blob: ebfaeaa87ce44bdc5e509d34959b42ac3f83413d [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/core/quic_connection.h"
6
7#include <errno.h>
zhongyi546cc452019-04-12 15:27:49 -07008
QUICHE teama6ef0a62019-03-07 20:34:33 -05009#include <memory>
10#include <ostream>
zhongyi9e843642019-04-12 09:04:54 -070011#include <string>
zhongyi546cc452019-04-12 15:27:49 -070012#include <utility>
zhongyi9e843642019-04-12 09:04:54 -070013
QUICHE teama6ef0a62019-03-07 20:34:33 -050014#include "net/third_party/quiche/src/quic/core/congestion_control/loss_detection_interface.h"
15#include "net/third_party/quiche/src/quic/core/congestion_control/send_algorithm_interface.h"
zhongyi546cc452019-04-12 15:27:49 -070016#include "net/third_party/quiche/src/quic/core/crypto/null_decrypter.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050017#include "net/third_party/quiche/src/quic/core/crypto/null_encrypter.h"
18#include "net/third_party/quiche/src/quic/core/crypto/quic_decrypter.h"
19#include "net/third_party/quiche/src/quic/core/crypto/quic_encrypter.h"
20#include "net/third_party/quiche/src/quic/core/quic_connection_id.h"
21#include "net/third_party/quiche/src/quic/core/quic_packets.h"
22#include "net/third_party/quiche/src/quic/core/quic_simple_buffer_allocator.h"
23#include "net/third_party/quiche/src/quic/core/quic_types.h"
24#include "net/third_party/quiche/src/quic/core/quic_utils.h"
25#include "net/third_party/quiche/src/quic/platform/api/quic_error_code_wrappers.h"
26#include "net/third_party/quiche/src/quic/platform/api/quic_expect_bug.h"
27#include "net/third_party/quiche/src/quic/platform/api/quic_flags.h"
28#include "net/third_party/quiche/src/quic/platform/api/quic_logging.h"
29#include "net/third_party/quiche/src/quic/platform/api/quic_ptr_util.h"
30#include "net/third_party/quiche/src/quic/platform/api/quic_reference_counted.h"
31#include "net/third_party/quiche/src/quic/platform/api/quic_str_cat.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050032#include "net/third_party/quiche/src/quic/platform/api/quic_string_piece.h"
33#include "net/third_party/quiche/src/quic/platform/api/quic_test.h"
34#include "net/third_party/quiche/src/quic/test_tools/mock_clock.h"
35#include "net/third_party/quiche/src/quic/test_tools/mock_random.h"
36#include "net/third_party/quiche/src/quic/test_tools/quic_config_peer.h"
37#include "net/third_party/quiche/src/quic/test_tools/quic_connection_peer.h"
38#include "net/third_party/quiche/src/quic/test_tools/quic_framer_peer.h"
39#include "net/third_party/quiche/src/quic/test_tools/quic_packet_creator_peer.h"
40#include "net/third_party/quiche/src/quic/test_tools/quic_packet_generator_peer.h"
41#include "net/third_party/quiche/src/quic/test_tools/quic_sent_packet_manager_peer.h"
42#include "net/third_party/quiche/src/quic/test_tools/quic_test_utils.h"
43#include "net/third_party/quiche/src/quic/test_tools/simple_data_producer.h"
44#include "net/third_party/quiche/src/quic/test_tools/simple_quic_framer.h"
45#include "net/third_party/quiche/src/quic/test_tools/simple_session_notifier.h"
46
47using testing::_;
48using testing::AnyNumber;
49using testing::AtLeast;
50using testing::DoAll;
51using testing::Exactly;
52using testing::Ge;
53using testing::IgnoreResult;
54using testing::InSequence;
55using testing::Invoke;
56using testing::InvokeWithoutArgs;
57using testing::Lt;
58using testing::Ref;
59using testing::Return;
60using testing::SaveArg;
61using testing::SetArgPointee;
62using testing::StrictMock;
63
64namespace quic {
65namespace test {
66namespace {
67
nharper55fa6132019-05-07 19:37:21 -070068const char data1[] = "foo data";
69const char data2[] = "bar data";
QUICHE teama6ef0a62019-03-07 20:34:33 -050070
71const bool kHasStopWaiting = true;
72
73const int kDefaultRetransmissionTimeMs = 500;
74
QUICHE team548d51b2019-03-14 10:06:54 -070075DiversificationNonce kTestDiversificationNonce = {
76 'a', 'b', 'a', 'b', 'a', 'b', 'a', 'b', 'a', 'b', 'a',
77 'b', 'a', 'b', 'a', 'b', 'a', 'b', 'a', 'b', 'a', 'b',
78 'a', 'b', 'a', 'b', 'a', 'b', 'a', 'b', 'a', 'b',
79};
80
QUICHE teama6ef0a62019-03-07 20:34:33 -050081const QuicSocketAddress kPeerAddress =
82 QuicSocketAddress(QuicIpAddress::Loopback6(),
83 /*port=*/12345);
84const QuicSocketAddress kSelfAddress =
85 QuicSocketAddress(QuicIpAddress::Loopback6(),
86 /*port=*/443);
87
88Perspective InvertPerspective(Perspective perspective) {
89 return perspective == Perspective::IS_CLIENT ? Perspective::IS_SERVER
90 : Perspective::IS_CLIENT;
91}
92
93QuicStreamId GetNthClientInitiatedStreamId(int n,
94 QuicTransportVersion version) {
95 return QuicUtils::GetHeadersStreamId(version) + n * 2;
96}
97
QUICHE team8c1daa22019-03-13 08:33:41 -070098QuicLongHeaderType EncryptionlevelToLongHeaderType(EncryptionLevel level) {
99 switch (level) {
QUICHE team6987b4a2019-03-15 16:23:04 -0700100 case ENCRYPTION_INITIAL:
QUICHE team8c1daa22019-03-13 08:33:41 -0700101 return INITIAL;
QUICHE team88ea0082019-03-15 10:05:26 -0700102 case ENCRYPTION_HANDSHAKE:
103 return HANDSHAKE;
QUICHE team8c1daa22019-03-13 08:33:41 -0700104 case ENCRYPTION_ZERO_RTT:
105 return ZERO_RTT_PROTECTED;
106 case ENCRYPTION_FORWARD_SECURE:
107 DCHECK(false);
108 return INVALID_PACKET_TYPE;
109 default:
110 DCHECK(false);
111 return INVALID_PACKET_TYPE;
112 }
113}
114
QUICHE teama6ef0a62019-03-07 20:34:33 -0500115// TaggingEncrypter appends kTagSize bytes of |tag| to the end of each message.
116class TaggingEncrypter : public QuicEncrypter {
117 public:
118 explicit TaggingEncrypter(uint8_t tag) : tag_(tag) {}
119 TaggingEncrypter(const TaggingEncrypter&) = delete;
120 TaggingEncrypter& operator=(const TaggingEncrypter&) = delete;
121
122 ~TaggingEncrypter() override {}
123
124 // QuicEncrypter interface.
125 bool SetKey(QuicStringPiece key) override { return true; }
126
127 bool SetNoncePrefix(QuicStringPiece nonce_prefix) override { return true; }
128
129 bool SetIV(QuicStringPiece iv) override { return true; }
130
QUICHE team2d187972019-03-19 16:23:47 -0700131 bool SetHeaderProtectionKey(QuicStringPiece key) override { return true; }
132
QUICHE teama6ef0a62019-03-07 20:34:33 -0500133 bool EncryptPacket(uint64_t packet_number,
134 QuicStringPiece associated_data,
135 QuicStringPiece plaintext,
136 char* output,
137 size_t* output_length,
138 size_t max_output_length) override {
139 const size_t len = plaintext.size() + kTagSize;
140 if (max_output_length < len) {
141 return false;
142 }
143 // Memmove is safe for inplace encryption.
144 memmove(output, plaintext.data(), plaintext.size());
145 output += plaintext.size();
146 memset(output, tag_, kTagSize);
147 *output_length = len;
148 return true;
149 }
150
QUICHE team2d187972019-03-19 16:23:47 -0700151 std::string GenerateHeaderProtectionMask(QuicStringPiece sample) override {
152 return std::string(5, 0);
153 }
154
QUICHE teama6ef0a62019-03-07 20:34:33 -0500155 size_t GetKeySize() const override { return 0; }
156 size_t GetNoncePrefixSize() const override { return 0; }
157 size_t GetIVSize() const override { return 0; }
158
159 size_t GetMaxPlaintextSize(size_t ciphertext_size) const override {
160 return ciphertext_size - kTagSize;
161 }
162
163 size_t GetCiphertextSize(size_t plaintext_size) const override {
164 return plaintext_size + kTagSize;
165 }
166
167 QuicStringPiece GetKey() const override { return QuicStringPiece(); }
168
169 QuicStringPiece GetNoncePrefix() const override { return QuicStringPiece(); }
170
171 private:
172 enum {
173 kTagSize = 12,
174 };
175
176 const uint8_t tag_;
177};
178
179// TaggingDecrypter ensures that the final kTagSize bytes of the message all
180// have the same value and then removes them.
181class TaggingDecrypter : public QuicDecrypter {
182 public:
183 ~TaggingDecrypter() override {}
184
185 // QuicDecrypter interface
186 bool SetKey(QuicStringPiece key) override { return true; }
187
188 bool SetNoncePrefix(QuicStringPiece nonce_prefix) override { return true; }
189
190 bool SetIV(QuicStringPiece iv) override { return true; }
191
QUICHE team2d187972019-03-19 16:23:47 -0700192 bool SetHeaderProtectionKey(QuicStringPiece key) override { return true; }
193
QUICHE teama6ef0a62019-03-07 20:34:33 -0500194 bool SetPreliminaryKey(QuicStringPiece key) override {
195 QUIC_BUG << "should not be called";
196 return false;
197 }
198
199 bool SetDiversificationNonce(const DiversificationNonce& key) override {
200 return true;
201 }
202
203 bool DecryptPacket(uint64_t packet_number,
204 QuicStringPiece associated_data,
205 QuicStringPiece ciphertext,
206 char* output,
207 size_t* output_length,
208 size_t max_output_length) override {
209 if (ciphertext.size() < kTagSize) {
210 return false;
211 }
212 if (!CheckTag(ciphertext, GetTag(ciphertext))) {
213 return false;
214 }
215 *output_length = ciphertext.size() - kTagSize;
216 memcpy(output, ciphertext.data(), *output_length);
217 return true;
218 }
219
QUICHE team2d187972019-03-19 16:23:47 -0700220 std::string GenerateHeaderProtectionMask(
221 QuicDataReader* sample_reader) override {
222 return std::string(5, 0);
223 }
224
QUICHE teama6ef0a62019-03-07 20:34:33 -0500225 size_t GetKeySize() const override { return 0; }
226 size_t GetIVSize() const override { return 0; }
227 QuicStringPiece GetKey() const override { return QuicStringPiece(); }
228 QuicStringPiece GetNoncePrefix() const override { return QuicStringPiece(); }
229 // Use a distinct value starting with 0xFFFFFF, which is never used by TLS.
230 uint32_t cipher_id() const override { return 0xFFFFFFF0; }
231
232 protected:
233 virtual uint8_t GetTag(QuicStringPiece ciphertext) {
234 return ciphertext.data()[ciphertext.size() - 1];
235 }
236
237 private:
238 enum {
239 kTagSize = 12,
240 };
241
242 bool CheckTag(QuicStringPiece ciphertext, uint8_t tag) {
243 for (size_t i = ciphertext.size() - kTagSize; i < ciphertext.size(); i++) {
244 if (ciphertext.data()[i] != tag) {
245 return false;
246 }
247 }
248
249 return true;
250 }
251};
252
253// StringTaggingDecrypter ensures that the final kTagSize bytes of the message
254// match the expected value.
255class StrictTaggingDecrypter : public TaggingDecrypter {
256 public:
257 explicit StrictTaggingDecrypter(uint8_t tag) : tag_(tag) {}
258 ~StrictTaggingDecrypter() override {}
259
260 // TaggingQuicDecrypter
261 uint8_t GetTag(QuicStringPiece ciphertext) override { return tag_; }
262
263 // Use a distinct value starting with 0xFFFFFF, which is never used by TLS.
264 uint32_t cipher_id() const override { return 0xFFFFFFF1; }
265
266 private:
267 const uint8_t tag_;
268};
269
270class TestConnectionHelper : public QuicConnectionHelperInterface {
271 public:
272 TestConnectionHelper(MockClock* clock, MockRandom* random_generator)
273 : clock_(clock), random_generator_(random_generator) {
274 clock_->AdvanceTime(QuicTime::Delta::FromSeconds(1));
275 }
276 TestConnectionHelper(const TestConnectionHelper&) = delete;
277 TestConnectionHelper& operator=(const TestConnectionHelper&) = delete;
278
279 // QuicConnectionHelperInterface
280 const QuicClock* GetClock() const override { return clock_; }
281
282 QuicRandom* GetRandomGenerator() override { return random_generator_; }
283
284 QuicBufferAllocator* GetStreamSendBufferAllocator() override {
285 return &buffer_allocator_;
286 }
287
288 private:
289 MockClock* clock_;
290 MockRandom* random_generator_;
291 SimpleBufferAllocator buffer_allocator_;
292};
293
294class TestAlarmFactory : public QuicAlarmFactory {
295 public:
296 class TestAlarm : public QuicAlarm {
297 public:
298 explicit TestAlarm(QuicArenaScopedPtr<QuicAlarm::Delegate> delegate)
299 : QuicAlarm(std::move(delegate)) {}
300
301 void SetImpl() override {}
302 void CancelImpl() override {}
303 using QuicAlarm::Fire;
304 };
305
306 TestAlarmFactory() {}
307 TestAlarmFactory(const TestAlarmFactory&) = delete;
308 TestAlarmFactory& operator=(const TestAlarmFactory&) = delete;
309
310 QuicAlarm* CreateAlarm(QuicAlarm::Delegate* delegate) override {
311 return new TestAlarm(QuicArenaScopedPtr<QuicAlarm::Delegate>(delegate));
312 }
313
314 QuicArenaScopedPtr<QuicAlarm> CreateAlarm(
315 QuicArenaScopedPtr<QuicAlarm::Delegate> delegate,
316 QuicConnectionArena* arena) override {
317 return arena->New<TestAlarm>(std::move(delegate));
318 }
319};
320
321class TestPacketWriter : public QuicPacketWriter {
322 public:
323 TestPacketWriter(ParsedQuicVersion version, MockClock* clock)
324 : version_(version),
325 framer_(SupportedVersions(version_), Perspective::IS_SERVER),
326 last_packet_size_(0),
327 write_blocked_(false),
328 write_should_fail_(false),
329 block_on_next_flush_(false),
330 block_on_next_write_(false),
331 next_packet_too_large_(false),
332 always_get_packet_too_large_(false),
333 is_write_blocked_data_buffered_(false),
334 is_batch_mode_(false),
335 final_bytes_of_last_packet_(0),
336 final_bytes_of_previous_packet_(0),
337 use_tagging_decrypter_(false),
338 packets_write_attempts_(0),
339 clock_(clock),
340 write_pause_time_delta_(QuicTime::Delta::Zero()),
dschinazi66dea072019-04-09 11:41:06 -0700341 max_packet_size_(kMaxOutgoingPacketSize),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500342 supports_release_time_(false) {}
343 TestPacketWriter(const TestPacketWriter&) = delete;
344 TestPacketWriter& operator=(const TestPacketWriter&) = delete;
345
346 // QuicPacketWriter interface
347 WriteResult WritePacket(const char* buffer,
348 size_t buf_len,
349 const QuicIpAddress& self_address,
350 const QuicSocketAddress& peer_address,
351 PerPacketOptions* options) override {
352 QuicEncryptedPacket packet(buffer, buf_len);
353 ++packets_write_attempts_;
354
355 if (packet.length() >= sizeof(final_bytes_of_last_packet_)) {
356 final_bytes_of_previous_packet_ = final_bytes_of_last_packet_;
357 memcpy(&final_bytes_of_last_packet_, packet.data() + packet.length() - 4,
358 sizeof(final_bytes_of_last_packet_));
359 }
360
361 if (use_tagging_decrypter_) {
zhongyi546cc452019-04-12 15:27:49 -0700362 if (framer_.framer()->version().KnowsWhichDecrypterToUse()) {
363 framer_.framer()->InstallDecrypter(ENCRYPTION_INITIAL,
364 QuicMakeUnique<TaggingDecrypter>());
365 framer_.framer()->InstallDecrypter(ENCRYPTION_ZERO_RTT,
366 QuicMakeUnique<TaggingDecrypter>());
367 framer_.framer()->InstallDecrypter(ENCRYPTION_FORWARD_SECURE,
368 QuicMakeUnique<TaggingDecrypter>());
369 } else {
370 framer_.framer()->SetDecrypter(ENCRYPTION_INITIAL,
371 QuicMakeUnique<TaggingDecrypter>());
372 }
373 } else if (framer_.framer()->version().KnowsWhichDecrypterToUse()) {
374 framer_.framer()->InstallDecrypter(
375 ENCRYPTION_FORWARD_SECURE,
376 QuicMakeUnique<NullDecrypter>(Perspective::IS_SERVER));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500377 }
378 EXPECT_TRUE(framer_.ProcessPacket(packet));
379 if (block_on_next_write_) {
380 write_blocked_ = true;
381 block_on_next_write_ = false;
382 }
383 if (next_packet_too_large_) {
384 next_packet_too_large_ = false;
385 return WriteResult(WRITE_STATUS_ERROR, QUIC_EMSGSIZE);
386 }
387 if (always_get_packet_too_large_) {
388 return WriteResult(WRITE_STATUS_ERROR, QUIC_EMSGSIZE);
389 }
390 if (IsWriteBlocked()) {
391 return WriteResult(is_write_blocked_data_buffered_
392 ? WRITE_STATUS_BLOCKED_DATA_BUFFERED
393 : WRITE_STATUS_BLOCKED,
394 0);
395 }
396
397 if (ShouldWriteFail()) {
398 return WriteResult(WRITE_STATUS_ERROR, 0);
399 }
400
401 last_packet_size_ = packet.length();
402 last_packet_header_ = framer_.header();
403
404 if (!write_pause_time_delta_.IsZero()) {
405 clock_->AdvanceTime(write_pause_time_delta_);
406 }
407 return WriteResult(WRITE_STATUS_OK, last_packet_size_);
408 }
409
410 bool ShouldWriteFail() { return write_should_fail_; }
411
412 bool IsWriteBlocked() const override { return write_blocked_; }
413
414 void SetWriteBlocked() { write_blocked_ = true; }
415
416 void SetWritable() override { write_blocked_ = false; }
417
418 void SetShouldWriteFail() { write_should_fail_ = true; }
419
420 QuicByteCount GetMaxPacketSize(
421 const QuicSocketAddress& /*peer_address*/) const override {
422 return max_packet_size_;
423 }
424
425 bool SupportsReleaseTime() const { return supports_release_time_; }
426
427 bool IsBatchMode() const override { return is_batch_mode_; }
428
429 char* GetNextWriteLocation(const QuicIpAddress& self_address,
430 const QuicSocketAddress& peer_address) override {
431 return nullptr;
432 }
433
434 WriteResult Flush() override {
435 if (block_on_next_flush_) {
436 block_on_next_flush_ = false;
437 SetWriteBlocked();
438 return WriteResult(WRITE_STATUS_BLOCKED, /*errno*/ -1);
439 }
440 return WriteResult(WRITE_STATUS_OK, 0);
441 }
442
443 void BlockOnNextFlush() { block_on_next_flush_ = true; }
444
445 void BlockOnNextWrite() { block_on_next_write_ = true; }
446
447 void SimulateNextPacketTooLarge() { next_packet_too_large_ = true; }
448
449 void AlwaysGetPacketTooLarge() { always_get_packet_too_large_ = true; }
450
451 // Sets the amount of time that the writer should before the actual write.
452 void SetWritePauseTimeDelta(QuicTime::Delta delta) {
453 write_pause_time_delta_ = delta;
454 }
455
456 void SetBatchMode(bool new_value) { is_batch_mode_ = new_value; }
457
458 const QuicPacketHeader& header() { return framer_.header(); }
459
460 size_t frame_count() const { return framer_.num_frames(); }
461
462 const std::vector<QuicAckFrame>& ack_frames() const {
463 return framer_.ack_frames();
464 }
465
466 const std::vector<QuicStopWaitingFrame>& stop_waiting_frames() const {
467 return framer_.stop_waiting_frames();
468 }
469
470 const std::vector<QuicConnectionCloseFrame>& connection_close_frames() const {
471 return framer_.connection_close_frames();
472 }
473
474 const std::vector<QuicRstStreamFrame>& rst_stream_frames() const {
475 return framer_.rst_stream_frames();
476 }
477
478 const std::vector<std::unique_ptr<QuicStreamFrame>>& stream_frames() const {
479 return framer_.stream_frames();
480 }
481
482 const std::vector<std::unique_ptr<QuicCryptoFrame>>& crypto_frames() const {
483 return framer_.crypto_frames();
484 }
485
486 const std::vector<QuicPingFrame>& ping_frames() const {
487 return framer_.ping_frames();
488 }
489
490 const std::vector<QuicMessageFrame>& message_frames() const {
491 return framer_.message_frames();
492 }
493
494 const std::vector<QuicWindowUpdateFrame>& window_update_frames() const {
495 return framer_.window_update_frames();
496 }
497
498 const std::vector<QuicPaddingFrame>& padding_frames() const {
499 return framer_.padding_frames();
500 }
501
502 const std::vector<QuicPathChallengeFrame>& path_challenge_frames() const {
503 return framer_.path_challenge_frames();
504 }
505
506 const std::vector<QuicPathResponseFrame>& path_response_frames() const {
507 return framer_.path_response_frames();
508 }
509
510 size_t last_packet_size() { return last_packet_size_; }
511
512 const QuicPacketHeader& last_packet_header() const {
513 return last_packet_header_;
514 }
515
516 const QuicVersionNegotiationPacket* version_negotiation_packet() {
517 return framer_.version_negotiation_packet();
518 }
519
520 void set_is_write_blocked_data_buffered(bool buffered) {
521 is_write_blocked_data_buffered_ = buffered;
522 }
523
524 void set_perspective(Perspective perspective) {
525 // We invert perspective here, because the framer needs to parse packets
526 // we send.
527 QuicFramerPeer::SetPerspective(framer_.framer(),
528 InvertPerspective(perspective));
529 }
530
531 // final_bytes_of_last_packet_ returns the last four bytes of the previous
532 // packet as a little-endian, uint32_t. This is intended to be used with a
533 // TaggingEncrypter so that tests can determine which encrypter was used for
534 // a given packet.
535 uint32_t final_bytes_of_last_packet() { return final_bytes_of_last_packet_; }
536
537 // Returns the final bytes of the second to last packet.
538 uint32_t final_bytes_of_previous_packet() {
539 return final_bytes_of_previous_packet_;
540 }
541
542 void use_tagging_decrypter() { use_tagging_decrypter_ = true; }
543
544 uint32_t packets_write_attempts() { return packets_write_attempts_; }
545
546 void Reset() { framer_.Reset(); }
547
548 void SetSupportedVersions(const ParsedQuicVersionVector& versions) {
549 framer_.SetSupportedVersions(versions);
550 }
551
552 void set_max_packet_size(QuicByteCount max_packet_size) {
553 max_packet_size_ = max_packet_size;
554 }
555
556 void set_supports_release_time(bool supports_release_time) {
557 supports_release_time_ = supports_release_time;
558 }
559
560 SimpleQuicFramer* framer() { return &framer_; }
561
562 private:
563 ParsedQuicVersion version_;
564 SimpleQuicFramer framer_;
565 size_t last_packet_size_;
566 QuicPacketHeader last_packet_header_;
567 bool write_blocked_;
568 bool write_should_fail_;
569 bool block_on_next_flush_;
570 bool block_on_next_write_;
571 bool next_packet_too_large_;
572 bool always_get_packet_too_large_;
573 bool is_write_blocked_data_buffered_;
574 bool is_batch_mode_;
575 uint32_t final_bytes_of_last_packet_;
576 uint32_t final_bytes_of_previous_packet_;
577 bool use_tagging_decrypter_;
578 uint32_t packets_write_attempts_;
579 MockClock* clock_;
580 // If non-zero, the clock will pause during WritePacket for this amount of
581 // time.
582 QuicTime::Delta write_pause_time_delta_;
583 QuicByteCount max_packet_size_;
584 bool supports_release_time_;
585};
586
587class TestConnection : public QuicConnection {
588 public:
589 TestConnection(QuicConnectionId connection_id,
590 QuicSocketAddress address,
591 TestConnectionHelper* helper,
592 TestAlarmFactory* alarm_factory,
593 TestPacketWriter* writer,
594 Perspective perspective,
595 ParsedQuicVersion version)
596 : QuicConnection(connection_id,
597 address,
598 helper,
599 alarm_factory,
600 writer,
601 /* owns_writer= */ false,
602 perspective,
603 SupportedVersions(version)),
604 notifier_(nullptr) {
605 writer->set_perspective(perspective);
606 SetEncrypter(ENCRYPTION_FORWARD_SECURE,
607 QuicMakeUnique<NullEncrypter>(perspective));
608 SetDataProducer(&producer_);
609 }
610 TestConnection(const TestConnection&) = delete;
611 TestConnection& operator=(const TestConnection&) = delete;
612
613 void SendAck() { QuicConnectionPeer::SendAck(this); }
614
615 void SetSendAlgorithm(SendAlgorithmInterface* send_algorithm) {
616 QuicConnectionPeer::SetSendAlgorithm(this, send_algorithm);
617 }
618
619 void SetLossAlgorithm(LossDetectionInterface* loss_algorithm) {
620 QuicConnectionPeer::SetLossAlgorithm(this, loss_algorithm);
621 }
622
623 void SendPacket(EncryptionLevel level,
624 uint64_t packet_number,
625 std::unique_ptr<QuicPacket> packet,
626 HasRetransmittableData retransmittable,
627 bool has_ack,
628 bool has_pending_frames) {
dschinazi66dea072019-04-09 11:41:06 -0700629 char buffer[kMaxOutgoingPacketSize];
QUICHE teama6ef0a62019-03-07 20:34:33 -0500630 size_t encrypted_length =
631 QuicConnectionPeer::GetFramer(this)->EncryptPayload(
QUICHE team6987b4a2019-03-15 16:23:04 -0700632 ENCRYPTION_INITIAL, QuicPacketNumber(packet_number), *packet,
dschinazi66dea072019-04-09 11:41:06 -0700633 buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500634 SerializedPacket serialized_packet(
635 QuicPacketNumber(packet_number), PACKET_4BYTE_PACKET_NUMBER, buffer,
636 encrypted_length, has_ack, has_pending_frames);
637 if (retransmittable == HAS_RETRANSMITTABLE_DATA) {
638 serialized_packet.retransmittable_frames.push_back(
639 QuicFrame(QuicStreamFrame()));
640 }
641 OnSerializedPacket(&serialized_packet);
642 }
643
644 QuicConsumedData SaveAndSendStreamData(QuicStreamId id,
645 const struct iovec* iov,
646 int iov_count,
647 size_t total_length,
648 QuicStreamOffset offset,
649 StreamSendingState state) {
650 ScopedPacketFlusher flusher(this, NO_ACK);
651 producer_.SaveStreamData(id, iov, iov_count, 0u, total_length);
652 if (notifier_ != nullptr) {
653 return notifier_->WriteOrBufferData(id, total_length, state);
654 }
655 return QuicConnection::SendStreamData(id, total_length, offset, state);
656 }
657
658 QuicConsumedData SendStreamDataWithString(QuicStreamId id,
659 QuicStringPiece data,
660 QuicStreamOffset offset,
661 StreamSendingState state) {
662 ScopedPacketFlusher flusher(this, NO_ACK);
nharper46833c32019-05-15 21:33:05 -0700663 if (!QuicUtils::IsCryptoStreamId(transport_version(), id) &&
QUICHE team6987b4a2019-03-15 16:23:04 -0700664 this->encryption_level() == ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500665 this->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
666 }
667 struct iovec iov;
668 MakeIOVector(data, &iov);
669 return SaveAndSendStreamData(id, &iov, 1, data.length(), offset, state);
670 }
671
QUICHE teamcd098022019-03-22 18:49:55 -0700672 QuicConsumedData SendApplicationDataAtLevel(EncryptionLevel encryption_level,
673 QuicStreamId id,
674 QuicStringPiece data,
675 QuicStreamOffset offset,
676 StreamSendingState state) {
677 ScopedPacketFlusher flusher(this, NO_ACK);
678 DCHECK(encryption_level >= ENCRYPTION_ZERO_RTT);
679 SetEncrypter(encryption_level, QuicMakeUnique<TaggingEncrypter>(0x01));
680 SetDefaultEncryptionLevel(encryption_level);
681 struct iovec iov;
682 MakeIOVector(data, &iov);
683 return SaveAndSendStreamData(id, &iov, 1, data.length(), offset, state);
684 }
685
QUICHE teama6ef0a62019-03-07 20:34:33 -0500686 QuicConsumedData SendStreamData3() {
687 return SendStreamDataWithString(
688 GetNthClientInitiatedStreamId(1, transport_version()), "food", 0,
689 NO_FIN);
690 }
691
692 QuicConsumedData SendStreamData5() {
693 return SendStreamDataWithString(
694 GetNthClientInitiatedStreamId(2, transport_version()), "food2", 0,
695 NO_FIN);
696 }
697
698 // Ensures the connection can write stream data before writing.
699 QuicConsumedData EnsureWritableAndSendStreamData5() {
700 EXPECT_TRUE(CanWriteStreamData());
701 return SendStreamData5();
702 }
703
704 // The crypto stream has special semantics so that it is not blocked by a
705 // congestion window limitation, and also so that it gets put into a separate
706 // packet (so that it is easier to reason about a crypto frame not being
707 // split needlessly across packet boundaries). As a result, we have separate
708 // tests for some cases for this stream.
709 QuicConsumedData SendCryptoStreamData() {
710 QuicStreamOffset offset = 0;
711 QuicStringPiece data("chlo");
nharper46833c32019-05-15 21:33:05 -0700712 return SendCryptoDataWithString(data, offset);
713 }
714
715 QuicConsumedData SendCryptoDataWithString(QuicStringPiece data,
716 QuicStreamOffset offset) {
QUICHE teamea740082019-03-11 17:58:43 -0700717 if (!QuicVersionUsesCryptoFrames(transport_version())) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500718 return SendStreamDataWithString(
719 QuicUtils::GetCryptoStreamId(transport_version()), data, offset,
720 NO_FIN);
721 }
QUICHE team6987b4a2019-03-15 16:23:04 -0700722 producer_.SaveCryptoData(ENCRYPTION_INITIAL, offset, data);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500723 size_t bytes_written;
724 if (notifier_) {
725 bytes_written =
QUICHE team6987b4a2019-03-15 16:23:04 -0700726 notifier_->WriteCryptoData(ENCRYPTION_INITIAL, data.length(), offset);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500727 } else {
QUICHE team6987b4a2019-03-15 16:23:04 -0700728 bytes_written = QuicConnection::SendCryptoData(ENCRYPTION_INITIAL,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500729 data.length(), offset);
730 }
731 return QuicConsumedData(bytes_written, /*fin_consumed*/ false);
732 }
733
734 void set_version(ParsedQuicVersion version) {
735 QuicConnectionPeer::GetFramer(this)->set_version(version);
736 }
737
738 void SetSupportedVersions(const ParsedQuicVersionVector& versions) {
739 QuicConnectionPeer::GetFramer(this)->SetSupportedVersions(versions);
740 QuicConnectionPeer::SetNoVersionNegotiation(this, versions.size() == 1);
741 writer()->SetSupportedVersions(versions);
742 }
743
744 void set_perspective(Perspective perspective) {
745 writer()->set_perspective(perspective);
746 QuicConnectionPeer::SetPerspective(this, perspective);
747 }
748
749 // Enable path MTU discovery. Assumes that the test is performed from the
750 // client perspective and the higher value of MTU target is used.
751 void EnablePathMtuDiscovery(MockSendAlgorithm* send_algorithm) {
752 ASSERT_EQ(Perspective::IS_CLIENT, perspective());
753
754 QuicConfig config;
755 QuicTagVector connection_options;
756 connection_options.push_back(kMTUH);
757 config.SetConnectionOptionsToSend(connection_options);
758 EXPECT_CALL(*send_algorithm, SetFromConfig(_, _));
759 SetFromConfig(config);
760
761 // Normally, the pacing would be disabled in the test, but calling
762 // SetFromConfig enables it. Set nearly-infinite bandwidth to make the
763 // pacing algorithm work.
764 EXPECT_CALL(*send_algorithm, PacingRate(_))
765 .WillRepeatedly(Return(QuicBandwidth::Infinite()));
766 }
767
768 TestAlarmFactory::TestAlarm* GetAckAlarm() {
769 return reinterpret_cast<TestAlarmFactory::TestAlarm*>(
770 QuicConnectionPeer::GetAckAlarm(this));
771 }
772
773 TestAlarmFactory::TestAlarm* GetPingAlarm() {
774 return reinterpret_cast<TestAlarmFactory::TestAlarm*>(
775 QuicConnectionPeer::GetPingAlarm(this));
776 }
777
778 TestAlarmFactory::TestAlarm* GetRetransmissionAlarm() {
779 return reinterpret_cast<TestAlarmFactory::TestAlarm*>(
780 QuicConnectionPeer::GetRetransmissionAlarm(this));
781 }
782
783 TestAlarmFactory::TestAlarm* GetSendAlarm() {
784 return reinterpret_cast<TestAlarmFactory::TestAlarm*>(
785 QuicConnectionPeer::GetSendAlarm(this));
786 }
787
788 TestAlarmFactory::TestAlarm* GetTimeoutAlarm() {
789 return reinterpret_cast<TestAlarmFactory::TestAlarm*>(
790 QuicConnectionPeer::GetTimeoutAlarm(this));
791 }
792
793 TestAlarmFactory::TestAlarm* GetMtuDiscoveryAlarm() {
794 return reinterpret_cast<TestAlarmFactory::TestAlarm*>(
795 QuicConnectionPeer::GetMtuDiscoveryAlarm(this));
796 }
797
798 TestAlarmFactory::TestAlarm* GetPathDegradingAlarm() {
799 return reinterpret_cast<TestAlarmFactory::TestAlarm*>(
800 QuicConnectionPeer::GetPathDegradingAlarm(this));
801 }
802
803 TestAlarmFactory::TestAlarm* GetProcessUndecryptablePacketsAlarm() {
804 return reinterpret_cast<TestAlarmFactory::TestAlarm*>(
805 QuicConnectionPeer::GetProcessUndecryptablePacketsAlarm(this));
806 }
807
808 void SetMaxTailLossProbes(size_t max_tail_loss_probes) {
809 QuicSentPacketManagerPeer::SetMaxTailLossProbes(
810 QuicConnectionPeer::GetSentPacketManager(this), max_tail_loss_probes);
811 }
812
813 QuicByteCount GetBytesInFlight() {
ianswett9f459cb2019-04-21 06:39:59 -0700814 return QuicConnectionPeer::GetSentPacketManager(this)->GetBytesInFlight();
QUICHE teama6ef0a62019-03-07 20:34:33 -0500815 }
816
817 void set_notifier(SimpleSessionNotifier* notifier) { notifier_ = notifier; }
818
819 void ReturnEffectivePeerAddressForNextPacket(const QuicSocketAddress& addr) {
820 next_effective_peer_addr_ = QuicMakeUnique<QuicSocketAddress>(addr);
821 }
822
nharper46833c32019-05-15 21:33:05 -0700823 SimpleDataProducer* producer() { return &producer_; }
824
QUICHE teama6ef0a62019-03-07 20:34:33 -0500825 using QuicConnection::active_effective_peer_migration_type;
826 using QuicConnection::IsCurrentPacketConnectivityProbing;
827 using QuicConnection::SelectMutualVersion;
828 using QuicConnection::SendProbingRetransmissions;
829 using QuicConnection::set_defer_send_in_response_to_packets;
830
831 protected:
832 QuicSocketAddress GetEffectivePeerAddressFromCurrentPacket() const override {
833 if (next_effective_peer_addr_) {
834 return *std::move(next_effective_peer_addr_);
835 }
836 return QuicConnection::GetEffectivePeerAddressFromCurrentPacket();
837 }
838
839 private:
840 TestPacketWriter* writer() {
841 return static_cast<TestPacketWriter*>(QuicConnection::writer());
842 }
843
844 SimpleDataProducer producer_;
845
846 SimpleSessionNotifier* notifier_;
847
848 std::unique_ptr<QuicSocketAddress> next_effective_peer_addr_;
849};
850
851enum class AckResponse { kDefer, kImmediate };
852
853// Run tests with combinations of {ParsedQuicVersion, AckResponse}.
854struct TestParams {
855 TestParams(ParsedQuicVersion version,
856 AckResponse ack_response,
857 bool no_stop_waiting)
858 : version(version),
859 ack_response(ack_response),
860 no_stop_waiting(no_stop_waiting) {}
861
862 friend std::ostream& operator<<(std::ostream& os, const TestParams& p) {
863 os << "{ client_version: " << ParsedQuicVersionToString(p.version)
864 << " ack_response: "
865 << (p.ack_response == AckResponse::kDefer ? "defer" : "immediate")
866 << " no_stop_waiting: " << p.no_stop_waiting << " }";
867 return os;
868 }
869
870 ParsedQuicVersion version;
871 AckResponse ack_response;
872 bool no_stop_waiting;
873};
874
875// Constructs various test permutations.
876std::vector<TestParams> GetTestParams() {
877 QuicFlagSaver flags;
wub49855982019-05-01 14:16:26 -0700878 SetQuicFlag(FLAGS_quic_supports_tls_handshake, true);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500879 std::vector<TestParams> params;
880 ParsedQuicVersionVector all_supported_versions = AllSupportedVersions();
881 for (size_t i = 0; i < all_supported_versions.size(); ++i) {
882 for (AckResponse ack_response :
883 {AckResponse::kDefer, AckResponse::kImmediate}) {
884 for (bool no_stop_waiting : {true, false}) {
885 // After version 43, never use STOP_WAITING.
fayang03916692019-05-22 17:57:18 -0700886 params.push_back(TestParams(
887 all_supported_versions[i], ack_response,
888 all_supported_versions[i].transport_version <= QUIC_VERSION_43
889 ? no_stop_waiting
890 : true));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500891 }
892 }
893 }
894 return params;
895}
896
897class QuicConnectionTest : public QuicTestWithParam<TestParams> {
898 protected:
899 QuicConnectionTest()
900 : connection_id_(TestConnectionId()),
901 framer_(SupportedVersions(version()),
902 QuicTime::Zero(),
903 Perspective::IS_CLIENT,
904 connection_id_.length()),
905 send_algorithm_(new StrictMock<MockSendAlgorithm>),
906 loss_algorithm_(new MockLossAlgorithm()),
907 helper_(new TestConnectionHelper(&clock_, &random_generator_)),
908 alarm_factory_(new TestAlarmFactory()),
909 peer_framer_(SupportedVersions(version()),
910 QuicTime::Zero(),
911 Perspective::IS_SERVER,
912 connection_id_.length()),
913 peer_creator_(connection_id_,
914 &peer_framer_,
915 /*delegate=*/nullptr),
916 writer_(new TestPacketWriter(version(), &clock_)),
917 connection_(connection_id_,
918 kPeerAddress,
919 helper_.get(),
920 alarm_factory_.get(),
921 writer_.get(),
922 Perspective::IS_CLIENT,
923 version()),
924 creator_(QuicConnectionPeer::GetPacketCreator(&connection_)),
925 generator_(QuicConnectionPeer::GetPacketGenerator(&connection_)),
926 manager_(QuicConnectionPeer::GetSentPacketManager(&connection_)),
nharper46833c32019-05-15 21:33:05 -0700927 frame1_(0, false, 0, QuicStringPiece(data1)),
928 frame2_(0, false, 3, QuicStringPiece(data2)),
929 crypto_frame_(ENCRYPTION_INITIAL, 0, QuicStringPiece(data1)),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500930 packet_number_length_(PACKET_4BYTE_PACKET_NUMBER),
931 connection_id_included_(CONNECTION_ID_PRESENT),
932 notifier_(&connection_) {
wub49855982019-05-01 14:16:26 -0700933 SetQuicFlag(FLAGS_quic_supports_tls_handshake, true);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500934 connection_.set_defer_send_in_response_to_packets(GetParam().ack_response ==
935 AckResponse::kDefer);
nharper2c9f02a2019-05-08 10:25:50 -0700936 for (EncryptionLevel level :
937 {ENCRYPTION_ZERO_RTT, ENCRYPTION_FORWARD_SECURE}) {
938 peer_creator_.SetEncrypter(
939 level, QuicMakeUnique<NullEncrypter>(peer_framer_.perspective()));
940 }
dschinazi6ece5002019-05-22 06:35:49 -0700941 if (version().handshake_protocol == PROTOCOL_TLS1_3) {
942 connection_.SetEncrypter(
943 ENCRYPTION_INITIAL,
944 QuicMakeUnique<NullEncrypter>(Perspective::IS_CLIENT));
945 connection_.InstallDecrypter(
946 ENCRYPTION_INITIAL,
947 QuicMakeUnique<NullDecrypter>(Perspective::IS_CLIENT));
948 }
dschinazi7b9278c2019-05-20 07:36:21 -0700949 QuicFramerPeer::SetLastSerializedServerConnectionId(
QUICHE teama6ef0a62019-03-07 20:34:33 -0500950 QuicConnectionPeer::GetFramer(&connection_), connection_id_);
951 if (version().transport_version > QUIC_VERSION_43) {
952 EXPECT_TRUE(QuicConnectionPeer::GetNoStopWaitingFrames(&connection_));
953 } else {
954 QuicConnectionPeer::SetNoStopWaitingFrames(&connection_,
955 GetParam().no_stop_waiting);
956 }
nharper46833c32019-05-15 21:33:05 -0700957 QuicStreamId stream_id;
958 if (QuicVersionUsesCryptoFrames(version().transport_version)) {
959 stream_id = QuicUtils::GetFirstBidirectionalStreamId(
960 version().transport_version, Perspective::IS_CLIENT);
961 } else {
962 stream_id = QuicUtils::GetCryptoStreamId(version().transport_version);
963 }
964 frame1_.stream_id = stream_id;
965 frame2_.stream_id = stream_id;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500966 connection_.set_visitor(&visitor_);
967 if (connection_.session_decides_what_to_write()) {
968 connection_.SetSessionNotifier(&notifier_);
969 connection_.set_notifier(&notifier_);
970 }
971 connection_.SetSendAlgorithm(send_algorithm_);
972 connection_.SetLossAlgorithm(loss_algorithm_.get());
973 EXPECT_CALL(*send_algorithm_, CanSend(_)).WillRepeatedly(Return(true));
974 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
975 .Times(AnyNumber());
976 EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
977 .WillRepeatedly(Return(kDefaultTCPMSS));
978 EXPECT_CALL(*send_algorithm_, PacingRate(_))
979 .WillRepeatedly(Return(QuicBandwidth::Zero()));
980 EXPECT_CALL(*send_algorithm_, HasReliableBandwidthEstimate())
981 .Times(AnyNumber());
982 EXPECT_CALL(*send_algorithm_, BandwidthEstimate())
983 .Times(AnyNumber())
984 .WillRepeatedly(Return(QuicBandwidth::Zero()));
985 EXPECT_CALL(*send_algorithm_, InSlowStart()).Times(AnyNumber());
986 EXPECT_CALL(*send_algorithm_, InRecovery()).Times(AnyNumber());
987 EXPECT_CALL(*send_algorithm_, OnApplicationLimited(_)).Times(AnyNumber());
988 EXPECT_CALL(visitor_, WillingAndAbleToWrite()).Times(AnyNumber());
989 EXPECT_CALL(visitor_, HasPendingHandshake()).Times(AnyNumber());
990 if (connection_.session_decides_what_to_write()) {
991 EXPECT_CALL(visitor_, OnCanWrite())
992 .WillRepeatedly(
993 Invoke(&notifier_, &SimpleSessionNotifier::OnCanWrite));
994 } else {
995 EXPECT_CALL(visitor_, OnCanWrite()).Times(AnyNumber());
996 }
997 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
998 .WillRepeatedly(Return(false));
999 EXPECT_CALL(visitor_, OnCongestionWindowChange(_)).Times(AnyNumber());
1000 EXPECT_CALL(visitor_, OnConnectivityProbeReceived(_, _)).Times(AnyNumber());
1001 EXPECT_CALL(visitor_, OnForwardProgressConfirmed()).Times(AnyNumber());
1002
1003 EXPECT_CALL(*loss_algorithm_, GetLossTimeout())
1004 .WillRepeatedly(Return(QuicTime::Zero()));
1005 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
1006 .Times(AnyNumber());
zhongyi546cc452019-04-12 15:27:49 -07001007
1008 if (connection_.version().KnowsWhichDecrypterToUse()) {
1009 connection_.InstallDecrypter(
1010 ENCRYPTION_FORWARD_SECURE,
1011 QuicMakeUnique<NullDecrypter>(Perspective::IS_CLIENT));
1012 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001013 }
1014
1015 QuicConnectionTest(const QuicConnectionTest&) = delete;
1016 QuicConnectionTest& operator=(const QuicConnectionTest&) = delete;
1017
1018 ParsedQuicVersion version() { return GetParam().version; }
1019
1020 QuicAckFrame* outgoing_ack() {
1021 QuicFrame ack_frame = QuicConnectionPeer::GetUpdatedAckFrame(&connection_);
1022 ack_ = *ack_frame.ack_frame;
1023 return &ack_;
1024 }
1025
1026 QuicStopWaitingFrame* stop_waiting() {
1027 QuicConnectionPeer::PopulateStopWaitingFrame(&connection_, &stop_waiting_);
1028 return &stop_waiting_;
1029 }
1030
1031 QuicPacketNumber least_unacked() {
1032 if (writer_->stop_waiting_frames().empty()) {
1033 return QuicPacketNumber();
1034 }
1035 return writer_->stop_waiting_frames()[0].least_unacked;
1036 }
1037
1038 void use_tagging_decrypter() { writer_->use_tagging_decrypter(); }
1039
zhongyi546cc452019-04-12 15:27:49 -07001040 void SetDecrypter(EncryptionLevel level,
1041 std::unique_ptr<QuicDecrypter> decrypter) {
1042 if (connection_.version().KnowsWhichDecrypterToUse()) {
1043 connection_.InstallDecrypter(level, std::move(decrypter));
1044 connection_.RemoveDecrypter(ENCRYPTION_INITIAL);
1045 } else {
1046 connection_.SetDecrypter(level, std::move(decrypter));
1047 }
1048 }
1049
QUICHE teama6ef0a62019-03-07 20:34:33 -05001050 void ProcessPacket(uint64_t number) {
1051 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
1052 ProcessDataPacket(number);
1053 if (connection_.GetSendAlarm()->IsSet()) {
1054 connection_.GetSendAlarm()->Fire();
1055 }
1056 }
1057
1058 void ProcessReceivedPacket(const QuicSocketAddress& self_address,
1059 const QuicSocketAddress& peer_address,
1060 const QuicReceivedPacket& packet) {
1061 connection_.ProcessUdpPacket(self_address, peer_address, packet);
1062 if (connection_.GetSendAlarm()->IsSet()) {
1063 connection_.GetSendAlarm()->Fire();
1064 }
1065 }
1066
1067 void ProcessFramePacket(QuicFrame frame) {
1068 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
1069 }
1070
1071 void ProcessFramePacketWithAddresses(QuicFrame frame,
1072 QuicSocketAddress self_address,
1073 QuicSocketAddress peer_address) {
1074 QuicFrames frames;
1075 frames.push_back(QuicFrame(frame));
1076 QuicPacketCreatorPeer::SetSendVersionInPacket(
1077 &peer_creator_, connection_.perspective() == Perspective::IS_SERVER);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001078
dschinazi66dea072019-04-09 11:41:06 -07001079 char buffer[kMaxOutgoingPacketSize];
QUICHE teama6ef0a62019-03-07 20:34:33 -05001080 SerializedPacket serialized_packet =
dschinazi66dea072019-04-09 11:41:06 -07001081 QuicPacketCreatorPeer::SerializeAllFrames(
1082 &peer_creator_, frames, buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001083 connection_.ProcessUdpPacket(
1084 self_address, peer_address,
1085 QuicReceivedPacket(serialized_packet.encrypted_buffer,
1086 serialized_packet.encrypted_length, clock_.Now()));
1087 if (connection_.GetSendAlarm()->IsSet()) {
1088 connection_.GetSendAlarm()->Fire();
1089 }
1090 }
1091
1092 // Bypassing the packet creator is unrealistic, but allows us to process
1093 // packets the QuicPacketCreator won't allow us to create.
