blob: 5ff5e05a9b09c52d93f60bc4590c43d0093b691a [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/test_tools/quic_test_utils.h"
6
7#include <algorithm>
vasilvvc2018482019-04-26 15:47:55 -07008#include <cstdint>
QUICHE teama6ef0a62019-03-07 20:34:33 -05009#include <memory>
10
vasilvvc2018482019-04-26 15:47:55 -070011#include "third_party/boringssl/src/include/openssl/chacha.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050012#include "third_party/boringssl/src/include/openssl/sha.h"
13#include "net/third_party/quiche/src/quic/core/crypto/crypto_framer.h"
14#include "net/third_party/quiche/src/quic/core/crypto/crypto_handshake.h"
15#include "net/third_party/quiche/src/quic/core/crypto/crypto_utils.h"
16#include "net/third_party/quiche/src/quic/core/crypto/null_encrypter.h"
17#include "net/third_party/quiche/src/quic/core/crypto/quic_decrypter.h"
18#include "net/third_party/quiche/src/quic/core/crypto/quic_encrypter.h"
19#include "net/third_party/quiche/src/quic/core/quic_data_writer.h"
20#include "net/third_party/quiche/src/quic/core/quic_framer.h"
21#include "net/third_party/quiche/src/quic/core/quic_packet_creator.h"
22#include "net/third_party/quiche/src/quic/core/quic_utils.h"
23#include "net/third_party/quiche/src/quic/platform/api/quic_arraysize.h"
24#include "net/third_party/quiche/src/quic/platform/api/quic_endian.h"
25#include "net/third_party/quiche/src/quic/platform/api/quic_flags.h"
26#include "net/third_party/quiche/src/quic/platform/api/quic_logging.h"
27#include "net/third_party/quiche/src/quic/platform/api/quic_ptr_util.h"
28#include "net/third_party/quiche/src/quic/test_tools/crypto_test_utils.h"
29#include "net/third_party/quiche/src/quic/test_tools/quic_config_peer.h"
30#include "net/third_party/quiche/src/quic/test_tools/quic_connection_peer.h"
31#include "net/third_party/quiche/src/spdy/core/spdy_frame_builder.h"
32
33using testing::_;
34using testing::Invoke;
35
36namespace quic {
37namespace test {
38
39QuicConnectionId TestConnectionId() {
40 // Chosen by fair dice roll.
41 // Guaranteed to be random.
42 return TestConnectionId(42);
43}
44
45QuicConnectionId TestConnectionId(uint64_t connection_number) {
46 const uint64_t connection_id64_net =
47 QuicEndian::HostToNet64(connection_number);
48 return QuicConnectionId(reinterpret_cast<const char*>(&connection_id64_net),
49 sizeof(connection_id64_net));
50}
51
QUICHE team8e2e4532019-03-14 14:37:56 -070052QuicConnectionId TestConnectionIdNineBytesLong(uint64_t connection_number) {
53 const uint64_t connection_number_net =
54 QuicEndian::HostToNet64(connection_number);
55 char connection_id_bytes[9] = {};
56 static_assert(
57 sizeof(connection_id_bytes) == 1 + sizeof(connection_number_net),
58 "bad lengths");
59 memcpy(connection_id_bytes + 1, &connection_number_net,
60 sizeof(connection_number_net));
61 return QuicConnectionId(connection_id_bytes, sizeof(connection_id_bytes));
62}
63
QUICHE teama6ef0a62019-03-07 20:34:33 -050064uint64_t TestConnectionIdToUInt64(QuicConnectionId connection_id) {
65 DCHECK_EQ(connection_id.length(), kQuicDefaultConnectionIdLength);
66 uint64_t connection_id64_net = 0;
67 memcpy(&connection_id64_net, connection_id.data(),
68 std::min<size_t>(static_cast<size_t>(connection_id.length()),
69 sizeof(connection_id64_net)));
70 return QuicEndian::NetToHost64(connection_id64_net);
71}
72
73QuicAckFrame InitAckFrame(const std::vector<QuicAckBlock>& ack_blocks) {
74 DCHECK_GT(ack_blocks.size(), 0u);
75
76 QuicAckFrame ack;
77 QuicPacketNumber end_of_previous_block(1);
78 for (const QuicAckBlock& block : ack_blocks) {
79 DCHECK_GE(block.start, end_of_previous_block);
80 DCHECK_GT(block.limit, block.start);
81 ack.packets.AddRange(block.start, block.limit);
82 end_of_previous_block = block.limit;
83 }
84
85 ack.largest_acked = ack.packets.Max();
86
87 return ack;
88}
89
90QuicAckFrame InitAckFrame(uint64_t largest_acked) {
91 return InitAckFrame(QuicPacketNumber(largest_acked));
92}
93
94QuicAckFrame InitAckFrame(QuicPacketNumber largest_acked) {
95 return InitAckFrame({{QuicPacketNumber(1), largest_acked + 1}});
96}
97
98QuicAckFrame MakeAckFrameWithAckBlocks(size_t num_ack_blocks,
99 uint64_t least_unacked) {
100 QuicAckFrame ack;
101 ack.largest_acked = QuicPacketNumber(2 * num_ack_blocks + least_unacked);
102 // Add enough received packets to get num_ack_blocks ack blocks.
103 for (QuicPacketNumber i = QuicPacketNumber(2);
104 i < QuicPacketNumber(2 * num_ack_blocks + 1); i += 2) {
105 ack.packets.Add(i + least_unacked);
106 }
107 return ack;
108}
109
110std::unique_ptr<QuicPacket> BuildUnsizedDataPacket(
111 QuicFramer* framer,
112 const QuicPacketHeader& header,
113 const QuicFrames& frames) {
dschinazi66dea072019-04-09 11:41:06 -0700114 const size_t max_plaintext_size =
115 framer->GetMaxPlaintextSize(kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500116 size_t packet_size = GetPacketHeaderSize(framer->transport_version(), header);
117 for (size_t i = 0; i < frames.size(); ++i) {
118 DCHECK_LE(packet_size, max_plaintext_size);
119 bool first_frame = i == 0;
120 bool last_frame = i == frames.size() - 1;
121 const size_t frame_size = framer->GetSerializedFrameLength(
122 frames[i], max_plaintext_size - packet_size, first_frame, last_frame,
123 header.packet_number_length);
124 DCHECK(frame_size);
125 packet_size += frame_size;
126 }
127 return BuildUnsizedDataPacket(framer, header, frames, packet_size);
128}
129
130std::unique_ptr<QuicPacket> BuildUnsizedDataPacket(
131 QuicFramer* framer,
132 const QuicPacketHeader& header,
133 const QuicFrames& frames,
134 size_t packet_size) {
135 char* buffer = new char[packet_size];
136 size_t length = framer->BuildDataPacket(header, frames, buffer, packet_size,
QUICHE team6987b4a2019-03-15 16:23:04 -0700137 ENCRYPTION_INITIAL);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500138 DCHECK_NE(0u, length);
139 // Re-construct the data packet with data ownership.
