blob: 1df602e76714df7c249e62962626e72eeac8d11f [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
[email protected]a5b98172014-06-18 07:01:597#include "base/sha1.h"
[email protected]701bc892013-01-17 04:51:548#include "base/stl_util.h"
[email protected]b12764d2013-12-02 22:28:309#include "base/strings/string_number_conversions.h"
[email protected]8b37a092012-10-18 21:53:4910#include "net/quic/crypto/crypto_framer.h"
[email protected]6f54ab32013-03-02 17:43:3511#include "net/quic/crypto/crypto_handshake.h"
[email protected]872edd9e2013-01-16 08:51:1512#include "net/quic/crypto/crypto_utils.h"
[email protected]5351cc4b2013-03-03 07:22:4113#include "net/quic/crypto/null_encrypter.h"
[email protected]4df69842013-02-27 06:32:1614#include "net/quic/crypto/quic_decrypter.h"
15#include "net/quic/crypto/quic_encrypter.h"
rtenneti16a20772015-02-17 18:58:4816#include "net/quic/quic_data_writer.h"
[email protected]a57e0272013-04-26 07:31:4717#include "net/quic/quic_framer.h"
[email protected]5351cc4b2013-03-03 07:22:4118#include "net/quic/quic_packet_creator.h"
[email protected]79d13dcb2014-02-05 07:23:1319#include "net/quic/quic_utils.h"
rtennetid39bd762015-06-12 01:05:5220#include "net/quic/test_tools/crypto_test_utils.h"
[email protected]cbd731e2013-10-24 00:20:3921#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0422#include "net/spdy/spdy_frame_builder.h"
rchc99f380c2015-03-26 19:50:5623#include "net/tools/quic/quic_per_connection_packet_writer.h"
[email protected]8b37a092012-10-18 21:53:4924
[email protected]c244c5a12013-05-07 20:55:0425using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4926using std::max;
27using std::min;
28using std::string;
rchc0815442015-04-18 13:29:4629using testing::Invoke;
[email protected]bc356fe2014-06-19 11:14:1430using testing::_;
[email protected]8b37a092012-10-18 21:53:4931
32namespace net {
33namespace test {
[email protected]965dbe62013-08-09 21:34:3134namespace {
35
36// No-op alarm implementation used by MockHelper.
37class TestAlarm : public QuicAlarm {
38 public:
39 explicit TestAlarm(QuicAlarm::Delegate* delegate)
40 : QuicAlarm(delegate) {
41 }
42
dchengb03027d2014-10-21 12:00:2043 void SetImpl() override {}
44 void CancelImpl() override {}
[email protected]965dbe62013-08-09 21:34:3145};
46
47} // namespace
[email protected]8b37a092012-10-18 21:53:4948
rtennetia004d332015-08-28 06:44:5749QuicAckFrame MakeAckFrame(QuicPacketNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4950 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3751 ack.largest_observed = largest_observed;
52 ack.entropy_hash = 0;
[email protected]fb35b0a2014-04-15 21:06:4953 return ack;
54}
55
rtennetia004d332015-08-28 06:44:5756QuicAckFrame MakeAckFrameWithNackRanges(size_t num_nack_ranges,
57 QuicPacketNumber least_unacked) {
[email protected]310d37b2014-08-02 06:15:3758 QuicAckFrame ack = MakeAckFrame(2 * num_nack_ranges + least_unacked);
[email protected]aa7e4ef2014-05-28 03:53:1559 // Add enough missing packets to get num_nack_ranges nack ranges.
rtennetia004d332015-08-28 06:44:5760 for (QuicPacketNumber i = 1; i < 2 * num_nack_ranges; i += 2) {
rtenneti493d90ef2015-09-14 04:43:1161 ack.missing_packets.Add(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1562 }
63 return ack;
64}
65
rtennetib6ac61a52015-02-11 20:20:5266QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
67 const QuicPacketHeader& header,
68 const QuicFrames& frames) {
[email protected]9cda5fd2014-06-03 10:20:2869 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
70 size_t packet_size = GetPacketHeaderSize(header);
71 for (size_t i = 0; i < frames.size(); ++i) {
72 DCHECK_LE(packet_size, max_plaintext_size);
73 bool first_frame = i == 0;
74 bool last_frame = i == frames.size() - 1;
75 const size_t frame_size = framer->GetSerializedFrameLength(
76 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
rtennetia004d332015-08-28 06:44:5777 header.is_in_fec_group, header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2878 DCHECK(frame_size);
79 packet_size += frame_size;
80 }
rtenneti16a20772015-02-17 18:58:4881 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
82}
83
84QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
85 const QuicPacketHeader& header,
86 const QuicFrames& frames,
87 size_t packet_size) {
88 char* buffer = new char[packet_size];
alyssarc39b80f2015-10-22 17:13:5889 size_t length = framer->BuildDataPacket(header, frames, buffer, packet_size);
90 DCHECK_NE(0u, length);
91 // Re-construct the data packet with data ownership.