1094 void ForceProcessFramePacket(QuicFrame frame) {
1095 QuicFrames frames;
1096 frames.push_back(QuicFrame(frame));
zhongyi546cc452019-04-12 15:27:49 -07001097 bool send_version = connection_.perspective() == Perspective::IS_SERVER;
1098 if (connection_.version().KnowsWhichDecrypterToUse()) {
1099 send_version = true;
1100 }
1101 QuicPacketCreatorPeer::SetSendVersionInPacket(&peer_creator_, send_version);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001102 QuicPacketHeader header;
1103 QuicPacketCreatorPeer::FillPacketHeader(&peer_creator_, &header);
dschinazi66dea072019-04-09 11:41:06 -07001104 char encrypted_buffer[kMaxOutgoingPacketSize];
QUICHE teama6ef0a62019-03-07 20:34:33 -05001105 size_t length = peer_framer_.BuildDataPacket(
dschinazi66dea072019-04-09 11:41:06 -07001106 header, frames, encrypted_buffer, kMaxOutgoingPacketSize,
1107 ENCRYPTION_INITIAL);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001108 DCHECK_GT(length, 0u);
1109
1110 const size_t encrypted_length = peer_framer_.EncryptInPlace(
QUICHE team6987b4a2019-03-15 16:23:04 -07001111 ENCRYPTION_INITIAL, header.packet_number,
QUICHE teama6ef0a62019-03-07 20:34:33 -05001112 GetStartOfEncryptedData(peer_framer_.version().transport_version,
1113 header),
dschinazi66dea072019-04-09 11:41:06 -07001114 length, kMaxOutgoingPacketSize, encrypted_buffer);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001115 DCHECK_GT(encrypted_length, 0u);
1116
1117 connection_.ProcessUdpPacket(
1118 kSelfAddress, kPeerAddress,
1119 QuicReceivedPacket(encrypted_buffer, encrypted_length, clock_.Now()));
1120 }
1121
1122 size_t ProcessFramePacketAtLevel(uint64_t number,
1123 QuicFrame frame,
1124 EncryptionLevel level) {
1125 QuicPacketHeader header;
1126 header.destination_connection_id = connection_id_;
1127 header.packet_number_length = packet_number_length_;
1128 header.destination_connection_id_included = connection_id_included_;
QUICHE team2252b702019-05-14 23:55:14 -04001129 if ((peer_framer_.transport_version() > QUIC_VERSION_43 ||
1130 GetQuicRestartFlag(quic_do_not_override_connection_id)) &&
QUICHE teama6ef0a62019-03-07 20:34:33 -05001131 peer_framer_.perspective() == Perspective::IS_SERVER) {
1132 header.destination_connection_id_included = CONNECTION_ID_ABSENT;
1133 }
zhongyi546cc452019-04-12 15:27:49 -07001134 if (level == ENCRYPTION_INITIAL &&
1135 peer_framer_.version().KnowsWhichDecrypterToUse()) {
1136 header.version_flag = true;
1137 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
1138 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
QUICHE team2252b702019-05-14 23:55:14 -04001139 }
1140 if ((GetQuicRestartFlag(quic_do_not_override_connection_id) ||
1141 (level == ENCRYPTION_INITIAL &&
1142 peer_framer_.version().KnowsWhichDecrypterToUse())) &&
1143 header.version_flag &&
1144 peer_framer_.perspective() == Perspective::IS_SERVER) {
1145 header.source_connection_id = connection_id_;
1146 header.source_connection_id_included = CONNECTION_ID_PRESENT;
zhongyi546cc452019-04-12 15:27:49 -07001147 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001148 header.packet_number = QuicPacketNumber(number);
1149 QuicFrames frames;
1150 frames.push_back(frame);
1151 std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
QUICHE teamcd098022019-03-22 18:49:55 -07001152 // Set the correct encryption level and encrypter on peer_creator and
1153 // peer_framer, respectively.
1154 peer_creator_.set_encryption_level(level);
1155 if (QuicPacketCreatorPeer::GetEncryptionLevel(&peer_creator_) >
1156 ENCRYPTION_INITIAL) {
1157 peer_framer_.SetEncrypter(
1158 QuicPacketCreatorPeer::GetEncryptionLevel(&peer_creator_),
1159 QuicMakeUnique<TaggingEncrypter>(0x01));
1160 // Set the corresponding decrypter.
zhongyi546cc452019-04-12 15:27:49 -07001161 if (connection_.version().KnowsWhichDecrypterToUse()) {
1162 connection_.InstallDecrypter(
1163 QuicPacketCreatorPeer::GetEncryptionLevel(&peer_creator_),
1164 QuicMakeUnique<StrictTaggingDecrypter>(0x01));
1165 connection_.RemoveDecrypter(ENCRYPTION_INITIAL);
1166 } else {
1167 connection_.SetDecrypter(
1168 QuicPacketCreatorPeer::GetEncryptionLevel(&peer_creator_),
1169 QuicMakeUnique<StrictTaggingDecrypter>(0x01));
1170 }
QUICHE teamcd098022019-03-22 18:49:55 -07001171 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001172
dschinazi66dea072019-04-09 11:41:06 -07001173 char buffer[kMaxOutgoingPacketSize];
1174 size_t encrypted_length =
1175 peer_framer_.EncryptPayload(level, QuicPacketNumber(number), *packet,
1176 buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001177 connection_.ProcessUdpPacket(
1178 kSelfAddress, kPeerAddress,
QUICHE teamcd098022019-03-22 18:49:55 -07001179 QuicReceivedPacket(buffer, encrypted_length, clock_.Now(), false));
1180 if (connection_.GetSendAlarm()->IsSet()) {
1181 connection_.GetSendAlarm()->Fire();
1182 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001183 return encrypted_length;
1184 }
1185
1186 size_t ProcessDataPacket(uint64_t number) {
nharper2c9f02a2019-05-08 10:25:50 -07001187 return ProcessDataPacketAtLevel(number, false, ENCRYPTION_FORWARD_SECURE);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001188 }
1189
1190 size_t ProcessDataPacket(QuicPacketNumber packet_number) {
nharper2c9f02a2019-05-08 10:25:50 -07001191 return ProcessDataPacketAtLevel(packet_number, false,
1192 ENCRYPTION_FORWARD_SECURE);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001193 }
1194
1195 size_t ProcessDataPacketAtLevel(QuicPacketNumber packet_number,
1196 bool has_stop_waiting,
1197 EncryptionLevel level) {
1198 return ProcessDataPacketAtLevel(packet_number.ToUint64(), has_stop_waiting,
1199 level);
1200 }
1201
nharper46833c32019-05-15 21:33:05 -07001202 size_t ProcessCryptoPacketAtLevel(uint64_t number, EncryptionLevel level) {
1203 QuicPacketHeader header = ConstructPacketHeader(1000, ENCRYPTION_INITIAL);
1204 QuicFrames frames;
1205 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1206 frames.push_back(QuicFrame(&crypto_frame_));
1207 } else {
1208 frames.push_back(QuicFrame(frame1_));
1209 }
1210 std::unique_ptr<QuicPacket> packet = ConstructPacket(header, frames);
1211 char buffer[kMaxOutgoingPacketSize];
1212 peer_creator_.set_encryption_level(ENCRYPTION_INITIAL);
1213 size_t encrypted_length =
1214 peer_framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(1000),
1215 *packet, buffer, kMaxOutgoingPacketSize);
1216 connection_.ProcessUdpPacket(
1217 kSelfAddress, kPeerAddress,
1218 QuicReceivedPacket(buffer, encrypted_length, clock_.Now(), false));
1219 if (connection_.GetSendAlarm()->IsSet()) {
1220 connection_.GetSendAlarm()->Fire();
1221 }
1222 return encrypted_length;
1223 }
1224
QUICHE teama6ef0a62019-03-07 20:34:33 -05001225 size_t ProcessDataPacketAtLevel(uint64_t number,
1226 bool has_stop_waiting,
1227 EncryptionLevel level) {
1228 std::unique_ptr<QuicPacket> packet(
QUICHE team8c1daa22019-03-13 08:33:41 -07001229 ConstructDataPacket(number, has_stop_waiting, level));
dschinazi66dea072019-04-09 11:41:06 -07001230 char buffer[kMaxOutgoingPacketSize];
QUICHE teamcd098022019-03-22 18:49:55 -07001231 peer_creator_.set_encryption_level(level);
dschinazi66dea072019-04-09 11:41:06 -07001232 size_t encrypted_length =
1233 peer_framer_.EncryptPayload(level, QuicPacketNumber(number), *packet,
1234 buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001235 connection_.ProcessUdpPacket(
1236 kSelfAddress, kPeerAddress,
1237 QuicReceivedPacket(buffer, encrypted_length, clock_.Now(), false));
1238 if (connection_.GetSendAlarm()->IsSet()) {
1239 connection_.GetSendAlarm()->Fire();
1240 }
1241 return encrypted_length;
1242 }
1243
1244 void ProcessClosePacket(uint64_t number) {
1245 std::unique_ptr<QuicPacket> packet(ConstructClosePacket(number));
dschinazi66dea072019-04-09 11:41:06 -07001246 char buffer[kMaxOutgoingPacketSize];
QUICHE team6987b4a2019-03-15 16:23:04 -07001247 size_t encrypted_length = peer_framer_.EncryptPayload(
1248 ENCRYPTION_INITIAL, QuicPacketNumber(number), *packet, buffer,
dschinazi66dea072019-04-09 11:41:06 -07001249 kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001250 connection_.ProcessUdpPacket(
1251 kSelfAddress, kPeerAddress,
1252 QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
1253 }
1254
1255 QuicByteCount SendStreamDataToPeer(QuicStreamId id,
1256 QuicStringPiece data,
1257 QuicStreamOffset offset,
1258 StreamSendingState state,
1259 QuicPacketNumber* last_packet) {
1260 QuicByteCount packet_size;
1261 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
1262 .WillOnce(SaveArg<3>(&packet_size));
1263 connection_.SendStreamDataWithString(id, data, offset, state);
1264 if (last_packet != nullptr) {
1265 *last_packet = creator_->packet_number();
1266 }
1267 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
1268 .Times(AnyNumber());
1269 return packet_size;
1270 }
1271
1272 void SendAckPacketToPeer() {
1273 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
1274 {
1275 QuicConnection::ScopedPacketFlusher flusher(&connection_,
1276 QuicConnection::NO_ACK);
1277 connection_.SendAck();
1278 }
1279 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
1280 .Times(AnyNumber());
1281 }
1282
1283 void SendRstStream(QuicStreamId id,
1284 QuicRstStreamErrorCode error,
1285 QuicStreamOffset bytes_written) {
1286 if (connection_.session_decides_what_to_write()) {
1287 notifier_.WriteOrBufferRstStream(id, error, bytes_written);
1288 connection_.OnStreamReset(id, error);
1289 return;
1290 }
1291 std::unique_ptr<QuicRstStreamFrame> rst_stream =
1292 QuicMakeUnique<QuicRstStreamFrame>(1, id, error, bytes_written);
1293 if (connection_.SendControlFrame(QuicFrame(rst_stream.get()))) {
1294 rst_stream.release();
1295 }
1296 connection_.OnStreamReset(id, error);
1297 }
1298
zhongyifbb25772019-04-10 16:54:08 -07001299 void SendPing() {
1300 if (connection_.session_decides_what_to_write()) {
1301 notifier_.WriteOrBufferPing();
1302 } else {
1303 connection_.SendControlFrame(QuicFrame(QuicPingFrame(1)));
1304 }
1305 }
1306
QUICHE teama6ef0a62019-03-07 20:34:33 -05001307 void ProcessAckPacket(uint64_t packet_number, QuicAckFrame* frame) {
1308 if (packet_number > 1) {
1309 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, packet_number - 1);
1310 } else {
1311 QuicPacketCreatorPeer::ClearPacketNumber(&peer_creator_);
1312 }
1313 ProcessFramePacket(QuicFrame(frame));
1314 }
1315
1316 void ProcessAckPacket(QuicAckFrame* frame) {
1317 ProcessFramePacket(QuicFrame(frame));
1318 }
1319
1320 void ProcessStopWaitingPacket(QuicStopWaitingFrame frame) {
1321 ProcessFramePacket(QuicFrame(frame));
1322 }
1323
1324 size_t ProcessStopWaitingPacketAtLevel(uint64_t number,
1325 QuicStopWaitingFrame frame,
1326 EncryptionLevel level) {
1327 return ProcessFramePacketAtLevel(number, QuicFrame(frame),
1328 ENCRYPTION_ZERO_RTT);
1329 }
1330
1331 void ProcessGoAwayPacket(QuicGoAwayFrame* frame) {
1332 ProcessFramePacket(QuicFrame(frame));
1333 }
1334
1335 bool IsMissing(uint64_t number) {
1336 return IsAwaitingPacket(*outgoing_ack(), QuicPacketNumber(number),
1337 QuicPacketNumber());
1338 }
1339
1340 std::unique_ptr<QuicPacket> ConstructPacket(const QuicPacketHeader& header,
1341 const QuicFrames& frames) {
1342 auto packet = BuildUnsizedDataPacket(&peer_framer_, header, frames);
1343 EXPECT_NE(nullptr, packet.get());
1344 return packet;
1345 }
1346
nharper46833c32019-05-15 21:33:05 -07001347 QuicPacketHeader ConstructPacketHeader(uint64_t number,
1348 EncryptionLevel level) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001349 QuicPacketHeader header;
QUICHE team8c1daa22019-03-13 08:33:41 -07001350 if (peer_framer_.transport_version() > QUIC_VERSION_43 &&
1351 level < ENCRYPTION_FORWARD_SECURE) {
1352 // Set long header type accordingly.
1353 header.version_flag = true;
1354 header.long_packet_type = EncryptionlevelToLongHeaderType(level);
1355 if (QuicVersionHasLongHeaderLengths(
1356 peer_framer_.version().transport_version)) {
1357 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
1358 if (header.long_packet_type == INITIAL) {
1359 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
1360 }
1361 }
1362 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001363 // Set connection_id to peer's in memory representation as this data packet
1364 // is created by peer_framer.
QUICHE team2252b702019-05-14 23:55:14 -04001365 if (GetQuicRestartFlag(quic_do_not_override_connection_id) &&
1366 peer_framer_.perspective() == Perspective::IS_SERVER) {
1367 header.source_connection_id = connection_id_;
1368 header.source_connection_id_included = connection_id_included_;
1369 header.destination_connection_id_included = CONNECTION_ID_ABSENT;
1370 } else {
1371 header.destination_connection_id = connection_id_;
1372 header.destination_connection_id_included = connection_id_included_;
1373 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001374 if (peer_framer_.transport_version() > QUIC_VERSION_43 &&
1375 peer_framer_.perspective() == Perspective::IS_SERVER) {
1376 header.destination_connection_id_included = CONNECTION_ID_ABSENT;
QUICHE team8c1daa22019-03-13 08:33:41 -07001377 if (header.version_flag) {
1378 header.source_connection_id = connection_id_;
1379 header.source_connection_id_included = CONNECTION_ID_PRESENT;
1380 if (GetParam().version.handshake_protocol == PROTOCOL_QUIC_CRYPTO &&
1381 header.long_packet_type == ZERO_RTT_PROTECTED) {
QUICHE team548d51b2019-03-14 10:06:54 -07001382 header.nonce = &kTestDiversificationNonce;
QUICHE team8c1daa22019-03-13 08:33:41 -07001383 }
1384 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001385 }
QUICHE team2252b702019-05-14 23:55:14 -04001386 header.packet_number_length = packet_number_length_;
QUICHE teama6ef0a62019-03-07 20:34:33 -05001387 header.packet_number = QuicPacketNumber(number);
nharper46833c32019-05-15 21:33:05 -07001388 return header;
1389 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001390
nharper46833c32019-05-15 21:33:05 -07001391 std::unique_ptr<QuicPacket> ConstructDataPacket(uint64_t number,
1392 bool has_stop_waiting,
1393 EncryptionLevel level) {
1394 QuicPacketHeader header = ConstructPacketHeader(number, level);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001395 QuicFrames frames;
1396 frames.push_back(QuicFrame(frame1_));
1397 if (has_stop_waiting) {
1398 frames.push_back(QuicFrame(stop_waiting_));
1399 }
1400 return ConstructPacket(header, frames);
1401 }
1402
1403 OwningSerializedPacketPointer ConstructProbingPacket() {
1404 if (version().transport_version == QUIC_VERSION_99) {
1405 QuicPathFrameBuffer payload = {
1406 {0xde, 0xad, 0xbe, 0xef, 0xba, 0xdc, 0x0f, 0xfe}};
1407 return QuicPacketCreatorPeer::
1408 SerializePathChallengeConnectivityProbingPacket(&peer_creator_,
1409 &payload);
1410 }
1411 return QuicPacketCreatorPeer::SerializeConnectivityProbingPacket(
1412 &peer_creator_);
1413 }
1414
1415 std::unique_ptr<QuicPacket> ConstructClosePacket(uint64_t number) {
1416 QuicPacketHeader header;
1417 // Set connection_id to peer's in memory representation as this connection
1418 // close packet is created by peer_framer.
QUICHE team2252b702019-05-14 23:55:14 -04001419 if (GetQuicRestartFlag(quic_do_not_override_connection_id) &&
QUICHE teama6ef0a62019-03-07 20:34:33 -05001420 peer_framer_.perspective() == Perspective::IS_SERVER) {
QUICHE team2252b702019-05-14 23:55:14 -04001421 header.source_connection_id = connection_id_;
QUICHE teama6ef0a62019-03-07 20:34:33 -05001422 header.destination_connection_id_included = CONNECTION_ID_ABSENT;
QUICHE team2252b702019-05-14 23:55:14 -04001423 if (peer_framer_.transport_version() <= QUIC_VERSION_43) {
1424 header.source_connection_id_included = CONNECTION_ID_PRESENT;
1425 }
1426 } else {
1427 header.destination_connection_id = connection_id_;
1428 if (peer_framer_.transport_version() > QUIC_VERSION_43) {
1429 header.destination_connection_id_included = CONNECTION_ID_ABSENT;
1430 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001431 }
1432
QUICHE team2252b702019-05-14 23:55:14 -04001433 header.packet_number = QuicPacketNumber(number);
1434
fkastenholze9d71a82019-04-09 05:12:13 -07001435 QuicConnectionCloseFrame qccf(QUIC_PEER_GOING_AWAY);
fkastenholz72f509b2019-04-10 09:17:49 -07001436 if (peer_framer_.transport_version() == QUIC_VERSION_99) {
fkastenholz04bd4f32019-04-16 12:24:38 -07001437 // Default close-type is Google QUIC. If doing IETF/V99 then
1438 // set close type to be IETF CC/T.
fkastenholz72f509b2019-04-10 09:17:49 -07001439 qccf.close_type = IETF_QUIC_TRANSPORT_CONNECTION_CLOSE;
1440 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001441
1442 QuicFrames frames;
1443 frames.push_back(QuicFrame(&qccf));
1444 return ConstructPacket(header, frames);
1445 }
1446
1447 QuicTime::Delta DefaultRetransmissionTime() {
1448 return QuicTime::Delta::FromMilliseconds(kDefaultRetransmissionTimeMs);
1449 }
1450
1451 QuicTime::Delta DefaultDelayedAckTime() {
1452 return QuicTime::Delta::FromMilliseconds(kDefaultDelayedAckTimeMs);
1453 }
1454
1455 const QuicStopWaitingFrame InitStopWaitingFrame(uint64_t least_unacked) {
1456 QuicStopWaitingFrame frame;
1457 frame.least_unacked = QuicPacketNumber(least_unacked);
1458 return frame;
1459 }
1460
1461 // Construct a ack_frame that acks all packet numbers between 1 and
1462 // |largest_acked|, except |missing|.
1463 // REQUIRES: 1 <= |missing| < |largest_acked|
1464 QuicAckFrame ConstructAckFrame(uint64_t largest_acked, uint64_t missing) {
1465 return ConstructAckFrame(QuicPacketNumber(largest_acked),
1466 QuicPacketNumber(missing));
1467 }
1468
1469 QuicAckFrame ConstructAckFrame(QuicPacketNumber largest_acked,
1470 QuicPacketNumber missing) {
1471 if (missing == QuicPacketNumber(1)) {
1472 return InitAckFrame({{missing + 1, largest_acked + 1}});
1473 }
1474 return InitAckFrame(
1475 {{QuicPacketNumber(1), missing}, {missing + 1, largest_acked + 1}});
1476 }
1477
1478 // Undo nacking a packet within the frame.
1479 void AckPacket(QuicPacketNumber arrived, QuicAckFrame* frame) {
1480 EXPECT_FALSE(frame->packets.Contains(arrived));
1481 frame->packets.Add(arrived);
1482 }
1483
1484 void TriggerConnectionClose() {
1485 // Send an erroneous packet to close the connection.
QUICHE teamcd098022019-03-22 18:49:55 -07001486 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_ACK_DATA, _,
QUICHE teama6ef0a62019-03-07 20:34:33 -05001487 ConnectionCloseSource::FROM_SELF));
QUICHE teamcd098022019-03-22 18:49:55 -07001488 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1489 // Triggers a connection by receiving ACK of unsent packet.
1490 QuicAckFrame frame = InitAckFrame(10000);
1491 ProcessAckPacket(1, &frame);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001492
1493 EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
1494 nullptr);
1495 }
1496
1497 void BlockOnNextWrite() {
1498 writer_->BlockOnNextWrite();
1499 EXPECT_CALL(visitor_, OnWriteBlocked()).Times(AtLeast(1));
1500 }
1501
1502 void SimulateNextPacketTooLarge() { writer_->SimulateNextPacketTooLarge(); }
1503
1504 void AlwaysGetPacketTooLarge() { writer_->AlwaysGetPacketTooLarge(); }
1505
1506 void SetWritePauseTimeDelta(QuicTime::Delta delta) {
1507 writer_->SetWritePauseTimeDelta(delta);
1508 }
1509
1510 void CongestionBlockWrites() {
1511 EXPECT_CALL(*send_algorithm_, CanSend(_))
1512 .WillRepeatedly(testing::Return(false));
1513 }
1514
1515 void CongestionUnblockWrites() {
1516 EXPECT_CALL(*send_algorithm_, CanSend(_))
1517 .WillRepeatedly(testing::Return(true));
1518 }
1519
1520 void set_perspective(Perspective perspective) {
1521 connection_.set_perspective(perspective);
1522 if (perspective == Perspective::IS_SERVER) {
1523 connection_.set_can_truncate_connection_ids(true);
1524 }
1525 QuicFramerPeer::SetPerspective(&peer_framer_,
1526 InvertPerspective(perspective));
1527 }
1528
1529 void set_packets_between_probes_base(
1530 const QuicPacketCount packets_between_probes_base) {
1531 QuicConnectionPeer::SetPacketsBetweenMtuProbes(&connection_,
1532 packets_between_probes_base);
1533 QuicConnectionPeer::SetNextMtuProbeAt(
1534 &connection_, QuicPacketNumber(packets_between_probes_base));
1535 }
1536
1537 bool IsDefaultTestConfiguration() {
1538 TestParams p = GetParam();
1539 return p.ack_response == AckResponse::kImmediate &&
1540 p.version == AllSupportedVersions()[0] && p.no_stop_waiting;
1541 }
1542
1543 QuicConnectionId connection_id_;
1544 QuicFramer framer_;
1545
1546 MockSendAlgorithm* send_algorithm_;
1547 std::unique_ptr<MockLossAlgorithm> loss_algorithm_;
1548 MockClock clock_;
1549 MockRandom random_generator_;
1550 SimpleBufferAllocator buffer_allocator_;
1551 std::unique_ptr<TestConnectionHelper> helper_;
1552 std::unique_ptr<TestAlarmFactory> alarm_factory_;
1553 QuicFramer peer_framer_;
1554 QuicPacketCreator peer_creator_;
1555 std::unique_ptr<TestPacketWriter> writer_;
1556 TestConnection connection_;
1557 QuicPacketCreator* creator_;
1558 QuicPacketGenerator* generator_;
1559 QuicSentPacketManager* manager_;
1560 StrictMock<MockQuicConnectionVisitor> visitor_;
1561
1562 QuicStreamFrame frame1_;
1563 QuicStreamFrame frame2_;
nharper46833c32019-05-15 21:33:05 -07001564 QuicCryptoFrame crypto_frame_;
QUICHE teama6ef0a62019-03-07 20:34:33 -05001565 QuicAckFrame ack_;
1566 QuicStopWaitingFrame stop_waiting_;
1567 QuicPacketNumberLength packet_number_length_;
1568 QuicConnectionIdIncluded connection_id_included_;
1569
1570 SimpleSessionNotifier notifier_;
1571};
1572
1573// Run all end to end tests with all supported versions.
1574INSTANTIATE_TEST_SUITE_P(SupportedVersion,
1575 QuicConnectionTest,
1576 ::testing::ValuesIn(GetTestParams()));
1577
1578TEST_P(QuicConnectionTest, SelfAddressChangeAtClient) {
1579 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1580
1581 EXPECT_EQ(Perspective::IS_CLIENT, connection_.perspective());
1582 EXPECT_TRUE(connection_.connected());
1583
nharper46833c32019-05-15 21:33:05 -07001584 QuicFrame frame;
1585 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1586 frame = QuicFrame(&crypto_frame_);
1587 EXPECT_CALL(visitor_, OnCryptoFrame(_));
1588 } else {
1589 frame = QuicFrame(QuicStreamFrame(
1590 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
1591 0u, QuicStringPiece()));
1592 EXPECT_CALL(visitor_, OnStreamFrame(_));
1593 }
1594 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001595 // Cause change in self_address.
1596 QuicIpAddress host;
1597 host.FromString("1.1.1.1");
1598 QuicSocketAddress self_address(host, 123);
nharper46833c32019-05-15 21:33:05 -07001599 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1600 EXPECT_CALL(visitor_, OnCryptoFrame(_));
1601 } else {
1602 EXPECT_CALL(visitor_, OnStreamFrame(_));
1603 }
1604 ProcessFramePacketWithAddresses(frame, self_address, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001605 EXPECT_TRUE(connection_.connected());
1606}
1607
1608TEST_P(QuicConnectionTest, SelfAddressChangeAtServer) {
1609 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1610
1611 set_perspective(Perspective::IS_SERVER);
1612 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
1613
1614 EXPECT_EQ(Perspective::IS_SERVER, connection_.perspective());
1615 EXPECT_TRUE(connection_.connected());
1616
nharper46833c32019-05-15 21:33:05 -07001617 QuicFrame frame;
1618 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1619 frame = QuicFrame(&crypto_frame_);
1620 EXPECT_CALL(visitor_, OnCryptoFrame(_));
1621 } else {
1622 frame = QuicFrame(QuicStreamFrame(
1623 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
1624 0u, QuicStringPiece()));
1625 EXPECT_CALL(visitor_, OnStreamFrame(_));
1626 }
1627 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001628 // Cause change in self_address.
1629 QuicIpAddress host;
1630 host.FromString("1.1.1.1");
1631 QuicSocketAddress self_address(host, 123);
1632 EXPECT_CALL(visitor_, AllowSelfAddressChange()).WillOnce(Return(false));
1633 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_ERROR_MIGRATING_ADDRESS, _, _));
nharper46833c32019-05-15 21:33:05 -07001634 ProcessFramePacketWithAddresses(frame, self_address, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001635 EXPECT_FALSE(connection_.connected());
1636}
1637
1638TEST_P(QuicConnectionTest, AllowSelfAddressChangeToMappedIpv4AddressAtServer) {
1639 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1640
1641 set_perspective(Perspective::IS_SERVER);
1642 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
1643
1644 EXPECT_EQ(Perspective::IS_SERVER, connection_.perspective());
1645 EXPECT_TRUE(connection_.connected());
1646
nharper46833c32019-05-15 21:33:05 -07001647 QuicFrame frame;
1648 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1649 frame = QuicFrame(&crypto_frame_);
1650 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(3);
1651 } else {
1652 frame = QuicFrame(QuicStreamFrame(
1653 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
1654 0u, QuicStringPiece()));
1655 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(3);
1656 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001657 QuicIpAddress host;
1658 host.FromString("1.1.1.1");
1659 QuicSocketAddress self_address1(host, 443);
nharper46833c32019-05-15 21:33:05 -07001660 ProcessFramePacketWithAddresses(frame, self_address1, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001661 // Cause self_address change to mapped Ipv4 address.
1662 QuicIpAddress host2;
1663 host2.FromString(
1664 QuicStrCat("::ffff:", connection_.self_address().host().ToString()));
1665 QuicSocketAddress self_address2(host2, connection_.self_address().port());
nharper46833c32019-05-15 21:33:05 -07001666 ProcessFramePacketWithAddresses(frame, self_address2, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001667 EXPECT_TRUE(connection_.connected());
1668 // self_address change back to Ipv4 address.
nharper46833c32019-05-15 21:33:05 -07001669 ProcessFramePacketWithAddresses(frame, self_address1, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001670 EXPECT_TRUE(connection_.connected());
1671}
1672
1673TEST_P(QuicConnectionTest, ClientAddressChangeAndPacketReordered) {
1674 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1675 set_perspective(Perspective::IS_SERVER);
1676 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
1677
1678 // Clear direct_peer_address.
1679 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
1680 // Clear effective_peer_address, it is the same as direct_peer_address for
1681 // this test.
1682 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
1683 QuicSocketAddress());
1684
nharper46833c32019-05-15 21:33:05 -07001685 QuicFrame frame;
1686 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1687 frame = QuicFrame(&crypto_frame_);
1688 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
1689 } else {
1690 frame = QuicFrame(QuicStreamFrame(
1691 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
1692 0u, QuicStringPiece()));
1693 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
1694 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001695 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 5);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001696 const QuicSocketAddress kNewPeerAddress =
1697 QuicSocketAddress(QuicIpAddress::Loopback6(),
1698 /*port=*/23456);
nharper46833c32019-05-15 21:33:05 -07001699 ProcessFramePacketWithAddresses(frame, kSelfAddress, kNewPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001700 EXPECT_EQ(kNewPeerAddress, connection_.peer_address());
1701 EXPECT_EQ(kNewPeerAddress, connection_.effective_peer_address());
1702
1703 // Decrease packet number to simulate out-of-order packets.
1704 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 4);
1705 // This is an old packet, do not migrate.
1706 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
nharper46833c32019-05-15 21:33:05 -07001707 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001708 EXPECT_EQ(kNewPeerAddress, connection_.peer_address());
1709 EXPECT_EQ(kNewPeerAddress, connection_.effective_peer_address());
1710}
1711
1712TEST_P(QuicConnectionTest, PeerAddressChangeAtServer) {
1713 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1714 set_perspective(Perspective::IS_SERVER);
1715 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
1716 EXPECT_EQ(Perspective::IS_SERVER, connection_.perspective());
1717
1718 // Clear direct_peer_address.
1719 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
1720 // Clear effective_peer_address, it is the same as direct_peer_address for
1721 // this test.
1722 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
1723 QuicSocketAddress());
1724 EXPECT_FALSE(connection_.effective_peer_address().IsInitialized());
1725
nharper46833c32019-05-15 21:33:05 -07001726 QuicFrame frame;
1727 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1728 frame = QuicFrame(&crypto_frame_);
1729 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
1730 } else {
1731 frame = QuicFrame(QuicStreamFrame(
1732 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
1733 0u, QuicStringPiece()));
1734 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
1735 }
1736 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001737 EXPECT_EQ(kPeerAddress, connection_.peer_address());
1738 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
1739
1740 // Process another packet with a different peer address on server side will
1741 // start connection migration.
1742 const QuicSocketAddress kNewPeerAddress =
1743 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/23456);
1744 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(1);
nharper46833c32019-05-15 21:33:05 -07001745 ProcessFramePacketWithAddresses(frame, kSelfAddress, kNewPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001746 EXPECT_EQ(kNewPeerAddress, connection_.peer_address());
1747 EXPECT_EQ(kNewPeerAddress, connection_.effective_peer_address());
1748}
1749
1750TEST_P(QuicConnectionTest, EffectivePeerAddressChangeAtServer) {
1751 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1752 set_perspective(Perspective::IS_SERVER);
1753 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
1754 EXPECT_EQ(Perspective::IS_SERVER, connection_.perspective());
1755
1756 // Clear direct_peer_address.
1757 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
1758 // Clear effective_peer_address, it is different from direct_peer_address for
1759 // this test.
1760 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
1761 QuicSocketAddress());
1762 const QuicSocketAddress kEffectivePeerAddress =
1763 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/43210);
1764 connection_.ReturnEffectivePeerAddressForNextPacket(kEffectivePeerAddress);
1765
nharper46833c32019-05-15 21:33:05 -07001766 QuicFrame frame;
1767 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1768 frame = QuicFrame(&crypto_frame_);
1769 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
1770 } else {
1771 frame = QuicFrame(QuicStreamFrame(
1772 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
1773 0u, QuicStringPiece()));
1774 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
1775 }
1776 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001777 EXPECT_EQ(kPeerAddress, connection_.peer_address());
1778 EXPECT_EQ(kEffectivePeerAddress, connection_.effective_peer_address());
1779
1780 // Process another packet with the same direct peer address and different
1781 // effective peer address on server side will start connection migration.
1782 const QuicSocketAddress kNewEffectivePeerAddress =
1783 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/54321);
1784 connection_.ReturnEffectivePeerAddressForNextPacket(kNewEffectivePeerAddress);
1785 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(1);
nharper46833c32019-05-15 21:33:05 -07001786 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001787 EXPECT_EQ(kPeerAddress, connection_.peer_address());
1788 EXPECT_EQ(kNewEffectivePeerAddress, connection_.effective_peer_address());
1789
1790 // Process another packet with a different direct peer address and the same
1791 // effective peer address on server side will not start connection migration.
1792 const QuicSocketAddress kNewPeerAddress =
1793 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/23456);
1794 connection_.ReturnEffectivePeerAddressForNextPacket(kNewEffectivePeerAddress);
1795 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
1796 // ack_frame is used to complete the migration started by the last packet, we
1797 // need to make sure a new migration does not start after the previous one is
1798 // completed.
1799 QuicAckFrame ack_frame = InitAckFrame(1);
1800 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(_, _, _, _, _));
1801 ProcessFramePacketWithAddresses(QuicFrame(&ack_frame), kSelfAddress,
1802 kNewPeerAddress);
1803 EXPECT_EQ(kNewPeerAddress, connection_.peer_address());
1804 EXPECT_EQ(kNewEffectivePeerAddress, connection_.effective_peer_address());
1805
1806 // Process another packet with different direct peer address and different
1807 // effective peer address on server side will start connection migration.
1808 const QuicSocketAddress kNewerEffectivePeerAddress =
1809 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/65432);
1810 const QuicSocketAddress kFinalPeerAddress =
1811 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/34567);
1812 connection_.ReturnEffectivePeerAddressForNextPacket(
1813 kNewerEffectivePeerAddress);
1814 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(1);
nharper46833c32019-05-15 21:33:05 -07001815 ProcessFramePacketWithAddresses(frame, kSelfAddress, kFinalPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001816 EXPECT_EQ(kFinalPeerAddress, connection_.peer_address());
1817 EXPECT_EQ(kNewerEffectivePeerAddress, connection_.effective_peer_address());
1818 EXPECT_EQ(PORT_CHANGE, connection_.active_effective_peer_migration_type());
1819
1820 // While the previous migration is ongoing, process another packet with the
1821 // same direct peer address and different effective peer address on server
1822 // side will start a new connection migration.
1823 const QuicSocketAddress kNewestEffectivePeerAddress =
1824 QuicSocketAddress(QuicIpAddress::Loopback4(), /*port=*/65430);
1825 connection_.ReturnEffectivePeerAddressForNextPacket(
1826 kNewestEffectivePeerAddress);
1827 EXPECT_CALL(visitor_, OnConnectionMigration(IPV6_TO_IPV4_CHANGE)).Times(1);
1828 EXPECT_CALL(*send_algorithm_, OnConnectionMigration()).Times(1);
nharper46833c32019-05-15 21:33:05 -07001829 ProcessFramePacketWithAddresses(frame, kSelfAddress, kFinalPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001830 EXPECT_EQ(kFinalPeerAddress, connection_.peer_address());
1831 EXPECT_EQ(kNewestEffectivePeerAddress, connection_.effective_peer_address());
1832 EXPECT_EQ(IPV6_TO_IPV4_CHANGE,
1833 connection_.active_effective_peer_migration_type());
1834}
1835
1836TEST_P(QuicConnectionTest, ReceivePaddedPingAtServer) {
1837 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1838 set_perspective(Perspective::IS_SERVER);
1839 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
1840 EXPECT_EQ(Perspective::IS_SERVER, connection_.perspective());
1841
1842 // Clear direct_peer_address.
1843 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
1844 // Clear effective_peer_address, it is the same as direct_peer_address for
1845 // this test.
1846 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
1847 QuicSocketAddress());
1848 EXPECT_FALSE(connection_.effective_peer_address().IsInitialized());
1849
nharper46833c32019-05-15 21:33:05 -07001850 QuicFrame frame;
1851 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1852 frame = QuicFrame(&crypto_frame_);
1853 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
1854 } else {
1855 frame = QuicFrame(QuicStreamFrame(
1856 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
1857 0u, QuicStringPiece()));
1858 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
1859 }
1860 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001861 EXPECT_EQ(kPeerAddress, connection_.peer_address());
1862 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
1863
1864 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
1865 EXPECT_CALL(visitor_, OnConnectivityProbeReceived(_, _)).Times(0);
1866
1867 // Process a padded PING or PATH CHALLENGE packet with no peer address change
1868 // on server side will be ignored.
1869 OwningSerializedPacketPointer probing_packet;
1870 if (version().transport_version == QUIC_VERSION_99) {
1871 QuicPathFrameBuffer payload = {
1872 {0xde, 0xad, 0xbe, 0xef, 0xba, 0xdc, 0x0f, 0xfe}};
1873 probing_packet =
1874 QuicPacketCreatorPeer::SerializePathChallengeConnectivityProbingPacket(
1875 &peer_creator_, &payload);
1876 } else {
1877 probing_packet = QuicPacketCreatorPeer::SerializeConnectivityProbingPacket(
1878 &peer_creator_);
1879 }
1880 std::unique_ptr<QuicReceivedPacket> received(ConstructReceivedPacket(
1881 QuicEncryptedPacket(probing_packet->encrypted_buffer,
1882 probing_packet->encrypted_length),
1883 clock_.Now()));
1884
1885 uint64_t num_probing_received =
1886 connection_.GetStats().num_connectivity_probing_received;
1887 ProcessReceivedPacket(kSelfAddress, kPeerAddress, *received);
1888
1889 EXPECT_EQ(num_probing_received,
1890 connection_.GetStats().num_connectivity_probing_received);
1891 EXPECT_EQ(kPeerAddress, connection_.peer_address());
1892 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
1893}
1894
1895TEST_P(QuicConnectionTest, WriteOutOfOrderQueuedPackets) {
1896 // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
QUICHE teamcd098022019-03-22 18:49:55 -07001897 if (!IsDefaultTestConfiguration() ||
1898 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001899 return;
1900 }
1901
1902 set_perspective(Perspective::IS_CLIENT);
1903
1904 BlockOnNextWrite();
1905
1906 QuicStreamId stream_id = 2;
1907 connection_.SendStreamDataWithString(stream_id, "foo", 0, NO_FIN);
1908
1909 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1910
1911 writer_->SetWritable();
1912 connection_.SendConnectivityProbingPacket(writer_.get(),
1913 connection_.peer_address());
1914
1915 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INTERNAL_ERROR,
1916 "Packet written out of order.",
1917 ConnectionCloseSource::FROM_SELF));
1918 EXPECT_QUIC_BUG(connection_.OnCanWrite(),
1919 "Attempt to write packet:1 after:2");
1920 EXPECT_FALSE(connection_.connected());
1921}
1922
1923TEST_P(QuicConnectionTest, DiscardQueuedPacketsAfterConnectionClose) {
1924 // Regression test for b/74073386.
1925 {
1926 InSequence seq;
1927 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
1928 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _)).Times(1);
1929 }
1930
1931 set_perspective(Perspective::IS_CLIENT);
1932
1933 writer_->SimulateNextPacketTooLarge();
1934
1935 // This packet write should fail, which should cause the connection to close
1936 // after sending a connection close packet, then the failed packet should be
1937 // queued.
1938 connection_.SendStreamDataWithString(/*id=*/2, "foo", 0, NO_FIN);
1939
1940 EXPECT_FALSE(connection_.connected());
1941 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1942
1943 EXPECT_EQ(0u, connection_.GetStats().packets_discarded);
1944 connection_.OnCanWrite();
1945 EXPECT_EQ(1u, connection_.GetStats().packets_discarded);
1946}
1947
1948TEST_P(QuicConnectionTest, ReceiveConnectivityProbingAtServer) {
1949 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
1950 set_perspective(Perspective::IS_SERVER);
1951 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
1952 EXPECT_EQ(Perspective::IS_SERVER, connection_.perspective());
1953
1954 // Clear direct_peer_address.
1955 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
1956 // Clear effective_peer_address, it is the same as direct_peer_address for
1957 // this test.
1958 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
1959 QuicSocketAddress());
1960 EXPECT_FALSE(connection_.effective_peer_address().IsInitialized());
1961
nharper46833c32019-05-15 21:33:05 -07001962 QuicFrame frame;
1963 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
1964 frame = QuicFrame(&crypto_frame_);
1965 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
1966 } else {
1967 frame = QuicFrame(QuicStreamFrame(
1968 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
1969 0u, QuicStringPiece()));
1970 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
1971 }
1972 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001973 EXPECT_EQ(kPeerAddress, connection_.peer_address());
1974 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
1975
1976 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
1977 EXPECT_CALL(visitor_, OnConnectivityProbeReceived(_, _)).Times(1);
1978
1979 // Process a padded PING packet from a new peer address on server side
1980 // is effectively receiving a connectivity probing.
1981 const QuicSocketAddress kNewPeerAddress =
1982 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/23456);
1983
1984 OwningSerializedPacketPointer probing_packet = ConstructProbingPacket();
1985 std::unique_ptr<QuicReceivedPacket> received(ConstructReceivedPacket(
1986 QuicEncryptedPacket(probing_packet->encrypted_buffer,
1987 probing_packet->encrypted_length),
1988 clock_.Now()));
1989
1990 uint64_t num_probing_received =
1991 connection_.GetStats().num_connectivity_probing_received;
1992 ProcessReceivedPacket(kSelfAddress, kNewPeerAddress, *received);
1993
1994 EXPECT_EQ(num_probing_received + 1,
1995 connection_.GetStats().num_connectivity_probing_received);
1996 EXPECT_EQ(kPeerAddress, connection_.peer_address());
1997 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
1998
1999 // Process another packet with the old peer address on server side will not
2000 // start peer migration.
2001 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
nharper46833c32019-05-15 21:33:05 -07002002 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002003 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2004 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2005}
2006
2007TEST_P(QuicConnectionTest, ReceiveReorderedConnectivityProbingAtServer) {
2008 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2009 set_perspective(Perspective::IS_SERVER);
2010 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
2011 EXPECT_EQ(Perspective::IS_SERVER, connection_.perspective());
2012
2013 // Clear direct_peer_address.
2014 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
2015 // Clear effective_peer_address, it is the same as direct_peer_address for
2016 // this test.
2017 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
2018 QuicSocketAddress());
2019 EXPECT_FALSE(connection_.effective_peer_address().IsInitialized());
2020
nharper46833c32019-05-15 21:33:05 -07002021 QuicFrame frame;
2022 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2023 frame = QuicFrame(&crypto_frame_);
2024 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
2025 } else {
2026 frame = QuicFrame(QuicStreamFrame(
2027 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
2028 0u, QuicStringPiece()));
2029 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
2030 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002031 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 5);
nharper46833c32019-05-15 21:33:05 -07002032 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002033 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2034 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2035
2036 // Decrease packet number to simulate out-of-order packets.
2037 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 4);
2038
2039 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
2040 EXPECT_CALL(visitor_, OnConnectivityProbeReceived(_, _)).Times(1);
2041
2042 // Process a padded PING packet from a new peer address on server side
2043 // is effectively receiving a connectivity probing, even if a newer packet has
2044 // been received before this one.
2045 const QuicSocketAddress kNewPeerAddress =
2046 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/23456);
2047
2048 OwningSerializedPacketPointer probing_packet = ConstructProbingPacket();
2049 std::unique_ptr<QuicReceivedPacket> received(ConstructReceivedPacket(
2050 QuicEncryptedPacket(probing_packet->encrypted_buffer,
2051 probing_packet->encrypted_length),
2052 clock_.Now()));
2053
2054 uint64_t num_probing_received =
2055 connection_.GetStats().num_connectivity_probing_received;
2056 ProcessReceivedPacket(kSelfAddress, kNewPeerAddress, *received);
2057
2058 EXPECT_EQ(num_probing_received + 1,
2059 connection_.GetStats().num_connectivity_probing_received);
2060 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2061 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2062}
2063
2064TEST_P(QuicConnectionTest, MigrateAfterProbingAtServer) {
2065 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2066 set_perspective(Perspective::IS_SERVER);
2067 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
2068 EXPECT_EQ(Perspective::IS_SERVER, connection_.perspective());
2069
2070 // Clear direct_peer_address.
2071 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
2072 // Clear effective_peer_address, it is the same as direct_peer_address for
2073 // this test.
2074 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
2075 QuicSocketAddress());
2076 EXPECT_FALSE(connection_.effective_peer_address().IsInitialized());
2077
nharper46833c32019-05-15 21:33:05 -07002078 QuicFrame frame;
2079 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2080 frame = QuicFrame(&crypto_frame_);
2081 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
2082 } else {
2083 frame = QuicFrame(QuicStreamFrame(
2084 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
2085 0u, QuicStringPiece()));
2086 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
2087 }
2088 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002089 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2090 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2091
2092 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
2093 EXPECT_CALL(visitor_, OnConnectivityProbeReceived(_, _)).Times(1);
2094
2095 // Process a padded PING packet from a new peer address on server side
2096 // is effectively receiving a connectivity probing.
2097 const QuicSocketAddress kNewPeerAddress =
2098 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/23456);
2099
2100 OwningSerializedPacketPointer probing_packet = ConstructProbingPacket();
2101 std::unique_ptr<QuicReceivedPacket> received(ConstructReceivedPacket(
2102 QuicEncryptedPacket(probing_packet->encrypted_buffer,
2103 probing_packet->encrypted_length),
2104 clock_.Now()));
2105 ProcessReceivedPacket(kSelfAddress, kNewPeerAddress, *received);
2106 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2107 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2108
2109 // Process another non-probing packet with the new peer address on server
2110 // side will start peer migration.
2111 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(1);
2112
nharper46833c32019-05-15 21:33:05 -07002113 ProcessFramePacketWithAddresses(frame, kSelfAddress, kNewPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002114 EXPECT_EQ(kNewPeerAddress, connection_.peer_address());
2115 EXPECT_EQ(kNewPeerAddress, connection_.effective_peer_address());
2116}
2117
2118TEST_P(QuicConnectionTest, ReceivePaddedPingAtClient) {
2119 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2120 set_perspective(Perspective::IS_CLIENT);
2121 EXPECT_EQ(Perspective::IS_CLIENT, connection_.perspective());
2122
2123 // Clear direct_peer_address.
2124 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
2125 // Clear effective_peer_address, it is the same as direct_peer_address for
2126 // this test.
2127 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
2128 QuicSocketAddress());
2129 EXPECT_FALSE(connection_.effective_peer_address().IsInitialized());
2130
nharper46833c32019-05-15 21:33:05 -07002131 QuicFrame frame;
2132 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2133 frame = QuicFrame(&crypto_frame_);
2134 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
2135 } else {
2136 frame = QuicFrame(QuicStreamFrame(
2137 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
2138 0u, QuicStringPiece()));
2139 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
2140 }
2141 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002142 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2143 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2144
2145 // Client takes all padded PING packet as speculative connectivity
2146 // probing packet, and reports to visitor.
2147 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
2148 EXPECT_CALL(visitor_, OnConnectivityProbeReceived(_, _)).Times(1);
2149
2150 OwningSerializedPacketPointer probing_packet = ConstructProbingPacket();
2151 std::unique_ptr<QuicReceivedPacket> received(ConstructReceivedPacket(
2152 QuicEncryptedPacket(probing_packet->encrypted_buffer,
2153 probing_packet->encrypted_length),
2154 clock_.Now()));
2155 uint64_t num_probing_received =
2156 connection_.GetStats().num_connectivity_probing_received;
2157 ProcessReceivedPacket(kSelfAddress, kPeerAddress, *received);
2158
2159 EXPECT_EQ(num_probing_received,
2160 connection_.GetStats().num_connectivity_probing_received);
2161 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2162 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2163}
2164
2165TEST_P(QuicConnectionTest, ReceiveConnectivityProbingAtClient) {
2166 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2167 set_perspective(Perspective::IS_CLIENT);
2168 EXPECT_EQ(Perspective::IS_CLIENT, connection_.perspective());
2169
2170 // Clear direct_peer_address.
2171 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
2172 // Clear effective_peer_address, it is the same as direct_peer_address for
2173 // this test.
2174 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
2175 QuicSocketAddress());
2176 EXPECT_FALSE(connection_.effective_peer_address().IsInitialized());
2177
nharper46833c32019-05-15 21:33:05 -07002178 QuicFrame frame;
2179 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2180 frame = QuicFrame(&crypto_frame_);
2181 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
2182 } else {
2183 frame = QuicFrame(QuicStreamFrame(
2184 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
2185 0u, QuicStringPiece()));
2186 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
2187 }
2188 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002189 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2190 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2191
2192 // Process a padded PING packet with a different self address on client side
2193 // is effectively receiving a connectivity probing.