140 return QuicMakeUnique<QuicPacket>(
141 buffer, length, /* owns_buffer */ true,
142 GetIncludedDestinationConnectionIdLength(header),
143 GetIncludedSourceConnectionIdLength(header), header.version_flag,
144 header.nonce != nullptr, header.packet_number_length,
145 header.retry_token_length_length, header.retry_token.length(),
146 header.length_length);
147}
148
vasilvvc48c8712019-03-11 13:38:16 -0700149std::string Sha1Hash(QuicStringPiece data) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500150 char buffer[SHA_DIGEST_LENGTH];
151 SHA1(reinterpret_cast<const uint8_t*>(data.data()), data.size(),
152 reinterpret_cast<uint8_t*>(buffer));
vasilvvc48c8712019-03-11 13:38:16 -0700153 return std::string(buffer, QUIC_ARRAYSIZE(buffer));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500154}
155
bnc5b3c3be2019-06-25 10:37:09 -0700156bool ClearControlFrame(const QuicFrame& frame) {
157 DeleteFrame(&const_cast<QuicFrame&>(frame));
158 return true;
159}
160
QUICHE teama6ef0a62019-03-07 20:34:33 -0500161uint64_t SimpleRandom::RandUint64() {
vasilvvc2018482019-04-26 15:47:55 -0700162 uint64_t result;
163 RandBytes(&result, sizeof(result));
164 return result;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500165}
166
167void SimpleRandom::RandBytes(void* data, size_t len) {
vasilvvc2018482019-04-26 15:47:55 -0700168 uint8_t* data_bytes = reinterpret_cast<uint8_t*>(data);
169 while (len > 0) {
170 const size_t buffer_left = sizeof(buffer_) - buffer_offset_;
171 const size_t to_copy = std::min(buffer_left, len);
172 memcpy(data_bytes, buffer_ + buffer_offset_, to_copy);
173 data_bytes += to_copy;
174 buffer_offset_ += to_copy;
175 len -= to_copy;
176
177 if (buffer_offset_ == sizeof(buffer_)) {
178 FillBuffer();
179 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500180 }
181}
182
vasilvvc2018482019-04-26 15:47:55 -0700183void SimpleRandom::FillBuffer() {
184 uint8_t nonce[12];
185 memcpy(nonce, buffer_, sizeof(nonce));
186 CRYPTO_chacha_20(buffer_, buffer_, sizeof(buffer_), key_, nonce, 0);
187 buffer_offset_ = 0;
188}
189
190void SimpleRandom::set_seed(uint64_t seed) {
191 static_assert(sizeof(key_) == SHA256_DIGEST_LENGTH, "Key has to be 256 bits");
192 SHA256(reinterpret_cast<const uint8_t*>(&seed), sizeof(seed), key_);
193
194 memset(buffer_, 0, sizeof(buffer_));
195 FillBuffer();
196}
197
QUICHE teama6ef0a62019-03-07 20:34:33 -0500198MockFramerVisitor::MockFramerVisitor() {
199 // By default, we want to accept packets.
fayang8aba1ff2019-06-21 12:00:54 -0700200 ON_CALL(*this, OnProtocolVersionMismatch(_))
QUICHE teama6ef0a62019-03-07 20:34:33 -0500201 .WillByDefault(testing::Return(false));
202
203 // By default, we want to accept packets.
204 ON_CALL(*this, OnUnauthenticatedHeader(_))
205 .WillByDefault(testing::Return(true));
206
207 ON_CALL(*this, OnUnauthenticatedPublicHeader(_))
208 .WillByDefault(testing::Return(true));
209
210 ON_CALL(*this, OnPacketHeader(_)).WillByDefault(testing::Return(true));
211
212 ON_CALL(*this, OnStreamFrame(_)).WillByDefault(testing::Return(true));
213
214 ON_CALL(*this, OnCryptoFrame(_)).WillByDefault(testing::Return(true));
215
216 ON_CALL(*this, OnStopWaitingFrame(_)).WillByDefault(testing::Return(true));
217
218 ON_CALL(*this, OnPaddingFrame(_)).WillByDefault(testing::Return(true));
219
220 ON_CALL(*this, OnPingFrame(_)).WillByDefault(testing::Return(true));
221
222 ON_CALL(*this, OnRstStreamFrame(_)).WillByDefault(testing::Return(true));
223
224 ON_CALL(*this, OnConnectionCloseFrame(_))
225 .WillByDefault(testing::Return(true));
226
QUICHE teama6ef0a62019-03-07 20:34:33 -0500227 ON_CALL(*this, OnStopSendingFrame(_)).WillByDefault(testing::Return(true));
228
229 ON_CALL(*this, OnPathChallengeFrame(_)).WillByDefault(testing::Return(true));
230
231 ON_CALL(*this, OnPathResponseFrame(_)).WillByDefault(testing::Return(true));
232
233 ON_CALL(*this, OnGoAwayFrame(_)).WillByDefault(testing::Return(true));
fkastenholz3c4eabf2019-04-22 07:49:59 -0700234 ON_CALL(*this, OnMaxStreamsFrame(_)).WillByDefault(testing::Return(true));
235 ON_CALL(*this, OnStreamsBlockedFrame(_)).WillByDefault(testing::Return(true));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500236}
237
238MockFramerVisitor::~MockFramerVisitor() {}
239
fayang8aba1ff2019-06-21 12:00:54 -0700240bool NoOpFramerVisitor::OnProtocolVersionMismatch(
241 ParsedQuicVersion /*version*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500242 return false;
243}
244
245bool NoOpFramerVisitor::OnUnauthenticatedPublicHeader(
dschinazi17d42422019-06-18 16:35:07 -0700246 const QuicPacketHeader& /*header*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500247 return true;
248}
249
250bool NoOpFramerVisitor::OnUnauthenticatedHeader(
dschinazi17d42422019-06-18 16:35:07 -0700251 const QuicPacketHeader& /*header*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500252 return true;
253}
254
dschinazi17d42422019-06-18 16:35:07 -0700255bool NoOpFramerVisitor::OnPacketHeader(const QuicPacketHeader& /*header*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500256 return true;
257}
258
dschinazi17d42422019-06-18 16:35:07 -0700259void NoOpFramerVisitor::OnCoalescedPacket(
260 const QuicEncryptedPacket& /*packet*/) {}
QUICHE teama6ef0a62019-03-07 20:34:33 -0500261
dschinazi4b5a68a2019-08-15 15:45:36 -0700262void NoOpFramerVisitor::OnUndecryptablePacket(
263 const QuicEncryptedPacket& /*packet*/,
264 EncryptionLevel /*decryption_level*/,
265 bool /*has_decryption_key*/) {}
266
dschinazi17d42422019-06-18 16:35:07 -0700267bool NoOpFramerVisitor::OnStreamFrame(const QuicStreamFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500268 return true;
269}
270
dschinazi17d42422019-06-18 16:35:07 -0700271bool NoOpFramerVisitor::OnCryptoFrame(const QuicCryptoFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500272 return true;
273}
274
dschinazi17d42422019-06-18 16:35:07 -0700275bool NoOpFramerVisitor::OnAckFrameStart(QuicPacketNumber /*largest_acked*/,
276 QuicTime::Delta /*ack_delay_time*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500277 return true;
