blob: 3877e930bd0f05c34f24a3d3563de246935435e9 [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
rch16c74d1d2016-04-22 06:14:077#include <memory>
8
avib3635452016-10-21 18:33:539#include "base/memory/ptr_util.h"
[email protected]b12764d2013-12-02 22:28:3010#include "base/strings/string_number_conversions.h"
rchd4db7c152016-07-29 21:58:1211#include "net/quic/core/crypto/crypto_framer.h"
12#include "net/quic/core/crypto/crypto_handshake.h"
13#include "net/quic/core/crypto/crypto_utils.h"
14#include "net/quic/core/crypto/null_encrypter.h"
15#include "net/quic/core/crypto/quic_decrypter.h"
16#include "net/quic/core/crypto/quic_encrypter.h"
17#include "net/quic/core/quic_data_writer.h"
18#include "net/quic/core/quic_framer.h"
19#include "net/quic/core/quic_packet_creator.h"
20#include "net/quic/core/quic_utils.h"
rtennetid39bd762015-06-12 01:05:5221#include "net/quic/test_tools/crypto_test_utils.h"
[email protected]cbd731e2013-10-24 00:20:3922#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0423#include "net/spdy/spdy_frame_builder.h"
rchc99f380c2015-03-26 19:50:5624#include "net/tools/quic/quic_per_connection_packet_writer.h"
rch3ad2c582016-12-21 18:56:0925#include "third_party/boringssl/src/include/openssl/sha.h"
[email protected]8b37a092012-10-18 21:53:4926
[email protected]c244c5a12013-05-07 20:55:0427using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4928using std::string;
rchc0815442015-04-18 13:29:4629using testing::Invoke;
[email protected]bc356fe2014-06-19 11:14:1430using testing::_;
[email protected]8b37a092012-10-18 21:53:4931
32namespace net {
martijncc5402d2016-02-16 19:08:5833
[email protected]8b37a092012-10-18 21:53:4934namespace test {
35
rtennetia004d332015-08-28 06:44:5736QuicAckFrame MakeAckFrame(QuicPacketNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4937 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3738 ack.largest_observed = largest_observed;
alyssar2adf3ac2016-05-03 17:12:5839 return ack;
40}
41
42QuicAckFrame MakeAckFrameWithAckBlocks(size_t num_ack_blocks,
43 QuicPacketNumber least_unacked) {
44 QuicAckFrame ack = MakeAckFrame(2 * num_ack_blocks + least_unacked);
alyssar2adf3ac2016-05-03 17:12:5845 // Add enough received packets to get num_ack_blocks ack blocks.
46 for (QuicPacketNumber i = 2; i < 2 * num_ack_blocks + 1; i += 2) {
47 ack.packets.Add(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1548 }
49 return ack;
50}
51
rtennetib6ac61a52015-02-11 20:20:5252QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
53 const QuicPacketHeader& header,
54 const QuicFrames& frames) {
[email protected]9cda5fd2014-06-03 10:20:2855 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
alyssarc2f70a52016-05-04 13:15:4956 size_t packet_size = GetPacketHeaderSize(framer->version(), header);
[email protected]9cda5fd2014-06-03 10:20:2857 for (size_t i = 0; i < frames.size(); ++i) {
58 DCHECK_LE(packet_size, max_plaintext_size);
59 bool first_frame = i == 0;
60 bool last_frame = i == frames.size() - 1;
61 const size_t frame_size = framer->GetSerializedFrameLength(
62 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
rjshaded069aaee2016-03-11 20:42:1763 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2864 DCHECK(frame_size);
65 packet_size += frame_size;
66 }
rtenneti16a20772015-02-17 18:58:4867 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
68}
69
70QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
71 const QuicPacketHeader& header,
72 const QuicFrames& frames,
73 size_t packet_size) {
74 char* buffer = new char[packet_size];
alyssarc39b80f2015-10-22 17:13:5875 size_t length = framer->BuildDataPacket(header, frames, buffer, packet_size);
76 DCHECK_NE(0u, length);
77 // Re-construct the data packet with data ownership.
78 return new QuicPacket(buffer, length, /* owns_buffer */ true,
rtenneti16a20772015-02-17 18:58:4879 header.public_header.connection_id_length,
80 header.public_header.version_flag,
rchcaec4242016-01-22 20:49:5281 header.public_header.multipath_flag,
rch012834cf2016-04-26 02:06:3782 header.public_header.nonce != nullptr,
rtennetia004d332015-08-28 06:44:5783 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2884}
85
rchb1c56982016-09-03 00:06:0186QuicFlagSaver::QuicFlagSaver() {
alyssara72f5352016-10-20 12:45:1687#define QUIC_FLAG(type, flag, value) \
88 CHECK_EQ(value, flag) << "Flag set to an expected value. A prior test is " \
89 "likely setting a flag " \
90 << "without using a QuicFlagSaver";
rchb1c56982016-09-03 00:06:0191#include "net/quic/core/quic_flags_list.h"
92#undef QUIC_FLAG
93}
94
95QuicFlagSaver::~QuicFlagSaver() {
96#define QUIC_FLAG(type, flag, value) flag = value;
97#include "net/quic/core/quic_flags_list.h"
98#undef QUIC_FLAG
99}
100
rch3ad2c582016-12-21 18:56:09101string Sha1Hash(StringPiece data) {
102 char buffer[SHA_DIGEST_LENGTH];
103 SHA1(reinterpret_cast<const uint8_t*>(data.data()), data.size(),
104 reinterpret_cast<uint8_t*>(buffer));
105 return string(buffer, arraysize(buffer));
106}
107
Avi Drissman13fc8932015-12-20 04:40:46108uint64_t SimpleRandom::RandUint64() {
rch3ad2c582016-12-21 18:56:09109 string hash =
110 Sha1Hash(StringPiece(reinterpret_cast<char*>(&seed_), sizeof(seed_)));
111 DCHECK_EQ(static_cast<size_t>(SHA_DIGEST_LENGTH), hash.length());
112 memcpy(&seed_, hash.data(), sizeof(seed_));
[email protected]a5b98172014-06-18 07:01:59113 return seed_;
114}
115
ianswett6c7b7ed2016-09-13 19:35:27116void SimpleRandom::RandBytes(void* data, size_t len) {
117 uint8_t* real_data = static_cast<uint8_t*>(data);
118 for (size_t offset = 0; offset < len; offset++) {
119 real_data[offset] = RandUint64() & 0xff;
120 }
121}
122
123void SimpleRandom::Reseed(const void* additional_entropy, size_t len) {
124 const uint8_t* real_entropy = static_cast<const uint8_t*>(additional_entropy);
125 for (size_t offset = 0; offset < len; offset++) {
126 // Note: this is not actually a well-established way to incorporate new
127 // entropy, but good enough for tests.