92 return new QuicPacket(buffer, length, /* owns_buffer */ true,
rtenneti16a20772015-02-17 18:58:4893 header.public_header.connection_id_length,
94 header.public_header.version_flag,
rtennetia004d332015-08-28 06:44:5795 header.public_header.packet_number_length);
[email protected]9cda5fd2014-06-03 10:20:2896}
97
[email protected]a5b98172014-06-18 07:01:5998uint64 SimpleRandom::RandUint64() {
99 unsigned char hash[base::kSHA1Length];
100 base::SHA1HashBytes(reinterpret_cast<unsigned char*>(&seed_), sizeof(seed_),
101 hash);
102 memcpy(&seed_, hash, sizeof(seed_));
103 return seed_;
104}
105
[email protected]8b37a092012-10-18 21:53:49106MockFramerVisitor::MockFramerVisitor() {
107 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:33108 ON_CALL(*this, OnProtocolVersionMismatch(_))
109 .WillByDefault(testing::Return(false));
110
111 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:49112 ON_CALL(*this, OnUnauthenticatedHeader(_))
113 .WillByDefault(testing::Return(true));
114
[email protected]066d8182014-01-04 02:02:45115 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
116 .WillByDefault(testing::Return(true));
117
[email protected]cff7b7b2013-01-11 08:49:07118 ON_CALL(*this, OnPacketHeader(_))
[email protected]8b37a092012-10-18 21:53:49119 .WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47120
121 ON_CALL(*this, OnStreamFrame(_))
122 .WillByDefault(testing::Return(true));
123
124 ON_CALL(*this, OnAckFrame(_))
125 .WillByDefault(testing::Return(true));
126
[email protected]93dd91f2014-02-27 00:09:03127 ON_CALL(*this, OnStopWaitingFrame(_))
128 .WillByDefault(testing::Return(true));
129
[email protected]d8c522112014-04-23 09:23:25130 ON_CALL(*this, OnPingFrame(_))
131 .WillByDefault(testing::Return(true));
132
[email protected]a57e0272013-04-26 07:31:47133 ON_CALL(*this, OnRstStreamFrame(_))
134 .WillByDefault(testing::Return(true));
135
136 ON_CALL(*this, OnConnectionCloseFrame(_))
137 .WillByDefault(testing::Return(true));
138
139 ON_CALL(*this, OnGoAwayFrame(_))
140 .WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49141}
142
rtenneti021e8822015-10-18 23:59:57143MockFramerVisitor::~MockFramerVisitor() {}
[email protected]8b37a092012-10-18 21:53:49144
[email protected]48878092013-07-26 14:51:56145bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33146 return false;
147}
148
[email protected]066d8182014-01-04 02:02:45149bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
150 const QuicPacketPublicHeader& header) {
151 return true;
152}
153
[email protected]ec86d5462013-11-17 16:04:49154bool NoOpFramerVisitor::OnUnauthenticatedHeader(
155 const QuicPacketHeader& header) {
156 return true;
157}
158
[email protected]8b37a092012-10-18 21:53:49159bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
160 return true;
161}
162
[email protected]a57e0272013-04-26 07:31:47163bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
164 return true;
165}
166
167bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
168 return true;
169}
170
[email protected]93dd91f2014-02-27 00:09:03171bool NoOpFramerVisitor::OnStopWaitingFrame(
172 const QuicStopWaitingFrame& frame) {
173 return true;
174}
175
[email protected]d8c522112014-04-23 09:23:25176bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
177 return true;
178}
179
[email protected]a57e0272013-04-26 07:31:47180bool NoOpFramerVisitor::OnRstStreamFrame(
181 const QuicRstStreamFrame& frame) {
182 return true;
183}
184
185bool NoOpFramerVisitor::OnConnectionCloseFrame(
186 const QuicConnectionCloseFrame& frame) {
187 return true;
188}
189
190bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
191 return true;
192}
193
[email protected]cb23a922014-02-20 17:42:38194bool NoOpFramerVisitor::OnWindowUpdateFrame(
195 const QuicWindowUpdateFrame& frame) {
196 return true;
197}
198
199bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
200 return true;
201}
202
rtenneti021e8822015-10-18 23:59:57203MockConnectionVisitor::MockConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10204
rtenneti021e8822015-10-18 23:59:57205MockConnectionVisitor::~MockConnectionVisitor() {}
[email protected]8d659e22013-01-19 04:26:10206
rtenneti021e8822015-10-18 23:59:57207MockHelper::MockHelper() {}
[email protected]9c0b1352012-11-04 00:03:27208
rtenneti021e8822015-10-18 23:59:57209MockHelper::~MockHelper() {}
[email protected]9c0b1352012-11-04 00:03:27210
[email protected]97693d12012-11-16 16:05:00211const QuicClock* MockHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27212 return &clock_;
213}
214
[email protected]9558c5d32012-12-22 00:08:14215QuicRandom* MockHelper::GetRandomGenerator() {
216 return &random_generator_;
217}
218
[email protected]965dbe62013-08-09 21:34:31219QuicAlarm* MockHelper::CreateAlarm(QuicAlarm::Delegate* delegate) {
220 return new TestAlarm(delegate);
221}
222
[email protected]fe053f92013-04-23 20:18:55223void MockHelper::AdvanceTime(QuicTime::Delta delta) {
224 clock_.AdvanceTime(delta);
225}
226
rtenneti3fe4ebbc2014-11-16 16:43:47227QuicPacketWriter* NiceMockPacketWriterFactory::Create(
228 QuicConnection* /*connection*/) const {
229 return new testing::NiceMock<MockPacketWriter>();
230}
[email protected]6d515822014-08-22 01:58:06231
rtenneti8a4a0732015-10-18 00:45:51232MockConnection::MockConnection(MockHelper* helper, Perspective perspective)
