blob: bc9fbc460422c7373e6e4ce20ad50d2da5b7c8d4 [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
[email protected]a5b98172014-06-18 07:01:597#include "base/sha1.h"
[email protected]701bc892013-01-17 04:51:548#include "base/stl_util.h"
[email protected]b12764d2013-12-02 22:28:309#include "base/strings/string_number_conversions.h"
[email protected]8b37a092012-10-18 21:53:4910#include "net/quic/crypto/crypto_framer.h"
[email protected]6f54ab32013-03-02 17:43:3511#include "net/quic/crypto/crypto_handshake.h"
[email protected]872edd9e2013-01-16 08:51:1512#include "net/quic/crypto/crypto_utils.h"
[email protected]5351cc4b2013-03-03 07:22:4113#include "net/quic/crypto/null_encrypter.h"
[email protected]4df69842013-02-27 06:32:1614#include "net/quic/crypto/quic_decrypter.h"
15#include "net/quic/crypto/quic_encrypter.h"
rtenneti16a20772015-02-17 18:58:4816#include "net/quic/quic_data_writer.h"
[email protected]a57e0272013-04-26 07:31:4717#include "net/quic/quic_framer.h"
[email protected]5351cc4b2013-03-03 07:22:4118#include "net/quic/quic_packet_creator.h"
[email protected]79d13dcb2014-02-05 07:23:1319#include "net/quic/quic_utils.h"
rtennetid39bd762015-06-12 01:05:5220#include "net/quic/test_tools/crypto_test_utils.h"
[email protected]cbd731e2013-10-24 00:20:3921#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0422#include "net/spdy/spdy_frame_builder.h"
rchc99f380c2015-03-26 19:50:5623#include "net/tools/quic/quic_per_connection_packet_writer.h"
[email protected]8b37a092012-10-18 21:53:4924
[email protected]c244c5a12013-05-07 20:55:0425using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4926using std::max;
27using std::min;
28using std::string;
rchc0815442015-04-18 13:29:4629using testing::Invoke;
[email protected]bc356fe2014-06-19 11:14:1430using testing::_;
[email protected]8b37a092012-10-18 21:53:4931
32namespace net {
martijncc5402d2016-02-16 19:08:5833
[email protected]8b37a092012-10-18 21:53:4934namespace test {
[email protected]8b37a092012-10-18 21:53:4935
rtennetia004d332015-08-28 06:44:5736QuicAckFrame MakeAckFrame(QuicPacketNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4937 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3738 ack.largest_observed = largest_observed;
39 ack.entropy_hash = 0;
[email protected]fb35b0a2014-04-15 21:06:4940 return ack;
41}
42
rtennetia004d332015-08-28 06:44:5743QuicAckFrame MakeAckFrameWithNackRanges(size_t num_nack_ranges,
44 QuicPacketNumber least_unacked) {
[email protected]310d37b2014-08-02 06:15:3745 QuicAckFrame ack = MakeAckFrame(2 * num_nack_ranges + least_unacked);
[email protected]aa7e4ef2014-05-28 03:53:1546 // Add enough missing packets to get num_nack_ranges nack ranges.
rtennetia004d332015-08-28 06:44:5747 for (QuicPacketNumber i = 1; i < 2 * num_nack_ranges; i += 2) {
rtenneti493d90ef2015-09-14 04:43:1148 ack.missing_packets.Add(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1549 }
50 return ack;
51}
52
rtennetib6ac61a52015-02-11 20:20:5253QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
54 const QuicPacketHeader& header,
55 const QuicFrames& frames) {
[email protected]9cda5fd2014-06-03 10:20:2856 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
57 size_t packet_size = GetPacketHeaderSize(header);
58 for (size_t i = 0; i < frames.size(); ++i) {
59 DCHECK_LE(packet_size, max_plaintext_size);
60 bool first_frame = i == 0;
61 bool last_frame = i == frames.size() - 1;
62 const size_t frame_size = framer->GetSerializedFrameLength(
63 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
rjshaded069aaee2016-03-11 20:42:1764 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2865 DCHECK(frame_size);
66 packet_size += frame_size;
67 }
rtenneti16a20772015-02-17 18:58:4868 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
69}
70
71QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
72 const QuicPacketHeader& header,
73 const QuicFrames& frames,
74 size_t packet_size) {
75 char* buffer = new char[packet_size];
alyssarc39b80f2015-10-22 17:13:5876 size_t length = framer->BuildDataPacket(header, frames, buffer, packet_size);
77 DCHECK_NE(0u, length);
78 // Re-construct the data packet with data ownership.
