blob: bd4b6f524e86f2113249722bf5cb3823d2343670 [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
[email protected]a5b98172014-06-18 07:01:597#include "base/sha1.h"
[email protected]701bc892013-01-17 04:51:548#include "base/stl_util.h"
[email protected]b12764d2013-12-02 22:28:309#include "base/strings/string_number_conversions.h"
[email protected]8b37a092012-10-18 21:53:4910#include "net/quic/crypto/crypto_framer.h"
[email protected]6f54ab32013-03-02 17:43:3511#include "net/quic/crypto/crypto_handshake.h"
[email protected]872edd9e2013-01-16 08:51:1512#include "net/quic/crypto/crypto_utils.h"
[email protected]5351cc4b2013-03-03 07:22:4113#include "net/quic/crypto/null_encrypter.h"
[email protected]4df69842013-02-27 06:32:1614#include "net/quic/crypto/quic_decrypter.h"
15#include "net/quic/crypto/quic_encrypter.h"
rtenneti16a20772015-02-17 18:58:4816#include "net/quic/quic_data_writer.h"
[email protected]a57e0272013-04-26 07:31:4717#include "net/quic/quic_framer.h"
[email protected]5351cc4b2013-03-03 07:22:4118#include "net/quic/quic_packet_creator.h"
[email protected]79d13dcb2014-02-05 07:23:1319#include "net/quic/quic_utils.h"
rtennetid39bd762015-06-12 01:05:5220#include "net/quic/test_tools/crypto_test_utils.h"
[email protected]cbd731e2013-10-24 00:20:3921#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0422#include "net/spdy/spdy_frame_builder.h"
rchc99f380c2015-03-26 19:50:5623#include "net/tools/quic/quic_per_connection_packet_writer.h"
[email protected]8b37a092012-10-18 21:53:4924
[email protected]c244c5a12013-05-07 20:55:0425using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4926using std::max;
27using std::min;
28using std::string;
rchc0815442015-04-18 13:29:4629using testing::Invoke;
[email protected]bc356fe2014-06-19 11:14:1430using testing::_;
[email protected]8b37a092012-10-18 21:53:4931
32namespace net {
33namespace test {
[email protected]8b37a092012-10-18 21:53:4934
rtennetia004d332015-08-28 06:44:5735QuicAckFrame MakeAckFrame(QuicPacketNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4936 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3737 ack.largest_observed = largest_observed;
38 ack.entropy_hash = 0;
[email protected]fb35b0a2014-04-15 21:06:4939 return ack;
40}
41
rtennetia004d332015-08-28 06:44:5742QuicAckFrame MakeAckFrameWithNackRanges(size_t num_nack_ranges,
43 QuicPacketNumber least_unacked) {
[email protected]310d37b2014-08-02 06:15:3744 QuicAckFrame ack = MakeAckFrame(2 * num_nack_ranges + least_unacked);
[email protected]aa7e4ef2014-05-28 03:53:1545 // Add enough missing packets to get num_nack_ranges nack ranges.
rtennetia004d332015-08-28 06:44:5746 for (QuicPacketNumber i = 1; i < 2 * num_nack_ranges; i += 2) {
rtenneti493d90ef2015-09-14 04:43:1147 ack.missing_packets.Add(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1548 }
49 return ack;
50}
51
rtennetib6ac61a52015-02-11 20:20:5252QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
53 const QuicPacketHeader& header,
54 const QuicFrames& frames) {
[email protected]9cda5fd2014-06-03 10:20:2855 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
56 size_t packet_size = GetPacketHeaderSize(header);
57 for (size_t i = 0; i < frames.size(); ++i) {
58 DCHECK_LE(packet_size, max_plaintext_size);
59 bool first_frame = i == 0;
60 bool last_frame = i == frames.size() - 1;
61 const size_t frame_size = framer->GetSerializedFrameLength(
62 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
rtennetia004d332015-08-28 06:44:5763 header.is_in_fec_group, header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2864 DCHECK(frame_size);
65 packet_size += frame_size;
66 }
rtenneti16a20772015-02-17 18:58:4867 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
68}
69
70QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
71 const QuicPacketHeader& header,
72 const QuicFrames& frames,
73 size_t packet_size) {
74 char* buffer = new char[packet_size];
alyssarc39b80f2015-10-22 17:13:5875 size_t length = framer->BuildDataPacket(header, frames, buffer, packet_size);
76 DCHECK_NE(0u, length);
77 // Re-construct the data packet with data ownership.
