Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(908)

Side by Side Diff: net/quic/quic_connection_test.cc

Issue 14083012: QUIC: retransmit packets with the correct encryption. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Moved HandshakeMode enum to MockCryptoClientStream Created 7 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/quic_connection.h" 5 #include "net/quic/quic_connection.h"
6 6
7 #include "base/basictypes.h"
7 #include "base/bind.h" 8 #include "base/bind.h"
8 #include "net/base/net_errors.h" 9 #include "net/base/net_errors.h"
9 #include "net/quic/congestion_control/receive_algorithm_interface.h" 10 #include "net/quic/congestion_control/receive_algorithm_interface.h"
10 #include "net/quic/congestion_control/send_algorithm_interface.h" 11 #include "net/quic/congestion_control/send_algorithm_interface.h"
11 #include "net/quic/crypto/null_encrypter.h" 12 #include "net/quic/crypto/null_encrypter.h"
12 #include "net/quic/crypto/quic_decrypter.h" 13 #include "net/quic/crypto/quic_decrypter.h"
13 #include "net/quic/crypto/quic_encrypter.h" 14 #include "net/quic/crypto/quic_encrypter.h"
14 #include "net/quic/crypto/quic_random.h" 15 #include "net/quic/crypto/quic_random.h"
15 #include "net/quic/test_tools/mock_clock.h" 16 #include "net/quic/test_tools/mock_clock.h"
16 #include "net/quic/test_tools/mock_random.h" 17 #include "net/quic/test_tools/mock_random.h"
(...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after
65 66
66 MOCK_METHOD4(RecordIncomingPacket, 67 MOCK_METHOD4(RecordIncomingPacket,
67 void(QuicByteCount, QuicPacketSequenceNumber, QuicTime, bool)); 68 void(QuicByteCount, QuicPacketSequenceNumber, QuicTime, bool));
68 69
69 private: 70 private:
70 QuicCongestionFeedbackFrame* feedback_; 71 QuicCongestionFeedbackFrame* feedback_;
71 72
72 DISALLOW_COPY_AND_ASSIGN(TestReceiveAlgorithm); 73 DISALLOW_COPY_AND_ASSIGN(TestReceiveAlgorithm);
73 }; 74 };
74 75
76 // TaggingEncrypter appends 16 bytes of |tag| to the end of each message.
77 class TaggingEncrypter : public QuicEncrypter {
78 public:
79 explicit TaggingEncrypter(uint8 tag)
80 : tag_(tag) {
81 }
82
83 virtual ~TaggingEncrypter() {}
84
85 // QuicEncrypter interface.
86 virtual bool SetKey(StringPiece key) { return true; }
87 virtual bool SetNoncePrefix(StringPiece nonce_prefix) { return true; }
88
89 virtual bool Encrypt(StringPiece nonce,
90 StringPiece associated_data,
91 StringPiece plaintext,
92 unsigned char* output) {
93 memcpy(output, plaintext.data(), plaintext.size());
94 output += plaintext.size();
95 memset(output, tag_, kTagSize);
96 return true;
97 }
98
99 virtual QuicData* EncryptPacket(QuicPacketSequenceNumber sequence_number,
100 StringPiece associated_data,
101 StringPiece plaintext) {
102 const size_t len = plaintext.size() + kTagSize;
103 uint8* buffer = new uint8[len];
104 Encrypt(StringPiece(), associated_data, plaintext, buffer);
105 return new QuicData(reinterpret_cast<char*>(buffer), len, true);
106 }
107
108 virtual size_t GetKeySize() const { return 0; }
109 virtual size_t GetNoncePrefixSize() const { return 0; }
110
111 virtual size_t GetMaxPlaintextSize(size_t ciphertext_size) const {
112 return ciphertext_size - kTagSize;
113 }
114
115 virtual size_t GetCiphertextSize(size_t plaintext_size) const {
116 return plaintext_size + kTagSize;
117 }
118
119 virtual StringPiece GetKey() const {
120 return StringPiece();
121 }
122
123 virtual StringPiece GetNoncePrefix() const {
124 return StringPiece();
125 }
126
127 private:
128 enum {
129 kTagSize = 16,
130 };
131
132 const uint8 tag_;
133 };
134
135 // TaggingDecrypter ensures that the final 16 bytes of the message all have the
136 // same value and then removes them.