128 seed_ *= real_entropy[len];
129 }
130}
131
[email protected]8b37a092012-10-18 21:53:49132MockFramerVisitor::MockFramerVisitor() {
133 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:33134 ON_CALL(*this, OnProtocolVersionMismatch(_))
135 .WillByDefault(testing::Return(false));
136
137 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:49138 ON_CALL(*this, OnUnauthenticatedHeader(_))
139 .WillByDefault(testing::Return(true));
140
[email protected]066d8182014-01-04 02:02:45141 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
142 .WillByDefault(testing::Return(true));
143
rjshaded5ced072015-12-18 19:26:02144 ON_CALL(*this, OnPacketHeader(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47145
rjshaded5ced072015-12-18 19:26:02146 ON_CALL(*this, OnStreamFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47147
rjshaded5ced072015-12-18 19:26:02148 ON_CALL(*this, OnAckFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47149
rjshaded5ced072015-12-18 19:26:02150 ON_CALL(*this, OnStopWaitingFrame(_)).WillByDefault(testing::Return(true));
[email protected]93dd91f2014-02-27 00:09:03151
rjshadef88b3c72016-04-26 15:25:33152 ON_CALL(*this, OnPaddingFrame(_)).WillByDefault(testing::Return(true));
153
rjshaded5ced072015-12-18 19:26:02154 ON_CALL(*this, OnPingFrame(_)).WillByDefault(testing::Return(true));
[email protected]d8c522112014-04-23 09:23:25155
rjshaded5ced072015-12-18 19:26:02156 ON_CALL(*this, OnRstStreamFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47157
158 ON_CALL(*this, OnConnectionCloseFrame(_))
159 .WillByDefault(testing::Return(true));
160
rjshaded5ced072015-12-18 19:26:02161 ON_CALL(*this, OnGoAwayFrame(_)).WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49162}
163
rtenneti021e8822015-10-18 23:59:57164MockFramerVisitor::~MockFramerVisitor() {}
[email protected]8b37a092012-10-18 21:53:49165
[email protected]48878092013-07-26 14:51:56166bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33167 return false;
168}
169
[email protected]066d8182014-01-04 02:02:45170bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
171 const QuicPacketPublicHeader& header) {
172 return true;
173}
174
[email protected]ec86d5462013-11-17 16:04:49175bool NoOpFramerVisitor::OnUnauthenticatedHeader(
176 const QuicPacketHeader& header) {
177 return true;
178}
179
[email protected]8b37a092012-10-18 21:53:49180bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
181 return true;
182}
183
[email protected]a57e0272013-04-26 07:31:47184bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
185 return true;
186}
187
188bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
189 return true;
190}
191
rjshaded5ced072015-12-18 19:26:02192bool NoOpFramerVisitor::OnStopWaitingFrame(const QuicStopWaitingFrame& frame) {
[email protected]93dd91f2014-02-27 00:09:03193 return true;
194}
195
rjshadef88b3c72016-04-26 15:25:33196bool NoOpFramerVisitor::OnPaddingFrame(const QuicPaddingFrame& frame) {
197 return true;
198}
199
[email protected]d8c522112014-04-23 09:23:25200bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
201 return true;
202}
203
rjshaded5ced072015-12-18 19:26:02204bool NoOpFramerVisitor::OnRstStreamFrame(const QuicRstStreamFrame& frame) {
[email protected]a57e0272013-04-26 07:31:47205 return true;
206}
207
208bool NoOpFramerVisitor::OnConnectionCloseFrame(
209 const QuicConnectionCloseFrame& frame) {
210 return true;
211}
212
213bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
214 return true;
215}
216
[email protected]cb23a922014-02-20 17:42:38217bool NoOpFramerVisitor::OnWindowUpdateFrame(
218 const QuicWindowUpdateFrame& frame) {
219 return true;
220}
221
222bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
223 return true;
224}
225
rchcaec4242016-01-22 20:49:52226bool NoOpFramerVisitor::OnPathCloseFrame(const QuicPathCloseFrame& frame) {
227 return true;
228}
229
ckrasica7fd1242016-05-14 20:36:01230MockQuicConnectionVisitor::MockQuicConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10231
ckrasica7fd1242016-05-14 20:36:01232MockQuicConnectionVisitor::~MockQuicConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10233
ckrasica7fd1242016-05-14 20:36:01234MockQuicConnectionHelper::MockQuicConnectionHelper() {}
[email protected]9c0b1352012-11-04 00:03:27235
ckrasica7fd1242016-05-14 20:36:01236MockQuicConnectionHelper::~MockQuicConnectionHelper() {}
[email protected]9c0b1352012-11-04 00:03:27237
ckrasica7fd1242016-05-14 20:36:01238const QuicClock* MockQuicConnectionHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27239 return &clock_;
240}
241
ckrasica7fd1242016-05-14 20:36:01242QuicRandom* MockQuicConnectionHelper::GetRandomGenerator() {
[email protected]9558c5d32012-12-22 00:08:14243 return &random_generator_;
244}
245
rch16c74d1d2016-04-22 06:14:07246QuicAlarm* MockAlarmFactory::CreateAlarm(QuicAlarm::Delegate* delegate) {
247 return new MockAlarmFactory::TestAlarm(
jdorfman4ea54a22016-01-21 22:12:50248 QuicArenaScopedPtr<QuicAlarm::Delegate>(delegate));
249}
250
rch16c74d1d2016-04-22 06:14:07251QuicArenaScopedPtr<QuicAlarm> MockAlarmFactory::CreateAlarm(
jdorfman4ea54a22016-01-21 22:12:50252 QuicArenaScopedPtr<QuicAlarm::Delegate> delegate,
253 QuicConnectionArena* arena) {
254 if (arena != nullptr) {
rch16c74d1d2016-04-22 06:14:07255 return arena->New<MockAlarmFactory::TestAlarm>(std::move(delegate));
jdorfman4ea54a22016-01-21 22:12:50256 } else {
