blob: 7412d30f207cef78c3c14016d43bd6da918b4201 [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
[email protected]a5b98172014-06-18 07:01:597#include "base/sha1.h"
[email protected]701bc892013-01-17 04:51:548#include "base/stl_util.h"
[email protected]b12764d2013-12-02 22:28:309#include "base/strings/string_number_conversions.h"
[email protected]8b37a092012-10-18 21:53:4910#include "net/quic/crypto/crypto_framer.h"
[email protected]6f54ab32013-03-02 17:43:3511#include "net/quic/crypto/crypto_handshake.h"
[email protected]872edd9e2013-01-16 08:51:1512#include "net/quic/crypto/crypto_utils.h"
[email protected]5351cc4b2013-03-03 07:22:4113#include "net/quic/crypto/null_encrypter.h"
[email protected]4df69842013-02-27 06:32:1614#include "net/quic/crypto/quic_decrypter.h"
15#include "net/quic/crypto/quic_encrypter.h"
rtenneti16a20772015-02-17 18:58:4816#include "net/quic/quic_data_writer.h"
[email protected]a57e0272013-04-26 07:31:4717#include "net/quic/quic_framer.h"
[email protected]5351cc4b2013-03-03 07:22:4118#include "net/quic/quic_packet_creator.h"
[email protected]79d13dcb2014-02-05 07:23:1319#include "net/quic/quic_utils.h"
rtennetid39bd762015-06-12 01:05:5220#include "net/quic/test_tools/crypto_test_utils.h"
[email protected]cbd731e2013-10-24 00:20:3921#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0422#include "net/spdy/spdy_frame_builder.h"
rchc99f380c2015-03-26 19:50:5623#include "net/tools/quic/quic_per_connection_packet_writer.h"
[email protected]8b37a092012-10-18 21:53:4924
[email protected]c244c5a12013-05-07 20:55:0425using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4926using std::max;
27using std::min;
28using std::string;
rchc0815442015-04-18 13:29:4629using testing::Invoke;
[email protected]bc356fe2014-06-19 11:14:1430using testing::_;
[email protected]8b37a092012-10-18 21:53:4931
32namespace net {
33namespace test {
[email protected]965dbe62013-08-09 21:34:3134namespace {
35
36// No-op alarm implementation used by MockHelper.
37class TestAlarm : public QuicAlarm {
38 public:
39 explicit TestAlarm(QuicAlarm::Delegate* delegate)
40 : QuicAlarm(delegate) {
41 }
42
dchengb03027d2014-10-21 12:00:2043 void SetImpl() override {}
44 void CancelImpl() override {}
[email protected]965dbe62013-08-09 21:34:3145};
46
47} // namespace
[email protected]8b37a092012-10-18 21:53:4948
rtennetia004d332015-08-28 06:44:5749QuicAckFrame MakeAckFrame(QuicPacketNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4950 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3751 ack.largest_observed = largest_observed;
52 ack.entropy_hash = 0;
[email protected]fb35b0a2014-04-15 21:06:4953 return ack;
54}
55
rtennetia004d332015-08-28 06:44:5756QuicAckFrame MakeAckFrameWithNackRanges(size_t num_nack_ranges,
57 QuicPacketNumber least_unacked) {
[email protected]310d37b2014-08-02 06:15:3758 QuicAckFrame ack = MakeAckFrame(2 * num_nack_ranges + least_unacked);
[email protected]aa7e4ef2014-05-28 03:53:1559 // Add enough missing packets to get num_nack_ranges nack ranges.
rtennetia004d332015-08-28 06:44:5760 for (QuicPacketNumber i = 1; i < 2 * num_nack_ranges; i += 2) {
rtenneti493d90ef2015-09-14 04:43:1161 ack.missing_packets.Add(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1562 }
63 return ack;
64}
65
rtennetib6ac61a52015-02-11 20:20:5266QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
67 const QuicPacketHeader& header,
68 const QuicFrames& frames) {
[email protected]9cda5fd2014-06-03 10:20:2869 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
70 size_t packet_size = GetPacketHeaderSize(header);
71 for (size_t i = 0; i < frames.size(); ++i) {
72 DCHECK_LE(packet_size, max_plaintext_size);
73 bool first_frame = i == 0;
74 bool last_frame = i == frames.size() - 1;
75 const size_t frame_size = framer->GetSerializedFrameLength(
76 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
rtennetia004d332015-08-28 06:44:5777 header.is_in_fec_group, header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2878 DCHECK(frame_size);
79 packet_size += frame_size;
80 }
rtenneti16a20772015-02-17 18:58:4881 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
82}
83
84QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
85 const QuicPacketHeader& header,
86 const QuicFrames& frames,
87 size_t packet_size) {
88 char* buffer = new char[packet_size];
89 scoped_ptr<QuicPacket> packet(
90 framer->BuildDataPacket(header, frames, buffer, packet_size));
91 DCHECK(packet.get() != nullptr);
92 // Now I have to re-construct the data packet with data ownership.