233 : MockConnection(helper, perspective, /* is_secure= */ false) {}
rtenneti8696cf92014-11-14 21:12:12234
rtenneti8a4a0732015-10-18 00:45:51235MockConnection::MockConnection(MockHelper* helper,
236 Perspective perspective,
237 bool is_secure)
rchc0815442015-04-18 13:29:46238 : MockConnection(kTestConnectionId,
rtenneti8696cf92014-11-14 21:12:12239 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51240 helper,
rtenneti6f48aa92015-03-16 02:18:48241 perspective,
rtenneti8696cf92014-11-14 21:12:12242 is_secure,
rtenneti8a4a0732015-10-18 00:45:51243 QuicSupportedVersions()) {}
[email protected]c05a6d222013-12-16 19:42:03244
rtenneti8a4a0732015-10-18 00:45:51245MockConnection::MockConnection(IPEndPoint address,
246 MockHelper* helper,
247 Perspective perspective)
rchc0815442015-04-18 13:29:46248 : MockConnection(kTestConnectionId,
rtenneti6f48aa92015-03-16 02:18:48249 address,
rtenneti8a4a0732015-10-18 00:45:51250 helper,
rtenneti6f48aa92015-03-16 02:18:48251 perspective,
rtenneti8696cf92014-11-14 21:12:12252 /* is_secure= */ false,
rtenneti8a4a0732015-10-18 00:45:51253 QuicSupportedVersions()) {}
[email protected]044ac2b2012-11-13 21:41:06254
[email protected]3aa9ca72014-02-27 19:39:43255MockConnection::MockConnection(QuicConnectionId connection_id,
rtenneti8a4a0732015-10-18 00:45:51256 MockHelper* helper,
rtenneti6f48aa92015-03-16 02:18:48257 Perspective perspective)
rchc0815442015-04-18 13:29:46258 : MockConnection(connection_id,
rtenneti8a4a0732015-10-18 00:45:51259 helper,
rtenneti6f48aa92015-03-16 02:18:48260 perspective,
rtenneti8a4a0732015-10-18 00:45:51261 /* is_secure= */ false) {}
[email protected]872edd9e2013-01-16 08:51:15262
rtennetifb3fa6c2015-03-16 23:04:55263MockConnection::MockConnection(QuicConnectionId connection_id,
rtenneti8a4a0732015-10-18 00:45:51264 MockHelper* helper,
rtennetifb3fa6c2015-03-16 23:04:55265 Perspective perspective,
266 bool is_secure)
rchc0815442015-04-18 13:29:46267 : MockConnection(connection_id,
rtennetifb3fa6c2015-03-16 23:04:55268 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51269 helper,
rchc0815442015-04-18 13:29:46270 perspective,
271 is_secure,
rtenneti8a4a0732015-10-18 00:45:51272 QuicSupportedVersions()) {}
rchc0815442015-04-18 13:29:46273
rtenneti8a4a0732015-10-18 00:45:51274MockConnection::MockConnection(MockHelper* helper,
275 Perspective perspective,
rchc0815442015-04-18 13:29:46276 const QuicVersionVector& supported_versions)
277 : MockConnection(kTestConnectionId,
278 IPEndPoint(TestPeerIPAddress(), kTestPort),
rtenneti8a4a0732015-10-18 00:45:51279 helper,
rchc0815442015-04-18 13:29:46280 perspective,
281 /* is_secure= */ false,
rtenneti8a4a0732015-10-18 00:45:51282 supported_versions) {}
rchc0815442015-04-18 13:29:46283
284MockConnection::MockConnection(QuicConnectionId connection_id,
285 IPEndPoint address,
rtenneti8a4a0732015-10-18 00:45:51286 MockHelper* helper,
rchc0815442015-04-18 13:29:46287 Perspective perspective,
288 bool is_secure,
289 const QuicVersionVector& supported_versions)
290 : QuicConnection(connection_id,
291 address,
rtenneti8a4a0732015-10-18 00:45:51292 helper,
rtennetifb3fa6c2015-03-16 23:04:55293 NiceMockPacketWriterFactory(),
294 /* owns_writer= */ true,
295 perspective,
296 is_secure,
rtenneti8a4a0732015-10-18 00:45:51297 supported_versions) {
rchc0815442015-04-18 13:29:46298 ON_CALL(*this, OnError(_))
299 .WillByDefault(
300 Invoke(this, &PacketSavingConnection::QuicConnection_OnError));
[email protected]4d640792013-12-18 22:21:08301}
302
rtenneti021e8822015-10-18 23:59:57303MockConnection::~MockConnection() {}
[email protected]044ac2b2012-11-13 21:41:06304
[email protected]fe053f92013-04-23 20:18:55305void MockConnection::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55306 static_cast<MockHelper*>(helper())->AdvanceTime(delta);
307}
308
rtenneti8a4a0732015-10-18 00:45:51309PacketSavingConnection::PacketSavingConnection(MockHelper* helper,
310 Perspective perspective)
311 : MockConnection(helper, perspective) {}
[email protected]044ac2b2012-11-13 21:41:06312
[email protected]4d640792013-12-18 22:21:08313PacketSavingConnection::PacketSavingConnection(
rtenneti8a4a0732015-10-18 00:45:51314 MockHelper* helper,
rtenneti6f48aa92015-03-16 02:18:48315 Perspective perspective,
[email protected]4d640792013-12-18 22:21:08316 const QuicVersionVector& supported_versions)
rtenneti8a4a0732015-10-18 00:45:51317 : MockConnection(helper, perspective, supported_versions) {}
[email protected]4d640792013-12-18 22:21:08318
[email protected]044ac2b2012-11-13 21:41:06319PacketSavingConnection::~PacketSavingConnection() {
[email protected]2532de12013-05-09 12:29:33320 STLDeleteElements(&encrypted_packets_);
[email protected]044ac2b2012-11-13 21:41:06321}
322
rtenneti31e9fd62014-09-16 05:22:15323void PacketSavingConnection::SendOrQueuePacket(QueuedPacket packet) {
rtennetie0ee6eb2015-05-01 00:55:09324 if (!packet.serialized_packet.packet->owns_buffer()) {
325 scoped_ptr<QuicEncryptedPacket> encrypted_deleter(
326 packet.serialized_packet.packet);
327 packet.serialized_packet.packet = packet.serialized_packet.packet->Clone();
328 }
rtennetib6ac61a52015-02-11 20:20:52329 encrypted_packets_.push_back(packet.serialized_packet.packet);
rtenneti31e9fd62014-09-16 05:22:15330 // Transfer ownership of the packet to the SentPacketManager and the
331 // ack notifier to the AckNotifierManager.
