blob: 676a37dcac8a64212c2044e7c02c2a4a3cde46c7 [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
[email protected]a5b98172014-06-18 07:01:597#include "base/sha1.h"
[email protected]701bc892013-01-17 04:51:548#include "base/stl_util.h"
[email protected]b12764d2013-12-02 22:28:309#include "base/strings/string_number_conversions.h"
[email protected]8b37a092012-10-18 21:53:4910#include "net/quic/crypto/crypto_framer.h"
[email protected]6f54ab32013-03-02 17:43:3511#include "net/quic/crypto/crypto_handshake.h"
[email protected]872edd9e2013-01-16 08:51:1512#include "net/quic/crypto/crypto_utils.h"
[email protected]5351cc4b2013-03-03 07:22:4113#include "net/quic/crypto/null_encrypter.h"
[email protected]4df69842013-02-27 06:32:1614#include "net/quic/crypto/quic_decrypter.h"
15#include "net/quic/crypto/quic_encrypter.h"
rtenneti16a20772015-02-17 18:58:4816#include "net/quic/quic_data_writer.h"
[email protected]a57e0272013-04-26 07:31:4717#include "net/quic/quic_framer.h"
[email protected]5351cc4b2013-03-03 07:22:4118#include "net/quic/quic_packet_creator.h"
[email protected]79d13dcb2014-02-05 07:23:1319#include "net/quic/quic_utils.h"
[email protected]cbd731e2013-10-24 00:20:3920#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0421#include "net/spdy/spdy_frame_builder.h"
rchc99f380c2015-03-26 19:50:5622#include "net/tools/quic/quic_per_connection_packet_writer.h"
[email protected]8b37a092012-10-18 21:53:4923
[email protected]c244c5a12013-05-07 20:55:0424using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4925using std::max;
26using std::min;
27using std::string;
[email protected]64c12232014-03-26 05:43:5928using testing::AnyNumber;
rchc0815442015-04-18 13:29:4629using testing::Invoke;
[email protected]bc356fe2014-06-19 11:14:1430using testing::_;
[email protected]8b37a092012-10-18 21:53:4931
32namespace net {
33namespace test {
[email protected]965dbe62013-08-09 21:34:3134namespace {
35
36// No-op alarm implementation used by MockHelper.
37class TestAlarm : public QuicAlarm {
38 public:
39 explicit TestAlarm(QuicAlarm::Delegate* delegate)
40 : QuicAlarm(delegate) {
41 }
42
dchengb03027d2014-10-21 12:00:2043 void SetImpl() override {}
44 void CancelImpl() override {}
[email protected]965dbe62013-08-09 21:34:3145};
46
47} // namespace
[email protected]8b37a092012-10-18 21:53:4948
[email protected]310d37b2014-08-02 06:15:3749QuicAckFrame MakeAckFrame(QuicPacketSequenceNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4950 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3751 ack.largest_observed = largest_observed;
52 ack.entropy_hash = 0;
[email protected]fb35b0a2014-04-15 21:06:4953 return ack;
54}
55
[email protected]aa7e4ef2014-05-28 03:53:1556QuicAckFrame MakeAckFrameWithNackRanges(
57 size_t num_nack_ranges, QuicPacketSequenceNumber least_unacked) {
[email protected]310d37b2014-08-02 06:15:3758 QuicAckFrame ack = MakeAckFrame(2 * num_nack_ranges + least_unacked);
[email protected]aa7e4ef2014-05-28 03:53:1559 // Add enough missing packets to get num_nack_ranges nack ranges.
60 for (QuicPacketSequenceNumber i = 1; i < 2 * num_nack_ranges; i += 2) {
[email protected]310d37b2014-08-02 06:15:3761 ack.missing_packets.insert(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1562 }
63 return ack;
64}
65
rtennetib6ac61a52015-02-11 20:20:5266QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
67 const QuicPacketHeader& header,
68 const QuicFrames& frames) {
[email protected]9cda5fd2014-06-03 10:20:2869 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
70 size_t packet_size = GetPacketHeaderSize(header);
71 for (size_t i = 0; i < frames.size(); ++i) {
72 DCHECK_LE(packet_size, max_plaintext_size);
73 bool first_frame = i == 0;
74 bool last_frame = i == frames.size() - 1;
75 const size_t frame_size = framer->GetSerializedFrameLength(
76 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
77 header.is_in_fec_group,
78 header.public_header.sequence_number_length);
79 DCHECK(frame_size);
80 packet_size += frame_size;
81 }
rtenneti16a20772015-02-17 18:58:4882 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
83}
84
85QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
86 const QuicPacketHeader& header,
87 const QuicFrames& frames,
88 size_t packet_size) {
89 char* buffer = new char[packet_size];
90 scoped_ptr<QuicPacket> packet(
91 framer->BuildDataPacket(header, frames, buffer, packet_size));
92 DCHECK(packet.get() != nullptr);
93 // Now I have to re-construct the data packet with data ownership.