93 return new QuicPacket(buffer, packet->length(), true,
94 header.public_header.connection_id_length,
95 header.public_header.version_flag,
rtennetia004d332015-08-28 06:44:5796 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2897}
98
[email protected]a5b98172014-06-18 07:01:5999uint64 SimpleRandom::RandUint64() {
100 unsigned char hash[base::kSHA1Length];
101 base::SHA1HashBytes(reinterpret_cast<unsigned char*>(&seed_), sizeof(seed_),
102 hash);
103 memcpy(&seed_, hash, sizeof(seed_));
104 return seed_;
105}
106
[email protected]8b37a092012-10-18 21:53:49107MockFramerVisitor::MockFramerVisitor() {
108 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:33109 ON_CALL(*this, OnProtocolVersionMismatch(_))
110 .WillByDefault(testing::Return(false));
111
112 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:49113 ON_CALL(*this, OnUnauthenticatedHeader(_))
114 .WillByDefault(testing::Return(true));
115
[email protected]066d8182014-01-04 02:02:45116 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
117 .WillByDefault(testing::Return(true));
118
[email protected]cff7b7b2013-01-11 08:49:07119 ON_CALL(*this, OnPacketHeader(_))
[email protected]8b37a092012-10-18 21:53:49120 .WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47121
122 ON_CALL(*this, OnStreamFrame(_))
123 .WillByDefault(testing::Return(true));
124
125 ON_CALL(*this, OnAckFrame(_))
126 .WillByDefault(testing::Return(true));
127
[email protected]93dd91f2014-02-27 00:09:03128 ON_CALL(*this, OnStopWaitingFrame(_))
129 .WillByDefault(testing::Return(true));
130
[email protected]d8c522112014-04-23 09:23:25131 ON_CALL(*this, OnPingFrame(_))
132 .WillByDefault(testing::Return(true));
133
[email protected]a57e0272013-04-26 07:31:47134 ON_CALL(*this, OnRstStreamFrame(_))
135 .WillByDefault(testing::Return(true));
136
137 ON_CALL(*this, OnConnectionCloseFrame(_))
138 .WillByDefault(testing::Return(true));
139
140 ON_CALL(*this, OnGoAwayFrame(_))
141 .WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49142}
143
[email protected]044ac2b2012-11-13 21:41:06144MockFramerVisitor::~MockFramerVisitor() {
145}
[email protected]8b37a092012-10-18 21:53:49146
[email protected]48878092013-07-26 14:51:56147bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33148 return false;
149}
150
[email protected]066d8182014-01-04 02:02:45151bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
152 const QuicPacketPublicHeader& header) {
153 return true;
154}
155
[email protected]ec86d5462013-11-17 16:04:49156bool NoOpFramerVisitor::OnUnauthenticatedHeader(
157 const QuicPacketHeader& header) {
158 return true;
159}
160
[email protected]8b37a092012-10-18 21:53:49161bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
162 return true;
163}
164
[email protected]a57e0272013-04-26 07:31:47165bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
166 return true;
167}
168
169bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
170 return true;
171}
172
[email protected]93dd91f2014-02-27 00:09:03173bool NoOpFramerVisitor::OnStopWaitingFrame(
174 const QuicStopWaitingFrame& frame) {
175 return true;
176}
177
[email protected]d8c522112014-04-23 09:23:25178bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
179 return true;
180}
181
[email protected]a57e0272013-04-26 07:31:47182bool NoOpFramerVisitor::OnRstStreamFrame(
183 const QuicRstStreamFrame& frame) {
184 return true;
185}
186
187bool NoOpFramerVisitor::OnConnectionCloseFrame(
188 const QuicConnectionCloseFrame& frame) {
189 return true;
190}
191
192bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
193 return true;
194}
195
[email protected]cb23a922014-02-20 17:42:38196bool NoOpFramerVisitor::OnWindowUpdateFrame(
197 const QuicWindowUpdateFrame& frame) {
198 return true;
199}
200
201bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
202 return true;
203}
204
[email protected]8d659e22013-01-19 04:26:10205MockConnectionVisitor::MockConnectionVisitor() {
206}
207
208MockConnectionVisitor::~MockConnectionVisitor() {
209}
210
[email protected]9c0b1352012-11-04 00:03:27211MockHelper::MockHelper() {
212}
213
214MockHelper::~MockHelper() {
215}
216
[email protected]97693d12012-11-16 16:05:00217const QuicClock* MockHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27218 return &clock_;
219}
220
[email protected]9558c5d32012-12-22 00:08:14221QuicRandom* MockHelper::GetRandomGenerator() {
222 return &random_generator_;
223}
224
[email protected]965dbe62013-08-09 21:34:31225QuicAlarm* MockHelper::CreateAlarm(QuicAlarm::Delegate* delegate) {
226 return new TestAlarm(delegate);
227}
228
[email protected]fe053f92013-04-23 20:18:55229void MockHelper::AdvanceTime(QuicTime::Delta delta) {
230 clock_.AdvanceTime(delta);
231}
232
rtenneti3fe4ebbc2014-11-16 16:43:47233QuicPacketWriter* NiceMockPacketWriterFactory::Create(
234 QuicConnection* /*connection*/) const {
