blob: 6d6896bef8b533cc2ca5b38d4c33c1ac13097f75 [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/quic/test_tools/quic_test_utils.h"
[email protected]9c0b1352012-11-04 00:03:276
[email protected]a5b98172014-06-18 07:01:597#include "base/sha1.h"
[email protected]701bc892013-01-17 04:51:548#include "base/stl_util.h"
[email protected]b12764d2013-12-02 22:28:309#include "base/strings/string_number_conversions.h"
[email protected]8b37a092012-10-18 21:53:4910#include "net/quic/crypto/crypto_framer.h"
[email protected]6f54ab32013-03-02 17:43:3511#include "net/quic/crypto/crypto_handshake.h"
[email protected]872edd9e2013-01-16 08:51:1512#include "net/quic/crypto/crypto_utils.h"
[email protected]5351cc4b2013-03-03 07:22:4113#include "net/quic/crypto/null_encrypter.h"
[email protected]4df69842013-02-27 06:32:1614#include "net/quic/crypto/quic_decrypter.h"
15#include "net/quic/crypto/quic_encrypter.h"
rtenneti16a20772015-02-17 18:58:4816#include "net/quic/quic_data_writer.h"
[email protected]a57e0272013-04-26 07:31:4717#include "net/quic/quic_framer.h"
[email protected]5351cc4b2013-03-03 07:22:4118#include "net/quic/quic_packet_creator.h"
[email protected]79d13dcb2014-02-05 07:23:1319#include "net/quic/quic_utils.h"
[email protected]cbd731e2013-10-24 00:20:3920#include "net/quic/test_tools/quic_connection_peer.h"
[email protected]c244c5a12013-05-07 20:55:0421#include "net/spdy/spdy_frame_builder.h"
[email protected]8b37a092012-10-18 21:53:4922
[email protected]c244c5a12013-05-07 20:55:0423using base::StringPiece;
[email protected]8b37a092012-10-18 21:53:4924using std::max;
25using std::min;
26using std::string;
[email protected]64c12232014-03-26 05:43:5927using testing::AnyNumber;
[email protected]bc356fe2014-06-19 11:14:1428using testing::_;
[email protected]8b37a092012-10-18 21:53:4929
30namespace net {
31namespace test {
[email protected]965dbe62013-08-09 21:34:3132namespace {
33
34// No-op alarm implementation used by MockHelper.
35class TestAlarm : public QuicAlarm {
36 public:
37 explicit TestAlarm(QuicAlarm::Delegate* delegate)
38 : QuicAlarm(delegate) {
39 }
40
dchengb03027d2014-10-21 12:00:2041 void SetImpl() override {}
42 void CancelImpl() override {}
[email protected]965dbe62013-08-09 21:34:3143};
44
45} // namespace
[email protected]8b37a092012-10-18 21:53:4946
[email protected]310d37b2014-08-02 06:15:3747QuicAckFrame MakeAckFrame(QuicPacketSequenceNumber largest_observed) {
[email protected]fb35b0a2014-04-15 21:06:4948 QuicAckFrame ack;
[email protected]310d37b2014-08-02 06:15:3749 ack.largest_observed = largest_observed;
50 ack.entropy_hash = 0;
[email protected]fb35b0a2014-04-15 21:06:4951 return ack;
52}
53
[email protected]aa7e4ef2014-05-28 03:53:1554QuicAckFrame MakeAckFrameWithNackRanges(
55 size_t num_nack_ranges, QuicPacketSequenceNumber least_unacked) {
[email protected]310d37b2014-08-02 06:15:3756 QuicAckFrame ack = MakeAckFrame(2 * num_nack_ranges + least_unacked);
[email protected]aa7e4ef2014-05-28 03:53:1557 // Add enough missing packets to get num_nack_ranges nack ranges.
58 for (QuicPacketSequenceNumber i = 1; i < 2 * num_nack_ranges; i += 2) {
[email protected]310d37b2014-08-02 06:15:3759 ack.missing_packets.insert(least_unacked + i);
[email protected]aa7e4ef2014-05-28 03:53:1560 }
61 return ack;
62}
63
rtennetib6ac61a52015-02-11 20:20:5264QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
65 const QuicPacketHeader& header,
66 const QuicFrames& frames) {
[email protected]9cda5fd2014-06-03 10:20:2867 const size_t max_plaintext_size = framer->GetMaxPlaintextSize(kMaxPacketSize);
68 size_t packet_size = GetPacketHeaderSize(header);
69 for (size_t i = 0; i < frames.size(); ++i) {
70 DCHECK_LE(packet_size, max_plaintext_size);
71 bool first_frame = i == 0;
72 bool last_frame = i == frames.size() - 1;
73 const size_t frame_size = framer->GetSerializedFrameLength(
74 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
75 header.is_in_fec_group,
76 header.public_header.sequence_number_length);
77 DCHECK(frame_size);
78 packet_size += frame_size;
79 }
rtenneti16a20772015-02-17 18:58:4880 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
81}
82
83QuicPacket* BuildUnsizedDataPacket(QuicFramer* framer,
84 const QuicPacketHeader& header,
85 const QuicFrames& frames,
86 size_t packet_size) {
87 char* buffer = new char[packet_size];
88 scoped_ptr<QuicPacket> packet(
89 framer->BuildDataPacket(header, frames, buffer, packet_size));
90 DCHECK(packet.get() != nullptr);
91 // Now I have to re-construct the data packet with data ownership.