2194 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
2195 EXPECT_CALL(visitor_, OnConnectivityProbeReceived(_, _)).Times(1);
2196
2197 const QuicSocketAddress kNewSelfAddress =
2198 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/23456);
2199
2200 OwningSerializedPacketPointer probing_packet = ConstructProbingPacket();
2201 std::unique_ptr<QuicReceivedPacket> received(ConstructReceivedPacket(
2202 QuicEncryptedPacket(probing_packet->encrypted_buffer,
2203 probing_packet->encrypted_length),
2204 clock_.Now()));
2205 uint64_t num_probing_received =
2206 connection_.GetStats().num_connectivity_probing_received;
2207 ProcessReceivedPacket(kNewSelfAddress, kPeerAddress, *received);
2208
2209 EXPECT_EQ(num_probing_received + 1,
2210 connection_.GetStats().num_connectivity_probing_received);
2211 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2212 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2213}
2214
2215TEST_P(QuicConnectionTest, PeerAddressChangeAtClient) {
2216 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2217 set_perspective(Perspective::IS_CLIENT);
2218 EXPECT_EQ(Perspective::IS_CLIENT, connection_.perspective());
2219
2220 // Clear direct_peer_address.
2221 QuicConnectionPeer::SetDirectPeerAddress(&connection_, QuicSocketAddress());
2222 // Clear effective_peer_address, it is the same as direct_peer_address for
2223 // this test.
2224 QuicConnectionPeer::SetEffectivePeerAddress(&connection_,
2225 QuicSocketAddress());
2226 EXPECT_FALSE(connection_.effective_peer_address().IsInitialized());
2227
nharper46833c32019-05-15 21:33:05 -07002228 QuicFrame frame;
2229 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2230 frame = QuicFrame(&crypto_frame_);
2231 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
2232 } else {
2233 frame = QuicFrame(QuicStreamFrame(
2234 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
2235 0u, QuicStringPiece()));
2236 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
2237 }
2238 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002239 EXPECT_EQ(kPeerAddress, connection_.peer_address());
2240 EXPECT_EQ(kPeerAddress, connection_.effective_peer_address());
2241
2242 // Process another packet with a different peer address on client side will
2243 // only update peer address.
2244 const QuicSocketAddress kNewPeerAddress =
2245 QuicSocketAddress(QuicIpAddress::Loopback6(), /*port=*/23456);
2246 EXPECT_CALL(visitor_, OnConnectionMigration(PORT_CHANGE)).Times(0);
nharper46833c32019-05-15 21:33:05 -07002247 ProcessFramePacketWithAddresses(frame, kSelfAddress, kNewPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002248 EXPECT_EQ(kNewPeerAddress, connection_.peer_address());
2249 EXPECT_EQ(kNewPeerAddress, connection_.effective_peer_address());
2250}
2251
2252TEST_P(QuicConnectionTest, MaxPacketSize) {
2253 EXPECT_EQ(Perspective::IS_CLIENT, connection_.perspective());
2254 EXPECT_EQ(1350u, connection_.max_packet_length());
2255}
2256
2257TEST_P(QuicConnectionTest, SmallerServerMaxPacketSize) {
2258 TestConnection connection(TestConnectionId(), kPeerAddress, helper_.get(),
2259 alarm_factory_.get(), writer_.get(),
2260 Perspective::IS_SERVER, version());
2261 EXPECT_EQ(Perspective::IS_SERVER, connection.perspective());
2262 EXPECT_EQ(1000u, connection.max_packet_length());
2263}
2264
2265TEST_P(QuicConnectionTest, IncreaseServerMaxPacketSize) {
2266 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2267
2268 set_perspective(Perspective::IS_SERVER);
2269 connection_.SetMaxPacketLength(1000);
2270
2271 QuicPacketHeader header;
2272 header.destination_connection_id = connection_id_;
2273 header.version_flag = true;
2274 header.packet_number = QuicPacketNumber(1);
2275
2276 if (QuicVersionHasLongHeaderLengths(
2277 peer_framer_.version().transport_version)) {
2278 header.long_packet_type = INITIAL;
2279 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
2280 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
2281 }
2282
2283 QuicFrames frames;
2284 QuicPaddingFrame padding;
nharper46833c32019-05-15 21:33:05 -07002285 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2286 frames.push_back(QuicFrame(&crypto_frame_));
2287 } else {
2288 frames.push_back(QuicFrame(frame1_));
2289 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002290 frames.push_back(QuicFrame(padding));
2291 std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
dschinazi66dea072019-04-09 11:41:06 -07002292 char buffer[kMaxOutgoingPacketSize];
QUICHE team6987b4a2019-03-15 16:23:04 -07002293 size_t encrypted_length =
2294 peer_framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(12),
dschinazi66dea072019-04-09 11:41:06 -07002295 *packet, buffer, kMaxOutgoingPacketSize);
2296 EXPECT_EQ(kMaxOutgoingPacketSize, encrypted_length);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002297
2298 framer_.set_version(version());
nharper46833c32019-05-15 21:33:05 -07002299 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2300 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(1);
2301 } else {
2302 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
2303 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002304 connection_.ProcessUdpPacket(
2305 kSelfAddress, kPeerAddress,
2306 QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
2307
dschinazi66dea072019-04-09 11:41:06 -07002308 EXPECT_EQ(kMaxOutgoingPacketSize, connection_.max_packet_length());
QUICHE teama6ef0a62019-03-07 20:34:33 -05002309}
2310
2311TEST_P(QuicConnectionTest, IncreaseServerMaxPacketSizeWhileWriterLimited) {
2312 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2313
2314 const QuicByteCount lower_max_packet_size = 1240;
2315 writer_->set_max_packet_size(lower_max_packet_size);
2316 set_perspective(Perspective::IS_SERVER);
2317 connection_.SetMaxPacketLength(1000);
2318 EXPECT_EQ(1000u, connection_.max_packet_length());
2319
2320 QuicPacketHeader header;
2321 header.destination_connection_id = connection_id_;
2322 header.version_flag = true;
2323 header.packet_number = QuicPacketNumber(1);
2324
2325 if (QuicVersionHasLongHeaderLengths(
2326 peer_framer_.version().transport_version)) {
2327 header.long_packet_type = INITIAL;
2328 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
2329 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
2330 }
2331
2332 QuicFrames frames;
2333 QuicPaddingFrame padding;
nharper46833c32019-05-15 21:33:05 -07002334 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2335 frames.push_back(QuicFrame(&crypto_frame_));
2336 } else {
2337 frames.push_back(QuicFrame(frame1_));
2338 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002339 frames.push_back(QuicFrame(padding));
2340 std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
dschinazi66dea072019-04-09 11:41:06 -07002341 char buffer[kMaxOutgoingPacketSize];
QUICHE team6987b4a2019-03-15 16:23:04 -07002342 size_t encrypted_length =
2343 peer_framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(12),
dschinazi66dea072019-04-09 11:41:06 -07002344 *packet, buffer, kMaxOutgoingPacketSize);
2345 EXPECT_EQ(kMaxOutgoingPacketSize, encrypted_length);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002346
2347 framer_.set_version(version());
nharper46833c32019-05-15 21:33:05 -07002348 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
2349 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(1);
2350 } else {
2351 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
2352 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002353 connection_.ProcessUdpPacket(
2354 kSelfAddress, kPeerAddress,
2355 QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
2356
2357 // Here, the limit imposed by the writer is lower than the size of the packet
2358 // received, so the writer max packet size is used.
2359 EXPECT_EQ(lower_max_packet_size, connection_.max_packet_length());
2360}
2361
2362TEST_P(QuicConnectionTest, LimitMaxPacketSizeByWriter) {
2363 const QuicByteCount lower_max_packet_size = 1240;
2364 writer_->set_max_packet_size(lower_max_packet_size);
2365
2366 static_assert(lower_max_packet_size < kDefaultMaxPacketSize,
2367 "Default maximum packet size is too low");
2368 connection_.SetMaxPacketLength(kDefaultMaxPacketSize);
2369
2370 EXPECT_EQ(lower_max_packet_size, connection_.max_packet_length());
2371}
2372
2373TEST_P(QuicConnectionTest, LimitMaxPacketSizeByWriterForNewConnection) {
2374 const QuicConnectionId connection_id = TestConnectionId(17);
2375 const QuicByteCount lower_max_packet_size = 1240;
2376 writer_->set_max_packet_size(lower_max_packet_size);
2377 TestConnection connection(connection_id, kPeerAddress, helper_.get(),
2378 alarm_factory_.get(), writer_.get(),
2379 Perspective::IS_CLIENT, version());
2380 EXPECT_EQ(Perspective::IS_CLIENT, connection.perspective());
2381 EXPECT_EQ(lower_max_packet_size, connection.max_packet_length());
2382}
2383
2384TEST_P(QuicConnectionTest, PacketsInOrder) {
QUICHE teamcd098022019-03-22 18:49:55 -07002385 if (connection_.SupportsMultiplePacketNumberSpaces()) {
2386 return;
2387 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002388 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2389
2390 ProcessPacket(1);
2391 EXPECT_EQ(QuicPacketNumber(1u), LargestAcked(*outgoing_ack()));
2392 EXPECT_EQ(1u, outgoing_ack()->packets.NumIntervals());
2393
2394 ProcessPacket(2);
2395 EXPECT_EQ(QuicPacketNumber(2u), LargestAcked(*outgoing_ack()));
2396 EXPECT_EQ(1u, outgoing_ack()->packets.NumIntervals());
2397
2398 ProcessPacket(3);
2399 EXPECT_EQ(QuicPacketNumber(3u), LargestAcked(*outgoing_ack()));
2400 EXPECT_EQ(1u, outgoing_ack()->packets.NumIntervals());
2401}
2402
2403TEST_P(QuicConnectionTest, PacketsOutOfOrder) {
QUICHE teamcd098022019-03-22 18:49:55 -07002404 if (connection_.SupportsMultiplePacketNumberSpaces()) {
2405 return;
2406 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002407 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2408
2409 ProcessPacket(3);
2410 EXPECT_EQ(QuicPacketNumber(3u), LargestAcked(*outgoing_ack()));
2411 EXPECT_TRUE(IsMissing(2));
2412 EXPECT_TRUE(IsMissing(1));
2413
2414 ProcessPacket(2);
2415 EXPECT_EQ(QuicPacketNumber(3u), LargestAcked(*outgoing_ack()));
2416 EXPECT_FALSE(IsMissing(2));
2417 EXPECT_TRUE(IsMissing(1));
2418
2419 ProcessPacket(1);
2420 EXPECT_EQ(QuicPacketNumber(3u), LargestAcked(*outgoing_ack()));
2421 EXPECT_FALSE(IsMissing(2));
2422 EXPECT_FALSE(IsMissing(1));
2423}
2424
2425TEST_P(QuicConnectionTest, DuplicatePacket) {
QUICHE teamcd098022019-03-22 18:49:55 -07002426 if (connection_.SupportsMultiplePacketNumberSpaces()) {
2427 return;
2428 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002429 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2430
2431 ProcessPacket(3);
2432 EXPECT_EQ(QuicPacketNumber(3u), LargestAcked(*outgoing_ack()));
2433 EXPECT_TRUE(IsMissing(2));
2434 EXPECT_TRUE(IsMissing(1));
2435
2436 // Send packet 3 again, but do not set the expectation that
2437 // the visitor OnStreamFrame() will be called.
2438 ProcessDataPacket(3);
2439 EXPECT_EQ(QuicPacketNumber(3u), LargestAcked(*outgoing_ack()));
2440 EXPECT_TRUE(IsMissing(2));
2441 EXPECT_TRUE(IsMissing(1));
2442}
2443
2444TEST_P(QuicConnectionTest, PacketsOutOfOrderWithAdditionsAndLeastAwaiting) {
QUICHE teamcd098022019-03-22 18:49:55 -07002445 if (connection_.SupportsMultiplePacketNumberSpaces()) {
2446 return;
2447 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002448 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2449
2450 ProcessPacket(3);
2451 EXPECT_EQ(QuicPacketNumber(3u), LargestAcked(*outgoing_ack()));
2452 EXPECT_TRUE(IsMissing(2));
2453 EXPECT_TRUE(IsMissing(1));
2454
2455 ProcessPacket(2);
2456 EXPECT_EQ(QuicPacketNumber(3u), LargestAcked(*outgoing_ack()));
2457 EXPECT_TRUE(IsMissing(1));
2458
2459 ProcessPacket(5);
2460 EXPECT_EQ(QuicPacketNumber(5u), LargestAcked(*outgoing_ack()));
2461 EXPECT_TRUE(IsMissing(1));
2462 EXPECT_TRUE(IsMissing(4));
2463
2464 // Pretend at this point the client has gotten acks for 2 and 3 and 1 is a
2465 // packet the peer will not retransmit. It indicates this by sending 'least
2466 // awaiting' is 4. The connection should then realize 1 will not be
2467 // retransmitted, and will remove it from the missing list.
2468 QuicAckFrame frame = InitAckFrame(1);
2469 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(_, _, _, _, _));
2470 ProcessAckPacket(6, &frame);
2471
2472 // Force an ack to be sent.
2473 SendAckPacketToPeer();
2474 EXPECT_TRUE(IsMissing(4));
2475}
2476
2477TEST_P(QuicConnectionTest, RejectPacketTooFarOut) {
QUICHE teamcd098022019-03-22 18:49:55 -07002478 if (GetQuicReloadableFlag(quic_use_uber_received_packet_manager)) {
2479 return;
2480 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002481 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_PACKET_HEADER, _,
2482 ConnectionCloseSource::FROM_SELF));
2483
2484 // Call ProcessDataPacket rather than ProcessPacket, as we should not get a
2485 // packet call to the visitor.
2486 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
2487 ProcessDataPacket(MaxRandomInitialPacketNumber() + 6000);
2488 } else {
2489 ProcessDataPacket(6000);
2490 }
2491 EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
2492 nullptr);
2493}
2494
2495TEST_P(QuicConnectionTest, RejectUnencryptedStreamData) {
2496 // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
2497 if (!IsDefaultTestConfiguration()) {
2498 return;
2499 }
2500
2501 // Process an unencrypted packet from the non-crypto stream.
2502 frame1_.stream_id = 3;
2503 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2504 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_UNENCRYPTED_STREAM_DATA, _,
2505 ConnectionCloseSource::FROM_SELF));
nharper2c9f02a2019-05-08 10:25:50 -07002506 EXPECT_QUIC_PEER_BUG(ProcessDataPacketAtLevel(1, false, ENCRYPTION_INITIAL),
2507 "");
QUICHE teama6ef0a62019-03-07 20:34:33 -05002508 EXPECT_FALSE(QuicConnectionPeer::GetConnectionClosePacket(&connection_) ==
2509 nullptr);
2510 const std::vector<QuicConnectionCloseFrame>& connection_close_frames =
2511 writer_->connection_close_frames();
nharper2c9f02a2019-05-08 10:25:50 -07002512 ASSERT_EQ(1u, connection_close_frames.size());
QUICHE teama6ef0a62019-03-07 20:34:33 -05002513 EXPECT_EQ(QUIC_UNENCRYPTED_STREAM_DATA,
fkastenholze9d71a82019-04-09 05:12:13 -07002514 connection_close_frames[0].quic_error_code);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002515}
2516
2517TEST_P(QuicConnectionTest, OutOfOrderReceiptCausesAckSend) {
2518 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2519
2520 ProcessPacket(3);
2521 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
2522 // Should not cause an ack.
2523 EXPECT_EQ(0u, writer_->packets_write_attempts());
2524 } else {
2525 // Should ack immediately since we have missing packets.
2526 EXPECT_EQ(1u, writer_->packets_write_attempts());
2527 }
2528
2529 ProcessPacket(2);
2530 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
2531 // Should ack immediately, since this fills the last hole.
2532 EXPECT_EQ(1u, writer_->packets_write_attempts());
2533 } else {
2534 // Should ack immediately since we have missing packets.
2535 EXPECT_EQ(2u, writer_->packets_write_attempts());
2536 }
2537
2538 ProcessPacket(1);
2539 // Should ack immediately, since this fills the last hole.
2540 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
2541 EXPECT_EQ(2u, writer_->packets_write_attempts());
2542 } else {
2543 EXPECT_EQ(3u, writer_->packets_write_attempts());
2544 }
2545
2546 ProcessPacket(4);
2547 // Should not cause an ack.
2548 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
2549 EXPECT_EQ(2u, writer_->packets_write_attempts());
2550 } else {
2551 EXPECT_EQ(3u, writer_->packets_write_attempts());
2552 }
2553}
2554
2555TEST_P(QuicConnectionTest, OutOfOrderAckReceiptCausesNoAck) {
2556 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2557
2558 SendStreamDataToPeer(1, "foo", 0, NO_FIN, nullptr);
2559 SendStreamDataToPeer(1, "bar", 3, NO_FIN, nullptr);
2560 EXPECT_EQ(2u, writer_->packets_write_attempts());
2561
2562 QuicAckFrame ack1 = InitAckFrame(1);
2563 QuicAckFrame ack2 = InitAckFrame(2);
2564 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
2565 ProcessAckPacket(2, &ack2);
2566 // Should ack immediately since we have missing packets.
2567 EXPECT_EQ(2u, writer_->packets_write_attempts());
2568
2569 ProcessAckPacket(1, &ack1);
2570 // Should not ack an ack filling a missing packet.
2571 EXPECT_EQ(2u, writer_->packets_write_attempts());
2572}
2573
2574TEST_P(QuicConnectionTest, AckReceiptCausesAckSend) {
2575 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2576 QuicPacketNumber original, second;
2577
2578 QuicByteCount packet_size =
2579 SendStreamDataToPeer(3, "foo", 0, NO_FIN, &original); // 1st packet.
2580 SendStreamDataToPeer(3, "bar", 3, NO_FIN, &second); // 2nd packet.
2581
2582 QuicAckFrame frame = InitAckFrame({{second, second + 1}});
2583 // First nack triggers early retransmit.
2584 LostPacketVector lost_packets;
dschinazi66dea072019-04-09 11:41:06 -07002585 lost_packets.push_back(LostPacket(original, kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05002586 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
2587 .WillOnce(SetArgPointee<5>(lost_packets));
2588 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
2589 QuicPacketNumber retransmission;
2590 // Packet 1 is short header for IETF QUIC because the encryption level
2591 // switched to ENCRYPTION_FORWARD_SECURE in SendStreamDataToPeer.
2592 EXPECT_CALL(
2593 *send_algorithm_,
2594 OnPacketSent(_, _, _,
2595 GetParam().version.transport_version > QUIC_VERSION_43
2596 ? packet_size
2597 : packet_size - kQuicVersionSize,
2598 _))
2599 .WillOnce(SaveArg<2>(&retransmission));
2600
2601 ProcessAckPacket(&frame);
2602
2603 QuicAckFrame frame2 = ConstructAckFrame(retransmission, original);
2604 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
2605 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
2606 ProcessAckPacket(&frame2);
2607
2608 // Now if the peer sends an ack which still reports the retransmitted packet
2609 // as missing, that will bundle an ack with data after two acks in a row
2610 // indicate the high water mark needs to be raised.
2611 EXPECT_CALL(*send_algorithm_,
2612 OnPacketSent(_, _, _, _, HAS_RETRANSMITTABLE_DATA));
2613 connection_.SendStreamDataWithString(3, "foo", 6, NO_FIN);
2614 // No ack sent.
nharper55fa6132019-05-07 19:37:21 -07002615 size_t padding_frame_count = writer_->padding_frames().size();
2616 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05002617 EXPECT_EQ(1u, writer_->stream_frames().size());
2618
2619 // No more packet loss for the rest of the test.
2620 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
2621 .Times(AnyNumber());
2622 ProcessAckPacket(&frame2);
2623 EXPECT_CALL(*send_algorithm_,
2624 OnPacketSent(_, _, _, _, HAS_RETRANSMITTABLE_DATA));
fayang03916692019-05-22 17:57:18 -07002625 connection_.SendStreamDataWithString(3, "foofoofoo", 9, NO_FIN);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002626 // Ack bundled.
2627 if (GetParam().no_stop_waiting) {
fayang03916692019-05-22 17:57:18 -07002628 if (GetQuicReloadableFlag(quic_simplify_stop_waiting)) {
2629 // Do not ACK acks.
2630 EXPECT_EQ(1u, writer_->frame_count());
2631 } else {
2632 EXPECT_EQ(2u, writer_->frame_count());
2633 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002634 } else {
2635 EXPECT_EQ(3u, writer_->frame_count());
2636 }
2637 EXPECT_EQ(1u, writer_->stream_frames().size());
fayang03916692019-05-22 17:57:18 -07002638 if (GetParam().no_stop_waiting &&
2639 GetQuicReloadableFlag(quic_simplify_stop_waiting)) {
2640 EXPECT_TRUE(writer_->ack_frames().empty());
2641 } else {
2642 EXPECT_FALSE(writer_->ack_frames().empty());
2643 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002644
2645 // But an ack with no missing packets will not send an ack.
2646 AckPacket(original, &frame2);
2647 ProcessAckPacket(&frame2);
2648 ProcessAckPacket(&frame2);
2649}
2650
2651TEST_P(QuicConnectionTest, AckSentEveryNthPacket) {
2652 connection_.set_ack_frequency_before_ack_decimation(3);
2653
2654 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2655 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(39);
2656
2657 // Expect 13 acks, every 3rd packet.
2658 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(13);
2659 // Receives packets 1 - 39.
2660 for (size_t i = 1; i <= 39; ++i) {
2661 ProcessDataPacket(i);
2662 }
2663}
2664
2665TEST_P(QuicConnectionTest, AckDecimationReducesAcks) {
2666 const size_t kMinRttMs = 40;
2667 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
2668 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
2669 QuicTime::Delta::Zero(), QuicTime::Zero());
2670 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
2671
2672 QuicConnectionPeer::SetAckMode(&connection_, ACK_DECIMATION_WITH_REORDERING);
2673
2674 // Start ack decimation from 10th packet.
2675 connection_.set_min_received_before_ack_decimation(10);
2676
2677 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2678 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(30);
2679
2680 // Expect 6 acks: 5 acks between packets 1-10, and ack at 20.
2681 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(6);
2682 // Receives packets 1 - 29.
2683 for (size_t i = 1; i <= 29; ++i) {
2684 ProcessDataPacket(i);
2685 }
2686
2687 // We now receive the 30th packet, and so we send an ack.
2688 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
2689 ProcessDataPacket(30);
2690}
2691
2692TEST_P(QuicConnectionTest, AckNeedsRetransmittableFrames) {
ianswett68cf0042019-05-09 08:37:58 -07002693 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002694 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2695 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(99);
2696
2697 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(19);
2698 // Receives packets 1 - 39.
2699 for (size_t i = 1; i <= 39; ++i) {
2700 ProcessDataPacket(i);
2701 }
2702 // Receiving Packet 40 causes 20th ack to send. Session is informed and adds
2703 // WINDOW_UPDATE.
2704 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame())
2705 .WillOnce(Invoke([this]() {
2706 connection_.SendControlFrame(
2707 QuicFrame(new QuicWindowUpdateFrame(1, 0, 0)));
2708 }));
2709 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
2710 EXPECT_EQ(0u, writer_->window_update_frames().size());
2711 ProcessDataPacket(40);
2712 EXPECT_EQ(1u, writer_->window_update_frames().size());
2713
2714 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(9);
2715 // Receives packets 41 - 59.
2716 for (size_t i = 41; i <= 59; ++i) {
2717 ProcessDataPacket(i);
2718 }
2719 // Send a packet containing stream frame.
QUICHE team8c1daa22019-03-13 08:33:41 -07002720 SendStreamDataToPeer(
nharper46833c32019-05-15 21:33:05 -07002721 QuicUtils::GetFirstBidirectionalStreamId(
2722 connection_.version().transport_version, Perspective::IS_CLIENT),
QUICHE team8c1daa22019-03-13 08:33:41 -07002723 "bar", 0, NO_FIN, nullptr);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002724
2725 // Session will not be informed until receiving another 20 packets.
2726 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(19);
2727 for (size_t i = 60; i <= 98; ++i) {
2728 ProcessDataPacket(i);
2729 EXPECT_EQ(0u, writer_->window_update_frames().size());
2730 }
2731 // Session does not add a retransmittable frame.
2732 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame())
2733 .WillOnce(Invoke([this]() {
2734 connection_.SendControlFrame(QuicFrame(QuicPingFrame(1)));
2735 }));
2736 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
2737 EXPECT_EQ(0u, writer_->ping_frames().size());
2738 ProcessDataPacket(99);
2739 EXPECT_EQ(0u, writer_->window_update_frames().size());
2740 // A ping frame will be added.
2741 EXPECT_EQ(1u, writer_->ping_frames().size());
2742}
2743
2744TEST_P(QuicConnectionTest, LeastUnackedLower) {
QUICHE teamcd098022019-03-22 18:49:55 -07002745 if (GetParam().version.transport_version > QUIC_VERSION_43 ||
2746 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05002747 return;
2748 }
2749 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2750
2751 SendStreamDataToPeer(1, "foo", 0, NO_FIN, nullptr);
2752 SendStreamDataToPeer(1, "bar", 3, NO_FIN, nullptr);
2753 SendStreamDataToPeer(1, "eep", 6, NO_FIN, nullptr);
2754
2755 // Start out saying the least unacked is 2.
2756 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 5);
2757 ProcessStopWaitingPacket(InitStopWaitingFrame(2));
2758
2759 // Change it to 1, but lower the packet number to fake out-of-order packets.
2760 // This should be fine.
2761 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 1);
2762 // The scheduler will not process out of order acks, but all packet processing
2763 // causes the connection to try to write.
2764 if (!GetParam().no_stop_waiting) {
2765 EXPECT_CALL(visitor_, OnCanWrite());
2766 }
2767 ProcessStopWaitingPacket(InitStopWaitingFrame(1));
2768
2769 // Now claim it's one, but set the ordering so it was sent "after" the first
2770 // one. This should cause a connection error.
2771 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 7);
2772 if (!GetParam().no_stop_waiting) {
2773 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
2774 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_STOP_WAITING_DATA, _,
2775 ConnectionCloseSource::FROM_SELF));
2776 }
2777 ProcessStopWaitingPacket(InitStopWaitingFrame(1));
2778}
2779
2780TEST_P(QuicConnectionTest, TooManySentPackets) {
2781 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2782
2783 QuicPacketCount max_tracked_packets = 50;
2784 QuicConnectionPeer::SetMaxTrackedPackets(&connection_, max_tracked_packets);
2785
2786 const int num_packets = max_tracked_packets + 5;
2787
2788 for (int i = 0; i < num_packets; ++i) {
2789 SendStreamDataToPeer(1, "foo", 3 * i, NO_FIN, nullptr);
2790 }
2791
2792 // Ack packet 1, which leaves more than the limit outstanding.
2793 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
2794 EXPECT_CALL(visitor_,
2795 OnConnectionClosed(QUIC_TOO_MANY_OUTSTANDING_SENT_PACKETS, _,
2796 ConnectionCloseSource::FROM_SELF));
2797
2798 // Nack the first packet and ack the rest, leaving a huge gap.
2799 QuicAckFrame frame1 = ConstructAckFrame(num_packets, 1);
2800 ProcessAckPacket(&frame1);
2801}
2802
2803TEST_P(QuicConnectionTest, LargestObservedLower) {
2804 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2805
2806 SendStreamDataToPeer(1, "foo", 0, NO_FIN, nullptr);
2807 SendStreamDataToPeer(1, "bar", 3, NO_FIN, nullptr);
2808 SendStreamDataToPeer(1, "eep", 6, NO_FIN, nullptr);
2809 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
2810
2811 // Start out saying the largest observed is 2.
2812 QuicAckFrame frame1 = InitAckFrame(1);
2813 QuicAckFrame frame2 = InitAckFrame(2);
2814 ProcessAckPacket(&frame2);
2815
QUICHE team9929cc42019-03-13 08:17:43 -07002816 if (GetQuicReloadableFlag(quic_tolerate_reneging)) {
2817 EXPECT_CALL(visitor_, OnCanWrite());
2818 } else {
2819 // Now change it to 1, and it should cause a connection error.
2820 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_ACK_DATA, _,
2821 ConnectionCloseSource::FROM_SELF));
2822 EXPECT_CALL(visitor_, OnCanWrite()).Times(0);
2823 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002824 ProcessAckPacket(&frame1);
2825}
2826
2827TEST_P(QuicConnectionTest, AckUnsentData) {
2828 // Ack a packet which has not been sent.
2829 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_ACK_DATA, _,
2830 ConnectionCloseSource::FROM_SELF));
2831 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2832 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
2833 QuicAckFrame frame = InitAckFrame(1);
2834 EXPECT_CALL(visitor_, OnCanWrite()).Times(0);
2835 ProcessAckPacket(&frame);
2836}
2837
2838TEST_P(QuicConnectionTest, BasicSending) {
QUICHE teamcd098022019-03-22 18:49:55 -07002839 if (connection_.SupportsMultiplePacketNumberSpaces()) {
2840 return;
2841 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002842 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
2843 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
2844 ProcessDataPacket(1);
2845 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 2);
2846 QuicPacketNumber last_packet;
2847 SendStreamDataToPeer(1, "foo", 0, NO_FIN, &last_packet); // Packet 1
2848 EXPECT_EQ(QuicPacketNumber(1u), last_packet);
2849 SendAckPacketToPeer(); // Packet 2
2850
2851 if (GetParam().no_stop_waiting) {
2852 // Expect no stop waiting frame is sent.
2853 EXPECT_FALSE(least_unacked().IsInitialized());
2854 } else {
2855 EXPECT_EQ(QuicPacketNumber(1u), least_unacked());
2856 }
2857
2858 SendAckPacketToPeer(); // Packet 3
2859 if (GetParam().no_stop_waiting) {
2860 // Expect no stop waiting frame is sent.
2861 EXPECT_FALSE(least_unacked().IsInitialized());
2862 } else {
2863 EXPECT_EQ(QuicPacketNumber(1u), least_unacked());
2864 }
2865
2866 SendStreamDataToPeer(1, "bar", 3, NO_FIN, &last_packet); // Packet 4
2867 EXPECT_EQ(QuicPacketNumber(4u), last_packet);
2868 SendAckPacketToPeer(); // Packet 5
2869 if (GetParam().no_stop_waiting) {
2870 // Expect no stop waiting frame is sent.
2871 EXPECT_FALSE(least_unacked().IsInitialized());
2872 } else {
2873 EXPECT_EQ(QuicPacketNumber(1u), least_unacked());
2874 }
2875
2876 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
2877
2878 // Peer acks up to packet 3.
2879 QuicAckFrame frame = InitAckFrame(3);
2880 ProcessAckPacket(&frame);
2881 SendAckPacketToPeer(); // Packet 6
2882
2883 // As soon as we've acked one, we skip ack packets 2 and 3 and note lack of
2884 // ack for 4.
2885 if (GetParam().no_stop_waiting) {
2886 // Expect no stop waiting frame is sent.
2887 EXPECT_FALSE(least_unacked().IsInitialized());
2888 } else {
2889 EXPECT_EQ(QuicPacketNumber(4u), least_unacked());
2890 }
2891
2892 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
2893
2894 // Peer acks up to packet 4, the last packet.
2895 QuicAckFrame frame2 = InitAckFrame(6);
2896 ProcessAckPacket(&frame2); // Acks don't instigate acks.
2897
2898 // Verify that we did not send an ack.
2899 EXPECT_EQ(QuicPacketNumber(6u), writer_->header().packet_number);
2900
2901 // So the last ack has not changed.
2902 if (GetParam().no_stop_waiting) {
2903 // Expect no stop waiting frame is sent.
2904 EXPECT_FALSE(least_unacked().IsInitialized());
2905 } else {
2906 EXPECT_EQ(QuicPacketNumber(4u), least_unacked());
2907 }
2908
2909 // If we force an ack, we shouldn't change our retransmit state.
2910 SendAckPacketToPeer(); // Packet 7
2911 if (GetParam().no_stop_waiting) {
2912 // Expect no stop waiting frame is sent.
2913 EXPECT_FALSE(least_unacked().IsInitialized());
2914 } else {
2915 EXPECT_EQ(QuicPacketNumber(7u), least_unacked());
2916 }
2917
2918 // But if we send more data it should.
2919 SendStreamDataToPeer(1, "eep", 6, NO_FIN, &last_packet); // Packet 8
2920 EXPECT_EQ(QuicPacketNumber(8u), last_packet);
2921 SendAckPacketToPeer(); // Packet 9
2922 if (GetParam().no_stop_waiting) {
2923 // Expect no stop waiting frame is sent.
2924 EXPECT_FALSE(least_unacked().IsInitialized());
2925 } else {
2926 EXPECT_EQ(QuicPacketNumber(7u), least_unacked());
2927 }
2928}
2929
2930// QuicConnection should record the packet sent-time prior to sending the
2931// packet.
2932TEST_P(QuicConnectionTest, RecordSentTimeBeforePacketSent) {
2933 // We're using a MockClock for the tests, so we have complete control over the
2934 // time.
2935 // Our recorded timestamp for the last packet sent time will be passed in to
2936 // the send_algorithm. Make sure that it is set to the correct value.
2937 QuicTime actual_recorded_send_time = QuicTime::Zero();
2938 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
2939 .WillOnce(SaveArg<0>(&actual_recorded_send_time));
2940
2941 // First send without any pause and check the result.
2942 QuicTime expected_recorded_send_time = clock_.Now();
2943 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
2944 EXPECT_EQ(expected_recorded_send_time, actual_recorded_send_time)
2945 << "Expected time = " << expected_recorded_send_time.ToDebuggingValue()
2946 << ". Actual time = " << actual_recorded_send_time.ToDebuggingValue();
2947
2948 // Now pause during the write, and check the results.
2949 actual_recorded_send_time = QuicTime::Zero();
2950 const QuicTime::Delta write_pause_time_delta =
2951 QuicTime::Delta::FromMilliseconds(5000);
2952 SetWritePauseTimeDelta(write_pause_time_delta);
2953 expected_recorded_send_time = clock_.Now();
2954
2955 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
2956 .WillOnce(SaveArg<0>(&actual_recorded_send_time));
2957 connection_.SendStreamDataWithString(2, "baz", 0, NO_FIN);
2958 EXPECT_EQ(expected_recorded_send_time, actual_recorded_send_time)
2959 << "Expected time = " << expected_recorded_send_time.ToDebuggingValue()
2960 << ". Actual time = " << actual_recorded_send_time.ToDebuggingValue();
2961}
2962
2963TEST_P(QuicConnectionTest, FramePacking) {
2964 // Send two stream frames in 1 packet by queueing them.
2965 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
2966 {
2967 QuicConnection::ScopedPacketFlusher flusher(&connection_,
2968 QuicConnection::SEND_ACK);
2969 connection_.SendStreamData3();
2970 connection_.SendStreamData5();
2971 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
2972 }
2973 EXPECT_EQ(0u, connection_.NumQueuedPackets());
2974 EXPECT_FALSE(connection_.HasQueuedData());
2975
2976 // Parse the last packet and ensure it's an ack and two stream frames from
2977 // two different streams.
2978 if (GetParam().no_stop_waiting) {
2979 EXPECT_EQ(2u, writer_->frame_count());
2980 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
2981 } else {
2982 EXPECT_EQ(2u, writer_->frame_count());
2983 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
2984 }
2985
2986 EXPECT_TRUE(writer_->ack_frames().empty());
2987
2988 ASSERT_EQ(2u, writer_->stream_frames().size());
2989 EXPECT_EQ(GetNthClientInitiatedStreamId(1, connection_.transport_version()),
2990 writer_->stream_frames()[0]->stream_id);
2991 EXPECT_EQ(GetNthClientInitiatedStreamId(2, connection_.transport_version()),
2992 writer_->stream_frames()[1]->stream_id);
2993}
2994
2995TEST_P(QuicConnectionTest, FramePackingNonCryptoThenCrypto) {
2996 // Send two stream frames (one non-crypto, then one crypto) in 2 packets by
2997 // queueing them.
2998 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
2999 {
3000 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
3001 QuicConnection::ScopedPacketFlusher flusher(&connection_,
3002 QuicConnection::SEND_ACK);
3003 connection_.SendStreamData3();
3004 connection_.SendCryptoStreamData();
3005 }
3006 EXPECT_EQ(0u, connection_.NumQueuedPackets());
3007 EXPECT_FALSE(connection_.HasQueuedData());
3008
3009 // Parse the last packet and ensure it's the crypto stream frame.
3010 EXPECT_EQ(2u, writer_->frame_count());
3011 ASSERT_EQ(1u, writer_->padding_frames().size());
QUICHE teamea740082019-03-11 17:58:43 -07003012 if (!QuicVersionUsesCryptoFrames(connection_.transport_version())) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05003013 ASSERT_EQ(1u, writer_->stream_frames().size());
3014 EXPECT_EQ(QuicUtils::GetCryptoStreamId(connection_.transport_version()),
3015 writer_->stream_frames()[0]->stream_id);
3016 } else {
3017 EXPECT_EQ(1u, writer_->crypto_frames().size());
3018 }
3019}
3020
3021TEST_P(QuicConnectionTest, FramePackingCryptoThenNonCrypto) {
3022 // Send two stream frames (one crypto, then one non-crypto) in 2 packets by
3023 // queueing them.
3024 {
3025 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
3026 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
3027 QuicConnection::ScopedPacketFlusher flusher(&connection_,
3028 QuicConnection::SEND_ACK);
3029 connection_.SendCryptoStreamData();
3030 connection_.SendStreamData3();
3031 }
3032 EXPECT_EQ(0u, connection_.NumQueuedPackets());
3033 EXPECT_FALSE(connection_.HasQueuedData());
3034
3035 // Parse the last packet and ensure it's the stream frame from stream 3.
nharper55fa6132019-05-07 19:37:21 -07003036 size_t padding_frame_count = writer_->padding_frames().size();
3037 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003038 ASSERT_EQ(1u, writer_->stream_frames().size());
3039 EXPECT_EQ(GetNthClientInitiatedStreamId(1, connection_.transport_version()),
3040 writer_->stream_frames()[0]->stream_id);
3041}
3042
3043TEST_P(QuicConnectionTest, FramePackingAckResponse) {
QUICHE teamcd098022019-03-22 18:49:55 -07003044 if (connection_.SupportsMultiplePacketNumberSpaces()) {
3045 return;
3046 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003047 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3048 // Process a data packet to queue up a pending ack.
3049 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
3050 ProcessDataPacket(1);
3051 QuicPacketNumber last_packet;
nharper46833c32019-05-15 21:33:05 -07003052 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
3053 connection_.SendCryptoDataWithString("foo", 0);
3054 } else {
3055 SendStreamDataToPeer(
3056 QuicUtils::GetCryptoStreamId(connection_.transport_version()), "foo", 0,
3057 NO_FIN, &last_packet);
3058 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003059 // Verify ack is bundled with outging packet.
3060 EXPECT_FALSE(writer_->ack_frames().empty());
3061
3062 EXPECT_CALL(visitor_, OnCanWrite())
3063 .WillOnce(DoAll(IgnoreResult(InvokeWithoutArgs(
3064 &connection_, &TestConnection::SendStreamData3)),
3065 IgnoreResult(InvokeWithoutArgs(
3066 &connection_, &TestConnection::SendStreamData5))));
3067
3068 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3069
3070 // Process a data packet to cause the visitor's OnCanWrite to be invoked.
3071 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
QUICHE team8c1daa22019-03-13 08:33:41 -07003072 peer_framer_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
3073 QuicMakeUnique<TaggingEncrypter>(0x01));
zhongyi546cc452019-04-12 15:27:49 -07003074 SetDecrypter(ENCRYPTION_FORWARD_SECURE,
3075 QuicMakeUnique<StrictTaggingDecrypter>(0x01));
nharper2c9f02a2019-05-08 10:25:50 -07003076 ProcessDataPacket(2);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003077
3078 EXPECT_EQ(0u, connection_.NumQueuedPackets());
3079 EXPECT_FALSE(connection_.HasQueuedData());
3080
3081 // Parse the last packet and ensure it's an ack and two stream frames from
3082 // two different streams.
3083 if (GetParam().no_stop_waiting) {
3084 EXPECT_EQ(3u, writer_->frame_count());
3085 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
3086 } else {
3087 EXPECT_EQ(4u, writer_->frame_count());
3088 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
3089 }
3090 EXPECT_FALSE(writer_->ack_frames().empty());
3091 ASSERT_EQ(2u, writer_->stream_frames().size());
3092 EXPECT_EQ(GetNthClientInitiatedStreamId(1, connection_.transport_version()),
3093 writer_->stream_frames()[0]->stream_id);
3094 EXPECT_EQ(GetNthClientInitiatedStreamId(2, connection_.transport_version()),
3095 writer_->stream_frames()[1]->stream_id);
3096}
3097
3098TEST_P(QuicConnectionTest, FramePackingSendv) {
nharper46833c32019-05-15 21:33:05 -07003099 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003100 // Send data in 1 packet by writing multiple blocks in a single iovector
3101 // using writev.
3102 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
3103
3104 char data[] = "ABCDEF";
3105 struct iovec iov[2];
3106 iov[0].iov_base = data;
3107 iov[0].iov_len = 4;
3108 iov[1].iov_base = data + 4;
3109 iov[1].iov_len = 2;
nharper46833c32019-05-15 21:33:05 -07003110 QuicStreamId stream_id = QuicUtils::GetFirstBidirectionalStreamId(
3111 connection_.transport_version(), Perspective::IS_CLIENT);
3112 connection_.SaveAndSendStreamData(stream_id, iov, 2, 6, 0, NO_FIN);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003113
3114 EXPECT_EQ(0u, connection_.NumQueuedPackets());
3115 EXPECT_FALSE(connection_.HasQueuedData());
3116
3117 // Parse the last packet and ensure multiple iovector blocks have
3118 // been packed into a single stream frame from one stream.
nharper46833c32019-05-15 21:33:05 -07003119 EXPECT_EQ(1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003120 EXPECT_EQ(1u, writer_->stream_frames().size());
nharper46833c32019-05-15 21:33:05 -07003121 EXPECT_EQ(0u, writer_->padding_frames().size());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003122 QuicStreamFrame* frame = writer_->stream_frames()[0].get();
nharper46833c32019-05-15 21:33:05 -07003123 EXPECT_EQ(stream_id, frame->stream_id);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003124 EXPECT_EQ("ABCDEF", QuicStringPiece(frame->data_buffer, frame->data_length));
3125}
3126
3127TEST_P(QuicConnectionTest, FramePackingSendvQueued) {
nharper46833c32019-05-15 21:33:05 -07003128 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003129 // Try to send two stream frames in 1 packet by using writev.
3130 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
3131
3132 BlockOnNextWrite();
3133 char data[] = "ABCDEF";
3134 struct iovec iov[2];
3135 iov[0].iov_base = data;
3136 iov[0].iov_len = 4;
3137 iov[1].iov_base = data + 4;
3138 iov[1].iov_len = 2;
nharper46833c32019-05-15 21:33:05 -07003139 QuicStreamId stream_id = QuicUtils::GetFirstBidirectionalStreamId(
3140 connection_.transport_version(), Perspective::IS_CLIENT);
3141 connection_.SaveAndSendStreamData(stream_id, iov, 2, 6, 0, NO_FIN);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003142
3143 EXPECT_EQ(1u, connection_.NumQueuedPackets());
3144 EXPECT_TRUE(connection_.HasQueuedData());
3145
3146 // Unblock the writes and actually send.
3147 writer_->SetWritable();
3148 connection_.OnCanWrite();
3149 EXPECT_EQ(0u, connection_.NumQueuedPackets());
3150
3151 // Parse the last packet and ensure it's one stream frame from one stream.
nharper46833c32019-05-15 21:33:05 -07003152 EXPECT_EQ(1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003153 EXPECT_EQ(1u, writer_->stream_frames().size());
nharper46833c32019-05-15 21:33:05 -07003154 EXPECT_EQ(0u, writer_->padding_frames().size());
3155 EXPECT_EQ(stream_id, writer_->stream_frames()[0]->stream_id);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003156}
3157
3158TEST_P(QuicConnectionTest, SendingZeroBytes) {
3159 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
3160 // Send a zero byte write with a fin using writev.
3161 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
nharper46833c32019-05-15 21:33:05 -07003162 QuicStreamId stream_id = QuicUtils::GetFirstBidirectionalStreamId(
3163 connection_.transport_version(), Perspective::IS_CLIENT);
3164 connection_.SaveAndSendStreamData(stream_id, nullptr, 0, 0, 0, FIN);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003165
3166 EXPECT_EQ(0u, connection_.NumQueuedPackets());
3167 EXPECT_FALSE(connection_.HasQueuedData());
3168
nharper55fa6132019-05-07 19:37:21 -07003169 // Padding frames are added by v99 to ensure a minimum packet size.
3170 size_t extra_padding_frames = 0;
3171 if (GetParam().version.HasHeaderProtection()) {
3172 extra_padding_frames = 1;
3173 }
3174
QUICHE teama6ef0a62019-03-07 20:34:33 -05003175 // Parse the last packet and ensure it's one stream frame from one stream.
nharper55fa6132019-05-07 19:37:21 -07003176 EXPECT_EQ(1u + extra_padding_frames, writer_->frame_count());
3177 EXPECT_EQ(extra_padding_frames, writer_->padding_frames().size());
3178 ASSERT_EQ(1u, writer_->stream_frames().size());
nharper46833c32019-05-15 21:33:05 -07003179 EXPECT_EQ(stream_id, writer_->stream_frames()[0]->stream_id);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003180 EXPECT_TRUE(writer_->stream_frames()[0]->fin);
3181}
3182
3183TEST_P(QuicConnectionTest, LargeSendWithPendingAck) {
3184 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
3185 // Set the ack alarm by processing a ping frame.
3186 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3187
3188 // Processs a PING frame.
3189 ProcessFramePacket(QuicFrame(QuicPingFrame()));
3190 // Ensure that this has caused the ACK alarm to be set.
3191 QuicAlarm* ack_alarm = QuicConnectionPeer::GetAckAlarm(&connection_);
3192 EXPECT_TRUE(ack_alarm->IsSet());
3193
3194 // Send data and ensure the ack is bundled.
3195 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(8);
3196 size_t len = 10000;
3197 std::unique_ptr<char[]> data_array(new char[len]);
3198 memset(data_array.get(), '?', len);
3199 struct iovec iov;
3200 iov.iov_base = data_array.get();
3201 iov.iov_len = len;
3202 QuicConsumedData consumed = connection_.SaveAndSendStreamData(
3203 QuicUtils::GetHeadersStreamId(connection_.transport_version()), &iov, 1,
3204 len, 0, FIN);
3205 EXPECT_EQ(len, consumed.bytes_consumed);
3206 EXPECT_TRUE(consumed.fin_consumed);
3207 EXPECT_EQ(0u, connection_.NumQueuedPackets());
3208 EXPECT_FALSE(connection_.HasQueuedData());
3209
3210 // Parse the last packet and ensure it's one stream frame with a fin.
3211 EXPECT_EQ(1u, writer_->frame_count());
nharper55fa6132019-05-07 19:37:21 -07003212 ASSERT_EQ(1u, writer_->stream_frames().size());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003213 EXPECT_EQ(QuicUtils::GetHeadersStreamId(connection_.transport_version()),
3214 writer_->stream_frames()[0]->stream_id);
3215 EXPECT_TRUE(writer_->stream_frames()[0]->fin);
3216 // Ensure the ack alarm was cancelled when the ack was sent.
3217 EXPECT_FALSE(ack_alarm->IsSet());
3218}
3219
3220TEST_P(QuicConnectionTest, OnCanWrite) {
3221 // Visitor's OnCanWrite will send data, but will have more pending writes.
3222 EXPECT_CALL(visitor_, OnCanWrite())
3223 .WillOnce(DoAll(IgnoreResult(InvokeWithoutArgs(
3224 &connection_, &TestConnection::SendStreamData3)),
3225 IgnoreResult(InvokeWithoutArgs(
3226 &connection_, &TestConnection::SendStreamData5))));
3227 {
3228 InSequence seq;
3229 EXPECT_CALL(visitor_, WillingAndAbleToWrite()).WillOnce(Return(true));
3230 EXPECT_CALL(visitor_, WillingAndAbleToWrite())
3231 .WillRepeatedly(Return(false));
3232 }
3233
3234 EXPECT_CALL(*send_algorithm_, CanSend(_))
3235 .WillRepeatedly(testing::Return(true));
3236
3237 connection_.OnCanWrite();
3238
3239 // Parse the last packet and ensure it's the two stream frames from
3240 // two different streams.
3241 EXPECT_EQ(2u, writer_->frame_count());
3242 EXPECT_EQ(2u, writer_->stream_frames().size());
3243 EXPECT_EQ(GetNthClientInitiatedStreamId(1, connection_.transport_version()),
3244 writer_->stream_frames()[0]->stream_id);
3245 EXPECT_EQ(GetNthClientInitiatedStreamId(2, connection_.transport_version()),
3246 writer_->stream_frames()[1]->stream_id);
3247}
3248
3249TEST_P(QuicConnectionTest, RetransmitOnNack) {
3250 QuicPacketNumber last_packet;
3251 QuicByteCount second_packet_size;
3252 SendStreamDataToPeer(3, "foo", 0, NO_FIN, &last_packet); // Packet 1
3253 second_packet_size =
3254 SendStreamDataToPeer(3, "foos", 3, NO_FIN, &last_packet); // Packet 2
3255 SendStreamDataToPeer(3, "fooos", 7, NO_FIN, &last_packet); // Packet 3
3256
3257 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3258
3259 // Don't lose a packet on an ack, and nothing is retransmitted.
3260 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3261 QuicAckFrame ack_one = InitAckFrame(1);
3262 ProcessAckPacket(&ack_one);
3263
3264 // Lose a packet and ensure it triggers retransmission.