235 return new testing::NiceMock<MockPacketWriter>();
236}
[email protected]6d515822014-08-22 01:58:06237
rtenneti6f48aa92015-03-16 02:18:48238MockConnection::MockConnection(Perspective perspective)
rchc0815442015-04-18 13:29:46239 : MockConnection(perspective,
240 /* is_secure= */ false) {
rtenneti8696cf92014-11-14 21:12:12241}
242
rtenneti6f48aa92015-03-16 02:18:48243MockConnection::MockConnection(Perspective perspective, bool is_secure)
rchc0815442015-04-18 13:29:46244 : MockConnection(kTestConnectionId,
rtenneti8696cf92014-11-14 21:12:12245 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti6f48aa92015-03-16 02:18:48246 perspective,
rtenneti8696cf92014-11-14 21:12:12247 is_secure,
rchc0815442015-04-18 13:29:46248 QuicSupportedVersions()) {
[email protected]c05a6d222013-12-16 19:42:03249}
250
rtenneti6f48aa92015-03-16 02:18:48251MockConnection::MockConnection(IPEndPoint address, Perspective perspective)
rchc0815442015-04-18 13:29:46252 : MockConnection(kTestConnectionId,
rtenneti6f48aa92015-03-16 02:18:48253 address,
rtenneti6f48aa92015-03-16 02:18:48254 perspective,
rtenneti8696cf92014-11-14 21:12:12255 /* is_secure= */ false,
rchc0815442015-04-18 13:29:46256 QuicSupportedVersions()) {
[email protected]044ac2b2012-11-13 21:41:06257}
258
[email protected]3aa9ca72014-02-27 19:39:43259MockConnection::MockConnection(QuicConnectionId connection_id,
rtenneti6f48aa92015-03-16 02:18:48260 Perspective perspective)
rchc0815442015-04-18 13:29:46261 : MockConnection(connection_id,
rtenneti6f48aa92015-03-16 02:18:48262 perspective,
rchc0815442015-04-18 13:29:46263 /* is_secure= */ false) {
[email protected]872edd9e2013-01-16 08:51:15264}
265
rtennetifb3fa6c2015-03-16 23:04:55266MockConnection::MockConnection(QuicConnectionId connection_id,
267 Perspective perspective,
268 bool is_secure)
rchc0815442015-04-18 13:29:46269 : MockConnection(connection_id,
rtennetifb3fa6c2015-03-16 23:04:55270 IPEndPoint(TestPeerIPAddress(), kTestPort),
rchc0815442015-04-18 13:29:46271 perspective,
272 is_secure,
273 QuicSupportedVersions()) {
274}
275
276MockConnection::MockConnection(Perspective perspective,
277 const QuicVersionVector& supported_versions)
278 : MockConnection(kTestConnectionId,
279 IPEndPoint(TestPeerIPAddress(), kTestPort),
280 perspective,
281 /* is_secure= */ false,
282 supported_versions) {
283}
284
285MockConnection::MockConnection(QuicConnectionId connection_id,
286 IPEndPoint address,
287 Perspective perspective,
288 bool is_secure,
289 const QuicVersionVector& supported_versions)
290 : QuicConnection(connection_id,
291 address,
rtennetifb3fa6c2015-03-16 23:04:55292 new testing::NiceMock<MockHelper>(),
293 NiceMockPacketWriterFactory(),
294 /* owns_writer= */ true,
295 perspective,
296 is_secure,
rtennetie3779d832014-11-14 02:08:17297 supported_versions),
[email protected]4d640792013-12-18 22:21:08298 helper_(helper()) {
rchc0815442015-04-18 13:29:46299 ON_CALL(*this, OnError(_))
300 .WillByDefault(
301 Invoke(this, &PacketSavingConnection::QuicConnection_OnError));
[email protected]4d640792013-12-18 22:21:08302}
303
[email protected]044ac2b2012-11-13 21:41:06304MockConnection::~MockConnection() {
305}
306
[email protected]fe053f92013-04-23 20:18:55307void MockConnection::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55308 static_cast<MockHelper*>(helper())->AdvanceTime(delta);
309}
310
rtenneti6f48aa92015-03-16 02:18:48311PacketSavingConnection::PacketSavingConnection(Perspective perspective)
312 : MockConnection(perspective) {
[email protected]044ac2b2012-11-13 21:41:06313}
314
[email protected]4d640792013-12-18 22:21:08315PacketSavingConnection::PacketSavingConnection(
rtenneti6f48aa92015-03-16 02:18:48316 Perspective perspective,
[email protected]4d640792013-12-18 22:21:08317 const QuicVersionVector& supported_versions)
rtenneti6f48aa92015-03-16 02:18:48318 : MockConnection(perspective, supported_versions) {
[email protected]4d640792013-12-18 22:21:08319}
320
[email protected]044ac2b2012-11-13 21:41:06321PacketSavingConnection::~PacketSavingConnection() {
[email protected]2532de12013-05-09 12:29:33322 STLDeleteElements(&encrypted_packets_);
[email protected]044ac2b2012-11-13 21:41:06323}
324
rtenneti31e9fd62014-09-16 05:22:15325void PacketSavingConnection::SendOrQueuePacket(QueuedPacket packet) {
rtennetie0ee6eb2015-05-01 00:55:09326 if (!packet.serialized_packet.packet->owns_buffer()) {
327 scoped_ptr<QuicEncryptedPacket> encrypted_deleter(
328 packet.serialized_packet.packet);
329 packet.serialized_packet.packet = packet.serialized_packet.packet->Clone();
330 }
rtennetib6ac61a52015-02-11 20:20:52331 encrypted_packets_.push_back(packet.serialized_packet.packet);
rtenneti31e9fd62014-09-16 05:22:15332 // Transfer ownership of the packet to the SentPacketManager and the
333 // ack notifier to the AckNotifierManager.