92 return new QuicPacket(buffer, packet->length(), true,
93 header.public_header.connection_id_length,
94 header.public_header.version_flag,
95 header.public_header.sequence_number_length);
[email protected]9cda5fd2014-06-03 10:20:2896}
97
[email protected]a5b98172014-06-18 07:01:5998uint64 SimpleRandom::RandUint64() {
99 unsigned char hash[base::kSHA1Length];
100 base::SHA1HashBytes(reinterpret_cast<unsigned char*>(&seed_), sizeof(seed_),
101 hash);
102 memcpy(&seed_, hash, sizeof(seed_));
103 return seed_;
104}
105
[email protected]8b37a092012-10-18 21:53:49106MockFramerVisitor::MockFramerVisitor() {
107 // By default, we want to accept packets.
[email protected]14e8106c2013-03-14 16:25:33108 ON_CALL(*this, OnProtocolVersionMismatch(_))
109 .WillByDefault(testing::Return(false));
110
111 // By default, we want to accept packets.
[email protected]ec86d5462013-11-17 16:04:49112 ON_CALL(*this, OnUnauthenticatedHeader(_))
113 .WillByDefault(testing::Return(true));
114
[email protected]066d8182014-01-04 02:02:45115 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
116 .WillByDefault(testing::Return(true));
117
[email protected]cff7b7b2013-01-11 08:49:07118 ON_CALL(*this, OnPacketHeader(_))
[email protected]8b37a092012-10-18 21:53:49119 .WillByDefault(testing::Return(true));
[email protected]a57e0272013-04-26 07:31:47120
121 ON_CALL(*this, OnStreamFrame(_))
122 .WillByDefault(testing::Return(true));
123
124 ON_CALL(*this, OnAckFrame(_))
125 .WillByDefault(testing::Return(true));
126
[email protected]93dd91f2014-02-27 00:09:03127 ON_CALL(*this, OnStopWaitingFrame(_))
128 .WillByDefault(testing::Return(true));
129
[email protected]d8c522112014-04-23 09:23:25130 ON_CALL(*this, OnPingFrame(_))
131 .WillByDefault(testing::Return(true));
132
[email protected]a57e0272013-04-26 07:31:47133 ON_CALL(*this, OnRstStreamFrame(_))
134 .WillByDefault(testing::Return(true));
135
136 ON_CALL(*this, OnConnectionCloseFrame(_))
137 .WillByDefault(testing::Return(true));
138
139 ON_CALL(*this, OnGoAwayFrame(_))
140 .WillByDefault(testing::Return(true));
[email protected]8b37a092012-10-18 21:53:49141}
142
[email protected]044ac2b2012-11-13 21:41:06143MockFramerVisitor::~MockFramerVisitor() {
144}
[email protected]8b37a092012-10-18 21:53:49145
[email protected]48878092013-07-26 14:51:56146bool NoOpFramerVisitor::OnProtocolVersionMismatch(QuicVersion version) {
[email protected]14e8106c2013-03-14 16:25:33147 return false;
148}
149
[email protected]066d8182014-01-04 02:02:45150bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
151 const QuicPacketPublicHeader& header) {
152 return true;
153}
154
[email protected]ec86d5462013-11-17 16:04:49155bool NoOpFramerVisitor::OnUnauthenticatedHeader(
156 const QuicPacketHeader& header) {
157 return true;
158}
159
[email protected]8b37a092012-10-18 21:53:49160bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& header) {
161 return true;
162}
163
[email protected]a57e0272013-04-26 07:31:47164bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& frame) {
165 return true;
166}
167
168bool NoOpFramerVisitor::OnAckFrame(const QuicAckFrame& frame) {
169 return true;
170}
171
[email protected]93dd91f2014-02-27 00:09:03172bool NoOpFramerVisitor::OnStopWaitingFrame(
173 const QuicStopWaitingFrame& frame) {
174 return true;
175}
176
[email protected]d8c522112014-04-23 09:23:25177bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& frame) {
178 return true;
179}
180
[email protected]a57e0272013-04-26 07:31:47181bool NoOpFramerVisitor::OnRstStreamFrame(