78 return new QuicPacket(buffer, length, /* owns_buffer */ true,
rtenneti16a20772015-02-17 18:58:4879 header.public_header.connection_id_length,
80 header.public_header.version_flag,
rtennetia004d332015-08-28 06:44:5781 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2882}
83
Avi Drissman13fc8932015-12-20 04:40:4684uint64_t SimpleRandom::RandUint64() {
[email protected]a5b98172014-06-18 07:01:5985 unsigned char hash[base::kSHA1Length];
86 base::SHA1HashBytes(reinterpret_cast<unsigned char*>(&seed_), sizeof(seed_),
87 hash);
88 memcpy(&seed_, hash, sizeof(seed_));
89 return seed_;
90}
91
[email protected]8b37a092012-10-18 21:53:4992MockFramerVisitor::MockFramerVisitor() {
93 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:3394 ON_CALL(*this, OnProtocolVersionMismatch(_))
95 .WillByDefault(testing::Return(false));
96
97 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:4998 ON_CALL(*this, OnUnauthenticatedHeader(_))
99 .WillByDefault(testing::Return(true));
100
[email protected]066d8182014-01-04 02:02:45101 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
102 .WillByDefault(testing::Return(true));
103
rjshaded5ced072015-12-18 19:26:02104 ON_CALL(*this, OnPacketHeader(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47105
rjshaded5ced072015-12-18 19:26:02106 ON_CALL(*this, OnStreamFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47107
rjshaded5ced072015-12-18 19:26:02108 ON_CALL(*this, OnAckFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47109
rjshaded5ced072015-12-18 19:26:02110 ON_CALL(*this, OnStopWaitingFrame(_)).WillByDefault(testing::Return(true));
[email protected]93dd91f2014-02-27 00:09:03111
rjshaded5ced072015-12-18 19:26:02112 ON_CALL(*this, OnPingFrame(_)).WillByDefault(testing::Return(true));
[email protected]d8c522112014-04-23 09:23:25113
rjshaded5ced072015-12-18 19:26:02114 ON_CALL(*this, OnRstStreamFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47115
116 ON_CALL(*this, OnConnectionCloseFrame(_))
117 .WillByDefault(testing::Return(true));
118
rjshaded5ced072015-12-18 19:26:02119 ON_CALL(*this, OnGoAwayFrame(_)).WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49120}
121
rtenneti021e8822015-10-18 23:59:57122MockFramerVisitor::~MockFramerVisitor() {}
[email protected]8b37a092012-10-18 21:53:49123
[email protected]48878092013-07-26 14:51:56124bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33125 return false;
126}
127
[email protected]066d8182014-01-04 02:02:45128bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
129 const QuicPacketPublicHeader& header) {
130 return true;
131}
132
[email protected]ec86d5462013-11-17 16:04:49133bool NoOpFramerVisitor::OnUnauthenticatedHeader(
134 const QuicPacketHeader& header) {
135 return true;
136}
137
[email protected]8b37a092012-10-18 21:53:49138bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
139 return true;
140}
141
[email protected]a57e0272013-04-26 07:31:47142bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
143 return true;
144}
145
146bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
147 return true;
148}
149
rjshaded5ced072015-12-18 19:26:02150bool NoOpFramerVisitor::OnStopWaitingFrame(const QuicStopWaitingFrame& frame) {
[email protected]93dd91f2014-02-27 00:09:03151 return true;
152}
153
[email protected]d8c522112014-04-23 09:23:25154bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
155 return true;
156}
157
rjshaded5ced072015-12-18 19:26:02158bool NoOpFramerVisitor::OnRstStreamFrame(const QuicRstStreamFrame& frame) {
[email protected]a57e0272013-04-26 07:31:47159 return true;
160}
161
162bool NoOpFramerVisitor::OnConnectionCloseFrame(
163 const QuicConnectionCloseFrame& frame) {
164 return true;
165}
166
167bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
168 return true;
169}
170
[email protected]cb23a922014-02-20 17:42:38171bool NoOpFramerVisitor::OnWindowUpdateFrame(
172 const QuicWindowUpdateFrame& frame) {
173 return true;
174}
175
176bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
177 return true;
178}
179
rtenneti021e8822015-10-18 23:59:57180MockConnectionVisitor::MockConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10181
rtenneti021e8822015-10-18 23:59:57182MockConnectionVisitor::~MockConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10183
rch99b644c2015-11-04 05:25:28184MockConnectionHelper::MockConnectionHelper() {}
[email protected]9c0b1352012-11-04 00:03:27185
rch99b644c2015-11-04 05:25:28186MockConnectionHelper::~MockConnectionHelper() {}
[email protected]9c0b1352012-11-04 00:03:27187
rch99b644c2015-11-04 05:25:28188const QuicClock* MockConnectionHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27189 return &clock_;
190}
191
rch99b644c2015-11-04 05:25:28192QuicRandom* MockConnectionHelper::GetRandomGenerator() {
[email protected]9558c5d32012-12-22 00:08:14193 return &random_generator_;
194}
195
rch99b644c2015-11-04 05:25:28196QuicAlarm* MockConnectionHelper::CreateAlarm(QuicAlarm::Delegate* delegate) {
zhongyi4a9d27b2016-01-12 20:08:31197 return new MockConnectionHelper::TestAlarm(delegate);
[email protected]965dbe62013-08-09 21:34:31198}
199