79 return new QuicPacket(buffer, length, /* owns_buffer */ true,
rtenneti16a20772015-02-17 18:58:4880 header.public_header.connection_id_length,
81 header.public_header.version_flag,
rchcaec4242016-01-22 20:49:5282 header.public_header.multipath_flag,
rtennetia004d332015-08-28 06:44:5783 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2884}
85
Avi Drissman13fc8932015-12-20 04:40:4686uint64_t SimpleRandom::RandUint64() {
[email protected]a5b98172014-06-18 07:01:5987 unsigned char hash[base::kSHA1Length];
88 base::SHA1HashBytes(reinterpret_cast<unsigned char*>(&seed_), sizeof(seed_),
89 hash);
90 memcpy(&seed_, hash, sizeof(seed_));
91 return seed_;
92}
93
[email protected]8b37a092012-10-18 21:53:4994MockFramerVisitor::MockFramerVisitor() {
95 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:3396 ON_CALL(*this, OnProtocolVersionMismatch(_))
97 .WillByDefault(testing::Return(false));
98
99 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:49100 ON_CALL(*this, OnUnauthenticatedHeader(_))
101 .WillByDefault(testing::Return(true));
102
[email protected]066d8182014-01-04 02:02:45103 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
104 .WillByDefault(testing::Return(true));
105
rjshaded5ced072015-12-18 19:26:02106 ON_CALL(*this, OnPacketHeader(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47107
rjshaded5ced072015-12-18 19:26:02108 ON_CALL(*this, OnStreamFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47109
rjshaded5ced072015-12-18 19:26:02110 ON_CALL(*this, OnAckFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47111
rjshaded5ced072015-12-18 19:26:02112 ON_CALL(*this, OnStopWaitingFrame(_)).WillByDefault(testing::Return(true));
[email protected]93dd91f2014-02-27 00:09:03113
rjshaded5ced072015-12-18 19:26:02114 ON_CALL(*this, OnPingFrame(_)).WillByDefault(testing::Return(true));
[email protected]d8c522112014-04-23 09:23:25115
rjshaded5ced072015-12-18 19:26:02116 ON_CALL(*this, OnRstStreamFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47117
118 ON_CALL(*this, OnConnectionCloseFrame(_))
119 .WillByDefault(testing::Return(true));
120
rjshaded5ced072015-12-18 19:26:02121 ON_CALL(*this, OnGoAwayFrame(_)).WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49122}
123
rtenneti021e8822015-10-18 23:59:57124MockFramerVisitor::~MockFramerVisitor() {}
[email protected]8b37a092012-10-18 21:53:49125
[email protected]48878092013-07-26 14:51:56126bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33127 return false;
128}
129
[email protected]066d8182014-01-04 02:02:45130bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
131 const QuicPacketPublicHeader& header) {
132 return true;
133}
134
[email protected]ec86d5462013-11-17 16:04:49135bool NoOpFramerVisitor::OnUnauthenticatedHeader(
136 const QuicPacketHeader& header) {
137 return true;
138}
139
[email protected]8b37a092012-10-18 21:53:49140bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
141 return true;
142}
143
[email protected]a57e0272013-04-26 07:31:47144bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
145 return true;
146}
147
148bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
149 return true;
150}
151
rjshaded5ced072015-12-18 19:26:02152bool NoOpFramerVisitor::OnStopWaitingFrame(const QuicStopWaitingFrame& frame) {
[email protected]93dd91f2014-02-27 00:09:03153 return true;
154}
155
[email protected]d8c522112014-04-23 09:23:25156bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
157 return true;
158}
159
rjshaded5ced072015-12-18 19:26:02160bool NoOpFramerVisitor::OnRstStreamFrame(const QuicRstStreamFrame& frame) {
[email protected]a57e0272013-04-26 07:31:47161 return true;
162}
163
164bool NoOpFramerVisitor::OnConnectionCloseFrame(
165 const QuicConnectionCloseFrame& frame) {
166 return true;
167}
168
169bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
170 return true;
171}
172
[email protected]cb23a922014-02-20 17:42:38173bool NoOpFramerVisitor::OnWindowUpdateFrame(
174 const QuicWindowUpdateFrame& frame) {
175 return true;
176}
177
178bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
179 return true;
180}
181
rchcaec4242016-01-22 20:49:52182bool NoOpFramerVisitor::OnPathCloseFrame(const QuicPathCloseFrame& frame) {
183 return true;
184}
185
rtenneti021e8822015-10-18 23:59:57186MockConnectionVisitor::MockConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10187
rtenneti021e8822015-10-18 23:59:57188MockConnectionVisitor::~MockConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10189
rch99b644c2015-11-04 05:25:28190MockConnectionHelper::MockConnectionHelper() {}
[email protected]9c0b1352012-11-04 00:03:27191
rch99b644c2015-11-04 05:25:28192MockConnectionHelper::~MockConnectionHelper() {}
[email protected]9c0b1352012-11-04 00:03:27193
rch99b644c2015-11-04 05:25:28194const QuicClock* MockConnectionHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27195 return &clock_;
196}
197
rch99b644c2015-11-04 05:25:28198QuicRandom* MockConnectionHelper::GetRandomGenerator() {
[email protected]9558c5d32012-12-22 00:08:14199 return &random_generator_;
200}
201
rch99b644c2015-11-04 05:25:28202QuicAlarm* MockConnectionHelper::CreateAlarm(QuicAlarm::Delegate* delegate) {
jdorfman4ea54a22016-01-21 22:12:50203 return new MockConnectionHelper::TestAlarm(
204 QuicArenaScopedPtr<QuicAlarm::Delegate>(delegate));
205}
206