rtennetia4dcff92014-09-29 18:16:08334 sent_packet_manager_.OnPacketSent(
335 &packet.serialized_packet, 0, QuicTime::Zero(), 1000,
336 NOT_RETRANSMISSION, HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06337}
338
rtennetib865eb82015-06-17 20:21:46339MockQuicSpdySession::MockQuicSpdySession(QuicConnection* connection)
340 : QuicSpdySession(connection, DefaultQuicConfig()) {
rtennetid39bd762015-06-12 01:05:52341 crypto_stream_.reset(new QuicCryptoStream(this));
342 Initialize();
[email protected]bbb10072014-06-13 07:41:59343 ON_CALL(*this, WritevData(_, _, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07344 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06345}
346
rtennetib865eb82015-06-17 20:21:46347MockQuicSpdySession::~MockQuicSpdySession() {
[email protected]044ac2b2012-11-13 21:41:06348}
349
rtennetib865eb82015-06-17 20:21:46350TestQuicSpdyServerSession::TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52351 QuicConnection* connection,
352 const QuicConfig& config,
353 const QuicCryptoServerConfig* crypto_config)
rtennetib865eb82015-06-17 20:21:46354 : QuicSpdySession(connection, config) {
rtennetid39bd762015-06-12 01:05:52355 crypto_stream_.reset(new QuicCryptoServerStream(crypto_config, this));
356 Initialize();
[email protected]ccb34212014-07-18 09:27:50357}
[email protected]2532de12013-05-09 12:29:33358
rtennetib865eb82015-06-17 20:21:46359TestQuicSpdyServerSession::~TestQuicSpdyServerSession() {
[email protected]2532de12013-05-09 12:29:33360}
361
rtennetib865eb82015-06-17 20:21:46362QuicCryptoServerStream* TestQuicSpdyServerSession::GetCryptoStream() {
rtennetid39bd762015-06-12 01:05:52363 return crypto_stream_.get();
[email protected]2532de12013-05-09 12:29:33364}
365
rtennetib865eb82015-06-17 20:21:46366TestQuicSpdyClientSession::TestQuicSpdyClientSession(
367 QuicConnection* connection,
368 const QuicConfig& config,
369 const QuicServerId& server_id,
370 QuicCryptoClientConfig* crypto_config)
rtennetid39bd762015-06-12 01:05:52371 : QuicClientSessionBase(connection, config) {
372 crypto_stream_.reset(new QuicCryptoClientStream(
373 server_id, this, CryptoTestUtils::ProofVerifyContextForTesting(),
374 crypto_config));
375 Initialize();
[email protected]90f62f092014-03-24 02:41:23376}
377
rtennetib865eb82015-06-17 20:21:46378TestQuicSpdyClientSession::~TestQuicSpdyClientSession() {
379}
[email protected]90f62f092014-03-24 02:41:23380
rtennetib865eb82015-06-17 20:21:46381QuicCryptoClientStream* TestQuicSpdyClientSession::GetCryptoStream() {
rtennetid39bd762015-06-12 01:05:52382 return crypto_stream_.get();
rtennetia2ea9162015-05-15 19:26:44383}
384
[email protected]cbd731e2013-10-24 00:20:39385MockPacketWriter::MockPacketWriter() {
rtenneti493d90ef2015-09-14 04:43:11386 ON_CALL(*this, GetMaxPacketSize(_))
387 .WillByDefault(testing::Return(kMaxPacketSize));
[email protected]cbd731e2013-10-24 00:20:39388}
389
390MockPacketWriter::~MockPacketWriter() {
391}
392
[email protected]fee17f72013-02-03 07:47:41393MockSendAlgorithm::MockSendAlgorithm() {
[email protected]8d659e22013-01-19 04:26:10394}
395
[email protected]fee17f72013-02-03 07:47:41396MockSendAlgorithm::~MockSendAlgorithm() {
[email protected]8d659e22013-01-19 04:26:10397}
398
[email protected]3aa9ca72014-02-27 19:39:43399MockLossAlgorithm::MockLossAlgorithm() {
400}
401
402MockLossAlgorithm::~MockLossAlgorithm() {
403}
404
[email protected]97cf3022013-09-05 14:30:16405MockAckNotifierDelegate::MockAckNotifierDelegate() {
406}
407
408MockAckNotifierDelegate::~MockAckNotifierDelegate() {
409}
410
[email protected]a692ad9d2014-07-18 21:35:24411MockNetworkChangeVisitor::MockNetworkChangeVisitor() {
412}
413
414MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {
415}
416
[email protected]8b37a092012-10-18 21:53:49417namespace {
418
419string HexDumpWithMarks(const char* data, int length,
420 const bool* marks, int mark_length) {
421 static const char kHexChars[] = "0123456789abcdef";
422 static const int kColumns = 4;
423
424 const int kSizeLimit = 1024;
425 if (length > kSizeLimit || mark_length > kSizeLimit) {
426 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
427 length = min(length, kSizeLimit);
428 mark_length = min(mark_length, kSizeLimit);
429 }
430
431 string hex;
432 for (const char* row = data; length > 0;
433 row += kColumns, length -= kColumns) {
434 for (const char *p = row; p < row + 4; ++p) {
435 if (p < row + length) {
436 const bool mark =
437 (marks && (p - data) < mark_length && marks[p - data]);
438 hex += mark ? '*' : ' ';
439 hex += kHexChars[(*p & 0xf0) >> 4];
440 hex += kHexChars[*p & 0x0f];
441 hex += mark ? '*' : ' ';
442 } else {
443 hex += " ";
444 }
445 }
446 hex = hex + " ";
447