jdorfman5a606722016-01-04 17:41:29200QuicBufferAllocator* MockConnectionHelper::GetBufferAllocator() {
201 return &buffer_allocator_;
202}
203
rch99b644c2015-11-04 05:25:28204void MockConnectionHelper::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55205 clock_.AdvanceTime(delta);
206}
207
rtenneti3fe4ebbc2014-11-16 16:43:47208QuicPacketWriter* NiceMockPacketWriterFactory::Create(
209 QuicConnection* /*connection*/) const {
210 return new testing::NiceMock<MockPacketWriter>();
211}
[email protected]6d515822014-08-22 01:58:06212
rch99b644c2015-11-04 05:25:28213MockConnection::MockConnection(MockConnectionHelper* helper,
214 Perspective perspective)
rchc0815442015-04-18 13:29:46215 : MockConnection(kTestConnectionId,
rtenneti8696cf92014-11-14 21:12:12216 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51217 helper,
rtenneti6f48aa92015-03-16 02:18:48218 perspective,
rtenneti8a4a0732015-10-18 00:45:51219 QuicSupportedVersions()) {}
[email protected]c05a6d222013-12-16 19:42:03220
rtenneti8a4a0732015-10-18 00:45:51221MockConnection::MockConnection(IPEndPoint address,
rch99b644c2015-11-04 05:25:28222 MockConnectionHelper* helper,
rtenneti8a4a0732015-10-18 00:45:51223 Perspective perspective)
rchc0815442015-04-18 13:29:46224 : MockConnection(kTestConnectionId,
rtenneti6f48aa92015-03-16 02:18:48225 address,
rtenneti8a4a0732015-10-18 00:45:51226 helper,
rtenneti6f48aa92015-03-16 02:18:48227 perspective,
rtenneti8a4a0732015-10-18 00:45:51228 QuicSupportedVersions()) {}
[email protected]044ac2b2012-11-13 21:41:06229
[email protected]3aa9ca72014-02-27 19:39:43230MockConnection::MockConnection(QuicConnectionId connection_id,
rch99b644c2015-11-04 05:25:28231 MockConnectionHelper* helper,
rtenneti6f48aa92015-03-16 02:18:48232 Perspective perspective)
rchc0815442015-04-18 13:29:46233 : MockConnection(connection_id,
rtennetifb3fa6c2015-03-16 23:04:55234 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51235 helper,
rchc0815442015-04-18 13:29:46236 perspective,
rtenneti8a4a0732015-10-18 00:45:51237 QuicSupportedVersions()) {}
rchc0815442015-04-18 13:29:46238
rch99b644c2015-11-04 05:25:28239MockConnection::MockConnection(MockConnectionHelper* helper,
rtenneti8a4a0732015-10-18 00:45:51240 Perspective perspective,
rchc0815442015-04-18 13:29:46241 const QuicVersionVector& supported_versions)
242 : MockConnection(kTestConnectionId,
243 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51244 helper,
rchc0815442015-04-18 13:29:46245 perspective,
rtenneti8a4a0732015-10-18 00:45:51246 supported_versions) {}
rchc0815442015-04-18 13:29:46247
248MockConnection::MockConnection(QuicConnectionId connection_id,
249 IPEndPoint address,
rch99b644c2015-11-04 05:25:28250 MockConnectionHelper* helper,
rchc0815442015-04-18 13:29:46251 Perspective perspective,
rchc0815442015-04-18 13:29:46252 const QuicVersionVector& supported_versions)
253 : QuicConnection(connection_id,
254 address,
rtenneti8a4a0732015-10-18 00:45:51255 helper,
rtennetifb3fa6c2015-03-16 23:04:55256 NiceMockPacketWriterFactory(),
257 /* owns_writer= */ true,
258 perspective,
rtenneti8a4a0732015-10-18 00:45:51259 supported_versions) {
rchc0815442015-04-18 13:29:46260 ON_CALL(*this, OnError(_))
261 .WillByDefault(
262 Invoke(this, &PacketSavingConnection::QuicConnection_OnError));
[email protected]4d640792013-12-18 22:21:08263}
264
rtenneti021e8822015-10-18 23:59:57265MockConnection::~MockConnection() {}
[email protected]044ac2b2012-11-13 21:41:06266
[email protected]fe053f92013-04-23 20:18:55267void MockConnection::AdvanceTime(QuicTime::Delta delta) {
rch99b644c2015-11-04 05:25:28268 static_cast<MockConnectionHelper*>(helper())->AdvanceTime(delta);
[email protected]fe053f92013-04-23 20:18:55269}
270
rch99b644c2015-11-04 05:25:28271PacketSavingConnection::PacketSavingConnection(MockConnectionHelper* helper,
rtenneti8a4a0732015-10-18 00:45:51272 Perspective perspective)
273 : MockConnection(helper, perspective) {}
[email protected]044ac2b2012-11-13 21:41:06274
[email protected]4d640792013-12-18 22:21:08275PacketSavingConnection::PacketSavingConnection(
rch99b644c2015-11-04 05:25:28276 MockConnectionHelper* helper,
rtenneti6f48aa92015-03-16 02:18:48277 Perspective perspective,
[email protected]4d640792013-12-18 22:21:08278 const QuicVersionVector& supported_versions)
rtenneti8a4a0732015-10-18 00:45:51279 : MockConnection(helper, perspective, supported_versions) {}
[email protected]4d640792013-12-18 22:21:08280
[email protected]044ac2b2012-11-13 21:41:06281PacketSavingConnection::~PacketSavingConnection() {
[email protected]2532de12013-05-09 12:29:33282 STLDeleteElements(&encrypted_packets_);
[email protected]044ac2b2012-11-13 21:41:06283}
284
zhongyi4a9d27b2016-01-12 20:08:31285void PacketSavingConnection::SendOrQueuePacket(SerializedPacket* packet) {
286 if (!packet->packet->owns_buffer()) {
287 scoped_ptr<QuicEncryptedPacket> encrypted_deleter(packet->packet);
288 packet->packet = packet->packet->Clone();
rtennetie0ee6eb2015-05-01 00:55:09289 }
zhongyi4a9d27b2016-01-12 20:08:31290 encrypted_packets_.push_back(packet->packet);
rtenneti31e9fd62014-09-16 05:22:15291 // Transfer ownership of the packet to the SentPacketManager and the
292 // ack notifier to the AckNotifierManager.