207QuicArenaScopedPtr<QuicAlarm> MockConnectionHelper::CreateAlarm(
208 QuicArenaScopedPtr<QuicAlarm::Delegate> delegate,
209 QuicConnectionArena* arena) {
210 if (arena != nullptr) {
211 return arena->New<MockConnectionHelper::TestAlarm>(std::move(delegate));
212 } else {
213 return QuicArenaScopedPtr<MockConnectionHelper::TestAlarm>(
214 new TestAlarm(std::move(delegate)));
215 }
[email protected]965dbe62013-08-09 21:34:31216}
217
jdorfman5a606722016-01-04 17:41:29218QuicBufferAllocator* MockConnectionHelper::GetBufferAllocator() {
219 return &buffer_allocator_;
220}
221
rch99b644c2015-11-04 05:25:28222void MockConnectionHelper::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55223 clock_.AdvanceTime(delta);
224}
225
rch99b644c2015-11-04 05:25:28226MockConnection::MockConnection(MockConnectionHelper* helper,
227 Perspective perspective)
rchc0815442015-04-18 13:29:46228 : MockConnection(kTestConnectionId,
rtenneti8696cf92014-11-14 21:12:12229 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51230 helper,
rtenneti6f48aa92015-03-16 02:18:48231 perspective,
rtenneti8a4a0732015-10-18 00:45:51232 QuicSupportedVersions()) {}
[email protected]c05a6d222013-12-16 19:42:03233
rtenneti8a4a0732015-10-18 00:45:51234MockConnection::MockConnection(IPEndPoint address,
rch99b644c2015-11-04 05:25:28235 MockConnectionHelper* helper,
rtenneti8a4a0732015-10-18 00:45:51236 Perspective perspective)
rchc0815442015-04-18 13:29:46237 : MockConnection(kTestConnectionId,
rtenneti6f48aa92015-03-16 02:18:48238 address,
rtenneti8a4a0732015-10-18 00:45:51239 helper,
rtenneti6f48aa92015-03-16 02:18:48240 perspective,
rtenneti8a4a0732015-10-18 00:45:51241 QuicSupportedVersions()) {}
[email protected]044ac2b2012-11-13 21:41:06242
[email protected]3aa9ca72014-02-27 19:39:43243MockConnection::MockConnection(QuicConnectionId connection_id,
rch99b644c2015-11-04 05:25:28244 MockConnectionHelper* helper,
rtenneti6f48aa92015-03-16 02:18:48245 Perspective perspective)
rchc0815442015-04-18 13:29:46246 : MockConnection(connection_id,
rtennetifb3fa6c2015-03-16 23:04:55247 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51248 helper,
rchc0815442015-04-18 13:29:46249 perspective,
rtenneti8a4a0732015-10-18 00:45:51250 QuicSupportedVersions()) {}
rchc0815442015-04-18 13:29:46251
rch99b644c2015-11-04 05:25:28252MockConnection::MockConnection(MockConnectionHelper* helper,
rtenneti8a4a0732015-10-18 00:45:51253 Perspective perspective,
rchc0815442015-04-18 13:29:46254 const QuicVersionVector& supported_versions)
255 : MockConnection(kTestConnectionId,
256 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51257 helper,
rchc0815442015-04-18 13:29:46258 perspective,
rtenneti8a4a0732015-10-18 00:45:51259 supported_versions) {}
rchc0815442015-04-18 13:29:46260
261MockConnection::MockConnection(QuicConnectionId connection_id,
262 IPEndPoint address,
rch99b644c2015-11-04 05:25:28263 MockConnectionHelper* helper,
rchc0815442015-04-18 13:29:46264 Perspective perspective,
rchc0815442015-04-18 13:29:46265 const QuicVersionVector& supported_versions)
266 : QuicConnection(connection_id,
267 address,
rtenneti8a4a0732015-10-18 00:45:51268 helper,
jdorfman90d185f32016-01-15 13:22:47269 new testing::NiceMock<MockPacketWriter>(),
rtennetifb3fa6c2015-03-16 23:04:55270 /* owns_writer= */ true,
271 perspective,
rtenneti8a4a0732015-10-18 00:45:51272 supported_versions) {
rchc0815442015-04-18 13:29:46273 ON_CALL(*this, OnError(_))
274 .WillByDefault(
275 Invoke(this, &PacketSavingConnection::QuicConnection_OnError));
[email protected]4d640792013-12-18 22:21:08276}
277
rtenneti021e8822015-10-18 23:59:57278MockConnection::~MockConnection() {}
[email protected]044ac2b2012-11-13 21:41:06279
[email protected]fe053f92013-04-23 20:18:55280void MockConnection::AdvanceTime(QuicTime::Delta delta) {
rch99b644c2015-11-04 05:25:28281 static_cast<MockConnectionHelper*>(helper())->AdvanceTime(delta);
[email protected]fe053f92013-04-23 20:18:55282}
283
rch99b644c2015-11-04 05:25:28284PacketSavingConnection::PacketSavingConnection(MockConnectionHelper* helper,
rtenneti8a4a0732015-10-18 00:45:51285 Perspective perspective)
286 : MockConnection(helper, perspective) {}
[email protected]044ac2b2012-11-13 21:41:06287
[email protected]4d640792013-12-18 22:21:08288PacketSavingConnection::PacketSavingConnection(
rch99b644c2015-11-04 05:25:28289 MockConnectionHelper* helper,
rtenneti6f48aa92015-03-16 02:18:48290 Perspective perspective,
[email protected]4d640792013-12-18 22:21:08291 const QuicVersionVector& supported_versions)
rtenneti8a4a0732015-10-18 00:45:51292 : MockConnection(helper, perspective, supported_versions) {}
[email protected]4d640792013-12-18 22:21:08293
[email protected]044ac2b2012-11-13 21:41:06294PacketSavingConnection::~PacketSavingConnection() {
[email protected]2532de12013-05-09 12:29:33295 STLDeleteElements(&encrypted_packets_);
[email protected]044ac2b2012-11-13 21:41:06296}
297
zhongyi4a9d27b2016-01-12 20:08:31298void PacketSavingConnection::SendOrQueuePacket(SerializedPacket* packet) {
rtenneti2cae2072016-02-05 02:21:33299 encrypted_packets_.push_back(new QuicEncryptedPacket(
300 QuicUtils::CopyBuffer(*packet), packet->encrypted_length, true));
rtenneti31e9fd62014-09-16 05:22:15301 // Transfer ownership of the packet to the SentPacketManager and the
302 // ack notifier to the AckNotifierManager.