3265 QuicAckFrame nack_two = ConstructAckFrame(3, 2);
3266 LostPacketVector lost_packets;
dschinazi66dea072019-04-09 11:41:06 -07003267 lost_packets.push_back(
3268 LostPacket(QuicPacketNumber(2), kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05003269 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
3270 .WillOnce(SetArgPointee<5>(lost_packets));
3271 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3272 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3273 EXPECT_FALSE(QuicPacketCreatorPeer::SendVersionInPacket(creator_));
3274 ProcessAckPacket(&nack_two);
3275}
3276
3277TEST_P(QuicConnectionTest, DoNotSendQueuedPacketForResetStream) {
3278 // Block the connection to queue the packet.
3279 BlockOnNextWrite();
3280
3281 QuicStreamId stream_id = 2;
3282 connection_.SendStreamDataWithString(stream_id, "foo", 0, NO_FIN);
3283
3284 // Now that there is a queued packet, reset the stream.
3285 SendRstStream(stream_id, QUIC_ERROR_PROCESSING_STREAM, 3);
3286
3287 // Unblock the connection and verify that only the RST_STREAM is sent.
3288 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3289 writer_->SetWritable();
3290 connection_.OnCanWrite();
3291 if (!connection_.session_decides_what_to_write()) {
3292 // OnCanWrite will cause RST_STREAM be sent again.
3293 connection_.SendControlFrame(QuicFrame(new QuicRstStreamFrame(
3294 1, stream_id, QUIC_ERROR_PROCESSING_STREAM, 14)));
3295 }
nharper55fa6132019-05-07 19:37:21 -07003296 size_t padding_frame_count = writer_->padding_frames().size();
3297 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003298 EXPECT_EQ(1u, writer_->rst_stream_frames().size());
3299}
3300
3301TEST_P(QuicConnectionTest, SendQueuedPacketForQuicRstStreamNoError) {
3302 // Block the connection to queue the packet.
3303 BlockOnNextWrite();
3304
3305 QuicStreamId stream_id = 2;
3306 connection_.SendStreamDataWithString(stream_id, "foo", 0, NO_FIN);
3307
3308 // Now that there is a queued packet, reset the stream.
3309 SendRstStream(stream_id, QUIC_STREAM_NO_ERROR, 3);
3310
3311 // Unblock the connection and verify that the RST_STREAM is sent and the data
3312 // packet is sent.
3313 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AtLeast(2));
3314 writer_->SetWritable();
3315 connection_.OnCanWrite();
3316 if (!connection_.session_decides_what_to_write()) {
3317 // OnCanWrite will cause RST_STREAM be sent again.
3318 connection_.SendControlFrame(QuicFrame(
3319 new QuicRstStreamFrame(1, stream_id, QUIC_STREAM_NO_ERROR, 14)));
3320 }
nharper55fa6132019-05-07 19:37:21 -07003321 size_t padding_frame_count = writer_->padding_frames().size();
3322 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003323 EXPECT_EQ(1u, writer_->rst_stream_frames().size());
3324}
3325
3326TEST_P(QuicConnectionTest, DoNotRetransmitForResetStreamOnNack) {
3327 QuicStreamId stream_id = 2;
3328 QuicPacketNumber last_packet;
3329 SendStreamDataToPeer(stream_id, "foo", 0, NO_FIN, &last_packet);
3330 SendStreamDataToPeer(stream_id, "foos", 3, NO_FIN, &last_packet);
3331 SendStreamDataToPeer(stream_id, "fooos", 7, NO_FIN, &last_packet);
3332
3333 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3334 SendRstStream(stream_id, QUIC_ERROR_PROCESSING_STREAM, 12);
3335
3336 // Lose a packet and ensure it does not trigger retransmission.
3337 QuicAckFrame nack_two = ConstructAckFrame(last_packet, last_packet - 1);
3338 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3339 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
3340 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3341 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
3342 ProcessAckPacket(&nack_two);
3343}
3344
3345TEST_P(QuicConnectionTest, RetransmitForQuicRstStreamNoErrorOnNack) {
3346 QuicStreamId stream_id = 2;
3347 QuicPacketNumber last_packet;
3348 SendStreamDataToPeer(stream_id, "foo", 0, NO_FIN, &last_packet);
3349 SendStreamDataToPeer(stream_id, "foos", 3, NO_FIN, &last_packet);
3350 SendStreamDataToPeer(stream_id, "fooos", 7, NO_FIN, &last_packet);
3351
3352 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3353 SendRstStream(stream_id, QUIC_STREAM_NO_ERROR, 12);
3354
3355 // Lose a packet, ensure it triggers retransmission.
3356 QuicAckFrame nack_two = ConstructAckFrame(last_packet, last_packet - 1);
3357 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3358 LostPacketVector lost_packets;
dschinazi66dea072019-04-09 11:41:06 -07003359 lost_packets.push_back(LostPacket(last_packet - 1, kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05003360 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
3361 .WillOnce(SetArgPointee<5>(lost_packets));
3362 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3363 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AtLeast(1));
3364 ProcessAckPacket(&nack_two);
3365}
3366
3367TEST_P(QuicConnectionTest, DoNotRetransmitForResetStreamOnRTO) {
3368 QuicStreamId stream_id = 2;
3369 QuicPacketNumber last_packet;
3370 SendStreamDataToPeer(stream_id, "foo", 0, NO_FIN, &last_packet);
3371
3372 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3373 SendRstStream(stream_id, QUIC_ERROR_PROCESSING_STREAM, 3);
3374
3375 // Fire the RTO and verify that the RST_STREAM is resent, not stream data.
3376 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3377 clock_.AdvanceTime(DefaultRetransmissionTime());
3378 connection_.GetRetransmissionAlarm()->Fire();
nharper55fa6132019-05-07 19:37:21 -07003379 size_t padding_frame_count = writer_->padding_frames().size();
3380 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003381 EXPECT_EQ(1u, writer_->rst_stream_frames().size());
3382 EXPECT_EQ(stream_id, writer_->rst_stream_frames().front().stream_id);
3383}
3384
3385// Ensure that if the only data in flight is non-retransmittable, the
3386// retransmission alarm is not set.
3387TEST_P(QuicConnectionTest, CancelRetransmissionAlarmAfterResetStream) {
3388 QuicStreamId stream_id = 2;
3389 QuicPacketNumber last_data_packet;
3390 SendStreamDataToPeer(stream_id, "foo", 0, NO_FIN, &last_data_packet);
3391
3392 // Cancel the stream.
3393 const QuicPacketNumber rst_packet = last_data_packet + 1;
3394 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, rst_packet, _, _)).Times(1);
3395 SendRstStream(stream_id, QUIC_ERROR_PROCESSING_STREAM, 3);
3396
3397 // Ack the RST_STREAM frame (since it's retransmittable), but not the data
3398 // packet, which is no longer retransmittable since the stream was cancelled.
3399 QuicAckFrame nack_stream_data =
3400 ConstructAckFrame(rst_packet, last_data_packet);
3401 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3402 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3403 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
3404 ProcessAckPacket(&nack_stream_data);
3405
3406 // Ensure that the data is still in flight, but the retransmission alarm is no
3407 // longer set.
ianswett9f459cb2019-04-21 06:39:59 -07003408 EXPECT_GT(manager_->GetBytesInFlight(), 0u);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003409 if (GetQuicReloadableFlag(quic_optimize_inflight_check)) {
3410 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
3411 // Firing the alarm should remove all bytes_in_flight.
3412 connection_.GetRetransmissionAlarm()->Fire();
ianswett9f459cb2019-04-21 06:39:59 -07003413 EXPECT_EQ(0u, manager_->GetBytesInFlight());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003414 }
3415 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
3416}
3417
3418TEST_P(QuicConnectionTest, RetransmitForQuicRstStreamNoErrorOnRTO) {
3419 connection_.SetMaxTailLossProbes(0);
3420
3421 QuicStreamId stream_id = 2;
3422 QuicPacketNumber last_packet;
3423 SendStreamDataToPeer(stream_id, "foo", 0, NO_FIN, &last_packet);
3424
3425 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3426 SendRstStream(stream_id, QUIC_STREAM_NO_ERROR, 3);
3427
3428 // Fire the RTO and verify that the RST_STREAM is resent, the stream data
3429 // is sent.
3430 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AtLeast(2));
3431 clock_.AdvanceTime(DefaultRetransmissionTime());
3432 connection_.GetRetransmissionAlarm()->Fire();
nharper55fa6132019-05-07 19:37:21 -07003433 size_t padding_frame_count = writer_->padding_frames().size();
3434 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003435 ASSERT_EQ(1u, writer_->rst_stream_frames().size());
3436 EXPECT_EQ(stream_id, writer_->rst_stream_frames().front().stream_id);
3437}
3438
3439TEST_P(QuicConnectionTest, DoNotSendPendingRetransmissionForResetStream) {
3440 QuicStreamId stream_id = 2;
3441 QuicPacketNumber last_packet;
3442 SendStreamDataToPeer(stream_id, "foo", 0, NO_FIN, &last_packet);
3443 SendStreamDataToPeer(stream_id, "foos", 3, NO_FIN, &last_packet);
3444 BlockOnNextWrite();
3445 connection_.SendStreamDataWithString(stream_id, "fooos", 7, NO_FIN);
3446
3447 // Lose a packet which will trigger a pending retransmission.
3448 QuicAckFrame ack = ConstructAckFrame(last_packet, last_packet - 1);
3449 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3450 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
3451 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3452 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
3453 ProcessAckPacket(&ack);
3454
3455 SendRstStream(stream_id, QUIC_ERROR_PROCESSING_STREAM, 12);
3456
3457 // Unblock the connection and verify that the RST_STREAM is sent but not the
3458 // second data packet nor a retransmit.
3459 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3460 writer_->SetWritable();
3461 connection_.OnCanWrite();
3462 if (!connection_.session_decides_what_to_write()) {
3463 // OnCanWrite will cause this RST_STREAM_FRAME be sent again.
3464 connection_.SendControlFrame(QuicFrame(new QuicRstStreamFrame(
3465 1, stream_id, QUIC_ERROR_PROCESSING_STREAM, 14)));
3466 }
nharper55fa6132019-05-07 19:37:21 -07003467 size_t padding_frame_count = writer_->padding_frames().size();
3468 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
zhongyi546cc452019-04-12 15:27:49 -07003469 ASSERT_EQ(1u, writer_->rst_stream_frames().size());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003470 EXPECT_EQ(stream_id, writer_->rst_stream_frames().front().stream_id);
3471}
3472
3473TEST_P(QuicConnectionTest, SendPendingRetransmissionForQuicRstStreamNoError) {
3474 QuicStreamId stream_id = 2;
3475 QuicPacketNumber last_packet;
3476 SendStreamDataToPeer(stream_id, "foo", 0, NO_FIN, &last_packet);
3477 SendStreamDataToPeer(stream_id, "foos", 3, NO_FIN, &last_packet);
3478 BlockOnNextWrite();
3479 connection_.SendStreamDataWithString(stream_id, "fooos", 7, NO_FIN);
3480
3481 // Lose a packet which will trigger a pending retransmission.
3482 QuicAckFrame ack = ConstructAckFrame(last_packet, last_packet - 1);
3483 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3484 LostPacketVector lost_packets;
dschinazi66dea072019-04-09 11:41:06 -07003485 lost_packets.push_back(LostPacket(last_packet - 1, kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05003486 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
3487 .WillOnce(SetArgPointee<5>(lost_packets));
3488 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3489 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
3490 ProcessAckPacket(&ack);
3491
3492 SendRstStream(stream_id, QUIC_STREAM_NO_ERROR, 12);
3493
3494 // Unblock the connection and verify that the RST_STREAM is sent and the
3495 // second data packet or a retransmit is sent.
3496 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AtLeast(2));
3497 writer_->SetWritable();
3498 connection_.OnCanWrite();
3499 // The RST_STREAM_FRAME is sent after queued packets and pending
3500 // retransmission.
3501 connection_.SendControlFrame(QuicFrame(
3502 new QuicRstStreamFrame(1, stream_id, QUIC_STREAM_NO_ERROR, 14)));
nharper55fa6132019-05-07 19:37:21 -07003503 size_t padding_frame_count = writer_->padding_frames().size();
3504 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003505 EXPECT_EQ(1u, writer_->rst_stream_frames().size());
3506}
3507
3508TEST_P(QuicConnectionTest, RetransmitAckedPacket) {
3509 QuicPacketNumber last_packet;
3510 SendStreamDataToPeer(1, "foo", 0, NO_FIN, &last_packet); // Packet 1
3511 SendStreamDataToPeer(1, "foos", 3, NO_FIN, &last_packet); // Packet 2
3512 SendStreamDataToPeer(1, "fooos", 7, NO_FIN, &last_packet); // Packet 3
3513
3514 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3515
3516 // Instigate a loss with an ack.
3517 QuicAckFrame nack_two = ConstructAckFrame(3, 2);
3518 // The first nack should trigger a fast retransmission, but we'll be
3519 // write blocked, so the packet will be queued.
3520 BlockOnNextWrite();
3521
3522 LostPacketVector lost_packets;
dschinazi66dea072019-04-09 11:41:06 -07003523 lost_packets.push_back(
3524 LostPacket(QuicPacketNumber(2), kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05003525 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
3526 .WillOnce(SetArgPointee<5>(lost_packets));
3527 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3528 ProcessAckPacket(&nack_two);
3529 EXPECT_EQ(1u, connection_.NumQueuedPackets());
3530
3531 // Now, ack the previous transmission.
3532 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
3533 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(false, _, _, _, _));
3534 QuicAckFrame ack_all = InitAckFrame(3);
3535 ProcessAckPacket(&ack_all);
3536
3537 // Unblock the socket and attempt to send the queued packets. We will always
3538 // send the retransmission.
3539 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(4), _, _))
3540 .Times(1);
3541
3542 writer_->SetWritable();
3543 connection_.OnCanWrite();
3544
3545 EXPECT_EQ(0u, connection_.NumQueuedPackets());
3546 // We do not store retransmittable frames of this retransmission.
3547 EXPECT_FALSE(QuicConnectionPeer::HasRetransmittableFrames(&connection_, 4));
3548}
3549
3550TEST_P(QuicConnectionTest, RetransmitNackedLargestObserved) {
3551 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3552 QuicPacketNumber original, second;
3553
3554 QuicByteCount packet_size =
3555 SendStreamDataToPeer(3, "foo", 0, NO_FIN, &original); // 1st packet.
3556 SendStreamDataToPeer(3, "bar", 3, NO_FIN, &second); // 2nd packet.
3557
3558 QuicAckFrame frame = InitAckFrame({{second, second + 1}});
3559 // The first nack should retransmit the largest observed packet.
3560 LostPacketVector lost_packets;
dschinazi66dea072019-04-09 11:41:06 -07003561 lost_packets.push_back(LostPacket(original, kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05003562 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
3563 .WillOnce(SetArgPointee<5>(lost_packets));
3564 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3565 // Packet 1 is short header for IETF QUIC because the encryption level
3566 // switched to ENCRYPTION_FORWARD_SECURE in SendStreamDataToPeer.
3567 EXPECT_CALL(
3568 *send_algorithm_,
3569 OnPacketSent(_, _, _,
3570 GetParam().version.transport_version > QUIC_VERSION_43
3571 ? packet_size
3572 : packet_size - kQuicVersionSize,
3573 _));
3574 ProcessAckPacket(&frame);
3575}
3576
3577TEST_P(QuicConnectionTest, QueueAfterTwoRTOs) {
3578 connection_.SetMaxTailLossProbes(0);
3579
3580 for (int i = 0; i < 10; ++i) {
3581 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3582 connection_.SendStreamDataWithString(3, "foo", i * 3, NO_FIN);
3583 }
3584
3585 // Block the writer and ensure they're queued.
3586 BlockOnNextWrite();
3587 clock_.AdvanceTime(DefaultRetransmissionTime());
3588 // Only one packet should be retransmitted.
3589 connection_.GetRetransmissionAlarm()->Fire();
3590 EXPECT_TRUE(connection_.HasQueuedData());
3591
3592 // Unblock the writer.
3593 writer_->SetWritable();
3594 clock_.AdvanceTime(QuicTime::Delta::FromMicroseconds(
3595 2 * DefaultRetransmissionTime().ToMicroseconds()));
3596 // Retransmit already retransmitted packets event though the packet number
3597 // greater than the largest observed.
3598 if (connection_.session_decides_what_to_write()) {
3599 // 2 RTOs + 1 TLP.
3600 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(3);
3601 } else {
3602 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
3603 }
3604 connection_.GetRetransmissionAlarm()->Fire();
3605 connection_.OnCanWrite();
3606}
3607
3608TEST_P(QuicConnectionTest, WriteBlockedBufferedThenSent) {
3609 BlockOnNextWrite();
3610 writer_->set_is_write_blocked_data_buffered(true);
3611 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3612 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
3613 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
3614
3615 writer_->SetWritable();
3616 connection_.OnCanWrite();
3617 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
3618}
3619
3620TEST_P(QuicConnectionTest, WriteBlockedThenSent) {
3621 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
3622 BlockOnNextWrite();
3623 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
3624 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
3625 EXPECT_EQ(1u, connection_.NumQueuedPackets());
3626
3627 // The second packet should also be queued, in order to ensure packets are
3628 // never sent out of order.
3629 writer_->SetWritable();
3630 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
3631 EXPECT_EQ(2u, connection_.NumQueuedPackets());
3632
3633 // Now both are sent in order when we unblock.
3634 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
3635 connection_.OnCanWrite();
3636 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
3637}
3638
3639TEST_P(QuicConnectionTest, RetransmitWriteBlockedAckedOriginalThenSent) {
3640 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3641 connection_.SendStreamDataWithString(3, "foo", 0, NO_FIN);
3642 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
3643
3644 BlockOnNextWrite();
3645 writer_->set_is_write_blocked_data_buffered(true);
3646 // Simulate the retransmission alarm firing.
3647 clock_.AdvanceTime(DefaultRetransmissionTime());
3648 connection_.GetRetransmissionAlarm()->Fire();
3649
3650 // Ack the sent packet before the callback returns, which happens in
3651 // rare circumstances with write blocked sockets.
3652 QuicAckFrame ack = InitAckFrame(1);
3653 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3654 ProcessAckPacket(&ack);
3655
3656 writer_->SetWritable();
3657 connection_.OnCanWrite();
3658 // There is now a pending packet, but with no retransmittable frames.
3659 if (GetQuicReloadableFlag(quic_optimize_inflight_check)) {
3660 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
3661 // Firing the alarm should remove all bytes_in_flight.
3662 connection_.GetRetransmissionAlarm()->Fire();
ianswett9f459cb2019-04-21 06:39:59 -07003663 EXPECT_EQ(0u, manager_->GetBytesInFlight());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003664 }
3665 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
3666 EXPECT_FALSE(QuicConnectionPeer::HasRetransmittableFrames(&connection_, 2));
3667}
3668
3669TEST_P(QuicConnectionTest, AlarmsWhenWriteBlocked) {
3670 // Block the connection.
3671 BlockOnNextWrite();
3672 connection_.SendStreamDataWithString(3, "foo", 0, NO_FIN);
3673 EXPECT_EQ(1u, writer_->packets_write_attempts());
3674 EXPECT_TRUE(writer_->IsWriteBlocked());
3675
3676 // Set the send alarm. Fire the alarm and ensure it doesn't attempt to write.
3677 connection_.GetSendAlarm()->Set(clock_.ApproximateNow());
3678 connection_.GetSendAlarm()->Fire();
3679 EXPECT_TRUE(writer_->IsWriteBlocked());
3680 EXPECT_EQ(1u, writer_->packets_write_attempts());
3681}
3682
3683TEST_P(QuicConnectionTest, NoSendAlarmAfterProcessPacketWhenWriteBlocked) {
3684 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3685
3686 // Block the connection.
3687 BlockOnNextWrite();
3688 connection_.SendStreamDataWithString(3, "foo", 0, NO_FIN);
3689 EXPECT_TRUE(writer_->IsWriteBlocked());
3690 EXPECT_EQ(1u, connection_.NumQueuedPackets());
3691 EXPECT_FALSE(connection_.GetSendAlarm()->IsSet());
3692
3693 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
3694 // Process packet number 1. Can not call ProcessPacket or ProcessDataPacket
3695 // here, because they will fire the alarm after QuicConnection::ProcessPacket
3696 // is returned.
3697 const uint64_t received_packet_num = 1;
3698 const bool has_stop_waiting = false;
QUICHE team6987b4a2019-03-15 16:23:04 -07003699 const EncryptionLevel level = ENCRYPTION_INITIAL;
QUICHE team8c1daa22019-03-13 08:33:41 -07003700 std::unique_ptr<QuicPacket> packet(ConstructDataPacket(
nharper46833c32019-05-15 21:33:05 -07003701 received_packet_num, has_stop_waiting, ENCRYPTION_FORWARD_SECURE));
dschinazi66dea072019-04-09 11:41:06 -07003702 char buffer[kMaxOutgoingPacketSize];
QUICHE teama6ef0a62019-03-07 20:34:33 -05003703 size_t encrypted_length =
3704 peer_framer_.EncryptPayload(level, QuicPacketNumber(received_packet_num),
dschinazi66dea072019-04-09 11:41:06 -07003705 *packet, buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003706 connection_.ProcessUdpPacket(
3707 kSelfAddress, kPeerAddress,
3708 QuicReceivedPacket(buffer, encrypted_length, clock_.Now(), false));
3709
3710 EXPECT_TRUE(writer_->IsWriteBlocked());
3711 EXPECT_FALSE(connection_.GetSendAlarm()->IsSet());
3712}
3713
3714TEST_P(QuicConnectionTest, AddToWriteBlockedListIfWriterBlockedWhenProcessing) {
3715 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3716 SendStreamDataToPeer(1, "foo", 0, NO_FIN, nullptr);
3717
3718 // Simulate the case where a shared writer gets blocked by another connection.
3719 writer_->SetWriteBlocked();
3720
3721 // Process an ACK, make sure the connection calls visitor_->OnWriteBlocked().
3722 QuicAckFrame ack1 = InitAckFrame(1);
3723 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(_, _, _, _, _));
3724 EXPECT_CALL(visitor_, OnWriteBlocked()).Times(1);
3725 ProcessAckPacket(1, &ack1);
3726}
3727
3728TEST_P(QuicConnectionTest, DoNotAddToWriteBlockedListAfterDisconnect) {
3729 writer_->SetBatchMode(true);
3730 EXPECT_TRUE(connection_.connected());
3731 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PEER_GOING_AWAY, _,
3732 ConnectionCloseSource::FROM_SELF));
3733
3734 EXPECT_CALL(visitor_, OnWriteBlocked()).Times(0);
3735
3736 {
3737 QuicConnection::ScopedPacketFlusher flusher(&connection_,
3738 QuicConnection::NO_ACK);
3739 connection_.CloseConnection(QUIC_PEER_GOING_AWAY, "no reason",
3740 ConnectionCloseBehavior::SILENT_CLOSE);
3741
3742 EXPECT_FALSE(connection_.connected());
3743 writer_->SetWriteBlocked();
3744 }
3745}
3746
3747TEST_P(QuicConnectionTest, AddToWriteBlockedListIfBlockedOnFlushPackets) {
3748 writer_->SetBatchMode(true);
3749 writer_->BlockOnNextFlush();
3750
3751 EXPECT_CALL(visitor_, OnWriteBlocked()).Times(1);
3752 {
3753 QuicConnection::ScopedPacketFlusher flusher(&connection_,
3754 QuicConnection::NO_ACK);
3755 // flusher's destructor will call connection_.FlushPackets, which should add
3756 // the connection to the write blocked list.
3757 }
3758}
3759
3760TEST_P(QuicConnectionTest, NoLimitPacketsPerNack) {
3761 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3762 int offset = 0;
3763 // Send packets 1 to 15.
3764 for (int i = 0; i < 15; ++i) {
3765 SendStreamDataToPeer(1, "foo", offset, NO_FIN, nullptr);
3766 offset += 3;
3767 }
3768
3769 // Ack 15, nack 1-14.
3770
3771 QuicAckFrame nack =
3772 InitAckFrame({{QuicPacketNumber(15), QuicPacketNumber(16)}});
3773
3774 // 14 packets have been NACK'd and lost.
3775 LostPacketVector lost_packets;
3776 for (int i = 1; i < 15; ++i) {
dschinazi66dea072019-04-09 11:41:06 -07003777 lost_packets.push_back(
3778 LostPacket(QuicPacketNumber(i), kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05003779 }
3780 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
3781 .WillOnce(SetArgPointee<5>(lost_packets));
3782 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3783 if (connection_.session_decides_what_to_write()) {
3784 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
3785 } else {
3786 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(14);
3787 }
3788 ProcessAckPacket(&nack);
3789}
3790
3791// Test sending multiple acks from the connection to the session.
3792TEST_P(QuicConnectionTest, MultipleAcks) {
QUICHE teamcd098022019-03-22 18:49:55 -07003793 if (connection_.SupportsMultiplePacketNumberSpaces()) {
3794 return;
3795 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003796 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3797 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
3798 ProcessDataPacket(1);
3799 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 2);
3800 QuicPacketNumber last_packet;
3801 SendStreamDataToPeer(1, "foo", 0, NO_FIN, &last_packet); // Packet 1
3802 EXPECT_EQ(QuicPacketNumber(1u), last_packet);
3803 SendStreamDataToPeer(3, "foo", 0, NO_FIN, &last_packet); // Packet 2
3804 EXPECT_EQ(QuicPacketNumber(2u), last_packet);
3805 SendAckPacketToPeer(); // Packet 3
3806 SendStreamDataToPeer(5, "foo", 0, NO_FIN, &last_packet); // Packet 4
3807 EXPECT_EQ(QuicPacketNumber(4u), last_packet);
3808 SendStreamDataToPeer(1, "foo", 3, NO_FIN, &last_packet); // Packet 5
3809 EXPECT_EQ(QuicPacketNumber(5u), last_packet);
3810 SendStreamDataToPeer(3, "foo", 3, NO_FIN, &last_packet); // Packet 6
3811 EXPECT_EQ(QuicPacketNumber(6u), last_packet);
3812
3813 // Client will ack packets 1, 2, [!3], 4, 5.
3814 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3815 QuicAckFrame frame1 = ConstructAckFrame(5, 3);
3816 ProcessAckPacket(&frame1);
3817
3818 // Now the client implicitly acks 3, and explicitly acks 6.
3819 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3820 QuicAckFrame frame2 = InitAckFrame(6);
3821 ProcessAckPacket(&frame2);
3822}
3823
3824TEST_P(QuicConnectionTest, DontLatchUnackedPacket) {
QUICHE teamcd098022019-03-22 18:49:55 -07003825 if (connection_.SupportsMultiplePacketNumberSpaces()) {
3826 return;
3827 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003828 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
3829 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
3830 ProcessDataPacket(1);
3831 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 2);
3832 SendStreamDataToPeer(1, "foo", 0, NO_FIN, nullptr); // Packet 1;
3833 // From now on, we send acks, so the send algorithm won't mark them pending.
3834 SendAckPacketToPeer(); // Packet 2
3835
3836 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3837 QuicAckFrame frame = InitAckFrame(1);
3838 ProcessAckPacket(&frame);
3839
3840 // Verify that our internal state has least-unacked as 2, because we're still
3841 // waiting for a potential ack for 2.
3842
3843 EXPECT_EQ(QuicPacketNumber(2u), stop_waiting()->least_unacked);
3844
3845 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3846 frame = InitAckFrame(2);
3847 ProcessAckPacket(&frame);
3848 EXPECT_EQ(QuicPacketNumber(3u), stop_waiting()->least_unacked);
3849
3850 // When we send an ack, we make sure our least-unacked makes sense. In this
3851 // case since we're not waiting on an ack for 2 and all packets are acked, we
3852 // set it to 3.
3853 SendAckPacketToPeer(); // Packet 3
3854 // Least_unacked remains at 3 until another ack is received.
3855 EXPECT_EQ(QuicPacketNumber(3u), stop_waiting()->least_unacked);
3856 if (GetParam().no_stop_waiting) {
3857 // Expect no stop waiting frame is sent.
3858 EXPECT_FALSE(least_unacked().IsInitialized());
3859 } else {
3860 // Check that the outgoing ack had its packet number as least_unacked.
3861 EXPECT_EQ(QuicPacketNumber(3u), least_unacked());
3862 }
3863
3864 // Ack the ack, which updates the rtt and raises the least unacked.
3865 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3866 frame = InitAckFrame(3);
3867 ProcessAckPacket(&frame);
3868
3869 SendStreamDataToPeer(1, "bar", 3, NO_FIN, nullptr); // Packet 4
3870 EXPECT_EQ(QuicPacketNumber(4u), stop_waiting()->least_unacked);
3871 SendAckPacketToPeer(); // Packet 5
3872 if (GetParam().no_stop_waiting) {
3873 // Expect no stop waiting frame is sent.
3874 EXPECT_FALSE(least_unacked().IsInitialized());
3875 } else {
3876 EXPECT_EQ(QuicPacketNumber(4u), least_unacked());
3877 }
3878
3879 // Send two data packets at the end, and ensure if the last one is acked,
3880 // the least unacked is raised above the ack packets.
3881 SendStreamDataToPeer(1, "bar", 6, NO_FIN, nullptr); // Packet 6
3882 SendStreamDataToPeer(1, "bar", 9, NO_FIN, nullptr); // Packet 7
3883
3884 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
3885 frame = InitAckFrame({{QuicPacketNumber(1), QuicPacketNumber(5)},
3886 {QuicPacketNumber(7), QuicPacketNumber(8)}});
3887 ProcessAckPacket(&frame);
3888
3889 EXPECT_EQ(QuicPacketNumber(6u), stop_waiting()->least_unacked);
3890}
3891
3892TEST_P(QuicConnectionTest, TLP) {
3893 connection_.SetMaxTailLossProbes(1);
3894
3895 SendStreamDataToPeer(3, "foo", 0, NO_FIN, nullptr);
3896 EXPECT_EQ(QuicPacketNumber(1u), stop_waiting()->least_unacked);
3897 QuicTime retransmission_time =
3898 connection_.GetRetransmissionAlarm()->deadline();
3899 EXPECT_NE(QuicTime::Zero(), retransmission_time);
3900
3901 EXPECT_EQ(QuicPacketNumber(1u), writer_->header().packet_number);
3902 // Simulate the retransmission alarm firing and sending a tlp,
3903 // so send algorithm's OnRetransmissionTimeout is not called.
3904 clock_.AdvanceTime(retransmission_time - clock_.Now());
3905 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(2), _, _));
3906 connection_.GetRetransmissionAlarm()->Fire();
3907 EXPECT_EQ(QuicPacketNumber(2u), writer_->header().packet_number);
3908 // We do not raise the high water mark yet.
3909 EXPECT_EQ(QuicPacketNumber(1u), stop_waiting()->least_unacked);
3910}
3911
zhongyifbb25772019-04-10 16:54:08 -07003912TEST_P(QuicConnectionTest, TailLossProbeDelayForStreamDataInTLPR) {
zhongyifbb25772019-04-10 16:54:08 -07003913 // Set TLPR from QuicConfig.
3914 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
3915 QuicConfig config;
3916 QuicTagVector options;
3917 options.push_back(kTLPR);
3918 config.SetConnectionOptionsToSend(options);
3919 connection_.SetFromConfig(config);
3920 connection_.SetMaxTailLossProbes(1);
3921
3922 SendStreamDataToPeer(3, "foo", 0, NO_FIN, nullptr);
3923 EXPECT_EQ(QuicPacketNumber(1u), stop_waiting()->least_unacked);
3924
3925 QuicTime retransmission_time =
3926 connection_.GetRetransmissionAlarm()->deadline();
3927 EXPECT_NE(QuicTime::Zero(), retransmission_time);
3928 QuicTime::Delta expected_tlp_delay =
3929 0.5 * manager_->GetRttStats()->SmoothedOrInitialRtt();
3930 EXPECT_EQ(expected_tlp_delay, retransmission_time - clock_.Now());
3931
3932 EXPECT_EQ(QuicPacketNumber(1u), writer_->header().packet_number);
3933 // Simulate firing of the retransmission alarm and retransmit the packet.
3934 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(2), _, _));
3935 clock_.AdvanceTime(retransmission_time - clock_.Now());
3936 connection_.GetRetransmissionAlarm()->Fire();
3937 EXPECT_EQ(QuicPacketNumber(2u), writer_->header().packet_number);
3938
3939 // We do not raise the high water mark yet.
3940 EXPECT_EQ(QuicPacketNumber(1u), stop_waiting()->least_unacked);
3941}
3942
3943TEST_P(QuicConnectionTest, TailLossProbeDelayForNonStreamDataInTLPR) {
zhongyifbb25772019-04-10 16:54:08 -07003944 // Set TLPR from QuicConfig.
3945 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
3946 QuicConfig config;
3947 QuicTagVector options;
3948 options.push_back(kTLPR);
3949 config.SetConnectionOptionsToSend(options);
3950 connection_.SetFromConfig(config);
3951 connection_.SetMaxTailLossProbes(1);
3952
3953 // Sets retransmittable on wire.
3954 const QuicTime::Delta retransmittable_on_wire_timeout =
3955 QuicTime::Delta::FromMilliseconds(50);
3956 connection_.set_retransmittable_on_wire_timeout(
3957 retransmittable_on_wire_timeout);
3958
3959 EXPECT_TRUE(connection_.connected());
3960 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
3961 .WillRepeatedly(Return(true));
3962 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
3963 EXPECT_FALSE(connection_.IsPathDegrading());
3964 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
3965
3966 const char data[] = "data";
3967 size_t data_size = strlen(data);
3968 QuicStreamOffset offset = 0;
3969
3970 // Send a data packet.
3971 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
3972 offset += data_size;
3973
3974 // Path degrading alarm should be set when there is a retransmittable packet
3975 // on the wire.
3976 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
3977
3978 // Verify the path degrading delay.
3979 // First TLP with stream data.
3980 QuicTime::Delta srtt = manager_->GetRttStats()->SmoothedOrInitialRtt();
3981 QuicTime::Delta expected_delay = 0.5 * srtt;
3982 // Add 1st RTO.
3983 QuicTime::Delta retransmission_delay =
3984 QuicTime::Delta::FromMilliseconds(kDefaultRetransmissionTimeMs);
3985 expected_delay = expected_delay + retransmission_delay;
3986 // Add 2nd RTO.
3987 expected_delay = expected_delay + retransmission_delay * 2;
3988 EXPECT_EQ(expected_delay,
3989 QuicConnectionPeer::GetSentPacketManager(&connection_)
3990 ->GetPathDegradingDelay());
3991 ASSERT_TRUE(connection_.sent_packet_manager().HasInFlightPackets());
3992
3993 // The ping alarm is set for the ping timeout, not the shorter
3994 // retransmittable_on_wire_timeout.
3995 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
3996 EXPECT_EQ(QuicTime::Delta::FromSeconds(kPingTimeoutSecs),
3997 connection_.GetPingAlarm()->deadline() - clock_.ApproximateNow());
3998
3999 // Receive an ACK for the data packet.
4000 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
4001 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4002 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4003 QuicAckFrame frame =
4004 InitAckFrame({{QuicPacketNumber(1), QuicPacketNumber(2)}});
4005 ProcessAckPacket(&frame);
4006
4007 // Path degrading alarm should be cancelled as there is no more
4008 // reretransmittable packets on the wire.
4009 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
4010 // The ping alarm should be set to the retransmittable_on_wire_timeout.
4011 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
4012 EXPECT_EQ(retransmittable_on_wire_timeout,
4013 connection_.GetPingAlarm()->deadline() - clock_.ApproximateNow());
4014
4015 // Simulate firing of the retransmittable on wire and send a PING.
4016 EXPECT_CALL(visitor_, SendPing()).WillOnce(Invoke([this]() { SendPing(); }));
4017 clock_.AdvanceTime(retransmittable_on_wire_timeout);
4018 connection_.GetPingAlarm()->Fire();
4019
4020 // The retransmission alarm and the path degrading alarm should be set as
4021 // there is a retransmittable packet (PING) on the wire,
4022 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
4023 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
4024
4025 // Verify the retransmission delay.
4026 QuicTime::Delta min_rto_timeout =
4027 QuicTime::Delta::FromMilliseconds(kMinRetransmissionTimeMs);
4028 srtt = manager_->GetRttStats()->SmoothedOrInitialRtt();
4029 if (GetQuicReloadableFlag(quic_ignore_tlpr_if_sending_ping)) {
4030 // First TLP without unacked stream data will no longer use TLPR.
4031 expected_delay = std::max(2 * srtt, 1.5 * srtt + 0.5 * min_rto_timeout);
4032 } else {
4033 expected_delay =
4034 std::max(QuicTime::Delta::FromMilliseconds(kMinTailLossProbeTimeoutMs),
4035 srtt * 0.5);
4036 }
4037 EXPECT_EQ(expected_delay,
4038 connection_.GetRetransmissionAlarm()->deadline() - clock_.Now());
4039
4040 // Verify the path degrading delay.
4041 // Path degrading delay will count TLPR for the tail loss probe delay.
4042 expected_delay =
4043 std::max(QuicTime::Delta::FromMilliseconds(kMinTailLossProbeTimeoutMs),
4044 srtt * 0.5);
4045 // Add 1st RTO.
4046 retransmission_delay =
4047 std::max(manager_->GetRttStats()->smoothed_rtt() +
4048 4 * manager_->GetRttStats()->mean_deviation(),
4049 min_rto_timeout);
4050 expected_delay = expected_delay + retransmission_delay;
4051 // Add 2nd RTO.
4052 expected_delay = expected_delay + retransmission_delay * 2;
4053 EXPECT_EQ(expected_delay,
4054 QuicConnectionPeer::GetSentPacketManager(&connection_)
4055 ->GetPathDegradingDelay());
4056
4057 // The ping alarm is set for the ping timeout, not the shorter
4058 // retransmittable_on_wire_timeout.
4059 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
4060 EXPECT_EQ(QuicTime::Delta::FromSeconds(kPingTimeoutSecs),
4061 connection_.GetPingAlarm()->deadline() - clock_.ApproximateNow());
4062}
4063
QUICHE teama6ef0a62019-03-07 20:34:33 -05004064TEST_P(QuicConnectionTest, RTO) {
4065 connection_.SetMaxTailLossProbes(0);
4066
4067 QuicTime default_retransmission_time =
4068 clock_.ApproximateNow() + DefaultRetransmissionTime();
4069 SendStreamDataToPeer(3, "foo", 0, NO_FIN, nullptr);
4070 EXPECT_EQ(QuicPacketNumber(1u), stop_waiting()->least_unacked);
4071
4072 EXPECT_EQ(QuicPacketNumber(1u), writer_->header().packet_number);
4073 EXPECT_EQ(default_retransmission_time,
4074 connection_.GetRetransmissionAlarm()->deadline());
4075 // Simulate the retransmission alarm firing.
4076 clock_.AdvanceTime(DefaultRetransmissionTime());
4077 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(2), _, _));
4078 connection_.GetRetransmissionAlarm()->Fire();
4079 EXPECT_EQ(QuicPacketNumber(2u), writer_->header().packet_number);
4080 // We do not raise the high water mark yet.
4081 EXPECT_EQ(QuicPacketNumber(1u), stop_waiting()->least_unacked);
4082}
4083
4084TEST_P(QuicConnectionTest, RetransmitWithSameEncryptionLevel) {
4085 use_tagging_decrypter();
4086
4087 // A TaggingEncrypter puts kTagSize copies of the given byte (0x01 here) at
4088 // the end of the packet. We can test this to check which encrypter was used.
QUICHE team6987b4a2019-03-15 16:23:04 -07004089 connection_.SetEncrypter(ENCRYPTION_INITIAL,
QUICHE teama6ef0a62019-03-07 20:34:33 -05004090 QuicMakeUnique<TaggingEncrypter>(0x01));
nharper46833c32019-05-15 21:33:05 -07004091 QuicByteCount packet_size;
4092 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
4093 .WillOnce(SaveArg<3>(&packet_size));
4094 connection_.SendCryptoDataWithString("foo", 0);
4095 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AnyNumber());
QUICHE teama6ef0a62019-03-07 20:34:33 -05004096 EXPECT_EQ(0x01010101u, writer_->final_bytes_of_last_packet());
4097
4098 connection_.SetEncrypter(ENCRYPTION_ZERO_RTT,
4099 QuicMakeUnique<TaggingEncrypter>(0x02));
4100 connection_.SetDefaultEncryptionLevel(ENCRYPTION_ZERO_RTT);
4101 SendStreamDataToPeer(3, "foo", 0, NO_FIN, nullptr);
4102 EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet());
4103
4104 {
4105 InSequence s;
4106 EXPECT_CALL(*send_algorithm_,
4107 OnPacketSent(_, _, QuicPacketNumber(3), _, _));
4108 EXPECT_CALL(*send_algorithm_,
4109 OnPacketSent(_, _, QuicPacketNumber(4), _, _));
4110 }
4111
4112 // Manually mark both packets for retransmission.
4113 connection_.RetransmitUnackedPackets(ALL_UNACKED_RETRANSMISSION);
4114
QUICHE team6987b4a2019-03-15 16:23:04 -07004115 // Packet should have been sent with ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05004116 EXPECT_EQ(0x01010101u, writer_->final_bytes_of_previous_packet());
4117
4118 // Packet should have been sent with ENCRYPTION_ZERO_RTT.
4119 EXPECT_EQ(0x02020202u, writer_->final_bytes_of_last_packet());
4120}
4121
4122TEST_P(QuicConnectionTest, SendHandshakeMessages) {
4123 use_tagging_decrypter();
4124 // A TaggingEncrypter puts kTagSize copies of the given byte (0x01 here) at
4125 // the end of the packet. We can test this to check which encrypter was used.
QUICHE team6987b4a2019-03-15 16:23:04 -07004126 connection_.SetEncrypter(ENCRYPTION_INITIAL,
QUICHE teama6ef0a62019-03-07 20:34:33 -05004127 QuicMakeUnique<TaggingEncrypter>(0x01));
4128
4129 // Attempt to send a handshake message and have the socket block.
4130 EXPECT_CALL(*send_algorithm_, CanSend(_)).WillRepeatedly(Return(true));
4131 BlockOnNextWrite();
nharper46833c32019-05-15 21:33:05 -07004132 connection_.SendCryptoDataWithString("foo", 0);
QUICHE teama6ef0a62019-03-07 20:34:33 -05004133 // The packet should be serialized, but not queued.
4134 EXPECT_EQ(1u, connection_.NumQueuedPackets());
4135
4136 // Switch to the new encrypter.
4137 connection_.SetEncrypter(ENCRYPTION_ZERO_RTT,
4138 QuicMakeUnique<TaggingEncrypter>(0x02));
4139 connection_.SetDefaultEncryptionLevel(ENCRYPTION_ZERO_RTT);
4140
4141 // Now become writeable and flush the packets.
4142 writer_->SetWritable();
4143 EXPECT_CALL(visitor_, OnCanWrite());
4144 connection_.OnCanWrite();
4145 EXPECT_EQ(0u, connection_.NumQueuedPackets());
4146
4147 // Verify that the handshake packet went out at the null encryption.
4148 EXPECT_EQ(0x01010101u, writer_->final_bytes_of_last_packet());
4149}
4150
4151TEST_P(QuicConnectionTest,
4152 DropRetransmitsForNullEncryptedPacketAfterForwardSecure) {
4153 use_tagging_decrypter();
QUICHE team6987b4a2019-03-15 16:23:04 -07004154 connection_.SetEncrypter(ENCRYPTION_INITIAL,
QUICHE teama6ef0a62019-03-07 20:34:33 -05004155 QuicMakeUnique<TaggingEncrypter>(0x01));
4156 QuicPacketNumber packet_number;
4157 connection_.SendCryptoStreamData();
4158
4159 // Simulate the retransmission alarm firing and the socket blocking.
4160 BlockOnNextWrite();
4161 clock_.AdvanceTime(DefaultRetransmissionTime());
4162 connection_.GetRetransmissionAlarm()->Fire();
4163
4164 // Go forward secure.
4165 connection_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
4166 QuicMakeUnique<TaggingEncrypter>(0x02));
4167 connection_.SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
4168 notifier_.NeuterUnencryptedData();
4169 connection_.NeuterUnencryptedPackets();
4170
4171 EXPECT_EQ(QuicTime::Zero(), connection_.GetRetransmissionAlarm()->deadline());
4172 // Unblock the socket and ensure that no packets are sent.
4173 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
4174 writer_->SetWritable();
4175 connection_.OnCanWrite();
4176}
4177
4178TEST_P(QuicConnectionTest, RetransmitPacketsWithInitialEncryption) {
4179 use_tagging_decrypter();
QUICHE team6987b4a2019-03-15 16:23:04 -07004180 connection_.SetEncrypter(ENCRYPTION_INITIAL,
QUICHE teama6ef0a62019-03-07 20:34:33 -05004181 QuicMakeUnique<TaggingEncrypter>(0x01));
QUICHE team6987b4a2019-03-15 16:23:04 -07004182 connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL);
QUICHE teama6ef0a62019-03-07 20:34:33 -05004183
nharper46833c32019-05-15 21:33:05 -07004184 connection_.SendCryptoDataWithString("foo", 0);
QUICHE teama6ef0a62019-03-07 20:34:33 -05004185
4186 connection_.SetEncrypter(ENCRYPTION_ZERO_RTT,
4187 QuicMakeUnique<TaggingEncrypter>(0x02));
4188 connection_.SetDefaultEncryptionLevel(ENCRYPTION_ZERO_RTT);
4189
4190 SendStreamDataToPeer(2, "bar", 0, NO_FIN, nullptr);
4191 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
4192
4193 connection_.RetransmitUnackedPackets(ALL_INITIAL_RETRANSMISSION);
4194}
4195
4196TEST_P(QuicConnectionTest, BufferNonDecryptablePackets) {
QUICHE teamcd098022019-03-22 18:49:55 -07004197 if (connection_.SupportsMultiplePacketNumberSpaces()) {
4198 return;
4199 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004200 // SetFromConfig is always called after construction from InitializeSession.
4201 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
4202 QuicConfig config;
4203 connection_.SetFromConfig(config);
4204 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4205 use_tagging_decrypter();
4206
4207 const uint8_t tag = 0x07;
4208 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
4209 QuicMakeUnique<TaggingEncrypter>(tag));
4210
4211 // Process an encrypted packet which can not yet be decrypted which should
4212 // result in the packet being buffered.
4213 ProcessDataPacketAtLevel(1, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
4214
4215 // Transition to the new encryption state and process another encrypted packet
4216 // which should result in the original packet being processed.
zhongyi546cc452019-04-12 15:27:49 -07004217 SetDecrypter(ENCRYPTION_ZERO_RTT,
4218 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05004219 connection_.SetDefaultEncryptionLevel(ENCRYPTION_ZERO_RTT);
4220 connection_.SetEncrypter(ENCRYPTION_ZERO_RTT,
4221 QuicMakeUnique<TaggingEncrypter>(tag));
4222 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(2);
4223 ProcessDataPacketAtLevel(2, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
4224
4225 // Finally, process a third packet and note that we do not reprocess the
4226 // buffered packet.
4227 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
4228 ProcessDataPacketAtLevel(3, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
4229}
4230
4231TEST_P(QuicConnectionTest, TestRetransmitOrder) {
4232 connection_.SetMaxTailLossProbes(0);
4233
4234 QuicByteCount first_packet_size;
4235 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
4236 .WillOnce(SaveArg<3>(&first_packet_size));
4237
4238 connection_.SendStreamDataWithString(3, "first_packet", 0, NO_FIN);
4239 QuicByteCount second_packet_size;
4240 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
4241 .WillOnce(SaveArg<3>(&second_packet_size));
4242 connection_.SendStreamDataWithString(3, "second_packet", 12, NO_FIN);
4243 EXPECT_NE(first_packet_size, second_packet_size);
4244 // Advance the clock by huge time to make sure packets will be retransmitted.
4245 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(10));
4246 {
4247 InSequence s;
4248 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, first_packet_size, _));
4249 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, second_packet_size, _));
4250 }
4251 connection_.GetRetransmissionAlarm()->Fire();
4252
4253 // Advance again and expect the packets to be sent again in the same order.
4254 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(20));
4255 {
4256 InSequence s;
4257 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, first_packet_size, _));
4258 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, second_packet_size, _));
4259 }
4260 connection_.GetRetransmissionAlarm()->Fire();
4261}
4262
4263TEST_P(QuicConnectionTest, Buffer100NonDecryptablePacketsThenKeyChange) {
QUICHE teamcd098022019-03-22 18:49:55 -07004264 if (connection_.SupportsMultiplePacketNumberSpaces()) {
4265 return;
4266 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004267 // SetFromConfig is always called after construction from InitializeSession.
4268 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
4269 QuicConfig config;
4270 config.set_max_undecryptable_packets(100);
4271 connection_.SetFromConfig(config);
4272 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4273 use_tagging_decrypter();
4274
4275 const uint8_t tag = 0x07;
4276 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
4277 QuicMakeUnique<TaggingEncrypter>(tag));
4278
4279 // Process an encrypted packet which can not yet be decrypted which should
4280 // result in the packet being buffered.
4281 for (uint64_t i = 1; i <= 100; ++i) {
4282 ProcessDataPacketAtLevel(i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
4283 }
4284
4285 // Transition to the new encryption state and process another encrypted packet
4286 // which should result in the original packets being processed.