rtenneti6f48aa92015-03-16 02:18:48448 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
[email protected]8b37a092012-10-18 21:53:49449 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
rtenneti6f48aa92015-03-16 02:18:48450 }
[email protected]8b37a092012-10-18 21:53:49451
452 hex = hex + '\n';
453 }
454 return hex;
455}
456
457} // namespace
458
[email protected]300ccd52014-01-25 08:00:19459IPAddressNumber TestPeerIPAddress() { return Loopback4(); }
460
[email protected]b007e632013-10-28 08:39:25461QuicVersion QuicVersionMax() { return QuicSupportedVersions().front(); }
462
463QuicVersion QuicVersionMin() { return QuicSupportedVersions().back(); }
464
[email protected]c05a6d222013-12-16 19:42:03465IPAddressNumber Loopback4() {
[email protected]300ccd52014-01-25 08:00:19466 IPAddressNumber addr;
467 CHECK(ParseIPLiteralToNumber("127.0.0.1", &addr));
[email protected]c05a6d222013-12-16 19:42:03468 return addr;
469}
470
[email protected]730b35d72014-06-05 03:23:22471IPAddressNumber Loopback6() {
472 IPAddressNumber addr;
473 CHECK(ParseIPLiteralToNumber("::1", &addr));
474 return addr;
475}
476
rtennetie0ee6eb2015-05-01 00:55:09477IPAddressNumber Any4() {
478 IPAddressNumber any4;
479 CHECK(net::ParseIPLiteralToNumber("0.0.0.0", &any4));
480 return any4;
481}
482
[email protected]9bb57c72014-03-31 20:36:04483void GenerateBody(string* body, int length) {
484 body->clear();
485 body->reserve(length);
486 for (int i = 0; i < length; ++i) {
487 body->append(1, static_cast<char>(32 + i % (126 - 32)));
488 }
489}
490
rtennetia004d332015-08-28 06:44:57491QuicEncryptedPacket* ConstructEncryptedPacket(QuicConnectionId connection_id,
492 bool version_flag,
493 bool reset_flag,
494 QuicPacketNumber packet_number,
495 const string& data) {
rtenneti9e0fb502015-03-08 06:07:16496 return ConstructEncryptedPacket(
rtennetia004d332015-08-28 06:44:57497 connection_id, version_flag, reset_flag, packet_number, data,
498 PACKET_8BYTE_CONNECTION_ID, PACKET_6BYTE_PACKET_NUMBER);
rtenneti9e0fb502015-03-08 06:07:16499}
500
501QuicEncryptedPacket* ConstructEncryptedPacket(
502 QuicConnectionId connection_id,
503 bool version_flag,
504 bool reset_flag,
rtennetia004d332015-08-28 06:44:57505 QuicPacketNumber packet_number,
rtenneti9e0fb502015-03-08 06:07:16506 const string& data,
507 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57508 QuicPacketNumberLength packet_number_length) {
rchc0815442015-04-18 13:29:46509 return ConstructEncryptedPacket(connection_id, version_flag, reset_flag,
rtennetia004d332015-08-28 06:44:57510 packet_number, data, connection_id_length,
511 packet_number_length, nullptr);
rchc0815442015-04-18 13:29:46512}
513
514QuicEncryptedPacket* ConstructEncryptedPacket(
515 QuicConnectionId connection_id,
516 bool version_flag,
517 bool reset_flag,
rtennetia004d332015-08-28 06:44:57518 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46519 const string& data,
520 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57521 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46522 QuicVersionVector* versions) {
[email protected]ffc34bf2014-03-07 02:42:02523 QuicPacketHeader header;
524 header.public_header.connection_id = connection_id;
rtenneti9e0fb502015-03-08 06:07:16525 header.public_header.connection_id_length = connection_id_length;
[email protected]ffc34bf2014-03-07 02:42:02526 header.public_header.version_flag = version_flag;
527 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57528 header.public_header.packet_number_length = packet_number_length;
529 header.packet_packet_number = packet_number;
[email protected]ffc34bf2014-03-07 02:42:02530 header.entropy_flag = false;
531 header.entropy_hash = 0;
532 header.fec_flag = false;
533 header.is_in_fec_group = NOT_IN_FEC_GROUP;
534 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44535 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
[email protected]ffc34bf2014-03-07 02:42:02536 QuicFrame frame(&stream_frame);
537 QuicFrames frames;
538 frames.push_back(frame);
rchc0815442015-04-18 13:29:46539 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
540 QuicTime::Zero(), Perspective::IS_CLIENT);
541
[email protected]ffc34bf2014-03-07 02:42:02542 scoped_ptr<QuicPacket> packet(
rtennetib6ac61a52015-02-11 20:20:52543 BuildUnsizedDataPacket(&framer, header, frames));
rtennetibe635732014-10-02 22:51:42544 EXPECT_TRUE(packet != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09545 char buffer[kMaxPacketSize];
rtennetid7d78b02015-06-17 16:54:34546 scoped_ptr<QuicEncryptedPacket> encrypted(framer.EncryptPayload(
rtennetia004d332015-08-28 06:44:57547 ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize));
