blob: 26a2186c2d380f08f7d9763815523e47a1ad9ccf [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
rch16c74d1d2016-04-22 06:14:077#include <memory>
8
[email protected]a5b98172014-06-18 07:01:599#include "base/sha1.h"
[email protected]701bc892013-01-17 04:51:5410#include "base/stl_util.h"
[email protected]b12764d2013-12-02 22:28:3011#include "base/strings/string_number_conversions.h"
[email protected]8b37a092012-10-18 21:53:4912#include "net/quic/crypto/crypto_framer.h"
[email protected]6f54ab32013-03-02 17:43:3513#include "net/quic/crypto/crypto_handshake.h"
[email protected]872edd9e2013-01-16 08:51:1514#include "net/quic/crypto/crypto_utils.h"
[email protected]5351cc4b2013-03-03 07:22:4115#include "net/quic/crypto/null_encrypter.h"
[email protected]4df69842013-02-27 06:32:1616#include "net/quic/crypto/quic_decrypter.h"
17#include "net/quic/crypto/quic_encrypter.h"
rtenneti16a20772015-02-17 18:58:4818#include "net/quic/quic_data_writer.h"
[email protected]a57e0272013-04-26 07:31:4719#include "net/quic/quic_framer.h"
[email protected]5351cc4b2013-03-03 07:22:4120#include "net/quic/quic_packet_creator.h"
[email protected]79d13dcb2014-02-05 07:23:1321#include "net/quic/quic_utils.h"
rtennetid39bd762015-06-12 01:05:5222#include "net/quic/test_tools/crypto_test_utils.h"
[email protected]cbd731e2013-10-24 00:20:3923#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0424#include "net/spdy/spdy_frame_builder.h"
rchc99f380c2015-03-26 19:50:5625#include "net/tools/quic/quic_per_connection_packet_writer.h"
[email protected]8b37a092012-10-18 21:53:4926
[email protected]c244c5a12013-05-07 20:55:0427using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4928using std::max;
29using std::min;
30using std::string;
rchc0815442015-04-18 13:29:4631using testing::Invoke;
[email protected]bc356fe2014-06-19 11:14:1432using testing::_;
[email protected]8b37a092012-10-18 21:53:4933
34namespace net {
martijncc5402d2016-02-16 19:08:5835
[email protected]8b37a092012-10-18 21:53:4936namespace test {
[email protected]8b37a092012-10-18 21:53:4937
rtennetia004d332015-08-28 06:44:5738QuicAckFrame MakeAckFrame(QuicPacketNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4939 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3740 ack.largest_observed = largest_observed;
41 ack.entropy_hash = 0;
[email protected]fb35b0a2014-04-15 21:06:4942 return ack;
43}
44
rtennetia004d332015-08-28 06:44:5745QuicAckFrame MakeAckFrameWithNackRanges(size_t num_nack_ranges,
46 QuicPacketNumber least_unacked) {
[email protected]310d37b2014-08-02 06:15:3747 QuicAckFrame ack = MakeAckFrame(2 * num_nack_ranges + least_unacked);
[email protected]aa7e4ef2014-05-28 03:53:1548 // Add enough missing packets to get num_nack_ranges nack ranges.
rtennetia004d332015-08-28 06:44:5749 for (QuicPacketNumber i = 1; i < 2 * num_nack_ranges; i += 2) {
alyssar2adf3ac2016-05-03 17:12:5850 ack.packets.Add(least_unacked + i);
51 }
52 return ack;
53}
54
55QuicAckFrame MakeAckFrameWithAckBlocks(size_t num_ack_blocks,
56 QuicPacketNumber least_unacked) {
57 QuicAckFrame ack = MakeAckFrame(2 * num_ack_blocks + least_unacked);
58 ack.missing = false;
59 // Add enough received packets to get num_ack_blocks ack blocks.
60 for (QuicPacketNumber i = 2; i < 2 * num_ack_blocks + 1; i += 2) {
61 ack.packets.Add(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1562 }
63 return ack;
64}
65
rtennetib6ac61a52015-02-11 20:20:5266QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
67 const QuicPacketHeader& header,
68 const QuicFrames& frames) {
[email protected]9cda5fd2014-06-03 10:20:2869 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
alyssarc2f70a52016-05-04 13:15:4970 size_t packet_size = GetPacketHeaderSize(framer->version(), header);
[email protected]9cda5fd2014-06-03 10:20:2871 for (size_t i = 0; i < frames.size(); ++i) {
72 DCHECK_LE(packet_size, max_plaintext_size);
73 bool first_frame = i == 0;
74 bool last_frame = i == frames.size() - 1;
75 const size_t frame_size = framer->GetSerializedFrameLength(
76 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
rjshaded069aaee2016-03-11 20:42:1777 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2878 DCHECK(frame_size);
79 packet_size += frame_size;
80 }
rtenneti16a20772015-02-17 18:58:4881 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
82}
83
84QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
85 const QuicPacketHeader& header,
86 const QuicFrames& frames,
87 size_t packet_size) {
88 char* buffer = new char[packet_size];
alyssarc39b80f2015-10-22 17:13:5889 size_t length = framer->BuildDataPacket(header, frames, buffer, packet_size);
90 DCHECK_NE(0u, length);
91 // Re-construct the data packet with data ownership.