182 const QuicRstStreamFrame& frame) {
183 return true;
184}
185
186bool NoOpFramerVisitor::OnConnectionCloseFrame(
187 const QuicConnectionCloseFrame& frame) {
188 return true;
189}
190
191bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
192 return true;
193}
194
[email protected]cb23a922014-02-20 17:42:38195bool NoOpFramerVisitor::OnWindowUpdateFrame(
196 const QuicWindowUpdateFrame& frame) {
197 return true;
198}
199
200bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& frame) {
201 return true;
202}
203
[email protected]8d659e22013-01-19 04:26:10204MockConnectionVisitor::MockConnectionVisitor() {
205}
206
207MockConnectionVisitor::~MockConnectionVisitor() {
208}
209
[email protected]9c0b1352012-11-04 00:03:27210MockHelper::MockHelper() {
211}
212
213MockHelper::~MockHelper() {
214}
215
[email protected]97693d12012-11-16 16:05:00216const QuicClock* MockHelper::GetClock() const {
[email protected]9c0b1352012-11-04 00:03:27217 return &clock_;
218}
219
[email protected]9558c5d32012-12-22 00:08:14220QuicRandom* MockHelper::GetRandomGenerator() {
221 return &random_generator_;
222}
223
[email protected]965dbe62013-08-09 21:34:31224QuicAlarm* MockHelper::CreateAlarm(QuicAlarm::Delegate* delegate) {
225 return new TestAlarm(delegate);
226}
227
[email protected]fe053f92013-04-23 20:18:55228void MockHelper::AdvanceTime(QuicTime::Delta delta) {
229 clock_.AdvanceTime(delta);
230}
231
rtenneti3fe4ebbc2014-11-16 16:43:47232QuicPacketWriter* NiceMockPacketWriterFactory::Create(
233 QuicConnection* /*connection*/) const {
234 return new testing::NiceMock<MockPacketWriter>();
235}
[email protected]6d515822014-08-22 01:58:06236
rtenneti6f48aa92015-03-16 02:18:48237MockConnection::MockConnection(Perspective perspective)
[email protected]3aa9ca72014-02-27 19:39:43238 : QuicConnection(kTestConnectionId,
[email protected]300ccd52014-01-25 08:00:19239 IPEndPoint(TestPeerIPAddress(), kTestPort),
[email protected]c05a6d222013-12-16 19:42:03240 new testing::NiceMock<MockHelper>(),
[email protected]6d515822014-08-22 01:58:06241 NiceMockPacketWriterFactory(),
242 /* owns_writer= */ true,
rtenneti6f48aa92015-03-16 02:18:48243 perspective,
rtenneti8696cf92014-11-14 21:12:12244 /* is_secure= */ false,
245 QuicSupportedVersions()),
246 helper_(helper()) {
247}
248
rtenneti6f48aa92015-03-16 02:18:48249MockConnection::MockConnection(Perspective perspective, bool is_secure)
rtenneti8696cf92014-11-14 21:12:12250 : QuicConnection(kTestConnectionId,
251 IPEndPoint(TestPeerIPAddress(), kTestPort),
252 new testing::NiceMock<MockHelper>(),
253 NiceMockPacketWriterFactory(),
254 /* owns_writer= */ true,
rtenneti6f48aa92015-03-16 02:18:48255 perspective,
rtenneti8696cf92014-11-14 21:12:12256 is_secure,
rtennetie3779d832014-11-14 02:08:17257 QuicSupportedVersions()),
[email protected]c05a6d222013-12-16 19:42:03258 helper_(helper()) {
259}
260
rtenneti6f48aa92015-03-16 02:18:48261MockConnection::MockConnection(IPEndPoint address, Perspective perspective)
262 : QuicConnection(kTestConnectionId,
263 address,
[email protected]c05a6d222013-12-16 19:42:03264 new testing::NiceMock<MockHelper>(),
[email protected]6d515822014-08-22 01:58:06265 NiceMockPacketWriterFactory(),
266 /* owns_writer= */ true,
rtenneti6f48aa92015-03-16 02:18:48267 perspective,
rtenneti8696cf92014-11-14 21:12:12268 /* is_secure= */ false,
rtennetie3779d832014-11-14 02:08:17269 QuicSupportedVersions()),
[email protected]2cfc6bb82013-10-27 03:40:44270 helper_(helper()) {
[email protected]044ac2b2012-11-13 21:41:06271}