137 class TaggingDecrypter : public QuicDecrypter {
138 public:
139 virtual ~TaggingDecrypter() {}
140
141 // QuicDecrypter interface
142 virtual bool SetKey(StringPiece key) { return true; }
143 virtual bool SetNoncePrefix(StringPiece nonce_prefix) { return true; }
144
145 virtual bool Decrypt(StringPiece nonce,
146 StringPiece associated_data,
147 StringPiece ciphertext,
148 unsigned char* output,
149 size_t* output_length) {
150 if (ciphertext.size() < kTagSize) {
151 return false;
152 }
153 if (!CheckTag(ciphertext)) {
154 return false;
155 }
156 *output_length = ciphertext.size() - kTagSize;
157 memcpy(output, ciphertext.data(), *output_length);
158 return true;
159 }
160
161 virtual QuicData* DecryptPacket(QuicPacketSequenceNumber sequence_number,
162 StringPiece associated_data,
163 StringPiece ciphertext) {
164 if (ciphertext.size() < kTagSize) {
165 return NULL;
166 }
167 if (!CheckTag(ciphertext)) {
168 return NULL;
169 }
170 const size_t len = ciphertext.size() - kTagSize;
171 uint8* buf = new uint8[len];
172 memcpy(buf, ciphertext.data(), len);
173 return new QuicData(reinterpret_cast<char*>(buf), len,
174 true /* owns buffer */);
175 }
176
177 virtual StringPiece GetKey() const { return StringPiece(); }
178 virtual StringPiece GetNoncePrefix() const { return StringPiece(); }
179
180 private:
181 enum {
182 kTagSize = 16,
183 };
184
185 bool CheckTag(StringPiece ciphertext) {
186 uint8 tag = ciphertext.data()[ciphertext.size()-1];
187 for (size_t i = ciphertext.size() - kTagSize; i < ciphertext.size(); i++) {
188 if (ciphertext.data()[i] != tag) {
189 return false;
190 }
191 }
192
193 return true;
194 }
195 };
196
75 class TestConnectionHelper : public QuicConnectionHelperInterface { 197 class TestConnectionHelper : public QuicConnectionHelperInterface {
76 public: 198 public:
77 TestConnectionHelper(MockClock* clock, MockRandom* random_generator) 199 TestConnectionHelper(MockClock* clock, MockRandom* random_generator)
78 : clock_(clock), 200 : clock_(clock),
79 random_generator_(random_generator), 201 random_generator_(random_generator),
80 retransmission_alarm_(QuicTime::Zero()), 202 retransmission_alarm_(QuicTime::Zero()),
81 send_alarm_(QuicTime::Zero().Subtract( 203 send_alarm_(QuicTime::Zero().Subtract(
82 QuicTime::Delta::FromMilliseconds(1))), 204 QuicTime::Delta::FromMilliseconds(1))),
83 timeout_alarm_(QuicTime::Zero()), 205 timeout_alarm_(QuicTime::Zero()),
84 blocked_(false), 206 blocked_(false),
85 is_server_(true) { 207 is_server_(true),
208 use_tagging_decrypter_(false) {
86 } 209 }
87 210
88 // QuicConnectionHelperInterface 211 // QuicConnectionHelperInterface
89 virtual void SetConnection(QuicConnection* connection) OVERRIDE {} 212 virtual void SetConnection(QuicConnection* connection) OVERRIDE {}