ckrasic062b5522016-02-27 01:14:21303 sent_packet_manager_.OnPacketSent(packet, 0, QuicTime::Zero(),
zhongyi4a9d27b2016-01-12 20:08:31304 NOT_RETRANSMISSION,
rjshaded5ced072015-12-18 19:26:02305 HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06306}
307
rtennetib865eb82015-06-17 20:21:46308MockQuicSpdySession::MockQuicSpdySession(QuicConnection* connection)
309 : QuicSpdySession(connection, DefaultQuicConfig()) {
rtennetid39bd762015-06-12 01:05:52310 crypto_stream_.reset(new QuicCryptoStream(this));
311 Initialize();
rjshaded069aaee2016-03-11 20:42:17312 ON_CALL(*this, WritevData(_, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07313 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06314}
315
rtenneti021e8822015-10-18 23:59:57316MockQuicSpdySession::~MockQuicSpdySession() {}
[email protected]044ac2b2012-11-13 21:41:06317
jokulik2324d282015-12-08 21:42:57318// static
319QuicConsumedData MockQuicSpdySession::ConsumeAllData(
320 QuicStreamId /*id*/,
321 const QuicIOVector& data,
322 QuicStreamOffset /*offset*/,
323 bool fin,
jokulik2324d282015-12-08 21:42:57324 QuicAckListenerInterface* /*ack_notifier_delegate*/) {
325 return QuicConsumedData(data.total_length, fin);
326}
327
rtennetib865eb82015-06-17 20:21:46328TestQuicSpdyServerSession::TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52329 QuicConnection* connection,
330 const QuicConfig& config,
rjshaded069aaee2016-03-11 20:42:17331 const QuicCryptoServerConfig* crypto_config,
332 QuicCompressedCertsCache* compressed_certs_cache)
333 : QuicServerSessionBase(config,
334 connection,
335 &visitor_,
336 crypto_config,
337 compressed_certs_cache) {
rtennetid39bd762015-06-12 01:05:52338 Initialize();
[email protected]ccb34212014-07-18 09:27:50339}
[email protected]2532de12013-05-09 12:29:33340
rtenneti021e8822015-10-18 23:59:57341TestQuicSpdyServerSession::~TestQuicSpdyServerSession() {}
[email protected]2532de12013-05-09 12:29:33342
jokulikc971baf92016-01-06 00:36:39343QuicCryptoServerStreamBase*
344TestQuicSpdyServerSession::CreateQuicCryptoServerStream(
rjshaded069aaee2016-03-11 20:42:17345 const QuicCryptoServerConfig* crypto_config,
346 QuicCompressedCertsCache* compressed_certs_cache) {
347 return new QuicCryptoServerStream(crypto_config, compressed_certs_cache,
348 FLAGS_enable_quic_stateless_reject_support,
349 this);
jokulikc971baf92016-01-06 00:36:39350}
351
rtennetib865eb82015-06-17 20:21:46352QuicCryptoServerStream* TestQuicSpdyServerSession::GetCryptoStream() {
zhongyib8677022015-12-01 05:51:30353 return static_cast<QuicCryptoServerStream*>(
jokulikc971baf92016-01-06 00:36:39354 QuicServerSessionBase::GetCryptoStream());
[email protected]2532de12013-05-09 12:29:33355}
356
rtennetib865eb82015-06-17 20:21:46357TestQuicSpdyClientSession::TestQuicSpdyClientSession(
358 QuicConnection* connection,
359 const QuicConfig& config,
360 const QuicServerId& server_id,
361 QuicCryptoClientConfig* crypto_config)
ckrasic244375a32016-02-04 21:21:22362 : QuicClientSessionBase(connection, &push_promise_index_, config) {
rtennetid39bd762015-06-12 01:05:52363 crypto_stream_.reset(new QuicCryptoClientStream(
364 server_id, this, CryptoTestUtils::ProofVerifyContextForTesting(),
rtenneti2cae2072016-02-05 02:21:33365 crypto_config, this));
rtennetid39bd762015-06-12 01:05:52366 Initialize();
[email protected]90f62f092014-03-24 02:41:23367}
368
rtenneti021e8822015-10-18 23:59:57369TestQuicSpdyClientSession::~TestQuicSpdyClientSession() {}
[email protected]90f62f092014-03-24 02:41:23370
ckrasic244375a32016-02-04 21:21:22371bool TestQuicSpdyClientSession::IsAuthorized(const string& authority) {
372 return true;
373}
374
rtennetib865eb82015-06-17 20:21:46375QuicCryptoClientStream* TestQuicSpdyClientSession::GetCryptoStream() {
rtennetid39bd762015-06-12 01:05:52376 return crypto_stream_.get();
rtennetia2ea9162015-05-15 19:26:44377}
378
[email protected]cbd731e2013-10-24 00:20:39379MockPacketWriter::MockPacketWriter() {
rtenneti493d90ef2015-09-14 04:43:11380 ON_CALL(*this, GetMaxPacketSize(_))
381 .WillByDefault(testing::Return(kMaxPacketSize));
[email protected]cbd731e2013-10-24 00:20:39382}
383
rtenneti021e8822015-10-18 23:59:57384MockPacketWriter::~MockPacketWriter() {}
[email protected]cbd731e2013-10-24 00:20:39385
rtenneti021e8822015-10-18 23:59:57386MockSendAlgorithm::MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10387
rtenneti021e8822015-10-18 23:59:57388MockSendAlgorithm::~MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10389
rtenneti021e8822015-10-18 23:59:57390MockLossAlgorithm::MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43391
rtenneti021e8822015-10-18 23:59:57392MockLossAlgorithm::~MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43393