92 return new QuicPacket(buffer, length, /* owns_buffer */ true,
rtenneti16a20772015-02-17 18:58:4893 header.public_header.connection_id_length,
94 header.public_header.version_flag,
rchcaec4242016-01-22 20:49:5295 header.public_header.multipath_flag,
rch012834cf2016-04-26 02:06:3796 header.public_header.nonce != nullptr,
rtennetia004d332015-08-28 06:44:5797 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2898}
99
Avi Drissman13fc8932015-12-20 04:40:46100uint64_t SimpleRandom::RandUint64() {
[email protected]a5b98172014-06-18 07:01:59101 unsigned char hash[base::kSHA1Length];
102 base::SHA1HashBytes(reinterpret_cast<unsigned char*>(&seed_), sizeof(seed_),
103 hash);
104 memcpy(&seed_, hash, sizeof(seed_));
105 return seed_;
106}
107
[email protected]8b37a092012-10-18 21:53:49108MockFramerVisitor::MockFramerVisitor() {
109 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:33110 ON_CALL(*this, OnProtocolVersionMismatch(_))
111 .WillByDefault(testing::Return(false));
112
113 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:49114 ON_CALL(*this, OnUnauthenticatedHeader(_))
115 .WillByDefault(testing::Return(true));
116
[email protected]066d8182014-01-04 02:02:45117 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
118 .WillByDefault(testing::Return(true));
119
rjshaded5ced072015-12-18 19:26:02120 ON_CALL(*this, OnPacketHeader(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47121
rjshaded5ced072015-12-18 19:26:02122 ON_CALL(*this, OnStreamFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47123
rjshaded5ced072015-12-18 19:26:02124 ON_CALL(*this, OnAckFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47125
rjshaded5ced072015-12-18 19:26:02126 ON_CALL(*this, OnStopWaitingFrame(_)).WillByDefault(testing::Return(true));
[email protected]93dd91f2014-02-27 00:09:03127
rjshadef88b3c72016-04-26 15:25:33128 ON_CALL(*this, OnPaddingFrame(_)).WillByDefault(testing::Return(true));
129
rjshaded5ced072015-12-18 19:26:02130 ON_CALL(*this, OnPingFrame(_)).WillByDefault(testing::Return(true));
[email protected]d8c522112014-04-23 09:23:25131
rjshaded5ced072015-12-18 19:26:02132 ON_CALL(*this, OnRstStreamFrame(_)).WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47133
134 ON_CALL(*this, OnConnectionCloseFrame(_))
135 .WillByDefault(testing::Return(true));
136
rjshaded5ced072015-12-18 19:26:02137 ON_CALL(*this, OnGoAwayFrame(_)).WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49138}
139
rtenneti021e8822015-10-18 23:59:57140MockFramerVisitor::~MockFramerVisitor() {}
[email protected]8b37a092012-10-18 21:53:49141
[email protected]48878092013-07-26 14:51:56142bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33143 return false;
144}
145
[email protected]066d8182014-01-04 02:02:45146bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
147 const QuicPacketPublicHeader& header) {
148 return true;
149}
150
[email protected]ec86d5462013-11-17 16:04:49151bool NoOpFramerVisitor::OnUnauthenticatedHeader(
152 const QuicPacketHeader& header) {
153 return true;
154}
155
[email protected]8b37a092012-10-18 21:53:49156bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
157 return true;
158}
159
[email protected]a57e0272013-04-26 07:31:47160bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
161 return true;
162}
163
164bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
165 return true;
166}
167
rjshaded5ced072015-12-18 19:26:02168bool NoOpFramerVisitor::OnStopWaitingFrame(const QuicStopWaitingFrame& frame) {
[email protected]93dd91f2014-02-27 00:09:03169 return true;
170}
171
rjshadef88b3c72016-04-26 15:25:33172bool NoOpFramerVisitor::OnPaddingFrame(const QuicPaddingFrame& frame) {
173 return true;
174}
175
[email protected]d8c522112014-04-23 09:23:25176bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
177 return true;
178}
179
rjshaded5ced072015-12-18 19:26:02180bool NoOpFramerVisitor::OnRstStreamFrame(const QuicRstStreamFrame& frame) {
[email protected]a57e0272013-04-26 07:31:47181 return true;
182}
183
184bool NoOpFramerVisitor::OnConnectionCloseFrame(
185 const QuicConnectionCloseFrame& frame) {
186 return true;
187}
188
189bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
190 return true;
191}
192
[email protected]cb23a922014-02-20 17:42:38193bool NoOpFramerVisitor::OnWindowUpdateFrame(
194 const QuicWindowUpdateFrame& frame) {
195 return true;
196}
197
198bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
199 return true;
200}
201
rchcaec4242016-01-22 20:49:52202bool NoOpFramerVisitor::OnPathCloseFrame(const QuicPathCloseFrame& frame) {
203 return true;
204}
205
rtenneti021e8822015-10-18 23:59:57206MockConnectionVisitor::MockConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10207
rtenneti021e8822015-10-18 23:59:57208MockConnectionVisitor::~MockConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10209
rch99b644c2015-11-04 05:25:28210MockConnectionHelper::MockConnectionHelper() {}
[email protected]9c0b1352012-11-04 00:03:27211
rch99b644c2015-11-04 05:25:28212MockConnectionHelper::~MockConnectionHelper() {}
[email protected]9c0b1352012-11-04 00:03:27213
rch99b644c2015-11-04 05:25:28214const QuicClock* MockConnectionHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27215 return &clock_;
216}
217
rch99b644c2015-11-04 05:25:28218QuicRandom* MockConnectionHelper::GetRandomGenerator() {
[email protected]9558c5d32012-12-22 00:08:14219 return &random_generator_;
220}
221
rch16c74d1d2016-04-22 06:14:07222QuicAlarm* MockAlarmFactory::CreateAlarm(QuicAlarm::Delegate* delegate) {
223 return new MockAlarmFactory::TestAlarm(
jdorfman4ea54a22016-01-21 22:12:50224 QuicArenaScopedPtr<QuicAlarm::Delegate>(delegate));
225}
226
rch16c74d1d2016-04-22 06:14:07227QuicArenaScopedPtr<QuicAlarm> MockAlarmFactory::CreateAlarm(
jdorfman4ea54a22016-01-21 22:12:50228 QuicArenaScopedPtr<QuicAlarm::Delegate> delegate,
229 QuicConnectionArena* arena) {
230 if (arena != nullptr) {
rch16c74d1d2016-04-22 06:14:07231 return arena->New<MockAlarmFactory::TestAlarm>(std::move(delegate));