4287 EXPECT_FALSE(connection_.GetProcessUndecryptablePacketsAlarm()->IsSet());
zhongyi546cc452019-04-12 15:27:49 -07004288 SetDecrypter(ENCRYPTION_ZERO_RTT,
4289 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05004290 EXPECT_TRUE(connection_.GetProcessUndecryptablePacketsAlarm()->IsSet());
4291 connection_.SetDefaultEncryptionLevel(ENCRYPTION_ZERO_RTT);
4292 connection_.SetEncrypter(ENCRYPTION_ZERO_RTT,
4293 QuicMakeUnique<TaggingEncrypter>(tag));
4294
4295 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(100);
4296 connection_.GetProcessUndecryptablePacketsAlarm()->Fire();
4297
4298 // Finally, process a third packet and note that we do not reprocess the
4299 // buffered packet.
4300 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
4301 ProcessDataPacketAtLevel(102, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
4302}
4303
4304TEST_P(QuicConnectionTest, SetRTOAfterWritingToSocket) {
4305 BlockOnNextWrite();
4306 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
4307 // Make sure that RTO is not started when the packet is queued.
4308 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
4309
4310 // Test that RTO is started once we write to the socket.
4311 writer_->SetWritable();
4312 connection_.OnCanWrite();
4313 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
4314}
4315
4316TEST_P(QuicConnectionTest, DelayRTOWithAckReceipt) {
4317 connection_.SetMaxTailLossProbes(0);
4318
4319 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4320 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
4321 connection_.SendStreamDataWithString(2, "foo", 0, NO_FIN);
4322 connection_.SendStreamDataWithString(3, "bar", 0, NO_FIN);
4323 QuicAlarm* retransmission_alarm = connection_.GetRetransmissionAlarm();
4324 EXPECT_TRUE(retransmission_alarm->IsSet());
4325 EXPECT_EQ(clock_.Now() + DefaultRetransmissionTime(),
4326 retransmission_alarm->deadline());
4327
4328 // Advance the time right before the RTO, then receive an ack for the first
4329 // packet to delay the RTO.
4330 clock_.AdvanceTime(DefaultRetransmissionTime());
4331 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4332 QuicAckFrame ack = InitAckFrame(1);
4333 ProcessAckPacket(&ack);
4334 // Now we have an RTT sample of DefaultRetransmissionTime(500ms),
4335 // so the RTO has increased to 2 * SRTT.
4336 EXPECT_TRUE(retransmission_alarm->IsSet());
4337 EXPECT_EQ(retransmission_alarm->deadline(),
4338 clock_.Now() + 2 * DefaultRetransmissionTime());
4339
4340 // Move forward past the original RTO and ensure the RTO is still pending.
4341 clock_.AdvanceTime(2 * DefaultRetransmissionTime());
4342
4343 // Ensure the second packet gets retransmitted when it finally fires.
4344 EXPECT_TRUE(retransmission_alarm->IsSet());
4345 EXPECT_EQ(retransmission_alarm->deadline(), clock_.ApproximateNow());
4346 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
4347 // Manually cancel the alarm to simulate a real test.
4348 connection_.GetRetransmissionAlarm()->Fire();
4349
4350 // The new retransmitted packet number should set the RTO to a larger value
4351 // than previously.
4352 EXPECT_TRUE(retransmission_alarm->IsSet());
4353 QuicTime next_rto_time = retransmission_alarm->deadline();
4354 QuicTime expected_rto_time =
4355 connection_.sent_packet_manager().GetRetransmissionTime();
4356 EXPECT_EQ(next_rto_time, expected_rto_time);
4357}
4358
4359TEST_P(QuicConnectionTest, TestQueued) {
4360 connection_.SetMaxTailLossProbes(0);
4361
4362 EXPECT_EQ(0u, connection_.NumQueuedPackets());
4363 BlockOnNextWrite();
4364 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
4365 EXPECT_EQ(1u, connection_.NumQueuedPackets());
4366
4367 // Unblock the writes and actually send.
4368 writer_->SetWritable();
4369 connection_.OnCanWrite();
4370 EXPECT_EQ(0u, connection_.NumQueuedPackets());
4371}
4372
4373TEST_P(QuicConnectionTest, InitialTimeout) {
4374 EXPECT_TRUE(connection_.connected());
4375 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AnyNumber());
4376 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
4377
4378 // SetFromConfig sets the initial timeouts before negotiation.
4379 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
4380 QuicConfig config;
4381 connection_.SetFromConfig(config);
4382 // Subtract a second from the idle timeout on the client side.
4383 QuicTime default_timeout =
4384 clock_.ApproximateNow() +
4385 QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1);
4386 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
4387
4388 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
4389 ConnectionCloseSource::FROM_SELF));
4390 // Simulate the timeout alarm firing.
4391 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1));
4392 connection_.GetTimeoutAlarm()->Fire();
4393
4394 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
4395 EXPECT_FALSE(connection_.connected());
4396
4397 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
4398 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
4399 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
4400 EXPECT_FALSE(connection_.GetSendAlarm()->IsSet());
4401 EXPECT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
renjietang11e4a3d2019-05-03 11:27:26 -07004402 EXPECT_FALSE(connection_.GetProcessUndecryptablePacketsAlarm()->IsSet());
QUICHE teama6ef0a62019-03-07 20:34:33 -05004403}
4404
4405TEST_P(QuicConnectionTest, IdleTimeoutAfterFirstSentPacket) {
4406 EXPECT_TRUE(connection_.connected());
4407 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AnyNumber());
4408 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
4409
4410 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
4411 QuicConfig config;
4412 connection_.SetFromConfig(config);
4413 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
4414 QuicTime initial_ddl =
4415 clock_.ApproximateNow() +
4416 QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1);
4417 EXPECT_EQ(initial_ddl, connection_.GetTimeoutAlarm()->deadline());
4418 EXPECT_TRUE(connection_.connected());
4419
4420 // Advance the time and send the first packet to the peer.
4421 clock_.AdvanceTime(QuicTime::Delta::FromMicroseconds(20));
4422 QuicPacketNumber last_packet;
4423 SendStreamDataToPeer(1, "foo", 0, NO_FIN, &last_packet);
4424 EXPECT_EQ(QuicPacketNumber(1u), last_packet);
4425 // This will be the updated deadline for the connection to idle time out.
4426 QuicTime new_ddl = clock_.ApproximateNow() +
4427 QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1);
4428
4429 // Simulate the timeout alarm firing, the connection should not be closed as
4430 // a new packet has been sent.
4431 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _)).Times(0);
4432 QuicTime::Delta delay = initial_ddl - clock_.ApproximateNow();
4433 clock_.AdvanceTime(delay);
4434 connection_.GetTimeoutAlarm()->Fire();
4435 // Verify the timeout alarm deadline is updated.
4436 EXPECT_TRUE(connection_.connected());
4437 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
4438 EXPECT_EQ(new_ddl, connection_.GetTimeoutAlarm()->deadline());
4439
4440 // Simulate the timeout alarm firing again, the connection now should be
4441 // closed.
4442 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
4443 ConnectionCloseSource::FROM_SELF));
4444 clock_.AdvanceTime(new_ddl - clock_.ApproximateNow());
4445 connection_.GetTimeoutAlarm()->Fire();
4446 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
4447 EXPECT_FALSE(connection_.connected());
4448
4449 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
4450 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
4451 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
4452 EXPECT_FALSE(connection_.GetSendAlarm()->IsSet());
4453 EXPECT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4454}
4455
4456TEST_P(QuicConnectionTest, IdleTimeoutAfterSendTwoPackets) {
4457 EXPECT_TRUE(connection_.connected());
4458 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AnyNumber());
4459 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
4460
4461 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
4462 QuicConfig config;
4463 connection_.SetFromConfig(config);
4464 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
4465 QuicTime initial_ddl =
4466 clock_.ApproximateNow() +
4467 QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1);
4468 EXPECT_EQ(initial_ddl, connection_.GetTimeoutAlarm()->deadline());
4469 EXPECT_TRUE(connection_.connected());
4470
4471 // Immediately send the first packet, this is a rare case but test code will
4472 // hit this issue often as MockClock used for tests doesn't move with code
4473 // execution until manually adjusted.
4474 QuicPacketNumber last_packet;
4475 SendStreamDataToPeer(1, "foo", 0, NO_FIN, &last_packet);
4476 EXPECT_EQ(QuicPacketNumber(1u), last_packet);
4477
4478 // Advance the time and send the second packet to the peer.
4479 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(20));
4480 SendStreamDataToPeer(1, "foo", 0, NO_FIN, &last_packet);
4481 EXPECT_EQ(QuicPacketNumber(2u), last_packet);
4482
4483 if (GetQuicReloadableFlag(
4484 quic_fix_time_of_first_packet_sent_after_receiving)) {
4485 // Simulate the timeout alarm firing, the connection will be closed.
4486 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
4487 ConnectionCloseSource::FROM_SELF));
4488 clock_.AdvanceTime(initial_ddl - clock_.ApproximateNow());
4489 connection_.GetTimeoutAlarm()->Fire();
4490 } else {
4491 // Simulate the timeout alarm firing, the connection will not be closed.
4492 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _)).Times(0);
4493 clock_.AdvanceTime(initial_ddl - clock_.ApproximateNow());
4494 connection_.GetTimeoutAlarm()->Fire();
4495 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
4496 EXPECT_TRUE(connection_.connected());
4497
4498 // Advance another 20ms, and fire the alarm again. The connection will be
4499 // closed.
4500 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
4501 ConnectionCloseSource::FROM_SELF));
4502 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(20));
4503 connection_.GetTimeoutAlarm()->Fire();
4504 }
4505
4506 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
4507 EXPECT_FALSE(connection_.connected());
4508
4509 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
4510 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
4511 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
4512 EXPECT_FALSE(connection_.GetSendAlarm()->IsSet());
4513 EXPECT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4514}
4515
4516TEST_P(QuicConnectionTest, HandshakeTimeout) {
4517 // Use a shorter handshake timeout than idle timeout for this test.
4518 const QuicTime::Delta timeout = QuicTime::Delta::FromSeconds(5);
4519 connection_.SetNetworkTimeouts(timeout, timeout);
4520 EXPECT_TRUE(connection_.connected());
4521 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AnyNumber());
4522
4523 QuicTime handshake_timeout =
4524 clock_.ApproximateNow() + timeout - QuicTime::Delta::FromSeconds(1);
4525 EXPECT_EQ(handshake_timeout, connection_.GetTimeoutAlarm()->deadline());
4526 EXPECT_TRUE(connection_.connected());
4527
4528 // Send and ack new data 3 seconds later to lengthen the idle timeout.
4529 SendStreamDataToPeer(
4530 QuicUtils::GetHeadersStreamId(connection_.transport_version()), "GET /",
4531 0, FIN, nullptr);
4532 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(3));
4533 QuicAckFrame frame = InitAckFrame(1);
4534 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4535 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4536 ProcessAckPacket(&frame);
4537
4538 // Fire early to verify it wouldn't timeout yet.
4539 connection_.GetTimeoutAlarm()->Fire();
4540 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
4541 EXPECT_TRUE(connection_.connected());
4542
4543 clock_.AdvanceTime(timeout - QuicTime::Delta::FromSeconds(2));
4544
4545 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_HANDSHAKE_TIMEOUT, _,
4546 ConnectionCloseSource::FROM_SELF));
4547 // Simulate the timeout alarm firing.
4548 connection_.GetTimeoutAlarm()->Fire();
4549
4550 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
4551 EXPECT_FALSE(connection_.connected());
4552
4553 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
4554 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
4555 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
4556 EXPECT_FALSE(connection_.GetSendAlarm()->IsSet());
4557}
4558
4559TEST_P(QuicConnectionTest, PingAfterSend) {
QUICHE teamcd098022019-03-22 18:49:55 -07004560 if (connection_.SupportsMultiplePacketNumberSpaces()) {
4561 return;
4562 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004563 EXPECT_TRUE(connection_.connected());
4564 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
4565 .WillRepeatedly(Return(true));
4566 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
4567
4568 // Advance to 5ms, and send a packet to the peer, which will set
4569 // the ping alarm.
4570 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
4571 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
4572 SendStreamDataToPeer(
4573 QuicUtils::GetHeadersStreamId(connection_.transport_version()), "GET /",
4574 0, FIN, nullptr);
4575 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
4576 EXPECT_EQ(clock_.ApproximateNow() + QuicTime::Delta::FromSeconds(15),
4577 connection_.GetPingAlarm()->deadline());
4578
4579 // Now recevie an ACK of the previous packet, which will move the
4580 // ping alarm forward.
4581 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
4582 QuicAckFrame frame = InitAckFrame(1);
4583 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4584 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4585 ProcessAckPacket(&frame);
4586 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
4587 // The ping timer is set slightly less than 15 seconds in the future, because
4588 // of the 1s ping timer alarm granularity.
4589 EXPECT_EQ(clock_.ApproximateNow() + QuicTime::Delta::FromSeconds(15) -
4590 QuicTime::Delta::FromMilliseconds(5),
4591 connection_.GetPingAlarm()->deadline());
4592
4593 writer_->Reset();
4594 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(15));
zhongyifbb25772019-04-10 16:54:08 -07004595 EXPECT_CALL(visitor_, SendPing()).WillOnce(Invoke([this]() { SendPing(); }));
QUICHE teama6ef0a62019-03-07 20:34:33 -05004596 connection_.GetPingAlarm()->Fire();
nharper55fa6132019-05-07 19:37:21 -07004597 size_t padding_frame_count = writer_->padding_frames().size();
4598 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05004599 ASSERT_EQ(1u, writer_->ping_frames().size());
4600 writer_->Reset();
4601
4602 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
4603 .WillRepeatedly(Return(false));
4604 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
4605 SendAckPacketToPeer();
4606
4607 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
4608}
4609
4610TEST_P(QuicConnectionTest, ReducedPingTimeout) {
QUICHE teamcd098022019-03-22 18:49:55 -07004611 if (connection_.SupportsMultiplePacketNumberSpaces()) {
4612 return;
4613 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004614 EXPECT_TRUE(connection_.connected());
4615 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
4616 .WillRepeatedly(Return(true));
4617 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
4618
4619 // Use a reduced ping timeout for this connection.
4620 connection_.set_ping_timeout(QuicTime::Delta::FromSeconds(10));
4621
4622 // Advance to 5ms, and send a packet to the peer, which will set
4623 // the ping alarm.
4624 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
4625 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
4626 SendStreamDataToPeer(
4627 QuicUtils::GetHeadersStreamId(connection_.transport_version()), "GET /",
4628 0, FIN, nullptr);
4629 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
4630 EXPECT_EQ(clock_.ApproximateNow() + QuicTime::Delta::FromSeconds(10),
4631 connection_.GetPingAlarm()->deadline());
4632
4633 // Now recevie an ACK of the previous packet, which will move the
4634 // ping alarm forward.
4635 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
4636 QuicAckFrame frame = InitAckFrame(1);
4637 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4638 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4639 ProcessAckPacket(&frame);
4640 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
4641 // The ping timer is set slightly less than 10 seconds in the future, because
4642 // of the 1s ping timer alarm granularity.
4643 EXPECT_EQ(clock_.ApproximateNow() + QuicTime::Delta::FromSeconds(10) -
4644 QuicTime::Delta::FromMilliseconds(5),
4645 connection_.GetPingAlarm()->deadline());
4646
4647 writer_->Reset();
4648 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(10));
4649 EXPECT_CALL(visitor_, SendPing()).WillOnce(Invoke([this]() {
4650 connection_.SendControlFrame(QuicFrame(QuicPingFrame(1)));
4651 }));
4652 connection_.GetPingAlarm()->Fire();
nharper55fa6132019-05-07 19:37:21 -07004653 size_t padding_frame_count = writer_->padding_frames().size();
4654 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05004655 ASSERT_EQ(1u, writer_->ping_frames().size());
4656 writer_->Reset();
4657
4658 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
4659 .WillRepeatedly(Return(false));
4660 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
4661 SendAckPacketToPeer();
4662
4663 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
4664}
4665
4666// Tests whether sending an MTU discovery packet to peer successfully causes the
4667// maximum packet size to increase.
4668TEST_P(QuicConnectionTest, SendMtuDiscoveryPacket) {
QUICHE teamcd098022019-03-22 18:49:55 -07004669 if (connection_.SupportsMultiplePacketNumberSpaces()) {
4670 return;
4671 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004672 EXPECT_TRUE(connection_.connected());
4673
4674 // Send an MTU probe.
4675 const size_t new_mtu = kDefaultMaxPacketSize + 100;
4676 QuicByteCount mtu_probe_size;
4677 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
4678 .WillOnce(SaveArg<3>(&mtu_probe_size));
4679 connection_.SendMtuDiscoveryPacket(new_mtu);
4680 EXPECT_EQ(new_mtu, mtu_probe_size);
4681 EXPECT_EQ(QuicPacketNumber(1u), creator_->packet_number());
4682
4683 // Send more than MTU worth of data. No acknowledgement was received so far,
4684 // so the MTU should be at its old value.
vasilvvc48c8712019-03-11 13:38:16 -07004685 const std::string data(kDefaultMaxPacketSize + 1, '.');
QUICHE teama6ef0a62019-03-07 20:34:33 -05004686 QuicByteCount size_before_mtu_change;
4687 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
4688 .Times(2)
4689 .WillOnce(SaveArg<3>(&size_before_mtu_change))
4690 .WillOnce(Return());
4691 connection_.SendStreamDataWithString(3, data, 0, FIN);
4692 EXPECT_EQ(QuicPacketNumber(3u), creator_->packet_number());
4693 EXPECT_EQ(kDefaultMaxPacketSize, size_before_mtu_change);
4694
4695 // Acknowledge all packets so far.
4696 QuicAckFrame probe_ack = InitAckFrame(3);
4697 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4698 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4699 ProcessAckPacket(&probe_ack);
4700 EXPECT_EQ(new_mtu, connection_.max_packet_length());
4701
4702 // Send the same data again. Check that it fits into a single packet now.
4703 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
4704 connection_.SendStreamDataWithString(3, data, 0, FIN);
4705 EXPECT_EQ(QuicPacketNumber(4u), creator_->packet_number());
4706}
4707
4708// Tests whether MTU discovery does not happen when it is not explicitly enabled
4709// by the connection options.
4710TEST_P(QuicConnectionTest, MtuDiscoveryDisabled) {
4711 EXPECT_TRUE(connection_.connected());
4712
4713 const QuicPacketCount packets_between_probes_base = 10;
4714 set_packets_between_probes_base(packets_between_probes_base);
4715
4716 const QuicPacketCount number_of_packets = packets_between_probes_base * 2;
4717 for (QuicPacketCount i = 0; i < number_of_packets; i++) {
4718 SendStreamDataToPeer(3, ".", i, NO_FIN, nullptr);
4719 EXPECT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4720 EXPECT_EQ(0u, connection_.mtu_probe_count());
4721 }
4722}
4723
4724// Tests whether MTU discovery works when the probe gets acknowledged on the
4725// first try.
4726TEST_P(QuicConnectionTest, MtuDiscoveryEnabled) {
4727 EXPECT_TRUE(connection_.connected());
4728
4729 connection_.EnablePathMtuDiscovery(send_algorithm_);
4730
4731 const QuicPacketCount packets_between_probes_base = 5;
4732 set_packets_between_probes_base(packets_between_probes_base);
4733
4734 // Send enough packets so that the next one triggers path MTU discovery.
4735 for (QuicPacketCount i = 0; i < packets_between_probes_base - 1; i++) {
4736 SendStreamDataToPeer(3, ".", i, NO_FIN, nullptr);
4737 ASSERT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4738 }
4739
4740 // Trigger the probe.
4741 SendStreamDataToPeer(3, "!", packets_between_probes_base - 1, NO_FIN,
4742 nullptr);
4743 ASSERT_TRUE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4744 QuicByteCount probe_size;
4745 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
4746 .WillOnce(SaveArg<3>(&probe_size));
4747 connection_.GetMtuDiscoveryAlarm()->Fire();
4748 EXPECT_EQ(kMtuDiscoveryTargetPacketSizeHigh, probe_size);
4749
4750 const QuicPacketNumber probe_packet_number =
4751 FirstSendingPacketNumber() + packets_between_probes_base;
4752 ASSERT_EQ(probe_packet_number, creator_->packet_number());
4753
4754 // Acknowledge all packets sent so far.
4755 QuicAckFrame probe_ack = InitAckFrame(probe_packet_number);
4756 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4757 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4758 ProcessAckPacket(&probe_ack);
4759 EXPECT_EQ(kMtuDiscoveryTargetPacketSizeHigh, connection_.max_packet_length());
4760 EXPECT_EQ(0u, connection_.GetBytesInFlight());
4761
4762 // Send more packets, and ensure that none of them sets the alarm.
4763 for (QuicPacketCount i = 0; i < 4 * packets_between_probes_base; i++) {
4764 SendStreamDataToPeer(3, ".", packets_between_probes_base + i, NO_FIN,
4765 nullptr);
4766 ASSERT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4767 }
4768
4769 EXPECT_EQ(1u, connection_.mtu_probe_count());
4770}
4771
4772// Tests whether MTU discovery works correctly when the probes never get
4773// acknowledged.
4774TEST_P(QuicConnectionTest, MtuDiscoveryFailed) {
4775 EXPECT_TRUE(connection_.connected());
4776
4777 connection_.EnablePathMtuDiscovery(send_algorithm_);
4778
4779 const QuicTime::Delta rtt = QuicTime::Delta::FromMilliseconds(100);
4780
4781 EXPECT_EQ(kPacketsBetweenMtuProbesBase,
4782 QuicConnectionPeer::GetPacketsBetweenMtuProbes(&connection_));
4783 // Lower the number of probes between packets in order to make the test go
4784 // much faster.
4785 const QuicPacketCount packets_between_probes_base = 5;
4786 set_packets_between_probes_base(packets_between_probes_base);
4787
4788 // This tests sends more packets than strictly necessary to make sure that if
4789 // the connection was to send more discovery packets than needed, those would
4790 // get caught as well.
4791 const QuicPacketCount number_of_packets =
4792 packets_between_probes_base * (1 << (kMtuDiscoveryAttempts + 1));
4793 std::vector<QuicPacketNumber> mtu_discovery_packets;
4794 // Called by the first ack.
4795 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4796 // Called on many acks.
4797 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _))
4798 .Times(AnyNumber());
4799 for (QuicPacketCount i = 0; i < number_of_packets; i++) {
4800 SendStreamDataToPeer(3, "!", i, NO_FIN, nullptr);
4801 clock_.AdvanceTime(rtt);
4802
4803 // Receive an ACK, which marks all data packets as received, and all MTU
4804 // discovery packets as missing.
4805
4806 QuicAckFrame ack;
4807
4808 if (!mtu_discovery_packets.empty()) {
4809 QuicPacketNumber min_packet = *min_element(mtu_discovery_packets.begin(),
4810 mtu_discovery_packets.end());
4811 QuicPacketNumber max_packet = *max_element(mtu_discovery_packets.begin(),
4812 mtu_discovery_packets.end());
4813 ack.packets.AddRange(QuicPacketNumber(1), min_packet);
4814 ack.packets.AddRange(QuicPacketNumber(max_packet + 1),
4815 creator_->packet_number() + 1);
4816 ack.largest_acked = creator_->packet_number();
4817
4818 } else {
4819 ack.packets.AddRange(QuicPacketNumber(1), creator_->packet_number() + 1);
4820 ack.largest_acked = creator_->packet_number();
4821 }
4822
4823 ProcessAckPacket(&ack);
4824
4825 // Trigger MTU probe if it would be scheduled now.
4826 if (!connection_.GetMtuDiscoveryAlarm()->IsSet()) {
4827 continue;
4828 }
4829
4830 // Fire the alarm. The alarm should cause a packet to be sent.
4831 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
4832 connection_.GetMtuDiscoveryAlarm()->Fire();
4833 // Record the packet number of the MTU discovery packet in order to
4834 // mark it as NACK'd.
4835 mtu_discovery_packets.push_back(creator_->packet_number());
4836 }
4837
4838 // Ensure the number of packets between probes grows exponentially by checking
4839 // it against the closed-form expression for the packet number.
4840 ASSERT_EQ(kMtuDiscoveryAttempts, mtu_discovery_packets.size());
4841 for (uint64_t i = 0; i < kMtuDiscoveryAttempts; i++) {
4842 // 2^0 + 2^1 + 2^2 + ... + 2^n = 2^(n + 1) - 1
4843 const QuicPacketCount packets_between_probes =
4844 packets_between_probes_base * ((1 << (i + 1)) - 1);
4845 EXPECT_EQ(QuicPacketNumber(packets_between_probes + (i + 1)),
4846 mtu_discovery_packets[i]);
4847 }
4848
4849 EXPECT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4850 EXPECT_EQ(kDefaultMaxPacketSize, connection_.max_packet_length());
4851 EXPECT_EQ(kMtuDiscoveryAttempts, connection_.mtu_probe_count());
4852}
4853
4854// Tests whether MTU discovery works when the writer has a limit on how large a
4855// packet can be.
4856TEST_P(QuicConnectionTest, MtuDiscoveryWriterLimited) {
4857 EXPECT_TRUE(connection_.connected());
4858
4859 const QuicByteCount mtu_limit = kMtuDiscoveryTargetPacketSizeHigh - 1;
4860 writer_->set_max_packet_size(mtu_limit);
4861 connection_.EnablePathMtuDiscovery(send_algorithm_);
4862
4863 const QuicPacketCount packets_between_probes_base = 5;
4864 set_packets_between_probes_base(packets_between_probes_base);
4865
4866 // Send enough packets so that the next one triggers path MTU discovery.
4867 for (QuicPacketCount i = 0; i < packets_between_probes_base - 1; i++) {
4868 SendStreamDataToPeer(3, ".", i, NO_FIN, nullptr);
4869 ASSERT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4870 }
4871
4872 // Trigger the probe.
4873 SendStreamDataToPeer(3, "!", packets_between_probes_base - 1, NO_FIN,
4874 nullptr);
4875 ASSERT_TRUE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4876 QuicByteCount probe_size;
4877 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
4878 .WillOnce(SaveArg<3>(&probe_size));
4879 connection_.GetMtuDiscoveryAlarm()->Fire();
4880 EXPECT_EQ(mtu_limit, probe_size);
4881
4882 const QuicPacketNumber probe_sequence_number =
4883 FirstSendingPacketNumber() + packets_between_probes_base;
4884 ASSERT_EQ(probe_sequence_number, creator_->packet_number());
4885
4886 // Acknowledge all packets sent so far.
4887 QuicAckFrame probe_ack = InitAckFrame(probe_sequence_number);
4888 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4889 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4890 ProcessAckPacket(&probe_ack);
4891 EXPECT_EQ(mtu_limit, connection_.max_packet_length());
4892 EXPECT_EQ(0u, connection_.GetBytesInFlight());
4893
4894 // Send more packets, and ensure that none of them sets the alarm.
4895 for (QuicPacketCount i = 0; i < 4 * packets_between_probes_base; i++) {
4896 SendStreamDataToPeer(3, ".", packets_between_probes_base + i, NO_FIN,
4897 nullptr);
4898 ASSERT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4899 }
4900
4901 EXPECT_EQ(1u, connection_.mtu_probe_count());
4902}
4903
4904// Tests whether MTU discovery works when the writer returns an error despite
4905// advertising higher packet length.
4906TEST_P(QuicConnectionTest, MtuDiscoveryWriterFailed) {
4907 EXPECT_TRUE(connection_.connected());
4908
4909 const QuicByteCount mtu_limit = kMtuDiscoveryTargetPacketSizeHigh - 1;
4910 const QuicByteCount initial_mtu = connection_.max_packet_length();
4911 EXPECT_LT(initial_mtu, mtu_limit);
4912 writer_->set_max_packet_size(mtu_limit);
4913 connection_.EnablePathMtuDiscovery(send_algorithm_);
4914
4915 const QuicPacketCount packets_between_probes_base = 5;
4916 set_packets_between_probes_base(packets_between_probes_base);
4917
4918 // Send enough packets so that the next one triggers path MTU discovery.
4919 for (QuicPacketCount i = 0; i < packets_between_probes_base - 1; i++) {
4920 SendStreamDataToPeer(3, ".", i, NO_FIN, nullptr);
4921 ASSERT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4922 }
4923
4924 // Trigger the probe.
4925 SendStreamDataToPeer(3, "!", packets_between_probes_base - 1, NO_FIN,
4926 nullptr);
4927 ASSERT_TRUE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4928 writer_->SimulateNextPacketTooLarge();
4929 connection_.GetMtuDiscoveryAlarm()->Fire();
4930 ASSERT_TRUE(connection_.connected());
4931
4932 // Send more data.
4933 QuicPacketNumber probe_number = creator_->packet_number();
4934 QuicPacketCount extra_packets = packets_between_probes_base * 3;
4935 for (QuicPacketCount i = 0; i < extra_packets; i++) {
4936 connection_.EnsureWritableAndSendStreamData5();
4937 ASSERT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4938 }
4939
4940 // Acknowledge all packets sent so far, except for the lost probe.
4941 QuicAckFrame probe_ack =
4942 ConstructAckFrame(creator_->packet_number(), probe_number);
4943 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
4944 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
4945 ProcessAckPacket(&probe_ack);
4946 EXPECT_EQ(initial_mtu, connection_.max_packet_length());
4947
4948 // Send more packets, and ensure that none of them sets the alarm.
4949 for (QuicPacketCount i = 0; i < 4 * packets_between_probes_base; i++) {
4950 connection_.EnsureWritableAndSendStreamData5();
4951 ASSERT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4952 }
4953
4954 EXPECT_EQ(initial_mtu, connection_.max_packet_length());
4955 EXPECT_EQ(1u, connection_.mtu_probe_count());
4956}
4957
4958TEST_P(QuicConnectionTest, NoMtuDiscoveryAfterConnectionClosed) {
4959 EXPECT_TRUE(connection_.connected());
4960
4961 connection_.EnablePathMtuDiscovery(send_algorithm_);
4962
4963 const QuicPacketCount packets_between_probes_base = 10;
4964 set_packets_between_probes_base(packets_between_probes_base);
4965
4966 // Send enough packets so that the next one triggers path MTU discovery.
4967 for (QuicPacketCount i = 0; i < packets_between_probes_base - 1; i++) {
4968 SendStreamDataToPeer(3, ".", i, NO_FIN, nullptr);
4969 ASSERT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4970 }
4971
4972 SendStreamDataToPeer(3, "!", packets_between_probes_base - 1, NO_FIN,
4973 nullptr);
4974 EXPECT_TRUE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4975
4976 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _));
4977 connection_.CloseConnection(QUIC_PEER_GOING_AWAY, "no reason",
4978 ConnectionCloseBehavior::SILENT_CLOSE);
4979 EXPECT_FALSE(connection_.GetMtuDiscoveryAlarm()->IsSet());
4980}
4981
4982TEST_P(QuicConnectionTest, TimeoutAfterSend) {
4983 EXPECT_TRUE(connection_.connected());
4984 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
4985 QuicConfig config;
4986 connection_.SetFromConfig(config);
4987 EXPECT_FALSE(QuicConnectionPeer::IsSilentCloseEnabled(&connection_));
4988
4989 const QuicTime::Delta initial_idle_timeout =
4990 QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1);
4991 const QuicTime::Delta five_ms = QuicTime::Delta::FromMilliseconds(5);
4992 QuicTime default_timeout = clock_.ApproximateNow() + initial_idle_timeout;
4993
4994 // When we send a packet, the timeout will change to 5ms +
4995 // kInitialIdleTimeoutSecs.
4996 clock_.AdvanceTime(five_ms);
4997 SendStreamDataToPeer(
4998 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
4999 0, FIN, nullptr);
5000 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5001
5002 // Now send more data. This will not move the timeout because
5003 // no data has been received since the previous write.
5004 clock_.AdvanceTime(five_ms);
5005 SendStreamDataToPeer(
5006 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5007 3, FIN, nullptr);
5008 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5009
5010 // The original alarm will fire. We should not time out because we had a
5011 // network event at t=5ms. The alarm will reregister.
5012 clock_.AdvanceTime(initial_idle_timeout - five_ms - five_ms);
5013 EXPECT_EQ(default_timeout, clock_.ApproximateNow());
5014 connection_.GetTimeoutAlarm()->Fire();
5015 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
5016 EXPECT_TRUE(connection_.connected());
5017 EXPECT_EQ(default_timeout + five_ms,
5018 connection_.GetTimeoutAlarm()->deadline());
5019
5020 // This time, we should time out.
5021 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
5022 ConnectionCloseSource::FROM_SELF));
5023 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5024 clock_.AdvanceTime(five_ms);
5025 EXPECT_EQ(default_timeout + five_ms, clock_.ApproximateNow());
5026 connection_.GetTimeoutAlarm()->Fire();
5027 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
5028 EXPECT_FALSE(connection_.connected());
5029}
5030
5031TEST_P(QuicConnectionTest, TimeoutAfterRetransmission) {
5032 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5033 EXPECT_TRUE(connection_.connected());
5034 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
5035 QuicConfig config;
5036 connection_.SetFromConfig(config);
5037 EXPECT_FALSE(QuicConnectionPeer::IsSilentCloseEnabled(&connection_));
5038
5039 const QuicTime start_time = clock_.Now();
5040 const QuicTime::Delta initial_idle_timeout =
5041 QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1);
5042 QuicTime default_timeout = clock_.Now() + initial_idle_timeout;
5043
5044 connection_.SetMaxTailLossProbes(0);
5045 const QuicTime default_retransmission_time =
5046 start_time + DefaultRetransmissionTime();
5047
5048 ASSERT_LT(default_retransmission_time, default_timeout);
5049
5050 // When we send a packet, the timeout will change to 5 ms +
5051 // kInitialIdleTimeoutSecs (but it will not reschedule the alarm).
5052 const QuicTime::Delta five_ms = QuicTime::Delta::FromMilliseconds(5);
5053 const QuicTime send_time = start_time + five_ms;
5054 clock_.AdvanceTime(five_ms);
5055 ASSERT_EQ(send_time, clock_.Now());
5056 SendStreamDataToPeer(
5057 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5058 0, FIN, nullptr);
5059 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5060
5061 // Move forward 5 ms and receive a packet, which will move the timeout
5062 // forward 5 ms more (but will not reschedule the alarm).
5063 const QuicTime receive_time = send_time + five_ms;
5064 clock_.AdvanceTime(receive_time - clock_.Now());
5065 ASSERT_EQ(receive_time, clock_.Now());
5066 ProcessPacket(1);
5067
5068 // Now move forward to the retransmission time and retransmit the
5069 // packet, which should move the timeout forward again (but will not
5070 // reschedule the alarm).
5071 EXPECT_EQ(default_retransmission_time + five_ms,
5072 connection_.GetRetransmissionAlarm()->deadline());
5073 // Simulate the retransmission alarm firing.
5074 const QuicTime rto_time = send_time + DefaultRetransmissionTime();
5075 const QuicTime final_timeout = rto_time + initial_idle_timeout;
5076 clock_.AdvanceTime(rto_time - clock_.Now());
5077 ASSERT_EQ(rto_time, clock_.Now());
5078 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(2u), _, _));
5079 connection_.GetRetransmissionAlarm()->Fire();
5080
5081 // Advance to the original timeout and fire the alarm. The connection should
5082 // timeout, and the alarm should be registered based on the time of the
5083 // retransmission.
5084 clock_.AdvanceTime(default_timeout - clock_.Now());
5085 ASSERT_EQ(default_timeout.ToDebuggingValue(),
5086 clock_.Now().ToDebuggingValue());
5087 EXPECT_EQ(default_timeout, clock_.Now());
5088 connection_.GetTimeoutAlarm()->Fire();
5089 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
5090 EXPECT_TRUE(connection_.connected());
5091 ASSERT_EQ(final_timeout.ToDebuggingValue(),
5092 connection_.GetTimeoutAlarm()->deadline().ToDebuggingValue());
5093
5094 // This time, we should time out.
5095 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
5096 ConnectionCloseSource::FROM_SELF));
5097 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5098 clock_.AdvanceTime(final_timeout - clock_.Now());
5099 EXPECT_EQ(connection_.GetTimeoutAlarm()->deadline(), clock_.Now());
5100 EXPECT_EQ(final_timeout, clock_.Now());
5101 connection_.GetTimeoutAlarm()->Fire();
5102 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
5103 EXPECT_FALSE(connection_.connected());
5104}
5105
5106TEST_P(QuicConnectionTest, NewTimeoutAfterSendSilentClose) {
5107 // Same test as above, but complete a handshake which enables silent close,
5108 // causing no connection close packet to be sent.
5109 EXPECT_TRUE(connection_.connected());
5110 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
5111 QuicConfig config;
5112
5113 // Create a handshake message that also enables silent close.
5114 CryptoHandshakeMessage msg;
vasilvvc48c8712019-03-11 13:38:16 -07005115 std::string error_details;
QUICHE teama6ef0a62019-03-07 20:34:33 -05005116 QuicConfig client_config;
5117 client_config.SetInitialStreamFlowControlWindowToSend(
5118 kInitialStreamFlowControlWindowForTest);
5119 client_config.SetInitialSessionFlowControlWindowToSend(
5120 kInitialSessionFlowControlWindowForTest);
5121 client_config.SetIdleNetworkTimeout(
5122 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs),
5123 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs));
fkastenholzd3a1de92019-05-15 07:00:07 -07005124 client_config.ToHandshakeMessage(&msg, connection_.transport_version());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005125 const QuicErrorCode error =
5126 config.ProcessPeerHello(msg, CLIENT, &error_details);
5127 EXPECT_EQ(QUIC_NO_ERROR, error);
5128
5129 connection_.SetFromConfig(config);
5130 EXPECT_TRUE(QuicConnectionPeer::IsSilentCloseEnabled(&connection_));
5131
5132 const QuicTime::Delta default_idle_timeout =
5133 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs - 1);
5134 const QuicTime::Delta five_ms = QuicTime::Delta::FromMilliseconds(5);
5135 QuicTime default_timeout = clock_.ApproximateNow() + default_idle_timeout;
5136
5137 // When we send a packet, the timeout will change to 5ms +
5138 // kInitialIdleTimeoutSecs.
5139 clock_.AdvanceTime(five_ms);
5140 SendStreamDataToPeer(
5141 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5142 0, FIN, nullptr);
5143 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5144
5145 // Now send more data. This will not move the timeout because
5146 // no data has been received since the previous write.
5147 clock_.AdvanceTime(five_ms);
5148 SendStreamDataToPeer(
5149 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5150 3, FIN, nullptr);
5151 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5152
5153 // The original alarm will fire. We should not time out because we had a
5154 // network event at t=5ms. The alarm will reregister.
5155 clock_.AdvanceTime(default_idle_timeout - five_ms - five_ms);
5156 EXPECT_EQ(default_timeout, clock_.ApproximateNow());
5157 connection_.GetTimeoutAlarm()->Fire();
5158 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
5159 EXPECT_TRUE(connection_.connected());
5160 EXPECT_EQ(default_timeout + five_ms,
5161 connection_.GetTimeoutAlarm()->deadline());
5162
5163 // This time, we should time out.
5164 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
5165 ConnectionCloseSource::FROM_SELF));
5166 clock_.AdvanceTime(five_ms);
5167 EXPECT_EQ(default_timeout + five_ms, clock_.ApproximateNow());
5168 connection_.GetTimeoutAlarm()->Fire();
5169 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
5170 EXPECT_FALSE(connection_.connected());
5171}
5172
5173TEST_P(QuicConnectionTest, TimeoutAfterSendSilentCloseAndTLP) {
5174 // Same test as above, but complete a handshake which enables silent close,
5175 // but sending TLPs causes the connection close to be sent.
5176 EXPECT_TRUE(connection_.connected());
5177 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
5178 QuicConfig config;
5179
5180 // Create a handshake message that also enables silent close.
5181 CryptoHandshakeMessage msg;
vasilvvc48c8712019-03-11 13:38:16 -07005182 std::string error_details;
QUICHE teama6ef0a62019-03-07 20:34:33 -05005183 QuicConfig client_config;
5184 client_config.SetInitialStreamFlowControlWindowToSend(
5185 kInitialStreamFlowControlWindowForTest);
5186 client_config.SetInitialSessionFlowControlWindowToSend(
5187 kInitialSessionFlowControlWindowForTest);
5188 client_config.SetIdleNetworkTimeout(
5189 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs),
5190 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs));
fkastenholzd3a1de92019-05-15 07:00:07 -07005191 client_config.ToHandshakeMessage(&msg, connection_.transport_version());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005192 const QuicErrorCode error =
5193 config.ProcessPeerHello(msg, CLIENT, &error_details);
5194 EXPECT_EQ(QUIC_NO_ERROR, error);
5195
5196 connection_.SetFromConfig(config);
5197 EXPECT_TRUE(QuicConnectionPeer::IsSilentCloseEnabled(&connection_));
5198
5199 const QuicTime::Delta default_idle_timeout =
5200 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs - 1);
5201 const QuicTime::Delta five_ms = QuicTime::Delta::FromMilliseconds(5);
5202 QuicTime default_timeout = clock_.ApproximateNow() + default_idle_timeout;
5203
5204 // When we send a packet, the timeout will change to 5ms +
5205 // kInitialIdleTimeoutSecs.
5206 clock_.AdvanceTime(five_ms);
5207 SendStreamDataToPeer(
5208 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5209 0, FIN, nullptr);
5210 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5211
5212 // Retransmit the packet via tail loss probe.
5213 clock_.AdvanceTime(connection_.GetRetransmissionAlarm()->deadline() -
5214 clock_.Now());
5215 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(2u), _, _));
5216 connection_.GetRetransmissionAlarm()->Fire();
5217
5218 // This time, we should time out and send a connection close due to the TLP.
5219 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
5220 ConnectionCloseSource::FROM_SELF));
5221 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5222 clock_.AdvanceTime(connection_.GetTimeoutAlarm()->deadline() -
5223 clock_.ApproximateNow() + five_ms);
5224 connection_.GetTimeoutAlarm()->Fire();
5225 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
5226 EXPECT_FALSE(connection_.connected());
5227}
5228
5229TEST_P(QuicConnectionTest, TimeoutAfterSendSilentCloseWithOpenStreams) {
5230 // Same test as above, but complete a handshake which enables silent close,
5231 // but having open streams causes the connection close to be sent.
5232 EXPECT_TRUE(connection_.connected());
5233 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
5234 QuicConfig config;
5235
5236 // Create a handshake message that also enables silent close.
5237 CryptoHandshakeMessage msg;
vasilvvc48c8712019-03-11 13:38:16 -07005238 std::string error_details;
QUICHE teama6ef0a62019-03-07 20:34:33 -05005239 QuicConfig client_config;
5240 client_config.SetInitialStreamFlowControlWindowToSend(
5241 kInitialStreamFlowControlWindowForTest);
5242 client_config.SetInitialSessionFlowControlWindowToSend(
5243 kInitialSessionFlowControlWindowForTest);
5244 client_config.SetIdleNetworkTimeout(
5245 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs),
5246 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs));
fkastenholzd3a1de92019-05-15 07:00:07 -07005247 client_config.ToHandshakeMessage(&msg, connection_.transport_version());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005248 const QuicErrorCode error =
5249 config.ProcessPeerHello(msg, CLIENT, &error_details);
5250 EXPECT_EQ(QUIC_NO_ERROR, error);
5251
5252 connection_.SetFromConfig(config);
5253 EXPECT_TRUE(QuicConnectionPeer::IsSilentCloseEnabled(&connection_));
5254
5255 const QuicTime::Delta default_idle_timeout =
5256 QuicTime::Delta::FromSeconds(kDefaultIdleTimeoutSecs - 1);
5257 const QuicTime::Delta five_ms = QuicTime::Delta::FromMilliseconds(5);
5258 QuicTime default_timeout = clock_.ApproximateNow() + default_idle_timeout;
5259
5260 // When we send a packet, the timeout will change to 5ms +
5261 // kInitialIdleTimeoutSecs.
5262 clock_.AdvanceTime(five_ms);
5263 SendStreamDataToPeer(
5264 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5265 0, FIN, nullptr);
5266 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5267
5268 // Indicate streams are still open.
5269 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
5270 .WillRepeatedly(Return(true));
5271
5272 // This time, we should time out and send a connection close due to the TLP.
5273 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
5274 ConnectionCloseSource::FROM_SELF));
5275 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5276 clock_.AdvanceTime(connection_.GetTimeoutAlarm()->deadline() -
5277 clock_.ApproximateNow() + five_ms);
5278 connection_.GetTimeoutAlarm()->Fire();
5279 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
5280 EXPECT_FALSE(connection_.connected());
5281}
5282
5283TEST_P(QuicConnectionTest, TimeoutAfterReceive) {
5284 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5285 EXPECT_TRUE(connection_.connected());
5286 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
5287 QuicConfig config;
5288 connection_.SetFromConfig(config);
5289 EXPECT_FALSE(QuicConnectionPeer::IsSilentCloseEnabled(&connection_));
5290
5291 const QuicTime::Delta initial_idle_timeout =
5292 QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1);
5293 const QuicTime::Delta five_ms = QuicTime::Delta::FromMilliseconds(5);
5294 QuicTime default_timeout = clock_.ApproximateNow() + initial_idle_timeout;
5295
5296 connection_.SendStreamDataWithString(
5297 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5298 0, NO_FIN);
5299 connection_.SendStreamDataWithString(
5300 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5301 3, NO_FIN);
5302
5303 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5304 clock_.AdvanceTime(five_ms);
5305
5306 // When we receive a packet, the timeout will change to 5ms +
5307 // kInitialIdleTimeoutSecs.
5308 QuicAckFrame ack = InitAckFrame(2);
5309 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
5310 ProcessAckPacket(&ack);
5311
5312 // The original alarm will fire. We should not time out because we had a
5313 // network event at t=5ms. The alarm will reregister.
5314 clock_.AdvanceTime(initial_idle_timeout - five_ms);
5315 EXPECT_EQ(default_timeout, clock_.ApproximateNow());
5316 connection_.GetTimeoutAlarm()->Fire();
5317 EXPECT_TRUE(connection_.connected());
5318 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
5319 EXPECT_EQ(default_timeout + five_ms,
5320 connection_.GetTimeoutAlarm()->deadline());
5321
5322 // This time, we should time out.
5323 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
5324 ConnectionCloseSource::FROM_SELF));
5325 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5326 clock_.AdvanceTime(five_ms);
5327 EXPECT_EQ(default_timeout + five_ms, clock_.ApproximateNow());
5328 connection_.GetTimeoutAlarm()->Fire();
5329 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
5330 EXPECT_FALSE(connection_.connected());
5331}
5332
5333TEST_P(QuicConnectionTest, TimeoutAfterReceiveNotSendWhenUnacked) {
5334 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5335 EXPECT_TRUE(connection_.connected());
5336 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
5337 QuicConfig config;
5338 connection_.SetFromConfig(config);
5339 EXPECT_FALSE(QuicConnectionPeer::IsSilentCloseEnabled(&connection_));
5340
5341 const QuicTime::Delta initial_idle_timeout =
5342 QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs - 1);
5343 connection_.SetNetworkTimeouts(
5344 QuicTime::Delta::Infinite(),
5345 initial_idle_timeout + QuicTime::Delta::FromSeconds(1));
5346 const QuicTime::Delta five_ms = QuicTime::Delta::FromMilliseconds(5);
5347 QuicTime default_timeout = clock_.ApproximateNow() + initial_idle_timeout;
5348
5349 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5350 connection_.SendStreamDataWithString(
5351 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5352 0, NO_FIN);
5353 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5354 connection_.SendStreamDataWithString(
5355 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5356 3, NO_FIN);
5357
5358 EXPECT_EQ(default_timeout, connection_.GetTimeoutAlarm()->deadline());
5359
5360 clock_.AdvanceTime(five_ms);
5361
5362 // When we receive a packet, the timeout will change to 5ms +
5363 // kInitialIdleTimeoutSecs.
5364 QuicAckFrame ack = InitAckFrame(2);
5365 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
5366 ProcessAckPacket(&ack);
5367
5368 // The original alarm will fire. We should not time out because we had a
5369 // network event at t=5ms. The alarm will reregister.
5370 clock_.AdvanceTime(initial_idle_timeout - five_ms);
5371 EXPECT_EQ(default_timeout, clock_.ApproximateNow());
5372 connection_.GetTimeoutAlarm()->Fire();
5373 EXPECT_TRUE(connection_.connected());
5374 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
5375 EXPECT_EQ(default_timeout + five_ms,
5376 connection_.GetTimeoutAlarm()->deadline());
5377
5378 // Now, send packets while advancing the time and verify that the connection
5379 // eventually times out.
5380 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_NETWORK_IDLE_TIMEOUT, _,
5381 ConnectionCloseSource::FROM_SELF));
5382 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(AnyNumber());
5383 for (int i = 0; i < 100 && connection_.connected(); ++i) {
5384 QUIC_LOG(INFO) << "sending data packet";
5385 connection_.SendStreamDataWithString(
5386 GetNthClientInitiatedStreamId(1, connection_.transport_version()),
5387 "foo", 0, NO_FIN);
5388 connection_.GetTimeoutAlarm()->Fire();
5389 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(1));
5390 }
5391 EXPECT_FALSE(connection_.connected());
5392 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
5393}
5394
5395TEST_P(QuicConnectionTest, TimeoutAfter5ClientRTOs) {
5396 connection_.SetMaxTailLossProbes(2);
5397 EXPECT_TRUE(connection_.connected());
5398 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
5399 QuicConfig config;
5400 QuicTagVector connection_options;
5401 connection_options.push_back(k5RTO);
5402 config.SetConnectionOptionsToSend(connection_options);
5403 connection_.SetFromConfig(config);
5404
5405 // Send stream data.
