blob: 13e5eb169b1c97ae6573e8a420e2f3f5a2a1a787 [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
[email protected]a5b98172014-06-18 07:01:597#include "base/sha1.h"
[email protected]701bc892013-01-17 04:51:548#include "base/stl_util.h"
[email protected]b12764d2013-12-02 22:28:309#include "base/strings/string_number_conversions.h"
[email protected]8b37a092012-10-18 21:53:4910#include "net/quic/crypto/crypto_framer.h"
[email protected]6f54ab32013-03-02 17:43:3511#include "net/quic/crypto/crypto_handshake.h"
[email protected]872edd9e2013-01-16 08:51:1512#include "net/quic/crypto/crypto_utils.h"
[email protected]5351cc4b2013-03-03 07:22:4113#include "net/quic/crypto/null_encrypter.h"
[email protected]4df69842013-02-27 06:32:1614#include "net/quic/crypto/quic_decrypter.h"
15#include "net/quic/crypto/quic_encrypter.h"
[email protected]a57e0272013-04-26 07:31:4716#include "net/quic/quic_framer.h"
[email protected]5351cc4b2013-03-03 07:22:4117#include "net/quic/quic_packet_creator.h"
[email protected]79d13dcb2014-02-05 07:23:1318#include "net/quic/quic_utils.h"
[email protected]cbd731e2013-10-24 00:20:3919#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0420#include "net/spdy/spdy_frame_builder.h"
[email protected]8b37a092012-10-18 21:53:4921
[email protected]c244c5a12013-05-07 20:55:0422using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4923using std::max;
24using std::min;
25using std::string;
[email protected]64c12232014-03-26 05:43:5926using testing::AnyNumber;
[email protected]bc356fe2014-06-19 11:14:1427using testing::_;
[email protected]8b37a092012-10-18 21:53:4928
29namespace net {
30namespace test {
[email protected]965dbe62013-08-09 21:34:3131namespace {
32
33// No-op alarm implementation used by MockHelper.
34class TestAlarm : public QuicAlarm {
35 public:
36 explicit TestAlarm(QuicAlarm::Delegate* delegate)
37 : QuicAlarm(delegate) {
38 }
39
dchengb03027d2014-10-21 12:00:2040 void SetImpl() override {}
41 void CancelImpl() override {}
[email protected]965dbe62013-08-09 21:34:3142};
43
44} // namespace
[email protected]8b37a092012-10-18 21:53:4945
[email protected]310d37b2014-08-02 06:15:3746QuicAckFrame MakeAckFrame(QuicPacketSequenceNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4947 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3748 ack.largest_observed = largest_observed;
49 ack.entropy_hash = 0;
[email protected]fb35b0a2014-04-15 21:06:4950 return ack;
51}
52
[email protected]aa7e4ef2014-05-28 03:53:1553QuicAckFrame MakeAckFrameWithNackRanges(
54 size_t num_nack_ranges, QuicPacketSequenceNumber least_unacked) {
[email protected]310d37b2014-08-02 06:15:3755 QuicAckFrame ack = MakeAckFrame(2 * num_nack_ranges + least_unacked);
[email protected]aa7e4ef2014-05-28 03:53:1556 // Add enough missing packets to get num_nack_ranges nack ranges.