90 213
91 virtual const QuicClock* GetClock() const OVERRIDE { 214 virtual const QuicClock* GetClock() const OVERRIDE {
92 return clock_; 215 return clock_;
93 } 216 }
94 217
95 virtual QuicRandom* GetRandomGenerator() OVERRIDE { 218 virtual QuicRandom* GetRandomGenerator() OVERRIDE {
96 return random_generator_; 219 return random_generator_;
97 } 220 }
98 221
99 virtual int WritePacketToWire(const QuicEncryptedPacket& packet, 222 virtual int WritePacketToWire(const QuicEncryptedPacket& packet,
100 int* error) OVERRIDE { 223 int* error) OVERRIDE {
101 QuicFramer framer(kQuicVersion1, 224 if (packet.length() >= sizeof(final_bytes_of_last_packet_)) {
102 QuicDecrypter::Create(kNULL), 225 memcpy(&final_bytes_of_last_packet_, packet.data() + packet.length() - 4,
103 QuicEncrypter::Create(kNULL), 226 sizeof(final_bytes_of_last_packet_));
104 QuicTime::Zero(), 227 }
105 is_server_); 228
229 QuicFramer framer(kQuicVersion1, QuicTime::Zero(), is_server_);
230 if (use_tagging_decrypter_) {
231 framer.SetDecrypter(new TaggingDecrypter);
232 }
106 FramerVisitorCapturingFrames visitor; 233 FramerVisitorCapturingFrames visitor;
107 framer.set_visitor(&visitor); 234 framer.set_visitor(&visitor);
108 EXPECT_TRUE(framer.ProcessPacket(packet)); 235 EXPECT_TRUE(framer.ProcessPacket(packet));
109 header_ = *visitor.header(); 236 header_ = *visitor.header();
110 frame_count_ = visitor.frame_count(); 237 frame_count_ = visitor.frame_count();
111 if (visitor.ack()) { 238 if (visitor.ack()) {
112 ack_.reset(new QuicAckFrame(*visitor.ack())); 239 ack_.reset(new QuicAckFrame(*visitor.ack()));
113 } 240 }
114 if (visitor.feedback()) { 241 if (visitor.feedback()) {
115 feedback_.reset(new QuicCongestionFeedbackFrame(*visitor.feedback())); 242 feedback_.reset(new QuicCongestionFeedbackFrame(*visitor.feedback()));
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after
185 } 312 }
186 313
187 QuicVersionNegotiationPacket* version_negotiation_packet() { 314 QuicVersionNegotiationPacket* version_negotiation_packet() {
188 return version_negotiation_packet_.get(); 315 return version_negotiation_packet_.get();
189 } 316 }
190 317
191 void set_blocked(bool blocked) { blocked_ = blocked; } 318 void set_blocked(bool blocked) { blocked_ = blocked; }
192 319
193 void set_is_server(bool is_server) { is_server_ = is_server; } 320 void set_is_server(bool is_server) { is_server_ = is_server; }
194 321
322 // final_bytes_of_last_packet_ returns the last four bytes of the previous
323 // packet as a little-endian, uint32. This is intended to be used with a
324 // TaggingEncrypter so that tests can determine which encrypter was used for
325 // a given packet.