5406 SendStreamDataToPeer(
5407 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
5408 0, FIN, nullptr);
5409
5410 // Fire the retransmission alarm 6 times, twice for TLP and 4 times for RTO.
5411 for (int i = 0; i < 6; ++i) {
5412 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5413 connection_.GetRetransmissionAlarm()->Fire();
5414 EXPECT_TRUE(connection_.GetTimeoutAlarm()->IsSet());
5415 EXPECT_TRUE(connection_.connected());
5416 }
5417
5418 EXPECT_EQ(2u, connection_.sent_packet_manager().GetConsecutiveTlpCount());
5419 EXPECT_EQ(4u, connection_.sent_packet_manager().GetConsecutiveRtoCount());
5420 // This time, we should time out.
5421 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_TOO_MANY_RTOS, _,
5422 ConnectionCloseSource::FROM_SELF));
5423 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
5424 connection_.GetRetransmissionAlarm()->Fire();
5425 EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
5426 EXPECT_FALSE(connection_.connected());
5427}
5428
5429TEST_P(QuicConnectionTest, SendScheduler) {
5430 // Test that if we send a packet without delay, it is not queued.
5431 QuicFramerPeer::SetPerspective(&peer_framer_, Perspective::IS_CLIENT);
QUICHE team8c1daa22019-03-13 08:33:41 -07005432 std::unique_ptr<QuicPacket> packet =
QUICHE team6987b4a2019-03-15 16:23:04 -07005433 ConstructDataPacket(1, !kHasStopWaiting, ENCRYPTION_INITIAL);
QUICHE teama6ef0a62019-03-07 20:34:33 -05005434 QuicPacketCreatorPeer::SetPacketNumber(creator_, 1);
5435 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
QUICHE team6987b4a2019-03-15 16:23:04 -07005436 connection_.SendPacket(ENCRYPTION_INITIAL, 1, std::move(packet),
QUICHE teama6ef0a62019-03-07 20:34:33 -05005437 HAS_RETRANSMITTABLE_DATA, false, false);
5438 EXPECT_EQ(0u, connection_.NumQueuedPackets());
5439}
5440
5441TEST_P(QuicConnectionTest, FailToSendFirstPacket) {
5442 // Test that the connection does not crash when it fails to send the first
5443 // packet at which point self_address_ might be uninitialized.
5444 QuicFramerPeer::SetPerspective(&peer_framer_, Perspective::IS_CLIENT);
5445 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _)).Times(1);
QUICHE team8c1daa22019-03-13 08:33:41 -07005446 std::unique_ptr<QuicPacket> packet =
QUICHE team6987b4a2019-03-15 16:23:04 -07005447 ConstructDataPacket(1, !kHasStopWaiting, ENCRYPTION_INITIAL);
QUICHE teama6ef0a62019-03-07 20:34:33 -05005448 QuicPacketCreatorPeer::SetPacketNumber(creator_, 1);
5449 writer_->SetShouldWriteFail();
QUICHE team6987b4a2019-03-15 16:23:04 -07005450 connection_.SendPacket(ENCRYPTION_INITIAL, 1, std::move(packet),
QUICHE teama6ef0a62019-03-07 20:34:33 -05005451 HAS_RETRANSMITTABLE_DATA, false, false);
5452}
5453
5454TEST_P(QuicConnectionTest, SendSchedulerEAGAIN) {
5455 QuicFramerPeer::SetPerspective(&peer_framer_, Perspective::IS_CLIENT);
QUICHE team8c1daa22019-03-13 08:33:41 -07005456 std::unique_ptr<QuicPacket> packet =
QUICHE team6987b4a2019-03-15 16:23:04 -07005457 ConstructDataPacket(1, !kHasStopWaiting, ENCRYPTION_INITIAL);
QUICHE teama6ef0a62019-03-07 20:34:33 -05005458 QuicPacketCreatorPeer::SetPacketNumber(creator_, 1);
5459 BlockOnNextWrite();
5460 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(2u), _, _))
5461 .Times(0);
QUICHE team6987b4a2019-03-15 16:23:04 -07005462 connection_.SendPacket(ENCRYPTION_INITIAL, 1, std::move(packet),
QUICHE teama6ef0a62019-03-07 20:34:33 -05005463 HAS_RETRANSMITTABLE_DATA, false, false);
5464 EXPECT_EQ(1u, connection_.NumQueuedPackets());
5465}
5466
5467TEST_P(QuicConnectionTest, TestQueueLimitsOnSendStreamData) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05005468 // Queue the first packet.
ianswett3085da82019-04-04 07:24:24 -07005469 size_t payload_length = connection_.max_packet_length();
QUICHE teama6ef0a62019-03-07 20:34:33 -05005470 EXPECT_CALL(*send_algorithm_, CanSend(_)).WillOnce(testing::Return(false));
vasilvvc48c8712019-03-11 13:38:16 -07005471 const std::string payload(payload_length, 'a');
ianswett3085da82019-04-04 07:24:24 -07005472 QuicStreamId first_bidi_stream_id(QuicUtils::GetFirstBidirectionalStreamId(
5473 connection_.version().transport_version, Perspective::IS_CLIENT));
5474 EXPECT_EQ(0u, connection_
5475 .SendStreamDataWithString(first_bidi_stream_id, payload, 0,
5476 NO_FIN)
QUICHE teama6ef0a62019-03-07 20:34:33 -05005477 .bytes_consumed);
5478 EXPECT_EQ(0u, connection_.NumQueuedPackets());
5479}
5480
ianswett3085da82019-04-04 07:24:24 -07005481TEST_P(QuicConnectionTest, SendingThreePackets) {
ianswett3085da82019-04-04 07:24:24 -07005482 // Make the payload twice the size of the packet, so 3 packets are written.
5483 size_t total_payload_length = 2 * connection_.max_packet_length();
vasilvvc48c8712019-03-11 13:38:16 -07005484 const std::string payload(total_payload_length, 'a');
ianswett3085da82019-04-04 07:24:24 -07005485 QuicStreamId first_bidi_stream_id(QuicUtils::GetFirstBidirectionalStreamId(
5486 connection_.version().transport_version, Perspective::IS_CLIENT));
5487 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(3);
5488 EXPECT_EQ(payload.size(), connection_
5489 .SendStreamDataWithString(first_bidi_stream_id,
5490 payload, 0, NO_FIN)
5491 .bytes_consumed);
QUICHE teama6ef0a62019-03-07 20:34:33 -05005492}
5493
5494TEST_P(QuicConnectionTest, LoopThroughSendingPacketsWithTruncation) {
5495 set_perspective(Perspective::IS_SERVER);
5496 if (GetParam().version.transport_version <= QUIC_VERSION_43) {
5497 // For IETF QUIC, encryption level will be switched to FORWARD_SECURE in
5498 // SendStreamDataWithString.
5499 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
5500 }
5501 // Set up a larger payload than will fit in one packet.
vasilvvc48c8712019-03-11 13:38:16 -07005502 const std::string payload(connection_.max_packet_length(), 'a');
QUICHE teama6ef0a62019-03-07 20:34:33 -05005503 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _)).Times(AnyNumber());
5504
5505 // Now send some packets with no truncation.
5506 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
5507 EXPECT_EQ(payload.size(),
5508 connection_.SendStreamDataWithString(3, payload, 0, NO_FIN)
5509 .bytes_consumed);
5510 // Track the size of the second packet here. The overhead will be the largest
5511 // we see in this test, due to the non-truncated connection id.
5512 size_t non_truncated_packet_size = writer_->last_packet_size();
5513
5514 // Change to a 0 byte connection id.
5515 QuicConfig config;
5516 QuicConfigPeer::SetReceivedBytesForConnectionId(&config, 0);
5517 connection_.SetFromConfig(config);
5518 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
5519 EXPECT_EQ(payload.size(),
5520 connection_.SendStreamDataWithString(3, payload, 1350, NO_FIN)
5521 .bytes_consumed);
5522 if (connection_.transport_version() > QUIC_VERSION_43) {
5523 // Short header packets sent from server omit connection ID already, and
5524 // stream offset size increases from 0 to 2.
5525 EXPECT_EQ(non_truncated_packet_size, writer_->last_packet_size() - 2);
5526 } else {
5527 // Just like above, we save 8 bytes on payload, and 8 on truncation. -2
5528 // because stream offset size is 2 instead of 0.
5529 EXPECT_EQ(non_truncated_packet_size,
5530 writer_->last_packet_size() + 8 * 2 - 2);
5531 }
5532}
5533
5534TEST_P(QuicConnectionTest, SendDelayedAck) {
5535 QuicTime ack_time = clock_.ApproximateNow() + DefaultDelayedAckTime();
5536 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5537 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5538 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07005539 SetDecrypter(ENCRYPTION_ZERO_RTT,
5540 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05005541 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
5542 QuicMakeUnique<TaggingEncrypter>(tag));
5543 // Process a packet from the non-crypto stream.
5544 frame1_.stream_id = 3;
5545
5546 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07005547 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05005548 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5549 ProcessDataPacketAtLevel(1, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5550
5551 // Check if delayed ack timer is running for the expected interval.
5552 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5553 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5554 // Simulate delayed ack alarm firing.
QUICHE team8c1daa22019-03-13 08:33:41 -07005555 clock_.AdvanceTime(DefaultDelayedAckTime());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005556 connection_.GetAckAlarm()->Fire();
5557 // Check that ack is sent and that delayed ack alarm is reset.
nharper55fa6132019-05-07 19:37:21 -07005558 size_t padding_frame_count = writer_->padding_frames().size();
QUICHE teama6ef0a62019-03-07 20:34:33 -05005559 if (GetParam().no_stop_waiting) {
nharper55fa6132019-05-07 19:37:21 -07005560 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005561 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
5562 } else {
nharper55fa6132019-05-07 19:37:21 -07005563 EXPECT_EQ(padding_frame_count + 2u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005564 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
5565 }
5566 EXPECT_FALSE(writer_->ack_frames().empty());
5567 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5568}
5569
5570TEST_P(QuicConnectionTest, SendDelayedAfterQuiescence) {
5571 QuicConnectionPeer::SetFastAckAfterQuiescence(&connection_, true);
5572
5573 // The beginning of the connection counts as quiescence.
5574 QuicTime ack_time =
5575 clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(1);
5576 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5577 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5578 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07005579 SetDecrypter(ENCRYPTION_ZERO_RTT,
5580 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05005581 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
5582 QuicMakeUnique<TaggingEncrypter>(tag));
5583 // Process a packet from the non-crypto stream.
5584 frame1_.stream_id = 3;
5585
5586 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07005587 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05005588 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5589 ProcessDataPacketAtLevel(1, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5590
5591 // Check if delayed ack timer is running for the expected interval.
5592 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5593 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5594 // Simulate delayed ack alarm firing.
QUICHE team8c1daa22019-03-13 08:33:41 -07005595 clock_.AdvanceTime(DefaultDelayedAckTime());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005596 connection_.GetAckAlarm()->Fire();
5597 // Check that ack is sent and that delayed ack alarm is reset.
nharper55fa6132019-05-07 19:37:21 -07005598 size_t padding_frame_count = writer_->padding_frames().size();
QUICHE teama6ef0a62019-03-07 20:34:33 -05005599 if (GetParam().no_stop_waiting) {
nharper55fa6132019-05-07 19:37:21 -07005600 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005601 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
5602 } else {
nharper55fa6132019-05-07 19:37:21 -07005603 EXPECT_EQ(padding_frame_count + 2u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005604 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
5605 }
5606 EXPECT_FALSE(writer_->ack_frames().empty());
5607 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5608
5609 // Process another packet immedately after sending the ack and expect the
5610 // ack alarm to be set delayed ack time in the future.
5611 ack_time = clock_.ApproximateNow() + DefaultDelayedAckTime();
5612 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5613 ProcessDataPacketAtLevel(2, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5614
5615 // Check if delayed ack timer is running for the expected interval.
5616 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5617 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5618 // Simulate delayed ack alarm firing.
QUICHE team8c1daa22019-03-13 08:33:41 -07005619 clock_.AdvanceTime(DefaultDelayedAckTime());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005620 connection_.GetAckAlarm()->Fire();
5621 // Check that ack is sent and that delayed ack alarm is reset.
nharper55fa6132019-05-07 19:37:21 -07005622 padding_frame_count = writer_->padding_frames().size();
QUICHE teama6ef0a62019-03-07 20:34:33 -05005623 if (GetParam().no_stop_waiting) {
nharper55fa6132019-05-07 19:37:21 -07005624 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005625 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
5626 } else {
nharper55fa6132019-05-07 19:37:21 -07005627 EXPECT_EQ(padding_frame_count + 2u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005628 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
5629 }
5630 EXPECT_FALSE(writer_->ack_frames().empty());
5631 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5632
5633 // Wait 1 second and enesure the ack alarm is set to 1ms in the future.
5634 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(1));
5635 ack_time = clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(1);
5636 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5637 ProcessDataPacketAtLevel(3, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5638
5639 // Check if delayed ack timer is running for the expected interval.
5640 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5641 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5642}
5643
5644TEST_P(QuicConnectionTest, SendDelayedAckDecimation) {
5645 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
5646 QuicConnectionPeer::SetAckMode(&connection_, ACK_DECIMATION);
5647
5648 const size_t kMinRttMs = 40;
5649 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
5650 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
5651 QuicTime::Delta::Zero(), QuicTime::Zero());
5652 // The ack time should be based on min_rtt/4, since it's less than the
5653 // default delayed ack time.
5654 QuicTime ack_time = clock_.ApproximateNow() +
5655 QuicTime::Delta::FromMilliseconds(kMinRttMs / 4);
5656 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5657 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5658 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07005659 SetDecrypter(ENCRYPTION_ZERO_RTT,
5660 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05005661 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
5662 QuicMakeUnique<TaggingEncrypter>(tag));
5663 // Process a packet from the non-crypto stream.
5664 frame1_.stream_id = 3;
5665
5666 // Process all the initial packets in order so there aren't missing packets.
5667 uint64_t kFirstDecimatedPacket = 101;
5668 for (unsigned int i = 0; i < kFirstDecimatedPacket - 1; ++i) {
5669 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5670 ProcessDataPacketAtLevel(1 + i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5671 }
5672 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5673 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07005674 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05005675 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5676 ProcessDataPacketAtLevel(kFirstDecimatedPacket, !kHasStopWaiting,
5677 ENCRYPTION_ZERO_RTT);
5678
5679 // Check if delayed ack timer is running for the expected interval.
5680 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5681 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5682
5683 // The 10th received packet causes an ack to be sent.
5684 for (int i = 0; i < 9; ++i) {
5685 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5686 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5687 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 1 + i, !kHasStopWaiting,
5688 ENCRYPTION_ZERO_RTT);
5689 }
5690 // Check that ack is sent and that delayed ack alarm is reset.
5691 if (GetParam().no_stop_waiting) {
5692 EXPECT_EQ(1u, writer_->frame_count());
5693 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
5694 } else {
5695 EXPECT_EQ(2u, writer_->frame_count());
5696 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
5697 }
5698 EXPECT_FALSE(writer_->ack_frames().empty());
5699 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5700}
5701
5702TEST_P(QuicConnectionTest, SendDelayedAckAckDecimationAfterQuiescence) {
5703 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
5704 QuicConnectionPeer::SetAckMode(&connection_, ACK_DECIMATION);
5705 QuicConnectionPeer::SetFastAckAfterQuiescence(&connection_, true);
5706
5707 const size_t kMinRttMs = 40;
5708 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
5709 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
5710 QuicTime::Delta::Zero(), QuicTime::Zero());
5711
5712 // The beginning of the connection counts as quiescence.
5713 QuicTime ack_time =
5714 clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(1);
5715 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5716 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5717 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07005718 SetDecrypter(ENCRYPTION_ZERO_RTT,
5719 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05005720 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
5721 QuicMakeUnique<TaggingEncrypter>(tag));
5722 // Process a packet from the non-crypto stream.
5723 frame1_.stream_id = 3;
5724
5725 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07005726 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05005727 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5728 ProcessDataPacketAtLevel(1, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5729
5730 // Check if delayed ack timer is running for the expected interval.
5731 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5732 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5733 // Simulate delayed ack alarm firing.
QUICHE team8c1daa22019-03-13 08:33:41 -07005734 clock_.AdvanceTime(DefaultDelayedAckTime());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005735 connection_.GetAckAlarm()->Fire();
5736 // Check that ack is sent and that delayed ack alarm is reset.
nharper55fa6132019-05-07 19:37:21 -07005737 size_t padding_frame_count = writer_->padding_frames().size();
QUICHE teama6ef0a62019-03-07 20:34:33 -05005738 if (GetParam().no_stop_waiting) {
nharper55fa6132019-05-07 19:37:21 -07005739 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005740 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
5741 } else {
nharper55fa6132019-05-07 19:37:21 -07005742 EXPECT_EQ(padding_frame_count + 2u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005743 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
5744 }
5745 EXPECT_FALSE(writer_->ack_frames().empty());
5746 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5747
5748 // Process another packet immedately after sending the ack and expect the
5749 // ack alarm to be set delayed ack time in the future.
5750 ack_time = clock_.ApproximateNow() + DefaultDelayedAckTime();
5751 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5752 ProcessDataPacketAtLevel(2, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5753
5754 // Check if delayed ack timer is running for the expected interval.
5755 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5756 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5757 // Simulate delayed ack alarm firing.
QUICHE team8c1daa22019-03-13 08:33:41 -07005758 clock_.AdvanceTime(DefaultDelayedAckTime());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005759 connection_.GetAckAlarm()->Fire();
5760 // Check that ack is sent and that delayed ack alarm is reset.
nharper55fa6132019-05-07 19:37:21 -07005761 padding_frame_count = writer_->padding_frames().size();
QUICHE teama6ef0a62019-03-07 20:34:33 -05005762 if (GetParam().no_stop_waiting) {
nharper55fa6132019-05-07 19:37:21 -07005763 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005764 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
5765 } else {
nharper55fa6132019-05-07 19:37:21 -07005766 EXPECT_EQ(padding_frame_count + 2u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05005767 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
5768 }
5769 EXPECT_FALSE(writer_->ack_frames().empty());
5770 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5771
5772 // Wait 1 second and enesure the ack alarm is set to 1ms in the future.
5773 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(1));
5774 ack_time = clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(1);
5775 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5776 ProcessDataPacketAtLevel(3, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5777
5778 // Check if delayed ack timer is running for the expected interval.
5779 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5780 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5781
5782 // Process enough packets to get into ack decimation behavior.
5783 // The ack time should be based on min_rtt/4, since it's less than the
5784 // default delayed ack time.
5785 ack_time = clock_.ApproximateNow() +
5786 QuicTime::Delta::FromMilliseconds(kMinRttMs / 4);
5787 uint64_t kFirstDecimatedPacket = 101;
5788 for (unsigned int i = 0; i < kFirstDecimatedPacket - 4; ++i) {
5789 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5790 ProcessDataPacketAtLevel(4 + i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5791 }
5792 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5793 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07005794 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05005795 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5796 ProcessDataPacketAtLevel(kFirstDecimatedPacket, !kHasStopWaiting,
5797 ENCRYPTION_ZERO_RTT);
5798
5799 // Check if delayed ack timer is running for the expected interval.
5800 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5801 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5802
5803 // The 10th received packet causes an ack to be sent.
5804 for (int i = 0; i < 9; ++i) {
5805 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5806 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5807 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 1 + i, !kHasStopWaiting,
5808 ENCRYPTION_ZERO_RTT);
5809 }
5810 // Check that ack is sent and that delayed ack alarm is reset.
5811 if (GetParam().no_stop_waiting) {
5812 EXPECT_EQ(1u, writer_->frame_count());
5813 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
5814 } else {
5815 EXPECT_EQ(2u, writer_->frame_count());
5816 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
5817 }
5818 EXPECT_FALSE(writer_->ack_frames().empty());
5819 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5820
5821 // Wait 1 second and enesure the ack alarm is set to 1ms in the future.
5822 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(1));
5823 ack_time = clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(1);
5824 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5825 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 10, !kHasStopWaiting,
5826 ENCRYPTION_ZERO_RTT);
5827
5828 // Check if delayed ack timer is running for the expected interval.
5829 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5830 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5831}
5832
5833TEST_P(QuicConnectionTest, SendDelayedAckDecimationUnlimitedAggregation) {
5834 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
5835 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
5836 QuicConfig config;
5837 QuicTagVector connection_options;
5838 connection_options.push_back(kACKD);
5839 // No limit on the number of packets received before sending an ack.
5840 connection_options.push_back(kAKDU);
5841 config.SetConnectionOptionsToSend(connection_options);
5842 connection_.SetFromConfig(config);
5843
5844 const size_t kMinRttMs = 40;
5845 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
5846 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
5847 QuicTime::Delta::Zero(), QuicTime::Zero());
5848 // The ack time should be based on min_rtt/4, since it's less than the
5849 // default delayed ack time.
5850 QuicTime ack_time = clock_.ApproximateNow() +
5851 QuicTime::Delta::FromMilliseconds(kMinRttMs / 4);
5852 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5853 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5854 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07005855 SetDecrypter(ENCRYPTION_ZERO_RTT,
5856 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05005857 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
5858 QuicMakeUnique<TaggingEncrypter>(tag));
5859 // Process a packet from the non-crypto stream.
5860 frame1_.stream_id = 3;
5861
5862 // Process all the initial packets in order so there aren't missing packets.
5863 uint64_t kFirstDecimatedPacket = 101;
5864 for (unsigned int i = 0; i < kFirstDecimatedPacket - 1; ++i) {
5865 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5866 ProcessDataPacketAtLevel(1 + i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5867 }
5868 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5869 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07005870 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05005871 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5872 ProcessDataPacketAtLevel(kFirstDecimatedPacket, !kHasStopWaiting,
5873 ENCRYPTION_ZERO_RTT);
5874
5875 // Check if delayed ack timer is running for the expected interval.
5876 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5877 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5878
5879 // 18 packets will not cause an ack to be sent. 19 will because when
5880 // stop waiting frames are in use, we ack every 20 packets no matter what.
5881 for (int i = 0; i < 18; ++i) {
5882 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5883 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5884 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 1 + i, !kHasStopWaiting,
5885 ENCRYPTION_ZERO_RTT);
5886 }
5887 // The delayed ack timer should still be set to the expected deadline.
5888 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5889 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5890}
5891
5892TEST_P(QuicConnectionTest, SendDelayedAckDecimationEighthRtt) {
5893 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
5894 QuicConnectionPeer::SetAckMode(&connection_, ACK_DECIMATION);
5895 QuicConnectionPeer::SetAckDecimationDelay(&connection_, 0.125);
5896
5897 const size_t kMinRttMs = 40;
5898 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
5899 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
5900 QuicTime::Delta::Zero(), QuicTime::Zero());
5901 // The ack time should be based on min_rtt/8, since it's less than the
5902 // default delayed ack time.
5903 QuicTime ack_time = clock_.ApproximateNow() +
5904 QuicTime::Delta::FromMilliseconds(kMinRttMs / 8);
5905 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5906 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5907 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07005908 SetDecrypter(ENCRYPTION_ZERO_RTT,
5909 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05005910 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
5911 QuicMakeUnique<TaggingEncrypter>(tag));
5912 // Process a packet from the non-crypto stream.
5913 frame1_.stream_id = 3;
5914
5915 // Process all the initial packets in order so there aren't missing packets.
5916 uint64_t kFirstDecimatedPacket = 101;
5917 for (unsigned int i = 0; i < kFirstDecimatedPacket - 1; ++i) {
5918 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5919 ProcessDataPacketAtLevel(1 + i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5920 }
5921 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5922 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07005923 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05005924 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5925 ProcessDataPacketAtLevel(kFirstDecimatedPacket, !kHasStopWaiting,
5926 ENCRYPTION_ZERO_RTT);
5927
5928 // Check if delayed ack timer is running for the expected interval.
5929 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5930 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5931
5932 // The 10th received packet causes an ack to be sent.
5933 for (int i = 0; i < 9; ++i) {
5934 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5935 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5936 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 1 + i, !kHasStopWaiting,
5937 ENCRYPTION_ZERO_RTT);
5938 }
5939 // Check that ack is sent and that delayed ack alarm is reset.
5940 if (GetParam().no_stop_waiting) {
5941 EXPECT_EQ(1u, writer_->frame_count());
5942 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
5943 } else {
5944 EXPECT_EQ(2u, writer_->frame_count());
5945 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
5946 }
5947 EXPECT_FALSE(writer_->ack_frames().empty());
5948 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5949}
5950
5951TEST_P(QuicConnectionTest, SendDelayedAckDecimationWithReordering) {
5952 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
5953 QuicConnectionPeer::SetAckMode(&connection_, ACK_DECIMATION_WITH_REORDERING);
5954
5955 const size_t kMinRttMs = 40;
5956 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
5957 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
5958 QuicTime::Delta::Zero(), QuicTime::Zero());
5959 // The ack time should be based on min_rtt/4, since it's less than the
5960 // default delayed ack time.
5961 QuicTime ack_time = clock_.ApproximateNow() +
5962 QuicTime::Delta::FromMilliseconds(kMinRttMs / 4);
5963 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
5964 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5965 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07005966 SetDecrypter(ENCRYPTION_ZERO_RTT,
5967 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05005968 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
5969 QuicMakeUnique<TaggingEncrypter>(tag));
5970 // Process a packet from the non-crypto stream.
5971 frame1_.stream_id = 3;
5972
5973 // Process all the initial packets in order so there aren't missing packets.
5974 uint64_t kFirstDecimatedPacket = 101;
5975 for (unsigned int i = 0; i < kFirstDecimatedPacket - 1; ++i) {
5976 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5977 ProcessDataPacketAtLevel(1 + i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5978 }
5979 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
5980
5981 // Receive one packet out of order and then the rest in order.
5982 // The loop leaves a one packet gap between acks sent to simulate some loss.
5983 for (int j = 0; j < 3; ++j) {
5984 // Process packet 10 first and ensure the alarm is one eighth min_rtt.
5985 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5986 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 9 + (j * 11),
5987 !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
5988 ack_time = clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(5);
5989 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5990 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
5991
5992 // The 10th received packet causes an ack to be sent.
5993 writer_->Reset();
5994 for (int i = 0; i < 9; ++i) {
5995 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
5996 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
5997 // The ACK shouldn't be sent until the 10th packet is processed.
5998 EXPECT_TRUE(writer_->ack_frames().empty());
5999 ProcessDataPacketAtLevel(kFirstDecimatedPacket + i + (j * 11),
6000 !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
6001 }
6002 // Check that ack is sent and that delayed ack alarm is reset.
6003 if (GetParam().no_stop_waiting) {
6004 EXPECT_EQ(1u, writer_->frame_count());
6005 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6006 } else {
6007 EXPECT_EQ(2u, writer_->frame_count());
6008 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6009 }
6010 EXPECT_FALSE(writer_->ack_frames().empty());
6011 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6012 }
6013}
6014
6015TEST_P(QuicConnectionTest, SendDelayedAckDecimationWithLargeReordering) {
6016 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
6017 QuicConnectionPeer::SetAckMode(&connection_, ACK_DECIMATION_WITH_REORDERING);
6018
6019 const size_t kMinRttMs = 40;
6020 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
6021 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
6022 QuicTime::Delta::Zero(), QuicTime::Zero());
6023 // The ack time should be based on min_rtt/4, since it's less than the
6024 // default delayed ack time.
6025 QuicTime ack_time = clock_.ApproximateNow() +
6026 QuicTime::Delta::FromMilliseconds(kMinRttMs / 4);
6027 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6028 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6029 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07006030 SetDecrypter(ENCRYPTION_ZERO_RTT,
6031 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05006032 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
6033 QuicMakeUnique<TaggingEncrypter>(tag));
6034 // Process a packet from the non-crypto stream.
6035 frame1_.stream_id = 3;
6036
6037 // Process all the initial packets in order so there aren't missing packets.
6038 uint64_t kFirstDecimatedPacket = 101;
6039 for (unsigned int i = 0; i < kFirstDecimatedPacket - 1; ++i) {
6040 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6041 ProcessDataPacketAtLevel(1 + i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
6042 }
6043 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6044 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07006045 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05006046 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6047 ProcessDataPacketAtLevel(kFirstDecimatedPacket, !kHasStopWaiting,
6048 ENCRYPTION_ZERO_RTT);
6049
6050 // Check if delayed ack timer is running for the expected interval.
6051 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6052 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
6053
6054 // Process packet 10 first and ensure the alarm is one eighth min_rtt.
6055 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6056 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 19, !kHasStopWaiting,
6057 ENCRYPTION_ZERO_RTT);
6058 ack_time = clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(5);
6059 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6060 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
6061
6062 // The 10th received packet causes an ack to be sent.
6063 for (int i = 0; i < 8; ++i) {
6064 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6065 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6066 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 1 + i, !kHasStopWaiting,
6067 ENCRYPTION_ZERO_RTT);
6068 }
6069 // Check that ack is sent and that delayed ack alarm is reset.
6070 if (GetParam().no_stop_waiting) {
6071 EXPECT_EQ(1u, writer_->frame_count());
6072 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6073 } else {
6074 EXPECT_EQ(2u, writer_->frame_count());
6075 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6076 }
6077 EXPECT_FALSE(writer_->ack_frames().empty());
6078 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6079
6080 // The next packet received in order will cause an immediate ack,
6081 // because it fills a hole.
6082 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6083 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6084 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 10, !kHasStopWaiting,
6085 ENCRYPTION_ZERO_RTT);
6086 // Check that ack is sent and that delayed ack alarm is reset.
6087 if (GetParam().no_stop_waiting) {
6088 EXPECT_EQ(1u, writer_->frame_count());
6089 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6090 } else {
6091 EXPECT_EQ(2u, writer_->frame_count());
6092 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6093 }
6094 EXPECT_FALSE(writer_->ack_frames().empty());
6095 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6096}
6097
6098TEST_P(QuicConnectionTest, SendDelayedAckDecimationWithReorderingEighthRtt) {
6099 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
6100 QuicConnectionPeer::SetAckMode(&connection_, ACK_DECIMATION_WITH_REORDERING);
6101 QuicConnectionPeer::SetAckDecimationDelay(&connection_, 0.125);
6102
6103 const size_t kMinRttMs = 40;
6104 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
6105 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
6106 QuicTime::Delta::Zero(), QuicTime::Zero());
6107 // The ack time should be based on min_rtt/8, since it's less than the
6108 // default delayed ack time.
6109 QuicTime ack_time = clock_.ApproximateNow() +
6110 QuicTime::Delta::FromMilliseconds(kMinRttMs / 8);
6111 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6112 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6113 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07006114 SetDecrypter(ENCRYPTION_ZERO_RTT,
6115 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05006116 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
6117 QuicMakeUnique<TaggingEncrypter>(tag));
6118 // Process a packet from the non-crypto stream.
6119 frame1_.stream_id = 3;
6120
6121 // Process all the initial packets in order so there aren't missing packets.
6122 uint64_t kFirstDecimatedPacket = 101;
6123 for (unsigned int i = 0; i < kFirstDecimatedPacket - 1; ++i) {
6124 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6125 ProcessDataPacketAtLevel(1 + i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
6126 }
6127 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6128 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07006129 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05006130 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6131 ProcessDataPacketAtLevel(kFirstDecimatedPacket, !kHasStopWaiting,
6132 ENCRYPTION_ZERO_RTT);
6133
6134 // Check if delayed ack timer is running for the expected interval.
6135 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6136 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
6137
6138 // Process packet 10 first and ensure the alarm is one eighth min_rtt.
6139 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6140 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 9, !kHasStopWaiting,
6141 ENCRYPTION_ZERO_RTT);
6142 ack_time = clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(5);
6143 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6144 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
6145
6146 // The 10th received packet causes an ack to be sent.
6147 for (int i = 0; i < 8; ++i) {
6148 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6149 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6150 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 1 + i, !kHasStopWaiting,
6151 ENCRYPTION_ZERO_RTT);
6152 }
6153 // Check that ack is sent and that delayed ack alarm is reset.
6154 if (GetParam().no_stop_waiting) {
6155 EXPECT_EQ(1u, writer_->frame_count());
6156 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6157 } else {
6158 EXPECT_EQ(2u, writer_->frame_count());
6159 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6160 }
6161 EXPECT_FALSE(writer_->ack_frames().empty());
6162 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6163}
6164
6165TEST_P(QuicConnectionTest,
6166 SendDelayedAckDecimationWithLargeReorderingEighthRtt) {
6167 EXPECT_CALL(visitor_, OnAckNeedsRetransmittableFrame()).Times(AnyNumber());
6168 QuicConnectionPeer::SetAckMode(&connection_, ACK_DECIMATION_WITH_REORDERING);
6169 QuicConnectionPeer::SetAckDecimationDelay(&connection_, 0.125);
6170
6171 const size_t kMinRttMs = 40;
6172 RttStats* rtt_stats = const_cast<RttStats*>(manager_->GetRttStats());
6173 rtt_stats->UpdateRtt(QuicTime::Delta::FromMilliseconds(kMinRttMs),
6174 QuicTime::Delta::Zero(), QuicTime::Zero());
6175 // The ack time should be based on min_rtt/8, since it's less than the
6176 // default delayed ack time.
6177 QuicTime ack_time = clock_.ApproximateNow() +
6178 QuicTime::Delta::FromMilliseconds(kMinRttMs / 8);
6179 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6180 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6181 const uint8_t tag = 0x07;
zhongyi546cc452019-04-12 15:27:49 -07006182 SetDecrypter(ENCRYPTION_ZERO_RTT,
6183 QuicMakeUnique<StrictTaggingDecrypter>(tag));
QUICHE teama6ef0a62019-03-07 20:34:33 -05006184 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
6185 QuicMakeUnique<TaggingEncrypter>(tag));
6186 // Process a packet from the non-crypto stream.
6187 frame1_.stream_id = 3;
6188
6189 // Process all the initial packets in order so there aren't missing packets.
6190 uint64_t kFirstDecimatedPacket = 101;
6191 for (unsigned int i = 0; i < kFirstDecimatedPacket - 1; ++i) {
6192 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6193 ProcessDataPacketAtLevel(1 + i, !kHasStopWaiting, ENCRYPTION_ZERO_RTT);
6194 }
6195 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6196 // The same as ProcessPacket(1) except that ENCRYPTION_ZERO_RTT is used
QUICHE team6987b4a2019-03-15 16:23:04 -07006197 // instead of ENCRYPTION_INITIAL.
QUICHE teama6ef0a62019-03-07 20:34:33 -05006198 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6199 ProcessDataPacketAtLevel(kFirstDecimatedPacket, !kHasStopWaiting,
6200 ENCRYPTION_ZERO_RTT);
6201
6202 // Check if delayed ack timer is running for the expected interval.
6203 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6204 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
6205
6206 // Process packet 10 first and ensure the alarm is one eighth min_rtt.
6207 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6208 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 19, !kHasStopWaiting,
6209 ENCRYPTION_ZERO_RTT);
6210 ack_time = clock_.ApproximateNow() + QuicTime::Delta::FromMilliseconds(5);
6211 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6212 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
6213
6214 // The 10th received packet causes an ack to be sent.
6215 for (int i = 0; i < 8; ++i) {
6216 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6217 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6218 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 1 + i, !kHasStopWaiting,
6219 ENCRYPTION_ZERO_RTT);
6220 }
6221 // Check that ack is sent and that delayed ack alarm is reset.
6222 if (GetParam().no_stop_waiting) {
6223 EXPECT_EQ(1u, writer_->frame_count());
6224 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6225 } else {
6226 EXPECT_EQ(2u, writer_->frame_count());
6227 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6228 }
6229 EXPECT_FALSE(writer_->ack_frames().empty());
6230 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6231
6232 // The next packet received in order will cause an immediate ack,
6233 // because it fills a hole.
6234 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6235 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6236 ProcessDataPacketAtLevel(kFirstDecimatedPacket + 10, !kHasStopWaiting,
6237 ENCRYPTION_ZERO_RTT);
6238 // Check that ack is sent and that delayed ack alarm is reset.
6239 if (GetParam().no_stop_waiting) {
6240 EXPECT_EQ(1u, writer_->frame_count());
6241 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6242 } else {
6243 EXPECT_EQ(2u, writer_->frame_count());
6244 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6245 }
6246 EXPECT_FALSE(writer_->ack_frames().empty());
6247 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6248}
6249
6250TEST_P(QuicConnectionTest, SendDelayedAckOnHandshakeConfirmed) {
6251 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6252 ProcessPacket(1);
6253 // Check that ack is sent and that delayed ack alarm is set.
6254 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6255 QuicTime ack_time = clock_.ApproximateNow() + DefaultDelayedAckTime();
6256 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
6257
6258 // Completing the handshake as the server does nothing.
6259 QuicConnectionPeer::SetPerspective(&connection_, Perspective::IS_SERVER);
6260 connection_.OnHandshakeComplete();
6261 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6262 EXPECT_EQ(ack_time, connection_.GetAckAlarm()->deadline());
6263
6264 // Complete the handshake as the client decreases the delayed ack time to 0ms.
6265 QuicConnectionPeer::SetPerspective(&connection_, Perspective::IS_CLIENT);
6266 connection_.OnHandshakeComplete();
6267 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6268 EXPECT_EQ(clock_.ApproximateNow(), connection_.GetAckAlarm()->deadline());
6269}
6270
6271TEST_P(QuicConnectionTest, SendDelayedAckOnSecondPacket) {
6272 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6273 ProcessPacket(1);
6274 ProcessPacket(2);
6275 // Check that ack is sent and that delayed ack alarm is reset.
nharper55fa6132019-05-07 19:37:21 -07006276 size_t padding_frame_count = writer_->padding_frames().size();
QUICHE teama6ef0a62019-03-07 20:34:33 -05006277 if (GetParam().no_stop_waiting) {
nharper55fa6132019-05-07 19:37:21 -07006278 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006279 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6280 } else {
nharper55fa6132019-05-07 19:37:21 -07006281 EXPECT_EQ(padding_frame_count + 2u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006282 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6283 }
6284 EXPECT_FALSE(writer_->ack_frames().empty());
6285 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6286}
6287
6288TEST_P(QuicConnectionTest, NoAckOnOldNacks) {
6289 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6290 // Drop one packet, triggering a sequence of acks.
6291 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
6292 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
6293 } else {
6294 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
6295 }
6296 ProcessPacket(2);
6297 size_t frames_per_ack = GetParam().no_stop_waiting ? 1 : 2;
6298 if (!GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
nharper55fa6132019-05-07 19:37:21 -07006299 size_t padding_frame_count = writer_->padding_frames().size();
6300 EXPECT_EQ(padding_frame_count + frames_per_ack, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006301 EXPECT_FALSE(writer_->ack_frames().empty());
6302 writer_->Reset();
6303 }
6304
6305 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
6306 ProcessPacket(3);
nharper55fa6132019-05-07 19:37:21 -07006307 size_t padding_frame_count = writer_->padding_frames().size();
6308 EXPECT_EQ(padding_frame_count + frames_per_ack, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006309 EXPECT_FALSE(writer_->ack_frames().empty());
6310 writer_->Reset();
6311
6312 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
6313 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
6314 } else {
6315 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
6316 }
6317 ProcessPacket(4);
6318 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
6319 EXPECT_EQ(0u, writer_->frame_count());
6320 } else {
nharper55fa6132019-05-07 19:37:21 -07006321 EXPECT_EQ(padding_frame_count + frames_per_ack, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006322 EXPECT_FALSE(writer_->ack_frames().empty());
6323 writer_->Reset();
6324 }
6325
6326 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
6327 ProcessPacket(5);
nharper55fa6132019-05-07 19:37:21 -07006328 padding_frame_count = writer_->padding_frames().size();
6329 EXPECT_EQ(padding_frame_count + frames_per_ack, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006330 EXPECT_FALSE(writer_->ack_frames().empty());
6331 writer_->Reset();
6332
6333 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
6334 // Now only set the timer on the 6th packet, instead of sending another ack.
6335 ProcessPacket(6);
nharper55fa6132019-05-07 19:37:21 -07006336 padding_frame_count = writer_->padding_frames().size();
6337 EXPECT_EQ(padding_frame_count, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006338 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
6339}
6340
6341TEST_P(QuicConnectionTest, SendDelayedAckOnOutgoingPacket) {
6342 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
QUICHE team8c1daa22019-03-13 08:33:41 -07006343 EXPECT_CALL(visitor_, OnStreamFrame(_));
6344 peer_framer_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
6345 QuicMakeUnique<TaggingEncrypter>(0x01));
zhongyi546cc452019-04-12 15:27:49 -07006346 SetDecrypter(ENCRYPTION_FORWARD_SECURE,
6347 QuicMakeUnique<StrictTaggingDecrypter>(0x01));
nharper2c9f02a2019-05-08 10:25:50 -07006348 ProcessDataPacket(1);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006349 connection_.SendStreamDataWithString(
6350 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
6351 0, NO_FIN);
6352 // Check that ack is bundled with outgoing data and that delayed ack
6353 // alarm is reset.
6354 if (GetParam().no_stop_waiting) {
6355 EXPECT_EQ(2u, writer_->frame_count());
6356 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6357 } else {
6358 EXPECT_EQ(3u, writer_->frame_count());
6359 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6360 }
6361 EXPECT_FALSE(writer_->ack_frames().empty());
6362 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6363}
6364
6365TEST_P(QuicConnectionTest, SendDelayedAckOnOutgoingCryptoPacket) {
QUICHE teamcd098022019-03-22 18:49:55 -07006366 if (connection_.SupportsMultiplePacketNumberSpaces()) {
6367 return;
6368 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05006369 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6370 ProcessPacket(1);
nharper46833c32019-05-15 21:33:05 -07006371 connection_.SendCryptoDataWithString("foo", 0);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006372 // Check that ack is bundled with outgoing crypto data.
6373 if (GetParam().no_stop_waiting) {
6374 EXPECT_EQ(3u, writer_->frame_count());
6375 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6376 } else {
6377 EXPECT_EQ(4u, writer_->frame_count());
6378 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6379 }
6380 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6381}
6382
6383TEST_P(QuicConnectionTest, BlockAndBufferOnFirstCHLOPacketOfTwo) {
6384 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6385 ProcessPacket(1);
6386 BlockOnNextWrite();
6387 writer_->set_is_write_blocked_data_buffered(true);
nharper46833c32019-05-15 21:33:05 -07006388 connection_.SendCryptoDataWithString("foo", 0);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006389 EXPECT_TRUE(writer_->IsWriteBlocked());
6390 EXPECT_FALSE(connection_.HasQueuedData());
nharper46833c32019-05-15 21:33:05 -07006391 connection_.SendCryptoDataWithString("bar", 3);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006392 EXPECT_TRUE(writer_->IsWriteBlocked());
6393 EXPECT_TRUE(connection_.HasQueuedData());
6394}
6395
6396TEST_P(QuicConnectionTest, BundleAckForSecondCHLO) {
QUICHE teamcd098022019-03-22 18:49:55 -07006397 if (connection_.SupportsMultiplePacketNumberSpaces()) {
6398 return;
6399 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05006400 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6401 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6402 EXPECT_CALL(visitor_, OnCanWrite())
6403 .WillOnce(IgnoreResult(InvokeWithoutArgs(
6404 &connection_, &TestConnection::SendCryptoStreamData)));
6405 // Process a packet from the crypto stream, which is frame1_'s default.
6406 // Receiving the CHLO as packet 2 first will cause the connection to
6407 // immediately send an ack, due to the packet gap.
6408 ProcessPacket(2);
6409 // Check that ack is sent and that delayed ack alarm is reset.
6410 if (GetParam().no_stop_waiting) {
6411 EXPECT_EQ(3u, writer_->frame_count());
6412 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6413 } else {
6414 EXPECT_EQ(4u, writer_->frame_count());
6415 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6416 }
QUICHE teamea740082019-03-11 17:58:43 -07006417 if (!QuicVersionUsesCryptoFrames(connection_.transport_version())) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006418 EXPECT_EQ(1u, writer_->stream_frames().size());
6419 } else {
6420 EXPECT_EQ(1u, writer_->crypto_frames().size());
6421 }
6422 EXPECT_EQ(1u, writer_->padding_frames().size());
6423 ASSERT_FALSE(writer_->ack_frames().empty());
6424 EXPECT_EQ(QuicPacketNumber(2u), LargestAcked(writer_->ack_frames().front()));
6425 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6426}
6427
6428TEST_P(QuicConnectionTest, BundleAckForSecondCHLOTwoPacketReject) {
QUICHE teamcd098022019-03-22 18:49:55 -07006429 if (connection_.SupportsMultiplePacketNumberSpaces()) {
6430 return;
6431 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05006432 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6433 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6434
6435 // Process two packets from the crypto stream, which is frame1_'s default,
6436 // simulating a 2 packet reject.
6437 {
6438 ProcessPacket(1);
6439 // Send the new CHLO when the REJ is processed.
6440 EXPECT_CALL(visitor_, OnStreamFrame(_))
6441 .WillOnce(IgnoreResult(InvokeWithoutArgs(
6442 &connection_, &TestConnection::SendCryptoStreamData)));
6443 ProcessDataPacket(2);
6444 }
6445 // Check that ack is sent and that delayed ack alarm is reset.
6446 if (GetParam().no_stop_waiting) {
6447 EXPECT_EQ(3u, writer_->frame_count());
6448 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6449 } else {
6450 EXPECT_EQ(4u, writer_->frame_count());
6451 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6452 }
QUICHE teamea740082019-03-11 17:58:43 -07006453 if (!QuicVersionUsesCryptoFrames(connection_.transport_version())) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006454 EXPECT_EQ(1u, writer_->stream_frames().size());
6455 } else {
6456 EXPECT_EQ(1u, writer_->crypto_frames().size());
6457 }
6458 EXPECT_EQ(1u, writer_->padding_frames().size());
6459 ASSERT_FALSE(writer_->ack_frames().empty());
6460 EXPECT_EQ(QuicPacketNumber(2u), LargestAcked(writer_->ack_frames().front()));
6461 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6462}
6463
6464TEST_P(QuicConnectionTest, BundleAckWithDataOnIncomingAck) {
6465 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6466 connection_.SendStreamDataWithString(
6467 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
6468 0, NO_FIN);
6469 connection_.SendStreamDataWithString(
6470 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
6471 3, NO_FIN);
6472 // Ack the second packet, which will retransmit the first packet.
6473 QuicAckFrame ack = ConstructAckFrame(2, 1);
6474 LostPacketVector lost_packets;
dschinazi66dea072019-04-09 11:41:06 -07006475 lost_packets.push_back(
6476 LostPacket(QuicPacketNumber(1), kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05006477 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
6478 .WillOnce(SetArgPointee<5>(lost_packets));
6479 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
6480 ProcessAckPacket(&ack);
nharper55fa6132019-05-07 19:37:21 -07006481 size_t padding_frame_count = writer_->padding_frames().size();
6482 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006483 EXPECT_EQ(1u, writer_->stream_frames().size());
6484 writer_->Reset();
6485
6486 // Now ack the retransmission, which will both raise the high water mark
6487 // and see if there is more data to send.
6488 ack = ConstructAckFrame(3, 1);
6489 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
6490 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
6491 ProcessAckPacket(&ack);
6492
6493 // Check that no packet is sent and the ack alarm isn't set.
6494 EXPECT_EQ(0u, writer_->frame_count());
6495 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6496 writer_->Reset();
6497
6498 // Send the same ack, but send both data and an ack together.
6499 ack = ConstructAckFrame(3, 1);
6500 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
6501 EXPECT_CALL(visitor_, OnCanWrite())
6502 .WillOnce(IgnoreResult(InvokeWithoutArgs(
6503 &connection_, &TestConnection::EnsureWritableAndSendStreamData5)));
6504 ProcessAckPacket(&ack);
6505
6506 // Check that ack is bundled with outgoing data and the delayed ack
6507 // alarm is reset.
6508 if (GetParam().no_stop_waiting) {
fayang03916692019-05-22 17:57:18 -07006509 if (GetQuicReloadableFlag(quic_simplify_stop_waiting)) {
6510 // Do not ACK acks.