57 for (QuicPacketSequenceNumber i = 1; i < 2 * num_nack_ranges; i += 2) {
[email protected]310d37b2014-08-02 06:15:3758 ack.missing_packets.insert(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1559 }
60 return ack;
61}
62
[email protected]9cda5fd2014-06-03 10:20:2863SerializedPacket BuildUnsizedDataPacket(QuicFramer* framer,
64 const QuicPacketHeader& header,
65 const QuicFrames& frames) {
66 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
67 size_t packet_size = GetPacketHeaderSize(header);
68 for (size_t i = 0; i < frames.size(); ++i) {
69 DCHECK_LE(packet_size, max_plaintext_size);
70 bool first_frame = i == 0;
71 bool last_frame = i == frames.size() - 1;
72 const size_t frame_size = framer->GetSerializedFrameLength(
73 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
74 header.is_in_fec_group,
75 header.public_header.sequence_number_length);
76 DCHECK(frame_size);
77 packet_size += frame_size;
78 }
79 return framer->BuildDataPacket(header, frames, packet_size);
80}
81
[email protected]a5b98172014-06-18 07:01:5982uint64 SimpleRandom::RandUint64() {
83 unsigned char hash[base::kSHA1Length];
84 base::SHA1HashBytes(reinterpret_cast<unsigned char*>(&seed_), sizeof(seed_),
85 hash);
86 memcpy(&seed_, hash, sizeof(seed_));
87 return seed_;
88}
89
[email protected]8b37a092012-10-18 21:53:4990MockFramerVisitor::MockFramerVisitor() {
91 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:3392 ON_CALL(*this, OnProtocolVersionMismatch(_))
93 .WillByDefault(testing::Return(false));
94
95 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:4996 ON_CALL(*this, OnUnauthenticatedHeader(_))
97 .WillByDefault(testing::Return(true));
98
[email protected]066d8182014-01-04 02:02:4599 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
100 .WillByDefault(testing::Return(true));
101
[email protected]cff7b7b2013-01-11 08:49:07102 ON_CALL(*this, OnPacketHeader(_))
[email protected]8b37a092012-10-18 21:53:49103 .WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47104
105 ON_CALL(*this, OnStreamFrame(_))
106 .WillByDefault(testing::Return(true));
107
108 ON_CALL(*this, OnAckFrame(_))
109 .WillByDefault(testing::Return(true));
110
111 ON_CALL(*this, OnCongestionFeedbackFrame(_))
112 .WillByDefault(testing::Return(true));
113
[email protected]93dd91f2014-02-27 00:09:03114 ON_CALL(*this, OnStopWaitingFrame(_))
115 .WillByDefault(testing::Return(true));
116
[email protected]d8c522112014-04-23 09:23:25117 ON_CALL(*this, OnPingFrame(_))
118 .WillByDefault(testing::Return(true));
119
[email protected]a57e0272013-04-26 07:31:47120 ON_CALL(*this, OnRstStreamFrame(_))
121 .WillByDefault(testing::Return(true));
122
123 ON_CALL(*this, OnConnectionCloseFrame(_))
124 .WillByDefault(testing::Return(true));
125
126 ON_CALL(*this, OnGoAwayFrame(_))
127 .WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49128}
129
[email protected]044ac2b2012-11-13 21:41:06130MockFramerVisitor::~MockFramerVisitor() {
131}
[email protected]8b37a092012-10-18 21:53:49132
[email protected]48878092013-07-26 14:51:56133bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33134 return false;
135}
136
[email protected]066d8182014-01-04 02:02:45137bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
138 const QuicPacketPublicHeader& header) {
139 return true;
140}
141
[email protected]ec86d5462013-11-17 16:04:49142bool NoOpFramerVisitor::OnUnauthenticatedHeader(
143 const QuicPacketHeader& header) {
144 return true;
145}
146
[email protected]8b37a092012-10-18 21:53:49147bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
148 return true;
149}
150