94 return new QuicPacket(buffer, packet->length(), true,
95 header.public_header.connection_id_length,
96 header.public_header.version_flag,
97 header.public_header.sequence_number_length);
[email protected]9cda5fd2014-06-03 10:20:2898}
99
[email protected]a5b98172014-06-18 07:01:59100uint64 SimpleRandom::RandUint64() {
101 unsigned char hash[base::kSHA1Length];
102 base::SHA1HashBytes(reinterpret_cast<unsigned char*>(&seed_), sizeof(seed_),
103 hash);
104 memcpy(&seed_, hash, sizeof(seed_));
105 return seed_;
106}
107
[email protected]8b37a092012-10-18 21:53:49108MockFramerVisitor::MockFramerVisitor() {
109 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:33110 ON_CALL(*this, OnProtocolVersionMismatch(_))
111 .WillByDefault(testing::Return(false));
112
113 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:49114 ON_CALL(*this, OnUnauthenticatedHeader(_))
115 .WillByDefault(testing::Return(true));
116
[email protected]066d8182014-01-04 02:02:45117 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
118 .WillByDefault(testing::Return(true));
119
[email protected]cff7b7b2013-01-11 08:49:07120 ON_CALL(*this, OnPacketHeader(_))
[email protected]8b37a092012-10-18 21:53:49121 .WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47122
123 ON_CALL(*this, OnStreamFrame(_))
124 .WillByDefault(testing::Return(true));
125
126 ON_CALL(*this, OnAckFrame(_))
127 .WillByDefault(testing::Return(true));
128
[email protected]93dd91f2014-02-27 00:09:03129 ON_CALL(*this, OnStopWaitingFrame(_))
130 .WillByDefault(testing::Return(true));
131
[email protected]d8c522112014-04-23 09:23:25132 ON_CALL(*this, OnPingFrame(_))
133 .WillByDefault(testing::Return(true));
134
[email protected]a57e0272013-04-26 07:31:47135 ON_CALL(*this, OnRstStreamFrame(_))
136 .WillByDefault(testing::Return(true));
137
138 ON_CALL(*this, OnConnectionCloseFrame(_))
139 .WillByDefault(testing::Return(true));
140
141 ON_CALL(*this, OnGoAwayFrame(_))
142 .WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49143}
144
[email protected]044ac2b2012-11-13 21:41:06145MockFramerVisitor::~MockFramerVisitor() {
146}
[email protected]8b37a092012-10-18 21:53:49147
[email protected]48878092013-07-26 14:51:56148bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33149 return false;
150}
151
[email protected]066d8182014-01-04 02:02:45152bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
153 const QuicPacketPublicHeader& header) {
154 return true;
155}
156
[email protected]ec86d5462013-11-17 16:04:49157bool NoOpFramerVisitor::OnUnauthenticatedHeader(
158 const QuicPacketHeader& header) {
159 return true;
160}
161
[email protected]8b37a092012-10-18 21:53:49162bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
163 return true;
164}
165
[email protected]a57e0272013-04-26 07:31:47166bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
167 return true;
168}
169
170bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
171 return true;
172}
173
[email protected]93dd91f2014-02-27 00:09:03174bool NoOpFramerVisitor::OnStopWaitingFrame(
175 const QuicStopWaitingFrame& frame) {
176 return true;
177}
178
[email protected]d8c522112014-04-23 09:23:25179bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
180 return true;
181}
182
[email protected]a57e0272013-04-26 07:31:47183bool NoOpFramerVisitor::OnRstStreamFrame(
184 const QuicRstStreamFrame& frame) {
185 return true;
186}
187
188bool NoOpFramerVisitor::OnConnectionCloseFrame(
189 const QuicConnectionCloseFrame& frame) {
190 return true;
191}
192
193bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
194 return true;
195}
196
[email protected]cb23a922014-02-20 17:42:38197bool NoOpFramerVisitor::OnWindowUpdateFrame(
198 const QuicWindowUpdateFrame& frame) {
199 return true;
200}
201
202bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
203 return true;
204}
205
[email protected]8d659e22013-01-19 04:26:10206MockConnectionVisitor::MockConnectionVisitor() {
207}
208
209MockConnectionVisitor::~MockConnectionVisitor() {
210}
211
[email protected]9c0b1352012-11-04 00:03:27212MockHelper::MockHelper() {
213}
214
215MockHelper::~MockHelper() {
216}
217
[email protected]97693d12012-11-16 16:05:00218const QuicClock* MockHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27219 return &clock_;
220}
221
[email protected]9558c5d32012-12-22 00:08:14222QuicRandom* MockHelper::GetRandomGenerator() {
223 return &random_generator_;
224}
225
[email protected]965dbe62013-08-09 21:34:31226QuicAlarm* MockHelper::CreateAlarm(QuicAlarm::Delegate* delegate) {
227 return new TestAlarm(delegate);
228}
229
[email protected]fe053f92013-04-23 20:18:55230void MockHelper::AdvanceTime(QuicTime::Delta delta) {
231 clock_.AdvanceTime(delta);
232}
233
rtenneti3fe4ebbc2014-11-16 16:43:47234QuicPacketWriter* NiceMockPacketWriterFactory::Create(
235 QuicConnection* /*connection*/) const {
