| // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "quic/core/quic_config.h" |
| |
| #include <memory> |
| #include <string> |
| |
| #include "absl/numeric/int128.h" |
| #include "quic/core/crypto/crypto_handshake_message.h" |
| #include "quic/core/crypto/crypto_protocol.h" |
| #include "quic/core/crypto/transport_parameters.h" |
| #include "quic/core/quic_constants.h" |
| #include "quic/core/quic_packets.h" |
| #include "quic/core/quic_time.h" |
| #include "quic/core/quic_utils.h" |
| #include "quic/platform/api/quic_expect_bug.h" |
| #include "quic/platform/api/quic_flags.h" |
| #include "quic/platform/api/quic_test.h" |
| #include "quic/test_tools/quic_config_peer.h" |
| #include "quic/test_tools/quic_test_utils.h" |
| |
| namespace quic { |
| namespace test { |
| namespace { |
| |
| class QuicConfigTest : public QuicTestWithParam<ParsedQuicVersion> { |
| public: |
| QuicConfigTest() : version_(GetParam()) {} |
| |
| protected: |
| ParsedQuicVersion version_; |
| QuicConfig config_; |
| }; |
| |
| // Run all tests with all versions of QUIC. |
| INSTANTIATE_TEST_SUITE_P(QuicConfigTests, |
| QuicConfigTest, |
| ::testing::ValuesIn(AllSupportedVersions()), |
| ::testing::PrintToStringParamName()); |
| |
| TEST_P(QuicConfigTest, SetDefaults) { |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config_.GetInitialStreamFlowControlWindowToSend()); |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config_.GetInitialMaxStreamDataBytesIncomingBidirectionalToSend()); |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config_.GetInitialMaxStreamDataBytesOutgoingBidirectionalToSend()); |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config_.GetInitialMaxStreamDataBytesUnidirectionalToSend()); |
| EXPECT_FALSE(config_.HasReceivedInitialStreamFlowControlWindowBytes()); |
| EXPECT_FALSE( |
| config_.HasReceivedInitialMaxStreamDataBytesIncomingBidirectional()); |
| EXPECT_FALSE( |
| config_.HasReceivedInitialMaxStreamDataBytesOutgoingBidirectional()); |
| EXPECT_FALSE(config_.HasReceivedInitialMaxStreamDataBytesUnidirectional()); |
| EXPECT_EQ(kMaxIncomingPacketSize, config_.GetMaxPacketSizeToSend()); |
| EXPECT_FALSE(config_.HasReceivedMaxPacketSize()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedForConnection()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedLocally()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedRemotely()); |
| } |
| |
| TEST_P(QuicConfigTest, AutoSetIetfFlowControl) { |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config_.GetInitialStreamFlowControlWindowToSend()); |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config_.GetInitialMaxStreamDataBytesIncomingBidirectionalToSend()); |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config_.GetInitialMaxStreamDataBytesOutgoingBidirectionalToSend()); |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config_.GetInitialMaxStreamDataBytesUnidirectionalToSend()); |
| static const uint32_t kTestWindowSize = 1234567; |
| config_.SetInitialStreamFlowControlWindowToSend(kTestWindowSize); |
| EXPECT_EQ(kTestWindowSize, config_.GetInitialStreamFlowControlWindowToSend()); |
| EXPECT_EQ(kTestWindowSize, |
| config_.GetInitialMaxStreamDataBytesIncomingBidirectionalToSend()); |
| EXPECT_EQ(kTestWindowSize, |
| config_.GetInitialMaxStreamDataBytesOutgoingBidirectionalToSend()); |
| EXPECT_EQ(kTestWindowSize, |
| config_.GetInitialMaxStreamDataBytesUnidirectionalToSend()); |
| static const uint32_t kTestWindowSizeTwo = 2345678; |
| config_.SetInitialMaxStreamDataBytesIncomingBidirectionalToSend( |
| kTestWindowSizeTwo); |
| EXPECT_EQ(kTestWindowSize, config_.GetInitialStreamFlowControlWindowToSend()); |
| EXPECT_EQ(kTestWindowSizeTwo, |
| config_.GetInitialMaxStreamDataBytesIncomingBidirectionalToSend()); |
| EXPECT_EQ(kTestWindowSize, |
| config_.GetInitialMaxStreamDataBytesOutgoingBidirectionalToSend()); |
