creator_.set_max_packet_length(kMaxPacketSize); | |
| 955 | |
| 956 // Serialized length of ack frame with 2000 nack ranges should be limited by | |
| 957 // the number of nack ranges that can be fit in an ack frame. | |
| 958 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); | |
| 959 size_t frame_len = client_framer_.GetSerializedFrameLength( | |
| 960 QuicFrame(&ack_frame), creator_.BytesFree(), true, true, | |
| 961 NOT_IN_FEC_GROUP, PACKET_1BYTE_SEQUENCE_NUMBER); | |
| 962 EXPECT_GT(creator_.BytesFree(), frame_len); | |
| 963 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); | |
| 964 | |
| 965 // Add ack frame to creator. | |
| 966 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
| 967 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 968 EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); | |
| 969 EXPECT_LT(0u, creator_.BytesFree()); | |
| 970 | |
| 971 // Make sure that an additional stream frame can be added to the packet. | |
| 972 QuicFrame stream_frame; | |
| 973 size_t consumed = creator_.CreateStreamFrame( | |
| 974 2u, MakeIOVector("test"), 0u, false, &stream_frame); | |
| 975 EXPECT_EQ(4u, consumed); | |
| 976 ASSERT_TRUE(stream_frame.stream_frame); | |
| 977 EXPECT_TRUE(creator_.AddSavedFrame(stream_frame)); | |
| 978 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 979 | |
| 980 // Ensure the packet is successfully created, and the packet size estimate | |
| 981 // matches the serialized packet length. | |
| 982 EXPECT_CALL(entropy_calculator_, | |
| 983 EntropyHash(_)).WillOnce(testing::Return(0)); | |
| 984 size_t est_packet_size = creator_.PacketSize(); | |
| 985 SerializedPacket serialized = creator_.SerializePacket(); | |
| 986 ASSERT_TRUE(serialized.packet); | |
| 987 EXPECT_EQ(est_packet_size, | |
| 988 client_framer_.GetMaxPlaintextSize(serialized.packet->length())); | |
| 989 delete serialized.retransmittable_frames; | |
| 990 delete serialized.packet; | |
| 991 } | |
| 992 | |
| 993 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) { | |
| 994 if (!GetParam().version_serialization) { | |
| 995 creator_.StopSendingVersion(); | |
| 996 } | |
| 997 creator_.set_max_packet_length(500u); | |
| 998 | |
| 999 const size_t max_plaintext_size = | |
| 1000 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); | |
| 1001 EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree()); | |
| 1002 | |
| 1003 // Serialized length of ack frame with 2000 nack ranges should be limited by | |
| 1004 // the packet size. | |
| 1005 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); | |
| 1006 size_t frame_len = client_framer_.GetSerializedFrameLength( | |
| 1007 QuicFrame(&ack_frame), creator_.BytesFree(), true, true, | |
| 1008 NOT_IN_FEC_GROUP, PACKET_1BYTE_SEQUENCE_NUMBER); | |
| 1009 EXPECT_EQ(creator_.BytesFree(), frame_len); | |
| 1010 | |
| 1011 // Add ack frame to creator. | |
| 1012 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); | |
| 1013 EXPECT_TRUE(creator_.HasPendingFrames()); | |
| 1014 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()), | |
| 1015 creator_.PacketSize()); | |
| 1016 EXPECT_EQ(0u, creator_.BytesFree()); | |
| 1017 | |
| 1018 // Ensure the packet is successfully created, and the packet size estimate | |
| 1019 // may not match the serialized packet length. | |
| 1020 EXPECT_CALL(entropy_calculator_, | |
| 1021 EntropyHash(_)).WillOnce(Return(0)); | |
| 1022 size_t est_packet_size = creator_.PacketSize(); | |
| 1023 SerializedPacket serialized = creator_.SerializePacket(); | |
| 1024 ASSERT_TRUE(serialized.packet); | |
| 1025 EXPECT_GE(est_packet_size, | |
| 1026 client_framer_.GetMaxPlaintextSize(serialized.packet->length())); | |
| 1027 delete serialized.packet; | |
| 1028 } | |
| 1029 | |
| 1030 | |
| 1031 TEST_P(QuicPacketCreatorTest, EntropyFlag) { | |
| 1032 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector()))); | |
| 1033 | |
| 1034 for (int i = 0; i < 2; ++i) { | |
| 1035 for (int j = 0; j < 64; ++j) { | |
| 1036 SerializedPacket serialized = creator_.SerializeAllFrames(frames_); | |
| 1037 // Verify both BoolSource and hash algorithm. | |
| 1038 bool expected_rand_bool = | |
| 1039 (mock_random_.RandUint64() & (GG_UINT64_C(1) << j)) != 0; | |
| 1040 bool observed_rand_bool = | |
| 1041 (serialized.entropy_hash & (1 << ((j+1) % 8))) != 0; | |
| 1042 uint8 rest_of_hash = serialized.entropy_hash & ~(1 << ((j+1) % 8)); | |
| 1043 EXPECT_EQ(expected_rand_bool, observed_rand_bool); | |
| 1044 EXPECT_EQ(0, rest_of_hash); | |
| 1045 delete serialized.packet; | |
| 1046 } | |
| 1047 // After 64 calls, BoolSource will refresh the bucket - make sure it does. | |
| 1048 mock_random_.ChangeValue(); | |
| 1049 } | |
| 1050 | |
| 1051 delete frames_[0].stream_frame; | |
| 1052 } | |
| 1053 | |
| 1054 } // namespace | |
| 1055 } // namespace test | |
| 1056 } // namespace net | |
| OLD | NEW |