Chromium Code Reviews| Index: net/ssl/ssl_client_session_cache_openssl_unittest.cc |
| diff --git a/net/ssl/ssl_client_session_cache_openssl_unittest.cc b/net/ssl/ssl_client_session_cache_openssl_unittest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..7c25de327855473895db229395a07b3690b906eb |
| --- /dev/null |
| +++ b/net/ssl/ssl_client_session_cache_openssl_unittest.cc |
| @@ -0,0 +1,199 @@ |
| +// Copyright 2015 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "net/ssl/ssl_client_session_cache_openssl.h" |
| + |
| +#include <openssl/ssl.h> |
| + |
| +#include "base/strings/string_number_conversions.h" |
| +#include "net/ssl/scoped_openssl_types.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +namespace net { |
| + |
| +namespace { |
| + |
| +class TestSSLClientSessionCacheOpenSSL : public SSLClientSessionCacheOpenSSL { |
| + public: |
| + explicit TestSSLClientSessionCacheOpenSSL(const Config& config) |
| + : SSLClientSessionCacheOpenSSL(config) {} |
| + |
| + void AdvanceClock(base::TimeDelta delta) { now_ += delta; } |
| + |
| + protected: |
| + base::Time Now() override { return now_; } |
| + |
| + private: |
| + base::Time now_; |
| +}; |
| + |
| +} // namespace |
| + |
| +// Test basic insertion and lookup operations. |
| +TEST(SSLClientSessionCacheOpenSSLTest, Basic) { |
| + SSLClientSessionCacheOpenSSL::Config config; |
| + TestSSLClientSessionCacheOpenSSL cache(config); |
| + |
| + ScopedSSL_SESSION session1(SSL_SESSION_new()); |
| + ScopedSSL_SESSION session2(SSL_SESSION_new()); |
| + ScopedSSL_SESSION session3(SSL_SESSION_new()); |
| + EXPECT_EQ(1, session1->references); |
| + EXPECT_EQ(1, session2->references); |
| + EXPECT_EQ(1, session3->references); |
| + |
| + EXPECT_EQ(nullptr, cache.Lookup("key1")); |
| + EXPECT_EQ(nullptr, cache.Lookup("key2")); |
| + EXPECT_EQ(0u, cache.size()); |
| + |
| + cache.Insert("key1", session1.get()); |
| + EXPECT_EQ(session1.get(), cache.Lookup("key1")); |
| + EXPECT_EQ(nullptr, cache.Lookup("key2")); |
| + EXPECT_EQ(1u, cache.size()); |
| + |
| + cache.Insert("key2", session2.get()); |
| + EXPECT_EQ(session1.get(), cache.Lookup("key1")); |
| + EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
| + EXPECT_EQ(2u, cache.size()); |
| + |
| + EXPECT_EQ(2, session1->references); |
| + EXPECT_EQ(2, session2->references); |
| + |
| + cache.Insert("key1", session3.get()); |
| + EXPECT_EQ(session3.get(), cache.Lookup("key1")); |
| + EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
| + EXPECT_EQ(2u, cache.size()); |
| + |
| + EXPECT_EQ(1, session1->references); |
| + EXPECT_EQ(2, session2->references); |
| + EXPECT_EQ(2, session3->references); |
| + |
| + cache.Flush(); |
| + EXPECT_EQ(nullptr, cache.Lookup("key1")); |
| + EXPECT_EQ(nullptr, cache.Lookup("key2")); |
| + EXPECT_EQ(nullptr, cache.Lookup("key3")); |
| + EXPECT_EQ(0u, cache.size()); |
| + |
| + EXPECT_EQ(1, session1->references); |
| + EXPECT_EQ(1, session2->references); |
| + EXPECT_EQ(1, session3->references); |
| +} |
| + |
| +// Test that a session may be inserted at two different keys. This should never |
| +// be necessary, but the API doesn't prohibit it. |
| +TEST(SSLClientSessionCacheOpenSSLTest, DoubleInsert) { |
| + SSLClientSessionCacheOpenSSL::Config config; |
| + TestSSLClientSessionCacheOpenSSL cache(config); |
| + |
| + ScopedSSL_SESSION session(SSL_SESSION_new()); |
| + EXPECT_EQ(1, session->references); |
| + |
| + EXPECT_EQ(nullptr, cache.Lookup("key1")); |
| + EXPECT_EQ(nullptr, cache.Lookup("key2")); |
| + EXPECT_EQ(0u, cache.size()); |
| + |
| + cache.Insert("key1", session.get()); |
| + EXPECT_EQ(session.get(), cache.Lookup("key1")); |
| + EXPECT_EQ(nullptr, cache.Lookup("key2")); |
| + EXPECT_EQ(1u, cache.size()); |
| + |
| + EXPECT_EQ(2, session->references); |
| + |
| + cache.Insert("key2", session.get()); |