| EXPECT_EQ(kTestWindowSize, |
| config_.GetInitialMaxStreamDataBytesUnidirectionalToSend()); |
| } |
| |
| TEST_P(QuicConfigTest, ToHandshakeMessage) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| config_.SetInitialStreamFlowControlWindowToSend( |
| kInitialStreamFlowControlWindowForTest); |
| config_.SetInitialSessionFlowControlWindowToSend( |
| kInitialSessionFlowControlWindowForTest); |
| config_.SetIdleNetworkTimeout(QuicTime::Delta::FromSeconds(5)); |
| CryptoHandshakeMessage msg; |
| config_.ToHandshakeMessage(&msg, version_.transport_version); |
| |
| uint32_t value; |
| QuicErrorCode error = msg.GetUint32(kICSL, &value); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_EQ(5u, value); |
| |
| error = msg.GetUint32(kSFCW, &value); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_EQ(kInitialStreamFlowControlWindowForTest, value); |
| |
| error = msg.GetUint32(kCFCW, &value); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_EQ(kInitialSessionFlowControlWindowForTest, value); |
| } |
| |
| TEST_P(QuicConfigTest, ProcessClientHello) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| const uint32_t kTestMaxAckDelayMs = |
| static_cast<uint32_t>(kDefaultDelayedAckTimeMs + 1); |
| QuicConfig client_config; |
| QuicTagVector cgst; |
| cgst.push_back(kQBIC); |
| client_config.SetIdleNetworkTimeout( |
| QuicTime::Delta::FromSeconds(2 * kMaximumIdleTimeoutSecs)); |
| client_config.SetInitialRoundTripTimeUsToSend(10 * kNumMicrosPerMilli); |
| client_config.SetInitialStreamFlowControlWindowToSend( |
| 2 * kInitialStreamFlowControlWindowForTest); |
| client_config.SetInitialSessionFlowControlWindowToSend( |
| 2 * kInitialSessionFlowControlWindowForTest); |
| QuicTagVector copt; |
| copt.push_back(kTBBR); |
| client_config.SetConnectionOptionsToSend(copt); |
| client_config.SetMaxAckDelayToSendMs(kTestMaxAckDelayMs); |
| CryptoHandshakeMessage msg; |
| client_config.ToHandshakeMessage(&msg, version_.transport_version); |
| |
| std::string error_details; |
| QuicTagVector initial_received_options; |
| initial_received_options.push_back(kIW50); |
| EXPECT_TRUE( |
| config_.SetInitialReceivedConnectionOptions(initial_received_options)); |
| EXPECT_FALSE( |
| config_.SetInitialReceivedConnectionOptions(initial_received_options)) |
| << "You can only set initial options once."; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, CLIENT, &error_details); |
| EXPECT_FALSE( |
| config_.SetInitialReceivedConnectionOptions(initial_received_options)) |
| << "You cannot set initial options after the hello."; |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_TRUE(config_.negotiated()); |
| EXPECT_EQ(QuicTime::Delta::FromSeconds(kMaximumIdleTimeoutSecs), |
| config_.IdleNetworkTimeout()); |
| EXPECT_EQ(10 * kNumMicrosPerMilli, config_.ReceivedInitialRoundTripTimeUs()); |
| EXPECT_TRUE(config_.HasReceivedConnectionOptions()); |
| EXPECT_EQ(2u, config_.ReceivedConnectionOptions().size()); |
| EXPECT_EQ(config_.ReceivedConnectionOptions()[0], kIW50); |
| EXPECT_EQ(config_.ReceivedConnectionOptions()[1], kTBBR); |
| EXPECT_EQ(config_.ReceivedInitialStreamFlowControlWindowBytes(), |
| 2 * kInitialStreamFlowControlWindowForTest); |
| EXPECT_EQ(config_.ReceivedInitialSessionFlowControlWindowBytes(), |
| 2 * kInitialSessionFlowControlWindowForTest); |
| EXPECT_TRUE(config_.HasReceivedMaxAckDelayMs()); |
| EXPECT_EQ(kTestMaxAckDelayMs, config_.ReceivedMaxAckDelayMs()); |
| |
| // IETF QUIC stream limits should not be received in QUIC crypto messages. |
| EXPECT_FALSE( |
| config_.HasReceivedInitialMaxStreamDataBytesIncomingBidirectional()); |
| EXPECT_FALSE( |
| config_.HasReceivedInitialMaxStreamDataBytesOutgoingBidirectional()); |
| EXPECT_FALSE(config_.HasReceivedInitialMaxStreamDataBytesUnidirectional()); |
| } |
| |
| TEST_P(QuicConfigTest, ProcessServerHello) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| QuicIpAddress host; |