jdorfman4ea54a22016-01-21 22:12:50232 } else {
rch16c74d1d2016-04-22 06:14:07233 return QuicArenaScopedPtr<MockAlarmFactory::TestAlarm>(
jdorfman4ea54a22016-01-21 22:12:50234 new TestAlarm(std::move(delegate)));
235 }
[email protected]965dbe62013-08-09 21:34:31236}
237
jdorfman5a606722016-01-04 17:41:29238QuicBufferAllocator* MockConnectionHelper::GetBufferAllocator() {
239 return &buffer_allocator_;
240}
241
rch99b644c2015-11-04 05:25:28242void MockConnectionHelper::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55243 clock_.AdvanceTime(delta);
244}
245
rch99b644c2015-11-04 05:25:28246MockConnection::MockConnection(MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07247 MockAlarmFactory* alarm_factory,
rch99b644c2015-11-04 05:25:28248 Perspective perspective)
rchc0815442015-04-18 13:29:46249 : MockConnection(kTestConnectionId,
rtenneti8696cf92014-11-14 21:12:12250 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51251 helper,
rch16c74d1d2016-04-22 06:14:07252 alarm_factory,
rtenneti6f48aa92015-03-16 02:18:48253 perspective,
rtenneti8a4a0732015-10-18 00:45:51254 QuicSupportedVersions()) {}
[email protected]c05a6d222013-12-16 19:42:03255
rtenneti8a4a0732015-10-18 00:45:51256MockConnection::MockConnection(IPEndPoint address,
rch99b644c2015-11-04 05:25:28257 MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07258 MockAlarmFactory* alarm_factory,
rtenneti8a4a0732015-10-18 00:45:51259 Perspective perspective)
rchc0815442015-04-18 13:29:46260 : MockConnection(kTestConnectionId,
rtenneti6f48aa92015-03-16 02:18:48261 address,
rtenneti8a4a0732015-10-18 00:45:51262 helper,
rch16c74d1d2016-04-22 06:14:07263 alarm_factory,
rtenneti6f48aa92015-03-16 02:18:48264 perspective,
rtenneti8a4a0732015-10-18 00:45:51265 QuicSupportedVersions()) {}
[email protected]044ac2b2012-11-13 21:41:06266
[email protected]3aa9ca72014-02-27 19:39:43267MockConnection::MockConnection(QuicConnectionId connection_id,
rch99b644c2015-11-04 05:25:28268 MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07269 MockAlarmFactory* alarm_factory,
rtenneti6f48aa92015-03-16 02:18:48270 Perspective perspective)
rchc0815442015-04-18 13:29:46271 : MockConnection(connection_id,
rtennetifb3fa6c2015-03-16 23:04:55272 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51273 helper,
rch16c74d1d2016-04-22 06:14:07274 alarm_factory,
rchc0815442015-04-18 13:29:46275 perspective,
rtenneti8a4a0732015-10-18 00:45:51276 QuicSupportedVersions()) {}
rchc0815442015-04-18 13:29:46277
rch99b644c2015-11-04 05:25:28278MockConnection::MockConnection(MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07279 MockAlarmFactory* alarm_factory,
rtenneti8a4a0732015-10-18 00:45:51280 Perspective perspective,
rchc0815442015-04-18 13:29:46281 const QuicVersionVector& supported_versions)
282 : MockConnection(kTestConnectionId,
283 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51284 helper,
rch16c74d1d2016-04-22 06:14:07285 alarm_factory,
rchc0815442015-04-18 13:29:46286 perspective,
rtenneti8a4a0732015-10-18 00:45:51287 supported_versions) {}
rchc0815442015-04-18 13:29:46288
289MockConnection::MockConnection(QuicConnectionId connection_id,
290 IPEndPoint address,
rch99b644c2015-11-04 05:25:28291 MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07292 MockAlarmFactory* alarm_factory,
rchc0815442015-04-18 13:29:46293 Perspective perspective,
rchc0815442015-04-18 13:29:46294 const QuicVersionVector& supported_versions)
295 : QuicConnection(connection_id,
296 address,
rtenneti8a4a0732015-10-18 00:45:51297 helper,
rch16c74d1d2016-04-22 06:14:07298 alarm_factory,
jdorfman90d185f32016-01-15 13:22:47299 new testing::NiceMock<MockPacketWriter>(),
rtennetifb3fa6c2015-03-16 23:04:55300 /* owns_writer= */ true,
301 perspective,
rtenneti8a4a0732015-10-18 00:45:51302 supported_versions) {
rchc0815442015-04-18 13:29:46303 ON_CALL(*this, OnError(_))
304 .WillByDefault(
305 Invoke(this, &PacketSavingConnection::QuicConnection_OnError));
[email protected]4d640792013-12-18 22:21:08306}
307
rtenneti021e8822015-10-18 23:59:57308MockConnection::~MockConnection() {}
[email protected]044ac2b2012-11-13 21:41:06309
[email protected]fe053f92013-04-23 20:18:55310void MockConnection::AdvanceTime(QuicTime::Delta delta) {
rch99b644c2015-11-04 05:25:28311 static_cast<MockConnectionHelper*>(helper())->AdvanceTime(delta);
[email protected]fe053f92013-04-23 20:18:55312}
313
rch99b644c2015-11-04 05:25:28314PacketSavingConnection::PacketSavingConnection(MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07315 MockAlarmFactory* alarm_factory,
rtenneti8a4a0732015-10-18 00:45:51316 Perspective perspective)
rch16c74d1d2016-04-22 06:14:07317 : MockConnection(helper, alarm_factory, perspective) {}
[email protected]044ac2b2012-11-13 21:41:06318
[email protected]4d640792013-12-18 22:21:08319PacketSavingConnection::PacketSavingConnection(
rch99b644c2015-11-04 05:25:28320 MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07321 MockAlarmFactory* alarm_factory,
rtenneti6f48aa92015-03-16 02:18:48322 Perspective perspective,
[email protected]4d640792013-12-18 22:21:08323 const QuicVersionVector& supported_versions)
rch16c74d1d2016-04-22 06:14:07324 : MockConnection(helper, alarm_factory, perspective, supported_versions) {}
[email protected]4d640792013-12-18 22:21:08325
[email protected]044ac2b2012-11-13 21:41:06326PacketSavingConnection::~PacketSavingConnection() {
[email protected]2532de12013-05-09 12:29:33327 STLDeleteElements(&encrypted_packets_);
[email protected]044ac2b2012-11-13 21:41:06328}
329
zhongyi4a9d27b2016-01-12 20:08:31330void PacketSavingConnection::SendOrQueuePacket(SerializedPacket* packet) {
rtenneti2cae2072016-02-05 02:21:33331 encrypted_packets_.push_back(new QuicEncryptedPacket(
332 QuicUtils::CopyBuffer(*packet), packet->encrypted_length, true));
rtenneti31e9fd62014-09-16 05:22:15333 // Transfer ownership of the packet to the SentPacketManager and the
334 // ack notifier to the AckNotifierManager.