278}
279
dschinazi17d42422019-06-18 16:35:07 -0700280bool NoOpFramerVisitor::OnAckRange(QuicPacketNumber /*start*/,
281 QuicPacketNumber /*end*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500282 return true;
283}
284
dschinazi17d42422019-06-18 16:35:07 -0700285bool NoOpFramerVisitor::OnAckTimestamp(QuicPacketNumber /*packet_number*/,
286 QuicTime /*timestamp*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500287 return true;
288}
289
dschinazi17d42422019-06-18 16:35:07 -0700290bool NoOpFramerVisitor::OnAckFrameEnd(QuicPacketNumber /*start*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500291 return true;
292}
293
dschinazi17d42422019-06-18 16:35:07 -0700294bool NoOpFramerVisitor::OnStopWaitingFrame(
295 const QuicStopWaitingFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500296 return true;
297}
298
dschinazi17d42422019-06-18 16:35:07 -0700299bool NoOpFramerVisitor::OnPaddingFrame(const QuicPaddingFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500300 return true;
301}
302
dschinazi17d42422019-06-18 16:35:07 -0700303bool NoOpFramerVisitor::OnPingFrame(const QuicPingFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500304 return true;
305}
306
dschinazi17d42422019-06-18 16:35:07 -0700307bool NoOpFramerVisitor::OnRstStreamFrame(const QuicRstStreamFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500308 return true;
309}
310
311bool NoOpFramerVisitor::OnConnectionCloseFrame(
dschinazi17d42422019-06-18 16:35:07 -0700312 const QuicConnectionCloseFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500313 return true;
314}
315
QUICHE teama6ef0a62019-03-07 20:34:33 -0500316bool NoOpFramerVisitor::OnNewConnectionIdFrame(
dschinazi17d42422019-06-18 16:35:07 -0700317 const QuicNewConnectionIdFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500318 return true;
319}
320
321bool NoOpFramerVisitor::OnRetireConnectionIdFrame(
dschinazi17d42422019-06-18 16:35:07 -0700322 const QuicRetireConnectionIdFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500323 return true;
324}
325
dschinazi17d42422019-06-18 16:35:07 -0700326bool NoOpFramerVisitor::OnNewTokenFrame(const QuicNewTokenFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500327 return true;
328}
329
dschinazi17d42422019-06-18 16:35:07 -0700330bool NoOpFramerVisitor::OnStopSendingFrame(
331 const QuicStopSendingFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500332 return true;
333}
334
335bool NoOpFramerVisitor::OnPathChallengeFrame(
dschinazi17d42422019-06-18 16:35:07 -0700336 const QuicPathChallengeFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500337 return true;
338}
339
340bool NoOpFramerVisitor::OnPathResponseFrame(
dschinazi17d42422019-06-18 16:35:07 -0700341 const QuicPathResponseFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500342 return true;
343}
344
dschinazi17d42422019-06-18 16:35:07 -0700345bool NoOpFramerVisitor::OnGoAwayFrame(const QuicGoAwayFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500346 return true;
347}
348
dschinazi17d42422019-06-18 16:35:07 -0700349bool NoOpFramerVisitor::OnMaxStreamsFrame(
350 const QuicMaxStreamsFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500351 return true;
352}
353
fkastenholz3c4eabf2019-04-22 07:49:59 -0700354bool NoOpFramerVisitor::OnStreamsBlockedFrame(
dschinazi17d42422019-06-18 16:35:07 -0700355 const QuicStreamsBlockedFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500356 return true;
357}
358
359bool NoOpFramerVisitor::OnWindowUpdateFrame(
dschinazi17d42422019-06-18 16:35:07 -0700360 const QuicWindowUpdateFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500361 return true;
362}
363
dschinazi17d42422019-06-18 16:35:07 -0700364bool NoOpFramerVisitor::OnBlockedFrame(const QuicBlockedFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500365 return true;
366}
367
dschinazi17d42422019-06-18 16:35:07 -0700368bool NoOpFramerVisitor::OnMessageFrame(const QuicMessageFrame& /*frame*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500369 return true;
370}
371
dschinazi17d42422019-06-18 16:35:07 -0700372bool NoOpFramerVisitor::IsValidStatelessResetToken(
373 QuicUint128 /*token*/) const {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500374 return false;
375}
376
377MockQuicConnectionVisitor::MockQuicConnectionVisitor() {}
378
379MockQuicConnectionVisitor::~MockQuicConnectionVisitor() {}
380
381MockQuicConnectionHelper::MockQuicConnectionHelper() {}
382
383MockQuicConnectionHelper::~MockQuicConnectionHelper() {}
384
385const QuicClock* MockQuicConnectionHelper::GetClock() const {
386 return &clock_;
387}
388
389QuicRandom* MockQuicConnectionHelper::GetRandomGenerator() {
390 return &random_generator_;
391}
392
393QuicAlarm* MockAlarmFactory::CreateAlarm(QuicAlarm::Delegate* delegate) {
394 return new MockAlarmFactory::TestAlarm(
395 QuicArenaScopedPtr<QuicAlarm::Delegate>(delegate));
396}
397
398QuicArenaScopedPtr<QuicAlarm> MockAlarmFactory::CreateAlarm(
399 QuicArenaScopedPtr<QuicAlarm::Delegate> delegate,
400 QuicConnectionArena* arena) {
401 if (arena != nullptr) {
402 return arena->New<TestAlarm>(std::move(delegate));
403 } else {
404 return QuicArenaScopedPtr<TestAlarm>(new TestAlarm(std::move(delegate)));
405 }
406}
407
408QuicBufferAllocator* MockQuicConnectionHelper::GetStreamSendBufferAllocator() {
409 return &buffer_allocator_;
410}
411
412void MockQuicConnectionHelper::AdvanceTime(QuicTime::Delta delta) {
413 clock_.AdvanceTime(delta);
414}
415
416MockQuicConnection::MockQuicConnection(MockQuicConnectionHelper* helper,
417 MockAlarmFactory* alarm_factory,
418 Perspective perspective)
419 : MockQuicConnection(TestConnectionId(),
420 QuicSocketAddress(TestPeerIPAddress(), kTestPort),
421 helper,
422 alarm_factory,
423 perspective,
424 ParsedVersionOfIndex(CurrentSupportedVersions(), 0)) {}
425
426MockQuicConnection::MockQuicConnection(QuicSocketAddress address,
427 MockQuicConnectionHelper* helper,
428 MockAlarmFactory* alarm_factory,
429 Perspective perspective)
430 : MockQuicConnection(TestConnectionId(),