rch16c74d1d2016-04-22 06:14:07257 return QuicArenaScopedPtr<MockAlarmFactory::TestAlarm>(
jdorfman4ea54a22016-01-21 22:12:50258 new TestAlarm(std::move(delegate)));
259 }
[email protected]965dbe62013-08-09 21:34:31260}
261
ckrasica7fd1242016-05-14 20:36:01262QuicBufferAllocator* MockQuicConnectionHelper::GetBufferAllocator() {
jdorfman5a606722016-01-04 17:41:29263 return &buffer_allocator_;
264}
265
ckrasica7fd1242016-05-14 20:36:01266void MockQuicConnectionHelper::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55267 clock_.AdvanceTime(delta);
268}
269
ckrasica7fd1242016-05-14 20:36:01270MockQuicConnection::MockQuicConnection(MockQuicConnectionHelper* helper,
271 MockAlarmFactory* alarm_factory,
272 Perspective perspective)
273 : MockQuicConnection(kTestConnectionId,
fayang91ca2012016-11-22 07:42:46274 QuicSocketAddress(TestPeerIPAddress(), kTestPort),
ckrasica7fd1242016-05-14 20:36:01275 helper,
276 alarm_factory,
277 perspective,
danzh3134c2562016-08-12 14:07:52278 AllSupportedVersions()) {}
[email protected]c05a6d222013-12-16 19:42:03279
fayang91ca2012016-11-22 07:42:46280MockQuicConnection::MockQuicConnection(QuicSocketAddress address,
ckrasica7fd1242016-05-14 20:36:01281 MockQuicConnectionHelper* helper,
282 MockAlarmFactory* alarm_factory,
283 Perspective perspective)
284 : MockQuicConnection(kTestConnectionId,
285 address,
286 helper,
287 alarm_factory,
288 perspective,
danzh3134c2562016-08-12 14:07:52289 AllSupportedVersions()) {}
[email protected]044ac2b2012-11-13 21:41:06290
ckrasica7fd1242016-05-14 20:36:01291MockQuicConnection::MockQuicConnection(QuicConnectionId connection_id,
292 MockQuicConnectionHelper* helper,
293 MockAlarmFactory* alarm_factory,
294 Perspective perspective)
295 : MockQuicConnection(connection_id,
fayang91ca2012016-11-22 07:42:46296 QuicSocketAddress(TestPeerIPAddress(), kTestPort),
ckrasica7fd1242016-05-14 20:36:01297 helper,
298 alarm_factory,
299 perspective,
danzh3134c2562016-08-12 14:07:52300 CurrentSupportedVersions()) {}
rchc0815442015-04-18 13:29:46301
ckrasica7fd1242016-05-14 20:36:01302MockQuicConnection::MockQuicConnection(
303 MockQuicConnectionHelper* helper,
304 MockAlarmFactory* alarm_factory,
305 Perspective perspective,
306 const QuicVersionVector& supported_versions)
307 : MockQuicConnection(kTestConnectionId,
fayang91ca2012016-11-22 07:42:46308 QuicSocketAddress(TestPeerIPAddress(), kTestPort),
ckrasica7fd1242016-05-14 20:36:01309 helper,
310 alarm_factory,
311 perspective,
312 supported_versions) {}
rchc0815442015-04-18 13:29:46313
ckrasica7fd1242016-05-14 20:36:01314MockQuicConnection::MockQuicConnection(
315 QuicConnectionId connection_id,
fayang91ca2012016-11-22 07:42:46316 QuicSocketAddress address,
ckrasica7fd1242016-05-14 20:36:01317 MockQuicConnectionHelper* helper,
318 MockAlarmFactory* alarm_factory,
319 Perspective perspective,
320 const QuicVersionVector& supported_versions)
rchc0815442015-04-18 13:29:46321 : QuicConnection(connection_id,
322 address,
rtenneti8a4a0732015-10-18 00:45:51323 helper,
rch16c74d1d2016-04-22 06:14:07324 alarm_factory,
jdorfman90d185f32016-01-15 13:22:47325 new testing::NiceMock<MockPacketWriter>(),
rtennetifb3fa6c2015-03-16 23:04:55326 /* owns_writer= */ true,
327 perspective,
rtenneti8a4a0732015-10-18 00:45:51328 supported_versions) {
rchc0815442015-04-18 13:29:46329 ON_CALL(*this, OnError(_))
330 .WillByDefault(
331 Invoke(this, &PacketSavingConnection::QuicConnection_OnError));
[email protected]4d640792013-12-18 22:21:08332}
333
ckrasica7fd1242016-05-14 20:36:01334MockQuicConnection::~MockQuicConnection() {}
[email protected]044ac2b2012-11-13 21:41:06335
ckrasica7fd1242016-05-14 20:36:01336void MockQuicConnection::AdvanceTime(QuicTime::Delta delta) {
337 static_cast<MockQuicConnectionHelper*>(helper())->AdvanceTime(delta);
[email protected]fe053f92013-04-23 20:18:55338}
339
ckrasica7fd1242016-05-14 20:36:01340PacketSavingConnection::PacketSavingConnection(MockQuicConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07341 MockAlarmFactory* alarm_factory,
rtenneti8a4a0732015-10-18 00:45:51342 Perspective perspective)
ckrasica7fd1242016-05-14 20:36:01343 : MockQuicConnection(helper, alarm_factory, perspective) {}
[email protected]044ac2b2012-11-13 21:41:06344
[email protected]4d640792013-12-18 22:21:08345PacketSavingConnection::PacketSavingConnection(
ckrasica7fd1242016-05-14 20:36:01346 MockQuicConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07347 MockAlarmFactory* alarm_factory,
rtenneti6f48aa92015-03-16 02:18:48348 Perspective perspective,
[email protected]4d640792013-12-18 22:21:08349 const QuicVersionVector& supported_versions)
ckrasica7fd1242016-05-14 20:36:01350 : MockQuicConnection(helper,
351 alarm_factory,
352 perspective,
353 supported_versions) {}
[email protected]4d640792013-12-18 22:21:08354
avib3635452016-10-21 18:33:53355PacketSavingConnection::~PacketSavingConnection() {}
[email protected]044ac2b2012-11-13 21:41:06356
zhongyi4a9d27b2016-01-12 20:08:31357void PacketSavingConnection::SendOrQueuePacket(SerializedPacket* packet) {
avib3635452016-10-21 18:33:53358 encrypted_packets_.push_back(base::MakeUnique<QuicEncryptedPacket>(
vasilvvbdbe8642016-11-24 17:29:18359 CopyBuffer(*packet), packet->encrypted_length, true));
rtenneti31e9fd62014-09-16 05:22:15360 // Transfer ownership of the packet to the SentPacketManager and the
361 // ack notifier to the AckNotifierManager.