ckrasic062b5522016-02-27 01:14:21335 sent_packet_manager_.OnPacketSent(packet, 0, QuicTime::Zero(),
zhongyi4a9d27b2016-01-12 20:08:31336 NOT_RETRANSMISSION,
rjshaded5ced072015-12-18 19:26:02337 HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06338}
339
jri4ee9d762016-04-29 02:04:35340MockQuicSession::MockQuicSession(QuicConnection* connection)
341 : QuicSession(connection, DefaultQuicConfig()) {
342 crypto_stream_.reset(new QuicCryptoStream(this));
343 Initialize();
344 ON_CALL(*this, WritevData(_, _, _, _, _))
345 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
346}
347
348MockQuicSession::~MockQuicSession() {}
349
350// static
351QuicConsumedData MockQuicSession::ConsumeAllData(
352 QuicStreamId /*id*/,
353 const QuicIOVector& data,
354 QuicStreamOffset /*offset*/,
355 bool fin,
356 QuicAckListenerInterface* /*ack_notifier_delegate*/) {
357 return QuicConsumedData(data.total_length, fin);
358}
359
rtennetib865eb82015-06-17 20:21:46360MockQuicSpdySession::MockQuicSpdySession(QuicConnection* connection)
361 : QuicSpdySession(connection, DefaultQuicConfig()) {
rtennetid39bd762015-06-12 01:05:52362 crypto_stream_.reset(new QuicCryptoStream(this));
363 Initialize();
rjshaded069aaee2016-03-11 20:42:17364 ON_CALL(*this, WritevData(_, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07365 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06366}
367
rtenneti021e8822015-10-18 23:59:57368MockQuicSpdySession::~MockQuicSpdySession() {}
[email protected]044ac2b2012-11-13 21:41:06369
rtennetib865eb82015-06-17 20:21:46370TestQuicSpdyServerSession::TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52371 QuicConnection* connection,
372 const QuicConfig& config,
rjshaded069aaee2016-03-11 20:42:17373 const QuicCryptoServerConfig* crypto_config,
374 QuicCompressedCertsCache* compressed_certs_cache)
375 : QuicServerSessionBase(config,
376 connection,
377 &visitor_,
378 crypto_config,
379 compressed_certs_cache) {
rtennetid39bd762015-06-12 01:05:52380 Initialize();
[email protected]ccb34212014-07-18 09:27:50381}
[email protected]2532de12013-05-09 12:29:33382
rtenneti021e8822015-10-18 23:59:57383TestQuicSpdyServerSession::~TestQuicSpdyServerSession() {}
[email protected]2532de12013-05-09 12:29:33384
jokulikc971baf92016-01-06 00:36:39385QuicCryptoServerStreamBase*
386TestQuicSpdyServerSession::CreateQuicCryptoServerStream(
rjshaded069aaee2016-03-11 20:42:17387 const QuicCryptoServerConfig* crypto_config,
388 QuicCompressedCertsCache* compressed_certs_cache) {
389 return new QuicCryptoServerStream(crypto_config, compressed_certs_cache,
390 FLAGS_enable_quic_stateless_reject_support,
391 this);
jokulikc971baf92016-01-06 00:36:39392}
393
rtennetib865eb82015-06-17 20:21:46394QuicCryptoServerStream* TestQuicSpdyServerSession::GetCryptoStream() {
zhongyib8677022015-12-01 05:51:30395 return static_cast<QuicCryptoServerStream*>(
jokulikc971baf92016-01-06 00:36:39396 QuicServerSessionBase::GetCryptoStream());
[email protected]2532de12013-05-09 12:29:33397}
398
rtennetib865eb82015-06-17 20:21:46399TestQuicSpdyClientSession::TestQuicSpdyClientSession(
400 QuicConnection* connection,
401 const QuicConfig& config,
402 const QuicServerId& server_id,
403 QuicCryptoClientConfig* crypto_config)
ckrasic244375a32016-02-04 21:21:22404 : QuicClientSessionBase(connection, &push_promise_index_, config) {
rtennetid39bd762015-06-12 01:05:52405 crypto_stream_.reset(new QuicCryptoClientStream(
406 server_id, this, CryptoTestUtils::ProofVerifyContextForTesting(),
rtenneti2cae2072016-02-05 02:21:33407 crypto_config, this));
rtennetid39bd762015-06-12 01:05:52408 Initialize();
[email protected]90f62f092014-03-24 02:41:23409}
410
rtenneti021e8822015-10-18 23:59:57411TestQuicSpdyClientSession::~TestQuicSpdyClientSession() {}
[email protected]90f62f092014-03-24 02:41:23412
ckrasic244375a32016-02-04 21:21:22413bool TestQuicSpdyClientSession::IsAuthorized(const string& authority) {
414 return true;
415}
416
rtennetib865eb82015-06-17 20:21:46417QuicCryptoClientStream* TestQuicSpdyClientSession::GetCryptoStream() {
rtennetid39bd762015-06-12 01:05:52418 return crypto_stream_.get();
rtennetia2ea9162015-05-15 19:26:44419}
420
[email protected]cbd731e2013-10-24 00:20:39421MockPacketWriter::MockPacketWriter() {
rtenneti493d90ef2015-09-14 04:43:11422 ON_CALL(*this, GetMaxPacketSize(_))
423 .WillByDefault(testing::Return(kMaxPacketSize));
[email protected]cbd731e2013-10-24 00:20:39424}
425
rtenneti021e8822015-10-18 23:59:57426MockPacketWriter::~MockPacketWriter() {}
[email protected]cbd731e2013-10-24 00:20:39427
rtenneti021e8822015-10-18 23:59:57428MockSendAlgorithm::MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10429
rtenneti021e8822015-10-18 23:59:57430MockSendAlgorithm::~MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10431
rtenneti021e8822015-10-18 23:59:57432MockLossAlgorithm::MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43433
rtenneti021e8822015-10-18 23:59:57434MockLossAlgorithm::~MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43435
ckrasicea295fe2015-10-31 05:03:27436MockAckListener::MockAckListener() {}
[email protected]97cf3022013-09-05 14:30:16437
ckrasicea295fe2015-10-31 05:03:27438MockAckListener::~MockAckListener() {}
[email protected]97cf3022013-09-05 14:30:16439