431 address,
432 helper,
433 alarm_factory,
434 perspective,
435 ParsedVersionOfIndex(CurrentSupportedVersions(), 0)) {}
436
437MockQuicConnection::MockQuicConnection(QuicConnectionId connection_id,
438 MockQuicConnectionHelper* helper,
439 MockAlarmFactory* alarm_factory,
440 Perspective perspective)
441 : MockQuicConnection(connection_id,
442 QuicSocketAddress(TestPeerIPAddress(), kTestPort),
443 helper,
444 alarm_factory,
445 perspective,
446 ParsedVersionOfIndex(CurrentSupportedVersions(), 0)) {}
447
448MockQuicConnection::MockQuicConnection(
449 MockQuicConnectionHelper* helper,
450 MockAlarmFactory* alarm_factory,
451 Perspective perspective,
452 const ParsedQuicVersionVector& supported_versions)
453 : MockQuicConnection(TestConnectionId(),
454 QuicSocketAddress(TestPeerIPAddress(), kTestPort),
455 helper,
456 alarm_factory,
457 perspective,
458 supported_versions) {}
459
460MockQuicConnection::MockQuicConnection(
461 QuicConnectionId connection_id,
462 QuicSocketAddress address,
463 MockQuicConnectionHelper* helper,
464 MockAlarmFactory* alarm_factory,
465 Perspective perspective,
466 const ParsedQuicVersionVector& supported_versions)
467 : QuicConnection(connection_id,
468 address,
469 helper,
470 alarm_factory,
471 new testing::NiceMock<MockPacketWriter>(),
472 /* owns_writer= */ true,
473 perspective,
474 supported_versions) {
475 ON_CALL(*this, OnError(_))
476 .WillByDefault(
477 Invoke(this, &PacketSavingConnection::QuicConnection_OnError));
478 ON_CALL(*this, SendCryptoData(_, _, _))
479 .WillByDefault(
480 Invoke(this, &MockQuicConnection::QuicConnection_SendCryptoData));
481
482 SetSelfAddress(QuicSocketAddress(QuicIpAddress::Any4(), 5));
483}
484
485MockQuicConnection::~MockQuicConnection() {}
486
487void MockQuicConnection::AdvanceTime(QuicTime::Delta delta) {
488 static_cast<MockQuicConnectionHelper*>(helper())->AdvanceTime(delta);
489}
490
dschinazi17d42422019-06-18 16:35:07 -0700491bool MockQuicConnection::OnProtocolVersionMismatch(
fayang8aba1ff2019-06-21 12:00:54 -0700492 ParsedQuicVersion /*version*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500493 return false;
494}
495
496PacketSavingConnection::PacketSavingConnection(MockQuicConnectionHelper* helper,
497 MockAlarmFactory* alarm_factory,
498 Perspective perspective)
499 : MockQuicConnection(helper, alarm_factory, perspective) {}
500
501PacketSavingConnection::PacketSavingConnection(
502 MockQuicConnectionHelper* helper,
503 MockAlarmFactory* alarm_factory,
504 Perspective perspective,
505 const ParsedQuicVersionVector& supported_versions)
506 : MockQuicConnection(helper,
507 alarm_factory,
508 perspective,
509 supported_versions) {}
510
511PacketSavingConnection::~PacketSavingConnection() {}
512
513void PacketSavingConnection::SendOrQueuePacket(SerializedPacket* packet) {
514 encrypted_packets_.push_back(QuicMakeUnique<QuicEncryptedPacket>(
515 CopyBuffer(*packet), packet->encrypted_length, true));
516 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(10));
517 // Transfer ownership of the packet to the SentPacketManager and the
518 // ack notifier to the AckNotifierManager.
519 QuicConnectionPeer::GetSentPacketManager(this)->OnPacketSent(
520 packet, QuicPacketNumber(), clock_.ApproximateNow(), NOT_RETRANSMISSION,
521 HAS_RETRANSMITTABLE_DATA);
522}
523
524MockQuicSession::MockQuicSession(QuicConnection* connection)
525 : MockQuicSession(connection, true) {}
526
527MockQuicSession::MockQuicSession(QuicConnection* connection,
528 bool create_mock_crypto_stream)
529 : QuicSession(connection,
530 nullptr,
531 DefaultQuicConfig(),
renjietang216dc012019-08-27 11:28:27 -0700532 connection->supported_versions(),
533 /*num_expected_unidirectional_static_streams = */ 0) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500534 if (create_mock_crypto_stream) {
535 crypto_stream_ = QuicMakeUnique<MockQuicCryptoStream>(this);
536 }
537 ON_CALL(*this, WritevData(_, _, _, _, _))
538 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
539}
540
541MockQuicSession::~MockQuicSession() {
542 delete connection();
543}
544
545QuicCryptoStream* MockQuicSession::GetMutableCryptoStream() {
546 return crypto_stream_.get();
547}
548
549const QuicCryptoStream* MockQuicSession::GetCryptoStream() const {
550 return crypto_stream_.get();
551}
552
553void MockQuicSession::SetCryptoStream(QuicCryptoStream* crypto_stream) {
554 crypto_stream_.reset(crypto_stream);
555}
556
557// static
558QuicConsumedData MockQuicSession::ConsumeData(QuicStream* stream,
559 QuicStreamId /*id*/,
560 size_t write_length,
561 QuicStreamOffset offset,
562 StreamSendingState state) {
563 if (write_length > 0) {
564 auto buf = QuicMakeUnique<char[]>(write_length);
565 QuicDataWriter writer(write_length, buf.get(), HOST_BYTE_ORDER);
566 stream->WriteStreamData(offset, write_length, &writer);
567 } else {
568 DCHECK(state != NO_FIN);
569 }
570 return QuicConsumedData(write_length, state != NO_FIN);
571}
572
573MockQuicCryptoStream::MockQuicCryptoStream(QuicSession* session)
574 : QuicCryptoStream(session), params_(new QuicCryptoNegotiatedParameters) {}
575
576MockQuicCryptoStream::~MockQuicCryptoStream() {}
577
578bool MockQuicCryptoStream::encryption_established() const {
579 return false;
580}
581
582bool MockQuicCryptoStream::handshake_confirmed() const {
583 return false;
584}
585
586const QuicCryptoNegotiatedParameters&
587MockQuicCryptoStream::crypto_negotiated_params() const {
588 return *params_;
589}
590
591CryptoMessageParser* MockQuicCryptoStream::crypto_message_parser() {
592 return &crypto_framer_;
593}
594
595MockQuicSpdySession::MockQuicSpdySession(QuicConnection* connection)
596 : MockQuicSpdySession(connection, true) {}
597
598MockQuicSpdySession::MockQuicSpdySession(QuicConnection* connection,
599 bool create_mock_crypto_stream)
600 : QuicSpdySession(connection,
601 nullptr,
602 DefaultQuicConfig(),
603 connection->supported_versions()) {
604 if (create_mock_crypto_stream) {
605 crypto_stream_ = QuicMakeUnique<MockQuicCryptoStream>(this);
606 }
607
608 ON_CALL(*this, WritevData(_, _, _, _, _))