rtennetia4dcff92014-09-29 18:16:08332 sent_packet_manager_.OnPacketSent(
333 &packet.serialized_packet, 0, QuicTime::Zero(), 1000,
334 NOT_RETRANSMISSION, HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06335}
336
rtennetib865eb82015-06-17 20:21:46337MockQuicSpdySession::MockQuicSpdySession(QuicConnection* connection)
338 : QuicSpdySession(connection, DefaultQuicConfig()) {
rtennetid39bd762015-06-12 01:05:52339 crypto_stream_.reset(new QuicCryptoStream(this));
340 Initialize();
[email protected]bbb10072014-06-13 07:41:59341 ON_CALL(*this, WritevData(_, _, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07342 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06343}
344
rtenneti021e8822015-10-18 23:59:57345MockQuicSpdySession::~MockQuicSpdySession() {}
[email protected]044ac2b2012-11-13 21:41:06346
rtennetib865eb82015-06-17 20:21:46347TestQuicSpdyServerSession::TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52348 QuicConnection* connection,
349 const QuicConfig& config,
350 const QuicCryptoServerConfig* crypto_config)
rtennetib865eb82015-06-17 20:21:46351 : QuicSpdySession(connection, config) {
rtennetid39bd762015-06-12 01:05:52352 crypto_stream_.reset(new QuicCryptoServerStream(crypto_config, this));
353 Initialize();
[email protected]ccb34212014-07-18 09:27:50354}
[email protected]2532de12013-05-09 12:29:33355
rtenneti021e8822015-10-18 23:59:57356TestQuicSpdyServerSession::~TestQuicSpdyServerSession() {}
[email protected]2532de12013-05-09 12:29:33357
rtennetib865eb82015-06-17 20:21:46358QuicCryptoServerStream* TestQuicSpdyServerSession::GetCryptoStream() {
rtennetid39bd762015-06-12 01:05:52359 return crypto_stream_.get();
[email protected]2532de12013-05-09 12:29:33360}
361
rtennetib865eb82015-06-17 20:21:46362TestQuicSpdyClientSession::TestQuicSpdyClientSession(
363 QuicConnection* connection,
364 const QuicConfig& config,
365 const QuicServerId& server_id,
366 QuicCryptoClientConfig* crypto_config)
rtennetid39bd762015-06-12 01:05:52367 : QuicClientSessionBase(connection, config) {
368 crypto_stream_.reset(new QuicCryptoClientStream(
369 server_id, this, CryptoTestUtils::ProofVerifyContextForTesting(),
370 crypto_config));
371 Initialize();
[email protected]90f62f092014-03-24 02:41:23372}
373
rtenneti021e8822015-10-18 23:59:57374TestQuicSpdyClientSession::~TestQuicSpdyClientSession() {}
[email protected]90f62f092014-03-24 02:41:23375
rtennetib865eb82015-06-17 20:21:46376QuicCryptoClientStream* TestQuicSpdyClientSession::GetCryptoStream() {
rtennetid39bd762015-06-12 01:05:52377 return crypto_stream_.get();
rtennetia2ea9162015-05-15 19:26:44378}
379
[email protected]cbd731e2013-10-24 00:20:39380MockPacketWriter::MockPacketWriter() {
rtenneti493d90ef2015-09-14 04:43:11381 ON_CALL(*this, GetMaxPacketSize(_))
382 .WillByDefault(testing::Return(kMaxPacketSize));
[email protected]cbd731e2013-10-24 00:20:39383}
384
rtenneti021e8822015-10-18 23:59:57385MockPacketWriter::~MockPacketWriter() {}
[email protected]cbd731e2013-10-24 00:20:39386
rtenneti021e8822015-10-18 23:59:57387MockSendAlgorithm::MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10388
rtenneti021e8822015-10-18 23:59:57389MockSendAlgorithm::~MockSendAlgorithm() {}
[email protected]8d659e22013-01-19 04:26:10390
rtenneti021e8822015-10-18 23:59:57391MockLossAlgorithm::MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43392
rtenneti021e8822015-10-18 23:59:57393MockLossAlgorithm::~MockLossAlgorithm() {}
[email protected]3aa9ca72014-02-27 19:39:43394
rtenneti021e8822015-10-18 23:59:57395MockAckNotifierDelegate::MockAckNotifierDelegate() {}
[email protected]97cf3022013-09-05 14:30:16396
rtenneti021e8822015-10-18 23:59:57397MockAckNotifierDelegate::~MockAckNotifierDelegate() {}
[email protected]97cf3022013-09-05 14:30:16398
rtenneti021e8822015-10-18 23:59:57399MockNetworkChangeVisitor::MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24400
rtenneti021e8822015-10-18 23:59:57401MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {}
[email protected]a692ad9d2014-07-18 21:35:24402
[email protected]8b37a092012-10-18 21:53:49403namespace {
404
405string HexDumpWithMarks(const char* data, int length,
406 const bool* marks, int mark_length) {
407 static const char kHexChars[] = "0123456789abcdef";
408 static const int kColumns = 4;
409
410 const int kSizeLimit = 1024;
411 if (length > kSizeLimit || mark_length > kSizeLimit) {
412 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
413 length = min(length, kSizeLimit);
414 mark_length = min(mark_length, kSizeLimit);
415 }
416
417 string hex;
418 for (const char* row = data; length > 0;
419 row += kColumns, length -= kColumns) {
420 for (const char *p = row; p < row + 4; ++p) {
421 if (p < row + length) {
422 const bool mark =
423 (marks && (p - data) < mark_length && marks[p - data]);
424 hex += mark ? '*' : ' ';
425 hex += kHexChars[(*p & 0xf0) >> 4];
426 hex += kHexChars[*p & 0x0f];
427 hex += mark ? '*' : ' ';
428 } else {
429 hex += " ";
430 }
431 }
432 hex = hex + " ";
433
rtenneti6f48aa92015-03-16 02:18:48434 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
[email protected]8b37a092012-10-18 21:53:49435 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
rtenneti6f48aa92015-03-16 02:18:48436 }
[email protected]8b37a092012-10-18 21:53:49437