6511 EXPECT_EQ(1u, writer_->frame_count());
6512 } else {
6513 EXPECT_EQ(2u, writer_->frame_count());
6514 EXPECT_TRUE(writer_->stop_waiting_frames().empty());
6515 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05006516 } else {
6517 EXPECT_EQ(3u, writer_->frame_count());
6518 EXPECT_FALSE(writer_->stop_waiting_frames().empty());
6519 }
fayang03916692019-05-22 17:57:18 -07006520 if (GetParam().no_stop_waiting &&
6521 GetQuicReloadableFlag(quic_simplify_stop_waiting)) {
6522 EXPECT_TRUE(writer_->ack_frames().empty());
6523 } else {
6524 EXPECT_FALSE(writer_->ack_frames().empty());
6525 EXPECT_EQ(QuicPacketNumber(3u),
6526 LargestAcked(writer_->ack_frames().front()));
6527 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05006528 EXPECT_EQ(1u, writer_->stream_frames().size());
6529 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
6530}
6531
6532TEST_P(QuicConnectionTest, NoAckSentForClose) {
6533 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6534 ProcessPacket(1);
6535 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PEER_GOING_AWAY, _,
6536 ConnectionCloseSource::FROM_PEER));
6537 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
6538 ProcessClosePacket(2);
6539}
6540
6541TEST_P(QuicConnectionTest, SendWhenDisconnected) {
6542 EXPECT_TRUE(connection_.connected());
6543 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PEER_GOING_AWAY, _,
6544 ConnectionCloseSource::FROM_SELF));
6545 connection_.CloseConnection(QUIC_PEER_GOING_AWAY, "no reason",
6546 ConnectionCloseBehavior::SILENT_CLOSE);
6547 EXPECT_FALSE(connection_.connected());
6548 EXPECT_FALSE(connection_.CanWriteStreamData());
QUICHE team8c1daa22019-03-13 08:33:41 -07006549 std::unique_ptr<QuicPacket> packet =
QUICHE team6987b4a2019-03-15 16:23:04 -07006550 ConstructDataPacket(1, !kHasStopWaiting, ENCRYPTION_INITIAL);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006551 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(1), _, _))
6552 .Times(0);
QUICHE team6987b4a2019-03-15 16:23:04 -07006553 connection_.SendPacket(ENCRYPTION_INITIAL, 1, std::move(packet),
QUICHE teama6ef0a62019-03-07 20:34:33 -05006554 HAS_RETRANSMITTABLE_DATA, false, false);
6555}
6556
6557TEST_P(QuicConnectionTest, SendConnectivityProbingWhenDisconnected) {
6558 // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
QUICHE teamcd098022019-03-22 18:49:55 -07006559 if (!IsDefaultTestConfiguration() ||
6560 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006561 return;
6562 }
6563
6564 EXPECT_TRUE(connection_.connected());
6565 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PEER_GOING_AWAY, _,
6566 ConnectionCloseSource::FROM_SELF));
6567 connection_.CloseConnection(QUIC_PEER_GOING_AWAY, "no reason",
6568 ConnectionCloseBehavior::SILENT_CLOSE);
6569 EXPECT_FALSE(connection_.connected());
6570 EXPECT_FALSE(connection_.CanWriteStreamData());
6571
6572 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(1), _, _))
6573 .Times(0);
6574
6575 EXPECT_QUIC_BUG(connection_.SendConnectivityProbingPacket(
6576 writer_.get(), connection_.peer_address()),
6577 "Not sending connectivity probing packet as connection is "
6578 "disconnected.");
6579}
6580
6581TEST_P(QuicConnectionTest, WriteBlockedAfterClientSendsConnectivityProbe) {
6582 EXPECT_EQ(Perspective::IS_CLIENT, connection_.perspective());
6583 TestPacketWriter probing_writer(version(), &clock_);
6584 // Block next write so that sending connectivity probe will encounter a
6585 // blocked write when send a connectivity probe to the peer.
6586 probing_writer.BlockOnNextWrite();
6587 // Connection will not be marked as write blocked as connectivity probe only
6588 // affects the probing_writer which is not the default.
6589 EXPECT_CALL(visitor_, OnWriteBlocked()).Times(0);
6590
6591 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(1), _, _))
6592 .Times(1);
6593 connection_.SendConnectivityProbingPacket(&probing_writer,
6594 connection_.peer_address());
6595}
6596
6597TEST_P(QuicConnectionTest, WriterBlockedAfterServerSendsConnectivityProbe) {
6598 set_perspective(Perspective::IS_SERVER);
6599 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
6600
6601 // Block next write so that sending connectivity probe will encounter a
6602 // blocked write when send a connectivity probe to the peer.
6603 writer_->BlockOnNextWrite();
6604 // Connection will be marked as write blocked as server uses the default
6605 // writer to send connectivity probes.
6606 EXPECT_CALL(visitor_, OnWriteBlocked()).Times(1);
6607
6608 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(1), _, _))
6609 .Times(1);
6610 connection_.SendConnectivityProbingPacket(writer_.get(),
6611 connection_.peer_address());
6612}
6613
6614TEST_P(QuicConnectionTest, WriterErrorWhenClientSendsConnectivityProbe) {
6615 EXPECT_EQ(Perspective::IS_CLIENT, connection_.perspective());
6616 TestPacketWriter probing_writer(version(), &clock_);
6617 probing_writer.SetShouldWriteFail();
6618
6619 // Connection should not be closed if a connectivity probe is failed to be
6620 // sent.
6621 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _)).Times(0);
6622
6623 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(1), _, _))
6624 .Times(0);
6625 connection_.SendConnectivityProbingPacket(&probing_writer,
6626 connection_.peer_address());
6627}
6628
6629TEST_P(QuicConnectionTest, WriterErrorWhenServerSendsConnectivityProbe) {
6630 set_perspective(Perspective::IS_SERVER);
6631 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
6632
6633 writer_->SetShouldWriteFail();
6634 // Connection should not be closed if a connectivity probe is failed to be
6635 // sent.
6636 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _)).Times(0);
6637
6638 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, QuicPacketNumber(1), _, _))
6639 .Times(0);
6640 connection_.SendConnectivityProbingPacket(writer_.get(),
6641 connection_.peer_address());
6642}
6643
6644TEST_P(QuicConnectionTest, PublicReset) {
QUICHE teamcd098022019-03-22 18:49:55 -07006645 if (GetParam().version.transport_version > QUIC_VERSION_43 ||
6646 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006647 return;
6648 }
6649 QuicPublicResetPacket header;
6650 // Public reset packet in only built by server.
6651 header.connection_id = connection_id_;
6652 std::unique_ptr<QuicEncryptedPacket> packet(
6653 framer_.BuildPublicResetPacket(header));
6654 std::unique_ptr<QuicReceivedPacket> received(
6655 ConstructReceivedPacket(*packet, QuicTime::Zero()));
6656 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PUBLIC_RESET, _,
6657 ConnectionCloseSource::FROM_PEER));
6658 connection_.ProcessUdpPacket(kSelfAddress, kPeerAddress, *received);
6659}
6660
6661TEST_P(QuicConnectionTest, IetfStatelessReset) {
QUICHE teamcd098022019-03-22 18:49:55 -07006662 if (GetParam().version.transport_version <= QUIC_VERSION_43 ||
6663 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006664 return;
6665 }
6666 const QuicUint128 kTestStatelessResetToken = 1010101;
6667 QuicConfig config;
6668 QuicConfigPeer::SetReceivedStatelessResetToken(&config,
6669 kTestStatelessResetToken);
6670 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
6671 connection_.SetFromConfig(config);
6672 std::unique_ptr<QuicEncryptedPacket> packet(
6673 QuicFramer::BuildIetfStatelessResetPacket(connection_id_,
6674 kTestStatelessResetToken));
6675 std::unique_ptr<QuicReceivedPacket> received(
6676 ConstructReceivedPacket(*packet, QuicTime::Zero()));
6677 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PUBLIC_RESET, _,
6678 ConnectionCloseSource::FROM_PEER));
6679 connection_.ProcessUdpPacket(kSelfAddress, kPeerAddress, *received);
6680}
6681
6682TEST_P(QuicConnectionTest, GoAway) {
QUICHE teamcd098022019-03-22 18:49:55 -07006683 if (GetParam().version.transport_version == QUIC_VERSION_99 ||
6684 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006685 // GoAway is not available in version 99.
6686 return;
6687 }
6688
6689 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6690
6691 QuicGoAwayFrame goaway;
6692 goaway.last_good_stream_id = 1;
6693 goaway.error_code = QUIC_PEER_GOING_AWAY;
6694 goaway.reason_phrase = "Going away.";
6695 EXPECT_CALL(visitor_, OnGoAway(_));
6696 ProcessGoAwayPacket(&goaway);
6697}
6698
6699TEST_P(QuicConnectionTest, WindowUpdate) {
6700 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6701
6702 QuicWindowUpdateFrame window_update;
6703 window_update.stream_id = 3;
6704 window_update.byte_offset = 1234;
6705 EXPECT_CALL(visitor_, OnWindowUpdateFrame(_));
6706 ProcessFramePacket(QuicFrame(&window_update));
6707}
6708
6709TEST_P(QuicConnectionTest, Blocked) {
6710 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6711
6712 QuicBlockedFrame blocked;
6713 blocked.stream_id = 3;
6714 EXPECT_CALL(visitor_, OnBlockedFrame(_));
6715 ProcessFramePacket(QuicFrame(&blocked));
6716 EXPECT_EQ(1u, connection_.GetStats().blocked_frames_received);
6717 EXPECT_EQ(0u, connection_.GetStats().blocked_frames_sent);
6718}
6719
6720TEST_P(QuicConnectionTest, ZeroBytePacket) {
6721 // Don't close the connection for zero byte packets.
6722 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _)).Times(0);
6723 QuicReceivedPacket encrypted(nullptr, 0, QuicTime::Zero());
6724 connection_.ProcessUdpPacket(kSelfAddress, kPeerAddress, encrypted);
6725}
6726
6727TEST_P(QuicConnectionTest, MissingPacketsBeforeLeastUnacked) {
nharper5ff10452019-05-09 16:43:31 -07006728 if (GetParam().version.transport_version > QUIC_VERSION_43) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006729 return;
6730 }
6731 // Set the packet number of the ack packet to be least unacked (4).
6732 QuicPacketCreatorPeer::SetPacketNumber(&peer_creator_, 3);
6733 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6734 ProcessStopWaitingPacket(InitStopWaitingFrame(4));
6735 EXPECT_FALSE(outgoing_ack()->packets.Empty());
6736}
6737
6738TEST_P(QuicConnectionTest, ServerSendsVersionNegotiationPacket) {
6739 // Turn off QUIC_VERSION_99.
6740 SetQuicReloadableFlag(quic_enable_version_99, false);
6741 connection_.SetSupportedVersions(CurrentSupportedVersions());
6742 set_perspective(Perspective::IS_SERVER);
6743 if (GetParam().version.transport_version > QUIC_VERSION_43) {
6744 peer_framer_.set_version_for_tests(
6745 ParsedQuicVersion(PROTOCOL_QUIC_CRYPTO, QUIC_VERSION_99));
6746 } else {
6747 peer_framer_.set_version_for_tests(UnsupportedQuicVersion());
6748 }
6749
6750 QuicPacketHeader header;
6751 header.destination_connection_id = connection_id_;
6752 header.version_flag = true;
6753 header.packet_number = QuicPacketNumber(12);
6754
6755 if (QuicVersionHasLongHeaderLengths(
6756 peer_framer_.version().transport_version)) {
6757 header.long_packet_type = INITIAL;
6758 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
6759 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
6760 }
6761
6762 QuicFrames frames;
6763 frames.push_back(QuicFrame(frame1_));
6764 std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
dschinazi66dea072019-04-09 11:41:06 -07006765 char buffer[kMaxOutgoingPacketSize];
QUICHE team6987b4a2019-03-15 16:23:04 -07006766 size_t encrypted_length =
6767 framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(12), *packet,
dschinazi66dea072019-04-09 11:41:06 -07006768 buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006769
6770 framer_.set_version(version());
6771 // Writer's framer's perspective is client, so that it needs to have the right
6772 // version to process either IETF or GQUIC version negotiation packet.
6773 writer_->SetSupportedVersions({version()});
6774 connection_.ProcessUdpPacket(
6775 kSelfAddress, kPeerAddress,
6776 QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
6777 EXPECT_TRUE(writer_->version_negotiation_packet() != nullptr);
6778
6779 ParsedQuicVersionVector supported_versions = CurrentSupportedVersions();
6780 ASSERT_EQ(supported_versions.size(),
6781 writer_->version_negotiation_packet()->versions.size());
6782
6783 // We expect all versions in supported_versions to be
6784 // included in the packet.
6785 for (size_t i = 0; i < supported_versions.size(); ++i) {
6786 EXPECT_EQ(supported_versions[i],
6787 writer_->version_negotiation_packet()->versions[i]);
6788 }
6789}
6790
6791TEST_P(QuicConnectionTest, ServerSendsVersionNegotiationPacketSocketBlocked) {
6792 // Turn off QUIC_VERSION_99.
6793 SetQuicReloadableFlag(quic_enable_version_99, false);
6794 connection_.SetSupportedVersions(CurrentSupportedVersions());
6795 set_perspective(Perspective::IS_SERVER);
6796 if (GetParam().version.transport_version > QUIC_VERSION_43) {
6797 peer_framer_.set_version_for_tests(
6798 ParsedQuicVersion(PROTOCOL_QUIC_CRYPTO, QUIC_VERSION_99));
6799 } else {
6800 peer_framer_.set_version_for_tests(UnsupportedQuicVersion());
6801 }
6802
6803 QuicPacketHeader header;
6804 header.destination_connection_id = connection_id_;
6805 header.version_flag = true;
6806 header.packet_number = QuicPacketNumber(12);
6807
6808 if (QuicVersionHasLongHeaderLengths(
6809 peer_framer_.version().transport_version)) {
6810 header.long_packet_type = INITIAL;
6811 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
6812 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
6813 }
6814
6815 QuicFrames frames;
6816 frames.push_back(QuicFrame(frame1_));
6817 std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
dschinazi66dea072019-04-09 11:41:06 -07006818 char buffer[kMaxOutgoingPacketSize];
QUICHE team6987b4a2019-03-15 16:23:04 -07006819 size_t encrypted_length =
6820 framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(12), *packet,
dschinazi66dea072019-04-09 11:41:06 -07006821 buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006822
6823 framer_.set_version(version());
6824 BlockOnNextWrite();
6825 // Writer's framer's perspective is client, so that it needs to have the right
6826 // version to process either IETF or GQUIC version negotiation packet.
6827 writer_->SetSupportedVersions({version()});
6828 connection_.ProcessUdpPacket(
6829 kSelfAddress, kPeerAddress,
6830 QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
6831 EXPECT_EQ(0u, writer_->last_packet_size());
6832 EXPECT_TRUE(connection_.HasQueuedData());
6833
6834 writer_->SetWritable();
6835 connection_.OnCanWrite();
6836 EXPECT_TRUE(writer_->version_negotiation_packet() != nullptr);
6837
6838 ParsedQuicVersionVector supported_versions = CurrentSupportedVersions();
6839 ASSERT_EQ(supported_versions.size(),
6840 writer_->version_negotiation_packet()->versions.size());
6841
6842 // We expect all versions in supported_versions to be
6843 // included in the packet.
6844 for (size_t i = 0; i < supported_versions.size(); ++i) {
6845 EXPECT_EQ(supported_versions[i],
6846 writer_->version_negotiation_packet()->versions[i]);
6847 }
6848}
6849
6850TEST_P(QuicConnectionTest,
6851 ServerSendsVersionNegotiationPacketSocketBlockedDataBuffered) {
6852 // Turn off QUIC_VERSION_99.
6853 SetQuicReloadableFlag(quic_enable_version_99, false);
6854 connection_.SetSupportedVersions(CurrentSupportedVersions());
6855 set_perspective(Perspective::IS_SERVER);
6856 if (GetParam().version.transport_version > QUIC_VERSION_43) {
6857 peer_framer_.set_version_for_tests(
6858 ParsedQuicVersion(PROTOCOL_QUIC_CRYPTO, QUIC_VERSION_99));
6859 } else {
6860 peer_framer_.set_version_for_tests(UnsupportedQuicVersion());
6861 }
6862
6863 QuicPacketHeader header;
6864 header.destination_connection_id = connection_id_;
6865 header.version_flag = true;
6866 header.packet_number = QuicPacketNumber(12);
6867
6868 if (QuicVersionHasLongHeaderLengths(
6869 peer_framer_.version().transport_version)) {
6870 header.long_packet_type = INITIAL;
6871 header.retry_token_length_length = VARIABLE_LENGTH_INTEGER_LENGTH_1;
6872 header.length_length = VARIABLE_LENGTH_INTEGER_LENGTH_2;
6873 }
6874
6875 QuicFrames frames;
6876 frames.push_back(QuicFrame(frame1_));
6877 std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
dschinazi66dea072019-04-09 11:41:06 -07006878 char buffer[kMaxOutgoingPacketSize];
QUICHE team6987b4a2019-03-15 16:23:04 -07006879 size_t encryped_length =
6880 framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(12), *packet,
dschinazi66dea072019-04-09 11:41:06 -07006881 buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006882
6883 framer_.set_version(version());
6884 set_perspective(Perspective::IS_SERVER);
6885 BlockOnNextWrite();
6886 writer_->set_is_write_blocked_data_buffered(true);
6887 // Writer's framer's perspective is client, so that it needs to have the right
6888 // version to process either IETF or GQUIC version negotiation packet.
6889 writer_->SetSupportedVersions({version()});
6890 connection_.ProcessUdpPacket(
6891 kSelfAddress, kPeerAddress,
6892 QuicReceivedPacket(buffer, encryped_length, QuicTime::Zero(), false));
6893 EXPECT_EQ(0u, writer_->last_packet_size());
6894 EXPECT_FALSE(connection_.HasQueuedData());
6895}
6896
6897TEST_P(QuicConnectionTest, ClientHandlesVersionNegotiation) {
dschinazi5a354c92019-05-09 12:18:53 -07006898 const bool expect_failure =
6899 GetQuicReloadableFlag(quic_no_client_conn_ver_negotiation) ||
6900 connection_.version().handshake_protocol !=
6901 QuicVersionReservedForNegotiation().handshake_protocol;
6902 // Start out with an unsupported version.
QUICHE teama6ef0a62019-03-07 20:34:33 -05006903 QuicConnectionPeer::GetFramer(&connection_)
dschinazi5a354c92019-05-09 12:18:53 -07006904 ->set_version_for_tests(QuicVersionReservedForNegotiation());
QUICHE teama6ef0a62019-03-07 20:34:33 -05006905
6906 // Send a version negotiation packet.
6907 std::unique_ptr<QuicEncryptedPacket> encrypted(
6908 peer_framer_.BuildVersionNegotiationPacket(
6909 connection_id_, connection_.transport_version() > QUIC_VERSION_43,
6910 AllSupportedVersions()));
6911 std::unique_ptr<QuicReceivedPacket> received(
6912 ConstructReceivedPacket(*encrypted, QuicTime::Zero()));
dschinazi5a354c92019-05-09 12:18:53 -07006913 if (expect_failure) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006914 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_VERSION, _,
6915 ConnectionCloseSource::FROM_SELF));
6916 }
6917 connection_.ProcessUdpPacket(kSelfAddress, kPeerAddress, *received);
dschinazi5a354c92019-05-09 12:18:53 -07006918 if (expect_failure) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05006919 EXPECT_FALSE(connection_.connected());
6920 return;
6921 }
6922
6923 // Now force another packet. The connection should transition into
6924 // NEGOTIATED_VERSION state and tell the packet creator to StopSendingVersion.
6925 QuicPacketHeader header;
QUICHE teama6ef0a62019-03-07 20:34:33 -05006926 header.destination_connection_id_included = CONNECTION_ID_ABSENT;
QUICHE team2252b702019-05-14 23:55:14 -04006927 if (!GetQuicRestartFlag(quic_do_not_override_connection_id)) {
6928 header.destination_connection_id = connection_id_;
6929 } else {
6930 header.source_connection_id = connection_id_;
6931 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05006932 header.packet_number = QuicPacketNumber(12);
6933 header.version_flag = false;
6934 QuicFrames frames;
6935 frames.push_back(QuicFrame(frame1_));
6936 std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
dschinazi66dea072019-04-09 11:41:06 -07006937 char buffer[kMaxOutgoingPacketSize];
QUICHE team6987b4a2019-03-15 16:23:04 -07006938 size_t encrypted_length =
6939 peer_framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(12),
dschinazi66dea072019-04-09 11:41:06 -07006940 *packet, buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05006941 ASSERT_NE(0u, encrypted_length);
6942 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
6943 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
6944 connection_.ProcessUdpPacket(
6945 kSelfAddress, kPeerAddress,
6946 QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
6947 if (GetParam().version.transport_version > QUIC_VERSION_43) {
6948 // IETF QUIC stops sending version when switch to FORWARD_SECURE.
6949 EXPECT_NE(ENCRYPTION_FORWARD_SECURE, connection_.encryption_level());
6950 ASSERT_TRUE(QuicPacketCreatorPeer::SendVersionInPacket(creator_));
6951 } else {
6952 ASSERT_FALSE(QuicPacketCreatorPeer::SendVersionInPacket(creator_));
6953 }
6954}
6955
6956TEST_P(QuicConnectionTest, BadVersionNegotiation) {
6957 // Send a version negotiation packet with the version the client started with.
6958 // It should be rejected.
6959 EXPECT_CALL(visitor_,
6960 OnConnectionClosed(QUIC_INVALID_VERSION_NEGOTIATION_PACKET, _,
6961 ConnectionCloseSource::FROM_SELF));
6962 std::unique_ptr<QuicEncryptedPacket> encrypted(
6963 framer_.BuildVersionNegotiationPacket(
6964 connection_id_, connection_.transport_version() > QUIC_VERSION_43,
6965 AllSupportedVersions()));
6966 std::unique_ptr<QuicReceivedPacket> received(
6967 ConstructReceivedPacket(*encrypted, QuicTime::Zero()));
6968 connection_.ProcessUdpPacket(kSelfAddress, kPeerAddress, *received);
6969}
6970
6971TEST_P(QuicConnectionTest, CheckSendStats) {
6972 connection_.SetMaxTailLossProbes(0);
6973
6974 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
6975 connection_.SendStreamDataWithString(3, "first", 0, NO_FIN);
6976 size_t first_packet_size = writer_->last_packet_size();
6977
6978 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
6979 connection_.SendStreamDataWithString(5, "second", 0, NO_FIN);
6980 size_t second_packet_size = writer_->last_packet_size();
6981
6982 // 2 retransmissions due to rto, 1 due to explicit nack.
6983 EXPECT_CALL(*send_algorithm_, OnRetransmissionTimeout(true));
6984 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(3);
6985
6986 // Retransmit due to RTO.
6987 clock_.AdvanceTime(QuicTime::Delta::FromSeconds(10));
6988 connection_.GetRetransmissionAlarm()->Fire();
6989
6990 // Retransmit due to explicit nacks.
6991 QuicAckFrame nack_three =
6992 InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(3)},
6993 {QuicPacketNumber(4), QuicPacketNumber(5)}});
6994
6995 LostPacketVector lost_packets;
dschinazi66dea072019-04-09 11:41:06 -07006996 lost_packets.push_back(
6997 LostPacket(QuicPacketNumber(1), kMaxOutgoingPacketSize));
6998 lost_packets.push_back(
6999 LostPacket(QuicPacketNumber(3), kMaxOutgoingPacketSize));
QUICHE teama6ef0a62019-03-07 20:34:33 -05007000 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _))
7001 .WillOnce(SetArgPointee<5>(lost_packets));
7002 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7003 if (!connection_.session_decides_what_to_write()) {
7004 EXPECT_CALL(visitor_, OnCanWrite());
7005 }
7006 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7007 ProcessAckPacket(&nack_three);
7008
7009 EXPECT_CALL(*send_algorithm_, BandwidthEstimate())
7010 .WillOnce(Return(QuicBandwidth::Zero()));
7011
7012 const QuicConnectionStats& stats = connection_.GetStats();
7013 // For IETF QUIC, version is not included as the encryption level switches to
7014 // FORWARD_SECURE in SendStreamDataWithString.
7015 size_t save_on_version =
7016 GetParam().version.transport_version > QUIC_VERSION_43 ? 0
7017 : kQuicVersionSize;
7018 EXPECT_EQ(3 * first_packet_size + 2 * second_packet_size - save_on_version,
7019 stats.bytes_sent);
7020 EXPECT_EQ(5u, stats.packets_sent);
7021 EXPECT_EQ(2 * first_packet_size + second_packet_size - save_on_version,
7022 stats.bytes_retransmitted);
7023 EXPECT_EQ(3u, stats.packets_retransmitted);
7024 EXPECT_EQ(1u, stats.rto_count);
7025 EXPECT_EQ(kDefaultMaxPacketSize, stats.max_packet_size);
7026}
7027
7028TEST_P(QuicConnectionTest, ProcessFramesIfPacketClosedConnection) {
7029 // Construct a packet with stream frame and connection close frame.
7030 QuicPacketHeader header;
QUICHE team2252b702019-05-14 23:55:14 -04007031 if (GetQuicRestartFlag(quic_do_not_override_connection_id) &&
7032 peer_framer_.perspective() == Perspective::IS_SERVER) {
7033 header.source_connection_id = connection_id_;
QUICHE teama6ef0a62019-03-07 20:34:33 -05007034 header.destination_connection_id_included = CONNECTION_ID_ABSENT;
QUICHE team2252b702019-05-14 23:55:14 -04007035 if (peer_framer_.transport_version() <= QUIC_VERSION_43) {
7036 header.source_connection_id_included = CONNECTION_ID_PRESENT;
7037 }
7038 } else {
7039 header.destination_connection_id = connection_id_;
7040 if (peer_framer_.transport_version() > QUIC_VERSION_43) {
7041 header.destination_connection_id_included = CONNECTION_ID_ABSENT;
7042 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05007043 }
7044 header.packet_number = QuicPacketNumber(1);
7045 header.version_flag = false;
7046
fkastenholze9d71a82019-04-09 05:12:13 -07007047 QuicConnectionCloseFrame qccf(QUIC_PEER_GOING_AWAY);
fkastenholz72f509b2019-04-10 09:17:49 -07007048 if (peer_framer_.transport_version() == QUIC_VERSION_99) {
fkastenholz04bd4f32019-04-16 12:24:38 -07007049 // Default close-type is Google QUIC. If doing IETF/V99 then
7050 // set close type to be IETF CC/T.
fkastenholz72f509b2019-04-10 09:17:49 -07007051 qccf.close_type = IETF_QUIC_TRANSPORT_CONNECTION_CLOSE;
7052 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05007053
7054 QuicFrames frames;
7055 frames.push_back(QuicFrame(frame1_));
7056 frames.push_back(QuicFrame(&qccf));
7057 std::unique_ptr<QuicPacket> packet(ConstructPacket(header, frames));
7058 EXPECT_TRUE(nullptr != packet);
dschinazi66dea072019-04-09 11:41:06 -07007059 char buffer[kMaxOutgoingPacketSize];
7060 size_t encrypted_length =
7061 peer_framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(1),
7062 *packet, buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05007063
7064 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PEER_GOING_AWAY, _,
7065 ConnectionCloseSource::FROM_PEER));
7066 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
7067 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7068
7069 connection_.ProcessUdpPacket(
7070 kSelfAddress, kPeerAddress,
7071 QuicReceivedPacket(buffer, encrypted_length, QuicTime::Zero(), false));
7072}
7073
7074TEST_P(QuicConnectionTest, SelectMutualVersion) {
7075 connection_.SetSupportedVersions(AllSupportedVersions());
7076 // Set the connection to speak the lowest quic version.
7077 connection_.set_version(QuicVersionMin());
7078 EXPECT_EQ(QuicVersionMin(), connection_.version());
7079
7080 // Pass in available versions which includes a higher mutually supported
7081 // version. The higher mutually supported version should be selected.
7082 ParsedQuicVersionVector supported_versions = AllSupportedVersions();
7083 EXPECT_TRUE(connection_.SelectMutualVersion(supported_versions));
7084 EXPECT_EQ(QuicVersionMax(), connection_.version());
7085
7086 // Expect that the lowest version is selected.
7087 // Ensure the lowest supported version is less than the max, unless they're
7088 // the same.
7089 ParsedQuicVersionVector lowest_version_vector;
7090 lowest_version_vector.push_back(QuicVersionMin());
7091 EXPECT_TRUE(connection_.SelectMutualVersion(lowest_version_vector));
7092 EXPECT_EQ(QuicVersionMin(), connection_.version());
7093
7094 // Shouldn't be able to find a mutually supported version.
7095 ParsedQuicVersionVector unsupported_version;
7096 unsupported_version.push_back(UnsupportedQuicVersion());
7097 EXPECT_FALSE(connection_.SelectMutualVersion(unsupported_version));
7098}
7099
7100TEST_P(QuicConnectionTest, ConnectionCloseWhenWritable) {
7101 EXPECT_FALSE(writer_->IsWriteBlocked());
7102
7103 // Send a packet.
7104 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
7105 EXPECT_EQ(0u, connection_.NumQueuedPackets());
7106 EXPECT_EQ(1u, writer_->packets_write_attempts());
7107
7108 TriggerConnectionClose();
7109 EXPECT_EQ(2u, writer_->packets_write_attempts());
7110}
7111
7112TEST_P(QuicConnectionTest, ConnectionCloseGettingWriteBlocked) {
7113 BlockOnNextWrite();
7114 TriggerConnectionClose();
7115 EXPECT_EQ(1u, writer_->packets_write_attempts());
7116 EXPECT_TRUE(writer_->IsWriteBlocked());
7117}
7118
7119TEST_P(QuicConnectionTest, ConnectionCloseWhenWriteBlocked) {
7120 BlockOnNextWrite();
7121 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
7122 EXPECT_EQ(1u, connection_.NumQueuedPackets());
7123 EXPECT_EQ(1u, writer_->packets_write_attempts());
7124 EXPECT_TRUE(writer_->IsWriteBlocked());
7125 TriggerConnectionClose();
7126 EXPECT_EQ(1u, writer_->packets_write_attempts());
7127}
7128
7129TEST_P(QuicConnectionTest, OnPacketSentDebugVisitor) {
7130 MockQuicConnectionDebugVisitor debug_visitor;
7131 connection_.set_debug_visitor(&debug_visitor);
7132
7133 EXPECT_CALL(debug_visitor, OnPacketSent(_, _, _, _)).Times(1);
7134 connection_.SendStreamDataWithString(1, "foo", 0, NO_FIN);
7135
7136 EXPECT_CALL(debug_visitor, OnPacketSent(_, _, _, _)).Times(1);
7137 connection_.SendConnectivityProbingPacket(writer_.get(),
7138 connection_.peer_address());
7139}
7140
7141TEST_P(QuicConnectionTest, OnPacketHeaderDebugVisitor) {
7142 QuicPacketHeader header;
7143 header.packet_number = QuicPacketNumber(1);
7144 if (GetParam().version.transport_version > QUIC_VERSION_43) {
7145 header.form = IETF_QUIC_LONG_HEADER_PACKET;
7146 }
7147
7148 MockQuicConnectionDebugVisitor debug_visitor;
7149 connection_.set_debug_visitor(&debug_visitor);
7150 EXPECT_CALL(debug_visitor, OnPacketHeader(Ref(header))).Times(1);
7151 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_)).Times(1);
7152 EXPECT_CALL(debug_visitor, OnSuccessfulVersionNegotiation(_)).Times(1);
7153 connection_.OnPacketHeader(header);
7154}
7155
7156TEST_P(QuicConnectionTest, Pacing) {
7157 TestConnection server(connection_id_, kSelfAddress, helper_.get(),
7158 alarm_factory_.get(), writer_.get(),
7159 Perspective::IS_SERVER, version());
7160 TestConnection client(connection_id_, kPeerAddress, helper_.get(),
7161 alarm_factory_.get(), writer_.get(),
7162 Perspective::IS_CLIENT, version());
7163 EXPECT_FALSE(QuicSentPacketManagerPeer::UsingPacing(
7164 static_cast<const QuicSentPacketManager*>(
7165 &client.sent_packet_manager())));
7166 EXPECT_FALSE(QuicSentPacketManagerPeer::UsingPacing(
7167 static_cast<const QuicSentPacketManager*>(
7168 &server.sent_packet_manager())));
7169}
7170
7171TEST_P(QuicConnectionTest, WindowUpdateInstigateAcks) {
7172 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7173
7174 // Send a WINDOW_UPDATE frame.
7175 QuicWindowUpdateFrame window_update;
7176 window_update.stream_id = 3;
7177 window_update.byte_offset = 1234;
7178 EXPECT_CALL(visitor_, OnWindowUpdateFrame(_));
7179 ProcessFramePacket(QuicFrame(&window_update));
7180
7181 // Ensure that this has caused the ACK alarm to be set.
7182 QuicAlarm* ack_alarm = QuicConnectionPeer::GetAckAlarm(&connection_);
7183 EXPECT_TRUE(ack_alarm->IsSet());
7184}
7185
7186TEST_P(QuicConnectionTest, BlockedFrameInstigateAcks) {
7187 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7188
7189 // Send a BLOCKED frame.
7190 QuicBlockedFrame blocked;
7191 blocked.stream_id = 3;
7192 EXPECT_CALL(visitor_, OnBlockedFrame(_));
7193 ProcessFramePacket(QuicFrame(&blocked));
7194
7195 // Ensure that this has caused the ACK alarm to be set.
7196 QuicAlarm* ack_alarm = QuicConnectionPeer::GetAckAlarm(&connection_);
7197 EXPECT_TRUE(ack_alarm->IsSet());
7198}
7199
7200TEST_P(QuicConnectionTest, ReevaluateTimeUntilSendOnAck) {
7201 // Enable pacing.
7202 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
7203 QuicConfig config;
7204 connection_.SetFromConfig(config);
7205
7206 // Send two packets. One packet is not sufficient because if it gets acked,
7207 // there will be no packets in flight after that and the pacer will always
7208 // allow the next packet in that situation.
7209 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7210 EXPECT_CALL(*send_algorithm_, CanSend(_)).WillRepeatedly(Return(true));
7211 connection_.SendStreamDataWithString(
7212 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "foo",
7213 0, NO_FIN);
7214 connection_.SendStreamDataWithString(
7215 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "bar",
7216 3, NO_FIN);
7217 connection_.OnCanWrite();
7218
7219 // Schedule the next packet for a few milliseconds in future.
7220 QuicSentPacketManagerPeer::DisablePacerBursts(manager_);
7221 QuicTime scheduled_pacing_time =
7222 clock_.Now() + QuicTime::Delta::FromMilliseconds(5);
7223 QuicSentPacketManagerPeer::SetNextPacedPacketTime(manager_,
7224 scheduled_pacing_time);
7225
7226 // Send a packet and have it be blocked by congestion control.
7227 EXPECT_CALL(*send_algorithm_, CanSend(_)).WillRepeatedly(Return(false));
7228 connection_.SendStreamDataWithString(
7229 GetNthClientInitiatedStreamId(1, connection_.transport_version()), "baz",
7230 6, NO_FIN);
7231 EXPECT_FALSE(connection_.GetSendAlarm()->IsSet());
7232
7233 // Process an ack and the send alarm will be set to the new 5ms delay.
7234 QuicAckFrame ack = InitAckFrame(1);
7235 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
7236 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7237 EXPECT_CALL(*send_algorithm_, CanSend(_)).WillRepeatedly(Return(true));
7238 ProcessAckPacket(&ack);
nharper55fa6132019-05-07 19:37:21 -07007239 size_t padding_frame_count = writer_->padding_frames().size();
7240 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05007241 EXPECT_EQ(1u, writer_->stream_frames().size());
7242 EXPECT_TRUE(connection_.GetSendAlarm()->IsSet());
7243 EXPECT_EQ(scheduled_pacing_time, connection_.GetSendAlarm()->deadline());
7244 writer_->Reset();
7245}
7246
7247TEST_P(QuicConnectionTest, SendAcksImmediately) {
QUICHE teamcd098022019-03-22 18:49:55 -07007248 if (connection_.SupportsMultiplePacketNumberSpaces()) {
7249 return;
7250 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05007251 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7252 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
7253 ProcessDataPacket(1);
7254 CongestionBlockWrites();
7255 SendAckPacketToPeer();
7256}
7257
7258TEST_P(QuicConnectionTest, SendPingImmediately) {
7259 MockQuicConnectionDebugVisitor debug_visitor;
7260 connection_.set_debug_visitor(&debug_visitor);
7261
7262 CongestionBlockWrites();
7263 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
7264 EXPECT_CALL(debug_visitor, OnPacketSent(_, _, _, _)).Times(1);
7265 EXPECT_CALL(debug_visitor, OnPingSent()).Times(1);
7266 connection_.SendControlFrame(QuicFrame(QuicPingFrame(1)));
7267 EXPECT_FALSE(connection_.HasQueuedData());
7268}
7269
7270TEST_P(QuicConnectionTest, SendBlockedImmediately) {
7271 MockQuicConnectionDebugVisitor debug_visitor;
7272 connection_.set_debug_visitor(&debug_visitor);
7273
7274 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
7275 EXPECT_CALL(debug_visitor, OnPacketSent(_, _, _, _)).Times(1);
7276 EXPECT_EQ(0u, connection_.GetStats().blocked_frames_sent);
7277 connection_.SendControlFrame(QuicFrame(new QuicBlockedFrame(1, 3)));
7278 EXPECT_EQ(1u, connection_.GetStats().blocked_frames_sent);
7279 EXPECT_FALSE(connection_.HasQueuedData());
7280}
7281
7282TEST_P(QuicConnectionTest, SendingUnencryptedStreamDataFails) {
7283 // EXPECT_QUIC_BUG tests are expensive so only run one instance of them.
7284 if (!IsDefaultTestConfiguration()) {
7285 return;
7286 }
7287
7288 EXPECT_CALL(visitor_,
7289 OnConnectionClosed(QUIC_ATTEMPT_TO_SEND_UNENCRYPTED_STREAM_DATA,
7290 _, ConnectionCloseSource::FROM_SELF));
7291 struct iovec iov;
7292 MakeIOVector("", &iov);
7293 EXPECT_QUIC_BUG(connection_.SaveAndSendStreamData(3, &iov, 1, 0, 0, FIN),
fayang49523232019-05-03 06:28:22 -07007294 "Cannot send stream data with level: ENCRYPTION_INITIAL");
QUICHE teama6ef0a62019-03-07 20:34:33 -05007295 EXPECT_FALSE(connection_.connected());
7296}
7297
7298TEST_P(QuicConnectionTest, SetRetransmissionAlarmForCryptoPacket) {
7299 EXPECT_TRUE(connection_.connected());
7300 EXPECT_FALSE(connection_.GetRetransmissionAlarm()->IsSet());
7301
7302 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
7303 connection_.SendCryptoStreamData();
7304
7305 // Verify retransmission timer is correctly set after crypto packet has been
7306 // sent.
7307 EXPECT_TRUE(connection_.GetRetransmissionAlarm()->IsSet());
7308 QuicTime retransmission_time =
7309 QuicConnectionPeer::GetSentPacketManager(&connection_)
7310 ->GetRetransmissionTime();
7311 EXPECT_NE(retransmission_time, clock_.ApproximateNow());
7312 EXPECT_EQ(retransmission_time,
7313 connection_.GetRetransmissionAlarm()->deadline());
7314
7315 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
7316 connection_.GetRetransmissionAlarm()->Fire();
7317}
7318
7319TEST_P(QuicConnectionTest, PathDegradingAlarmForCryptoPacket) {
7320 EXPECT_TRUE(connection_.connected());
7321 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7322 EXPECT_FALSE(connection_.IsPathDegrading());
7323
7324 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
7325 connection_.SendCryptoStreamData();
7326
7327 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7328 EXPECT_FALSE(connection_.IsPathDegrading());
7329 QuicTime::Delta delay = QuicConnectionPeer::GetSentPacketManager(&connection_)
7330 ->GetPathDegradingDelay();
7331 EXPECT_EQ(clock_.ApproximateNow() + delay,
7332 connection_.GetPathDegradingAlarm()->deadline());
7333
7334 // Fire the path degrading alarm, path degrading signal should be sent to
7335 // the visitor.
7336 EXPECT_CALL(visitor_, OnPathDegrading());
7337 clock_.AdvanceTime(delay);
7338 connection_.GetPathDegradingAlarm()->Fire();
7339 EXPECT_TRUE(connection_.IsPathDegrading());
7340 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7341}
7342
vasilvv693d5b02019-04-09 21:58:56 -07007343// Includes regression test for b/69979024.
QUICHE teama6ef0a62019-03-07 20:34:33 -05007344TEST_P(QuicConnectionTest, PathDegradingAlarmForNonCryptoPackets) {
7345 EXPECT_TRUE(connection_.connected());
7346 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7347 EXPECT_FALSE(connection_.IsPathDegrading());
7348
7349 const char data[] = "data";
7350 size_t data_size = strlen(data);
7351 QuicStreamOffset offset = 0;
7352
7353 for (int i = 0; i < 2; ++i) {
7354 // Send a packet. Now there's a retransmittable packet on the wire, so the
7355 // path degrading alarm should be set.
7356 connection_.SendStreamDataWithString(
7357 GetNthClientInitiatedStreamId(1, connection_.transport_version()), data,
7358 offset, NO_FIN);
7359 offset += data_size;
7360 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7361 // Check the deadline of the path degrading alarm.
7362 QuicTime::Delta delay =
7363 QuicConnectionPeer::GetSentPacketManager(&connection_)
7364 ->GetPathDegradingDelay();
7365 EXPECT_EQ(clock_.ApproximateNow() + delay,
7366 connection_.GetPathDegradingAlarm()->deadline());
7367
7368 // Send a second packet. The path degrading alarm's deadline should remain
7369 // the same.
vasilvv693d5b02019-04-09 21:58:56 -07007370 // Regression test for b/69979024.
QUICHE teama6ef0a62019-03-07 20:34:33 -05007371 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7372 QuicTime prev_deadline = connection_.GetPathDegradingAlarm()->deadline();
7373 connection_.SendStreamDataWithString(
7374 GetNthClientInitiatedStreamId(1, connection_.transport_version()), data,
7375 offset, NO_FIN);
7376 offset += data_size;
7377 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7378 EXPECT_EQ(prev_deadline, connection_.GetPathDegradingAlarm()->deadline());
7379
7380 // Now receive an ACK of the first packet. This should advance the path
7381 // degrading alarm's deadline since forward progress has been made.
7382 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7383 if (i == 0) {
7384 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7385 }
7386 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7387 QuicAckFrame frame = InitAckFrame(
7388 {{QuicPacketNumber(1u + 2u * i), QuicPacketNumber(2u + 2u * i)}});
7389 ProcessAckPacket(&frame);
7390 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7391 // Check the deadline of the path degrading alarm.
7392 delay = QuicConnectionPeer::GetSentPacketManager(&connection_)
7393 ->GetPathDegradingDelay();
7394 EXPECT_EQ(clock_.ApproximateNow() + delay,
7395 connection_.GetPathDegradingAlarm()->deadline());
7396
7397 if (i == 0) {
7398 // Now receive an ACK of the second packet. Since there are no more
7399 // retransmittable packets on the wire, this should cancel the path
7400 // degrading alarm.
7401 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7402 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7403 frame = InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(3)}});
7404 ProcessAckPacket(&frame);
7405 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7406 } else {
7407 // Advance time to the path degrading alarm's deadline and simulate
7408 // firing the alarm.
7409 clock_.AdvanceTime(delay);
7410 EXPECT_CALL(visitor_, OnPathDegrading());
7411 connection_.GetPathDegradingAlarm()->Fire();
7412 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7413 }
7414 }
7415 EXPECT_TRUE(connection_.IsPathDegrading());
7416}
7417
7418TEST_P(QuicConnectionTest, RetransmittableOnWireSetsPingAlarm) {
7419 const QuicTime::Delta retransmittable_on_wire_timeout =
7420 QuicTime::Delta::FromMilliseconds(50);
7421 connection_.set_retransmittable_on_wire_timeout(
7422 retransmittable_on_wire_timeout);
7423
7424 EXPECT_TRUE(connection_.connected());
7425 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
7426 .WillRepeatedly(Return(true));
7427
7428 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7429 EXPECT_FALSE(connection_.IsPathDegrading());
7430 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
7431
7432 const char data[] = "data";
7433 size_t data_size = strlen(data);
7434 QuicStreamOffset offset = 0;
7435
7436 // Send a packet.
7437 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7438 offset += data_size;
7439 // Now there's a retransmittable packet on the wire, so the path degrading
7440 // alarm should be set.
7441 // The retransmittable-on-wire alarm should not be set.
7442 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7443 QuicTime::Delta delay = QuicConnectionPeer::GetSentPacketManager(&connection_)
7444 ->GetPathDegradingDelay();
7445 EXPECT_EQ(clock_.ApproximateNow() + delay,
7446 connection_.GetPathDegradingAlarm()->deadline());
7447 ASSERT_TRUE(connection_.sent_packet_manager().HasInFlightPackets());
7448 // The ping alarm is set for the ping timeout, not the shorter
7449 // retransmittable_on_wire_timeout.
7450 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
7451 QuicTime::Delta ping_delay = QuicTime::Delta::FromSeconds(kPingTimeoutSecs);
7452 EXPECT_EQ((clock_.ApproximateNow() + ping_delay),
7453 connection_.GetPingAlarm()->deadline());
7454
7455 // Now receive an ACK of the packet.
7456 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7457 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7458 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7459 QuicAckFrame frame =
7460 InitAckFrame({{QuicPacketNumber(1), QuicPacketNumber(2)}});
7461 ProcessAckPacket(&frame);
7462 // No more retransmittable packets on the wire, so the path degrading alarm
7463 // should be cancelled, and the ping alarm should be set to the
7464 // retransmittable_on_wire_timeout.
7465 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7466 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
7467 EXPECT_EQ(clock_.ApproximateNow() + retransmittable_on_wire_timeout,
7468 connection_.GetPingAlarm()->deadline());
7469
7470 // Simulate firing the ping alarm and sending a PING.
7471 clock_.AdvanceTime(retransmittable_on_wire_timeout);
7472 EXPECT_CALL(visitor_, SendPing()).WillOnce(Invoke([this]() {
7473 connection_.SendControlFrame(QuicFrame(QuicPingFrame(1)));
7474 }));
7475 connection_.GetPingAlarm()->Fire();
7476
7477 // Now there's a retransmittable packet (PING) on the wire, so the path
7478 // degrading alarm should be set.
7479 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7480 delay = QuicConnectionPeer::GetSentPacketManager(&connection_)
7481 ->GetPathDegradingDelay();
7482 EXPECT_EQ(clock_.ApproximateNow() + delay,
7483 connection_.GetPathDegradingAlarm()->deadline());
7484}
7485
7486// This test verifies that the connection marks path as degrading and does not
7487// spin timer to detect path degrading when a new packet is sent on the
7488// degraded path.
7489TEST_P(QuicConnectionTest, NoPathDegradingAlarmIfPathIsDegrading) {
7490 EXPECT_TRUE(connection_.connected());
7491 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7492 EXPECT_FALSE(connection_.IsPathDegrading());
7493
7494 const char data[] = "data";
7495 size_t data_size = strlen(data);
7496 QuicStreamOffset offset = 0;
7497
7498 // Send the first packet. Now there's a retransmittable packet on the wire, so
7499 // the path degrading alarm should be set.
7500 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7501 offset += data_size;
7502 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7503 // Check the deadline of the path degrading alarm.
7504 QuicTime::Delta delay = QuicConnectionPeer::GetSentPacketManager(&connection_)
7505 ->GetPathDegradingDelay();
7506 EXPECT_EQ(clock_.ApproximateNow() + delay,
7507 connection_.GetPathDegradingAlarm()->deadline());
7508
7509 // Send a second packet. The path degrading alarm's deadline should remain
7510 // the same.
7511 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7512 QuicTime prev_deadline = connection_.GetPathDegradingAlarm()->deadline();
7513 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7514 offset += data_size;
7515 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7516 EXPECT_EQ(prev_deadline, connection_.GetPathDegradingAlarm()->deadline());
7517
7518 // Now receive an ACK of the first packet. This should advance the path
7519 // degrading alarm's deadline since forward progress has been made.
7520 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7521 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7522 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7523 QuicAckFrame frame =
7524 InitAckFrame({{QuicPacketNumber(1u), QuicPacketNumber(2u)}});
7525 ProcessAckPacket(&frame);
7526 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7527 // Check the deadline of the path degrading alarm.
7528 delay = QuicConnectionPeer::GetSentPacketManager(&connection_)
7529 ->GetPathDegradingDelay();
7530 EXPECT_EQ(clock_.ApproximateNow() + delay,
7531 connection_.GetPathDegradingAlarm()->deadline());
7532
7533 // Advance time to the path degrading alarm's deadline and simulate
7534 // firing the path degrading alarm. This path will be considered as
7535 // degrading.
7536 clock_.AdvanceTime(delay);
7537 EXPECT_CALL(visitor_, OnPathDegrading()).Times(1);
7538 connection_.GetPathDegradingAlarm()->Fire();
7539 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7540 EXPECT_TRUE(connection_.IsPathDegrading());
7541
7542 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7543 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7544 // Send a third packet. The path degrading alarm is no longer set but path
7545 // should still be marked as degrading.
7546 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7547 offset += data_size;
7548 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7549 EXPECT_TRUE(connection_.IsPathDegrading());
7550}
7551
7552// This test verifies that the connection unmarks path as degrarding and spins
7553// the timer to detect future path degrading when forward progress is made
7554// after path has been marked degrading.
7555TEST_P(QuicConnectionTest, UnmarkPathDegradingOnForwardProgress) {
7556 EXPECT_TRUE(connection_.connected());
7557 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7558 EXPECT_FALSE(connection_.IsPathDegrading());
7559
7560 const char data[] = "data";
7561 size_t data_size = strlen(data);
7562 QuicStreamOffset offset = 0;
7563
7564 // Send the first packet. Now there's a retransmittable packet on the wire, so
7565 // the path degrading alarm should be set.
7566 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7567 offset += data_size;
7568 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7569 // Check the deadline of the path degrading alarm.
7570 QuicTime::Delta delay = QuicConnectionPeer::GetSentPacketManager(&connection_)
7571 ->GetPathDegradingDelay();
7572 EXPECT_EQ(clock_.ApproximateNow() + delay,
7573 connection_.GetPathDegradingAlarm()->deadline());
7574
7575 // Send a second packet. The path degrading alarm's deadline should remain
7576 // the same.
7577 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7578 QuicTime prev_deadline = connection_.GetPathDegradingAlarm()->deadline();
7579 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7580 offset += data_size;
7581 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7582 EXPECT_EQ(prev_deadline, connection_.GetPathDegradingAlarm()->deadline());
7583
7584 // Now receive an ACK of the first packet. This should advance the path
7585 // degrading alarm's deadline since forward progress has been made.
