Index: net/ssl/ssl_client_session_cache_openssl_unittest.cc |
diff --git a/net/ssl/ssl_client_session_cache_openssl_unittest.cc b/net/ssl/ssl_client_session_cache_openssl_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..7c25de327855473895db229395a07b3690b906eb |
--- /dev/null |
+++ b/net/ssl/ssl_client_session_cache_openssl_unittest.cc |
@@ -0,0 +1,199 @@ |
+// Copyright 2015 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "net/ssl/ssl_client_session_cache_openssl.h" |
+ |
+#include <openssl/ssl.h> |
+ |
+#include "base/strings/string_number_conversions.h" |
+#include "net/ssl/scoped_openssl_types.h" |
+#include "testing/gtest/include/gtest/gtest.h" |
+ |
+namespace net { |
+ |
+namespace { |
+ |
+class TestSSLClientSessionCacheOpenSSL : public SSLClientSessionCacheOpenSSL { |
+ public: |
+ explicit TestSSLClientSessionCacheOpenSSL(const Config& config) |
+ : SSLClientSessionCacheOpenSSL(config) {} |
+ |
+ void AdvanceClock(base::TimeDelta delta) { now_ += delta; } |
+ |
+ protected: |
+ base::Time Now() override { return now_; } |
+ |
+ private: |
+ base::Time now_; |
+}; |
+ |
+} // namespace |
+ |
+// Test basic insertion and lookup operations. |
+TEST(SSLClientSessionCacheOpenSSLTest, Basic) { |
+ SSLClientSessionCacheOpenSSL::Config config; |
+ TestSSLClientSessionCacheOpenSSL cache(config); |
+ |
+ ScopedSSL_SESSION session1(SSL_SESSION_new()); |
+ ScopedSSL_SESSION session2(SSL_SESSION_new()); |
+ ScopedSSL_SESSION session3(SSL_SESSION_new()); |
+ EXPECT_EQ(1, session1->references); |
+ EXPECT_EQ(1, session2->references); |
+ EXPECT_EQ(1, session3->references); |
+ |
+ EXPECT_EQ(nullptr, cache.Lookup("key1")); |
+ EXPECT_EQ(nullptr, cache.Lookup("key2")); |
+ EXPECT_EQ(0u, cache.size()); |
+ |
+ cache.Insert("key1", session1.get()); |
+ EXPECT_EQ(session1.get(), cache.Lookup("key1")); |
+ EXPECT_EQ(nullptr, cache.Lookup("key2")); |
+ EXPECT_EQ(1u, cache.size()); |
+ |
+ cache.Insert("key2", session2.get()); |
+ EXPECT_EQ(session1.get(), cache.Lookup("key1")); |
+ EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
+ EXPECT_EQ(2u, cache.size()); |
+ |
+ EXPECT_EQ(2, session1->references); |
+ EXPECT_EQ(2, session2->references); |
+ |
+ cache.Insert("key1", session3.get()); |
+ EXPECT_EQ(session3.get(), cache.Lookup("key1")); |
+ EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
+ EXPECT_EQ(2u, cache.size()); |
+ |
+ EXPECT_EQ(1, session1->references); |
+ EXPECT_EQ(2, session2->references); |
+ EXPECT_EQ(2, session3->references); |
+ |
+ cache.Flush(); |
+ EXPECT_EQ(nullptr, cache.Lookup("key1")); |
+ EXPECT_EQ(nullptr, cache.Lookup("key2")); |
+ EXPECT_EQ(nullptr, cache.Lookup("key3")); |
+ EXPECT_EQ(0u, cache.size()); |
+ |
+ EXPECT_EQ(1, session1->references); |
+ EXPECT_EQ(1, session2->references); |
+ EXPECT_EQ(1, session3->references); |
+} |
+ |
+// Test that a session may be inserted at two different keys. This should never |
+// be necessary, but the API doesn't prohibit it. |
+TEST(SSLClientSessionCacheOpenSSLTest, DoubleInsert) { |
+ SSLClientSessionCacheOpenSSL::Config config; |
+ TestSSLClientSessionCacheOpenSSL cache(config); |
+ |
+ ScopedSSL_SESSION session(SSL_SESSION_new()); |
+ EXPECT_EQ(1, session->references); |
+ |
+ EXPECT_EQ(nullptr, cache.Lookup("key1")); |
+ EXPECT_EQ(nullptr, cache.Lookup("key2")); |
+ EXPECT_EQ(0u, cache.size()); |
+ |
+ cache.Insert("key1", session.get()); |
+ EXPECT_EQ(session.get(), cache.Lookup("key1")); |
+ EXPECT_EQ(nullptr, cache.Lookup("key2")); |
+ EXPECT_EQ(1u, cache.size()); |
+ |
+ EXPECT_EQ(2, session->references); |
+ |
+ cache.Insert("key2", session.get()); |
+ EXPECT_EQ(session.get(), cache.Lookup("key1")); |