438 hex = hex + '\n';
439 }
440 return hex;
441}
442
443} // namespace
444
[email protected]300ccd52014-01-25 08:00:19445IPAddressNumber TestPeerIPAddress() { return Loopback4(); }
446
[email protected]b007e632013-10-28 08:39:25447QuicVersion QuicVersionMax() { return QuicSupportedVersions().front(); }
448
449QuicVersion QuicVersionMin() { return QuicSupportedVersions().back(); }
450
[email protected]c05a6d222013-12-16 19:42:03451IPAddressNumber Loopback4() {
[email protected]300ccd52014-01-25 08:00:19452 IPAddressNumber addr;
453 CHECK(ParseIPLiteralToNumber("127.0.0.1", &addr));
[email protected]c05a6d222013-12-16 19:42:03454 return addr;
455}
456
[email protected]730b35d72014-06-05 03:23:22457IPAddressNumber Loopback6() {
458 IPAddressNumber addr;
459 CHECK(ParseIPLiteralToNumber("::1", &addr));
460 return addr;
461}
462
rtennetie0ee6eb2015-05-01 00:55:09463IPAddressNumber Any4() {
464 IPAddressNumber any4;
465 CHECK(net::ParseIPLiteralToNumber("0.0.0.0", &any4));
466 return any4;
467}
468
[email protected]9bb57c72014-03-31 20:36:04469void GenerateBody(string* body, int length) {
470 body->clear();
471 body->reserve(length);
472 for (int i = 0; i < length; ++i) {
473 body->append(1, static_cast<char>(32 + i % (126 - 32)));
474 }
475}
476
rtennetia004d332015-08-28 06:44:57477QuicEncryptedPacket* ConstructEncryptedPacket(QuicConnectionId connection_id,
478 bool version_flag,
479 bool reset_flag,
480 QuicPacketNumber packet_number,
481 const string& data) {
rtenneti9e0fb502015-03-08 06:07:16482 return ConstructEncryptedPacket(
rtennetia004d332015-08-28 06:44:57483 connection_id, version_flag, reset_flag, packet_number, data,
484 PACKET_8BYTE_CONNECTION_ID, PACKET_6BYTE_PACKET_NUMBER);
rtenneti9e0fb502015-03-08 06:07:16485}
486
487QuicEncryptedPacket* ConstructEncryptedPacket(
488 QuicConnectionId connection_id,
489 bool version_flag,
490 bool reset_flag,
rtennetia004d332015-08-28 06:44:57491 QuicPacketNumber packet_number,
rtenneti9e0fb502015-03-08 06:07:16492 const string& data,
493 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57494 QuicPacketNumberLength packet_number_length) {
rchc0815442015-04-18 13:29:46495 return ConstructEncryptedPacket(connection_id, version_flag, reset_flag,
rtennetia004d332015-08-28 06:44:57496 packet_number, data, connection_id_length,
497 packet_number_length, nullptr);
rchc0815442015-04-18 13:29:46498}
499
500QuicEncryptedPacket* ConstructEncryptedPacket(
501 QuicConnectionId connection_id,
502 bool version_flag,
503 bool reset_flag,
rtennetia004d332015-08-28 06:44:57504 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46505 const string& data,
506 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57507 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46508 QuicVersionVector* versions) {
[email protected]ffc34bf2014-03-07 02:42:02509 QuicPacketHeader header;
510 header.public_header.connection_id = connection_id;
rtenneti9e0fb502015-03-08 06:07:16511 header.public_header.connection_id_length = connection_id_length;
[email protected]ffc34bf2014-03-07 02:42:02512 header.public_header.version_flag = version_flag;
513 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57514 header.public_header.packet_number_length = packet_number_length;
rtenneti8dd12b22015-10-21 01:26:38515 header.packet_number = packet_number;
[email protected]ffc34bf2014-03-07 02:42:02516 header.entropy_flag = false;
517 header.entropy_hash = 0;
518 header.fec_flag = false;
519 header.is_in_fec_group = NOT_IN_FEC_GROUP;
520 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44521 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
[email protected]ffc34bf2014-03-07 02:42:02522 QuicFrame frame(&stream_frame);
523 QuicFrames frames;
524 frames.push_back(frame);
rchc0815442015-04-18 13:29:46525 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
526 QuicTime::Zero(), Perspective::IS_CLIENT);
527
[email protected]ffc34bf2014-03-07 02:42:02528 scoped_ptr<QuicPacket> packet(
rtennetib6ac61a52015-02-11 20:20:52529 BuildUnsizedDataPacket(&framer, header, frames));
rtennetibe635732014-10-02 22:51:42530 EXPECT_TRUE(packet != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09531 char buffer[kMaxPacketSize];
rtennetid7d78b02015-06-17 16:54:34532 scoped_ptr<QuicEncryptedPacket> encrypted(framer.EncryptPayload(
rtennetia004d332015-08-28 06:44:57533 ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize));
rtennetibe635732014-10-02 22:51:42534 EXPECT_TRUE(encrypted != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09535 return encrypted->Clone();
[email protected]ffc34bf2014-03-07 02:42:02536}
537
rchc0815442015-04-18 13:29:46538QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
539 QuicConnectionId connection_id,
540 bool version_flag,
541 bool reset_flag,
rtennetia004d332015-08-28 06:44:57542 QuicPacketNumber packet_number,
rchc0815442015-04-18 13:29:46543 const string& data,
544 QuicConnectionIdLength connection_id_length,
rtennetia004d332015-08-28 06:44:57545 QuicPacketNumberLength packet_number_length,
rchc0815442015-04-18 13:29:46546 QuicVersionVector* versions) {
547 QuicPacketHeader header;
548 header.public_header.connection_id = connection_id;
549 header.public_header.connection_id_length = connection_id_length;