| host.FromString("127.0.3.1"); |
| const QuicSocketAddress kTestServerAddress = QuicSocketAddress(host, 1234); |
| const absl::uint128 kTestResetToken = absl::MakeUint128(0, 10111100001); |
| const uint32_t kTestMaxAckDelayMs = |
| static_cast<uint32_t>(kDefaultDelayedAckTimeMs + 1); |
| QuicConfig server_config; |
| QuicTagVector cgst; |
| cgst.push_back(kQBIC); |
| server_config.SetIdleNetworkTimeout( |
| QuicTime::Delta::FromSeconds(kMaximumIdleTimeoutSecs / 2)); |
| server_config.SetInitialRoundTripTimeUsToSend(10 * kNumMicrosPerMilli); |
| server_config.SetInitialStreamFlowControlWindowToSend( |
| 2 * kInitialStreamFlowControlWindowForTest); |
| server_config.SetInitialSessionFlowControlWindowToSend( |
| 2 * kInitialSessionFlowControlWindowForTest); |
| server_config.SetIPv4AlternateServerAddressToSend(kTestServerAddress); |
| server_config.SetStatelessResetTokenToSend(kTestResetToken); |
| server_config.SetMaxAckDelayToSendMs(kTestMaxAckDelayMs); |
| CryptoHandshakeMessage msg; |
| server_config.ToHandshakeMessage(&msg, version_.transport_version); |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, SERVER, &error_details); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_TRUE(config_.negotiated()); |
| EXPECT_EQ(QuicTime::Delta::FromSeconds(kMaximumIdleTimeoutSecs / 2), |
| config_.IdleNetworkTimeout()); |
| EXPECT_EQ(10 * kNumMicrosPerMilli, config_.ReceivedInitialRoundTripTimeUs()); |
| EXPECT_EQ(config_.ReceivedInitialStreamFlowControlWindowBytes(), |
| 2 * kInitialStreamFlowControlWindowForTest); |
| EXPECT_EQ(config_.ReceivedInitialSessionFlowControlWindowBytes(), |
| 2 * kInitialSessionFlowControlWindowForTest); |
| EXPECT_TRUE(config_.HasReceivedIPv4AlternateServerAddress()); |
| EXPECT_EQ(kTestServerAddress, config_.ReceivedIPv4AlternateServerAddress()); |
| EXPECT_FALSE(config_.HasReceivedIPv6AlternateServerAddress()); |
| EXPECT_TRUE(config_.HasReceivedStatelessResetToken()); |
| EXPECT_EQ(kTestResetToken, config_.ReceivedStatelessResetToken()); |
| EXPECT_TRUE(config_.HasReceivedMaxAckDelayMs()); |
| EXPECT_EQ(kTestMaxAckDelayMs, config_.ReceivedMaxAckDelayMs()); |
| |
| // IETF QUIC stream limits should not be received in QUIC crypto messages. |
| EXPECT_FALSE( |
| config_.HasReceivedInitialMaxStreamDataBytesIncomingBidirectional()); |
| EXPECT_FALSE( |
| config_.HasReceivedInitialMaxStreamDataBytesOutgoingBidirectional()); |
| EXPECT_FALSE(config_.HasReceivedInitialMaxStreamDataBytesUnidirectional()); |
| } |
| |
| TEST_P(QuicConfigTest, MissingOptionalValuesInCHLO) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| CryptoHandshakeMessage msg; |
| msg.SetValue(kICSL, 1); |
| |
| // Set all REQUIRED tags. |
| msg.SetValue(kICSL, 1); |
| msg.SetValue(kMIBS, 1); |
| |
| // No error, as rest are optional. |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, CLIENT, &error_details); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_TRUE(config_.negotiated()); |
| } |
| |
| TEST_P(QuicConfigTest, MissingOptionalValuesInSHLO) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| CryptoHandshakeMessage msg; |
| |
| // Set all REQUIRED tags. |
| msg.SetValue(kICSL, 1); |
| msg.SetValue(kMIBS, 1); |
| |
| // No error, as rest are optional. |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, SERVER, &error_details); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_TRUE(config_.negotiated()); |
| } |
| |
| TEST_P(QuicConfigTest, MissingValueInCHLO) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| // Server receives CHLO with missing kICSL. |
| CryptoHandshakeMessage msg; |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, CLIENT, &error_details); |
| EXPECT_THAT(error, IsError(QUIC_CRYPTO_MESSAGE_PARAMETER_NOT_FOUND)); |
| } |
| |
| TEST_P(QuicConfigTest, MissingValueInSHLO) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| // Client receives SHLO with missing kICSL. |
