Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(382)

Unified Diff: net/ssl/ssl_client_session_cache_openssl_unittest.cc

Issue 994263002: Rewrite session cache in OpenSSL ports. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: use base::MRUCache (hah, that would have saved me some time...) Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/ssl/ssl_client_session_cache_openssl_unittest.cc
diff --git a/net/ssl/ssl_client_session_cache_openssl_unittest.cc b/net/ssl/ssl_client_session_cache_openssl_unittest.cc
new file mode 100644
index 0000000000000000000000000000000000000000..7c25de327855473895db229395a07b3690b906eb
--- /dev/null
+++ b/net/ssl/ssl_client_session_cache_openssl_unittest.cc
@@ -0,0 +1,199 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/ssl/ssl_client_session_cache_openssl.h"
+
+#include <openssl/ssl.h>
+
+#include "base/strings/string_number_conversions.h"
+#include "net/ssl/scoped_openssl_types.h"
+#include "testing/gtest/include/gtest/gtest.h"
+
+namespace net {
+
+namespace {
+
+class TestSSLClientSessionCacheOpenSSL : public SSLClientSessionCacheOpenSSL {
+ public:
+ explicit TestSSLClientSessionCacheOpenSSL(const Config& config)
+ : SSLClientSessionCacheOpenSSL(config) {}
+
+ void AdvanceClock(base::TimeDelta delta) { now_ += delta; }
+
+ protected:
+ base::Time Now() override { return now_; }
+
+ private:
+ base::Time now_;
+};
+
+} // namespace
+
+// Test basic insertion and lookup operations.
+TEST(SSLClientSessionCacheOpenSSLTest, Basic) {
+ SSLClientSessionCacheOpenSSL::Config config;
+ TestSSLClientSessionCacheOpenSSL cache(config);
+
+ ScopedSSL_SESSION session1(SSL_SESSION_new());
+ ScopedSSL_SESSION session2(SSL_SESSION_new());
+ ScopedSSL_SESSION session3(SSL_SESSION_new());
+ EXPECT_EQ(1, session1->references);
+ EXPECT_EQ(1, session2->references);
+ EXPECT_EQ(1, session3->references);
+
+ EXPECT_EQ(nullptr, cache.Lookup("key1"));
+ EXPECT_EQ(nullptr, cache.Lookup("key2"));
+ EXPECT_EQ(0u, cache.size());
+
+ cache.Insert("key1", session1.get());
+ EXPECT_EQ(session1.get(), cache.Lookup("key1"));
+ EXPECT_EQ(nullptr, cache.Lookup("key2"));
+ EXPECT_EQ(1u, cache.size());
+
+ cache.Insert("key2", session2.get());
+ EXPECT_EQ(session1.get(), cache.Lookup("key1"));
+ EXPECT_EQ(session2.get(), cache.Lookup("key2"));
+ EXPECT_EQ(2u, cache.size());
+
+ EXPECT_EQ(2, session1->references);
+ EXPECT_EQ(2, session2->references);
+
+ cache.Insert("key1", session3.get());
+ EXPECT_EQ(session3.get(), cache.Lookup("key1"));
+ EXPECT_EQ(session2.get(), cache.Lookup("key2"));
+ EXPECT_EQ(2u, cache.size());
+
+ EXPECT_EQ(1, session1->references);
+ EXPECT_EQ(2, session2->references);
+ EXPECT_EQ(2, session3->references);
+
+ cache.Flush();
+ EXPECT_EQ(nullptr, cache.Lookup("key1"));
+ EXPECT_EQ(nullptr, cache.Lookup("key2"));
+ EXPECT_EQ(nullptr, cache.Lookup("key3"));
+ EXPECT_EQ(0u, cache.size());
+
+ EXPECT_EQ(1, session1->references);
+ EXPECT_EQ(1, session2->references);
+ EXPECT_EQ(1, session3->references);
+}
+
+// Test that a session may be inserted at two different keys. This should never
+// be necessary, but the API doesn't prohibit it.
+TEST(SSLClientSessionCacheOpenSSLTest, DoubleInsert) {
+ SSLClientSessionCacheOpenSSL::Config config;
+ TestSSLClientSessionCacheOpenSSL cache(config);
+
+ ScopedSSL_SESSION session(SSL_SESSION_new());
+ EXPECT_EQ(1, session->references);
+
+ EXPECT_EQ(nullptr, cache.Lookup("key1"));
+ EXPECT_EQ(nullptr, cache.Lookup("key2"));
+ EXPECT_EQ(0u, cache.size());
+
+ cache.Insert("key1", session.get());
+ EXPECT_EQ(session.get(), cache.Lookup("key1"));
+ EXPECT_EQ(nullptr, cache.Lookup("key2"));
+ EXPECT_EQ(1u, cache.size());
+
+ EXPECT_EQ(2, session->references);
+
+ cache.Insert("key2", session.get());
+ EXPECT_EQ(session.get(), cache.Lookup("key1"));
+ EXPECT_EQ(session.get(), cache.Lookup("key2"));
+ EXPECT_EQ(2u, cache.size());
+
+ EXPECT_EQ(3, session->references);
+
+ cache.Flush();
+ EXPECT_EQ(nullptr, cache.Lookup("key1"));
+ EXPECT_EQ(nullptr, cache.Lookup("key2"));
+ EXPECT_EQ(0u, cache.size());
+
+ EXPECT_EQ(1, session->references);
+}
+
+// Tests that the session cache's size is correctly bounded.