rtenneti021e8822015-10-18 23:59:57440MockNetworkChangeVisitor::MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24441
rtenneti021e8822015-10-18 23:59:57442MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24443
[email protected]8b37a092012-10-18 21:53:49444namespace {
445
rjshaded5ced072015-12-18 19:26:02446string HexDumpWithMarks(const char* data,
447 int length,
448 const bool* marks,
449 int mark_length) {
[email protected]8b37a092012-10-18 21:53:49450 static const char kHexChars[] = "0123456789abcdef";
451 static const int kColumns = 4;
452
453 const int kSizeLimit = 1024;
454 if (length > kSizeLimit || mark_length > kSizeLimit) {
455 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
456 length = min(length, kSizeLimit);
457 mark_length = min(mark_length, kSizeLimit);
458 }
459
460 string hex;
rjshaded5ced072015-12-18 19:26:02461 for (const char *row = data; length > 0;
[email protected]8b37a092012-10-18 21:53:49462 row += kColumns, length -= kColumns) {
rjshaded5ced072015-12-18 19:26:02463 for (const char* p = row; p < row + 4; ++p) {
[email protected]8b37a092012-10-18 21:53:49464 if (p < row + length) {
465 const bool mark =
466 (marks && (p - data) < mark_length && marks[p - data]);
467 hex += mark ? '*' : ' ';
468 hex += kHexChars[(*p & 0xf0) >> 4];
469 hex += kHexChars[*p & 0x0f];
470 hex += mark ? '*' : ' ';
471 } else {
472 hex += " ";
473 }
474 }
475 hex = hex + " ";
476
rtenneti6f48aa92015-03-16 02:18:48477 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
[email protected]8b37a092012-10-18 21:53:49478 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
rtenneti6f48aa92015-03-16 02:18:48479 }
[email protected]8b37a092012-10-18 21:53:49480
481 hex = hex + '\n';
482 }
483 return hex;
484}
485
486} // namespace
487
martijncc5402d2016-02-16 19:08:58488IPAddress TestPeerIPAddress() {
rjshaded5ced072015-12-18 19:26:02489 return Loopback4();
490}
[email protected]300ccd52014-01-25 08:00:19491
rjshaded5ced072015-12-18 19:26:02492QuicVersion QuicVersionMax() {
493 return QuicSupportedVersions().front();
494}
[email protected]b007e632013-10-28 08:39:25495
rjshaded5ced072015-12-18 19:26:02496QuicVersion QuicVersionMin() {
497 return QuicSupportedVersions().back();
498}
[email protected]b007e632013-10-28 08:39:25499
martijncc5402d2016-02-16 19:08:58500IPAddress Loopback4() {
eroman36d84e54432016-03-17 03:23:02501 return IPAddress::IPv4Localhost();
[email protected]c05a6d222013-12-16 19:42:03502}
503
martijncc5402d2016-02-16 19:08:58504IPAddress Loopback6() {
eroman36d84e54432016-03-17 03:23:02505 return IPAddress::IPv6Localhost();
[email protected]730b35d72014-06-05 03:23:22506}
507
martijncc5402d2016-02-16 19:08:58508IPAddress Any4() {
eroman36d84e54432016-03-17 03:23:02509 return IPAddress::IPv4AllZeros();
rtennetie0ee6eb2015-05-01 00:55:09510}
511
[email protected]9bb57c72014-03-31 20:36:04512void GenerateBody(string* body, int length) {
513 body->clear();
514 body->reserve(length);
515 for (int i = 0; i < length; ++i) {
516 body->append(1, static_cast<char>(32 + i % (126 - 32)));
517 }
518}
519
rtennetia004d332015-08-28 06:44:57520QuicEncryptedPacket* ConstructEncryptedPacket(QuicConnectionId connection_id,
521 bool version_flag,
jric533399b2016-01-29 07:36:01522 bool multipath_flag,
rtennetia004d332015-08-28 06:44:57523 bool reset_flag,
jric533399b2016-01-29 07:36:01524 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57525 QuicPacketNumber packet_number,
526 const string& data) {
jric533399b2016-01-29 07:36:01527 return ConstructEncryptedPacket(connection_id, version_flag, multipath_flag,
528 reset_flag, path_id, packet_number, data,
529 PACKET_8BYTE_CONNECTION_ID,
530 PACKET_6BYTE_PACKET_NUMBER);
rtenneti9e0fb502015-03-08 06:07:16531}
532
533QuicEncryptedPacket* ConstructEncryptedPacket(
534 QuicConnectionId connection_id,
535 bool version_flag,
jric533399b2016-01-29 07:36:01536 bool multipath_flag,
rtenneti9e0fb502015-03-08 06:07:16537 bool reset_flag,
jric533399b2016-01-29 07:36:01538 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57539 QuicPacketNumber packet_number,
rtenneti9e0fb502015-03-08 06:07:16540 const string& data,
541 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57542 QuicPacketNumberLength packet_number_length) {
jric533399b2016-01-29 07:36:01543 return ConstructEncryptedPacket(
544 connection_id, version_flag, multipath_flag, reset_flag, path_id,
545 packet_number, data, connection_id_length, packet_number_length, nullptr);
rchc0815442015-04-18 13:29:46546}
547
548QuicEncryptedPacket* ConstructEncryptedPacket(
549 QuicConnectionId connection_id,
550 bool version_flag,
jric533399b2016-01-29 07:36:01551 bool multipath_flag,
rchc0815442015-04-18 13:29:46552 bool reset_flag,
jric533399b2016-01-29 07:36:01553 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57554 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46555 const string& data,
556 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57557 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46558 QuicVersionVector* versions) {
alyssar2adf3ac2016-05-03 17:12:58559 return ConstructEncryptedPacket(connection_id, version_flag, multipath_flag,
560 reset_flag, path_id, packet_number, data,
561 connection_id_length, packet_number_length,
562 versions, Perspective::IS_CLIENT);
563}
564QuicEncryptedPacket* ConstructEncryptedPacket(
565 QuicConnectionId connection_id,