| CryptoHandshakeMessage msg; |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, SERVER, &error_details); |
| EXPECT_THAT(error, IsError(QUIC_CRYPTO_MESSAGE_PARAMETER_NOT_FOUND)); |
| } |
| |
| TEST_P(QuicConfigTest, OutOfBoundSHLO) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| QuicConfig server_config; |
| server_config.SetIdleNetworkTimeout( |
| QuicTime::Delta::FromSeconds(2 * kMaximumIdleTimeoutSecs)); |
| |
| CryptoHandshakeMessage msg; |
| server_config.ToHandshakeMessage(&msg, version_.transport_version); |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, SERVER, &error_details); |
| EXPECT_THAT(error, IsError(QUIC_INVALID_NEGOTIATED_VALUE)); |
| } |
| |
| TEST_P(QuicConfigTest, InvalidFlowControlWindow) { |
| // QuicConfig should not accept an invalid flow control window to send to the |
| // peer: the receive window must be at least the default of 16 Kb. |
| QuicConfig config; |
| const uint64_t kInvalidWindow = kMinimumFlowControlSendWindow - 1; |
| EXPECT_QUIC_BUG( |
| config.SetInitialStreamFlowControlWindowToSend(kInvalidWindow), |
| "Initial stream flow control receive window"); |
| |
| EXPECT_EQ(kMinimumFlowControlSendWindow, |
| config.GetInitialStreamFlowControlWindowToSend()); |
| } |
| |
| TEST_P(QuicConfigTest, HasClientSentConnectionOption) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| QuicConfig client_config; |
| QuicTagVector copt; |
| copt.push_back(kTBBR); |
| client_config.SetConnectionOptionsToSend(copt); |
| EXPECT_TRUE(client_config.HasClientSentConnectionOption( |
| kTBBR, Perspective::IS_CLIENT)); |
| |
| CryptoHandshakeMessage msg; |
| client_config.ToHandshakeMessage(&msg, version_.transport_version); |
| |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, CLIENT, &error_details); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_TRUE(config_.negotiated()); |
| |
| EXPECT_TRUE(config_.HasReceivedConnectionOptions()); |
| EXPECT_EQ(1u, config_.ReceivedConnectionOptions().size()); |
| EXPECT_TRUE( |
| config_.HasClientSentConnectionOption(kTBBR, Perspective::IS_SERVER)); |
| } |
| |
| TEST_P(QuicConfigTest, DontSendClientConnectionOptions) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| QuicConfig client_config; |
| QuicTagVector copt; |
| copt.push_back(kTBBR); |
| client_config.SetClientConnectionOptions(copt); |
| |
| CryptoHandshakeMessage msg; |
| client_config.ToHandshakeMessage(&msg, version_.transport_version); |
| |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, CLIENT, &error_details); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_TRUE(config_.negotiated()); |
| |
| EXPECT_FALSE(config_.HasReceivedConnectionOptions()); |
| } |
| |
| TEST_P(QuicConfigTest, HasClientRequestedIndependentOption) { |
| if (version_.UsesTls()) { |
| // CryptoHandshakeMessage is only used for QUIC_CRYPTO. |
| return; |
| } |
| QuicConfig client_config; |
| QuicTagVector client_opt; |
| client_opt.push_back(kRENO); |
| QuicTagVector copt; |
| copt.push_back(kTBBR); |
| client_config.SetClientConnectionOptions(client_opt); |
| client_config.SetConnectionOptionsToSend(copt); |
| EXPECT_TRUE(client_config.HasClientSentConnectionOption( |
| kTBBR, Perspective::IS_CLIENT)); |
| EXPECT_TRUE(client_config.HasClientRequestedIndependentOption( |
| kRENO, Perspective::IS_CLIENT)); |
| EXPECT_FALSE(client_config.HasClientRequestedIndependentOption( |
| kTBBR, Perspective::IS_CLIENT)); |
| |
| CryptoHandshakeMessage msg; |
| client_config.ToHandshakeMessage(&msg, version_.transport_version); |
| |
| std::string error_details; |
| const QuicErrorCode error = |
| config_.ProcessPeerHello(msg, CLIENT, &error_details); |
| EXPECT_THAT(error, IsQuicNoError()); |
| EXPECT_TRUE(config_.negotiated()); |
| |
| EXPECT_TRUE(config_.HasReceivedConnectionOptions()); |