rtennetibe635732014-10-02 22:51:42548 EXPECT_TRUE(encrypted != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09549 return encrypted->Clone();
[email protected]ffc34bf2014-03-07 02:42:02550}
551
rchc0815442015-04-18 13:29:46552QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
553 QuicConnectionId connection_id,
554 bool version_flag,
555 bool reset_flag,
rtennetia004d332015-08-28 06:44:57556 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46557 const string& data,
558 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57559 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46560 QuicVersionVector* versions) {
561 QuicPacketHeader header;
562 header.public_header.connection_id = connection_id;
563 header.public_header.connection_id_length = connection_id_length;
564 header.public_header.version_flag = version_flag;
565 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57566 header.public_header.packet_number_length = packet_number_length;
567 header.packet_packet_number = packet_number;
rchc0815442015-04-18 13:29:46568 header.entropy_flag = false;
569 header.entropy_hash = 0;
570 header.fec_flag = false;
571 header.is_in_fec_group = NOT_IN_FEC_GROUP;
572 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44573 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
rtenneti85816fdf2015-05-25 03:01:10574 QuicFrame frame(&stream_frame);
rchc0815442015-04-18 13:29:46575 QuicFrames frames;
rtenneti85816fdf2015-05-25 03:01:10576 frames.push_back(frame);
577 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
rchc0815442015-04-18 13:29:46578 QuicTime::Zero(), Perspective::IS_CLIENT);
rtenneti85816fdf2015-05-25 03:01:10579
rchc0815442015-04-18 13:29:46580 scoped_ptr<QuicPacket> packet(
581 BuildUnsizedDataPacket(&framer, header, frames));
582 EXPECT_TRUE(packet != nullptr);
rtenneti85816fdf2015-05-25 03:01:10583
584 // Now set the packet's private flags byte to 0xFF, which is an invalid value.
585 reinterpret_cast<unsigned char*>(
586 packet->mutable_data())[GetStartOfEncryptedData(
rtennetia004d332015-08-28 06:44:57587 connection_id_length, version_flag, packet_number_length)] = 0xFF;
rtenneti85816fdf2015-05-25 03:01:10588
rtennetie0ee6eb2015-05-01 00:55:09589 char buffer[kMaxPacketSize];
rtennetid7d78b02015-06-17 16:54:34590 scoped_ptr<QuicEncryptedPacket> encrypted(framer.EncryptPayload(
rtennetia004d332015-08-28 06:44:57591 ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize));
rchc0815442015-04-18 13:29:46592 EXPECT_TRUE(encrypted != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09593 return encrypted->Clone();
rchc0815442015-04-18 13:29:46594}
595
[email protected]8b37a092012-10-18 21:53:49596void CompareCharArraysWithHexError(
597 const string& description,
598 const char* actual,
599 const int actual_len,
600 const char* expected,
601 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25602 EXPECT_EQ(actual_len, expected_len);
[email protected]8b37a092012-10-18 21:53:49603 const int min_len = min(actual_len, expected_len);
604 const int max_len = max(actual_len, expected_len);
[email protected]4356f0f2013-04-07 00:58:17605 scoped_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49606 bool identical = (actual_len == expected_len);
607 for (int i = 0; i < min_len; ++i) {
608 if (actual[i] != expected[i]) {
609 marks[i] = true;
610 identical = false;
611 } else {
612 marks[i] = false;
613 }
614 }
615 for (int i = min_len; i < max_len; ++i) {
616 marks[i] = true;
617 }
618 if (identical) return;
619 ADD_FAILURE()
620 << "Description:\n"
621 << description
622 << "\n\nExpected:\n"
623 << HexDumpWithMarks(expected, expected_len, marks.get(), max_len)
624 << "\nActual:\n"
625 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
626}
627
[email protected]b12764d2013-12-02 22:28:30628bool DecodeHexString(const base::StringPiece& hex, std::string* bytes) {
629 bytes->clear();
630 if (hex.empty())
631 return true;
632 std::vector<uint8> v;
633 if (!base::HexStringToBytes(hex.as_string(), &v))
634 return false;
635 if (!v.empty())
636 bytes->assign(reinterpret_cast<const char*>(&v[0]), v.size());
637 return true;
638}
639
[email protected]d3d15bf2013-01-30 02:51:54640static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43641 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33642 const CryptoHandshakeMessage& message,
643 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49644 CryptoFramer crypto_framer;
[email protected]dc2cc742012-10-21 13:56:13645 scoped_ptr<QuicData> data(crypto_framer.ConstructHandshakeMessage(message));
rtenneti6f48aa92015-03-16 02:18:48646 QuicFramer quic_framer(QuicSupportedVersions(), QuicTime::Zero(),
647 Perspective::IS_CLIENT);
[email protected]8b37a092012-10-18 21:53:49648