fayang70dfb8762016-05-27 16:25:11362 sent_packet_manager_->OnPacketSent(packet, kInvalidPathId, 0,
363 QuicTime::Zero(), NOT_RETRANSMISSION,
364 HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06365}
366
jri4ee9d762016-04-29 02:04:35367MockQuicSession::MockQuicSession(QuicConnection* connection)
ckrasic32b17dcd2016-10-31 06:15:35368 : QuicSession(connection, nullptr, DefaultQuicConfig()) {
jri4ee9d762016-04-29 02:04:35369 crypto_stream_.reset(new QuicCryptoStream(this));
370 Initialize();
danzh1401f0a2016-05-19 13:41:10371 ON_CALL(*this, WritevData(_, _, _, _, _, _))
jri4ee9d762016-04-29 02:04:35372 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
373}
374
danzh3134c2562016-08-12 14:07:52375MockQuicSession::~MockQuicSession() {
376 delete connection();
377}
jri4ee9d762016-04-29 02:04:35378
379// static
380QuicConsumedData MockQuicSession::ConsumeAllData(
fayangf66f9f12016-11-08 15:25:41381 QuicStream* /*stream*/,
jri4ee9d762016-04-29 02:04:35382 QuicStreamId /*id*/,
383 const QuicIOVector& data,
384 QuicStreamOffset /*offset*/,
385 bool fin,
fayang0aa8bc22016-12-20 23:19:25386 const QuicReferenceCountedPointer<
fayangc26bcdb2016-12-21 15:33:12387 QuicAckListenerInterface>& /*ack_listener*/) {
jri4ee9d762016-04-29 02:04:35388 return QuicConsumedData(data.total_length, fin);
389}
390
rtennetib865eb82015-06-17 20:21:46391MockQuicSpdySession::MockQuicSpdySession(QuicConnection* connection)
ckrasic32b17dcd2016-10-31 06:15:35392 : QuicSpdySession(connection, nullptr, DefaultQuicConfig()) {
rtennetid39bd762015-06-12 01:05:52393 crypto_stream_.reset(new QuicCryptoStream(this));
394 Initialize();
danzh1401f0a2016-05-19 13:41:10395 ON_CALL(*this, WritevData(_, _, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07396 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06397}
398
danzh3134c2562016-08-12 14:07:52399MockQuicSpdySession::~MockQuicSpdySession() {
400 delete connection();
401}
[email protected]044ac2b2012-11-13 21:41:06402
rtennetib865eb82015-06-17 20:21:46403TestQuicSpdyServerSession::TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52404 QuicConnection* connection,
405 const QuicConfig& config,
rjshaded069aaee2016-03-11 20:42:17406 const QuicCryptoServerConfig* crypto_config,
407 QuicCompressedCertsCache* compressed_certs_cache)
408 : QuicServerSessionBase(config,
409 connection,
410 &visitor_,
mpwb5c8da92016-06-05 20:07:31411 &helper_,
rjshaded069aaee2016-03-11 20:42:17412 crypto_config,
413 compressed_certs_cache) {
rtennetid39bd762015-06-12 01:05:52414 Initialize();
mpwb5c8da92016-06-05 20:07:31415 ON_CALL(helper_, GenerateConnectionIdForReject(_))
416 .WillByDefault(
417 testing::Return(connection->random_generator()->RandUint64()));
ianswett7b88c0a2016-06-10 22:29:58418 ON_CALL(helper_, CanAcceptClientHello(_, _, _))
419 .WillByDefault(testing::Return(true));
[email protected]ccb34212014-07-18 09:27:50420}
[email protected]2532de12013-05-09 12:29:33421
danzh3134c2562016-08-12 14:07:52422TestQuicSpdyServerSession::~TestQuicSpdyServerSession() {
423 delete connection();
424}
[email protected]2532de12013-05-09 12:29:33425
jokulikc971baf92016-01-06 00:36:39426QuicCryptoServerStreamBase*
427TestQuicSpdyServerSession::CreateQuicCryptoServerStream(
rjshaded069aaee2016-03-11 20:42:17428 const QuicCryptoServerConfig* crypto_config,
429 QuicCompressedCertsCache* compressed_certs_cache) {
430 return new QuicCryptoServerStream(crypto_config, compressed_certs_cache,
431 FLAGS_enable_quic_stateless_reject_support,
ianswett6c7b7ed2016-09-13 19:35:27432 this, &helper_);
jokulikc971baf92016-01-06 00:36:39433}
434
rtennetib865eb82015-06-17 20:21:46435QuicCryptoServerStream* TestQuicSpdyServerSession::GetCryptoStream() {
zhongyib8677022015-12-01 05:51:30436 return static_cast<QuicCryptoServerStream*>(
jokulikc971baf92016-01-06 00:36:39437 QuicServerSessionBase::GetCryptoStream());
[email protected]2532de12013-05-09 12:29:33438}
439
zhongyi1cbc95b2016-11-12 01:42:49440TestPushPromiseDelegate::TestPushPromiseDelegate(bool match)
441 : match_(match), rendezvous_fired_(false), rendezvous_stream_(nullptr) {}
442
443bool TestPushPromiseDelegate::CheckVary(
444 const SpdyHeaderBlock& client_request,
445 const SpdyHeaderBlock& promise_request,
446 const SpdyHeaderBlock& promise_response) {
447 DVLOG(1) << "match " << match_;
448 return match_;
449}
450
451void TestPushPromiseDelegate::OnRendezvousResult(QuicSpdyStream* stream) {
452 rendezvous_fired_ = true;
453 rendezvous_stream_ = stream;
454}
455
rtennetib865eb82015-06-17 20:21:46456TestQuicSpdyClientSession::TestQuicSpdyClientSession(
457 QuicConnection* connection,
458 const QuicConfig& config,
459 const QuicServerId& server_id,
460 QuicCryptoClientConfig* crypto_config)
ckrasic244375a32016-02-04 21:21:22461 : QuicClientSessionBase(connection, &push_promise_index_, config) {
rtennetid39bd762015-06-12 01:05:52462 crypto_stream_.reset(new QuicCryptoClientStream(
463 server_id, this, CryptoTestUtils::ProofVerifyContextForTesting(),
rtenneti2cae2072016-02-05 02:21:33464 crypto_config, this));
rtennetid39bd762015-06-12 01:05:52465 Initialize();
[email protected]90f62f092014-03-24 02:41:23466}
467
rtenneti021e8822015-10-18 23:59:57468TestQuicSpdyClientSession::~TestQuicSpdyClientSession() {}
[email protected]90f62f092014-03-24 02:41:23469
ckrasic244375a32016-02-04 21:21:22470bool TestQuicSpdyClientSession::IsAuthorized(const string& authority) {
471 return true;
472}
473
rtennetib865eb82015-06-17 20:21:46474QuicCryptoClientStream* TestQuicSpdyClientSession::GetCryptoStream() {