| EXPECT_EQ(1u, config_.ReceivedConnectionOptions().size()); |
| EXPECT_FALSE(config_.HasClientRequestedIndependentOption( |
| kRENO, Perspective::IS_SERVER)); |
| EXPECT_TRUE(config_.HasClientRequestedIndependentOption( |
| kTBBR, Perspective::IS_SERVER)); |
| } |
| |
| TEST_P(QuicConfigTest, IncomingLargeIdleTimeoutTransportParameter) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| // Configure our idle timeout to 60s, then receive 120s from peer. |
| // Since the received value is above ours, we should then use ours. |
| config_.SetIdleNetworkTimeout(quic::QuicTime::Delta::FromSeconds(60)); |
| TransportParameters params; |
| params.max_idle_timeout_ms.set_value(120000); |
| |
| std::string error_details = "foobar"; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()); |
| EXPECT_EQ("", error_details); |
| EXPECT_EQ(quic::QuicTime::Delta::FromSeconds(60), |
| config_.IdleNetworkTimeout()); |
| } |
| |
| TEST_P(QuicConfigTest, ReceivedInvalidMinAckDelayInTransportParameter) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| TransportParameters params; |
| |
| params.max_ack_delay.set_value(25 /*ms*/); |
| params.min_ack_delay_us.set_value(25 * kNumMicrosPerMilli + 1); |
| std::string error_details = "foobar"; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsError(IETF_QUIC_PROTOCOL_VIOLATION)); |
| EXPECT_EQ("MinAckDelay is greater than MaxAckDelay.", error_details); |
| |
| params.max_ack_delay.set_value(25 /*ms*/); |
| params.min_ack_delay_us.set_value(25 * kNumMicrosPerMilli); |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()); |
| EXPECT_TRUE(error_details.empty()); |
| } |
| |
| TEST_P(QuicConfigTest, FillTransportParams) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| config_.SetInitialMaxStreamDataBytesIncomingBidirectionalToSend( |
| 2 * kMinimumFlowControlSendWindow); |
| config_.SetInitialMaxStreamDataBytesOutgoingBidirectionalToSend( |
| 3 * kMinimumFlowControlSendWindow); |
| config_.SetInitialMaxStreamDataBytesUnidirectionalToSend( |
| 4 * kMinimumFlowControlSendWindow); |
| config_.SetMaxPacketSizeToSend(kMaxPacketSizeForTest); |
| config_.SetMaxDatagramFrameSizeToSend(kMaxDatagramFrameSizeForTest); |
| config_.SetActiveConnectionIdLimitToSend(kActiveConnectionIdLimitForTest); |
| |
| config_.SetOriginalConnectionIdToSend(TestConnectionId(0x1111)); |
| config_.SetInitialSourceConnectionIdToSend(TestConnectionId(0x2222)); |
| config_.SetRetrySourceConnectionIdToSend(TestConnectionId(0x3333)); |
| config_.SetMinAckDelayMs(kDefaultMinAckDelayTimeMs); |
| |
| QuicIpAddress host; |
| host.FromString("127.0.3.1"); |
| QuicSocketAddress kTestServerAddress = QuicSocketAddress(host, 1234); |
| QuicConnectionId new_connection_id = TestConnectionId(5); |
| absl::uint128 new_stateless_reset_token = |
| QuicUtils::GenerateStatelessResetToken(new_connection_id); |
| config_.SetIPv4AlternateServerAddressToSend( |
| kTestServerAddress, new_connection_id, new_stateless_reset_token); |
| |
| TransportParameters params; |
| config_.FillTransportParameters(¶ms); |
| |
| EXPECT_EQ(2 * kMinimumFlowControlSendWindow, |
| params.initial_max_stream_data_bidi_remote.value()); |
| EXPECT_EQ(3 * kMinimumFlowControlSendWindow, |
| params.initial_max_stream_data_bidi_local.value()); |
| EXPECT_EQ(4 * kMinimumFlowControlSendWindow, |
| params.initial_max_stream_data_uni.value()); |
| |
| EXPECT_EQ(static_cast<uint64_t>(kMaximumIdleTimeoutSecs * 1000), |
| params.max_idle_timeout_ms.value()); |
| |
| EXPECT_EQ(kMaxPacketSizeForTest, params.max_udp_payload_size.value()); |
| EXPECT_EQ(kMaxDatagramFrameSizeForTest, |
| params.max_datagram_frame_size.value()); |
| EXPECT_EQ(kActiveConnectionIdLimitForTest, |
| params.active_connection_id_limit.value()); |
| |
| ASSERT_TRUE(params.original_destination_connection_id.has_value()); |
| EXPECT_EQ(TestConnectionId(0x1111), |
| params.original_destination_connection_id.value()); |