[email protected]a57e0272013-04-26 07:31:47151bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
152 return true;
153}
154
155bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
156 return true;
157}
158
159bool NoOpFramerVisitor::OnCongestionFeedbackFrame(
160 const QuicCongestionFeedbackFrame& frame) {
161 return true;
162}
163
[email protected]93dd91f2014-02-27 00:09:03164bool NoOpFramerVisitor::OnStopWaitingFrame(
165 const QuicStopWaitingFrame& frame) {
166 return true;
167}
168
[email protected]d8c522112014-04-23 09:23:25169bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
170 return true;
171}
172
[email protected]a57e0272013-04-26 07:31:47173bool NoOpFramerVisitor::OnRstStreamFrame(
174 const QuicRstStreamFrame& frame) {
175 return true;
176}
177
178bool NoOpFramerVisitor::OnConnectionCloseFrame(
179 const QuicConnectionCloseFrame& frame) {
180 return true;
181}
182
183bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
184 return true;
185}
186
[email protected]cb23a922014-02-20 17:42:38187bool NoOpFramerVisitor::OnWindowUpdateFrame(
188 const QuicWindowUpdateFrame& frame) {
189 return true;
190}
191
192bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
193 return true;
194}
195
[email protected]8d659e22013-01-19 04:26:10196MockConnectionVisitor::MockConnectionVisitor() {
197}
198
199MockConnectionVisitor::~MockConnectionVisitor() {
200}
201
[email protected]9c0b1352012-11-04 00:03:27202MockHelper::MockHelper() {
203}
204
205MockHelper::~MockHelper() {
206}
207
[email protected]97693d12012-11-16 16:05:00208const QuicClock* MockHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27209 return &clock_;
210}
211
[email protected]9558c5d32012-12-22 00:08:14212QuicRandom* MockHelper::GetRandomGenerator() {
213 return &random_generator_;
214}
215
[email protected]965dbe62013-08-09 21:34:31216QuicAlarm* MockHelper::CreateAlarm(QuicAlarm::Delegate* delegate) {
217 return new TestAlarm(delegate);
218}
219
[email protected]fe053f92013-04-23 20:18:55220void MockHelper::AdvanceTime(QuicTime::Delta delta) {
221 clock_.AdvanceTime(delta);
222}
223
rtenneti3fe4ebbc2014-11-16 16:43:47224QuicPacketWriter* NiceMockPacketWriterFactory::Create(
225 QuicConnection* /*connection*/) const {
226 return new testing::NiceMock<MockPacketWriter>();
227}
[email protected]6d515822014-08-22 01:58:06228
[email protected]c05a6d222013-12-16 19:42:03229MockConnection::MockConnection(bool is_server)
[email protected]3aa9ca72014-02-27 19:39:43230 : QuicConnection(kTestConnectionId,
[email protected]300ccd52014-01-25 08:00:19231 IPEndPoint(TestPeerIPAddress(), kTestPort),
[email protected]c05a6d222013-12-16 19:42:03232 new testing::NiceMock<MockHelper>(),
[email protected]6d515822014-08-22 01:58:06233 NiceMockPacketWriterFactory(),
234 /* owns_writer= */ true,
rtennetie3779d832014-11-14 02:08:17235 is_server,
rtenneti8696cf92014-11-14 21:12:12236 /* is_secure= */ false,
237 QuicSupportedVersions()),
238 helper_(helper()) {
239}
240
241MockConnection::MockConnection(bool is_server, bool is_secure)
242 : QuicConnection(kTestConnectionId,
243 IPEndPoint(TestPeerIPAddress(), kTestPort),
244 new testing::NiceMock<MockHelper>(),
245 NiceMockPacketWriterFactory(),
246 /* owns_writer= */ true,
247 is_server,
248 is_secure,
rtennetie3779d832014-11-14 02:08:17249 QuicSupportedVersions()),
[email protected]c05a6d222013-12-16 19:42:03250 helper_(helper()) {
251}
252
253MockConnection::MockConnection(IPEndPoint address,
254 bool is_server)
[email protected]3aa9ca72014-02-27 19:39:43255 : QuicConnection(kTestConnectionId, address,
[email protected]c05a6d222013-12-16 19:42:03256 new testing::NiceMock<MockHelper>(),