550 header.public_header.version_flag = version_flag;
551 header.public_header.reset_flag = reset_flag;
rtennetia004d332015-08-28 06:44:57552 header.public_header.packet_number_length = packet_number_length;
rtenneti8dd12b22015-10-21 01:26:38553 header.packet_number = packet_number;
rchc0815442015-04-18 13:29:46554 header.entropy_flag = false;
555 header.entropy_hash = 0;
556 header.fec_flag = false;
557 header.is_in_fec_group = NOT_IN_FEC_GROUP;
558 header.fec_group = 0;
rtennetia4228ea2015-06-04 02:31:44559 QuicStreamFrame stream_frame(1, false, 0, StringPiece(data));
rtenneti85816fdf2015-05-25 03:01:10560 QuicFrame frame(&stream_frame);
rchc0815442015-04-18 13:29:46561 QuicFrames frames;
rtenneti85816fdf2015-05-25 03:01:10562 frames.push_back(frame);
563 QuicFramer framer(versions != nullptr ? *versions : QuicSupportedVersions(),
rchc0815442015-04-18 13:29:46564 QuicTime::Zero(), Perspective::IS_CLIENT);
rtenneti85816fdf2015-05-25 03:01:10565
rchc0815442015-04-18 13:29:46566 scoped_ptr<QuicPacket> packet(
567 BuildUnsizedDataPacket(&framer, header, frames));
568 EXPECT_TRUE(packet != nullptr);
rtenneti85816fdf2015-05-25 03:01:10569
570 // Now set the packet's private flags byte to 0xFF, which is an invalid value.
571 reinterpret_cast<unsigned char*>(
572 packet->mutable_data())[GetStartOfEncryptedData(
rtennetia004d332015-08-28 06:44:57573 connection_id_length, version_flag, packet_number_length)] = 0xFF;
rtenneti85816fdf2015-05-25 03:01:10574
rtennetie0ee6eb2015-05-01 00:55:09575 char buffer[kMaxPacketSize];
rtennetid7d78b02015-06-17 16:54:34576 scoped_ptr<QuicEncryptedPacket> encrypted(framer.EncryptPayload(
rtennetia004d332015-08-28 06:44:57577 ENCRYPTION_NONE, packet_number, *packet, buffer, kMaxPacketSize));
rchc0815442015-04-18 13:29:46578 EXPECT_TRUE(encrypted != nullptr);
rtennetie0ee6eb2015-05-01 00:55:09579 return encrypted->Clone();
rchc0815442015-04-18 13:29:46580}
581
[email protected]8b37a092012-10-18 21:53:49582void CompareCharArraysWithHexError(
583 const string& description,
584 const char* actual,
585 const int actual_len,
586 const char* expected,
587 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25588 EXPECT_EQ(actual_len, expected_len);
[email protected]8b37a092012-10-18 21:53:49589 const int min_len = min(actual_len, expected_len);
590 const int max_len = max(actual_len, expected_len);
[email protected]4356f0f2013-04-07 00:58:17591 scoped_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49592 bool identical = (actual_len == expected_len);
593 for (int i = 0; i < min_len; ++i) {
594 if (actual[i] != expected[i]) {
595 marks[i] = true;
596 identical = false;
597 } else {
598 marks[i] = false;
599 }
600 }
601 for (int i = min_len; i < max_len; ++i) {
602 marks[i] = true;
603 }
604 if (identical) return;
605 ADD_FAILURE()
606 << "Description:\n"
607 << description
608 << "\n\nExpected:\n"
609 << HexDumpWithMarks(expected, expected_len, marks.get(), max_len)
610 << "\nActual:\n"
611 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
612}
613
[email protected]b12764d2013-12-02 22:28:30614bool DecodeHexString(const base::StringPiece& hex, std::string* bytes) {
615 bytes->clear();
616 if (hex.empty())
617 return true;
618 std::vector<uint8> v;
619 if (!base::HexStringToBytes(hex.as_string(), &v))
620 return false;
621 if (!v.empty())
622 bytes->assign(reinterpret_cast<const char*>(&v[0]), v.size());
623 return true;
624}
625
[email protected]d3d15bf2013-01-30 02:51:54626static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43627 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33628 const CryptoHandshakeMessage& message,
629 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49630 CryptoFramer crypto_framer;
[email protected]dc2cc742012-10-21 13:56:13631 scoped_ptr<QuicData> data(crypto_framer.ConstructHandshakeMessage(message));
rtenneti6f48aa92015-03-16 02:18:48632 QuicFramer quic_framer(QuicSupportedVersions(), QuicTime::Zero(),
633 Perspective::IS_CLIENT);
[email protected]8b37a092012-10-18 21:53:49634
635 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43636 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03637 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33638 header.public_header.version_flag = should_include_version;
rtenneti8dd12b22015-10-21 01:26:38639 header.packet_number = 1;
[email protected]9db443912013-02-25 05:27:03640 header.entropy_flag = false;
641 header.entropy_hash = 0;
642 header.fec_flag = false;
[email protected]8b37a092012-10-18 21:53:49643 header.fec_group = 0;
644
[email protected]be24ab22012-10-22 03:01:52645 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
rtennetia4228ea2015-06-04 02:31:44646 data->AsStringPiece());
[email protected]8b37a092012-10-18 21:53:49647
[email protected]be24ab22012-10-22 03:01:52648 QuicFrame frame(&stream_frame);
649 QuicFrames frames;
650 frames.push_back(frame);
rtennetib6ac61a52015-02-11 20:20:52651 return BuildUnsizedDataPacket(&quic_framer, header, frames);
[email protected]8b37a092012-10-18 21:53:49652}
653
[email protected]3aa9ca72014-02-27 19:39:43654QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