rtennetid39bd762015-06-12 01:05:52475 return crypto_stream_.get();
rtennetia2ea9162015-05-15 19:26:44476}
477
[email protected]cbd731e2013-10-24 00:20:39478MockPacketWriter::MockPacketWriter() {
rtenneti493d90ef2015-09-14 04:43:11479 ON_CALL(*this, GetMaxPacketSize(_))
480 .WillByDefault(testing::Return(kMaxPacketSize));
[email protected]cbd731e2013-10-24 00:20:39481}
482
rtenneti021e8822015-10-18 23:59:57483MockPacketWriter::~MockPacketWriter() {}
[email protected]cbd731e2013-10-24 00:20:39484
rtenneti021e8822015-10-18 23:59:57485MockSendAlgorithm::MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10486
rtenneti021e8822015-10-18 23:59:57487MockSendAlgorithm::~MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10488
rtenneti021e8822015-10-18 23:59:57489MockLossAlgorithm::MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43490
rtenneti021e8822015-10-18 23:59:57491MockLossAlgorithm::~MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43492
ckrasicea295fe2015-10-31 05:03:27493MockAckListener::MockAckListener() {}
[email protected]97cf3022013-09-05 14:30:16494
ckrasicea295fe2015-10-31 05:03:27495MockAckListener::~MockAckListener() {}
[email protected]97cf3022013-09-05 14:30:16496
rtenneti021e8822015-10-18 23:59:57497MockNetworkChangeVisitor::MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24498
rtenneti021e8822015-10-18 23:59:57499MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24500
[email protected]8b37a092012-10-18 21:53:49501namespace {
502
rjshaded5ced072015-12-18 19:26:02503string HexDumpWithMarks(const char* data,
504 int length,
505 const bool* marks,
506 int mark_length) {
[email protected]8b37a092012-10-18 21:53:49507 static const char kHexChars[] = "0123456789abcdef";
508 static const int kColumns = 4;
509
510 const int kSizeLimit = 1024;
511 if (length > kSizeLimit || mark_length > kSizeLimit) {
512 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
rch872e00e2016-12-02 02:48:18513 length = std::min(length, kSizeLimit);
514 mark_length = std::min(mark_length, kSizeLimit);
[email protected]8b37a092012-10-18 21:53:49515 }
516
517 string hex;
rjshaded5ced072015-12-18 19:26:02518 for (const char *row = data; length > 0;
[email protected]8b37a092012-10-18 21:53:49519 row += kColumns, length -= kColumns) {
rjshaded5ced072015-12-18 19:26:02520 for (const char* p = row; p < row + 4; ++p) {
[email protected]8b37a092012-10-18 21:53:49521 if (p < row + length) {
522 const bool mark =
523 (marks && (p - data) < mark_length && marks[p - data]);
524 hex += mark ? '*' : ' ';
525 hex += kHexChars[(*p & 0xf0) >> 4];
526 hex += kHexChars[*p & 0x0f];
527 hex += mark ? '*' : ' ';
528 } else {
529 hex += " ";
530 }
531 }
532 hex = hex + " ";
533
rtenneti6f48aa92015-03-16 02:18:48534 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
[email protected]8b37a092012-10-18 21:53:49535 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
rtenneti6f48aa92015-03-16 02:18:48536 }
[email protected]8b37a092012-10-18 21:53:49537
538 hex = hex + '\n';
539 }
540 return hex;
541}
542
543} // namespace
544
fayang91ca2012016-11-22 07:42:46545QuicIpAddress TestPeerIPAddress() {
546 return QuicIpAddress::Loopback4();
rjshaded5ced072015-12-18 19:26:02547}
[email protected]300ccd52014-01-25 08:00:19548
rjshaded5ced072015-12-18 19:26:02549QuicVersion QuicVersionMax() {
danzh3134c2562016-08-12 14:07:52550 return AllSupportedVersions().front();
rjshaded5ced072015-12-18 19:26:02551}
[email protected]b007e632013-10-28 08:39:25552
rjshaded5ced072015-12-18 19:26:02553QuicVersion QuicVersionMin() {
danzh3134c2562016-08-12 14:07:52554 return AllSupportedVersions().back();
rjshaded5ced072015-12-18 19:26:02555}
[email protected]b007e632013-10-28 08:39:25556
martijncc5402d2016-02-16 19:08:58557IPAddress Loopback4() {
eroman36d84e54432016-03-17 03:23:02558 return IPAddress::IPv4Localhost();
[email protected]c05a6d222013-12-16 19:42:03559}
560
martijncc5402d2016-02-16 19:08:58561IPAddress Loopback6() {
eroman36d84e54432016-03-17 03:23:02562 return IPAddress::IPv6Localhost();
[email protected]730b35d72014-06-05 03:23:22563}
564
martijncc5402d2016-02-16 19:08:58565IPAddress Any4() {
eroman36d84e54432016-03-17 03:23:02566 return IPAddress::IPv4AllZeros();
rtennetie0ee6eb2015-05-01 00:55:09567}
568
rtennetia004d332015-08-28 06:44:57569QuicEncryptedPacket* ConstructEncryptedPacket(QuicConnectionId connection_id,
570 bool version_flag,
jric533399b2016-01-29 07:36:01571 bool multipath_flag,
rtennetia004d332015-08-28 06:44:57572 bool reset_flag,
jric533399b2016-01-29 07:36:01573 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57574 QuicPacketNumber packet_number,
575 const string& data) {
jric533399b2016-01-29 07:36:01576 return ConstructEncryptedPacket(connection_id, version_flag, multipath_flag,
577 reset_flag, path_id, packet_number, data,
578 PACKET_8BYTE_CONNECTION_ID,
579 PACKET_6BYTE_PACKET_NUMBER);
rtenneti9e0fb502015-03-08 06:07:16580}
581
582QuicEncryptedPacket* ConstructEncryptedPacket(
583 QuicConnectionId connection_id,
584 bool version_flag,
jric533399b2016-01-29 07:36:01585 bool multipath_flag,
rtenneti9e0fb502015-03-08 06:07:16586 bool reset_flag,
jric533399b2016-01-29 07:36:01587 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57588 QuicPacketNumber packet_number,
rtenneti9e0fb502015-03-08 06:07:16589 const string& data,
590 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57591 QuicPacketNumberLength packet_number_length) {
jric533399b2016-01-29 07:36:01592 return ConstructEncryptedPacket(
593 connection_id, version_flag, multipath_flag, reset_flag, path_id,