236 return new testing::NiceMock<MockPacketWriter>();
237}
[email protected]6d515822014-08-22 01:58:06238
rtenneti6f48aa92015-03-16 02:18:48239MockConnection::MockConnection(Perspective perspective)
rchc0815442015-04-18 13:29:46240 : MockConnection(perspective,
241 /* is_secure= */ false) {
rtenneti8696cf92014-11-14 21:12:12242}
243
rtenneti6f48aa92015-03-16 02:18:48244MockConnection::MockConnection(Perspective perspective, bool is_secure)
rchc0815442015-04-18 13:29:46245 : MockConnection(kTestConnectionId,
rtenneti8696cf92014-11-14 21:12:12246 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti6f48aa92015-03-16 02:18:48247 perspective,
rtenneti8696cf92014-11-14 21:12:12248 is_secure,
rchc0815442015-04-18 13:29:46249 QuicSupportedVersions()) {
[email protected]c05a6d222013-12-16 19:42:03250}
251
rtenneti6f48aa92015-03-16 02:18:48252MockConnection::MockConnection(IPEndPoint address, Perspective perspective)
rchc0815442015-04-18 13:29:46253 : MockConnection(kTestConnectionId,
rtenneti6f48aa92015-03-16 02:18:48254 address,
rtenneti6f48aa92015-03-16 02:18:48255 perspective,
rtenneti8696cf92014-11-14 21:12:12256 /* is_secure= */ false,
rchc0815442015-04-18 13:29:46257 QuicSupportedVersions()) {
[email protected]044ac2b2012-11-13 21:41:06258}
259
[email protected]3aa9ca72014-02-27 19:39:43260MockConnection::MockConnection(QuicConnectionId connection_id,
rtenneti6f48aa92015-03-16 02:18:48261 Perspective perspective)
rchc0815442015-04-18 13:29:46262 : MockConnection(connection_id,
rtenneti6f48aa92015-03-16 02:18:48263 perspective,
rchc0815442015-04-18 13:29:46264 /* is_secure= */ false) {
[email protected]872edd9e2013-01-16 08:51:15265}
266
rtennetifb3fa6c2015-03-16 23:04:55267MockConnection::MockConnection(QuicConnectionId connection_id,
268 Perspective perspective,
269 bool is_secure)
rchc0815442015-04-18 13:29:46270 : MockConnection(connection_id,
rtennetifb3fa6c2015-03-16 23:04:55271 IPEndPoint(TestPeerIPAddress(), kTestPort),
rchc0815442015-04-18 13:29:46272 perspective,
273 is_secure,
274 QuicSupportedVersions()) {
275}
276
277MockConnection::MockConnection(Perspective perspective,
278 const QuicVersionVector& supported_versions)
279 : MockConnection(kTestConnectionId,
280 IPEndPoint(TestPeerIPAddress(), kTestPort),
281 perspective,
282 /* is_secure= */ false,
283 supported_versions) {
284}
285
286MockConnection::MockConnection(QuicConnectionId connection_id,
287 IPEndPoint address,
288 Perspective perspective,
289 bool is_secure,
290 const QuicVersionVector& supported_versions)
291 : QuicConnection(connection_id,
292 address,
rtennetifb3fa6c2015-03-16 23:04:55293 new testing::NiceMock<MockHelper>(),
294 NiceMockPacketWriterFactory(),
295 /* owns_writer= */ true,
296 perspective,
297 is_secure,
rtennetie3779d832014-11-14 02:08:17298 supported_versions),
[email protected]4d640792013-12-18 22:21:08299 helper_(helper()) {
rchc0815442015-04-18 13:29:46300 ON_CALL(*this, OnError(_))
301 .WillByDefault(
302 Invoke(this, &PacketSavingConnection::QuicConnection_OnError));
[email protected]4d640792013-12-18 22:21:08303}
304
[email protected]044ac2b2012-11-13 21:41:06305MockConnection::~MockConnection() {
306}
307
[email protected]fe053f92013-04-23 20:18:55308void MockConnection::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55309 static_cast<MockHelper*>(helper())->AdvanceTime(delta);
310}
311
rtenneti6f48aa92015-03-16 02:18:48312PacketSavingConnection::PacketSavingConnection(Perspective perspective)
313 : MockConnection(perspective) {
[email protected]044ac2b2012-11-13 21:41:06314}
315
[email protected]4d640792013-12-18 22:21:08316PacketSavingConnection::PacketSavingConnection(
rtenneti6f48aa92015-03-16 02:18:48317 Perspective perspective,
[email protected]4d640792013-12-18 22:21:08318 const QuicVersionVector& supported_versions)
rtenneti6f48aa92015-03-16 02:18:48319 : MockConnection(perspective, supported_versions) {
[email protected]4d640792013-12-18 22:21:08320}
321
[email protected]044ac2b2012-11-13 21:41:06322PacketSavingConnection::~PacketSavingConnection() {
[email protected]2532de12013-05-09 12:29:33323 STLDeleteElements(&encrypted_packets_);
[email protected]044ac2b2012-11-13 21:41:06324}
325
rtenneti31e9fd62014-09-16 05:22:15326void PacketSavingConnection::SendOrQueuePacket(QueuedPacket packet) {
rtennetie0ee6eb2015-05-01 00:55:09327 if (!packet.serialized_packet.packet->owns_buffer()) {
328 scoped_ptr<QuicEncryptedPacket> encrypted_deleter(
329 packet.serialized_packet.packet);
330 packet.serialized_packet.packet = packet.serialized_packet.packet->Clone();
331 }
rtennetib6ac61a52015-02-11 20:20:52332 encrypted_packets_.push_back(packet.serialized_packet.packet);
rtenneti31e9fd62014-09-16 05:22:15333 // Transfer ownership of the packet to the SentPacketManager and the
334 // ack notifier to the AckNotifierManager.