655 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54656 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14657 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43658 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54659}
660
rtennetia004d332015-08-28 06:44:57661size_t GetPacketLengthForOneStream(QuicVersion version,
662 bool include_version,
663 QuicConnectionIdLength connection_id_length,
664 QuicPacketNumberLength packet_number_length,
665 InFecGroup is_in_fec_group,
666 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30667 *payload_length = 1;
668 const size_t stream_length =
[email protected]5dafdb62013-11-14 01:24:26669 NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17670 QuicPacketCreator::StreamFramePacketOverhead(
rtennetia004d332015-08-28 06:44:57671 PACKET_8BYTE_CONNECTION_ID, include_version, packet_number_length, 0u,
672 is_in_fec_group);
rtennetic14c8ab2015-06-18 05:47:40673 const size_t ack_length =
674 NullEncrypter().GetCiphertextSize(
rtennetia004d332015-08-28 06:44:57675 QuicFramer::GetMinAckFrameSize(PACKET_1BYTE_PACKET_NUMBER)) +
rtenneti23186682014-10-30 01:49:33676 GetPacketHeaderSize(connection_id_length, include_version,
rtennetia004d332015-08-28 06:44:57677 packet_number_length, is_in_fec_group);
[email protected]f62262b2013-07-05 20:57:30678 if (stream_length < ack_length) {
679 *payload_length = 1 + ack_length - stream_length;
680 }
681
[email protected]5dafdb62013-11-14 01:24:26682 return NullEncrypter().GetCiphertextSize(*payload_length) +
rtennetia004d332015-08-28 06:44:57683 QuicPacketCreator::StreamFramePacketOverhead(
684 connection_id_length, include_version, packet_number_length, 0u,
685 is_in_fec_group);
[email protected]5351cc4b2013-03-03 07:22:41686}
687
[email protected]a5b98172014-06-18 07:01:59688TestEntropyCalculator::TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31689
[email protected]a5b98172014-06-18 07:01:59690TestEntropyCalculator::~TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31691
[email protected]48878092013-07-26 14:51:56692QuicPacketEntropyHash TestEntropyCalculator::EntropyHash(
rtennetia004d332015-08-28 06:44:57693 QuicPacketNumber packet_number) const {
[email protected]9db443912013-02-25 05:27:03694 return 1u;
695}
696
[email protected]a5b98172014-06-18 07:01:59697MockEntropyCalculator::MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31698
[email protected]a5b98172014-06-18 07:01:59699MockEntropyCalculator::~MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31700
[email protected]b064310782013-05-30 21:12:17701QuicConfig DefaultQuicConfig() {
702 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21703 config.SetInitialStreamFlowControlWindowToSend(
704 kInitialStreamFlowControlWindowForTest);
705 config.SetInitialSessionFlowControlWindowToSend(
706 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17707 return config;
708}
709
rtennetia2ea9162015-05-15 19:26:44710QuicConfig DefaultQuicConfigStatelessRejects() {
711 QuicConfig config = DefaultQuicConfig();
712 QuicTagVector copt;
713 copt.push_back(kSREJ);
714 config.SetConnectionOptionsToSend(copt);
715 return config;
716}
717
[email protected]4d640792013-12-18 22:21:08718QuicVersionVector SupportedVersions(QuicVersion version) {
719 QuicVersionVector versions;
720 versions.push_back(version);
721 return versions;
722}
723
rtennetibe635732014-10-02 22:51:42724TestWriterFactory::TestWriterFactory() : current_writer_(nullptr) {}
[email protected]6d515822014-08-22 01:58:06725TestWriterFactory::~TestWriterFactory() {}
726
rchc99f380c2015-03-26 19:50:56727QuicPacketWriter* TestWriterFactory::Create(QuicPacketWriter* writer,
[email protected]6d515822014-08-22 01:58:06728 QuicConnection* connection) {
729 return new PerConnectionPacketWriter(this, writer, connection);
730}
731
732void TestWriterFactory::OnPacketSent(WriteResult result) {
rtennetibe635732014-10-02 22:51:42733 if (current_writer_ != nullptr && result.status == WRITE_STATUS_ERROR) {
[email protected]ca4e0d92014-08-22 16:33:22734 current_writer_->connection()->OnWriteError(result.error_code);
rtennetibe635732014-10-02 22:51:42735 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06736 }
737}
738
739void TestWriterFactory::Unregister(PerConnectionPacketWriter* writer) {
740 if (current_writer_ == writer) {
rtennetibe635732014-10-02 22:51:42741 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06742 }
743}
744
745TestWriterFactory::PerConnectionPacketWriter::PerConnectionPacketWriter(
746 TestWriterFactory* factory,
rchc99f380c2015-03-26 19:50:56747 QuicPacketWriter* writer,
[email protected]6d515822014-08-22 01:58:06748 QuicConnection* connection)
749 : QuicPerConnectionPacketWriter(writer, connection),
750 factory_(factory) {
751}
752
753TestWriterFactory::PerConnectionPacketWriter::~PerConnectionPacketWriter() {
754 factory_->Unregister(this);
755}
756
757WriteResult TestWriterFactory::PerConnectionPacketWriter::WritePacket(
758 const char* buffer,
759 size_t buf_len,
760 const IPAddressNumber& self_address,
761 const IPEndPoint& peer_address) {
rtennetibe635732014-10-02 22:51:42762 // A DCHECK(factory_current_writer_ == nullptr) would be wrong here -- this
763 // class may be used in a setting where connection()->OnPacketSent() is called
764 // in a different way, so TestWriterFactory::OnPacketSent might never be
765 // called.