[email protected]6d515822014-08-22 01:58:06257 NiceMockPacketWriterFactory(),
258 /* owns_writer= */ true,
rtennetie3779d832014-11-14 02:08:17259 is_server,
rtenneti8696cf92014-11-14 21:12:12260 /* is_secure= */ false,
rtennetie3779d832014-11-14 02:08:17261 QuicSupportedVersions()),
[email protected]2cfc6bb82013-10-27 03:40:44262 helper_(helper()) {
[email protected]044ac2b2012-11-13 21:41:06263}
264
[email protected]3aa9ca72014-02-27 19:39:43265MockConnection::MockConnection(QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33266 bool is_server)
[email protected]3aa9ca72014-02-27 19:39:43267 : QuicConnection(connection_id,
268 IPEndPoint(TestPeerIPAddress(), kTestPort),
[email protected]c05a6d222013-12-16 19:42:03269 new testing::NiceMock<MockHelper>(),
[email protected]6d515822014-08-22 01:58:06270 NiceMockPacketWriterFactory(),
271 /* owns_writer= */ true,
rtennetie3779d832014-11-14 02:08:17272 is_server,
rtenneti8696cf92014-11-14 21:12:12273 /* is_secure= */ false,
rtennetie3779d832014-11-14 02:08:17274 QuicSupportedVersions()),
[email protected]c05a6d222013-12-16 19:42:03275 helper_(helper()) {
[email protected]872edd9e2013-01-16 08:51:15276}
277
[email protected]4d640792013-12-18 22:21:08278MockConnection::MockConnection(bool is_server,
279 const QuicVersionVector& supported_versions)
[email protected]3aa9ca72014-02-27 19:39:43280 : QuicConnection(kTestConnectionId,
[email protected]300ccd52014-01-25 08:00:19281 IPEndPoint(TestPeerIPAddress(), kTestPort),
[email protected]4d640792013-12-18 22:21:08282 new testing::NiceMock<MockHelper>(),
[email protected]6d515822014-08-22 01:58:06283 NiceMockPacketWriterFactory(),
284 /* owns_writer= */ true,
rtennetie3779d832014-11-14 02:08:17285 is_server,
rtenneti8696cf92014-11-14 21:12:12286 /* is_secure= */ false,
rtennetie3779d832014-11-14 02:08:17287 supported_versions),
[email protected]4d640792013-12-18 22:21:08288 helper_(helper()) {
289}
290
[email protected]044ac2b2012-11-13 21:41:06291MockConnection::~MockConnection() {
292}
293
[email protected]fe053f92013-04-23 20:18:55294void MockConnection::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55295 static_cast<MockHelper*>(helper())->AdvanceTime(delta);
296}
297
[email protected]c05a6d222013-12-16 19:42:03298PacketSavingConnection::PacketSavingConnection(bool is_server)
299 : MockConnection(is_server) {
[email protected]044ac2b2012-11-13 21:41:06300}
301
[email protected]4d640792013-12-18 22:21:08302PacketSavingConnection::PacketSavingConnection(
303 bool is_server,
304 const QuicVersionVector& supported_versions)
305 : MockConnection(is_server, supported_versions) {
306}
307
[email protected]044ac2b2012-11-13 21:41:06308PacketSavingConnection::~PacketSavingConnection() {
[email protected]701bc892013-01-17 04:51:54309 STLDeleteElements(&packets_);
[email protected]2532de12013-05-09 12:29:33310 STLDeleteElements(&encrypted_packets_);
[email protected]044ac2b2012-11-13 21:41:06311}
312
rtenneti31e9fd62014-09-16 05:22:15313void PacketSavingConnection::SendOrQueuePacket(QueuedPacket packet) {
314 packets_.push_back(packet.serialized_packet.packet);
[email protected]c5e1aca2014-01-30 04:03:04315 QuicEncryptedPacket* encrypted = QuicConnectionPeer::GetFramer(this)->
rtenneti31e9fd62014-09-16 05:22:15316 EncryptPacket(packet.encryption_level,
317 packet.serialized_packet.sequence_number,
318 *packet.serialized_packet.packet);
[email protected]2532de12013-05-09 12:29:33319 encrypted_packets_.push_back(encrypted);
rtenneti31e9fd62014-09-16 05:22:15320 // Transfer ownership of the packet to the SentPacketManager and the
321 // ack notifier to the AckNotifierManager.