272
[email protected]3aa9ca72014-02-27 19:39:43273MockConnection::MockConnection(QuicConnectionId connection_id,
rtenneti6f48aa92015-03-16 02:18:48274 Perspective perspective)
[email protected]3aa9ca72014-02-27 19:39:43275 : QuicConnection(connection_id,
276 IPEndPoint(TestPeerIPAddress(), kTestPort),
[email protected]c05a6d222013-12-16 19:42:03277 new testing::NiceMock<MockHelper>(),
[email protected]6d515822014-08-22 01:58:06278 NiceMockPacketWriterFactory(),
279 /* owns_writer= */ true,
rtenneti6f48aa92015-03-16 02:18:48280 perspective,
rtenneti8696cf92014-11-14 21:12:12281 /* is_secure= */ false,
rtennetie3779d832014-11-14 02:08:17282 QuicSupportedVersions()),
[email protected]c05a6d222013-12-16 19:42:03283 helper_(helper()) {
[email protected]872edd9e2013-01-16 08:51:15284}
285
rtennetifb3fa6c2015-03-16 23:04:55286MockConnection::MockConnection(QuicConnectionId connection_id,
287 Perspective perspective,
288 bool is_secure)
289 : QuicConnection(connection_id,
290 IPEndPoint(TestPeerIPAddress(), kTestPort),
291 new testing::NiceMock<MockHelper>(),
292 NiceMockPacketWriterFactory(),
293 /* owns_writer= */ true,
294 perspective,
295 is_secure,
296 QuicSupportedVersions()),
297 helper_(helper()) {
298}
299
rtenneti6f48aa92015-03-16 02:18:48300MockConnection::MockConnection(Perspective perspective,
[email protected]4d640792013-12-18 22:21:08301 const QuicVersionVector& supported_versions)
[email protected]3aa9ca72014-02-27 19:39:43302 : QuicConnection(kTestConnectionId,
[email protected]300ccd52014-01-25 08:00:19303 IPEndPoint(TestPeerIPAddress(), kTestPort),
[email protected]4d640792013-12-18 22:21:08304 new testing::NiceMock<MockHelper>(),
[email protected]6d515822014-08-22 01:58:06305 NiceMockPacketWriterFactory(),
306 /* owns_writer= */ true,
rtenneti6f48aa92015-03-16 02:18:48307 perspective,
rtenneti8696cf92014-11-14 21:12:12308 /* is_secure= */ false,
rtennetie3779d832014-11-14 02:08:17309 supported_versions),
[email protected]4d640792013-12-18 22:21:08310 helper_(helper()) {
311}
312
[email protected]044ac2b2012-11-13 21:41:06313MockConnection::~MockConnection() {
314}
315
[email protected]fe053f92013-04-23 20:18:55316void MockConnection::AdvanceTime(QuicTime::Delta delta) {
[email protected]fe053f92013-04-23 20:18:55317 static_cast<MockHelper*>(helper())->AdvanceTime(delta);
318}
319
rtenneti6f48aa92015-03-16 02:18:48320PacketSavingConnection::PacketSavingConnection(Perspective perspective)
321 : MockConnection(perspective) {
[email protected]044ac2b2012-11-13 21:41:06322}
323
[email protected]4d640792013-12-18 22:21:08324PacketSavingConnection::PacketSavingConnection(
rtenneti6f48aa92015-03-16 02:18:48325 Perspective perspective,
[email protected]4d640792013-12-18 22:21:08326 const QuicVersionVector& supported_versions)
rtenneti6f48aa92015-03-16 02:18:48327 : MockConnection(perspective, supported_versions) {
[email protected]4d640792013-12-18 22:21:08328}
329
[email protected]044ac2b2012-11-13 21:41:06330PacketSavingConnection::~PacketSavingConnection() {
[email protected]2532de12013-05-09 12:29:33331 STLDeleteElements(&encrypted_packets_);
[email protected]044ac2b2012-11-13 21:41:06332}
333
rtenneti31e9fd62014-09-16 05:22:15334void PacketSavingConnection::SendOrQueuePacket(QueuedPacket packet) {
rtennetib6ac61a52015-02-11 20:20:52335 encrypted_packets_.push_back(packet.serialized_packet.packet);
rtenneti31e9fd62014-09-16 05:22:15336 // Transfer ownership of the packet to the SentPacketManager and the
337 // ack notifier to the AckNotifierManager.