| + EXPECT_EQ(session.get(), cache.Lookup("key1")); |
| + EXPECT_EQ(session.get(), cache.Lookup("key2")); |
| + EXPECT_EQ(2u, cache.size()); |
| + |
| + EXPECT_EQ(3, session->references); |
| + |
| + cache.Flush(); |
| + EXPECT_EQ(nullptr, cache.Lookup("key1")); |
| + EXPECT_EQ(nullptr, cache.Lookup("key2")); |
| + EXPECT_EQ(0u, cache.size()); |
| + |
| + EXPECT_EQ(1, session->references); |
| +} |
| + |
| +// Tests that the session cache's size is correctly bounded. |
| +TEST(SSLClientSessionCacheOpenSSLTest, MaxEntries) { |
| + SSLClientSessionCacheOpenSSL::Config config; |
| + config.max_entries = 3; |
| + TestSSLClientSessionCacheOpenSSL cache(config); |
| + |
| + ScopedSSL_SESSION session1(SSL_SESSION_new()); |
| + ScopedSSL_SESSION session2(SSL_SESSION_new()); |
| + ScopedSSL_SESSION session3(SSL_SESSION_new()); |
| + ScopedSSL_SESSION session4(SSL_SESSION_new()); |
| + |
| + // Insert three entries. |
| + cache.Insert("key1", session1.get()); |
| + cache.Insert("key2", session2.get()); |
| + cache.Insert("key3", session3.get()); |
| + EXPECT_EQ(session1.get(), cache.Lookup("key1")); |
| + EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
| + EXPECT_EQ(session3.get(), cache.Lookup("key3")); |
| + EXPECT_EQ(3u, cache.size()); |
| + |
| + // On insertion of a fourth, the first is removed. |
| + cache.Insert("key4", session4.get()); |
| + EXPECT_EQ(nullptr, cache.Lookup("key1")); |
| + EXPECT_EQ(session4.get(), cache.Lookup("key4")); |
| + EXPECT_EQ(session3.get(), cache.Lookup("key3")); |
| + EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
| + EXPECT_EQ(3u, cache.size()); |
| + |
| + // Despite being newest, the next to be removed is session4 as it was accessed |
| + // least. recently. |
| + cache.Insert("key1", session1.get()); |
| + EXPECT_EQ(session1.get(), cache.Lookup("key1")); |
| + EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
| + EXPECT_EQ(session3.get(), cache.Lookup("key3")); |
| + EXPECT_EQ(nullptr, cache.Lookup("key4")); |
| + EXPECT_EQ(3u, cache.size()); |
| +} |
| + |
| +// Tests that session expiration works properly. |
| +TEST(SSLClientSessionCacheOpenSSLTest, Expiration) { |
| + const size_t kNumEntries = 20; |
| + |
| + SSLClientSessionCacheOpenSSL::Config config; |
| + config.expiration_check_count = 10; |
| + config.timeout = base::TimeDelta::FromSeconds(1000); |
| + TestSSLClientSessionCacheOpenSSL cache(config); |
| + |
| + // Add |kNumEntries - 1| entries. |
| + for (size_t i = 0; i < kNumEntries - 1; i++) { |
| + ScopedSSL_SESSION session(SSL_SESSION_new()); |
| + cache.Insert(base::SizeTToString(i), session.get()); |
| + cache.AdvanceClock(base::TimeDelta::FromSeconds(1)); |
| + } |
| + EXPECT_EQ(kNumEntries - 1, cache.size()); |
| + |
| + // Expire all the previous entries and insert one more entry. |
| + cache.AdvanceClock(base::TimeDelta::FromSeconds(2000)); |
| + ScopedSSL_SESSION session(SSL_SESSION_new()); |
| + cache.Insert("key", session.get()); |
| + |
| + // All entries are still in the cache. |
| + EXPECT_EQ(kNumEntries, cache.size()); |
| + |
| + // Perform |config.expiration_check_count - 1| lookups. This shall not expire |
| + // any session. |
| + for (size_t i = 0; i < config.expiration_check_count - 1; i++) { |
|
Ryan Sleevi
2015/03/17 00:50:34
superflous braces
davidben
2015/03/20 22:41:27
Even on a for loop? Eugh, okay...
|
| + cache.Lookup("key"); |
| + } |
| + |
| + // All entries are still in the cache. |
| + EXPECT_EQ(kNumEntries, cache.size()); |
| + |
| + // Perform one more lookup. This will expire all sessions but the last one. |
| + cache.Lookup("key"); |
| + EXPECT_EQ(1u, cache.size()); |
| + EXPECT_EQ(session.get(), cache.Lookup("key")); |
| + for (size_t i = 0; i < kNumEntries - 1; i++) { |
| + SCOPED_TRACE(i); |
| + EXPECT_EQ(nullptr, cache.Lookup(base::SizeTToString(i))); |
| + } |
| +} |
| + |
| +} // namespace net |