rtennetia4dcff92014-09-29 18:16:08335 sent_packet_manager_.OnPacketSent(
336 &packet.serialized_packet, 0, QuicTime::Zero(), 1000,
337 NOT_RETRANSMISSION, HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06338}
339
[email protected]c05a6d222013-12-16 19:42:03340MockSession::MockSession(QuicConnection* connection)
rtenneti8696cf92014-11-14 21:12:12341 : QuicSession(connection, DefaultQuicConfig()) {
[email protected]ccb34212014-07-18 09:27:50342 InitializeSession();
[email protected]bbb10072014-06-13 07:41:59343 ON_CALL(*this, WritevData(_, _, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07344 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06345}
346
347MockSession::~MockSession() {
348}
349
[email protected]ce7bb1412014-05-17 15:51:33350TestSession::TestSession(QuicConnection* connection, const QuicConfig& config)
rtenneti8696cf92014-11-14 21:12:12351 : QuicSession(connection, config),
rtenneti4a5df262014-11-07 00:43:58352 crypto_stream_(nullptr) {
[email protected]ccb34212014-07-18 09:27:50353 InitializeSession();
354}
[email protected]2532de12013-05-09 12:29:33355
[email protected]b064310782013-05-30 21:12:17356TestSession::~TestSession() {}
[email protected]2532de12013-05-09 12:29:33357
358void TestSession::SetCryptoStream(QuicCryptoStream* stream) {
359 crypto_stream_ = stream;
360}
361
362QuicCryptoStream* TestSession::GetCryptoStream() {
363 return crypto_stream_;
364}
365
[email protected]90f62f092014-03-24 02:41:23366TestClientSession::TestClientSession(QuicConnection* connection,
367 const QuicConfig& config)
rtenneti8696cf92014-11-14 21:12:12368 : QuicClientSessionBase(connection, config),
rtennetibe635732014-10-02 22:51:42369 crypto_stream_(nullptr) {
[email protected]ccb34212014-07-18 09:27:50370 EXPECT_CALL(*this, OnProofValid(_)).Times(AnyNumber());
371 InitializeSession();
[email protected]90f62f092014-03-24 02:41:23372}
373
374TestClientSession::~TestClientSession() {}
375
376void TestClientSession::SetCryptoStream(QuicCryptoStream* stream) {
377 crypto_stream_ = stream;
378}
379
380QuicCryptoStream* TestClientSession::GetCryptoStream() {
381 return crypto_stream_;
382}
383
rtennetia2ea9162015-05-15 19:26:44384TestServerSession::TestServerSession(const QuicConfig& config,
385 QuicConnection* connection)
386 : QuicServerSession(config, connection, nullptr) {
387}
388
389TestServerSession::~TestServerSession() {
390}
391
[email protected]cbd731e2013-10-24 00:20:39392MockPacketWriter::MockPacketWriter() {
393}
394
395MockPacketWriter::~MockPacketWriter() {
396}
397
[email protected]fee17f72013-02-03 07:47:41398MockSendAlgorithm::MockSendAlgorithm() {
[email protected]8d659e22013-01-19 04:26:10399}
400
[email protected]fee17f72013-02-03 07:47:41401MockSendAlgorithm::~MockSendAlgorithm() {
[email protected]8d659e22013-01-19 04:26:10402}
403
[email protected]3aa9ca72014-02-27 19:39:43404MockLossAlgorithm::MockLossAlgorithm() {
405}
406
407MockLossAlgorithm::~MockLossAlgorithm() {
408}
409
[email protected]97cf3022013-09-05 14:30:16410MockAckNotifierDelegate::MockAckNotifierDelegate() {
411}
412
413MockAckNotifierDelegate::~MockAckNotifierDelegate() {
414}
415
[email protected]a692ad9d2014-07-18 21:35:24416MockNetworkChangeVisitor::MockNetworkChangeVisitor() {
417}
418
419MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {
420}
421
[email protected]8b37a092012-10-18 21:53:49422namespace {
423
424string HexDumpWithMarks(const char* data, int length,
425 const bool* marks, int mark_length) {
426 static const char kHexChars[] = "0123456789abcdef";
427 static const int kColumns = 4;
428
429 const int kSizeLimit = 1024;
430 if (length > kSizeLimit || mark_length > kSizeLimit) {
431 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
432 length = min(length, kSizeLimit);
433 mark_length = min(mark_length, kSizeLimit);
434 }
435
436 string hex;
437 for (const char* row = data; length > 0;
438 row += kColumns, length -= kColumns) {
439 for (const char *p = row; p < row + 4; ++p) {
440 if (p < row + length) {
441 const bool mark =
442 (marks && (p - data) < mark_length && marks[p - data]);
443 hex += mark ? '*' : ' ';
444 hex += kHexChars[(*p & 0xf0) >> 4];
445 hex += kHexChars[*p & 0x0f];
446 hex += mark ? '*' : ' ';
447 } else {
448 hex += " ";
449 }
450 }
451 hex = hex + " ";
452
rtenneti6f48aa92015-03-16 02:18:48453 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
[email protected]8b37a092012-10-18 21:53:49454 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