594 packet_number, data, connection_id_length, packet_number_length, nullptr);
rchc0815442015-04-18 13:29:46595}
596
597QuicEncryptedPacket* ConstructEncryptedPacket(
598 QuicConnectionId connection_id,
599 bool version_flag,
jric533399b2016-01-29 07:36:01600 bool multipath_flag,
rchc0815442015-04-18 13:29:46601 bool reset_flag,
jric533399b2016-01-29 07:36:01602 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57603 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46604 const string& data,
605 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57606 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46607 QuicVersionVector* versions) {
alyssar2adf3ac2016-05-03 17:12:58608 return ConstructEncryptedPacket(connection_id, version_flag, multipath_flag,
609 reset_flag, path_id, packet_number, data,
610 connection_id_length, packet_number_length,
611 versions, Perspective::IS_CLIENT);
612}
613QuicEncryptedPacket* ConstructEncryptedPacket(
614 QuicConnectionId connection_id,
615 bool version_flag,
616 bool multipath_flag,
617 bool reset_flag,
618 QuicPathId path_id,
619 QuicPacketNumber packet_number,
620 const string& data,
621 QuicConnectionIdLength connection_id_length,
622 QuicPacketNumberLength packet_number_length,
623 QuicVersionVector* versions,
624 Perspective perspective) {
[email protected]ffc34bf2014-03-07 02:42:02625 QuicPacketHeader header;
626 header.public_header.connection_id = connection_id;
rtenneti9e0fb502015-03-08 06:07:16627 header.public_header.connection_id_length = connection_id_length;
[email protected]ffc34bf2014-03-07 02:42:02628 header.public_header.version_flag = version_flag;
jric533399b2016-01-29 07:36:01629 header.public_header.multipath_flag = multipath_flag;
[email protected]ffc34bf2014-03-07 02:42:02630 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57631 header.public_header.packet_number_length = packet_number_length;
jric533399b2016-01-29 07:36:01632 header.path_id = path_id;
rtenneti8dd12b22015-10-21 01:26:38633 header.packet_number = packet_number;
rtennetia4228ea2015-06-04 02:31:44634 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
[email protected]ffc34bf2014-03-07 02:42:02635 QuicFrame frame(&stream_frame);
636 QuicFrames frames;
637 frames.push_back(frame);
danzh3134c2562016-08-12 14:07:52638 QuicFramer framer(
639 versions != nullptr ? *versions : CurrentSupportedVersions(),
640 QuicTime::Zero(), perspective);
rchc0815442015-04-18 13:29:46641
danakjad1777e2016-04-16 00:56:42642 std::unique_ptr<QuicPacket> packet(
rtennetib6ac61a52015-02-11 20:20:52643 BuildUnsizedDataPacket(&framer, header, frames));
rtennetibe635732014-10-02 22:51:42644 EXPECT_TRUE(packet != nullptr);
rch99b644c2015-11-04 05:25:28645 char* buffer = new char[kMaxPacketSize];
646 size_t encrypted_length = framer.EncryptPayload(
jric533399b2016-01-29 07:36:01647 ENCRYPTION_NONE, path_id, packet_number, *packet, buffer, kMaxPacketSize);
rch99b644c2015-11-04 05:25:28648 EXPECT_NE(0u, encrypted_length);
649 return new QuicEncryptedPacket(buffer, encrypted_length, true);
[email protected]ffc34bf2014-03-07 02:42:02650}
651
jokulikf2bd55c52016-03-24 22:35:30652QuicReceivedPacket* ConstructReceivedPacket(
653 const QuicEncryptedPacket& encrypted_packet,
654 QuicTime receipt_time) {
655 char* buffer = new char[encrypted_packet.length()];
656 memcpy(buffer, encrypted_packet.data(), encrypted_packet.length());
657 return new QuicReceivedPacket(buffer, encrypted_packet.length(), receipt_time,
658 true);
659}
660
rchc0815442015-04-18 13:29:46661QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
662 QuicConnectionId connection_id,
663 bool version_flag,
jric533399b2016-01-29 07:36:01664 bool multipath_flag,
rchc0815442015-04-18 13:29:46665 bool reset_flag,
jric533399b2016-01-29 07:36:01666 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57667 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46668 const string& data,
669 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57670 QuicPacketNumberLength packet_number_length,
alyssar2adf3ac2016-05-03 17:12:58671 QuicVersionVector* versions,
672 Perspective perspective) {
rchc0815442015-04-18 13:29:46673 QuicPacketHeader header;
674 header.public_header.connection_id = connection_id;
675 header.public_header.connection_id_length = connection_id_length;
676 header.public_header.version_flag = version_flag;
jric533399b2016-01-29 07:36:01677 header.public_header.multipath_flag = multipath_flag;
rchc0815442015-04-18 13:29:46678 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57679 header.public_header.packet_number_length = packet_number_length;
jric533399b2016-01-29 07:36:01680 header.path_id = path_id;
rtenneti8dd12b22015-10-21 01:26:38681 header.packet_number = packet_number;
rtennetia4228ea2015-06-04 02:31:44682 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
rtenneti85816fdf2015-05-25 03:01:10683 QuicFrame frame(&stream_frame);
rchc0815442015-04-18 13:29:46684 QuicFrames frames;
rtenneti85816fdf2015-05-25 03:01:10685 frames.push_back(frame);
danzh3134c2562016-08-12 14:07:52686 QuicFramer framer(versions != nullptr ? *versions : AllSupportedVersions(),
alyssar2adf3ac2016-05-03 17:12:58687 QuicTime::Zero(), perspective);
rtenneti85816fdf2015-05-25 03:01:10688
danakjad1777e2016-04-16 00:56:42689 std::unique_ptr<QuicPacket> packet(
rchc0815442015-04-18 13:29:46690 BuildUnsizedDataPacket(&framer, header, frames));
691 EXPECT_TRUE(packet != nullptr);
rtenneti85816fdf2015-05-25 03:01:10692
mpw94250b82016-11-19 18:13:30693 // Now set the frame type to 0x1F, which is an invalid frame type.