ckrasicea295fe2015-10-31 05:03:27394MockAckListener::MockAckListener() {}
[email protected]97cf3022013-09-05 14:30:16395
ckrasicea295fe2015-10-31 05:03:27396MockAckListener::~MockAckListener() {}
[email protected]97cf3022013-09-05 14:30:16397
rtenneti021e8822015-10-18 23:59:57398MockNetworkChangeVisitor::MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24399
rtenneti021e8822015-10-18 23:59:57400MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24401
[email protected]8b37a092012-10-18 21:53:49402namespace {
403
rjshaded5ced072015-12-18 19:26:02404string HexDumpWithMarks(const char* data,
405 int length,
406 const bool* marks,
407 int mark_length) {
[email protected]8b37a092012-10-18 21:53:49408 static const char kHexChars[] = "0123456789abcdef";
409 static const int kColumns = 4;
410
411 const int kSizeLimit = 1024;
412 if (length > kSizeLimit || mark_length > kSizeLimit) {
413 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
414 length = min(length, kSizeLimit);
415 mark_length = min(mark_length, kSizeLimit);
416 }
417
418 string hex;
rjshaded5ced072015-12-18 19:26:02419 for (const char *row = data; length > 0;
[email protected]8b37a092012-10-18 21:53:49420 row += kColumns, length -= kColumns) {
rjshaded5ced072015-12-18 19:26:02421 for (const char* p = row; p < row + 4; ++p) {
[email protected]8b37a092012-10-18 21:53:49422 if (p < row + length) {
423 const bool mark =
424 (marks && (p - data) < mark_length && marks[p - data]);
425 hex += mark ? '*' : ' ';
426 hex += kHexChars[(*p & 0xf0) >> 4];
427 hex += kHexChars[*p & 0x0f];
428 hex += mark ? '*' : ' ';
429 } else {
430 hex += " ";
431 }
432 }
433 hex = hex + " ";
434
rtenneti6f48aa92015-03-16 02:18:48435 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
[email protected]8b37a092012-10-18 21:53:49436 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
rtenneti6f48aa92015-03-16 02:18:48437 }
[email protected]8b37a092012-10-18 21:53:49438
439 hex = hex + '\n';
440 }
441 return hex;
442}
443
444} // namespace
445
martijncc5402d2016-02-16 19:08:58446IPAddress TestPeerIPAddress() {
rjshaded5ced072015-12-18 19:26:02447 return Loopback4();
448}
[email protected]300ccd52014-01-25 08:00:19449
rjshaded5ced072015-12-18 19:26:02450QuicVersion QuicVersionMax() {
451 return QuicSupportedVersions().front();
452}
[email protected]b007e632013-10-28 08:39:25453
rjshaded5ced072015-12-18 19:26:02454QuicVersion QuicVersionMin() {
455 return QuicSupportedVersions().back();
456}
[email protected]b007e632013-10-28 08:39:25457
martijncc5402d2016-02-16 19:08:58458IPAddress Loopback4() {
eroman36d84e54432016-03-17 03:23:02459 return IPAddress::IPv4Localhost();
[email protected]c05a6d222013-12-16 19:42:03460}
461
martijncc5402d2016-02-16 19:08:58462IPAddress Loopback6() {
eroman36d84e54432016-03-17 03:23:02463 return IPAddress::IPv6Localhost();
[email protected]730b35d72014-06-05 03:23:22464}
465
martijncc5402d2016-02-16 19:08:58466IPAddress Any4() {
eroman36d84e54432016-03-17 03:23:02467 return IPAddress::IPv4AllZeros();
rtennetie0ee6eb2015-05-01 00:55:09468}
469
[email protected]9bb57c72014-03-31 20:36:04470void GenerateBody(string* body, int length) {
471 body->clear();
472 body->reserve(length);
473 for (int i = 0; i < length; ++i) {
474 body->append(1, static_cast<char>(32 + i % (126 - 32)));
475 }
476}
477
rtennetia004d332015-08-28 06:44:57478QuicEncryptedPacket* ConstructEncryptedPacket(QuicConnectionId connection_id,
479 bool version_flag,
jric533399b2016-01-29 07:36:01480 bool multipath_flag,
rtennetia004d332015-08-28 06:44:57481 bool reset_flag,
jric533399b2016-01-29 07:36:01482 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57483 QuicPacketNumber packet_number,
484 const string& data) {
jric533399b2016-01-29 07:36:01485 return ConstructEncryptedPacket(connection_id, version_flag, multipath_flag,
486 reset_flag, path_id, packet_number, data,
487 PACKET_8BYTE_CONNECTION_ID,
488 PACKET_6BYTE_PACKET_NUMBER);
rtenneti9e0fb502015-03-08 06:07:16489}
490
491QuicEncryptedPacket* ConstructEncryptedPacket(
492 QuicConnectionId connection_id,
493 bool version_flag,
jric533399b2016-01-29 07:36:01494 bool multipath_flag,
rtenneti9e0fb502015-03-08 06:07:16495 bool reset_flag,
jric533399b2016-01-29 07:36:01496 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57497 QuicPacketNumber packet_number,
rtenneti9e0fb502015-03-08 06:07:16498 const string& data,
499 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57500 QuicPacketNumberLength packet_number_length) {
jric533399b2016-01-29 07:36:01501 return ConstructEncryptedPacket(
502 connection_id, version_flag, multipath_flag, reset_flag, path_id,