| ASSERT_TRUE(params.initial_source_connection_id.has_value()); |
| EXPECT_EQ(TestConnectionId(0x2222), |
| params.initial_source_connection_id.value()); |
| ASSERT_TRUE(params.retry_source_connection_id.has_value()); |
| EXPECT_EQ(TestConnectionId(0x3333), |
| params.retry_source_connection_id.value()); |
| |
| EXPECT_EQ( |
| static_cast<uint64_t>(kDefaultMinAckDelayTimeMs) * kNumMicrosPerMilli, |
| params.min_ack_delay_us.value()); |
| EXPECT_TRUE(params.key_update_not_yet_supported); |
| |
| EXPECT_EQ(params.preferred_address->ipv4_socket_address, kTestServerAddress); |
| EXPECT_EQ(params.preferred_address->connection_id, new_connection_id); |
| EXPECT_EQ(*reinterpret_cast<absl::uint128*>( |
| ¶ms.preferred_address->stateless_reset_token.front()), |
| new_stateless_reset_token); |
| } |
| |
| TEST_P(QuicConfigTest, ProcessTransportParametersServer) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| TransportParameters params; |
| |
| params.initial_max_stream_data_bidi_local.set_value( |
| 2 * kMinimumFlowControlSendWindow); |
| params.initial_max_stream_data_bidi_remote.set_value( |
| 3 * kMinimumFlowControlSendWindow); |
| params.initial_max_stream_data_uni.set_value(4 * |
| kMinimumFlowControlSendWindow); |
| params.max_udp_payload_size.set_value(kMaxPacketSizeForTest); |
| params.max_datagram_frame_size.set_value(kMaxDatagramFrameSizeForTest); |
| params.initial_max_streams_bidi.set_value(kDefaultMaxStreamsPerConnection); |
| params.stateless_reset_token = CreateStatelessResetTokenForTest(); |
| params.max_ack_delay.set_value(kMaxAckDelayForTest); |
| params.min_ack_delay_us.set_value(kMinAckDelayUsForTest); |
| params.ack_delay_exponent.set_value(kAckDelayExponentForTest); |
| params.active_connection_id_limit.set_value(kActiveConnectionIdLimitForTest); |
| params.original_destination_connection_id = TestConnectionId(0x1111); |
| params.initial_source_connection_id = TestConnectionId(0x2222); |
| params.retry_source_connection_id = TestConnectionId(0x3333); |
| |
| std::string error_details; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ true, &error_details), |
| IsQuicNoError()) |
| << error_details; |
| |
| EXPECT_FALSE(config_.negotiated()); |
| |
| ASSERT_TRUE( |
| config_.HasReceivedInitialMaxStreamDataBytesIncomingBidirectional()); |
| EXPECT_EQ(2 * kMinimumFlowControlSendWindow, |
| config_.ReceivedInitialMaxStreamDataBytesIncomingBidirectional()); |
| |
| ASSERT_TRUE( |
| config_.HasReceivedInitialMaxStreamDataBytesOutgoingBidirectional()); |
| EXPECT_EQ(3 * kMinimumFlowControlSendWindow, |
| config_.ReceivedInitialMaxStreamDataBytesOutgoingBidirectional()); |
| |
| ASSERT_TRUE(config_.HasReceivedInitialMaxStreamDataBytesUnidirectional()); |
| EXPECT_EQ(4 * kMinimumFlowControlSendWindow, |
| config_.ReceivedInitialMaxStreamDataBytesUnidirectional()); |
| |
| ASSERT_TRUE(config_.HasReceivedMaxPacketSize()); |
| EXPECT_EQ(kMaxPacketSizeForTest, config_.ReceivedMaxPacketSize()); |
| |
| ASSERT_TRUE(config_.HasReceivedMaxDatagramFrameSize()); |
| EXPECT_EQ(kMaxDatagramFrameSizeForTest, |
| config_.ReceivedMaxDatagramFrameSize()); |
| |
| ASSERT_TRUE(config_.HasReceivedMaxBidirectionalStreams()); |
| EXPECT_EQ(kDefaultMaxStreamsPerConnection, |
| config_.ReceivedMaxBidirectionalStreams()); |
| |
| EXPECT_FALSE(config_.DisableConnectionMigration()); |
| |
| // The following config shouldn't be processed because of resumption. |
| EXPECT_FALSE(config_.HasReceivedStatelessResetToken()); |
| EXPECT_FALSE(config_.HasReceivedMaxAckDelayMs()); |
| EXPECT_FALSE(config_.HasReceivedAckDelayExponent()); |
| EXPECT_FALSE(config_.HasReceivedMinAckDelayMs()); |
| EXPECT_FALSE(config_.HasReceivedOriginalConnectionId()); |
| EXPECT_FALSE(config_.HasReceivedInitialSourceConnectionId()); |
| EXPECT_FALSE(config_.HasReceivedRetrySourceConnectionId()); |
| |