rtennetia4dcff92014-09-29 18:16:08322 sent_packet_manager_.OnPacketSent(
323 &packet.serialized_packet, 0, QuicTime::Zero(), 1000,
324 NOT_RETRANSMISSION, HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06325}
326
[email protected]c05a6d222013-12-16 19:42:03327MockSession::MockSession(QuicConnection* connection)
rtenneti8696cf92014-11-14 21:12:12328 : QuicSession(connection, DefaultQuicConfig()) {
[email protected]ccb34212014-07-18 09:27:50329 InitializeSession();
[email protected]bbb10072014-06-13 07:41:59330 ON_CALL(*this, WritevData(_, _, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07331 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06332}
333
334MockSession::~MockSession() {
335}
336
[email protected]ce7bb1412014-05-17 15:51:33337TestSession::TestSession(QuicConnection* connection, const QuicConfig& config)
rtenneti8696cf92014-11-14 21:12:12338 : QuicSession(connection, config),
rtenneti4a5df262014-11-07 00:43:58339 crypto_stream_(nullptr) {
[email protected]ccb34212014-07-18 09:27:50340 InitializeSession();
341}
[email protected]2532de12013-05-09 12:29:33342
[email protected]b064310782013-05-30 21:12:17343TestSession::~TestSession() {}
[email protected]2532de12013-05-09 12:29:33344
345void TestSession::SetCryptoStream(QuicCryptoStream* stream) {
346 crypto_stream_ = stream;
347}
348
349QuicCryptoStream* TestSession::GetCryptoStream() {
350 return crypto_stream_;
351}
352
[email protected]90f62f092014-03-24 02:41:23353TestClientSession::TestClientSession(QuicConnection* connection,
354 const QuicConfig& config)
rtenneti8696cf92014-11-14 21:12:12355 : QuicClientSessionBase(connection, config),
rtennetibe635732014-10-02 22:51:42356 crypto_stream_(nullptr) {
[email protected]ccb34212014-07-18 09:27:50357 EXPECT_CALL(*this, OnProofValid(_)).Times(AnyNumber());
358 InitializeSession();
[email protected]90f62f092014-03-24 02:41:23359}
360
361TestClientSession::~TestClientSession() {}
362
363void TestClientSession::SetCryptoStream(QuicCryptoStream* stream) {
364 crypto_stream_ = stream;
365}
366
367QuicCryptoStream* TestClientSession::GetCryptoStream() {
368 return crypto_stream_;
369}
370
[email protected]cbd731e2013-10-24 00:20:39371MockPacketWriter::MockPacketWriter() {
372}
373
374MockPacketWriter::~MockPacketWriter() {
375}
376
[email protected]fee17f72013-02-03 07:47:41377MockSendAlgorithm::MockSendAlgorithm() {
[email protected]8d659e22013-01-19 04:26:10378}
379
[email protected]fee17f72013-02-03 07:47:41380MockSendAlgorithm::~MockSendAlgorithm() {
[email protected]8d659e22013-01-19 04:26:10381}
382
[email protected]3aa9ca72014-02-27 19:39:43383MockLossAlgorithm::MockLossAlgorithm() {
384}
385
386MockLossAlgorithm::~MockLossAlgorithm() {
387}
388
[email protected]97cf3022013-09-05 14:30:16389MockAckNotifierDelegate::MockAckNotifierDelegate() {
390}
391
392MockAckNotifierDelegate::~MockAckNotifierDelegate() {
393}
394
[email protected]a692ad9d2014-07-18 21:35:24395MockNetworkChangeVisitor::MockNetworkChangeVisitor() {
396}
397
398MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {
399}
400
[email protected]8b37a092012-10-18 21:53:49401namespace {
402
403string HexDumpWithMarks(const char* data, int length,
404 const bool* marks, int mark_length) {
405 static const char kHexChars[] = "0123456789abcdef";
406 static const int kColumns = 4;
407
408 const int kSizeLimit = 1024;
409 if (length > kSizeLimit || mark_length > kSizeLimit) {
410 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
411 length = min(length, kSizeLimit);
412 mark_length = min(mark_length, kSizeLimit);
413 }
414
415 string hex;
416 for (const char* row = data; length > 0;
417 row += kColumns, length -= kColumns) {
418 for (const char *p = row; p < row + 4; ++p) {
419 if (p < row + length) {
420 const bool mark =
421 (marks && (p - data) < mark_length && marks[p - data]);
422 hex += mark ? '*' : ' ';
423 hex += kHexChars[(*p & 0xf0) >> 4];
424 hex += kHexChars[*p & 0x0f];