609 .WillByDefault(testing::Return(QuicConsumedData(0, false)));
610}
611
612MockQuicSpdySession::~MockQuicSpdySession() {
613 delete connection();
614}
615
616QuicCryptoStream* MockQuicSpdySession::GetMutableCryptoStream() {
617 return crypto_stream_.get();
618}
619
620const QuicCryptoStream* MockQuicSpdySession::GetCryptoStream() const {
621 return crypto_stream_.get();
622}
623
624void MockQuicSpdySession::SetCryptoStream(QuicCryptoStream* crypto_stream) {
625 crypto_stream_.reset(crypto_stream);
626}
627
628TestQuicSpdyServerSession::TestQuicSpdyServerSession(
629 QuicConnection* connection,
630 const QuicConfig& config,
631 const ParsedQuicVersionVector& supported_versions,
632 const QuicCryptoServerConfig* crypto_config,
633 QuicCompressedCertsCache* compressed_certs_cache)
634 : QuicServerSessionBase(config,
635 supported_versions,
636 connection,
637 &visitor_,
638 &helper_,
639 crypto_config,
640 compressed_certs_cache) {
641 Initialize();
QUICHE teama6ef0a62019-03-07 20:34:33 -0500642 ON_CALL(helper_, CanAcceptClientHello(_, _, _, _, _))
643 .WillByDefault(testing::Return(true));
644}
645
646TestQuicSpdyServerSession::~TestQuicSpdyServerSession() {
647 delete connection();
648}
649
650QuicCryptoServerStreamBase*
651TestQuicSpdyServerSession::CreateQuicCryptoServerStream(
652 const QuicCryptoServerConfig* crypto_config,
653 QuicCompressedCertsCache* compressed_certs_cache) {
wubd893df12019-05-15 18:48:20 -0700654 return new QuicCryptoServerStream(crypto_config, compressed_certs_cache, this,
655 &helper_);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500656}
657
658void TestQuicSpdyServerSession::OnCryptoHandshakeEvent(
659 CryptoHandshakeEvent event) {
660 QuicSession::OnCryptoHandshakeEvent(event);
661}
662
663QuicCryptoServerStream* TestQuicSpdyServerSession::GetMutableCryptoStream() {
664 return static_cast<QuicCryptoServerStream*>(
665 QuicServerSessionBase::GetMutableCryptoStream());
666}
667
668const QuicCryptoServerStream* TestQuicSpdyServerSession::GetCryptoStream()
669 const {
670 return static_cast<const QuicCryptoServerStream*>(
671 QuicServerSessionBase::GetCryptoStream());
672}
673
674TestQuicSpdyClientSession::TestQuicSpdyClientSession(
675 QuicConnection* connection,
676 const QuicConfig& config,
677 const ParsedQuicVersionVector& supported_versions,
678 const QuicServerId& server_id,
679 QuicCryptoClientConfig* crypto_config)
680 : QuicSpdyClientSessionBase(connection,
681 &push_promise_index_,
682 config,
683 supported_versions) {
684 crypto_stream_ = QuicMakeUnique<QuicCryptoClientStream>(
685 server_id, this, crypto_test_utils::ProofVerifyContextForTesting(),
686 crypto_config, this);
687 Initialize();
688}
689
690TestQuicSpdyClientSession::~TestQuicSpdyClientSession() {}
691
dschinazi17d42422019-06-18 16:35:07 -0700692bool TestQuicSpdyClientSession::IsAuthorized(const std::string& /*authority*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500693 return true;
694}
695
696void TestQuicSpdyClientSession::OnCryptoHandshakeEvent(
697 CryptoHandshakeEvent event) {
698 QuicSession::OnCryptoHandshakeEvent(event);
699}
700
701QuicCryptoClientStream* TestQuicSpdyClientSession::GetMutableCryptoStream() {
702 return crypto_stream_.get();
703}
704
705const QuicCryptoClientStream* TestQuicSpdyClientSession::GetCryptoStream()
706 const {
707 return crypto_stream_.get();
708}
709
710TestPushPromiseDelegate::TestPushPromiseDelegate(bool match)
711 : match_(match), rendezvous_fired_(false), rendezvous_stream_(nullptr) {}
712
713bool TestPushPromiseDelegate::CheckVary(
dschinazi17d42422019-06-18 16:35:07 -0700714 const spdy::SpdyHeaderBlock& /*client_request*/,
715 const spdy::SpdyHeaderBlock& /*promise_request*/,
716 const spdy::SpdyHeaderBlock& /*promise_response*/) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500717 QUIC_DVLOG(1) << "match " << match_;
718 return match_;
719}
720
721void TestPushPromiseDelegate::OnRendezvousResult(QuicSpdyStream* stream) {
722 rendezvous_fired_ = true;
723 rendezvous_stream_ = stream;
724}
725
726MockPacketWriter::MockPacketWriter() {
727 ON_CALL(*this, GetMaxPacketSize(_))
dschinazi66dea072019-04-09 11:41:06 -0700728 .WillByDefault(testing::Return(kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500729 ON_CALL(*this, IsBatchMode()).WillByDefault(testing::Return(false));
730 ON_CALL(*this, GetNextWriteLocation(_, _))
731 .WillByDefault(testing::Return(nullptr));
732 ON_CALL(*this, Flush())
733 .WillByDefault(testing::Return(WriteResult(WRITE_STATUS_OK, 0)));
734}
735
736MockPacketWriter::~MockPacketWriter() {}
737
738MockSendAlgorithm::MockSendAlgorithm() {}
739
740MockSendAlgorithm::~MockSendAlgorithm() {}
741
742MockLossAlgorithm::MockLossAlgorithm() {}
743
744MockLossAlgorithm::~MockLossAlgorithm() {}
745
746MockAckListener::MockAckListener() {}
747
748MockAckListener::~MockAckListener() {}
749
750MockNetworkChangeVisitor::MockNetworkChangeVisitor() {}
751
752MockNetworkChangeVisitor::~MockNetworkChangeVisitor() {}
753
754namespace {
755
vasilvvc48c8712019-03-11 13:38:16 -0700756std::string HexDumpWithMarks(const char* data,
757 int length,
758 const bool* marks,
759 int mark_length) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500760 static const char kHexChars[] = "0123456789abcdef";
761 static const int kColumns = 4;
762
763 const int kSizeLimit = 1024;
764 if (length > kSizeLimit || mark_length > kSizeLimit) {
765 QUIC_LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
766 length = std::min(length, kSizeLimit);
767 mark_length = std::min(mark_length, kSizeLimit);
768 }
769
vasilvvc48c8712019-03-11 13:38:16 -0700770 std::string hex;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500771 for (const char* row = data; length > 0;
772 row += kColumns, length -= kColumns) {
773 for (const char* p = row; p < row + 4; ++p) {
774 if (p < row + length) {
775 const bool mark =
776 (marks && (p - data) < mark_length && marks[p - data]);
777 hex += mark ? '*' : ' ';
778 hex += kHexChars[(*p & 0xf0) >> 4];
779 hex += kHexChars[*p & 0x0f];