566 bool version_flag,
567 bool multipath_flag,
568 bool reset_flag,
569 QuicPathId path_id,
570 QuicPacketNumber packet_number,
571 const string& data,
572 QuicConnectionIdLength connection_id_length,
573 QuicPacketNumberLength packet_number_length,
574 QuicVersionVector* versions,
575 Perspective perspective) {
[email protected]ffc34bf2014-03-07 02:42:02576 QuicPacketHeader header;
577 header.public_header.connection_id = connection_id;
rtenneti9e0fb502015-03-08 06:07:16578 header.public_header.connection_id_length = connection_id_length;
[email protected]ffc34bf2014-03-07 02:42:02579 header.public_header.version_flag = version_flag;
jric533399b2016-01-29 07:36:01580 header.public_header.multipath_flag = multipath_flag;
[email protected]ffc34bf2014-03-07 02:42:02581 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57582 header.public_header.packet_number_length = packet_number_length;
jric533399b2016-01-29 07:36:01583 header.path_id = path_id;
rtenneti8dd12b22015-10-21 01:26:38584 header.packet_number = packet_number;
[email protected]ffc34bf2014-03-07 02:42:02585 header.entropy_flag = false;
586 header.entropy_hash = 0;
587 header.fec_flag = false;
588 header.is_in_fec_group = NOT_IN_FEC_GROUP;
589 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44590 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
[email protected]ffc34bf2014-03-07 02:42:02591 QuicFrame frame(&stream_frame);
592 QuicFrames frames;
593 frames.push_back(frame);
rchc0815442015-04-18 13:29:46594 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
alyssar2adf3ac2016-05-03 17:12:58595 QuicTime::Zero(), perspective);
rchc0815442015-04-18 13:29:46596
danakjad1777e2016-04-16 00:56:42597 std::unique_ptr<QuicPacket> packet(
rtennetib6ac61a52015-02-11 20:20:52598 BuildUnsizedDataPacket(&framer, header, frames));
rtennetibe635732014-10-02 22:51:42599 EXPECT_TRUE(packet != nullptr);
rch99b644c2015-11-04 05:25:28600 char* buffer = new char[kMaxPacketSize];
601 size_t encrypted_length = framer.EncryptPayload(
jric533399b2016-01-29 07:36:01602 ENCRYPTION_NONE, path_id, packet_number, *packet, buffer, kMaxPacketSize);
rch99b644c2015-11-04 05:25:28603 EXPECT_NE(0u, encrypted_length);
604 return new QuicEncryptedPacket(buffer, encrypted_length, true);
[email protected]ffc34bf2014-03-07 02:42:02605}
606
jokulikf2bd55c52016-03-24 22:35:30607QuicReceivedPacket* ConstructReceivedPacket(
608 const QuicEncryptedPacket& encrypted_packet,
609 QuicTime receipt_time) {
610 char* buffer = new char[encrypted_packet.length()];
611 memcpy(buffer, encrypted_packet.data(), encrypted_packet.length());
612 return new QuicReceivedPacket(buffer, encrypted_packet.length(), receipt_time,
613 true);
614}
615
rchc0815442015-04-18 13:29:46616QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
617 QuicConnectionId connection_id,
618 bool version_flag,
jric533399b2016-01-29 07:36:01619 bool multipath_flag,
rchc0815442015-04-18 13:29:46620 bool reset_flag,
jric533399b2016-01-29 07:36:01621 QuicPathId path_id,
rtennetia004d332015-08-28 06:44:57622 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46623 const string& data,
624 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57625 QuicPacketNumberLength packet_number_length,
alyssar2adf3ac2016-05-03 17:12:58626 QuicVersionVector* versions,
627 Perspective perspective) {
rchc0815442015-04-18 13:29:46628 QuicPacketHeader header;
629 header.public_header.connection_id = connection_id;
630 header.public_header.connection_id_length = connection_id_length;
631 header.public_header.version_flag = version_flag;
jric533399b2016-01-29 07:36:01632 header.public_header.multipath_flag = multipath_flag;
rchc0815442015-04-18 13:29:46633 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57634 header.public_header.packet_number_length = packet_number_length;
jric533399b2016-01-29 07:36:01635 header.path_id = path_id;
rtenneti8dd12b22015-10-21 01:26:38636 header.packet_number = packet_number;
rchc0815442015-04-18 13:29:46637 header.entropy_flag = false;
638 header.entropy_hash = 0;
639 header.fec_flag = false;
640 header.is_in_fec_group = NOT_IN_FEC_GROUP;
641 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44642 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
rtenneti85816fdf2015-05-25 03:01:10643 QuicFrame frame(&stream_frame);
rchc0815442015-04-18 13:29:46644 QuicFrames frames;
rtenneti85816fdf2015-05-25 03:01:10645 frames.push_back(frame);
646 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
alyssar2adf3ac2016-05-03 17:12:58647 QuicTime::Zero(), perspective);
rtenneti85816fdf2015-05-25 03:01:10648
danakjad1777e2016-04-16 00:56:42649 std::unique_ptr<QuicPacket> packet(
rchc0815442015-04-18 13:29:46650 BuildUnsizedDataPacket(&framer, header, frames));
651 EXPECT_TRUE(packet != nullptr);
rtenneti85816fdf2015-05-25 03:01:10652
alyssarc2f70a52016-05-04 13:15:49653 if (framer.version() <= QUIC_VERSION_33) {
654 // Now set the packet's private flags byte to 0xFF, which is an invalid
655 // value.
656 reinterpret_cast<unsigned char*>(
657 packet->mutable_data())[GetStartOfEncryptedData(
658 framer.version(), connection_id_length, version_flag, multipath_flag,
659 false /* no diversification nonce */, packet_number_length)] = 0xFF;
660 } else {
661 // Now set the frame type to 0x1F, which is an invalid frame type.