503 packet_number, data, connection_id_length, packet_number_length, nullptr);
rchc0815442015-04-18 13:29:46504}
505
506QuicEncryptedPacket* ConstructEncryptedPacket(
507 QuicConnectionId connection_id,
508 bool version_flag,
jric533399b2016-01-29 07:36:01509 bool multipath_flag,
rchc0815442015-04-18 13:29:46510 bool reset_flag,
jric533399b2016-01-29 07:36:01511 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57512 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46513 const string& data,
514 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57515 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46516 QuicVersionVector* versions) {
[email protected]ffc34bf2014-03-07 02:42:02517 QuicPacketHeader header;
518 header.public_header.connection_id = connection_id;
rtenneti9e0fb502015-03-08 06:07:16519 header.public_header.connection_id_length = connection_id_length;
[email protected]ffc34bf2014-03-07 02:42:02520 header.public_header.version_flag = version_flag;
jric533399b2016-01-29 07:36:01521 header.public_header.multipath_flag = multipath_flag;
[email protected]ffc34bf2014-03-07 02:42:02522 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57523 header.public_header.packet_number_length = packet_number_length;
jric533399b2016-01-29 07:36:01524 header.path_id = path_id;
rtenneti8dd12b22015-10-21 01:26:38525 header.packet_number = packet_number;
[email protected]ffc34bf2014-03-07 02:42:02526 header.entropy_flag = false;
527 header.entropy_hash = 0;
528 header.fec_flag = false;
529 header.is_in_fec_group = NOT_IN_FEC_GROUP;
530 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44531 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
[email protected]ffc34bf2014-03-07 02:42:02532 QuicFrame frame(&stream_frame);
533 QuicFrames frames;
534 frames.push_back(frame);
rchc0815442015-04-18 13:29:46535 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
536 QuicTime::Zero(), Perspective::IS_CLIENT);
537
[email protected]ffc34bf2014-03-07 02:42:02538 scoped_ptr<QuicPacket> packet(
rtennetib6ac61a52015-02-11 20:20:52539 BuildUnsizedDataPacket(&framer, header, frames));
rtennetibe635732014-10-02 22:51:42540 EXPECT_TRUE(packet != nullptr);
rch99b644c2015-11-04 05:25:28541 char* buffer = new char[kMaxPacketSize];
542 size_t encrypted_length = framer.EncryptPayload(
jric533399b2016-01-29 07:36:01543 ENCRYPTION_NONE, path_id, packet_number, *packet, buffer, kMaxPacketSize);
rch99b644c2015-11-04 05:25:28544 EXPECT_NE(0u, encrypted_length);
545 return new QuicEncryptedPacket(buffer, encrypted_length, true);
[email protected]ffc34bf2014-03-07 02:42:02546}
547
rchc0815442015-04-18 13:29:46548QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
549 QuicConnectionId connection_id,
550 bool version_flag,
jric533399b2016-01-29 07:36:01551 bool multipath_flag,
rchc0815442015-04-18 13:29:46552 bool reset_flag,
jric533399b2016-01-29 07:36:01553 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57554 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46555 const string& data,
556 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57557 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46558 QuicVersionVector* versions) {
559 QuicPacketHeader header;
560 header.public_header.connection_id = connection_id;
561 header.public_header.connection_id_length = connection_id_length;
562 header.public_header.version_flag = version_flag;
jric533399b2016-01-29 07:36:01563 header.public_header.multipath_flag = multipath_flag;
rchc0815442015-04-18 13:29:46564 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57565 header.public_header.packet_number_length = packet_number_length;
jric533399b2016-01-29 07:36:01566 header.path_id = path_id;
rtenneti8dd12b22015-10-21 01:26:38567 header.packet_number = packet_number;
rchc0815442015-04-18 13:29:46568 header.entropy_flag = false;
569 header.entropy_hash = 0;
570 header.fec_flag = false;
571 header.is_in_fec_group = NOT_IN_FEC_GROUP;
572 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44573 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
rtenneti85816fdf2015-05-25 03:01:10574 QuicFrame frame(&stream_frame);
rchc0815442015-04-18 13:29:46575 QuicFrames frames;
rtenneti85816fdf2015-05-25 03:01:10576 frames.push_back(frame);
577 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
rchc0815442015-04-18 13:29:46578 QuicTime::Zero(), Perspective::IS_CLIENT);
rtenneti85816fdf2015-05-25 03:01:10579
rchc0815442015-04-18 13:29:46580 scoped_ptr<QuicPacket> packet(
581 BuildUnsizedDataPacket(&framer, header, frames));
582 EXPECT_TRUE(packet != nullptr);
rtenneti85816fdf2015-05-25 03:01:10583
584 // Now set the packet's private flags byte to 0xFF, which is an invalid value.