rtennetia4dcff92014-09-29 18:16:08338 sent_packet_manager_.OnPacketSent(
339 &packet.serialized_packet, 0, QuicTime::Zero(), 1000,
340 NOT_RETRANSMISSION, HAS_RETRANSMITTABLE_DATA);
[email protected]044ac2b2012-11-13 21:41:06341}
342
[email protected]c05a6d222013-12-16 19:42:03343MockSession::MockSession(QuicConnection* connection)
rtenneti8696cf92014-11-14 21:12:12344 : QuicSession(connection, DefaultQuicConfig()) {
[email protected]ccb34212014-07-18 09:27:50345 InitializeSession();
[email protected]bbb10072014-06-13 07:41:59346 ON_CALL(*this, WritevData(_, _, _, _, _, _))
[email protected]cff7b7b2013-01-11 08:49:07347 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
[email protected]044ac2b2012-11-13 21:41:06348}
349
350MockSession::~MockSession() {
351}
352
[email protected]ce7bb1412014-05-17 15:51:33353TestSession::TestSession(QuicConnection* connection, const QuicConfig& config)
rtenneti8696cf92014-11-14 21:12:12354 : QuicSession(connection, config),
rtenneti4a5df262014-11-07 00:43:58355 crypto_stream_(nullptr) {
[email protected]ccb34212014-07-18 09:27:50356 InitializeSession();
357}
[email protected]2532de12013-05-09 12:29:33358
[email protected]b064310782013-05-30 21:12:17359TestSession::~TestSession() {}
[email protected]2532de12013-05-09 12:29:33360
361void TestSession::SetCryptoStream(QuicCryptoStream* stream) {
362 crypto_stream_ = stream;
363}
364
365QuicCryptoStream* TestSession::GetCryptoStream() {
366 return crypto_stream_;
367}
368
[email protected]90f62f092014-03-24 02:41:23369TestClientSession::TestClientSession(QuicConnection* connection,
370 const QuicConfig& config)
rtenneti8696cf92014-11-14 21:12:12371 : QuicClientSessionBase(connection, config),
rtennetibe635732014-10-02 22:51:42372 crypto_stream_(nullptr) {
[email protected]ccb34212014-07-18 09:27:50373 EXPECT_CALL(*this, OnProofValid(_)).Times(AnyNumber());
374 InitializeSession();
[email protected]90f62f092014-03-24 02:41:23375}
376
377TestClientSession::~TestClientSession() {}
378
379void TestClientSession::SetCryptoStream(QuicCryptoStream* stream) {
380 crypto_stream_ = stream;
381}
382
383QuicCryptoStream* TestClientSession::GetCryptoStream() {
384 return crypto_stream_;
385}
386
[email protected]cbd731e2013-10-24 00:20:39387MockPacketWriter::MockPacketWriter() {
388}
389
390MockPacketWriter::~MockPacketWriter() {
391}
392
[email protected]fee17f72013-02-03 07:47:41393MockSendAlgorithm::MockSendAlgorithm() {
[email protected]8d659e22013-01-19 04:26:10394}
395
[email protected]fee17f72013-02-03 07:47:41396MockSendAlgorithm::~MockSendAlgorithm() {
[email protected]8d659e22013-01-19 04:26:10397}
398
[email protected]3aa9ca72014-02-27 19:39:43399MockLossAlgorithm::MockLossAlgorithm() {
400}
401
402MockLossAlgorithm::~MockLossAlgorithm() {
403}
404
[email protected]97cf3022013-09-05 14:30:16405MockAckNotifierDelegate::MockAckNotifierDelegate() {
406}
407
408MockAckNotifierDelegate::~MockAckNotifierDelegate() {
409}
410
[email protected]a692ad9d2014-07-18 21:35:24411MockNetworkChangeVisitor::MockNetworkChangeVisitor() {
412}
413
414MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {
415}
416
[email protected]8b37a092012-10-18 21:53:49417namespace {
418
419string HexDumpWithMarks(const char* data, int length,
420 const bool* marks, int mark_length) {
421 static const char kHexChars[] = "0123456789abcdef";
422 static const int kColumns = 4;
423
424 const int kSizeLimit = 1024;
425 if (length > kSizeLimit || mark_length > kSizeLimit) {
426 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
427 length = min(length, kSizeLimit);
428 mark_length = min(mark_length, kSizeLimit);
429 }
430
431 string hex;
432 for (const char* row = data; length > 0;
433 row += kColumns, length -= kColumns) {
434 for (const char *p = row; p < row + 4; ++p) {
435 if (p < row + length) {
436 const bool mark =
437 (marks && (p - data) < mark_length && marks[p - data]);
438 hex += mark ? '*' : ' ';
439 hex += kHexChars[(*p & 0xf0) >> 4];
440 hex += kHexChars[*p & 0x0f];
441 hex += mark ? '*' : ' ';
442 } else {
443 hex += " ";
444 }
445 }
446 hex = hex + " ";
447
rtenneti6f48aa92015-03-16 02:18:48448 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
[email protected]8b37a092012-10-18 21:53:49449 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