780 hex += mark ? '*' : ' ';
781 } else {
782 hex += " ";
783 }
784 }
785 hex = hex + " ";
786
787 for (const char* p = row; p < row + 4 && p < row + length; ++p) {
788 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
789 }
790
791 hex = hex + '\n';
792 }
793 return hex;
794}
795
796} // namespace
797
798QuicIpAddress TestPeerIPAddress() {
799 return QuicIpAddress::Loopback4();
800}
801
802ParsedQuicVersion QuicVersionMax() {
803 return AllSupportedVersions().front();
804}
805
806ParsedQuicVersion QuicVersionMin() {
807 return AllSupportedVersions().back();
808}
809
810QuicTransportVersion QuicTransportVersionMax() {
811 return AllSupportedTransportVersions().front();
812}
813
814QuicTransportVersion QuicTransportVersionMin() {
815 return AllSupportedTransportVersions().back();
816}
817
818QuicEncryptedPacket* ConstructEncryptedPacket(
819 QuicConnectionId destination_connection_id,
820 QuicConnectionId source_connection_id,
821 bool version_flag,
822 bool reset_flag,
823 uint64_t packet_number,
vasilvvc48c8712019-03-11 13:38:16 -0700824 const std::string& data) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500825 return ConstructEncryptedPacket(
826 destination_connection_id, source_connection_id, version_flag, reset_flag,
827 packet_number, data, CONNECTION_ID_PRESENT, CONNECTION_ID_ABSENT,
828 PACKET_4BYTE_PACKET_NUMBER);
829}
830
831QuicEncryptedPacket* ConstructEncryptedPacket(
832 QuicConnectionId destination_connection_id,
833 QuicConnectionId source_connection_id,
834 bool version_flag,
835 bool reset_flag,
836 uint64_t packet_number,
vasilvvc48c8712019-03-11 13:38:16 -0700837 const std::string& data,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500838 QuicConnectionIdIncluded destination_connection_id_included,
839 QuicConnectionIdIncluded source_connection_id_included,
840 QuicPacketNumberLength packet_number_length) {
841 return ConstructEncryptedPacket(
842 destination_connection_id, source_connection_id, version_flag, reset_flag,
843 packet_number, data, destination_connection_id_included,
844 source_connection_id_included, packet_number_length, nullptr);
845}
846
847QuicEncryptedPacket* ConstructEncryptedPacket(
848 QuicConnectionId destination_connection_id,
849 QuicConnectionId source_connection_id,
850 bool version_flag,
851 bool reset_flag,
852 uint64_t packet_number,
vasilvvc48c8712019-03-11 13:38:16 -0700853 const std::string& data,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500854 QuicConnectionIdIncluded destination_connection_id_included,
855 QuicConnectionIdIncluded source_connection_id_included,
856 QuicPacketNumberLength packet_number_length,
857 ParsedQuicVersionVector* versions) {
858 return ConstructEncryptedPacket(
859 destination_connection_id, source_connection_id, version_flag, reset_flag,
860 packet_number, data, destination_connection_id_included,
861 source_connection_id_included, packet_number_length, versions,
862 Perspective::IS_CLIENT);
863}
864QuicEncryptedPacket* ConstructEncryptedPacket(
865 QuicConnectionId destination_connection_id,
866 QuicConnectionId source_connection_id,
867 bool version_flag,
868 bool reset_flag,
869 uint64_t packet_number,
vasilvvc48c8712019-03-11 13:38:16 -0700870 const std::string& data,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500871 QuicConnectionIdIncluded destination_connection_id_included,
872 QuicConnectionIdIncluded source_connection_id_included,
873 QuicPacketNumberLength packet_number_length,
874 ParsedQuicVersionVector* versions,
875 Perspective perspective) {
876 QuicPacketHeader header;
877 header.destination_connection_id = destination_connection_id;
878 header.destination_connection_id_included =
879 destination_connection_id_included;
880 header.source_connection_id = source_connection_id;
881 header.source_connection_id_included = source_connection_id_included;
882 header.version_flag = version_flag;
883 header.reset_flag = reset_flag;
884 header.packet_number_length = packet_number_length;
885 header.packet_number = QuicPacketNumber(packet_number);
886 ParsedQuicVersionVector supported_versions = CurrentSupportedVersions();
887 if (!versions) {
888 versions = &supported_versions;
889 }
890 if (QuicVersionHasLongHeaderLengths((*versions)[0].transport_version) &&
891 version_flag) {
892 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
893 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
894 }
895
896 QuicFrames frames;
897 QuicFramer framer(*versions, QuicTime::Zero(), perspective,
898 kQuicDefaultConnectionIdLength);
nharper55fa6132019-05-07 19:37:21 -0700899 ParsedQuicVersion version = (*versions)[0];
900 EncryptionLevel level =
901 header.version_flag ? ENCRYPTION_INITIAL : ENCRYPTION_FORWARD_SECURE;
902 if (version.handshake_protocol == PROTOCOL_TLS1_3 &&
903 level == ENCRYPTION_INITIAL) {
904 CrypterPair crypters;
905 CryptoUtils::CreateTlsInitialCrypters(Perspective::IS_CLIENT,
906 version.transport_version,
907 destination_connection_id, &crypters);
908 framer.SetEncrypter(ENCRYPTION_INITIAL, std::move(crypters.encrypter));
909 if (version.KnowsWhichDecrypterToUse()) {
910 framer.InstallDecrypter(ENCRYPTION_INITIAL,
911 std::move(crypters.decrypter));
912 } else {
913 framer.SetDecrypter(ENCRYPTION_INITIAL, std::move(crypters.decrypter));
914 }
915 }
916 if (!QuicVersionUsesCryptoFrames(version.transport_version)) {
917 QuicFrame frame(
918 QuicStreamFrame(QuicUtils::GetCryptoStreamId(version.transport_version),
919 false, 0, QuicStringPiece(data)));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500920 frames.push_back(frame);
921 } else {
nharper55fa6132019-05-07 19:37:21 -0700922 QuicFrame frame(new QuicCryptoFrame(level, 0, data));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500923 frames.push_back(frame);
924 }
QUICHE team2252b702019-05-14 23:55:14 -0400925 // We need a minimum number of bytes of encrypted payload. This will
926 // guarantee that we have at least that much. (It ignores the overhead of the
927 // stream/crypto framing, so it overpads slightly.)