rtenneti6f48aa92015-03-16 02:18:48455 }
[email protected]8b37a092012-10-18 21:53:49456
457 hex = hex + '\n';
458 }
459 return hex;
460}
461
462} // namespace
463
[email protected]300ccd52014-01-25 08:00:19464IPAddressNumber TestPeerIPAddress() { return Loopback4(); }
465
[email protected]b007e632013-10-28 08:39:25466QuicVersion QuicVersionMax() { return QuicSupportedVersions().front(); }
467
468QuicVersion QuicVersionMin() { return QuicSupportedVersions().back(); }
469
[email protected]c05a6d222013-12-16 19:42:03470IPAddressNumber Loopback4() {
[email protected]300ccd52014-01-25 08:00:19471 IPAddressNumber addr;
472 CHECK(ParseIPLiteralToNumber("127.0.0.1", &addr));
[email protected]c05a6d222013-12-16 19:42:03473 return addr;
474}
475
[email protected]730b35d72014-06-05 03:23:22476IPAddressNumber Loopback6() {
477 IPAddressNumber addr;
478 CHECK(ParseIPLiteralToNumber("::1", &addr));
479 return addr;
480}
481
rtennetie0ee6eb2015-05-01 00:55:09482IPAddressNumber Any4() {
483 IPAddressNumber any4;
484 CHECK(net::ParseIPLiteralToNumber("0.0.0.0", &any4));
485 return any4;
486}
487
[email protected]9bb57c72014-03-31 20:36:04488void GenerateBody(string* body, int length) {
489 body->clear();
490 body->reserve(length);
491 for (int i = 0; i < length; ++i) {
492 body->append(1, static_cast<char>(32 + i % (126 - 32)));
493 }
494}
495
[email protected]ffc34bf2014-03-07 02:42:02496QuicEncryptedPacket* ConstructEncryptedPacket(
497 QuicConnectionId connection_id,
498 bool version_flag,
499 bool reset_flag,
500 QuicPacketSequenceNumber sequence_number,
501 const string& data) {
rtenneti9e0fb502015-03-08 06:07:16502 return ConstructEncryptedPacket(
503 connection_id, version_flag, reset_flag, sequence_number, data,
504 PACKET_8BYTE_CONNECTION_ID, PACKET_6BYTE_SEQUENCE_NUMBER);
505}
506
507QuicEncryptedPacket* ConstructEncryptedPacket(
508 QuicConnectionId connection_id,
509 bool version_flag,
510 bool reset_flag,
511 QuicPacketSequenceNumber sequence_number,
512 const string& data,
513 QuicConnectionIdLength connection_id_length,
514 QuicSequenceNumberLength sequence_number_length) {
rchc0815442015-04-18 13:29:46515 return ConstructEncryptedPacket(connection_id, version_flag, reset_flag,
516 sequence_number, data, connection_id_length,
517 sequence_number_length, nullptr);
518}
519
520QuicEncryptedPacket* ConstructEncryptedPacket(
521 QuicConnectionId connection_id,
522 bool version_flag,
523 bool reset_flag,
524 QuicPacketSequenceNumber sequence_number,
525 const string& data,
526 QuicConnectionIdLength connection_id_length,
527 QuicSequenceNumberLength sequence_number_length,
528 QuicVersionVector* versions) {
[email protected]ffc34bf2014-03-07 02:42:02529 QuicPacketHeader header;
530 header.public_header.connection_id = connection_id;
rtenneti9e0fb502015-03-08 06:07:16531 header.public_header.connection_id_length = connection_id_length;
[email protected]ffc34bf2014-03-07 02:42:02532 header.public_header.version_flag = version_flag;
533 header.public_header.reset_flag = reset_flag;
rtenneti9e0fb502015-03-08 06:07:16534 header.public_header.sequence_number_length = sequence_number_length;
[email protected]ffc34bf2014-03-07 02:42:02535 header.packet_sequence_number = sequence_number;
536 header.entropy_flag = false;
537 header.entropy_hash = 0;
538 header.fec_flag = false;
539 header.is_in_fec_group = NOT_IN_FEC_GROUP;
540 header.fec_group = 0;
541 QuicStreamFrame stream_frame(1, false, 0, MakeIOVector(data));
542 QuicFrame frame(&stream_frame);
543 QuicFrames frames;
544 frames.push_back(frame);
rchc0815442015-04-18 13:29:46545 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
546 QuicTime::Zero(), Perspective::IS_CLIENT);
547
[email protected]ffc34bf2014-03-07 02:42:02548 scoped_ptr<QuicPacket> packet(
rtennetib6ac61a52015-02-11 20:20:52549 BuildUnsizedDataPacket(&framer, header, frames));
rtennetibe635732014-10-02 22:51:42550 EXPECT_TRUE(packet != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09551 char buffer[kMaxPacketSize];
552 scoped_ptr<QuicEncryptedPacket> encrypted(framer.EncryptPacket(
553 ENCRYPTION_NONE, sequence_number, *packet, buffer, kMaxPacketSize));
rtennetibe635732014-10-02 22:51:42554 EXPECT_TRUE(encrypted != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09555 return encrypted->Clone();
[email protected]ffc34bf2014-03-07 02:42:02556}
557
rchc0815442015-04-18 13:29:46558QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