rtenneti6f48aa92015-03-16 02:18:48450 }
[email protected]8b37a092012-10-18 21:53:49451
452 hex = hex + '\n';
453 }
454 return hex;
455}
456
457} // namespace
458
[email protected]300ccd52014-01-25 08:00:19459IPAddressNumber TestPeerIPAddress() { return Loopback4(); }
460
[email protected]b007e632013-10-28 08:39:25461QuicVersion QuicVersionMax() { return QuicSupportedVersions().front(); }
462
463QuicVersion QuicVersionMin() { return QuicSupportedVersions().back(); }
464
[email protected]c05a6d222013-12-16 19:42:03465IPAddressNumber Loopback4() {
[email protected]300ccd52014-01-25 08:00:19466 IPAddressNumber addr;
467 CHECK(ParseIPLiteralToNumber("127.0.0.1", &addr));
[email protected]c05a6d222013-12-16 19:42:03468 return addr;
469}
470
[email protected]730b35d72014-06-05 03:23:22471IPAddressNumber Loopback6() {
472 IPAddressNumber addr;
473 CHECK(ParseIPLiteralToNumber("::1", &addr));
474 return addr;
475}
476
[email protected]9bb57c72014-03-31 20:36:04477void GenerateBody(string* body, int length) {
478 body->clear();
479 body->reserve(length);
480 for (int i = 0; i < length; ++i) {
481 body->append(1, static_cast<char>(32 + i % (126 - 32)));
482 }
483}
484
[email protected]ffc34bf2014-03-07 02:42:02485QuicEncryptedPacket* ConstructEncryptedPacket(
486 QuicConnectionId connection_id,
487 bool version_flag,
488 bool reset_flag,
489 QuicPacketSequenceNumber sequence_number,
490 const string& data) {
rtenneti9e0fb502015-03-08 06:07:16491 return ConstructEncryptedPacket(
492 connection_id, version_flag, reset_flag, sequence_number, data,
493 PACKET_8BYTE_CONNECTION_ID, PACKET_6BYTE_SEQUENCE_NUMBER);
494}
495
496QuicEncryptedPacket* ConstructEncryptedPacket(
497 QuicConnectionId connection_id,
498 bool version_flag,
499 bool reset_flag,
500 QuicPacketSequenceNumber sequence_number,
501 const string& data,
502 QuicConnectionIdLength connection_id_length,
503 QuicSequenceNumberLength sequence_number_length) {
[email protected]ffc34bf2014-03-07 02:42:02504 QuicPacketHeader header;
505 header.public_header.connection_id = connection_id;
rtenneti9e0fb502015-03-08 06:07:16506 header.public_header.connection_id_length = connection_id_length;
[email protected]ffc34bf2014-03-07 02:42:02507 header.public_header.version_flag = version_flag;
508 header.public_header.reset_flag = reset_flag;
rtenneti9e0fb502015-03-08 06:07:16509 header.public_header.sequence_number_length = sequence_number_length;
[email protected]ffc34bf2014-03-07 02:42:02510 header.packet_sequence_number = sequence_number;
511 header.entropy_flag = false;
512 header.entropy_hash = 0;
513 header.fec_flag = false;
514 header.is_in_fec_group = NOT_IN_FEC_GROUP;
515 header.fec_group = 0;
516 QuicStreamFrame stream_frame(1, false, 0, MakeIOVector(data));
517 QuicFrame frame(&stream_frame);
518 QuicFrames frames;
519 frames.push_back(frame);
rtenneti6f48aa92015-03-16 02:18:48520 QuicFramer framer(QuicSupportedVersions(), QuicTime::Zero(),
521 Perspective::IS_CLIENT);
[email protected]ffc34bf2014-03-07 02:42:02522 scoped_ptr<QuicPacket> packet(
rtennetib6ac61a52015-02-11 20:20:52523 BuildUnsizedDataPacket(&framer, header, frames));
rtennetibe635732014-10-02 22:51:42524 EXPECT_TRUE(packet != nullptr);
[email protected]ffc34bf2014-03-07 02:42:02525 QuicEncryptedPacket* encrypted = framer.EncryptPacket(ENCRYPTION_NONE,
526 sequence_number,
527 *packet);
rtennetibe635732014-10-02 22:51:42528 EXPECT_TRUE(encrypted != nullptr);
[email protected]ffc34bf2014-03-07 02:42:02529 return encrypted;
530}
531
[email protected]8b37a092012-10-18 21:53:49532void CompareCharArraysWithHexError(
533 const string& description,
534 const char* actual,
535 const int actual_len,
536 const char* expected,
537 const int expected_len) {
[email protected]b007e632013-10-28 08:39:25538 EXPECT_EQ(actual_len, expected_len);
[email protected]8b37a092012-10-18 21:53:49539 const int min_len = min(actual_len, expected_len);
540 const int max_len = max(actual_len, expected_len);
[email protected]4356f0f2013-04-07 00:58:17541 scoped_ptr<bool[]> marks(new bool[max_len]);
[email protected]8b37a092012-10-18 21:53:49542 bool identical = (actual_len == expected_len);
543 for (int i = 0; i < min_len; ++i) {
544 if (actual[i] != expected[i]) {
545 marks[i] = true;
546 identical = false;