649 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43650 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03651 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33652 header.public_header.version_flag = should_include_version;
rtennetia004d332015-08-28 06:44:57653 header.packet_packet_number = 1;
[email protected]9db443912013-02-25 05:27:03654 header.entropy_flag = false;
655 header.entropy_hash = 0;
656 header.fec_flag = false;
[email protected]8b37a092012-10-18 21:53:49657 header.fec_group = 0;
658
[email protected]be24ab22012-10-22 03:01:52659 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
rtennetia4228ea2015-06-04 02:31:44660 data->AsStringPiece());
[email protected]8b37a092012-10-18 21:53:49661
[email protected]be24ab22012-10-22 03:01:52662 QuicFrame frame(&stream_frame);
663 QuicFrames frames;
664 frames.push_back(frame);
rtennetib6ac61a52015-02-11 20:20:52665 return BuildUnsizedDataPacket(&quic_framer, header, frames);
[email protected]8b37a092012-10-18 21:53:49666}
667
[email protected]3aa9ca72014-02-27 19:39:43668QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
669 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54670 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14671 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43672 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54673}
674
rtennetia004d332015-08-28 06:44:57675size_t GetPacketLengthForOneStream(QuicVersion version,
676 bool include_version,
677 QuicConnectionIdLength connection_id_length,
678 QuicPacketNumberLength packet_number_length,
679 InFecGroup is_in_fec_group,
680 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30681 *payload_length = 1;
682 const size_t stream_length =
[email protected]5dafdb62013-11-14 01:24:26683 NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17684 QuicPacketCreator::StreamFramePacketOverhead(
rtennetia004d332015-08-28 06:44:57685 PACKET_8BYTE_CONNECTION_ID, include_version, packet_number_length, 0u,
686 is_in_fec_group);
rtennetic14c8ab2015-06-18 05:47:40687 const size_t ack_length =
688 NullEncrypter().GetCiphertextSize(
rtennetia004d332015-08-28 06:44:57689 QuicFramer::GetMinAckFrameSize(PACKET_1BYTE_PACKET_NUMBER)) +
rtenneti23186682014-10-30 01:49:33690 GetPacketHeaderSize(connection_id_length, include_version,
rtennetia004d332015-08-28 06:44:57691 packet_number_length, is_in_fec_group);
[email protected]f62262b2013-07-05 20:57:30692 if (stream_length < ack_length) {
693 *payload_length = 1 + ack_length - stream_length;
694 }
695
[email protected]5dafdb62013-11-14 01:24:26696 return NullEncrypter().GetCiphertextSize(*payload_length) +
rtennetia004d332015-08-28 06:44:57697 QuicPacketCreator::StreamFramePacketOverhead(
698 connection_id_length, include_version, packet_number_length, 0u,
699 is_in_fec_group);
[email protected]5351cc4b2013-03-03 07:22:41700}
701
[email protected]a5b98172014-06-18 07:01:59702TestEntropyCalculator::TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31703
[email protected]a5b98172014-06-18 07:01:59704TestEntropyCalculator::~TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31705
[email protected]48878092013-07-26 14:51:56706QuicPacketEntropyHash TestEntropyCalculator::EntropyHash(
rtennetia004d332015-08-28 06:44:57707 QuicPacketNumber packet_number) const {
[email protected]9db443912013-02-25 05:27:03708 return 1u;
709}
710
[email protected]a5b98172014-06-18 07:01:59711MockEntropyCalculator::MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31712
[email protected]a5b98172014-06-18 07:01:59713MockEntropyCalculator::~MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31714
[email protected]b064310782013-05-30 21:12:17715QuicConfig DefaultQuicConfig() {
716 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21717 config.SetInitialStreamFlowControlWindowToSend(
718 kInitialStreamFlowControlWindowForTest);
719 config.SetInitialSessionFlowControlWindowToSend(
720 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17721 return config;
722}
723
rtennetia2ea9162015-05-15 19:26:44724QuicConfig DefaultQuicConfigStatelessRejects() {
725 QuicConfig config = DefaultQuicConfig();
726 QuicTagVector copt;
727 copt.push_back(kSREJ);
728 config.SetConnectionOptionsToSend(copt);
729 return config;
730}
731
[email protected]4d640792013-12-18 22:21:08732QuicVersionVector SupportedVersions(QuicVersion version) {
733 QuicVersionVector versions;
734 versions.push_back(version);
735 return versions;
736}
737
rtennetibe635732014-10-02 22:51:42738TestWriterFactory::TestWriterFactory() : current_writer_(nullptr) {}
[email protected]6d515822014-08-22 01:58:06739TestWriterFactory::~TestWriterFactory() {}
740