425 hex += mark ? '*' : ' ';
426 } else {
427 hex += " ";
428 }
429 }
430 hex = hex + " ";
431
432 for (const char *p = row; p < row + 4 && p < row + length; ++p)
433 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
434
435 hex = hex + '\n';
436 }
437 return hex;
438}
439
440} // namespace
441
[email protected]300ccd52014-01-25 08:00:19442IPAddressNumber TestPeerIPAddress() { return Loopback4(); }
443
[email protected]b007e632013-10-28 08:39:25444QuicVersion QuicVersionMax() { return QuicSupportedVersions().front(); }
445
446QuicVersion QuicVersionMin() { return QuicSupportedVersions().back(); }
447
[email protected]c05a6d222013-12-16 19:42:03448IPAddressNumber Loopback4() {
[email protected]300ccd52014-01-25 08:00:19449 IPAddressNumber addr;
450 CHECK(ParseIPLiteralToNumber("127.0.0.1", &addr));
[email protected]c05a6d222013-12-16 19:42:03451 return addr;
452}
453
[email protected]730b35d72014-06-05 03:23:22454IPAddressNumber Loopback6() {
455 IPAddressNumber addr;
456 CHECK(ParseIPLiteralToNumber("::1", &addr));
457 return addr;
458}
459
[email protected]9bb57c72014-03-31 20:36:04460void GenerateBody(string* body, int length) {
461 body->clear();
462 body->reserve(length);
463 for (int i = 0; i < length; ++i) {
464 body->append(1, static_cast<char>(32 + i % (126 - 32)));
465 }
466}
467
[email protected]ffc34bf2014-03-07 02:42:02468QuicEncryptedPacket* ConstructEncryptedPacket(
469 QuicConnectionId connection_id,
470 bool version_flag,
471 bool reset_flag,
472 QuicPacketSequenceNumber sequence_number,
473 const string& data) {
474 QuicPacketHeader header;
475 header.public_header.connection_id = connection_id;
476 header.public_header.connection_id_length = PACKET_8BYTE_CONNECTION_ID;
477 header.public_header.version_flag = version_flag;
478 header.public_header.reset_flag = reset_flag;
479 header.public_header.sequence_number_length = PACKET_6BYTE_SEQUENCE_NUMBER;
480 header.packet_sequence_number = sequence_number;
481 header.entropy_flag = false;
482 header.entropy_hash = 0;
483 header.fec_flag = false;
484 header.is_in_fec_group = NOT_IN_FEC_GROUP;
485 header.fec_group = 0;
486 QuicStreamFrame stream_frame(1, false, 0, MakeIOVector(data));
487 QuicFrame frame(&stream_frame);
488 QuicFrames frames;
489 frames.push_back(frame);
490 QuicFramer framer(QuicSupportedVersions(), QuicTime::Zero(), false);
491 scoped_ptr<QuicPacket> packet(
[email protected]9cda5fd2014-06-03 10:20:28492 BuildUnsizedDataPacket(&framer, header, frames).packet);
rtennetibe635732014-10-02 22:51:42493 EXPECT_TRUE(packet != nullptr);
[email protected]ffc34bf2014-03-07 02:42:02494 QuicEncryptedPacket* encrypted = framer.EncryptPacket(ENCRYPTION_NONE,
495 sequence_number,
496 *packet);
rtennetibe635732014-10-02 22:51:42497 EXPECT_TRUE(encrypted != nullptr);
[email protected]ffc34bf2014-03-07 02:42:02498 return encrypted;
499}
500
[email protected]8b37a092012-10-18 21:53:49501void CompareCharArraysWithHexError(
502 const string& description,
503 const char* actual,
504 const int actual_len,
505 const char* expected,
506 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25507 EXPECT_EQ(actual_len, expected_len);
[email protected]8b37a092012-10-18 21:53:49508 const int min_len = min(actual_len, expected_len);
509 const int max_len = max(actual_len, expected_len);
[email protected]4356f0f2013-04-07 00:58:17510 scoped_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49511 bool identical = (actual_len == expected_len);
512 for (int i = 0; i < min_len; ++i) {
513 if (actual[i] != expected[i]) {
514 marks[i] = true;
515 identical = false;
516 } else {
517 marks[i] = false;
518 }
519 }
520 for (int i = min_len; i < max_len; ++i) {
521 marks[i] = true;
522 }
523 if (identical) return;
524 ADD_FAILURE()
525 << "Description:\n"
526 << description
527 << "\n\nExpected:\n"
528 << HexDumpWithMarks(expected, expected_len, marks.get(), max_len)
529 << "\nActual:\n"