547 } else {
548 marks[i] = false;
549 }
550 }
551 for (int i = min_len; i < max_len; ++i) {
552 marks[i] = true;
553 }
554 if (identical) return;
555 ADD_FAILURE()
556 << "Description:\n"
557 << description
558 << "\n\nExpected:\n"
559 << HexDumpWithMarks(expected, expected_len, marks.get(), max_len)
560 << "\nActual:\n"
561 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
562}
563
[email protected]b12764d2013-12-02 22:28:30564bool DecodeHexString(const base::StringPiece& hex, std::string* bytes) {
565 bytes->clear();
566 if (hex.empty())
567 return true;
568 std::vector<uint8> v;
569 if (!base::HexStringToBytes(hex.as_string(), &v))
570 return false;
571 if (!v.empty())
572 bytes->assign(reinterpret_cast<const char*>(&v[0]), v.size());
573 return true;
574}
575
[email protected]d3d15bf2013-01-30 02:51:54576static QuicPacket* ConstructPacketFromHandshakeMessage(
[email protected]3aa9ca72014-02-27 19:39:43577 QuicConnectionId connection_id,
[email protected]14e8106c2013-03-14 16:25:33578 const CryptoHandshakeMessage& message,
579 bool should_include_version) {
[email protected]8b37a092012-10-18 21:53:49580 CryptoFramer crypto_framer;
[email protected]dc2cc742012-10-21 13:56:13581 scoped_ptr<QuicData> data(crypto_framer.ConstructHandshakeMessage(message));
rtenneti6f48aa92015-03-16 02:18:48582 QuicFramer quic_framer(QuicSupportedVersions(), QuicTime::Zero(),
583 Perspective::IS_CLIENT);
[email protected]8b37a092012-10-18 21:53:49584
585 QuicPacketHeader header;
[email protected]3aa9ca72014-02-27 19:39:43586 header.public_header.connection_id = connection_id;
[email protected]9db443912013-02-25 05:27:03587 header.public_header.reset_flag = false;
[email protected]14e8106c2013-03-14 16:25:33588 header.public_header.version_flag = should_include_version;
[email protected]8b37a092012-10-18 21:53:49589 header.packet_sequence_number = 1;
[email protected]9db443912013-02-25 05:27:03590 header.entropy_flag = false;
591 header.entropy_hash = 0;
592 header.fec_flag = false;
[email protected]8b37a092012-10-18 21:53:49593 header.fec_group = 0;
594
[email protected]be24ab22012-10-22 03:01:52595 QuicStreamFrame stream_frame(kCryptoStreamId, false, 0,
[email protected]5dafdb62013-11-14 01:24:26596 MakeIOVector(data->AsStringPiece()));
[email protected]8b37a092012-10-18 21:53:49597
[email protected]be24ab22012-10-22 03:01:52598 QuicFrame frame(&stream_frame);
599 QuicFrames frames;
600 frames.push_back(frame);
rtennetib6ac61a52015-02-11 20:20:52601 return BuildUnsizedDataPacket(&quic_framer, header, frames);
[email protected]8b37a092012-10-18 21:53:49602}
603
[email protected]3aa9ca72014-02-27 19:39:43604QuicPacket* ConstructHandshakePacket(QuicConnectionId connection_id,
605 QuicTag tag) {
[email protected]d3d15bf2013-01-30 02:51:54606 CryptoHandshakeMessage message;
[email protected]ccc66e8a2013-03-26 08:26:14607 message.set_tag(tag);
[email protected]3aa9ca72014-02-27 19:39:43608 return ConstructPacketFromHandshakeMessage(connection_id, message, false);
[email protected]d3d15bf2013-01-30 02:51:54609}
610
[email protected]ea825e02013-08-21 18:12:45611size_t GetPacketLengthForOneStream(
612 QuicVersion version,
613 bool include_version,
rtenneti23186682014-10-30 01:49:33614 QuicConnectionIdLength connection_id_length,
[email protected]ea825e02013-08-21 18:12:45615 QuicSequenceNumberLength sequence_number_length,
616 InFecGroup is_in_fec_group,
617 size_t* payload_length) {
[email protected]f62262b2013-07-05 20:57:30618 *payload_length = 1;
619 const size_t stream_length =
[email protected]5dafdb62013-11-14 01:24:26620 NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]b064310782013-05-30 21:12:17621 QuicPacketCreator::StreamFramePacketOverhead(
[email protected]310d37b2014-08-02 06:15:37622 PACKET_8BYTE_CONNECTION_ID, include_version,
[email protected]aa7e4ef2014-05-28 03:53:15623 sequence_number_length, 0u, is_in_fec_group);
[email protected]5dafdb62013-11-14 01:24:26624 const size_t ack_length = NullEncrypter().GetCiphertextSize(
[email protected]8e01c062013-10-31 07:35:31625 QuicFramer::GetMinAckFrameSize(
[email protected]310d37b2014-08-02 06:15:37626 sequence_number_length, PACKET_1BYTE_SEQUENCE_NUMBER)) +
rtenneti23186682014-10-30 01:49:33627 GetPacketHeaderSize(connection_id_length, include_version,