zhongyi4a9d27b2016-01-12 20:08:31293 sent_packet_manager_.OnPacketSent(packet, 0, QuicTime::Zero(), 1000,
294 NOT_RETRANSMISSION,
rjshaded5ced072015-12-18 19:26:02295 HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06296}
297
rtennetib865eb82015-06-17 20:21:46298MockQuicSpdySession::MockQuicSpdySession(QuicConnection* connection)
299 : QuicSpdySession(connection, DefaultQuicConfig()) {
rtennetid39bd762015-06-12 01:05:52300 crypto_stream_.reset(new QuicCryptoStream(this));
301 Initialize();
[email protected]bbb10072014-06-13 07:41:59302 ON_CALL(*this, WritevData(_, _, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07303 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06304}
305
rtenneti021e8822015-10-18 23:59:57306MockQuicSpdySession::~MockQuicSpdySession() {}
[email protected]044ac2b2012-11-13 21:41:06307
jokulik2324d282015-12-08 21:42:57308// static
309QuicConsumedData MockQuicSpdySession::ConsumeAllData(
310 QuicStreamId /*id*/,
311 const QuicIOVector& data,
312 QuicStreamOffset /*offset*/,
313 bool fin,
314 FecProtection /*fec_protection*/,
315 QuicAckListenerInterface* /*ack_notifier_delegate*/) {
316 return QuicConsumedData(data.total_length, fin);
317}
318
rtennetib865eb82015-06-17 20:21:46319TestQuicSpdyServerSession::TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52320 QuicConnection* connection,
321 const QuicConfig& config,
322 const QuicCryptoServerConfig* crypto_config)
jokulikc971baf92016-01-06 00:36:39323 : QuicServerSessionBase(config, connection, &visitor_, crypto_config) {
rtennetid39bd762015-06-12 01:05:52324 Initialize();
[email protected]ccb34212014-07-18 09:27:50325}
[email protected]2532de12013-05-09 12:29:33326
rtenneti021e8822015-10-18 23:59:57327TestQuicSpdyServerSession::~TestQuicSpdyServerSession() {}
[email protected]2532de12013-05-09 12:29:33328
jokulikc971baf92016-01-06 00:36:39329QuicCryptoServerStreamBase*
330TestQuicSpdyServerSession::CreateQuicCryptoServerStream(
331 const QuicCryptoServerConfig* crypto_config) {
332 return new QuicCryptoServerStream(crypto_config, this);
333}
334
rtennetib865eb82015-06-17 20:21:46335QuicCryptoServerStream* TestQuicSpdyServerSession::GetCryptoStream() {
zhongyib8677022015-12-01 05:51:30336 return static_cast<QuicCryptoServerStream*>(
jokulikc971baf92016-01-06 00:36:39337 QuicServerSessionBase::GetCryptoStream());
[email protected]2532de12013-05-09 12:29:33338}
339
rtennetib865eb82015-06-17 20:21:46340TestQuicSpdyClientSession::TestQuicSpdyClientSession(
341 QuicConnection* connection,
342 const QuicConfig& config,
343 const QuicServerId& server_id,
344 QuicCryptoClientConfig* crypto_config)
rtennetid39bd762015-06-12 01:05:52345 : QuicClientSessionBase(connection, config) {
346 crypto_stream_.reset(new QuicCryptoClientStream(
347 server_id, this, CryptoTestUtils::ProofVerifyContextForTesting(),
348 crypto_config));
349 Initialize();
[email protected]90f62f092014-03-24 02:41:23350}
351
rtenneti021e8822015-10-18 23:59:57352TestQuicSpdyClientSession::~TestQuicSpdyClientSession() {}
[email protected]90f62f092014-03-24 02:41:23353
rtennetib865eb82015-06-17 20:21:46354QuicCryptoClientStream* TestQuicSpdyClientSession::GetCryptoStream() {
rtennetid39bd762015-06-12 01:05:52355 return crypto_stream_.get();
rtennetia2ea9162015-05-15 19:26:44356}
357
[email protected]cbd731e2013-10-24 00:20:39358MockPacketWriter::MockPacketWriter() {
rtenneti493d90ef2015-09-14 04:43:11359 ON_CALL(*this, GetMaxPacketSize(_))
360 .WillByDefault(testing::Return(kMaxPacketSize));
[email protected]cbd731e2013-10-24 00:20:39361}
362
rtenneti021e8822015-10-18 23:59:57363MockPacketWriter::~MockPacketWriter() {}
[email protected]cbd731e2013-10-24 00:20:39364
rtenneti021e8822015-10-18 23:59:57365MockSendAlgorithm::MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10366
rtenneti021e8822015-10-18 23:59:57367MockSendAlgorithm::~MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10368
rtenneti021e8822015-10-18 23:59:57369MockLossAlgorithm::MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43370
rtenneti021e8822015-10-18 23:59:57371MockLossAlgorithm::~MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43372
ckrasicea295fe2015-10-31 05:03:27373MockAckListener::MockAckListener() {}
[email protected]97cf3022013-09-05 14:30:16374
ckrasicea295fe2015-10-31 05:03:27375MockAckListener::~MockAckListener() {}
[email protected]97cf3022013-09-05 14:30:16376
rtenneti021e8822015-10-18 23:59:57377MockNetworkChangeVisitor::MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24378
rtenneti021e8822015-10-18 23:59:57379MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24380
[email protected]8b37a092012-10-18 21:53:49381namespace {
382
rjshaded5ced072015-12-18 19:26:02383string HexDumpWithMarks(const char* data,
384 int length,
385 const bool* marks,
386 int mark_length) {
[email protected]8b37a092012-10-18 21:53:49387 static const char kHexChars[] = "0123456789abcdef";
388 static const int kColumns = 4;
389
390 const int kSizeLimit = 1024;
391 if (length > kSizeLimit || mark_length > kSizeLimit) {
392 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
393 length = min(length, kSizeLimit);
394 mark_length = min(mark_length, kSizeLimit);
395 }
396
397 string hex;
rjshaded5ced072015-12-18 19:26:02398 for (const char *row = data; length > 0;
[email protected]8b37a092012-10-18 21:53:49399 row += kColumns, length -= kColumns) {
rjshaded5ced072015-12-18 19:26:02400 for (const char* p = row; p < row + 4; ++p) {