[email protected]6d515822014-08-22 01:58:06766 factory_->current_writer_ = this;
rtennetia2ea9162015-05-15 19:26:44767 return tools::QuicPerConnectionPacketWriter::WritePacket(
768 buffer, buf_len, self_address, peer_address);
[email protected]6d515822014-08-22 01:58:06769}
770
rtenneti021e8822015-10-18 23:59:57771MockQuicConnectionDebugVisitor::MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23772
rtenneti021e8822015-10-18 23:59:57773MockQuicConnectionDebugVisitor::~MockQuicConnectionDebugVisitor() {}
rtenneti95293802015-03-27 18:59:23774
rtennetid39bd762015-06-12 01:05:52775void CreateClientSessionForTest(QuicServerId server_id,
776 bool supports_stateless_rejects,
777 QuicTime::Delta connection_start_time,
rtenneti8a4a0732015-10-18 00:45:51778 MockHelper* helper,
rtennetid39bd762015-06-12 01:05:52779 QuicCryptoClientConfig* crypto_client_config,
780 PacketSavingConnection** client_connection,
rtennetib865eb82015-06-17 20:21:46781 TestQuicSpdyClientSession** client_session) {
rtennetia2ea9162015-05-15 19:26:44782 CHECK(crypto_client_config);
783 CHECK(client_connection);
784 CHECK(client_session);
rtennetia2ea9162015-05-15 19:26:44785 CHECK(!connection_start_time.IsZero())
786 << "Connections must start at non-zero times, otherwise the "
787 << "strike-register will be unhappy.";
788
789 QuicConfig config = supports_stateless_rejects
790 ? DefaultQuicConfigStatelessRejects()
791 : DefaultQuicConfig();
rtenneti8a4a0732015-10-18 00:45:51792 *client_connection =
793 new PacketSavingConnection(helper, Perspective::IS_CLIENT);
rtennetib865eb82015-06-17 20:21:46794 *client_session = new TestQuicSpdyClientSession(
795 *client_connection, config, server_id, crypto_client_config);
rtennetia2ea9162015-05-15 19:26:44796 (*client_connection)->AdvanceTime(connection_start_time);
797}
798
rtennetid39bd762015-06-12 01:05:52799void CreateServerSessionForTest(QuicServerId server_id,
800 QuicTime::Delta connection_start_time,
rtenneti8a4a0732015-10-18 00:45:51801 MockHelper* helper,
rtennetid39bd762015-06-12 01:05:52802 QuicCryptoServerConfig* server_crypto_config,
803 PacketSavingConnection** server_connection,
rtennetib865eb82015-06-17 20:21:46804 TestQuicSpdyServerSession** server_session) {
rtennetia2ea9162015-05-15 19:26:44805 CHECK(server_crypto_config);
806 CHECK(server_connection);
807 CHECK(server_session);
rtennetia2ea9162015-05-15 19:26:44808 CHECK(!connection_start_time.IsZero())
809 << "Connections must start at non-zero times, otherwise the "
810 << "strike-register will be unhappy.";
811
rtenneti8a4a0732015-10-18 00:45:51812 *server_connection =
813 new PacketSavingConnection(helper, Perspective::IS_SERVER);
rtennetib865eb82015-06-17 20:21:46814 *server_session = new TestQuicSpdyServerSession(
rtennetid39bd762015-06-12 01:05:52815 *server_connection, DefaultQuicConfig(), server_crypto_config);
rtennetia2ea9162015-05-15 19:26:44816
817 // We advance the clock initially because the default time is zero and the
818 // strike register worries that we've just overflowed a uint32 time.
819 (*server_connection)->AdvanceTime(connection_start_time);
820}
821
ckrasic99850b32015-10-16 21:15:58822QuicStreamId QuicClientDataStreamId(int i) {
823 return kClientDataStreamId1 + 2 * i;
824}
825
[email protected]8b37a092012-10-18 21:53:49826} // namespace test
[email protected]8b37a092012-10-18 21:53:49827} // namespace net