[email protected]ea825e02013-08-21 18:12:45628 sequence_number_length, is_in_fec_group);
[email protected]f62262b2013-07-05 20:57:30629 if (stream_length < ack_length) {
630 *payload_length = 1 + ack_length - stream_length;
631 }
632
[email protected]5dafdb62013-11-14 01:24:26633 return NullEncrypter().GetCiphertextSize(*payload_length) +
[email protected]f62262b2013-07-05 20:57:30634 QuicPacketCreator::StreamFramePacketOverhead(
rtenneti23186682014-10-30 01:49:33635 connection_id_length, include_version,
[email protected]aa7e4ef2014-05-28 03:53:15636 sequence_number_length, 0u, is_in_fec_group);
[email protected]5351cc4b2013-03-03 07:22:41637}
638
[email protected]a5b98172014-06-18 07:01:59639TestEntropyCalculator::TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31640
[email protected]a5b98172014-06-18 07:01:59641TestEntropyCalculator::~TestEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31642
[email protected]48878092013-07-26 14:51:56643QuicPacketEntropyHash TestEntropyCalculator::EntropyHash(
[email protected]9db443912013-02-25 05:27:03644 QuicPacketSequenceNumber sequence_number) const {
645 return 1u;
646}
647
[email protected]a5b98172014-06-18 07:01:59648MockEntropyCalculator::MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31649
[email protected]a5b98172014-06-18 07:01:59650MockEntropyCalculator::~MockEntropyCalculator() {}
[email protected]8e01c062013-10-31 07:35:31651
[email protected]b064310782013-05-30 21:12:17652QuicConfig DefaultQuicConfig() {
653 QuicConfig config;
[email protected]7d561352014-06-20 09:09:21654 config.SetInitialStreamFlowControlWindowToSend(
655 kInitialStreamFlowControlWindowForTest);
656 config.SetInitialSessionFlowControlWindowToSend(
657 kInitialSessionFlowControlWindowForTest);
[email protected]b064310782013-05-30 21:12:17658 return config;
659}
660
[email protected]4d640792013-12-18 22:21:08661QuicVersionVector SupportedVersions(QuicVersion version) {
662 QuicVersionVector versions;
663 versions.push_back(version);
664 return versions;
665}
666
rtennetibe635732014-10-02 22:51:42667TestWriterFactory::TestWriterFactory() : current_writer_(nullptr) {}
[email protected]6d515822014-08-22 01:58:06668TestWriterFactory::~TestWriterFactory() {}
669
670QuicPacketWriter* TestWriterFactory::Create(QuicServerPacketWriter* writer,
671 QuicConnection* connection) {
672 return new PerConnectionPacketWriter(this, writer, connection);
673}
674
675void TestWriterFactory::OnPacketSent(WriteResult result) {
rtennetibe635732014-10-02 22:51:42676 if (current_writer_ != nullptr && result.status == WRITE_STATUS_ERROR) {
[email protected]ca4e0d92014-08-22 16:33:22677 current_writer_->connection()->OnWriteError(result.error_code);
rtennetibe635732014-10-02 22:51:42678 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06679 }
680}
681
682void TestWriterFactory::Unregister(PerConnectionPacketWriter* writer) {
683 if (current_writer_ == writer) {
rtennetibe635732014-10-02 22:51:42684 current_writer_ = nullptr;
[email protected]6d515822014-08-22 01:58:06685 }
686}
687
688TestWriterFactory::PerConnectionPacketWriter::PerConnectionPacketWriter(
689 TestWriterFactory* factory,
690 QuicServerPacketWriter* writer,
691 QuicConnection* connection)
692 : QuicPerConnectionPacketWriter(writer, connection),
693 factory_(factory) {
694}
695
696TestWriterFactory::PerConnectionPacketWriter::~PerConnectionPacketWriter() {
697 factory_->Unregister(this);
698}
699
700WriteResult TestWriterFactory::PerConnectionPacketWriter::WritePacket(
701 const char* buffer,
702 size_t buf_len,
703 const IPAddressNumber& self_address,
704 const IPEndPoint& peer_address) {
rtennetibe635732014-10-02 22:51:42705 // A DCHECK(factory_current_writer_ == nullptr) would be wrong here -- this
706 // class may be used in a setting where connection()->OnPacketSent() is called
707 // in a different way, so TestWriterFactory::OnPacketSent might never be
708 // called.
[email protected]6d515822014-08-22 01:58:06709 factory_->current_writer_ = this;
710 return QuicPerConnectionPacketWriter::WritePacket(buffer,
711 buf_len,
712 self_address,
713 peer_address);
714}
715
[email protected]8b37a092012-10-18 21:53:49716} // namespace test
[email protected]8b37a092012-10-18 21:53:49717} // namespace net