+TEST(SSLClientSessionCacheOpenSSLTest, MaxEntries) {
+ SSLClientSessionCacheOpenSSL::Config config;
+ config.max_entries = 3;
+ TestSSLClientSessionCacheOpenSSL cache(config);
+
+ ScopedSSL_SESSION session1(SSL_SESSION_new());
+ ScopedSSL_SESSION session2(SSL_SESSION_new());
+ ScopedSSL_SESSION session3(SSL_SESSION_new());
+ ScopedSSL_SESSION session4(SSL_SESSION_new());
+
+ // Insert three entries.
+ cache.Insert("key1", session1.get());
+ cache.Insert("key2", session2.get());
+ cache.Insert("key3", session3.get());
+ EXPECT_EQ(session1.get(), cache.Lookup("key1"));
+ EXPECT_EQ(session2.get(), cache.Lookup("key2"));
+ EXPECT_EQ(session3.get(), cache.Lookup("key3"));
+ EXPECT_EQ(3u, cache.size());
+
+ // On insertion of a fourth, the first is removed.
+ cache.Insert("key4", session4.get());
+ EXPECT_EQ(nullptr, cache.Lookup("key1"));
+ EXPECT_EQ(session4.get(), cache.Lookup("key4"));
+ EXPECT_EQ(session3.get(), cache.Lookup("key3"));
+ EXPECT_EQ(session2.get(), cache.Lookup("key2"));
+ EXPECT_EQ(3u, cache.size());
+
+ // Despite being newest, the next to be removed is session4 as it was accessed
+ // least. recently.
+ cache.Insert("key1", session1.get());
+ EXPECT_EQ(session1.get(), cache.Lookup("key1"));
+ EXPECT_EQ(session2.get(), cache.Lookup("key2"));
+ EXPECT_EQ(session3.get(), cache.Lookup("key3"));
+ EXPECT_EQ(nullptr, cache.Lookup("key4"));
+ EXPECT_EQ(3u, cache.size());
+}
+
+// Tests that session expiration works properly.
+TEST(SSLClientSessionCacheOpenSSLTest, Expiration) {
+ const size_t kNumEntries = 20;
+
+ SSLClientSessionCacheOpenSSL::Config config;
+ config.expiration_check_count = 10;
+ config.timeout = base::TimeDelta::FromSeconds(1000);
+ TestSSLClientSessionCacheOpenSSL cache(config);
+
+ // Add |kNumEntries - 1| entries.
+ for (size_t i = 0; i < kNumEntries - 1; i++) {
+ ScopedSSL_SESSION session(SSL_SESSION_new());
+ cache.Insert(base::SizeTToString(i), session.get());
+ cache.AdvanceClock(base::TimeDelta::FromSeconds(1));
+ }
+ EXPECT_EQ(kNumEntries - 1, cache.size());
+
+ // Expire all the previous entries and insert one more entry.
+ cache.AdvanceClock(base::TimeDelta::FromSeconds(2000));
+ ScopedSSL_SESSION session(SSL_SESSION_new());
+ cache.Insert("key", session.get());
+
+ // All entries are still in the cache.
+ EXPECT_EQ(kNumEntries, cache.size());
+
+ // Perform |config.expiration_check_count - 1| lookups. This shall not expire
+ // any session.
+ for (size_t i = 0; i < config.expiration_check_count - 1; i++) {
Ryan Sleevi 2015/03/17 00:50:34 superflous braces
davidben 2015/03/20 22:41:27 Even on a for loop? Eugh, okay...
+ cache.Lookup("key");
+ }
+
+ // All entries are still in the cache.
+ EXPECT_EQ(kNumEntries, cache.size());
+
+ // Perform one more lookup. This will expire all sessions but the last one.
+ cache.Lookup("key");
+ EXPECT_EQ(1u, cache.size());
+ EXPECT_EQ(session.get(), cache.Lookup("key"));
+ for (size_t i = 0; i < kNumEntries - 1; i++) {
+ SCOPED_TRACE(i);
+ EXPECT_EQ(nullptr, cache.Lookup(base::SizeTToString(i)));
+ }
+}
+
+} // namespace net
« net/ssl/ssl_client_session_cache_openssl.cc ('K') | « net/ssl/ssl_client_session_cache_openssl.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698