662 reinterpret_cast<unsigned char*>(
663 packet->mutable_data())[GetStartOfEncryptedData(
664 framer.version(), connection_id_length, version_flag, multipath_flag,
665 false /* no diversification nonce */, packet_number_length)] = 0x1F;
666 }
rtenneti85816fdf2015-05-25 03:01:10667
rch99b644c2015-11-04 05:25:28668 char* buffer = new char[kMaxPacketSize];
669 size_t encrypted_length = framer.EncryptPayload(
jric533399b2016-01-29 07:36:01670 ENCRYPTION_NONE, path_id, packet_number, *packet, buffer, kMaxPacketSize);
rch99b644c2015-11-04 05:25:28671 EXPECT_NE(0u, encrypted_length);
672 return new QuicEncryptedPacket(buffer, encrypted_length, true);
rchc0815442015-04-18 13:29:46673}
674
rjshaded5ced072015-12-18 19:26:02675void CompareCharArraysWithHexError(const string& description,
676 const char* actual,
677 const int actual_len,
678 const char* expected,
679 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25680 EXPECT_EQ(actual_len, expected_len);
[email protected]8b37a092012-10-18 21:53:49681 const int min_len = min(actual_len, expected_len);
682 const int max_len = max(actual_len, expected_len);
danakjad1777e2016-04-16 00:56:42683 std::unique_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49684 bool identical = (actual_len == expected_len);
685 for (int i = 0; i < min_len; ++i) {
686 if (actual[i] != expected[i]) {
687 marks[i] = true;
688 identical = false;
689 } else {
690 marks[i] = false;
691 }
692 }
693 for (int i = min_len; i < max_len; ++i) {
694 marks[i] = true;
695 }
rjshaded5ced072015-12-18 19:26:02696 if (identical)
697 return;
jric533399b2016-01-29 07:36:01698 ADD_FAILURE() << "Description:\n"
699 << description << "\n\nExpected:\n"
rjshaded5ced072015-12-18 19:26:02700 << HexDumpWithMarks(expected, expected_len, marks.get(),
701 max_len)
702 << "\nActual:\n"
703 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
[email protected]8b37a092012-10-18 21:53:49704}
705
[email protected]b12764d2013-12-02 22:28:30706bool DecodeHexString(const base::StringPiece& hex, std::string* bytes) {
707 bytes->clear();
708 if (hex.empty())
709 return true;
Avi Drissman13fc8932015-12-20 04:40:46710 std::vector<uint8_t> v;
[email protected]b12764d2013-12-02 22:28:30711 if (!base::HexStringToBytes(hex.as_string(), &v))
712 return false;
713 if (!v.empty())
714 bytes->assign(reinterpret_cast<const char*>(&v[0]), v.size());
715 return true;
716}
717
[email protected]d3d15bf2013-01-30 02:51:54718static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43719 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33720 const CryptoHandshakeMessage& message,
721 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49722 CryptoFramer crypto_framer;
danakjad1777e2016-04-16 00:56:42723 std::unique_ptr<QuicData> data(
724 crypto_framer.ConstructHandshakeMessage(message));
rtenneti6f48aa92015-03-16 02:18:48725 QuicFramer quic_framer(QuicSupportedVersions(), QuicTime::Zero(),
726 Perspective::IS_CLIENT);
[email protected]8b37a092012-10-18 21:53:49727
728 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43729 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03730 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33731 header.public_header.version_flag = should_include_version;
rtenneti8dd12b22015-10-21 01:26:38732 header.packet_number = 1;
[email protected]9db443912013-02-25 05:27:03733 header.entropy_flag = false;
734 header.entropy_hash = 0;
735 header.fec_flag = false;
[email protected]8b37a092012-10-18 21:53:49736 header.fec_group = 0;
737
[email protected]be24ab22012-10-22 03:01:52738 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
rtennetia4228ea2015-06-04 02:31:44739 data->AsStringPiece());
[email protected]8b37a092012-10-18 21:53:49740
[email protected]be24ab22012-10-22 03:01:52741 QuicFrame frame(&stream_frame);
742 QuicFrames frames;
743 frames.push_back(frame);
rtennetib6ac61a52015-02-11 20:20:52744 return BuildUnsizedDataPacket(&quic_framer, header, frames);
[email protected]8b37a092012-10-18 21:53:49745}
746
[email protected]3aa9ca72014-02-27 19:39:43747QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
748 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54749 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14750 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43751 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54752}
753
rtennetia004d332015-08-28 06:44:57754size_t GetPacketLengthForOneStream(QuicVersion version,
755 bool include_version,
rchcaec4242016-01-22 20:49:52756 bool include_path_id,
rch012834cf2016-04-26 02:06:37757 bool include_diversification_nonce,
rtennetia004d332015-08-28 06:44:57758 QuicConnectionIdLength connection_id_length,
759 QuicPacketNumberLength packet_number_length,
rtennetia004d332015-08-28 06:44:57760 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30761 *payload_length = 1;
762 const size_t stream_length =
[email protected]5dafdb62013-11-14 01:24:26763 NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17764 QuicPacketCreator::StreamFramePacketOverhead(
alyssarc2f70a52016-05-04 13:15:49765 version, PACKET_8BYTE_CONNECTION_ID, include_version, include_path_id,
rch012834cf2016-04-26 02:06:37766 include_diversification_nonce, packet_number_length, 0u);
rtennetic14c8ab2015-06-18 05:47:40767 const size_t ack_length =
768 NullEncrypter().GetCiphertextSize(
alyssar2adf3ac2016-05-03 17:12:58769 QuicFramer::GetMinAckFrameSize(version, PACKET_1BYTE_PACKET_NUMBER)) +
alyssarc2f70a52016-05-04 13:15:49770 GetPacketHeaderSize(version, connection_id_length, include_version,
rch012834cf2016-04-26 02:06:37771 include_path_id, include_diversification_nonce,
772 packet_number_length);
[email protected]f62262b2013-07-05 20:57:30773 if (stream_length < ack_length) {
774 *payload_length = 1 + ack_length - stream_length;
775 }
776