928 size_t min_plaintext_size =
929 QuicPacketCreator::MinPlaintextPacketSize(version);
930 if (data.length() < min_plaintext_size) {
931 size_t padding_length = min_plaintext_size - data.length();
nharper55fa6132019-05-07 19:37:21 -0700932 frames.push_back(QuicFrame(QuicPaddingFrame(padding_length)));
933 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500934
935 std::unique_ptr<QuicPacket> packet(
936 BuildUnsizedDataPacket(&framer, header, frames));
937 EXPECT_TRUE(packet != nullptr);
dschinazi66dea072019-04-09 11:41:06 -0700938 char* buffer = new char[kMaxOutgoingPacketSize];
QUICHE teama6ef0a62019-03-07 20:34:33 -0500939 size_t encrypted_length =
QUICHE team6987b4a2019-03-15 16:23:04 -0700940 framer.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(packet_number),
dschinazi66dea072019-04-09 11:41:06 -0700941 *packet, buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500942 EXPECT_NE(0u, encrypted_length);
943 DeleteFrames(&frames);
944 return new QuicEncryptedPacket(buffer, encrypted_length, true);
945}
946
947QuicReceivedPacket* ConstructReceivedPacket(
948 const QuicEncryptedPacket& encrypted_packet,
949 QuicTime receipt_time) {
950 char* buffer = new char[encrypted_packet.length()];
951 memcpy(buffer, encrypted_packet.data(), encrypted_packet.length());
952 return new QuicReceivedPacket(buffer, encrypted_packet.length(), receipt_time,
953 true);
954}
955
956QuicEncryptedPacket* ConstructMisFramedEncryptedPacket(
957 QuicConnectionId destination_connection_id,
958 QuicConnectionId source_connection_id,
959 bool version_flag,
960 bool reset_flag,
961 uint64_t packet_number,
vasilvvc48c8712019-03-11 13:38:16 -0700962 const std::string& data,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500963 QuicConnectionIdIncluded destination_connection_id_included,
964 QuicConnectionIdIncluded source_connection_id_included,
965 QuicPacketNumberLength packet_number_length,
966 ParsedQuicVersionVector* versions,
967 Perspective perspective) {
968 QuicPacketHeader header;
969 header.destination_connection_id = destination_connection_id;
970 header.destination_connection_id_included =
971 destination_connection_id_included;
972 header.source_connection_id = source_connection_id;
973 header.source_connection_id_included = source_connection_id_included;
974 header.version_flag = version_flag;
975 header.reset_flag = reset_flag;
976 header.packet_number_length = packet_number_length;
977 header.packet_number = QuicPacketNumber(packet_number);
zhongyi546cc452019-04-12 15:27:49 -0700978 if (QuicVersionHasLongHeaderLengths((*versions)[0].transport_version) &&
979 version_flag) {
980 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
981 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
982 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500983 QuicFrame frame(QuicStreamFrame(1, false, 0, QuicStringPiece(data)));
984 QuicFrames frames;
985 frames.push_back(frame);
nharper55fa6132019-05-07 19:37:21 -0700986 ParsedQuicVersion version =
987 (versions != nullptr ? *versions : AllSupportedVersions())[0];
QUICHE teama6ef0a62019-03-07 20:34:33 -0500988 QuicFramer framer(versions != nullptr ? *versions : AllSupportedVersions(),
989 QuicTime::Zero(), perspective,
990 kQuicDefaultConnectionIdLength);
nharper55fa6132019-05-07 19:37:21 -0700991 if (version.handshake_protocol == PROTOCOL_TLS1_3 && version_flag) {
992 CrypterPair crypters;
993 CryptoUtils::CreateTlsInitialCrypters(Perspective::IS_CLIENT,
994 version.transport_version,
995 destination_connection_id, &crypters);
996 framer.SetEncrypter(ENCRYPTION_INITIAL, std::move(crypters.encrypter));
nharperf5e68452019-05-29 17:24:18 -0700997 framer.InstallDecrypter(ENCRYPTION_INITIAL, std::move(crypters.decrypter));
nharper55fa6132019-05-07 19:37:21 -0700998 }
999 // We need a minimum of 7 bytes of encrypted payload. This will guarantee that
1000 // we have at least that much. (It ignores the overhead of the stream/crypto
1001 // framing, so it overpads slightly.)
1002 if (data.length() < 7) {
1003 size_t padding_length = 7 - data.length();
1004 frames.push_back(QuicFrame(QuicPaddingFrame(padding_length)));
1005 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001006
1007 std::unique_ptr<QuicPacket> packet(
1008 BuildUnsizedDataPacket(&framer, header, frames));
1009 EXPECT_TRUE(packet != nullptr);
1010
1011 // Now set the frame type to 0x1F, which is an invalid frame type.
1012 reinterpret_cast<unsigned char*>(
1013 packet->mutable_data())[GetStartOfEncryptedData(
1014 framer.transport_version(),
1015 GetIncludedDestinationConnectionIdLength(header),
1016 GetIncludedSourceConnectionIdLength(header), version_flag,
1017 false /* no diversification nonce */, packet_number_length,
zhongyi546cc452019-04-12 15:27:49 -07001018 header.retry_token_length_length, 0, header.length_length)] = 0x1F;
QUICHE teama6ef0a62019-03-07 20:34:33 -05001019
dschinazi66dea072019-04-09 11:41:06 -07001020 char* buffer = new char[kMaxOutgoingPacketSize];
QUICHE teama6ef0a62019-03-07 20:34:33 -05001021 size_t encrypted_length =
QUICHE team6987b4a2019-03-15 16:23:04 -07001022 framer.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(packet_number),
dschinazi66dea072019-04-09 11:41:06 -07001023 *packet, buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001024 EXPECT_NE(0u, encrypted_length);
1025 return new QuicEncryptedPacket(buffer, encrypted_length, true);
1026}
1027
vasilvvc48c8712019-03-11 13:38:16 -07001028void CompareCharArraysWithHexError(const std::string& description,
QUICHE teama6ef0a62019-03-07 20:34:33 -05001029 const char* actual,
1030 const int actual_len,
1031 const char* expected,
1032 const int expected_len) {
1033 EXPECT_EQ(actual_len, expected_len);
1034 const int min_len = std::min(actual_len, expected_len);
1035 const int max_len = std::max(actual_len, expected_len);
1036 std::unique_ptr<bool[]> marks(new bool[max_len]);
1037 bool identical = (actual_len == expected_len);
1038 for (int i = 0; i < min_len; ++i) {
1039 if (actual[i] != expected[i]) {
1040 marks[i] = true;
1041 identical = false;
1042 } else {
1043 marks[i] = false;
1044 }
1045 }
1046 for (int i = min_len; i < max_len; ++i) {
1047 marks[i] = true;
1048 }
1049 if (identical)
1050 return;
1051 ADD_FAILURE() << "Description:\n"
1052 << description << "\n\nExpected:\n"
1053 << HexDumpWithMarks(expected, expected_len, marks.get(),
1054 max_len)
1055 << "\nActual:\n"
1056 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
1057}
1058
QUICHE teama6ef0a62019-03-07 20:34:33 -05001059QuicConfig DefaultQuicConfig() {
1060 QuicConfig config;
1061 config.SetInitialStreamFlowControlWindowToSend(
1062 kInitialStreamFlowControlWindowForTest);
1063 config.SetInitialSessionFlowControlWindowToSend(
1064 kInitialSessionFlowControlWindowForTest);
fkastenholzd3a1de92019-05-15 07:00:07 -07001065 QuicConfigPeer::SetReceivedMaxIncomingBidirectionalStreams(
QUICHE teama6ef0a62019-03-07 20:34:33 -05001066 &config, kDefaultMaxStreamsPerConnection);
1067 // Default enable NSTP.