530 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
531}
532
[email protected]b12764d2013-12-02 22:28:30533bool DecodeHexString(const base::StringPiece& hex, std::string* bytes) {
534 bytes->clear();
535 if (hex.empty())
536 return true;
537 std::vector<uint8> v;
538 if (!base::HexStringToBytes(hex.as_string(), &v))
539 return false;
540 if (!v.empty())
541 bytes->assign(reinterpret_cast<const char*>(&v[0]), v.size());
542 return true;
543}
544
[email protected]d3d15bf2013-01-30 02:51:54545static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43546 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33547 const CryptoHandshakeMessage& message,
548 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49549 CryptoFramer crypto_framer;
[email protected]dc2cc742012-10-21 13:56:13550 scoped_ptr<QuicData> data(crypto_framer.ConstructHandshakeMessage(message));
[email protected]b007e632013-10-28 08:39:25551 QuicFramer quic_framer(QuicSupportedVersions(), QuicTime::Zero(), false);
[email protected]8b37a092012-10-18 21:53:49552
553 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43554 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03555 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33556 header.public_header.version_flag = should_include_version;
[email protected]8b37a092012-10-18 21:53:49557 header.packet_sequence_number = 1;
[email protected]9db443912013-02-25 05:27:03558 header.entropy_flag = false;
559 header.entropy_hash = 0;
560 header.fec_flag = false;
[email protected]8b37a092012-10-18 21:53:49561 header.fec_group = 0;
562
[email protected]be24ab22012-10-22 03:01:52563 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
[email protected]5dafdb62013-11-14 01:24:26564 MakeIOVector(data->AsStringPiece()));
[email protected]8b37a092012-10-18 21:53:49565
[email protected]be24ab22012-10-22 03:01:52566 QuicFrame frame(&stream_frame);
567 QuicFrames frames;
568 frames.push_back(frame);
[email protected]9cda5fd2014-06-03 10:20:28569 return BuildUnsizedDataPacket(&quic_framer, header, frames).packet;
[email protected]8b37a092012-10-18 21:53:49570}
571
[email protected]3aa9ca72014-02-27 19:39:43572QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
573 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54574 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14575 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43576 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54577}
578
[email protected]ea825e02013-08-21 18:12:45579size_t GetPacketLengthForOneStream(
580 QuicVersion version,
581 bool include_version,
rtenneti23186682014-10-30 01:49:33582 QuicConnectionIdLength connection_id_length,
[email protected]ea825e02013-08-21 18:12:45583 QuicSequenceNumberLength sequence_number_length,
584 InFecGroup is_in_fec_group,
585 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30586 *payload_length = 1;
587 const size_t stream_length =
[email protected]5dafdb62013-11-14 01:24:26588 NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17589 QuicPacketCreator::StreamFramePacketOverhead(
[email protected]310d37b2014-08-02 06:15:37590 PACKET_8BYTE_CONNECTION_ID, include_version,
[email protected]aa7e4ef2014-05-28 03:53:15591 sequence_number_length, 0u, is_in_fec_group);
[email protected]5dafdb62013-11-14 01:24:26592 const size_t ack_length = NullEncrypter().GetCiphertextSize(
[email protected]8e01c062013-10-31 07:35:31593 QuicFramer::GetMinAckFrameSize(
[email protected]310d37b2014-08-02 06:15:37594 sequence_number_length, PACKET_1BYTE_SEQUENCE_NUMBER)) +
rtenneti23186682014-10-30 01:49:33595 GetPacketHeaderSize(connection_id_length, include_version,
[email protected]ea825e02013-08-21 18:12:45596 sequence_number_length, is_in_fec_group);
[email protected]f62262b2013-07-05 20:57:30597 if (stream_length < ack_length) {
598 *payload_length = 1 + ack_length - stream_length;
599 }
600