585 reinterpret_cast<unsigned char*>(
586 packet->mutable_data())[GetStartOfEncryptedData(
jric533399b2016-01-29 07:36:01587 connection_id_length, version_flag, multipath_flag,
588 packet_number_length)] = 0xFF;
rtenneti85816fdf2015-05-25 03:01:10589
rch99b644c2015-11-04 05:25:28590 char* buffer = new char[kMaxPacketSize];
591 size_t encrypted_length = framer.EncryptPayload(
jric533399b2016-01-29 07:36:01592 ENCRYPTION_NONE, path_id, packet_number, *packet, buffer, kMaxPacketSize);
rch99b644c2015-11-04 05:25:28593 EXPECT_NE(0u, encrypted_length);
594 return new QuicEncryptedPacket(buffer, encrypted_length, true);
rchc0815442015-04-18 13:29:46595}
596
rjshaded5ced072015-12-18 19:26:02597void CompareCharArraysWithHexError(const string& description,
598 const char* actual,
599 const int actual_len,
600 const char* expected,
601 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25602 EXPECT_EQ(actual_len, expected_len);
[email protected]8b37a092012-10-18 21:53:49603 const int min_len = min(actual_len, expected_len);
604 const int max_len = max(actual_len, expected_len);
[email protected]4356f0f2013-04-07 00:58:17605 scoped_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49606 bool identical = (actual_len == expected_len);
607 for (int i = 0; i < min_len; ++i) {
608 if (actual[i] != expected[i]) {
609 marks[i] = true;
610 identical = false;
611 } else {
612 marks[i] = false;
613 }
614 }
615 for (int i = min_len; i < max_len; ++i) {
616 marks[i] = true;
617 }
rjshaded5ced072015-12-18 19:26:02618 if (identical)
619 return;
jric533399b2016-01-29 07:36:01620 ADD_FAILURE() << "Description:\n"
621 << description << "\n\nExpected:\n"
rjshaded5ced072015-12-18 19:26:02622 << HexDumpWithMarks(expected, expected_len, marks.get(),
623 max_len)
624 << "\nActual:\n"
625 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
[email protected]8b37a092012-10-18 21:53:49626}
627
[email protected]b12764d2013-12-02 22:28:30628bool DecodeHexString(const base::StringPiece& hex, std::string* bytes) {
629 bytes->clear();
630 if (hex.empty())
631 return true;
Avi Drissman13fc8932015-12-20 04:40:46632 std::vector<uint8_t> v;
[email protected]b12764d2013-12-02 22:28:30633 if (!base::HexStringToBytes(hex.as_string(), &v))
634 return false;
635 if (!v.empty())
636 bytes->assign(reinterpret_cast<const char*>(&v[0]), v.size());
637 return true;
638}
639
[email protected]d3d15bf2013-01-30 02:51:54640static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43641 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33642 const CryptoHandshakeMessage& message,
643 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49644 CryptoFramer crypto_framer;
[email protected]dc2cc742012-10-21 13:56:13645 scoped_ptr<QuicData> data(crypto_framer.ConstructHandshakeMessage(message));
rtenneti6f48aa92015-03-16 02:18:48646 QuicFramer quic_framer(QuicSupportedVersions(), QuicTime::Zero(),
647 Perspective::IS_CLIENT);
[email protected]8b37a092012-10-18 21:53:49648
649 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43650 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03651 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33652 header.public_header.version_flag = should_include_version;
rtenneti8dd12b22015-10-21 01:26:38653 header.packet_number = 1;
[email protected]9db443912013-02-25 05:27:03654 header.entropy_flag = false;
655 header.entropy_hash = 0;
656 header.fec_flag = false;
[email protected]8b37a092012-10-18 21:53:49657 header.fec_group = 0;
658
[email protected]be24ab22012-10-22 03:01:52659 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
rtennetia4228ea2015-06-04 02:31:44660 data->AsStringPiece());
[email protected]8b37a092012-10-18 21:53:49661
[email protected]be24ab22012-10-22 03:01:52662 QuicFrame frame(&stream_frame);
663 QuicFrames frames;
664 frames.push_back(frame);
rtennetib6ac61a52015-02-11 20:20:52665 return BuildUnsizedDataPacket(&quic_framer, header, frames);
[email protected]8b37a092012-10-18 21:53:49666}
667
[email protected]3aa9ca72014-02-27 19:39:43668QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
669 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54670 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14671 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43672 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54673}
674
rtennetia004d332015-08-28 06:44:57675size_t GetPacketLengthForOneStream(QuicVersion version,
676 bool include_version,
rchcaec4242016-01-22 20:49:52677 bool include_path_id,
rtennetia004d332015-08-28 06:44:57678 QuicConnectionIdLength connection_id_length,
679 QuicPacketNumberLength packet_number_length,
rtennetia004d332015-08-28 06:44:57680 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30681 *payload_length = 1;
682 const size_t stream_length =
[email protected]5dafdb62013-11-14 01:24:26683 NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17684 QuicPacketCreator::StreamFramePacketOverhead(
rchcaec4242016-01-22 20:49:52685 PACKET_8BYTE_CONNECTION_ID, include_version, include_path_id,
rjshaded069aaee2016-03-11 20:42:17686 packet_number_length, 0u);
rtennetic14c8ab2015-06-18 05:47:40687 const size_t ack_length =
688 NullEncrypter().GetCiphertextSize(
rtennetia004d332015-08-28 06:44:57689 QuicFramer::GetMinAckFrameSize(PACKET_1BYTE_PACKET_NUMBER)) +
rtenneti23186682014-10-30 01:49:33690 GetPacketHeaderSize(connection_id_length, include_version,
rjshaded069aaee2016-03-11 20:42:17691 include_path_id, packet_number_length);
[email protected]f62262b2013-07-05 20:57:30692 if (stream_length < ack_length) {