694 reinterpret_cast<unsigned char*>(
695 packet->mutable_data())[GetStartOfEncryptedData(
696 framer.version(), connection_id_length, version_flag, multipath_flag,
697 false /* no diversification nonce */, packet_number_length)] = 0x1F;
rtenneti85816fdf2015-05-25 03:01:10698
rch99b644c2015-11-04 05:25:28699 char* buffer = new char[kMaxPacketSize];
700 size_t encrypted_length = framer.EncryptPayload(
jric533399b2016-01-29 07:36:01701 ENCRYPTION_NONE, path_id, packet_number, *packet, buffer, kMaxPacketSize);
rch99b644c2015-11-04 05:25:28702 EXPECT_NE(0u, encrypted_length);
703 return new QuicEncryptedPacket(buffer, encrypted_length, true);
rchc0815442015-04-18 13:29:46704}
705
rjshaded5ced072015-12-18 19:26:02706void CompareCharArraysWithHexError(const string& description,
707 const char* actual,
708 const int actual_len,
709 const char* expected,
710 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25711 EXPECT_EQ(actual_len, expected_len);
rch872e00e2016-12-02 02:48:18712 const int min_len = std::min(actual_len, expected_len);
713 const int max_len = std::max(actual_len, expected_len);
danakjad1777e2016-04-16 00:56:42714 std::unique_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49715 bool identical = (actual_len == expected_len);
716 for (int i = 0; i < min_len; ++i) {
717 if (actual[i] != expected[i]) {
718 marks[i] = true;
719 identical = false;
720 } else {
721 marks[i] = false;
722 }
723 }
724 for (int i = min_len; i < max_len; ++i) {
725 marks[i] = true;
726 }
rjshaded5ced072015-12-18 19:26:02727 if (identical)
728 return;
jric533399b2016-01-29 07:36:01729 ADD_FAILURE() << "Description:\n"
730 << description << "\n\nExpected:\n"
rjshaded5ced072015-12-18 19:26:02731 << HexDumpWithMarks(expected, expected_len, marks.get(),
732 max_len)
733 << "\nActual:\n"
734 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
[email protected]8b37a092012-10-18 21:53:49735}
736
[email protected]d3d15bf2013-01-30 02:51:54737static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43738 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33739 const CryptoHandshakeMessage& message,
740 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49741 CryptoFramer crypto_framer;
danakjad1777e2016-04-16 00:56:42742 std::unique_ptr<QuicData> data(
743 crypto_framer.ConstructHandshakeMessage(message));
danzh3134c2562016-08-12 14:07:52744 QuicFramer quic_framer(AllSupportedVersions(), QuicTime::Zero(),
rtenneti6f48aa92015-03-16 02:18:48745 Perspective::IS_CLIENT);
[email protected]8b37a092012-10-18 21:53:49746
747 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43748 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03749 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33750 header.public_header.version_flag = should_include_version;
rtenneti8dd12b22015-10-21 01:26:38751 header.packet_number = 1;
[email protected]8b37a092012-10-18 21:53:49752
[email protected]be24ab22012-10-22 03:01:52753 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
rtennetia4228ea2015-06-04 02:31:44754 data->AsStringPiece());
[email protected]8b37a092012-10-18 21:53:49755
[email protected]be24ab22012-10-22 03:01:52756 QuicFrame frame(&stream_frame);
757 QuicFrames frames;
758 frames.push_back(frame);
rtennetib6ac61a52015-02-11 20:20:52759 return BuildUnsizedDataPacket(&quic_framer, header, frames);
[email protected]8b37a092012-10-18 21:53:49760}
761
[email protected]3aa9ca72014-02-27 19:39:43762QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
763 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54764 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14765 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43766 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54767}
768
rtennetia004d332015-08-28 06:44:57769size_t GetPacketLengthForOneStream(QuicVersion version,
770 bool include_version,
rchcaec4242016-01-22 20:49:52771 bool include_path_id,
rch012834cf2016-04-26 02:06:37772 bool include_diversification_nonce,
rtennetia004d332015-08-28 06:44:57773 QuicConnectionIdLength connection_id_length,
774 QuicPacketNumberLength packet_number_length,
rtennetia004d332015-08-28 06:44:57775 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30776 *payload_length = 1;
777 const size_t stream_length =
rchf58b71b2016-12-21 01:38:31778 NullEncrypter(Perspective::IS_CLIENT).GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17779 QuicPacketCreator::StreamFramePacketOverhead(
alyssarc2f70a52016-05-04 13:15:49780 version, PACKET_8BYTE_CONNECTION_ID, include_version, include_path_id,
rch012834cf2016-04-26 02:06:37781 include_diversification_nonce, packet_number_length, 0u);
rtennetic14c8ab2015-06-18 05:47:40782 const size_t ack_length =
rchf58b71b2016-12-21 01:38:31783 NullEncrypter(Perspective::IS_CLIENT)
784 .GetCiphertextSize(QuicFramer::GetMinAckFrameSize(
785 version, PACKET_1BYTE_PACKET_NUMBER)) +
alyssarc2f70a52016-05-04 13:15:49786 GetPacketHeaderSize(version, connection_id_length, include_version,
rch012834cf2016-04-26 02:06:37787 include_path_id, include_diversification_nonce,
788 packet_number_length);
[email protected]f62262b2013-07-05 20:57:30789 if (stream_length < ack_length) {
790 *payload_length = 1 + ack_length - stream_length;
791 }
792
rchf58b71b2016-12-21 01:38:31793 return NullEncrypter(Perspective::IS_CLIENT)