559 QuicConnectionId connection_id,
560 bool version_flag,
561 bool reset_flag,
562 QuicPacketSequenceNumber sequence_number,
563 const string& data,
564 QuicConnectionIdLength connection_id_length,
565 QuicSequenceNumberLength sequence_number_length,
566 QuicVersionVector* versions) {
567 QuicPacketHeader header;
568 header.public_header.connection_id = connection_id;
569 header.public_header.connection_id_length = connection_id_length;
570 header.public_header.version_flag = version_flag;
571 header.public_header.reset_flag = reset_flag;
572 header.public_header.sequence_number_length = sequence_number_length;
573 header.packet_sequence_number = sequence_number;
574 header.entropy_flag = false;
575 header.entropy_hash = 0;
576 header.fec_flag = false;
577 header.is_in_fec_group = NOT_IN_FEC_GROUP;
578 header.fec_group = 0;
579 QuicFrames frames;
580 QuicFramer framer(versions ? *versions : QuicSupportedVersions(),
581 QuicTime::Zero(), Perspective::IS_CLIENT);
582 // Build a packet with zero frames, which is an error.
583 scoped_ptr<QuicPacket> packet(
584 BuildUnsizedDataPacket(&framer, header, frames));
585 EXPECT_TRUE(packet != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09586 char buffer[kMaxPacketSize];
587 scoped_ptr<QuicEncryptedPacket> encrypted(framer.EncryptPacket(
588 ENCRYPTION_NONE, sequence_number, *packet, buffer, kMaxPacketSize));
rchc0815442015-04-18 13:29:46589 EXPECT_TRUE(encrypted != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09590 return encrypted->Clone();
rchc0815442015-04-18 13:29:46591}
592
[email protected]8b37a092012-10-18 21:53:49593void CompareCharArraysWithHexError(
594 const string& description,
595 const char* actual,
596 const int actual_len,
597 const char* expected,
598 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25599 EXPECT_EQ(actual_len, expected_len);
[email protected]8b37a092012-10-18 21:53:49600 const int min_len = min(actual_len, expected_len);
601 const int max_len = max(actual_len, expected_len);
[email protected]4356f0f2013-04-07 00:58:17602 scoped_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49603 bool identical = (actual_len == expected_len);
604 for (int i = 0; i < min_len; ++i) {
605 if (actual[i] != expected[i]) {
606 marks[i] = true;
607 identical = false;
608 } else {
609 marks[i] = false;
610 }
611 }
612 for (int i = min_len; i < max_len; ++i) {
613 marks[i] = true;
614 }
615 if (identical) return;
616 ADD_FAILURE()
617 << "Description:\n"
618 << description
619 << "\n\nExpected:\n"
620 << HexDumpWithMarks(expected, expected_len, marks.get(), max_len)
621 << "\nActual:\n"
622 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
623}
624
[email protected]b12764d2013-12-02 22:28:30625bool DecodeHexString(const base::StringPiece& hex, std::string* bytes) {
626 bytes->clear();
627 if (hex.empty())
628 return true;
629 std::vector<uint8> v;
630 if (!base::HexStringToBytes(hex.as_string(), &v))
631 return false;
632 if (!v.empty())
633 bytes->assign(reinterpret_cast<const char*>(&v[0]), v.size());
634 return true;
635}
636
[email protected]d3d15bf2013-01-30 02:51:54637static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43638 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33639 const CryptoHandshakeMessage& message,
640 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49641 CryptoFramer crypto_framer;
[email protected]dc2cc742012-10-21 13:56:13642 scoped_ptr<QuicData> data(crypto_framer.ConstructHandshakeMessage(message));
rtenneti6f48aa92015-03-16 02:18:48643 QuicFramer quic_framer(QuicSupportedVersions(), QuicTime::Zero(),
644 Perspective::IS_CLIENT);
[email protected]8b37a092012-10-18 21:53:49645
646 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43647 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03648 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33649 header.public_header.version_flag = should_include_version;
[email protected]8b37a092012-10-18 21:53:49650 header.packet_sequence_number = 1;
[email protected]9db443912013-02-25 05:27:03651 header.entropy_flag = false;
652 header.entropy_hash = 0;
653 header.fec_flag = false;
[email protected]8b37a092012-10-18 21:53:49654 header.fec_group = 0;
655
[email protected]be24ab22012-10-22 03:01:52656 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
[email protected]5dafdb62013-11-14 01:24:26657 MakeIOVector(data->AsStringPiece()));
[email protected]8b37a092012-10-18 21:53:49658