[email protected]8b37a092012-10-18 21:53:49401 if (p < row + length) {
402 const bool mark =
403 (marks && (p - data) < mark_length && marks[p - data]);
404 hex += mark ? '*' : ' ';
405 hex += kHexChars[(*p & 0xf0) >> 4];
406 hex += kHexChars[*p & 0x0f];
407 hex += mark ? '*' : ' ';
408 } else {
409 hex += " ";
410 }
411 }
412 hex = hex + " ";
413
rtenneti6f48aa92015-03-16 02:18:48414 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
[email protected]8b37a092012-10-18 21:53:49415 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
rtenneti6f48aa92015-03-16 02:18:48416 }
[email protected]8b37a092012-10-18 21:53:49417
418 hex = hex + '\n';
419 }
420 return hex;
421}
422
423} // namespace
424
rjshaded5ced072015-12-18 19:26:02425IPAddressNumber TestPeerIPAddress() {
426 return Loopback4();
427}
[email protected]300ccd52014-01-25 08:00:19428
rjshaded5ced072015-12-18 19:26:02429QuicVersion QuicVersionMax() {
430 return QuicSupportedVersions().front();
431}
[email protected]b007e632013-10-28 08:39:25432
rjshaded5ced072015-12-18 19:26:02433QuicVersion QuicVersionMin() {
434 return QuicSupportedVersions().back();
435}
[email protected]b007e632013-10-28 08:39:25436
[email protected]c05a6d222013-12-16 19:42:03437IPAddressNumber Loopback4() {
[email protected]300ccd52014-01-25 08:00:19438 IPAddressNumber addr;
439 CHECK(ParseIPLiteralToNumber("127.0.0.1", &addr));
[email protected]c05a6d222013-12-16 19:42:03440 return addr;
441}
442
[email protected]730b35d72014-06-05 03:23:22443IPAddressNumber Loopback6() {
444 IPAddressNumber addr;
445 CHECK(ParseIPLiteralToNumber("::1", &addr));
446 return addr;
447}
448
rtennetie0ee6eb2015-05-01 00:55:09449IPAddressNumber Any4() {
450 IPAddressNumber any4;
451 CHECK(net::ParseIPLiteralToNumber("0.0.0.0", &any4));
452 return any4;
453}
454
[email protected]9bb57c72014-03-31 20:36:04455void GenerateBody(string* body, int length) {
456 body->clear();
457 body->reserve(length);
458 for (int i = 0; i < length; ++i) {
459 body->append(1, static_cast<char>(32 + i % (126 - 32)));
460 }
461}
462
rtennetia004d332015-08-28 06:44:57463QuicEncryptedPacket* ConstructEncryptedPacket(QuicConnectionId connection_id,
464 bool version_flag,
465 bool reset_flag,
466 QuicPacketNumber packet_number,
467 const string& data) {
rtenneti9e0fb502015-03-08 06:07:16468 return ConstructEncryptedPacket(
rtennetia004d332015-08-28 06:44:57469 connection_id, version_flag, reset_flag, packet_number, data,
470 PACKET_8BYTE_CONNECTION_ID, PACKET_6BYTE_PACKET_NUMBER);
rtenneti9e0fb502015-03-08 06:07:16471}
472
473QuicEncryptedPacket* ConstructEncryptedPacket(
474 QuicConnectionId connection_id,
475 bool version_flag,
476 bool reset_flag,
rtennetia004d332015-08-28 06:44:57477 QuicPacketNumber packet_number,
rtenneti9e0fb502015-03-08 06:07:16478 const string& data,
479 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57480 QuicPacketNumberLength packet_number_length) {
rchc0815442015-04-18 13:29:46481 return ConstructEncryptedPacket(connection_id, version_flag, reset_flag,
rtennetia004d332015-08-28 06:44:57482 packet_number, data, connection_id_length,
483 packet_number_length, nullptr);
rchc0815442015-04-18 13:29:46484}
485
486QuicEncryptedPacket* ConstructEncryptedPacket(
487 QuicConnectionId connection_id,
488 bool version_flag,
489 bool reset_flag,
rtennetia004d332015-08-28 06:44:57490 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46491 const string& data,
492 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57493 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46494 QuicVersionVector* versions) {
[email protected]ffc34bf2014-03-07 02:42:02495 QuicPacketHeader header;
496 header.public_header.connection_id = connection_id;
rtenneti9e0fb502015-03-08 06:07:16497 header.public_header.connection_id_length = connection_id_length;
[email protected]ffc34bf2014-03-07 02:42:02498 header.public_header.version_flag = version_flag;
499 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57500 header.public_header.packet_number_length = packet_number_length;
rtenneti8dd12b22015-10-21 01:26:38501 header.packet_number = packet_number;
[email protected]ffc34bf2014-03-07 02:42:02502 header.entropy_flag = false;
503 header.entropy_hash = 0;
504 header.fec_flag = false;
505 header.is_in_fec_group = NOT_IN_FEC_GROUP;
506 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44507 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
[email protected]ffc34bf2014-03-07 02:42:02508 QuicFrame frame(&stream_frame);
509 QuicFrames frames;
510 frames.push_back(frame);
rchc0815442015-04-18 13:29:46511 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
512 QuicTime::Zero(), Perspective::IS_CLIENT);
513
[email protected]ffc34bf2014-03-07 02:42:02514 scoped_ptr<QuicPacket> packet(
rtennetib6ac61a52015-02-11 20:20:52515 BuildUnsizedDataPacket(&framer, header, frames));
rtennetibe635732014-10-02 22:51:42516 EXPECT_TRUE(packet != nullptr);
rch99b644c2015-11-04 05:25:28517 char* buffer = new char[kMaxPacketSize];
518 size_t encrypted_length = framer.EncryptPayload(
519 ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize);
520 EXPECT_NE(0u, encrypted_length);
521 return new QuicEncryptedPacket(buffer, encrypted_length, true);
[email protected]ffc34bf2014-03-07 02:42:02522}
523
rchc0815442015-04-18 13:29:46524QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
525 QuicConnectionId connection_id,
526 bool version_flag,
527 bool reset_flag,