794 .GetCiphertextSize(*payload_length) +
rtennetia004d332015-08-28 06:44:57795 QuicPacketCreator::StreamFramePacketOverhead(
alyssarc2f70a52016-05-04 13:15:49796 version, connection_id_length, include_version, include_path_id,
rch012834cf2016-04-26 02:06:37797 include_diversification_nonce, packet_number_length, 0u);
[email protected]5351cc4b2013-03-03 07:22:41798}
799
[email protected]b064310782013-05-30 21:12:17800QuicConfig DefaultQuicConfig() {
801 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21802 config.SetInitialStreamFlowControlWindowToSend(
803 kInitialStreamFlowControlWindowForTest);
804 config.SetInitialSessionFlowControlWindowToSend(
805 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17806 return config;
807}
808
rtennetia2ea9162015-05-15 19:26:44809QuicConfig DefaultQuicConfigStatelessRejects() {
810 QuicConfig config = DefaultQuicConfig();
811 QuicTagVector copt;
812 copt.push_back(kSREJ);
813 config.SetConnectionOptionsToSend(copt);
814 return config;
815}
816
[email protected]4d640792013-12-18 22:21:08817QuicVersionVector SupportedVersions(QuicVersion version) {
818 QuicVersionVector versions;
819 versions.push_back(version);
820 return versions;
821}
822
rtenneti021e8822015-10-18 23:59:57823MockQuicConnectionDebugVisitor::MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23824
rtenneti021e8822015-10-18 23:59:57825MockQuicConnectionDebugVisitor::~MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23826
fayanga31a74b2015-12-28 17:27:14827MockReceivedPacketManager::MockReceivedPacketManager(QuicConnectionStats* stats)
828 : QuicReceivedPacketManager(stats) {}
829
830MockReceivedPacketManager::~MockReceivedPacketManager() {}
831
rchdaf5a852016-07-26 19:42:50832MockSentPacketManager::MockSentPacketManager() {}
833
834MockSentPacketManager::~MockSentPacketManager() {}
835
836MockConnectionCloseDelegate::MockConnectionCloseDelegate() {}
837
838MockConnectionCloseDelegate::~MockConnectionCloseDelegate() {}
839
rtennetid39bd762015-06-12 01:05:52840void CreateClientSessionForTest(QuicServerId server_id,
841 bool supports_stateless_rejects,
842 QuicTime::Delta connection_start_time,
zhongyib8677022015-12-01 05:51:30843 QuicVersionVector supported_versions,
ckrasica7fd1242016-05-14 20:36:01844 MockQuicConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07845 MockAlarmFactory* alarm_factory,
rtennetid39bd762015-06-12 01:05:52846 QuicCryptoClientConfig* crypto_client_config,
847 PacketSavingConnection** client_connection,
rtennetib865eb82015-06-17 20:21:46848 TestQuicSpdyClientSession** client_session) {
rtennetia2ea9162015-05-15 19:26:44849 CHECK(crypto_client_config);
850 CHECK(client_connection);
851 CHECK(client_session);
rtennetia2ea9162015-05-15 19:26:44852 CHECK(!connection_start_time.IsZero())
853 << "Connections must start at non-zero times, otherwise the "
854 << "strike-register will be unhappy.";
855
856 QuicConfig config = supports_stateless_rejects
857 ? DefaultQuicConfigStatelessRejects()
858 : DefaultQuicConfig();
zhongyib8677022015-12-01 05:51:30859 *client_connection = new PacketSavingConnection(
rch16c74d1d2016-04-22 06:14:07860 helper, alarm_factory, Perspective::IS_CLIENT, supported_versions);
rtennetib865eb82015-06-17 20:21:46861 *client_session = new TestQuicSpdyClientSession(
862 *client_connection, config, server_id, crypto_client_config);
rtennetia2ea9162015-05-15 19:26:44863 (*client_connection)->AdvanceTime(connection_start_time);
864}
865
rjshaded069aaee2016-03-11 20:42:17866void CreateServerSessionForTest(
867 QuicServerId server_id,
868 QuicTime::Delta connection_start_time,
869 QuicVersionVector supported_versions,
ckrasica7fd1242016-05-14 20:36:01870 MockQuicConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07871 MockAlarmFactory* alarm_factory,
rjshaded069aaee2016-03-11 20:42:17872 QuicCryptoServerConfig* server_crypto_config,
873 QuicCompressedCertsCache* compressed_certs_cache,
874 PacketSavingConnection** server_connection,
875 TestQuicSpdyServerSession** server_session) {
rtennetia2ea9162015-05-15 19:26:44876 CHECK(server_crypto_config);
877 CHECK(server_connection);
878 CHECK(server_session);
rtennetia2ea9162015-05-15 19:26:44879 CHECK(!connection_start_time.IsZero())
880 << "Connections must start at non-zero times, otherwise the "
881 << "strike-register will be unhappy.";
882
zhongyib8677022015-12-01 05:51:30883 *server_connection = new PacketSavingConnection(
rch16c74d1d2016-04-22 06:14:07884 helper, alarm_factory, Perspective::IS_SERVER, supported_versions);
rtennetib865eb82015-06-17 20:21:46885 *server_session = new TestQuicSpdyServerSession(
rjshaded069aaee2016-03-11 20:42:17886 *server_connection, DefaultQuicConfig(), server_crypto_config,
887 compressed_certs_cache);
rtennetia2ea9162015-05-15 19:26:44888
889 // We advance the clock initially because the default time is zero and the
Avi Drissman13fc8932015-12-20 04:40:46890 // strike register worries that we've just overflowed a uint32_t time.
rtennetia2ea9162015-05-15 19:26:44891 (*server_connection)->AdvanceTime(connection_start_time);
892}
893
ckrasic99850b32015-10-16 21:15:58894QuicStreamId QuicClientDataStreamId(int i) {
895 return kClientDataStreamId1 + 2 * i;
896}
897
[email protected]8b37a092012-10-18 21:53:49898} // namespace test
[email protected]8b37a092012-10-18 21:53:49899} // namespace net