[email protected]be24ab22012-10-22 03:01:52659 QuicFrame frame(&stream_frame);
660 QuicFrames frames;
661 frames.push_back(frame);
rtennetib6ac61a52015-02-11 20:20:52662 return BuildUnsizedDataPacket(&quic_framer, header, frames);
[email protected]8b37a092012-10-18 21:53:49663}
664
[email protected]3aa9ca72014-02-27 19:39:43665QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
666 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54667 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14668 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43669 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54670}
671
[email protected]ea825e02013-08-21 18:12:45672size_t GetPacketLengthForOneStream(
673 QuicVersion version,
674 bool include_version,
rtenneti23186682014-10-30 01:49:33675 QuicConnectionIdLength connection_id_length,
[email protected]ea825e02013-08-21 18:12:45676 QuicSequenceNumberLength sequence_number_length,
677 InFecGroup is_in_fec_group,
678 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30679 *payload_length = 1;
680 const size_t stream_length =
[email protected]5dafdb62013-11-14 01:24:26681 NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17682 QuicPacketCreator::StreamFramePacketOverhead(
[email protected]310d37b2014-08-02 06:15:37683 PACKET_8BYTE_CONNECTION_ID, include_version,
[email protected]aa7e4ef2014-05-28 03:53:15684 sequence_number_length, 0u, is_in_fec_group);
[email protected]5dafdb62013-11-14 01:24:26685 const size_t ack_length = NullEncrypter().GetCiphertextSize(
[email protected]8e01c062013-10-31 07:35:31686 QuicFramer::GetMinAckFrameSize(
[email protected]310d37b2014-08-02 06:15:37687 sequence_number_length, PACKET_1BYTE_SEQUENCE_NUMBER)) +
rtenneti23186682014-10-30 01:49:33688 GetPacketHeaderSize(connection_id_length, include_version,
[email protected]ea825e02013-08-21 18:12:45689 sequence_number_length, is_in_fec_group);
[email protected]f62262b2013-07-05 20:57:30690 if (stream_length < ack_length) {
691 *payload_length = 1 + ack_length - stream_length;
692 }
693
[email protected]5dafdb62013-11-14 01:24:26694 return NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]f62262b2013-07-05 20:57:30695 QuicPacketCreator::StreamFramePacketOverhead(
rtenneti23186682014-10-30 01:49:33696 connection_id_length, include_version,
[email protected]aa7e4ef2014-05-28 03:53:15697 sequence_number_length, 0u, is_in_fec_group);
[email protected]5351cc4b2013-03-03 07:22:41698}
699
[email protected]a5b98172014-06-18 07:01:59700TestEntropyCalculator::TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31701
[email protected]a5b98172014-06-18 07:01:59702TestEntropyCalculator::~TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31703
[email protected]48878092013-07-26 14:51:56704QuicPacketEntropyHash TestEntropyCalculator::EntropyHash(
[email protected]9db443912013-02-25 05:27:03705 QuicPacketSequenceNumber sequence_number) const {
706 return 1u;
707}
708
[email protected]a5b98172014-06-18 07:01:59709MockEntropyCalculator::MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31710
[email protected]a5b98172014-06-18 07:01:59711MockEntropyCalculator::~MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31712
[email protected]b064310782013-05-30 21:12:17713QuicConfig DefaultQuicConfig() {
714 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21715 config.SetInitialStreamFlowControlWindowToSend(
716 kInitialStreamFlowControlWindowForTest);
717 config.SetInitialSessionFlowControlWindowToSend(
718 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17719 return config;
720}
721
rtennetia2ea9162015-05-15 19:26:44722QuicConfig DefaultQuicConfigStatelessRejects() {
723 QuicConfig config = DefaultQuicConfig();
724 QuicTagVector copt;
725 copt.push_back(kSREJ);
726 config.SetConnectionOptionsToSend(copt);
727 return config;
728}
729
[email protected]4d640792013-12-18 22:21:08730QuicVersionVector SupportedVersions(QuicVersion version) {
731 QuicVersionVector versions;
732 versions.push_back(version);
733 return versions;
734}
735
rtennetibe635732014-10-02 22:51:42736TestWriterFactory::TestWriterFactory() : current_writer_(nullptr) {}
[email protected]6d515822014-08-22 01:58:06737TestWriterFactory::~TestWriterFactory() {}
738
rchc99f380c2015-03-26 19:50:56739QuicPacketWriter* TestWriterFactory::Create(QuicPacketWriter* writer,
[email protected]6d515822014-08-22 01:58:06740 QuicConnection* connection) {
741 return new PerConnectionPacketWriter(this, writer, connection);