| // Let the config process another slightly tweaked transport paramters. |
| // Note that the values for flow control and stream limit cannot be smaller |
| // than before. This rule is enforced in QuicSession::OnConfigNegotiated(). |
| params.initial_max_stream_data_bidi_local.set_value( |
| 2 * kMinimumFlowControlSendWindow + 1); |
| params.initial_max_stream_data_bidi_remote.set_value( |
| 4 * kMinimumFlowControlSendWindow); |
| params.initial_max_stream_data_uni.set_value(5 * |
| kMinimumFlowControlSendWindow); |
| params.max_udp_payload_size.set_value(2 * kMaxPacketSizeForTest); |
| params.max_datagram_frame_size.set_value(2 * kMaxDatagramFrameSizeForTest); |
| params.initial_max_streams_bidi.set_value(2 * |
| kDefaultMaxStreamsPerConnection); |
| params.disable_active_migration = true; |
| |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()) |
| << error_details; |
| |
| EXPECT_TRUE(config_.negotiated()); |
| |
| ASSERT_TRUE( |
| config_.HasReceivedInitialMaxStreamDataBytesIncomingBidirectional()); |
| EXPECT_EQ(2 * kMinimumFlowControlSendWindow + 1, |
| config_.ReceivedInitialMaxStreamDataBytesIncomingBidirectional()); |
| |
| ASSERT_TRUE( |
| config_.HasReceivedInitialMaxStreamDataBytesOutgoingBidirectional()); |
| EXPECT_EQ(4 * kMinimumFlowControlSendWindow, |
| config_.ReceivedInitialMaxStreamDataBytesOutgoingBidirectional()); |
| |
| ASSERT_TRUE(config_.HasReceivedInitialMaxStreamDataBytesUnidirectional()); |
| EXPECT_EQ(5 * kMinimumFlowControlSendWindow, |
| config_.ReceivedInitialMaxStreamDataBytesUnidirectional()); |
| |
| ASSERT_TRUE(config_.HasReceivedMaxPacketSize()); |
| EXPECT_EQ(2 * kMaxPacketSizeForTest, config_.ReceivedMaxPacketSize()); |
| |
| ASSERT_TRUE(config_.HasReceivedMaxDatagramFrameSize()); |
| EXPECT_EQ(2 * kMaxDatagramFrameSizeForTest, |
| config_.ReceivedMaxDatagramFrameSize()); |
| |
| ASSERT_TRUE(config_.HasReceivedMaxBidirectionalStreams()); |
| EXPECT_EQ(2 * kDefaultMaxStreamsPerConnection, |
| config_.ReceivedMaxBidirectionalStreams()); |
| |
| EXPECT_TRUE(config_.DisableConnectionMigration()); |
| |
| ASSERT_TRUE(config_.HasReceivedStatelessResetToken()); |
| |
| ASSERT_TRUE(config_.HasReceivedMaxAckDelayMs()); |
| EXPECT_EQ(config_.ReceivedMaxAckDelayMs(), kMaxAckDelayForTest); |
| |
| ASSERT_TRUE(config_.HasReceivedMinAckDelayMs()); |
| EXPECT_EQ(config_.ReceivedMinAckDelayMs(), |
| kMinAckDelayUsForTest / kNumMicrosPerMilli); |
| |
| ASSERT_TRUE(config_.HasReceivedAckDelayExponent()); |
| EXPECT_EQ(config_.ReceivedAckDelayExponent(), kAckDelayExponentForTest); |
| |
| ASSERT_TRUE(config_.HasReceivedActiveConnectionIdLimit()); |
| EXPECT_EQ(config_.ReceivedActiveConnectionIdLimit(), |
| kActiveConnectionIdLimitForTest); |
| |
| ASSERT_TRUE(config_.HasReceivedOriginalConnectionId()); |
| EXPECT_EQ(config_.ReceivedOriginalConnectionId(), TestConnectionId(0x1111)); |
| ASSERT_TRUE(config_.HasReceivedInitialSourceConnectionId()); |
| EXPECT_EQ(config_.ReceivedInitialSourceConnectionId(), |
| TestConnectionId(0x2222)); |
| ASSERT_TRUE(config_.HasReceivedRetrySourceConnectionId()); |
| EXPECT_EQ(config_.ReceivedRetrySourceConnectionId(), |
| TestConnectionId(0x3333)); |
| } |
| |
| TEST_P(QuicConfigTest, DisableMigrationTransportParameter) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| TransportParameters params; |
| params.disable_active_migration = true; |
| std::string error_details; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()); |
| EXPECT_TRUE(config_.DisableConnectionMigration()); |
| } |
| |
| TEST_P(QuicConfigTest, KeyUpdateNotYetSupportedTransportParameterNorLocally) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| EXPECT_FALSE(config_.KeyUpdateSupportedForConnection()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedLocally()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedRemotely()); |
| TransportParameters params; |