rtennetia004d332015-08-28 06:44:57528 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46529 const string& data,
530 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57531 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46532 QuicVersionVector* versions) {
533 QuicPacketHeader header;
534 header.public_header.connection_id = connection_id;
535 header.public_header.connection_id_length = connection_id_length;
536 header.public_header.version_flag = version_flag;
537 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57538 header.public_header.packet_number_length = packet_number_length;
rtenneti8dd12b22015-10-21 01:26:38539 header.packet_number = packet_number;
rchc0815442015-04-18 13:29:46540 header.entropy_flag = false;
541 header.entropy_hash = 0;
542 header.fec_flag = false;
543 header.is_in_fec_group = NOT_IN_FEC_GROUP;
544 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44545 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
rtenneti85816fdf2015-05-25 03:01:10546 QuicFrame frame(&stream_frame);
rchc0815442015-04-18 13:29:46547 QuicFrames frames;
rtenneti85816fdf2015-05-25 03:01:10548 frames.push_back(frame);
549 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
rchc0815442015-04-18 13:29:46550 QuicTime::Zero(), Perspective::IS_CLIENT);
rtenneti85816fdf2015-05-25 03:01:10551
rchc0815442015-04-18 13:29:46552 scoped_ptr<QuicPacket> packet(
553 BuildUnsizedDataPacket(&framer, header, frames));
554 EXPECT_TRUE(packet != nullptr);
rtenneti85816fdf2015-05-25 03:01:10555
556 // Now set the packet's private flags byte to 0xFF, which is an invalid value.
557 reinterpret_cast<unsigned char*>(
558 packet->mutable_data())[GetStartOfEncryptedData(
rtennetia004d332015-08-28 06:44:57559 connection_id_length, version_flag, packet_number_length)] = 0xFF;
rtenneti85816fdf2015-05-25 03:01:10560
rch99b644c2015-11-04 05:25:28561 char* buffer = new char[kMaxPacketSize];
562 size_t encrypted_length = framer.EncryptPayload(
563 ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize);
564 EXPECT_NE(0u, encrypted_length);
565 return new QuicEncryptedPacket(buffer, encrypted_length, true);
rchc0815442015-04-18 13:29:46566}
567
rjshaded5ced072015-12-18 19:26:02568void CompareCharArraysWithHexError(const string& description,
569 const char* actual,
570 const int actual_len,
571 const char* expected,
572 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25573 EXPECT_EQ(actual_len, expected_len);
[email protected]8b37a092012-10-18 21:53:49574 const int min_len = min(actual_len, expected_len);
575 const int max_len = max(actual_len, expected_len);
[email protected]4356f0f2013-04-07 00:58:17576 scoped_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49577 bool identical = (actual_len == expected_len);
578 for (int i = 0; i < min_len; ++i) {
579 if (actual[i] != expected[i]) {
580 marks[i] = true;
581 identical = false;
582 } else {
583 marks[i] = false;
584 }
585 }
586 for (int i = min_len; i < max_len; ++i) {
587 marks[i] = true;
588 }
rjshaded5ced072015-12-18 19:26:02589 if (identical)
590 return;
591 ADD_FAILURE() << "Description:\n" << description << "\n\nExpected:\n"
592 << HexDumpWithMarks(expected, expected_len, marks.get(),
593 max_len)
594 << "\nActual:\n"
595 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
[email protected]8b37a092012-10-18 21:53:49596}
597
[email protected]b12764d2013-12-02 22:28:30598bool DecodeHexString(const base::StringPiece& hex, std::string* bytes) {
599 bytes->clear();
600 if (hex.empty())
601 return true;
Avi Drissman13fc8932015-12-20 04:40:46602 std::vector<uint8_t> v;
[email protected]b12764d2013-12-02 22:28:30603 if (!base::HexStringToBytes(hex.as_string(), &v))
604 return false;
605 if (!v.empty())
606 bytes->assign(reinterpret_cast<const char*>(&v[0]), v.size());
607 return true;
608}
609
[email protected]d3d15bf2013-01-30 02:51:54610static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43611 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33612 const CryptoHandshakeMessage& message,
613 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49614 CryptoFramer crypto_framer;
[email protected]dc2cc742012-10-21 13:56:13615 scoped_ptr<QuicData> data(crypto_framer.ConstructHandshakeMessage(message));
rtenneti6f48aa92015-03-16 02:18:48616 QuicFramer quic_framer(QuicSupportedVersions(), QuicTime::Zero(),
617 Perspective::IS_CLIENT);
[email protected]8b37a092012-10-18 21:53:49618
619 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43620 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03621 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33622 header.public_header.version_flag = should_include_version;
rtenneti8dd12b22015-10-21 01:26:38623 header.packet_number = 1;
[email protected]9db443912013-02-25 05:27:03624 header.entropy_flag = false;
625 header.entropy_hash = 0;
626 header.fec_flag = false;
[email protected]8b37a092012-10-18 21:53:49627 header.fec_group = 0;
628
[email protected]be24ab22012-10-22 03:01:52629 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
rtennetia4228ea2015-06-04 02:31:44630 data->AsStringPiece());
[email protected]8b37a092012-10-18 21:53:49631
[email protected]be24ab22012-10-22 03:01:52632 QuicFrame frame(&stream_frame);
633 QuicFrames frames;
634 frames.push_back(frame);
rtennetib6ac61a52015-02-11 20:20:52635 return BuildUnsizedDataPacket(&quic_framer, header, frames);
[email protected]8b37a092012-10-18 21:53:49636}
637
[email protected]3aa9ca72014-02-27 19:39:43638QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