742}
743
744void TestWriterFactory::OnPacketSent(WriteResult result) {
rtennetibe635732014-10-02 22:51:42745 if (current_writer_ != nullptr && result.status == WRITE_STATUS_ERROR) {
[email protected]ca4e0d92014-08-22 16:33:22746 current_writer_->connection()->OnWriteError(result.error_code);
rtennetibe635732014-10-02 22:51:42747 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06748 }
749}
750
751void TestWriterFactory::Unregister(PerConnectionPacketWriter* writer) {
752 if (current_writer_ == writer) {
rtennetibe635732014-10-02 22:51:42753 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06754 }
755}
756
757TestWriterFactory::PerConnectionPacketWriter::PerConnectionPacketWriter(
758 TestWriterFactory* factory,
rchc99f380c2015-03-26 19:50:56759 QuicPacketWriter* writer,
[email protected]6d515822014-08-22 01:58:06760 QuicConnection* connection)
761 : QuicPerConnectionPacketWriter(writer, connection),
762 factory_(factory) {
763}
764
765TestWriterFactory::PerConnectionPacketWriter::~PerConnectionPacketWriter() {
766 factory_->Unregister(this);
767}
768
769WriteResult TestWriterFactory::PerConnectionPacketWriter::WritePacket(
770 const char* buffer,
771 size_t buf_len,
772 const IPAddressNumber& self_address,
773 const IPEndPoint& peer_address) {
rtennetibe635732014-10-02 22:51:42774 // A DCHECK(factory_current_writer_ == nullptr) would be wrong here -- this
775 // class may be used in a setting where connection()->OnPacketSent() is called
776 // in a different way, so TestWriterFactory::OnPacketSent might never be
777 // called.
[email protected]6d515822014-08-22 01:58:06778 factory_->current_writer_ = this;
rtennetia2ea9162015-05-15 19:26:44779 return tools::QuicPerConnectionPacketWriter::WritePacket(
780 buffer, buf_len, self_address, peer_address);
[email protected]6d515822014-08-22 01:58:06781}
782
rtenneti95293802015-03-27 18:59:23783MockQuicConnectionDebugVisitor::MockQuicConnectionDebugVisitor() {
784}
785
786MockQuicConnectionDebugVisitor::~MockQuicConnectionDebugVisitor() {
787}
788
rtennetia2ea9162015-05-15 19:26:44789void SetupCryptoClientStreamForTest(
790 QuicServerId server_id,
791 bool supports_stateless_rejects,
792 QuicTime::Delta connection_start_time,
793 QuicCryptoClientConfig* crypto_client_config,
794 PacketSavingConnection** client_connection,
795 TestClientSession** client_session,
796 QuicCryptoClientStream** client_stream) {
797 CHECK(crypto_client_config);
798 CHECK(client_connection);
799 CHECK(client_session);
800 CHECK(client_stream);
801 CHECK(!connection_start_time.IsZero())
802 << "Connections must start at non-zero times, otherwise the "
803 << "strike-register will be unhappy.";
804
805 QuicConfig config = supports_stateless_rejects
806 ? DefaultQuicConfigStatelessRejects()
807 : DefaultQuicConfig();
808 *client_connection = new PacketSavingConnection(Perspective::IS_CLIENT);
809 *client_session = new TestClientSession(*client_connection, config);
810 *client_stream = new QuicCryptoClientStream(server_id, *client_session,
811 nullptr, crypto_client_config);
812 (*client_session)->SetCryptoStream(*client_stream);
813 (*client_connection)->AdvanceTime(connection_start_time);
814}
815
816// Setup or create?
817void SetupCryptoServerStreamForTest(
818 QuicServerId server_id,
819 QuicTime::Delta connection_start_time,
820 QuicCryptoServerConfig* server_crypto_config,
821 PacketSavingConnection** server_connection,
822 TestServerSession** server_session,
823 QuicCryptoServerStream** server_stream) {
824 CHECK(server_crypto_config);
825 CHECK(server_connection);
826 CHECK(server_session);
827 CHECK(server_stream);
828 CHECK(!connection_start_time.IsZero())
829 << "Connections must start at non-zero times, otherwise the "
830 << "strike-register will be unhappy.";
831
832 *server_connection = new PacketSavingConnection(Perspective::IS_SERVER);
833 *server_session =
834 new TestServerSession(DefaultQuicConfig(), *server_connection);
835 *server_stream =
836 new QuicCryptoServerStream(server_crypto_config, *server_session);
837 (*server_session)->InitializeSession(server_crypto_config);
838
839 // We advance the clock initially because the default time is zero and the
840 // strike register worries that we've just overflowed a uint32 time.
841 (*server_connection)->AdvanceTime(connection_start_time);
842}
843
[email protected]8b37a092012-10-18 21:53:49844} // namespace test
[email protected]8b37a092012-10-18 21:53:49845} // namespace net