rchc99f380c2015-03-26 19:50:56741QuicPacketWriter* TestWriterFactory::Create(QuicPacketWriter* writer,
[email protected]6d515822014-08-22 01:58:06742 QuicConnection* connection) {
743 return new PerConnectionPacketWriter(this, writer, connection);
744}
745
746void TestWriterFactory::OnPacketSent(WriteResult result) {
rtennetibe635732014-10-02 22:51:42747 if (current_writer_ != nullptr && result.status == WRITE_STATUS_ERROR) {
[email protected]ca4e0d92014-08-22 16:33:22748 current_writer_->connection()->OnWriteError(result.error_code);
rtennetibe635732014-10-02 22:51:42749 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06750 }
751}
752
753void TestWriterFactory::Unregister(PerConnectionPacketWriter* writer) {
754 if (current_writer_ == writer) {
rtennetibe635732014-10-02 22:51:42755 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06756 }
757}
758
759TestWriterFactory::PerConnectionPacketWriter::PerConnectionPacketWriter(
760 TestWriterFactory* factory,
rchc99f380c2015-03-26 19:50:56761 QuicPacketWriter* writer,
[email protected]6d515822014-08-22 01:58:06762 QuicConnection* connection)
763 : QuicPerConnectionPacketWriter(writer, connection),
764 factory_(factory) {
765}
766
767TestWriterFactory::PerConnectionPacketWriter::~PerConnectionPacketWriter() {
768 factory_->Unregister(this);
769}
770
771WriteResult TestWriterFactory::PerConnectionPacketWriter::WritePacket(
772 const char* buffer,
773 size_t buf_len,
774 const IPAddressNumber& self_address,
775 const IPEndPoint& peer_address) {
rtennetibe635732014-10-02 22:51:42776 // A DCHECK(factory_current_writer_ == nullptr) would be wrong here -- this
777 // class may be used in a setting where connection()->OnPacketSent() is called
778 // in a different way, so TestWriterFactory::OnPacketSent might never be
779 // called.
[email protected]6d515822014-08-22 01:58:06780 factory_->current_writer_ = this;
rtennetia2ea9162015-05-15 19:26:44781 return tools::QuicPerConnectionPacketWriter::WritePacket(
782 buffer, buf_len, self_address, peer_address);
[email protected]6d515822014-08-22 01:58:06783}
784
rtenneti95293802015-03-27 18:59:23785MockQuicConnectionDebugVisitor::MockQuicConnectionDebugVisitor() {
786}
787
788MockQuicConnectionDebugVisitor::~MockQuicConnectionDebugVisitor() {
789}
790
rtennetid39bd762015-06-12 01:05:52791void CreateClientSessionForTest(QuicServerId server_id,
792 bool supports_stateless_rejects,
793 QuicTime::Delta connection_start_time,
794 QuicCryptoClientConfig* crypto_client_config,
795 PacketSavingConnection** client_connection,
rtennetib865eb82015-06-17 20:21:46796 TestQuicSpdyClientSession** client_session) {
rtennetia2ea9162015-05-15 19:26:44797 CHECK(crypto_client_config);
798 CHECK(client_connection);
799 CHECK(client_session);
rtennetia2ea9162015-05-15 19:26:44800 CHECK(!connection_start_time.IsZero())
801 << "Connections must start at non-zero times, otherwise the "
802 << "strike-register will be unhappy.";
803
804 QuicConfig config = supports_stateless_rejects
805 ? DefaultQuicConfigStatelessRejects()
806 : DefaultQuicConfig();
807 *client_connection = new PacketSavingConnection(Perspective::IS_CLIENT);
rtennetib865eb82015-06-17 20:21:46808 *client_session = new TestQuicSpdyClientSession(
809 *client_connection, config, server_id, crypto_client_config);
rtennetia2ea9162015-05-15 19:26:44810 (*client_connection)->AdvanceTime(connection_start_time);
811}
812
rtennetid39bd762015-06-12 01:05:52813void CreateServerSessionForTest(QuicServerId server_id,
814 QuicTime::Delta connection_start_time,
815 QuicCryptoServerConfig* server_crypto_config,
816 PacketSavingConnection** server_connection,
rtennetib865eb82015-06-17 20:21:46817 TestQuicSpdyServerSession** server_session) {
rtennetia2ea9162015-05-15 19:26:44818 CHECK(server_crypto_config);
819 CHECK(server_connection);
820 CHECK(server_session);
rtennetia2ea9162015-05-15 19:26:44821 CHECK(!connection_start_time.IsZero())
822 << "Connections must start at non-zero times, otherwise the "
823 << "strike-register will be unhappy.";
824
825 *server_connection = new PacketSavingConnection(Perspective::IS_SERVER);
rtennetib865eb82015-06-17 20:21:46826 *server_session = new TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52827 *server_connection, DefaultQuicConfig(), server_crypto_config);
rtennetia2ea9162015-05-15 19:26:44828
829 // We advance the clock initially because the default time is zero and the
830 // strike register worries that we've just overflowed a uint32 time.
831 (*server_connection)->AdvanceTime(connection_start_time);
832}
833
[email protected]8b37a092012-10-18 21:53:49834} // namespace test
[email protected]8b37a092012-10-18 21:53:49835} // namespace net