[email protected]5dafdb62013-11-14 01:24:26601 return NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]f62262b2013-07-05 20:57:30602 QuicPacketCreator::StreamFramePacketOverhead(
rtenneti23186682014-10-30 01:49:33603 connection_id_length, include_version,
[email protected]aa7e4ef2014-05-28 03:53:15604 sequence_number_length, 0u, is_in_fec_group);
[email protected]5351cc4b2013-03-03 07:22:41605}
606
[email protected]a5b98172014-06-18 07:01:59607TestEntropyCalculator::TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31608
[email protected]a5b98172014-06-18 07:01:59609TestEntropyCalculator::~TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31610
[email protected]48878092013-07-26 14:51:56611QuicPacketEntropyHash TestEntropyCalculator::EntropyHash(
[email protected]9db443912013-02-25 05:27:03612 QuicPacketSequenceNumber sequence_number) const {
613 return 1u;
614}
615
[email protected]a5b98172014-06-18 07:01:59616MockEntropyCalculator::MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31617
[email protected]a5b98172014-06-18 07:01:59618MockEntropyCalculator::~MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31619
[email protected]b064310782013-05-30 21:12:17620QuicConfig DefaultQuicConfig() {
621 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21622 config.SetInitialFlowControlWindowToSend(
623 kInitialSessionFlowControlWindowForTest);
624 config.SetInitialStreamFlowControlWindowToSend(
625 kInitialStreamFlowControlWindowForTest);
626 config.SetInitialSessionFlowControlWindowToSend(
627 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17628 return config;
629}
630
[email protected]4d640792013-12-18 22:21:08631QuicVersionVector SupportedVersions(QuicVersion version) {
632 QuicVersionVector versions;
633 versions.push_back(version);
634 return versions;
635}
636
rtennetibe635732014-10-02 22:51:42637TestWriterFactory::TestWriterFactory() : current_writer_(nullptr) {}
[email protected]6d515822014-08-22 01:58:06638TestWriterFactory::~TestWriterFactory() {}
639
640QuicPacketWriter* TestWriterFactory::Create(QuicServerPacketWriter* writer,
641 QuicConnection* connection) {
642 return new PerConnectionPacketWriter(this, writer, connection);
643}
644
645void TestWriterFactory::OnPacketSent(WriteResult result) {
rtennetibe635732014-10-02 22:51:42646 if (current_writer_ != nullptr && result.status == WRITE_STATUS_ERROR) {
[email protected]ca4e0d92014-08-22 16:33:22647 current_writer_->connection()->OnWriteError(result.error_code);
rtennetibe635732014-10-02 22:51:42648 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06649 }
650}
651
652void TestWriterFactory::Unregister(PerConnectionPacketWriter* writer) {
653 if (current_writer_ == writer) {
rtennetibe635732014-10-02 22:51:42654 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06655 }
656}
657
658TestWriterFactory::PerConnectionPacketWriter::PerConnectionPacketWriter(
659 TestWriterFactory* factory,
660 QuicServerPacketWriter* writer,
661 QuicConnection* connection)
662 : QuicPerConnectionPacketWriter(writer, connection),
663 factory_(factory) {
664}
665
666TestWriterFactory::PerConnectionPacketWriter::~PerConnectionPacketWriter() {
667 factory_->Unregister(this);
668}
669
670WriteResult TestWriterFactory::PerConnectionPacketWriter::WritePacket(
671 const char* buffer,
672 size_t buf_len,
673 const IPAddressNumber& self_address,
674 const IPEndPoint& peer_address) {
rtennetibe635732014-10-02 22:51:42675 // A DCHECK(factory_current_writer_ == nullptr) would be wrong here -- this
676 // class may be used in a setting where connection()->OnPacketSent() is called
677 // in a different way, so TestWriterFactory::OnPacketSent might never be
678 // called.
[email protected]6d515822014-08-22 01:58:06679 factory_->current_writer_ = this;
680 return QuicPerConnectionPacketWriter::WritePacket(buffer,
681 buf_len,
682 self_address,
683 peer_address);
684}
685
[email protected]8b37a092012-10-18 21:53:49686} // namespace test
[email protected]8b37a092012-10-18 21:53:49687} // namespace net