693 *payload_length = 1 + ack_length - stream_length;
694 }
695
[email protected]5dafdb62013-11-14 01:24:26696 return NullEncrypter().GetCiphertextSize(*payload_length) +
rtennetia004d332015-08-28 06:44:57697 QuicPacketCreator::StreamFramePacketOverhead(
rchcaec4242016-01-22 20:49:52698 connection_id_length, include_version, include_path_id,
rjshaded069aaee2016-03-11 20:42:17699 packet_number_length, 0u);
[email protected]5351cc4b2013-03-03 07:22:41700}
701
[email protected]a5b98172014-06-18 07:01:59702TestEntropyCalculator::TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31703
[email protected]a5b98172014-06-18 07:01:59704TestEntropyCalculator::~TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31705
[email protected]48878092013-07-26 14:51:56706QuicPacketEntropyHash TestEntropyCalculator::EntropyHash(
rtennetia004d332015-08-28 06:44:57707 QuicPacketNumber packet_number) const {
[email protected]9db443912013-02-25 05:27:03708 return 1u;
709}
710
[email protected]a5b98172014-06-18 07:01:59711MockEntropyCalculator::MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31712
[email protected]a5b98172014-06-18 07:01:59713MockEntropyCalculator::~MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31714
[email protected]b064310782013-05-30 21:12:17715QuicConfig DefaultQuicConfig() {
716 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21717 config.SetInitialStreamFlowControlWindowToSend(
718 kInitialStreamFlowControlWindowForTest);
719 config.SetInitialSessionFlowControlWindowToSend(
720 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17721 return config;
722}
723
rtennetia2ea9162015-05-15 19:26:44724QuicConfig DefaultQuicConfigStatelessRejects() {
725 QuicConfig config = DefaultQuicConfig();
726 QuicTagVector copt;
727 copt.push_back(kSREJ);
728 config.SetConnectionOptionsToSend(copt);
729 return config;
730}
731
[email protected]4d640792013-12-18 22:21:08732QuicVersionVector SupportedVersions(QuicVersion version) {
733 QuicVersionVector versions;
734 versions.push_back(version);
735 return versions;
736}
737
rtenneti021e8822015-10-18 23:59:57738MockQuicConnectionDebugVisitor::MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23739
rtenneti021e8822015-10-18 23:59:57740MockQuicConnectionDebugVisitor::~MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23741
fayanga31a74b2015-12-28 17:27:14742MockReceivedPacketManager::MockReceivedPacketManager(QuicConnectionStats* stats)
743 : QuicReceivedPacketManager(stats) {}
744
745MockReceivedPacketManager::~MockReceivedPacketManager() {}
746
rtennetid39bd762015-06-12 01:05:52747void CreateClientSessionForTest(QuicServerId server_id,
748 bool supports_stateless_rejects,
749 QuicTime::Delta connection_start_time,
zhongyib8677022015-12-01 05:51:30750 QuicVersionVector supported_versions,
rch99b644c2015-11-04 05:25:28751 MockConnectionHelper* helper,
rtennetid39bd762015-06-12 01:05:52752 QuicCryptoClientConfig* crypto_client_config,
753 PacketSavingConnection** client_connection,
rtennetib865eb82015-06-17 20:21:46754 TestQuicSpdyClientSession** client_session) {
rtennetia2ea9162015-05-15 19:26:44755 CHECK(crypto_client_config);
756 CHECK(client_connection);
757 CHECK(client_session);
rtennetia2ea9162015-05-15 19:26:44758 CHECK(!connection_start_time.IsZero())
759 << "Connections must start at non-zero times, otherwise the "
760 << "strike-register will be unhappy.";
761
762 QuicConfig config = supports_stateless_rejects
763 ? DefaultQuicConfigStatelessRejects()
764 : DefaultQuicConfig();
zhongyib8677022015-12-01 05:51:30765 *client_connection = new PacketSavingConnection(
766 helper, Perspective::IS_CLIENT, supported_versions);
rtennetib865eb82015-06-17 20:21:46767 *client_session = new TestQuicSpdyClientSession(
768 *client_connection, config, server_id, crypto_client_config);
rtennetia2ea9162015-05-15 19:26:44769 (*client_connection)->AdvanceTime(connection_start_time);
770}
771
rjshaded069aaee2016-03-11 20:42:17772void CreateServerSessionForTest(
773 QuicServerId server_id,
774 QuicTime::Delta connection_start_time,
775 QuicVersionVector supported_versions,
776 MockConnectionHelper* helper,
777 QuicCryptoServerConfig* server_crypto_config,
778 QuicCompressedCertsCache* compressed_certs_cache,
779 PacketSavingConnection** server_connection,
780 TestQuicSpdyServerSession** server_session) {
rtennetia2ea9162015-05-15 19:26:44781 CHECK(server_crypto_config);
782 CHECK(server_connection);
783 CHECK(server_session);
rtennetia2ea9162015-05-15 19:26:44784 CHECK(!connection_start_time.IsZero())
785 << "Connections must start at non-zero times, otherwise the "
786 << "strike-register will be unhappy.";
787
zhongyib8677022015-12-01 05:51:30788 *server_connection = new PacketSavingConnection(
789 helper, Perspective::IS_SERVER, supported_versions);
rtennetib865eb82015-06-17 20:21:46790 *server_session = new TestQuicSpdyServerSession(
rjshaded069aaee2016-03-11 20:42:17791 *server_connection, DefaultQuicConfig(), server_crypto_config,
792 compressed_certs_cache);
rtennetia2ea9162015-05-15 19:26:44793
794 // We advance the clock initially because the default time is zero and the
Avi Drissman13fc8932015-12-20 04:40:46795 // strike register worries that we've just overflowed a uint32_t time.
rtennetia2ea9162015-05-15 19:26:44796 (*server_connection)->AdvanceTime(connection_start_time);
797}
798
ckrasic99850b32015-10-16 21:15:58799QuicStreamId QuicClientDataStreamId(int i) {
800 return kClientDataStreamId1 + 2 * i;
801}
802
[email protected]8b37a092012-10-18 21:53:49803} // namespace test
[email protected]8b37a092012-10-18 21:53:49804} // namespace net