+ EXPECT_EQ(session.get(), cache.Lookup("key2")); |
+ EXPECT_EQ(2u, cache.size()); |
+ |
+ EXPECT_EQ(3, session->references); |
+ |
+ cache.Flush(); |
+ EXPECT_EQ(nullptr, cache.Lookup("key1")); |
+ EXPECT_EQ(nullptr, cache.Lookup("key2")); |
+ EXPECT_EQ(0u, cache.size()); |
+ |
+ EXPECT_EQ(1, session->references); |
+} |
+ |
+// Tests that the session cache's size is correctly bounded. |
+TEST(SSLClientSessionCacheOpenSSLTest, MaxEntries) { |
+ SSLClientSessionCacheOpenSSL::Config config; |
+ config.max_entries = 3; |
+ TestSSLClientSessionCacheOpenSSL cache(config); |
+ |
+ ScopedSSL_SESSION session1(SSL_SESSION_new()); |
+ ScopedSSL_SESSION session2(SSL_SESSION_new()); |
+ ScopedSSL_SESSION session3(SSL_SESSION_new()); |
+ ScopedSSL_SESSION session4(SSL_SESSION_new()); |
+ |
+ // Insert three entries. |
+ cache.Insert("key1", session1.get()); |
+ cache.Insert("key2", session2.get()); |
+ cache.Insert("key3", session3.get()); |
+ EXPECT_EQ(session1.get(), cache.Lookup("key1")); |
+ EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
+ EXPECT_EQ(session3.get(), cache.Lookup("key3")); |
+ EXPECT_EQ(3u, cache.size()); |
+ |
+ // On insertion of a fourth, the first is removed. |
+ cache.Insert("key4", session4.get()); |
+ EXPECT_EQ(nullptr, cache.Lookup("key1")); |
+ EXPECT_EQ(session4.get(), cache.Lookup("key4")); |
+ EXPECT_EQ(session3.get(), cache.Lookup("key3")); |
+ EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
+ EXPECT_EQ(3u, cache.size()); |
+ |
+ // Despite being newest, the next to be removed is session4 as it was accessed |
+ // least. recently. |
+ cache.Insert("key1", session1.get()); |
+ EXPECT_EQ(session1.get(), cache.Lookup("key1")); |
+ EXPECT_EQ(session2.get(), cache.Lookup("key2")); |
+ EXPECT_EQ(session3.get(), cache.Lookup("key3")); |
+ EXPECT_EQ(nullptr, cache.Lookup("key4")); |
+ EXPECT_EQ(3u, cache.size()); |
+} |
+ |
+// Tests that session expiration works properly. |
+TEST(SSLClientSessionCacheOpenSSLTest, Expiration) { |
+ const size_t kNumEntries = 20; |
+ |
+ SSLClientSessionCacheOpenSSL::Config config; |
+ config.expiration_check_count = 10; |
+ config.timeout = base::TimeDelta::FromSeconds(1000); |
+ TestSSLClientSessionCacheOpenSSL cache(config); |
+ |
+ // Add |kNumEntries - 1| entries. |
+ for (size_t i = 0; i < kNumEntries - 1; i++) { |
+ ScopedSSL_SESSION session(SSL_SESSION_new()); |
+ cache.Insert(base::SizeTToString(i), session.get()); |
+ cache.AdvanceClock(base::TimeDelta::FromSeconds(1)); |
+ } |
+ EXPECT_EQ(kNumEntries - 1, cache.size()); |
+ |
+ // Expire all the previous entries and insert one more entry. |
+ cache.AdvanceClock(base::TimeDelta::FromSeconds(2000)); |
+ ScopedSSL_SESSION session(SSL_SESSION_new()); |
+ cache.Insert("key", session.get()); |
+ |
+ // All entries are still in the cache. |
+ EXPECT_EQ(kNumEntries, cache.size()); |
+ |
+ // Perform |config.expiration_check_count - 1| lookups. This shall not expire |
+ // any session. |
+ for (size_t i = 0; i < config.expiration_check_count - 1; i++) { |
Ryan Sleevi
2015/03/17 00:50:34
superflous braces
davidben
2015/03/20 22:41:27
Even on a for loop? Eugh, okay...
|
+ cache.Lookup("key"); |
+ } |
+ |
+ // All entries are still in the cache. |
+ EXPECT_EQ(kNumEntries, cache.size()); |
+ |
+ // Perform one more lookup. This will expire all sessions but the last one. |
+ cache.Lookup("key"); |
+ EXPECT_EQ(1u, cache.size()); |
+ EXPECT_EQ(session.get(), cache.Lookup("key")); |
+ for (size_t i = 0; i < kNumEntries - 1; i++) { |
+ SCOPED_TRACE(i); |
+ EXPECT_EQ(nullptr, cache.Lookup(base::SizeTToString(i))); |
+ } |
+} |
+ |
+} // namespace net |