7586 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7587 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7588 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7589 QuicAckFrame frame =
7590 InitAckFrame({{QuicPacketNumber(1u), QuicPacketNumber(2u)}});
7591 ProcessAckPacket(&frame);
7592 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7593 // Check the deadline of the path degrading alarm.
7594 delay = QuicConnectionPeer::GetSentPacketManager(&connection_)
7595 ->GetPathDegradingDelay();
7596 EXPECT_EQ(clock_.ApproximateNow() + delay,
7597 connection_.GetPathDegradingAlarm()->deadline());
7598
7599 // Advance time to the path degrading alarm's deadline and simulate
7600 // firing the alarm.
7601 clock_.AdvanceTime(delay);
7602 EXPECT_CALL(visitor_, OnPathDegrading()).Times(1);
7603 connection_.GetPathDegradingAlarm()->Fire();
7604 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7605 EXPECT_TRUE(connection_.IsPathDegrading());
7606
7607 // Send a third packet. The path degrading alarm is no longer set but path
7608 // should still be marked as degrading.
7609 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7610 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7611 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7612 offset += data_size;
7613 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7614 EXPECT_TRUE(connection_.IsPathDegrading());
7615
7616 // Now receive an ACK of the second packet. This should unmark the path as
7617 // degrading. And will set a timer to detect new path degrading.
7618 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7619 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7620 frame = InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(3)}});
7621 ProcessAckPacket(&frame);
7622 EXPECT_FALSE(connection_.IsPathDegrading());
7623 EXPECT_TRUE(connection_.GetPathDegradingAlarm()->IsSet());
7624}
7625
7626TEST_P(QuicConnectionTest, NoPathDegradingOnServer) {
QUICHE teamcd098022019-03-22 18:49:55 -07007627 if (connection_.SupportsMultiplePacketNumberSpaces()) {
7628 return;
7629 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05007630 set_perspective(Perspective::IS_SERVER);
7631 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
7632
7633 EXPECT_FALSE(connection_.IsPathDegrading());
7634 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7635
7636 // Send data.
7637 const char data[] = "data";
7638 connection_.SendStreamDataWithString(1, data, 0, NO_FIN);
7639 EXPECT_FALSE(connection_.IsPathDegrading());
7640 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7641
7642 // Ack data.
7643 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7644 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7645 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7646 QuicAckFrame frame =
7647 InitAckFrame({{QuicPacketNumber(1u), QuicPacketNumber(2u)}});
7648 ProcessAckPacket(&frame);
7649 EXPECT_FALSE(connection_.IsPathDegrading());
7650 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7651}
7652
7653TEST_P(QuicConnectionTest, NoPathDegradingAfterSendingAck) {
QUICHE teamcd098022019-03-22 18:49:55 -07007654 if (connection_.SupportsMultiplePacketNumberSpaces()) {
7655 return;
7656 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05007657 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7658 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
7659 ProcessDataPacket(1);
7660 SendAckPacketToPeer();
7661 EXPECT_FALSE(connection_.sent_packet_manager().unacked_packets().empty());
7662 EXPECT_FALSE(connection_.sent_packet_manager().HasInFlightPackets());
7663 EXPECT_FALSE(connection_.IsPathDegrading());
7664 EXPECT_FALSE(connection_.GetPathDegradingAlarm()->IsSet());
7665}
7666
7667TEST_P(QuicConnectionTest, MultipleCallsToCloseConnection) {
7668 // Verifies that multiple calls to CloseConnection do not
7669 // result in multiple attempts to close the connection - it will be marked as
7670 // disconnected after the first call.
7671 EXPECT_CALL(visitor_, OnConnectionClosed(_, _, _)).Times(1);
7672 connection_.CloseConnection(QUIC_NO_ERROR, "no reason",
7673 ConnectionCloseBehavior::SILENT_CLOSE);
7674 connection_.CloseConnection(QUIC_NO_ERROR, "no reason",
7675 ConnectionCloseBehavior::SILENT_CLOSE);
7676}
7677
7678TEST_P(QuicConnectionTest, ServerReceivesChloOnNonCryptoStream) {
7679 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7680
7681 set_perspective(Perspective::IS_SERVER);
7682 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
7683
7684 CryptoHandshakeMessage message;
7685 CryptoFramer framer;
7686 message.set_tag(kCHLO);
QUICHE team3fe6a8b2019-03-14 09:10:38 -07007687 std::unique_ptr<QuicData> data = framer.ConstructHandshakeMessage(message);
QUICHE teama6ef0a62019-03-07 20:34:33 -05007688 frame1_.stream_id = 10;
7689 frame1_.data_buffer = data->data();
7690 frame1_.data_length = data->length();
7691
7692 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_MAYBE_CORRUPTED_MEMORY, _,
7693 ConnectionCloseSource::FROM_SELF));
7694 ForceProcessFramePacket(QuicFrame(frame1_));
7695}
7696
7697TEST_P(QuicConnectionTest, ClientReceivesRejOnNonCryptoStream) {
7698 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7699
7700 CryptoHandshakeMessage message;
7701 CryptoFramer framer;
7702 message.set_tag(kREJ);
QUICHE team3fe6a8b2019-03-14 09:10:38 -07007703 std::unique_ptr<QuicData> data = framer.ConstructHandshakeMessage(message);
QUICHE teama6ef0a62019-03-07 20:34:33 -05007704 frame1_.stream_id = 10;
7705 frame1_.data_buffer = data->data();
7706 frame1_.data_length = data->length();
7707
7708 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_MAYBE_CORRUPTED_MEMORY, _,
7709 ConnectionCloseSource::FROM_SELF));
7710 ForceProcessFramePacket(QuicFrame(frame1_));
7711}
7712
7713TEST_P(QuicConnectionTest, CloseConnectionOnPacketTooLarge) {
7714 SimulateNextPacketTooLarge();
7715 // A connection close packet is sent
7716 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PACKET_WRITE_ERROR, _,
7717 ConnectionCloseSource::FROM_SELF))
7718 .Times(1);
7719 connection_.SendStreamDataWithString(3, "foo", 0, NO_FIN);
7720}
7721
7722TEST_P(QuicConnectionTest, AlwaysGetPacketTooLarge) {
7723 // Test even we always get packet too large, we do not infinitely try to send
7724 // close packet.
7725 AlwaysGetPacketTooLarge();
7726 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PACKET_WRITE_ERROR, _,
7727 ConnectionCloseSource::FROM_SELF))
7728 .Times(1);
7729 connection_.SendStreamDataWithString(3, "foo", 0, NO_FIN);
7730}
7731
7732// Verify that if connection has no outstanding data, it notifies the send
7733// algorithm after the write.
7734TEST_P(QuicConnectionTest, SendDataAndBecomeApplicationLimited) {
7735 EXPECT_CALL(*send_algorithm_, OnApplicationLimited(_)).Times(1);
7736 {
7737 InSequence seq;
7738 EXPECT_CALL(visitor_, WillingAndAbleToWrite()).WillRepeatedly(Return(true));
7739 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
7740 EXPECT_CALL(visitor_, WillingAndAbleToWrite())
7741 .WillRepeatedly(Return(false));
7742 }
7743
7744 connection_.SendStreamData3();
7745}
7746
7747// Verify that the connection does not become app-limited if there is
7748// outstanding data to send after the write.
7749TEST_P(QuicConnectionTest, NotBecomeApplicationLimitedIfMoreDataAvailable) {
7750 EXPECT_CALL(*send_algorithm_, OnApplicationLimited(_)).Times(0);
7751 {
7752 InSequence seq;
7753 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
7754 EXPECT_CALL(visitor_, WillingAndAbleToWrite()).WillRepeatedly(Return(true));
7755 }
7756
7757 connection_.SendStreamData3();
7758}
7759
7760// Verify that the connection does not become app-limited after blocked write
7761// even if there is outstanding data to send after the write.
7762TEST_P(QuicConnectionTest, NotBecomeApplicationLimitedDueToWriteBlock) {
7763 EXPECT_CALL(*send_algorithm_, OnApplicationLimited(_)).Times(0);
7764 EXPECT_CALL(visitor_, WillingAndAbleToWrite()).WillRepeatedly(Return(true));
7765 BlockOnNextWrite();
7766
7767 connection_.SendStreamData3();
7768
7769 // Now unblock the writer, become congestion control blocked,
7770 // and ensure we become app-limited after writing.
7771 writer_->SetWritable();
7772 CongestionBlockWrites();
7773 EXPECT_CALL(visitor_, WillingAndAbleToWrite()).WillRepeatedly(Return(false));
7774 {
7775 InSequence seq;
7776 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
7777 EXPECT_CALL(*send_algorithm_, OnApplicationLimited(_)).Times(1);
7778 }
7779 connection_.OnCanWrite();
7780}
7781
7782// Test the mode in which the link is filled up with probing retransmissions if
7783// the connection becomes application-limited.
7784TEST_P(QuicConnectionTest, SendDataWhenApplicationLimited) {
7785 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7786 EXPECT_CALL(*send_algorithm_, ShouldSendProbingPacket())
7787 .WillRepeatedly(Return(true));
7788 {
7789 InSequence seq;
7790 EXPECT_CALL(visitor_, WillingAndAbleToWrite()).WillRepeatedly(Return(true));
7791 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _));
7792 EXPECT_CALL(visitor_, WillingAndAbleToWrite())
7793 .WillRepeatedly(Return(false));
7794 }
QUICHE teamb8343252019-04-29 13:58:01 -07007795 EXPECT_CALL(visitor_, SendProbingData()).WillRepeatedly([this] {
7796 return connection_.sent_packet_manager().MaybeRetransmitOldestPacket(
7797 PROBING_RETRANSMISSION);
7798 });
QUICHE teama6ef0a62019-03-07 20:34:33 -05007799 // Fix congestion window to be 20,000 bytes.
7800 EXPECT_CALL(*send_algorithm_, CanSend(Ge(20000u)))
7801 .WillRepeatedly(Return(false));
7802 EXPECT_CALL(*send_algorithm_, CanSend(Lt(20000u)))
7803 .WillRepeatedly(Return(true));
7804
7805 EXPECT_CALL(*send_algorithm_, OnApplicationLimited(_)).Times(0);
7806 ASSERT_EQ(0u, connection_.GetStats().packets_sent);
7807 connection_.set_fill_up_link_during_probing(true);
7808 connection_.OnHandshakeComplete();
7809 connection_.SendStreamData3();
7810
7811 // We expect a lot of packets from a 20 kbyte window.
7812 EXPECT_GT(connection_.GetStats().packets_sent, 10u);
7813 // Ensure that the packets are padded.
7814 QuicByteCount average_packet_size =
7815 connection_.GetStats().bytes_sent / connection_.GetStats().packets_sent;
7816 EXPECT_GT(average_packet_size, 1000u);
7817
7818 // Acknowledge all packets sent, except for the last one.
7819 QuicAckFrame ack = InitAckFrame(
7820 connection_.sent_packet_manager().GetLargestSentPacket() - 1);
7821 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
7822 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7823
7824 // Ensure that since we no longer have retransmittable bytes in flight, this
7825 // will not cause any responses to be sent.
7826 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
7827 EXPECT_CALL(*send_algorithm_, OnApplicationLimited(_)).Times(1);
7828 ProcessAckPacket(&ack);
7829}
7830
7831TEST_P(QuicConnectionTest, DonotForceSendingAckOnPacketTooLarge) {
7832 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7833 // Send an ack by simulating delayed ack alarm firing.
7834 ProcessPacket(1);
7835 QuicAlarm* ack_alarm = QuicConnectionPeer::GetAckAlarm(&connection_);
7836 EXPECT_TRUE(ack_alarm->IsSet());
7837 connection_.GetAckAlarm()->Fire();
7838 // Simulate data packet causes write error.
7839 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PACKET_WRITE_ERROR, _, _));
7840 SimulateNextPacketTooLarge();
7841 connection_.SendStreamDataWithString(3, "foo", 0, NO_FIN);
7842 EXPECT_EQ(1u, writer_->frame_count());
7843 EXPECT_FALSE(writer_->connection_close_frames().empty());
7844 // Ack frame is not bundled in connection close packet.
7845 EXPECT_TRUE(writer_->ack_frames().empty());
7846}
7847
7848TEST_P(QuicConnectionTest, CloseConnectionForStatelessReject) {
vasilvvc48c8712019-03-11 13:38:16 -07007849 std::string error_details("stateless reject");
QUICHE teama6ef0a62019-03-07 20:34:33 -05007850 EXPECT_CALL(visitor_, OnConnectionClosed(
7851 QUIC_CRYPTO_HANDSHAKE_STATELESS_REJECT,
7852 error_details, ConnectionCloseSource::FROM_PEER));
7853 connection_.set_perspective(Perspective::IS_CLIENT);
7854 connection_.CloseConnection(QUIC_CRYPTO_HANDSHAKE_STATELESS_REJECT,
7855 error_details,
7856 ConnectionCloseBehavior::SILENT_CLOSE);
7857}
7858
7859// Regression test for b/63620844.
7860TEST_P(QuicConnectionTest, FailedToWriteHandshakePacket) {
7861 SimulateNextPacketTooLarge();
7862 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_PACKET_WRITE_ERROR, _,
7863 ConnectionCloseSource::FROM_SELF))
7864 .Times(1);
7865 connection_.SendCryptoStreamData();
7866}
7867
7868TEST_P(QuicConnectionTest, MaxPacingRate) {
7869 EXPECT_EQ(0, connection_.MaxPacingRate().ToBytesPerSecond());
7870 connection_.SetMaxPacingRate(QuicBandwidth::FromBytesPerSecond(100));
7871 EXPECT_EQ(100, connection_.MaxPacingRate().ToBytesPerSecond());
7872}
7873
7874TEST_P(QuicConnectionTest, ClientAlwaysSendConnectionId) {
7875 EXPECT_EQ(Perspective::IS_CLIENT, connection_.perspective());
7876 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
7877 connection_.SendStreamDataWithString(3, "foo", 0, NO_FIN);
7878 EXPECT_EQ(CONNECTION_ID_PRESENT,
7879 writer_->last_packet_header().destination_connection_id_included);
7880
7881 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
7882 QuicConfig config;
7883 QuicConfigPeer::SetReceivedBytesForConnectionId(&config, 0);
7884 connection_.SetFromConfig(config);
7885
7886 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
7887 connection_.SendStreamDataWithString(3, "bar", 3, NO_FIN);
7888 // Verify connection id is still sent in the packet.
7889 EXPECT_EQ(CONNECTION_ID_PRESENT,
7890 writer_->last_packet_header().destination_connection_id_included);
7891}
7892
7893TEST_P(QuicConnectionTest, SendProbingRetransmissions) {
7894 MockQuicConnectionDebugVisitor debug_visitor;
7895 connection_.set_debug_visitor(&debug_visitor);
7896
7897 const QuicStreamId stream_id = 2;
7898 QuicPacketNumber last_packet;
7899 SendStreamDataToPeer(stream_id, "foo", 0, NO_FIN, &last_packet);
7900 SendStreamDataToPeer(stream_id, "bar", 3, NO_FIN, &last_packet);
7901 SendStreamDataToPeer(stream_id, "test", 6, NO_FIN, &last_packet);
7902
7903 const QuicByteCount old_bytes_in_flight =
7904 connection_.sent_packet_manager().GetBytesInFlight();
7905
7906 // Allow 9 probing retransmissions to be sent.
7907 {
7908 InSequence seq;
7909 EXPECT_CALL(*send_algorithm_, CanSend(_))
7910 .Times(9 * 2)
7911 .WillRepeatedly(Return(true));
7912 EXPECT_CALL(*send_algorithm_, CanSend(_)).WillOnce(Return(false));
7913 }
7914 // Expect them retransmitted in cyclic order (foo, bar, test, foo, bar...).
7915 QuicPacketCount sent_count = 0;
7916 EXPECT_CALL(debug_visitor, OnPacketSent(_, _, _, _))
7917 .WillRepeatedly(Invoke([this, &sent_count](const SerializedPacket&,
7918 QuicPacketNumber,
7919 TransmissionType, QuicTime) {
7920 ASSERT_EQ(1u, writer_->stream_frames().size());
7921 // Identify the frames by stream offset (0, 3, 6, 0, 3...).
7922 EXPECT_EQ(3 * (sent_count % 3), writer_->stream_frames()[0]->offset);
7923 sent_count++;
7924 }));
7925 EXPECT_CALL(*send_algorithm_, ShouldSendProbingPacket())
7926 .WillRepeatedly(Return(true));
QUICHE teamb8343252019-04-29 13:58:01 -07007927 EXPECT_CALL(visitor_, SendProbingData()).WillRepeatedly([this] {
7928 return connection_.sent_packet_manager().MaybeRetransmitOldestPacket(
7929 PROBING_RETRANSMISSION);
7930 });
QUICHE teama6ef0a62019-03-07 20:34:33 -05007931
7932 connection_.SendProbingRetransmissions();
7933
7934 // Ensure that the in-flight has increased.
7935 const QuicByteCount new_bytes_in_flight =
7936 connection_.sent_packet_manager().GetBytesInFlight();
7937 EXPECT_GT(new_bytes_in_flight, old_bytes_in_flight);
7938}
7939
7940// Ensure that SendProbingRetransmissions() does not retransmit anything when
7941// there are no outstanding packets.
7942TEST_P(QuicConnectionTest,
7943 SendProbingRetransmissionsFailsWhenNothingToRetransmit) {
7944 ASSERT_TRUE(connection_.sent_packet_manager().unacked_packets().empty());
7945
7946 MockQuicConnectionDebugVisitor debug_visitor;
7947 connection_.set_debug_visitor(&debug_visitor);
7948 EXPECT_CALL(debug_visitor, OnPacketSent(_, _, _, _)).Times(0);
7949 EXPECT_CALL(*send_algorithm_, ShouldSendProbingPacket())
7950 .WillRepeatedly(Return(true));
QUICHE teamb8343252019-04-29 13:58:01 -07007951 EXPECT_CALL(visitor_, SendProbingData()).WillRepeatedly([this] {
7952 return connection_.sent_packet_manager().MaybeRetransmitOldestPacket(
7953 PROBING_RETRANSMISSION);
7954 });
QUICHE teama6ef0a62019-03-07 20:34:33 -05007955
7956 connection_.SendProbingRetransmissions();
7957}
7958
7959TEST_P(QuicConnectionTest, PingAfterLastRetransmittablePacketAcked) {
7960 const QuicTime::Delta retransmittable_on_wire_timeout =
7961 QuicTime::Delta::FromMilliseconds(50);
7962 connection_.set_retransmittable_on_wire_timeout(
7963 retransmittable_on_wire_timeout);
7964
7965 EXPECT_TRUE(connection_.connected());
7966 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
7967 .WillRepeatedly(Return(true));
7968
7969 const char data[] = "data";
7970 size_t data_size = strlen(data);
7971 QuicStreamOffset offset = 0;
7972
7973 // Advance 5ms, send a retransmittable packet to the peer.
7974 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7975 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
7976 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7977 offset += data_size;
7978 EXPECT_TRUE(connection_.sent_packet_manager().HasInFlightPackets());
7979 // The ping alarm is set for the ping timeout, not the shorter
7980 // retransmittable_on_wire_timeout.
7981 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
7982 QuicTime::Delta ping_delay = QuicTime::Delta::FromSeconds(kPingTimeoutSecs);
7983 EXPECT_EQ((clock_.ApproximateNow() + ping_delay),
7984 connection_.GetPingAlarm()->deadline());
7985
7986 // Advance 5ms, send a second retransmittable packet to the peer.
7987 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7988 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
7989 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
7990 offset += data_size;
7991 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
7992
7993 // Now receive an ACK of the first packet. This should not set the
7994 // retransmittable-on-wire alarm since packet 2 is still on the wire.
7995 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
7996 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
7997 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
7998 QuicAckFrame frame =
7999 InitAckFrame({{QuicPacketNumber(1), QuicPacketNumber(2)}});
8000 ProcessAckPacket(&frame);
8001 EXPECT_TRUE(connection_.sent_packet_manager().HasInFlightPackets());
8002 // The ping alarm is set for the ping timeout, not the shorter
8003 // retransmittable_on_wire_timeout.
8004 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
8005 // The ping alarm has a 1 second granularity, and the clock has been advanced
8006 // 10ms since it was originally set.
8007 EXPECT_EQ((clock_.ApproximateNow() + ping_delay -
8008 QuicTime::Delta::FromMilliseconds(10)),
8009 connection_.GetPingAlarm()->deadline());
8010
8011 // Now receive an ACK of the second packet. This should set the
8012 // retransmittable-on-wire alarm now that no retransmittable packets are on
8013 // the wire.
8014 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8015 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
8016 frame = InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(3)}});
8017 ProcessAckPacket(&frame);
8018 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
8019 EXPECT_EQ(clock_.ApproximateNow() + retransmittable_on_wire_timeout,
8020 connection_.GetPingAlarm()->deadline());
8021
8022 // Now receive a duplicate ACK of the second packet. This should not update
8023 // the ping alarm.
8024 QuicTime prev_deadline = connection_.GetPingAlarm()->deadline();
8025 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8026 frame = InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(3)}});
8027 ProcessAckPacket(&frame);
8028 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
8029 EXPECT_EQ(prev_deadline, connection_.GetPingAlarm()->deadline());
8030
8031 // Now receive a non-ACK packet. This should not update the ping alarm.
8032 prev_deadline = connection_.GetPingAlarm()->deadline();
8033 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8034 ProcessPacket(4);
8035 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
8036 EXPECT_EQ(prev_deadline, connection_.GetPingAlarm()->deadline());
8037
8038 // Simulate the alarm firing and check that a PING is sent.
8039 EXPECT_CALL(visitor_, SendPing()).WillOnce(Invoke([this]() {
8040 connection_.SendControlFrame(QuicFrame(QuicPingFrame(1)));
8041 }));
8042 connection_.GetPingAlarm()->Fire();
nharper55fa6132019-05-07 19:37:21 -07008043 size_t padding_frame_count = writer_->padding_frames().size();
QUICHE teama6ef0a62019-03-07 20:34:33 -05008044 if (GetParam().no_stop_waiting) {
nharper55fa6132019-05-07 19:37:21 -07008045 EXPECT_EQ(padding_frame_count + 2u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05008046 } else {
nharper55fa6132019-05-07 19:37:21 -07008047 EXPECT_EQ(padding_frame_count + 3u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05008048 }
8049 ASSERT_EQ(1u, writer_->ping_frames().size());
8050}
8051
8052TEST_P(QuicConnectionTest, NoPingIfRetransmittablePacketSent) {
8053 const QuicTime::Delta retransmittable_on_wire_timeout =
8054 QuicTime::Delta::FromMilliseconds(50);
8055 connection_.set_retransmittable_on_wire_timeout(
8056 retransmittable_on_wire_timeout);
8057
8058 EXPECT_TRUE(connection_.connected());
8059 EXPECT_CALL(visitor_, ShouldKeepConnectionAlive())
8060 .WillRepeatedly(Return(true));
8061
8062 const char data[] = "data";
8063 size_t data_size = strlen(data);
8064 QuicStreamOffset offset = 0;
8065
8066 // Advance 5ms, send a retransmittable packet to the peer.
8067 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8068 EXPECT_FALSE(connection_.GetPingAlarm()->IsSet());
8069 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
8070 offset += data_size;
8071 EXPECT_TRUE(connection_.sent_packet_manager().HasInFlightPackets());
8072 // The ping alarm is set for the ping timeout, not the shorter
8073 // retransmittable_on_wire_timeout.
8074 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
8075 QuicTime::Delta ping_delay = QuicTime::Delta::FromSeconds(kPingTimeoutSecs);
8076 EXPECT_EQ((clock_.ApproximateNow() + ping_delay),
8077 connection_.GetPingAlarm()->deadline());
8078
8079 // Now receive an ACK of the first packet. This should set the
8080 // retransmittable-on-wire alarm now that no retransmittable packets are on
8081 // the wire.
8082 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8083 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
8084 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
8085 QuicAckFrame frame =
8086 InitAckFrame({{QuicPacketNumber(1), QuicPacketNumber(2)}});
8087 ProcessAckPacket(&frame);
8088 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
8089 EXPECT_EQ(clock_.ApproximateNow() + retransmittable_on_wire_timeout,
8090 connection_.GetPingAlarm()->deadline());
8091
8092 // Before the alarm fires, send another retransmittable packet. This should
8093 // cancel the retransmittable-on-wire alarm since now there's a
8094 // retransmittable packet on the wire.
8095 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
8096 offset += data_size;
8097 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
8098
8099 // Now receive an ACK of the second packet. This should set the
8100 // retransmittable-on-wire alarm now that no retransmittable packets are on
8101 // the wire.
8102 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8103 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
8104 frame = InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(3)}});
8105 ProcessAckPacket(&frame);
8106 EXPECT_TRUE(connection_.GetPingAlarm()->IsSet());
8107 EXPECT_EQ(clock_.ApproximateNow() + retransmittable_on_wire_timeout,
8108 connection_.GetPingAlarm()->deadline());
8109
8110 // Simulate the alarm firing and check that a PING is sent.
8111 writer_->Reset();
8112 EXPECT_CALL(visitor_, SendPing()).WillOnce(Invoke([this]() {
8113 connection_.SendControlFrame(QuicFrame(QuicPingFrame(1)));
8114 }));
8115 connection_.GetPingAlarm()->Fire();
nharper55fa6132019-05-07 19:37:21 -07008116 size_t padding_frame_count = writer_->padding_frames().size();
QUICHE teama6ef0a62019-03-07 20:34:33 -05008117 if (GetParam().no_stop_waiting) {
fayang03916692019-05-22 17:57:18 -07008118 if (GetQuicReloadableFlag(quic_simplify_stop_waiting)) {
8119 // Do not ACK acks.
8120 EXPECT_EQ(padding_frame_count + 1u, writer_->frame_count());
8121 } else {
8122 EXPECT_EQ(padding_frame_count + 2u, writer_->frame_count());
8123 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05008124 } else {
nharper55fa6132019-05-07 19:37:21 -07008125 EXPECT_EQ(padding_frame_count + 3u, writer_->frame_count());
QUICHE teama6ef0a62019-03-07 20:34:33 -05008126 }
8127 ASSERT_EQ(1u, writer_->ping_frames().size());
8128}
8129
8130TEST_P(QuicConnectionTest, OnForwardProgressConfirmed) {
8131 EXPECT_CALL(visitor_, OnForwardProgressConfirmed()).Times(Exactly(0));
8132 EXPECT_TRUE(connection_.connected());
8133
8134 const char data[] = "data";
8135 size_t data_size = strlen(data);
8136 QuicStreamOffset offset = 0;
8137
8138 // Send two packets.
8139 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
8140 offset += data_size;
8141 connection_.SendStreamDataWithString(1, data, offset, NO_FIN);
8142 offset += data_size;
8143
8144 // Ack packet 1. This increases the largest_acked to 1, so
8145 // OnForwardProgressConfirmed() should be called
8146 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8147 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
8148 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
8149 EXPECT_CALL(visitor_, OnForwardProgressConfirmed());
8150 QuicAckFrame frame =
8151 InitAckFrame({{QuicPacketNumber(1), QuicPacketNumber(2)}});
8152 ProcessAckPacket(&frame);
8153
8154 // Ack packet 1 again. largest_acked remains at 1, so
8155 // OnForwardProgressConfirmed() should not be called.
8156 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8157 frame = InitAckFrame({{QuicPacketNumber(1), QuicPacketNumber(2)}});
8158 ProcessAckPacket(&frame);
8159
8160 // Ack packet 2. This increases the largest_acked to 2, so
8161 // OnForwardProgressConfirmed() should be called.
8162 clock_.AdvanceTime(QuicTime::Delta::FromMilliseconds(5));
8163 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
8164 EXPECT_CALL(visitor_, OnForwardProgressConfirmed());
8165 frame = InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(3)}});
8166 ProcessAckPacket(&frame);
8167}
8168
8169TEST_P(QuicConnectionTest, ValidStatelessResetToken) {
8170 const QuicUint128 kTestToken = 1010101;
8171 const QuicUint128 kWrongTestToken = 1010100;
8172 QuicConfig config;
8173 // No token has been received.
8174 EXPECT_FALSE(connection_.IsValidStatelessResetToken(kTestToken));
8175
8176 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _)).Times(2);
8177 // Token is different from received token.
8178 QuicConfigPeer::SetReceivedStatelessResetToken(&config, kTestToken);
8179 connection_.SetFromConfig(config);
8180 EXPECT_FALSE(connection_.IsValidStatelessResetToken(kWrongTestToken));
8181
8182 QuicConfigPeer::SetReceivedStatelessResetToken(&config, kTestToken);
8183 connection_.SetFromConfig(config);
8184 EXPECT_TRUE(connection_.IsValidStatelessResetToken(kTestToken));
8185}
8186
8187TEST_P(QuicConnectionTest, WriteBlockedWithInvalidAck) {
8188 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
8189 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_ACK_DATA, _, _));
8190
8191 BlockOnNextWrite();
8192 connection_.SendStreamDataWithString(5, "foo", 0, FIN);
8193 // This causes connection to be closed because packet 1 has not been sent yet.
8194 QuicAckFrame frame = InitAckFrame(1);
8195 ProcessAckPacket(1, &frame);
8196}
8197
8198TEST_P(QuicConnectionTest, SendMessage) {
QUICHE teamcd098022019-03-22 18:49:55 -07008199 if (connection_.transport_version() <= QUIC_VERSION_44 ||
8200 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05008201 return;
8202 }
ianswettb239f862019-04-05 09:15:06 -07008203 std::string message(connection_.GetCurrentLargestMessagePayload() * 2, 'a');
QUICHE teama6ef0a62019-03-07 20:34:33 -05008204 QuicStringPiece message_data(message);
8205 QuicMemSliceStorage storage(nullptr, 0, nullptr, 0);
8206 {
8207 QuicConnection::ScopedPacketFlusher flusher(&connection_,
8208 QuicConnection::SEND_ACK);
8209 connection_.SendStreamData3();
8210 // Send a message which cannot fit into current open packet, and 2 packets
8211 // get sent, one contains stream frame, and the other only contains the
8212 // message frame.
8213 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
8214 EXPECT_EQ(
8215 MESSAGE_STATUS_SUCCESS,
8216 connection_.SendMessage(
8217 1, MakeSpan(connection_.helper()->GetStreamSendBufferAllocator(),
ianswettb239f862019-04-05 09:15:06 -07008218 QuicStringPiece(
8219 message_data.data(),
8220 connection_.GetCurrentLargestMessagePayload()),
QUICHE teama6ef0a62019-03-07 20:34:33 -05008221 &storage)));
8222 }
8223 // Fail to send a message if connection is congestion control blocked.
8224 EXPECT_CALL(*send_algorithm_, CanSend(_)).WillOnce(Return(false));
8225 EXPECT_EQ(
8226 MESSAGE_STATUS_BLOCKED,
8227 connection_.SendMessage(
8228 2, MakeSpan(connection_.helper()->GetStreamSendBufferAllocator(),
8229 "message", &storage)));
8230
8231 // Always fail to send a message which cannot fit into one packet.
8232 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
8233 EXPECT_EQ(
8234 MESSAGE_STATUS_TOO_LARGE,
8235 connection_.SendMessage(
ianswettb239f862019-04-05 09:15:06 -07008236 3, MakeSpan(connection_.helper()->GetStreamSendBufferAllocator(),
8237 QuicStringPiece(
8238 message_data.data(),
8239 connection_.GetCurrentLargestMessagePayload() + 1),
8240 &storage)));
QUICHE teama6ef0a62019-03-07 20:34:33 -05008241}
8242
8243// Test to check that the path challenge/path response logic works
8244// correctly. This test is only for version-99
8245TEST_P(QuicConnectionTest, PathChallengeResponse) {
QUICHE teamcd098022019-03-22 18:49:55 -07008246 if (connection_.version().transport_version != QUIC_VERSION_99 ||
8247 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05008248 return;
8249 }
8250 // First check if we can probe from server to client and back
8251 set_perspective(Perspective::IS_SERVER);
8252 QuicPacketCreatorPeer::SetSendVersionInPacket(creator_, false);
8253
8254 // Create and send the probe request (PATH_CHALLENGE frame).
8255 // SendConnectivityProbingPacket ends up calling
8256 // TestPacketWriter::WritePacket() which in turns receives and parses the
8257 // packet by calling framer_.ProcessPacket() -- which in turn calls
8258 // SimpleQuicFramer::OnPathChallengeFrame(). SimpleQuicFramer saves
8259 // the packet in writer_->path_challenge_frames()
8260 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
8261 connection_.SendConnectivityProbingPacket(writer_.get(),
8262 connection_.peer_address());
8263 // Save the random contents of the challenge for later comparison to the
8264 // response.
nharper55fa6132019-05-07 19:37:21 -07008265 ASSERT_GE(writer_->path_challenge_frames().size(), 1u);
QUICHE teama6ef0a62019-03-07 20:34:33 -05008266 QuicPathFrameBuffer challenge_data =
8267 writer_->path_challenge_frames().front().data_buffer;
8268
8269 // Normally, QuicConnection::OnPathChallengeFrame and OnPaddingFrame would be
8270 // called and it will perform actions to ensure that the rest of the protocol
8271 // is performed (specifically, call UpdatePacketContent to say that this is a
8272 // path challenge so that when QuicConnection::OnPacketComplete is called
8273 // (again, out of the framer), the response is generated). Simulate those
8274 // calls so that the right internal state is set up for generating
8275 // the response.
8276 EXPECT_TRUE(connection_.OnPathChallengeFrame(
8277 writer_->path_challenge_frames().front()));
8278 EXPECT_TRUE(connection_.OnPaddingFrame(writer_->padding_frames().front()));
8279 // Cause the response to be created and sent. Result is that the response
8280 // should be stashed in writer's path_response_frames.
8281 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
8282 connection_.SendConnectivityProbingResponsePacket(connection_.peer_address());
8283
8284 // The final check is to ensure that the random data in the response matches
8285 // the random data from the challenge.
8286 EXPECT_EQ(0, memcmp(&challenge_data,
8287 &(writer_->path_response_frames().front().data_buffer),
8288 sizeof(challenge_data)));
8289}
8290
8291// Regression test for b/110259444
8292TEST_P(QuicConnectionTest, DoNotScheduleSpuriousAckAlarm) {
8293 SetQuicReloadableFlag(quic_fix_spurious_ack_alarm, true);
8294 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
8295 EXPECT_CALL(visitor_, OnWriteBlocked()).Times(AtLeast(1));
8296 writer_->SetWriteBlocked();
8297
8298 ProcessPacket(1);
8299 QuicAlarm* ack_alarm = QuicConnectionPeer::GetAckAlarm(&connection_);
8300 // Verify ack alarm is set.
8301 EXPECT_TRUE(ack_alarm->IsSet());
8302 // Fire the ack alarm, verify no packet is sent because the writer is blocked.
8303 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
8304 connection_.GetAckAlarm()->Fire();
8305
8306 writer_->SetWritable();
8307 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
8308 ProcessPacket(2);
8309 // Verify ack alarm is not set.
8310 EXPECT_FALSE(ack_alarm->IsSet());
8311}
8312
8313TEST_P(QuicConnectionTest, DisablePacingOffloadConnectionOptions) {
8314 EXPECT_FALSE(QuicConnectionPeer::SupportsReleaseTime(&connection_));
8315 writer_->set_supports_release_time(true);
8316 QuicConfig config;
8317 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
8318 connection_.SetFromConfig(config);
8319 EXPECT_TRUE(QuicConnectionPeer::SupportsReleaseTime(&connection_));
8320
8321 QuicTagVector connection_options;
8322 connection_options.push_back(kNPCO);
8323 config.SetConnectionOptionsToSend(connection_options);
8324 EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
8325 connection_.SetFromConfig(config);
8326 // Verify pacing offload is disabled.
8327 EXPECT_FALSE(QuicConnectionPeer::SupportsReleaseTime(&connection_));
8328}
8329
8330// Regression test for b/110259444
8331// Get a path response without having issued a path challenge...
8332TEST_P(QuicConnectionTest, OrphanPathResponse) {
8333 QuicPathFrameBuffer data = {{0, 1, 2, 3, 4, 5, 6, 7}};
8334
8335 QuicPathResponseFrame frame(99, data);
8336 EXPECT_TRUE(connection_.OnPathResponseFrame(frame));
8337 // If PATH_RESPONSE was accepted (payload matches the payload saved
8338 // in QuicConnection::transmitted_connectivity_probe_payload_) then
8339 // current_packet_content_ would be set to FIRST_FRAME_IS_PING.
8340 // Since this PATH_RESPONSE does not match, current_packet_content_
8341 // must not be FIRST_FRAME_IS_PING.
8342 EXPECT_NE(QuicConnection::FIRST_FRAME_IS_PING,
8343 QuicConnectionPeer::GetCurrentPacketContent(&connection_));
8344}
8345
8346// Regression test for b/120791670
8347TEST_P(QuicConnectionTest, StopProcessingGQuicPacketInIetfQuicConnection) {
8348 // This test mimics a problematic scenario where an IETF QUIC connection
8349 // receives a Google QUIC packet and continue processing it using Google QUIC
8350 // wire format.
8351 if (version().transport_version <= QUIC_VERSION_43) {
8352 return;
8353 }
8354 set_perspective(Perspective::IS_SERVER);
nharper46833c32019-05-15 21:33:05 -07008355 QuicFrame frame;
8356 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
8357 frame = QuicFrame(&crypto_frame_);
8358 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(1);
8359 } else {
8360 frame = QuicFrame(QuicStreamFrame(
8361 QuicUtils::GetCryptoStreamId(connection_.transport_version()), false,
8362 0u, QuicStringPiece()));
8363 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(1);
8364 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05008365 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
nharper46833c32019-05-15 21:33:05 -07008366 ProcessFramePacketWithAddresses(frame, kSelfAddress, kPeerAddress);
QUICHE teama6ef0a62019-03-07 20:34:33 -05008367
8368 // Let connection process a Google QUIC packet.
8369 peer_framer_.set_version_for_tests(
8370 ParsedQuicVersion(PROTOCOL_QUIC_CRYPTO, QUIC_VERSION_43));
QUICHE team8c1daa22019-03-13 08:33:41 -07008371 std::unique_ptr<QuicPacket> packet(
QUICHE team6987b4a2019-03-15 16:23:04 -07008372 ConstructDataPacket(2, !kHasStopWaiting, ENCRYPTION_INITIAL));
dschinazi66dea072019-04-09 11:41:06 -07008373 char buffer[kMaxOutgoingPacketSize];
8374 size_t encrypted_length =
8375 peer_framer_.EncryptPayload(ENCRYPTION_INITIAL, QuicPacketNumber(2),
8376 *packet, buffer, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05008377 // Make sure no stream frame is processed.
8378 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(0);
8379 connection_.ProcessUdpPacket(
8380 kSelfAddress, kPeerAddress,
8381 QuicReceivedPacket(buffer, encrypted_length, clock_.Now(), false));
8382
8383 EXPECT_EQ(2u, connection_.GetStats().packets_received);
8384 EXPECT_EQ(1u, connection_.GetStats().packets_processed);
8385}
8386
8387TEST_P(QuicConnectionTest, AcceptPacketNumberZero) {
QUICHE teamcd098022019-03-22 18:49:55 -07008388 if (version().transport_version != QUIC_VERSION_99 ||
8389 connection_.SupportsMultiplePacketNumberSpaces()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05008390 return;
8391 }
8392 // Set first_sending_packet_number to be 0 to allow successfully processing
8393 // acks which ack packet number 0.
8394 QuicFramerPeer::SetFirstSendingPacketNumber(writer_->framer()->framer(), 0);
8395 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
8396
8397 ProcessPacket(0);
8398 EXPECT_EQ(QuicPacketNumber(0), LargestAcked(*outgoing_ack()));
8399 EXPECT_EQ(1u, outgoing_ack()->packets.NumIntervals());
8400
8401 ProcessPacket(1);
8402 EXPECT_EQ(QuicPacketNumber(1), LargestAcked(*outgoing_ack()));
8403 EXPECT_EQ(1u, outgoing_ack()->packets.NumIntervals());
8404
8405 ProcessPacket(2);
8406 EXPECT_EQ(QuicPacketNumber(2), LargestAcked(*outgoing_ack()));
8407 EXPECT_EQ(1u, outgoing_ack()->packets.NumIntervals());
8408}
8409
QUICHE teamcd098022019-03-22 18:49:55 -07008410TEST_P(QuicConnectionTest, MultiplePacketNumberSpacesBasicSending) {
8411 if (!connection_.SupportsMultiplePacketNumberSpaces()) {
8412 return;
8413 }
8414 use_tagging_decrypter();
8415 connection_.SetEncrypter(ENCRYPTION_INITIAL,
8416 QuicMakeUnique<TaggingEncrypter>(0x01));
8417
8418 connection_.SendCryptoStreamData();
8419 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
8420 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
8421 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
8422 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
8423 QuicAckFrame frame1 = InitAckFrame(1);
8424 // Received ACK for packet 1.
8425 ProcessFramePacketAtLevel(30, QuicFrame(&frame1), ENCRYPTION_INITIAL);
8426
8427 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(4);
8428 connection_.SendApplicationDataAtLevel(ENCRYPTION_ZERO_RTT, 5, "data", 0,
8429 NO_FIN);
8430 connection_.SendApplicationDataAtLevel(ENCRYPTION_ZERO_RTT, 5, "data", 4,
8431 NO_FIN);
8432 connection_.SendApplicationDataAtLevel(ENCRYPTION_FORWARD_SECURE, 5, "data",
8433 8, NO_FIN);
8434 connection_.SendApplicationDataAtLevel(ENCRYPTION_FORWARD_SECURE, 5, "data",
8435 12, FIN);
8436 // Received ACK for packets 2, 4, 5.
8437 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
8438 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
8439 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
8440 QuicAckFrame frame2 =
8441 InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(3)},
8442 {QuicPacketNumber(4), QuicPacketNumber(6)}});
8443 // Make sure although the same packet number is used, but they are in
8444 // different packet number spaces.
8445 ProcessFramePacketAtLevel(30, QuicFrame(&frame2), ENCRYPTION_FORWARD_SECURE);
8446}
8447
8448TEST_P(QuicConnectionTest, PeerAcksPacketsInWrongPacketNumberSpace) {
8449 if (!connection_.SupportsMultiplePacketNumberSpaces()) {
8450 return;
8451 }
8452 use_tagging_decrypter();
8453 connection_.SetEncrypter(ENCRYPTION_INITIAL,
8454 QuicMakeUnique<TaggingEncrypter>(0x01));
8455
8456 connection_.SendCryptoStreamData();
8457 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
8458 EXPECT_CALL(*loss_algorithm_, DetectLosses(_, _, _, _, _, _));
8459 EXPECT_CALL(*send_algorithm_, OnCongestionEvent(true, _, _, _, _));
8460 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
8461 QuicAckFrame frame1 = InitAckFrame(1);
8462 // Received ACK for packet 1.
8463 ProcessFramePacketAtLevel(30, QuicFrame(&frame1), ENCRYPTION_INITIAL);
8464
8465 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
8466 connection_.SendApplicationDataAtLevel(ENCRYPTION_ZERO_RTT, 5, "data", 0,
8467 NO_FIN);
8468 connection_.SendApplicationDataAtLevel(ENCRYPTION_ZERO_RTT, 5, "data", 4,
8469 NO_FIN);
8470
8471 // Received ACK for packets 2 and 3 in wrong packet number space.
8472 QuicAckFrame invalid_ack =
8473 InitAckFrame({{QuicPacketNumber(2), QuicPacketNumber(4)}});
8474 EXPECT_CALL(visitor_, OnConnectionClosed(QUIC_INVALID_ACK_DATA, _,
8475 ConnectionCloseSource::FROM_SELF));
8476 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
8477 ProcessFramePacketAtLevel(300, QuicFrame(&invalid_ack), ENCRYPTION_INITIAL);
8478}
8479
8480TEST_P(QuicConnectionTest, MultiplePacketNumberSpacesBasicReceiving) {
8481 if (!connection_.SupportsMultiplePacketNumberSpaces()) {
8482 return;
8483 }
8484 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
nharper46833c32019-05-15 21:33:05 -07008485 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
8486 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
8487 }
QUICHE teamcd098022019-03-22 18:49:55 -07008488 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
8489 use_tagging_decrypter();
8490 // Receives packet 1000 in initial data.
nharper46833c32019-05-15 21:33:05 -07008491 ProcessCryptoPacketAtLevel(1000, ENCRYPTION_INITIAL);
QUICHE teamcd098022019-03-22 18:49:55 -07008492 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
8493 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
8494 QuicMakeUnique<TaggingEncrypter>(0x02));
zhongyi546cc452019-04-12 15:27:49 -07008495 SetDecrypter(ENCRYPTION_ZERO_RTT,
8496 QuicMakeUnique<StrictTaggingDecrypter>(0x02));
QUICHE teamcd098022019-03-22 18:49:55 -07008497 connection_.SetEncrypter(ENCRYPTION_INITIAL,
8498 QuicMakeUnique<TaggingEncrypter>(0x02));
8499 // Receives packet 1000 in application data.
8500 ProcessDataPacketAtLevel(1000, false, ENCRYPTION_ZERO_RTT);
8501 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
8502 connection_.SendApplicationDataAtLevel(ENCRYPTION_ZERO_RTT, 5, "data", 0,
8503 NO_FIN);
8504 // Verify application data ACK gets bundled with outgoing data.
8505 EXPECT_EQ(2u, writer_->frame_count());
8506 // Make sure ACK alarm is still set because initial data is not ACKed.
8507 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
8508 // Receive packet 1001 in application data.
8509 ProcessDataPacketAtLevel(1001, false, ENCRYPTION_ZERO_RTT);
8510 clock_.AdvanceTime(DefaultRetransmissionTime());
8511 // Simulates ACK alarm fires and verify two ACKs are flushed.
8512 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
8513 connection_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
8514 QuicMakeUnique<TaggingEncrypter>(0x02));
8515 connection_.GetAckAlarm()->Fire();
8516 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
8517 // Receives more packets in application data.
8518 ProcessDataPacketAtLevel(1002, false, ENCRYPTION_ZERO_RTT);
8519 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
8520
8521 peer_framer_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
8522 QuicMakeUnique<TaggingEncrypter>(0x02));
zhongyi546cc452019-04-12 15:27:49 -07008523 SetDecrypter(ENCRYPTION_FORWARD_SECURE,
8524 QuicMakeUnique<StrictTaggingDecrypter>(0x02));
QUICHE teamcd098022019-03-22 18:49:55 -07008525 // Verify zero rtt and forward secure packets get acked in the same packet.
8526 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(1);
nharper2c9f02a2019-05-08 10:25:50 -07008527 ProcessDataPacket(1003);
QUICHE teamcd098022019-03-22 18:49:55 -07008528 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
8529}
8530
QUICHE team552f71f2019-03-23 15:37:59 -07008531TEST_P(QuicConnectionTest, CancelAckAlarmOnWriteBlocked) {
8532 if (!connection_.SupportsMultiplePacketNumberSpaces()) {
8533 return;
8534 }
8535 EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
nharper46833c32019-05-15 21:33:05 -07008536 if (QuicVersionUsesCryptoFrames(connection_.transport_version())) {
8537 EXPECT_CALL(visitor_, OnCryptoFrame(_)).Times(AnyNumber());
8538 }
QUICHE team552f71f2019-03-23 15:37:59 -07008539 EXPECT_CALL(visitor_, OnStreamFrame(_)).Times(AnyNumber());
8540 use_tagging_decrypter();
8541 // Receives packet 1000 in initial data.
nharper46833c32019-05-15 21:33:05 -07008542 ProcessCryptoPacketAtLevel(1000, ENCRYPTION_INITIAL);
QUICHE team552f71f2019-03-23 15:37:59 -07008543 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
8544 peer_framer_.SetEncrypter(ENCRYPTION_ZERO_RTT,
8545 QuicMakeUnique<TaggingEncrypter>(0x02));
zhongyi546cc452019-04-12 15:27:49 -07008546 SetDecrypter(ENCRYPTION_ZERO_RTT,
8547 QuicMakeUnique<StrictTaggingDecrypter>(0x02));
QUICHE team552f71f2019-03-23 15:37:59 -07008548 connection_.SetEncrypter(ENCRYPTION_INITIAL,
8549 QuicMakeUnique<TaggingEncrypter>(0x02));
8550 // Receives packet 1000 in application data.
8551 ProcessDataPacketAtLevel(1000, false, ENCRYPTION_ZERO_RTT);
8552 EXPECT_TRUE(connection_.GetAckAlarm()->IsSet());
8553
8554 writer_->SetWriteBlocked();
8555 EXPECT_CALL(visitor_, OnWriteBlocked()).Times(AnyNumber());
8556 // Simulates ACK alarm fires and verify no ACK is flushed because of write
8557 // blocked.
8558 clock_.AdvanceTime(DefaultDelayedAckTime());
8559 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(0);
8560 connection_.SetEncrypter(ENCRYPTION_FORWARD_SECURE,
8561 QuicMakeUnique<TaggingEncrypter>(0x02));
8562 connection_.GetAckAlarm()->Fire();
8563 // Verify ACK alarm is not set.
8564 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
8565
8566 writer_->SetWritable();
8567 // Verify 2 ACKs are sent when connection gets unblocked.
8568 EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
8569 connection_.OnCanWrite();
8570 EXPECT_FALSE(connection_.GetAckAlarm()->IsSet());
8571}
8572
QUICHE teama6ef0a62019-03-07 20:34:33 -05008573} // namespace
8574} // namespace test
8575} // namespace quic