| params.key_update_not_yet_supported = true; |
| std::string error_details; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedForConnection()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedLocally()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedRemotely()); |
| } |
| |
| TEST_P(QuicConfigTest, KeyUpdateNotYetSupportedTransportParameter) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| config_.SetKeyUpdateSupportedLocally(); |
| EXPECT_FALSE(config_.KeyUpdateSupportedForConnection()); |
| EXPECT_TRUE(config_.KeyUpdateSupportedLocally()); |
| |
| TransportParameters params; |
| params.key_update_not_yet_supported = true; |
| std::string error_details; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedForConnection()); |
| EXPECT_TRUE(config_.KeyUpdateSupportedLocally()); |
| } |
| |
| TEST_P(QuicConfigTest, KeyUpdateSupportedRemotelyButNotLocally) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| EXPECT_FALSE(config_.KeyUpdateSupportedLocally()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedForConnection()); |
| |
| TransportParameters params; |
| params.key_update_not_yet_supported = false; |
| std::string error_details; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedForConnection()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedLocally()); |
| EXPECT_TRUE(config_.KeyUpdateSupportedRemotely()); |
| } |
| |
| TEST_P(QuicConfigTest, KeyUpdateSupported) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| config_.SetKeyUpdateSupportedLocally(); |
| EXPECT_TRUE(config_.KeyUpdateSupportedLocally()); |
| EXPECT_FALSE(config_.KeyUpdateSupportedForConnection()); |
| |
| TransportParameters params; |
| params.key_update_not_yet_supported = false; |
| std::string error_details; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()); |
| EXPECT_TRUE(config_.KeyUpdateSupportedForConnection()); |
| EXPECT_TRUE(config_.KeyUpdateSupportedLocally()); |
| EXPECT_TRUE(config_.KeyUpdateSupportedRemotely()); |
| } |
| |
| TEST_P(QuicConfigTest, SendPreferredIPv4Address) { |
| if (!version_.UsesTls()) { |
| // TransportParameters are only used for QUIC+TLS. |
| return; |
| } |
| |
| EXPECT_FALSE(config_.HasReceivedPreferredAddressConnectionIdAndToken()); |
| |
| TransportParameters params; |
| QuicIpAddress host; |
| host.FromString("::ffff:192.0.2.128"); |
| QuicSocketAddress kTestServerAddress = QuicSocketAddress(host, 1234); |
| QuicConnectionId new_connection_id = TestConnectionId(5); |
| absl::uint128 new_stateless_reset_token = |
| QuicUtils::GenerateStatelessResetToken(new_connection_id); |
| auto preferred_address = |
| std::make_unique<TransportParameters::PreferredAddress>(); |
| preferred_address->ipv6_socket_address = kTestServerAddress; |
| preferred_address->connection_id = new_connection_id; |
| preferred_address->stateless_reset_token.assign( |
| reinterpret_cast<const char*>(&new_stateless_reset_token), |
| reinterpret_cast<const char*>(&new_stateless_reset_token) + |
| sizeof(new_stateless_reset_token)); |
| params.preferred_address = std::move(preferred_address); |
| |
| std::string error_details; |
| EXPECT_THAT(config_.ProcessTransportParameters( |
| params, /* is_resumption = */ false, &error_details), |
| IsQuicNoError()); |
| |
| EXPECT_TRUE(config_.HasReceivedIPv6AlternateServerAddress()); |
| EXPECT_EQ(config_.ReceivedIPv6AlternateServerAddress(), kTestServerAddress); |
| EXPECT_TRUE(config_.HasReceivedPreferredAddressConnectionIdAndToken()); |
| const std::pair<QuicConnectionId, absl::uint128>& |
| preferred_address_connection_id_and_token = |
| config_.ReceivedPreferredAddressConnectionIdAndToken(); |
| EXPECT_EQ(preferred_address_connection_id_and_token.first, new_connection_id); |
| EXPECT_EQ(preferred_address_connection_id_and_token.second, |
| new_stateless_reset_token); |
| } |
| |
| } // namespace |
| } // namespace test |
| } // namespace quic |