[email protected]5dafdb62013-11-14 01:24:26777 return NullEncrypter().GetCiphertextSize(*payload_length) +
rtennetia004d332015-08-28 06:44:57778 QuicPacketCreator::StreamFramePacketOverhead(
alyssarc2f70a52016-05-04 13:15:49779 version, connection_id_length, include_version, include_path_id,
rch012834cf2016-04-26 02:06:37780 include_diversification_nonce, packet_number_length, 0u);
[email protected]5351cc4b2013-03-03 07:22:41781}
782
[email protected]a5b98172014-06-18 07:01:59783TestEntropyCalculator::TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31784
[email protected]a5b98172014-06-18 07:01:59785TestEntropyCalculator::~TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31786
[email protected]48878092013-07-26 14:51:56787QuicPacketEntropyHash TestEntropyCalculator::EntropyHash(
rtennetia004d332015-08-28 06:44:57788 QuicPacketNumber packet_number) const {
[email protected]9db443912013-02-25 05:27:03789 return 1u;
790}
791
[email protected]a5b98172014-06-18 07:01:59792MockEntropyCalculator::MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31793
[email protected]a5b98172014-06-18 07:01:59794MockEntropyCalculator::~MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31795
[email protected]b064310782013-05-30 21:12:17796QuicConfig DefaultQuicConfig() {
797 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21798 config.SetInitialStreamFlowControlWindowToSend(
799 kInitialStreamFlowControlWindowForTest);
800 config.SetInitialSessionFlowControlWindowToSend(
801 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17802 return config;
803}
804
rtennetia2ea9162015-05-15 19:26:44805QuicConfig DefaultQuicConfigStatelessRejects() {
806 QuicConfig config = DefaultQuicConfig();
807 QuicTagVector copt;
808 copt.push_back(kSREJ);
809 config.SetConnectionOptionsToSend(copt);
810 return config;
811}
812
[email protected]4d640792013-12-18 22:21:08813QuicVersionVector SupportedVersions(QuicVersion version) {
814 QuicVersionVector versions;
815 versions.push_back(version);
816 return versions;
817}
818
rtenneti021e8822015-10-18 23:59:57819MockQuicConnectionDebugVisitor::MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23820
rtenneti021e8822015-10-18 23:59:57821MockQuicConnectionDebugVisitor::~MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23822
fayanga31a74b2015-12-28 17:27:14823MockReceivedPacketManager::MockReceivedPacketManager(QuicConnectionStats* stats)
824 : QuicReceivedPacketManager(stats) {}
825
826MockReceivedPacketManager::~MockReceivedPacketManager() {}
827
rtennetid39bd762015-06-12 01:05:52828void CreateClientSessionForTest(QuicServerId server_id,
829 bool supports_stateless_rejects,
830 QuicTime::Delta connection_start_time,
zhongyib8677022015-12-01 05:51:30831 QuicVersionVector supported_versions,
rch99b644c2015-11-04 05:25:28832 MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07833 MockAlarmFactory* alarm_factory,
rtennetid39bd762015-06-12 01:05:52834 QuicCryptoClientConfig* crypto_client_config,
835 PacketSavingConnection** client_connection,
rtennetib865eb82015-06-17 20:21:46836 TestQuicSpdyClientSession** client_session) {
rtennetia2ea9162015-05-15 19:26:44837 CHECK(crypto_client_config);
838 CHECK(client_connection);
839 CHECK(client_session);
rtennetia2ea9162015-05-15 19:26:44840 CHECK(!connection_start_time.IsZero())
841 << "Connections must start at non-zero times, otherwise the "
842 << "strike-register will be unhappy.";
843
844 QuicConfig config = supports_stateless_rejects
845 ? DefaultQuicConfigStatelessRejects()
846 : DefaultQuicConfig();
zhongyib8677022015-12-01 05:51:30847 *client_connection = new PacketSavingConnection(
rch16c74d1d2016-04-22 06:14:07848 helper, alarm_factory, Perspective::IS_CLIENT, supported_versions);
rtennetib865eb82015-06-17 20:21:46849 *client_session = new TestQuicSpdyClientSession(
850 *client_connection, config, server_id, crypto_client_config);
rtennetia2ea9162015-05-15 19:26:44851 (*client_connection)->AdvanceTime(connection_start_time);
852}
853
rjshaded069aaee2016-03-11 20:42:17854void CreateServerSessionForTest(
855 QuicServerId server_id,
856 QuicTime::Delta connection_start_time,
857 QuicVersionVector supported_versions,
858 MockConnectionHelper* helper,
rch16c74d1d2016-04-22 06:14:07859 MockAlarmFactory* alarm_factory,
rjshaded069aaee2016-03-11 20:42:17860 QuicCryptoServerConfig* server_crypto_config,
861 QuicCompressedCertsCache* compressed_certs_cache,
862 PacketSavingConnection** server_connection,
863 TestQuicSpdyServerSession** server_session) {
rtennetia2ea9162015-05-15 19:26:44864 CHECK(server_crypto_config);
865 CHECK(server_connection);
866 CHECK(server_session);
rtennetia2ea9162015-05-15 19:26:44867 CHECK(!connection_start_time.IsZero())
868 << "Connections must start at non-zero times, otherwise the "
869 << "strike-register will be unhappy.";
870
zhongyib8677022015-12-01 05:51:30871 *server_connection = new PacketSavingConnection(
rch16c74d1d2016-04-22 06:14:07872 helper, alarm_factory, Perspective::IS_SERVER, supported_versions);
rtennetib865eb82015-06-17 20:21:46873 *server_session = new TestQuicSpdyServerSession(
rjshaded069aaee2016-03-11 20:42:17874 *server_connection, DefaultQuicConfig(), server_crypto_config,
875 compressed_certs_cache);
rtennetia2ea9162015-05-15 19:26:44876
877 // We advance the clock initially because the default time is zero and the
Avi Drissman13fc8932015-12-20 04:40:46878 // strike register worries that we've just overflowed a uint32_t time.
rtennetia2ea9162015-05-15 19:26:44879 (*server_connection)->AdvanceTime(connection_start_time);
880}
881
ckrasic99850b32015-10-16 21:15:58882QuicStreamId QuicClientDataStreamId(int i) {
883 return kClientDataStreamId1 + 2 * i;
884}
885
[email protected]8b37a092012-10-18 21:53:49886} // namespace test
[email protected]8b37a092012-10-18 21:53:49887} // namespace net