639 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54640 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14641 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43642 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54643}
644
rtennetia004d332015-08-28 06:44:57645size_t GetPacketLengthForOneStream(QuicVersion version,
646 bool include_version,
647 QuicConnectionIdLength connection_id_length,
648 QuicPacketNumberLength packet_number_length,
649 InFecGroup is_in_fec_group,
650 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30651 *payload_length = 1;
652 const size_t stream_length =
[email protected]5dafdb62013-11-14 01:24:26653 NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17654 QuicPacketCreator::StreamFramePacketOverhead(
rtennetia004d332015-08-28 06:44:57655 PACKET_8BYTE_CONNECTION_ID, include_version, packet_number_length, 0u,
656 is_in_fec_group);
rtennetic14c8ab2015-06-18 05:47:40657 const size_t ack_length =
658 NullEncrypter().GetCiphertextSize(
rtennetia004d332015-08-28 06:44:57659 QuicFramer::GetMinAckFrameSize(PACKET_1BYTE_PACKET_NUMBER)) +
rtenneti23186682014-10-30 01:49:33660 GetPacketHeaderSize(connection_id_length, include_version,
zhongyib8677022015-12-01 05:51:30661 /*include_path_id=*/false, packet_number_length,
662 is_in_fec_group);
[email protected]f62262b2013-07-05 20:57:30663 if (stream_length < ack_length) {
664 *payload_length = 1 + ack_length - stream_length;
665 }
666
[email protected]5dafdb62013-11-14 01:24:26667 return NullEncrypter().GetCiphertextSize(*payload_length) +
rtennetia004d332015-08-28 06:44:57668 QuicPacketCreator::StreamFramePacketOverhead(
669 connection_id_length, include_version, packet_number_length, 0u,
670 is_in_fec_group);
[email protected]5351cc4b2013-03-03 07:22:41671}
672
[email protected]a5b98172014-06-18 07:01:59673TestEntropyCalculator::TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31674
[email protected]a5b98172014-06-18 07:01:59675TestEntropyCalculator::~TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31676
[email protected]48878092013-07-26 14:51:56677QuicPacketEntropyHash TestEntropyCalculator::EntropyHash(
rtennetia004d332015-08-28 06:44:57678 QuicPacketNumber packet_number) const {
[email protected]9db443912013-02-25 05:27:03679 return 1u;
680}
681
[email protected]a5b98172014-06-18 07:01:59682MockEntropyCalculator::MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31683
[email protected]a5b98172014-06-18 07:01:59684MockEntropyCalculator::~MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31685
[email protected]b064310782013-05-30 21:12:17686QuicConfig DefaultQuicConfig() {
687 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21688 config.SetInitialStreamFlowControlWindowToSend(
689 kInitialStreamFlowControlWindowForTest);
690 config.SetInitialSessionFlowControlWindowToSend(
691 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17692 return config;
693}
694
rtennetia2ea9162015-05-15 19:26:44695QuicConfig DefaultQuicConfigStatelessRejects() {
696 QuicConfig config = DefaultQuicConfig();
697 QuicTagVector copt;
698 copt.push_back(kSREJ);
699 config.SetConnectionOptionsToSend(copt);
700 return config;
701}
702
[email protected]4d640792013-12-18 22:21:08703QuicVersionVector SupportedVersions(QuicVersion version) {
704 QuicVersionVector versions;
705 versions.push_back(version);
706 return versions;
707}
708
rtennetibe635732014-10-02 22:51:42709TestWriterFactory::TestWriterFactory() : current_writer_(nullptr) {}
[email protected]6d515822014-08-22 01:58:06710TestWriterFactory::~TestWriterFactory() {}
711
rchc99f380c2015-03-26 19:50:56712QuicPacketWriter* TestWriterFactory::Create(QuicPacketWriter* writer,
[email protected]6d515822014-08-22 01:58:06713 QuicConnection* connection) {
714 return new PerConnectionPacketWriter(this, writer, connection);
715}
716
717void TestWriterFactory::OnPacketSent(WriteResult result) {
rtennetibe635732014-10-02 22:51:42718 if (current_writer_ != nullptr && result.status == WRITE_STATUS_ERROR) {
[email protected]ca4e0d92014-08-22 16:33:22719 current_writer_->connection()->OnWriteError(result.error_code);
rtennetibe635732014-10-02 22:51:42720 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06721 }
722}
723
724void TestWriterFactory::Unregister(PerConnectionPacketWriter* writer) {
725 if (current_writer_ == writer) {
rtennetibe635732014-10-02 22:51:42726 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06727 }
728}
729
730TestWriterFactory::PerConnectionPacketWriter::PerConnectionPacketWriter(
731 TestWriterFactory* factory,
rchc99f380c2015-03-26 19:50:56732 QuicPacketWriter* writer,
[email protected]6d515822014-08-22 01:58:06733 QuicConnection* connection)
rjshaded5ced072015-12-18 19:26:02734 : QuicPerConnectionPacketWriter(writer, connection), factory_(factory) {}
[email protected]6d515822014-08-22 01:58:06735
736TestWriterFactory::PerConnectionPacketWriter::~PerConnectionPacketWriter() {
737 factory_->Unregister(this);
738}
739
740WriteResult TestWriterFactory::PerConnectionPacketWriter::WritePacket(
741 const char* buffer,
742 size_t buf_len,
743 const IPAddressNumber& self_address,
744 const IPEndPoint& peer_address) {
rtennetibe635732014-10-02 22:51:42745 // A DCHECK(factory_current_writer_ == nullptr) would be wrong here -- this
746 // class may be used in a setting where connection()->OnPacketSent() is called
747 // in a different way, so TestWriterFactory::OnPacketSent might never be
748 // called.