1068 // This is unnecessary for versions > 44
1069 if (!config.HasClientSentConnectionOption(quic::kNSTP,
1070 quic::Perspective::IS_CLIENT)) {
1071 quic::QuicTagVector connection_options;
1072 connection_options.push_back(quic::kNSTP);
1073 config.SetConnectionOptionsToSend(connection_options);
1074 }
1075 return config;
1076}
1077
QUICHE teama6ef0a62019-03-07 20:34:33 -05001078QuicTransportVersionVector SupportedTransportVersions(
1079 QuicTransportVersion version) {
1080 QuicTransportVersionVector versions;
1081 versions.push_back(version);
1082 return versions;
1083}
1084
1085ParsedQuicVersionVector SupportedVersions(ParsedQuicVersion version) {
1086 ParsedQuicVersionVector versions;
1087 versions.push_back(version);
1088 return versions;
1089}
1090
1091MockQuicConnectionDebugVisitor::MockQuicConnectionDebugVisitor() {}
1092
1093MockQuicConnectionDebugVisitor::~MockQuicConnectionDebugVisitor() {}
1094
1095MockReceivedPacketManager::MockReceivedPacketManager(QuicConnectionStats* stats)
1096 : QuicReceivedPacketManager(stats) {}
1097
1098MockReceivedPacketManager::~MockReceivedPacketManager() {}
1099
QUICHE teama6ef0a62019-03-07 20:34:33 -05001100MockPacketCreatorDelegate::MockPacketCreatorDelegate() {}
1101MockPacketCreatorDelegate::~MockPacketCreatorDelegate() {}
1102
1103MockSessionNotifier::MockSessionNotifier() {}
1104MockSessionNotifier::~MockSessionNotifier() {}
1105
1106void CreateClientSessionForTest(
1107 QuicServerId server_id,
QUICHE teama6ef0a62019-03-07 20:34:33 -05001108 QuicTime::Delta connection_start_time,
1109 const ParsedQuicVersionVector& supported_versions,
1110 MockQuicConnectionHelper* helper,
1111 MockAlarmFactory* alarm_factory,
1112 QuicCryptoClientConfig* crypto_client_config,
1113 PacketSavingConnection** client_connection,
1114 TestQuicSpdyClientSession** client_session) {
1115 CHECK(crypto_client_config);
1116 CHECK(client_connection);
1117 CHECK(client_session);
1118 CHECK(!connection_start_time.IsZero())
1119 << "Connections must start at non-zero times, otherwise the "
1120 << "strike-register will be unhappy.";
1121
wube9dc7da2019-05-22 06:08:54 -07001122 QuicConfig config = DefaultQuicConfig();
QUICHE teama6ef0a62019-03-07 20:34:33 -05001123 *client_connection = new PacketSavingConnection(
1124 helper, alarm_factory, Perspective::IS_CLIENT, supported_versions);
1125 *client_session = new TestQuicSpdyClientSession(*client_connection, config,
1126 supported_versions, server_id,
1127 crypto_client_config);
1128 (*client_connection)->AdvanceTime(connection_start_time);
1129}
1130
1131void CreateServerSessionForTest(
dschinazi17d42422019-06-18 16:35:07 -07001132 QuicServerId /*server_id*/,
QUICHE teama6ef0a62019-03-07 20:34:33 -05001133 QuicTime::Delta connection_start_time,
1134 ParsedQuicVersionVector supported_versions,
1135 MockQuicConnectionHelper* helper,
1136 MockAlarmFactory* alarm_factory,
1137 QuicCryptoServerConfig* server_crypto_config,
1138 QuicCompressedCertsCache* compressed_certs_cache,
1139 PacketSavingConnection** server_connection,
1140 TestQuicSpdyServerSession** server_session) {
1141 CHECK(server_crypto_config);
1142 CHECK(server_connection);
1143 CHECK(server_session);
1144 CHECK(!connection_start_time.IsZero())
1145 << "Connections must start at non-zero times, otherwise the "
1146 << "strike-register will be unhappy.";
1147
1148 *server_connection =
1149 new PacketSavingConnection(helper, alarm_factory, Perspective::IS_SERVER,
1150 ParsedVersionOfIndex(supported_versions, 0));
1151 *server_session = new TestQuicSpdyServerSession(
1152 *server_connection, DefaultQuicConfig(), supported_versions,
1153 server_crypto_config, compressed_certs_cache);
1154
1155 // We advance the clock initially because the default time is zero and the
1156 // strike register worries that we've just overflowed a uint32_t time.
1157 (*server_connection)->AdvanceTime(connection_start_time);
1158}
1159
1160QuicStreamId GetNthClientInitiatedBidirectionalStreamId(
1161 QuicTransportVersion version,
1162 int n) {
dschinazi552accc2019-06-17 17:07:34 -07001163 int num = n;
renjietang118c8ac2019-07-30 11:43:59 -07001164 if (!VersionUsesQpack(version)) {
1165 num++;
dschinazi552accc2019-06-17 17:07:34 -07001166 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001167 return QuicUtils::GetFirstBidirectionalStreamId(version,
1168 Perspective::IS_CLIENT) +
dschinazi552accc2019-06-17 17:07:34 -07001169 QuicUtils::StreamIdDelta(version) * num;
QUICHE teama6ef0a62019-03-07 20:34:33 -05001170}
1171
1172QuicStreamId GetNthServerInitiatedBidirectionalStreamId(
1173 QuicTransportVersion version,
1174 int n) {
1175 return QuicUtils::GetFirstBidirectionalStreamId(version,
1176 Perspective::IS_SERVER) +
1177 QuicUtils::StreamIdDelta(version) * n;
1178}
1179
1180QuicStreamId GetNthServerInitiatedUnidirectionalStreamId(
1181 QuicTransportVersion version,
1182 int n) {
1183 return QuicUtils::GetFirstUnidirectionalStreamId(version,
1184 Perspective::IS_SERVER) +
1185 QuicUtils::StreamIdDelta(version) * n;
1186}
1187
renjietang3a1bb802019-06-11 10:42:41 -07001188QuicStreamId GetNthClientInitiatedUnidirectionalStreamId(
1189 QuicTransportVersion version,
1190 int n) {
1191 return QuicUtils::GetFirstUnidirectionalStreamId(version,
1192 Perspective::IS_CLIENT) +
1193 QuicUtils::StreamIdDelta(version) * n;
1194}
1195
QUICHE teama6ef0a62019-03-07 20:34:33 -05001196StreamType DetermineStreamType(QuicStreamId id,
1197 QuicTransportVersion version,
1198 Perspective perspective,
1199 bool is_incoming,
1200 StreamType default_type) {
fkastenholz305e1732019-06-18 05:01:22 -07001201 return VersionHasIetfQuicFrames(version)
QUICHE teama6ef0a62019-03-07 20:34:33 -05001202 ? QuicUtils::GetStreamType(id, perspective, is_incoming)
1203 : default_type;
1204}
1205
1206QuicMemSliceSpan MakeSpan(QuicBufferAllocator* allocator,
1207 QuicStringPiece message_data,
1208 QuicMemSliceStorage* storage) {
1209 if (message_data.length() == 0) {
dschinazi66dea072019-04-09 11:41:06 -07001210 *storage =
1211 QuicMemSliceStorage(nullptr, 0, allocator, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001212 return storage->ToSpan();
1213 }
1214 struct iovec iov = {const_cast<char*>(message_data.data()),
1215 message_data.length()};
dschinazi66dea072019-04-09 11:41:06 -07001216 *storage = QuicMemSliceStorage(&iov, 1, allocator, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001217 return storage->ToSpan();
1218}
1219
1220} // namespace test
1221} // namespace quic