[email protected]6d515822014-08-22 01:58:06749 factory_->current_writer_ = this;
rtennetia2ea9162015-05-15 19:26:44750 return tools::QuicPerConnectionPacketWriter::WritePacket(
751 buffer, buf_len, self_address, peer_address);
[email protected]6d515822014-08-22 01:58:06752}
753
rtenneti021e8822015-10-18 23:59:57754MockQuicConnectionDebugVisitor::MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23755
rtenneti021e8822015-10-18 23:59:57756MockQuicConnectionDebugVisitor::~MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23757
fayanga31a74b2015-12-28 17:27:14758MockReceivedPacketManager::MockReceivedPacketManager(QuicConnectionStats* stats)
759 : QuicReceivedPacketManager(stats) {}
760
761MockReceivedPacketManager::~MockReceivedPacketManager() {}
762
rtennetid39bd762015-06-12 01:05:52763void CreateClientSessionForTest(QuicServerId server_id,
764 bool supports_stateless_rejects,
765 QuicTime::Delta connection_start_time,
zhongyib8677022015-12-01 05:51:30766 QuicVersionVector supported_versions,
rch99b644c2015-11-04 05:25:28767 MockConnectionHelper* helper,
rtennetid39bd762015-06-12 01:05:52768 QuicCryptoClientConfig* crypto_client_config,
769 PacketSavingConnection** client_connection,
rtennetib865eb82015-06-17 20:21:46770 TestQuicSpdyClientSession** client_session) {
rtennetia2ea9162015-05-15 19:26:44771 CHECK(crypto_client_config);
772 CHECK(client_connection);
773 CHECK(client_session);
rtennetia2ea9162015-05-15 19:26:44774 CHECK(!connection_start_time.IsZero())
775 << "Connections must start at non-zero times, otherwise the "
776 << "strike-register will be unhappy.";
777
778 QuicConfig config = supports_stateless_rejects
779 ? DefaultQuicConfigStatelessRejects()
780 : DefaultQuicConfig();
zhongyib8677022015-12-01 05:51:30781 *client_connection = new PacketSavingConnection(
782 helper, Perspective::IS_CLIENT, supported_versions);
rtennetib865eb82015-06-17 20:21:46783 *client_session = new TestQuicSpdyClientSession(
784 *client_connection, config, server_id, crypto_client_config);
rtennetia2ea9162015-05-15 19:26:44785 (*client_connection)->AdvanceTime(connection_start_time);
786}
787
rtennetid39bd762015-06-12 01:05:52788void CreateServerSessionForTest(QuicServerId server_id,
789 QuicTime::Delta connection_start_time,
zhongyib8677022015-12-01 05:51:30790 QuicVersionVector supported_versions,
rch99b644c2015-11-04 05:25:28791 MockConnectionHelper* helper,
rtennetid39bd762015-06-12 01:05:52792 QuicCryptoServerConfig* server_crypto_config,
793 PacketSavingConnection** server_connection,
rtennetib865eb82015-06-17 20:21:46794 TestQuicSpdyServerSession** server_session) {
rtennetia2ea9162015-05-15 19:26:44795 CHECK(server_crypto_config);
796 CHECK(server_connection);
797 CHECK(server_session);
rtennetia2ea9162015-05-15 19:26:44798 CHECK(!connection_start_time.IsZero())
799 << "Connections must start at non-zero times, otherwise the "
800 << "strike-register will be unhappy.";
801
zhongyib8677022015-12-01 05:51:30802 *server_connection = new PacketSavingConnection(
803 helper, Perspective::IS_SERVER, supported_versions);
rtennetib865eb82015-06-17 20:21:46804 *server_session = new TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52805 *server_connection, DefaultQuicConfig(), server_crypto_config);
rtennetia2ea9162015-05-15 19:26:44806
807 // We advance the clock initially because the default time is zero and the
Avi Drissman13fc8932015-12-20 04:40:46808 // strike register worries that we've just overflowed a uint32_t time.
rtennetia2ea9162015-05-15 19:26:44809 (*server_connection)->AdvanceTime(connection_start_time);
810}
811
ckrasic99850b32015-10-16 21:15:58812QuicStreamId QuicClientDataStreamId(int i) {
813 return kClientDataStreamId1 + 2 * i;
814}
815
[email protected]8b37a092012-10-18 21:53:49816} // namespace test
[email protected]8b37a092012-10-18 21:53:49817} // namespace net