326 uint32 final_bytes_of_last_packet() { return final_bytes_of_last_packet_; }
327
328 void use_tagging_decrypter() {
329 use_tagging_decrypter_ = true;
330 }
331
195 private: 332 private:
196 MockClock* clock_; 333 MockClock* clock_;
197 MockRandom* random_generator_; 334 MockRandom* random_generator_;
198 QuicTime retransmission_alarm_; 335 QuicTime retransmission_alarm_;
199 QuicTime send_alarm_; 336 QuicTime send_alarm_;
200 QuicTime timeout_alarm_; 337 QuicTime timeout_alarm_;
201 QuicPacketHeader header_; 338 QuicPacketHeader header_;
202 size_t frame_count_; 339 size_t frame_count_;
203 scoped_ptr<QuicAckFrame> ack_; 340 scoped_ptr<QuicAckFrame> ack_;
204 scoped_ptr<QuicCongestionFeedbackFrame> feedback_; 341 scoped_ptr<QuicCongestionFeedbackFrame> feedback_;
205 vector<QuicStreamFrame> stream_frames_; 342 vector<QuicStreamFrame> stream_frames_;
206 scoped_ptr<QuicVersionNegotiationPacket> version_negotiation_packet_; 343 scoped_ptr<QuicVersionNegotiationPacket> version_negotiation_packet_;
207 size_t last_packet_size_; 344 size_t last_packet_size_;
208 bool blocked_; 345 bool blocked_;
209 bool is_server_; 346 bool is_server_;
347 uint32 final_bytes_of_last_packet_;
348 bool use_tagging_decrypter_;
210 349
211 DISALLOW_COPY_AND_ASSIGN(TestConnectionHelper); 350 DISALLOW_COPY_AND_ASSIGN(TestConnectionHelper);
212 }; 351 };
213 352
214 class TestConnection : public QuicConnection { 353 class TestConnection : public QuicConnection {
215 public: 354 public:
216 TestConnection(QuicGuid guid, 355 TestConnection(QuicGuid guid,
217 IPEndPoint address, 356 IPEndPoint address,
218 TestConnectionHelper* helper, 357 TestConnectionHelper* helper,
219 bool is_server) 358 bool is_server)
(...skipping 39 matching lines...) Expand 10 before | Expand all | Expand 10 after
259 private: 398 private:
260 TestConnectionHelper* helper_; 399 TestConnectionHelper* helper_;
261 400
262 DISALLOW_COPY_AND_ASSIGN(TestConnection); 401 DISALLOW_COPY_AND_ASSIGN(TestConnection);
263 }; 402 };
264 403
265 class QuicConnectionTest : public ::testing::Test { 404 class QuicConnectionTest : public ::testing::Test {
266 protected: 405 protected:
267 QuicConnectionTest() 406 QuicConnectionTest()
268 : guid_(42), 407 : guid_(42),
269 framer_(kQuicVersion1, 408 framer_(kQuicVersion1, QuicTime::Zero(), false),
270 QuicDecrypter::Create(kNULL),
271 QuicEncrypter::Create(kNULL),
272 QuicTime::Zero(),
273 false),
274 creator_(guid_, &framer_, QuicRandom::GetInstance(), false), 409 creator_(guid_, &framer_, QuicRandom::GetInstance(), false),
275 send_algorithm_(new StrictMock<MockSendAlgorithm>), 410 send_algorithm_(new StrictMock<MockSendAlgorithm>),
276 helper_(new TestConnectionHelper(&clock_, &random_generator_)), 411 helper_(new TestConnectionHelper(&clock_, &random_generator_)),
277 connection_(guid_, IPEndPoint(), helper_, false), 412 connection_(guid_, IPEndPoint(), helper_, false),
278 frame1_(1, false, 0, data1), 413 frame1_(1, false, 0, data1),
279 frame2_(1, false, 3, data2), 414 frame2_(1, false, 3, data2),
280 accept_packet_(true) { 415 accept_packet_(true) {
281 connection_.set_visitor(&visitor_); 416 connection_.set_visitor(&visitor_);
282 connection_.SetSendAlgorithm(send_algorithm_); 417 connection_.SetSendAlgorithm(send_algorithm_);
283 // Simplify tests by not sending feedback unless specifically configured. 418 // Simplify tests by not sending feedback unless specifically configured.
(...skipping 18 matching lines...) Expand all
302 } 437 }
303 438
304 QuicPacketHeader* last_header() { 439 QuicPacketHeader* last_header() {
305 return helper_->header(); 440 return helper_->header();
306 } 441 }
307 442
308 size_t last_sent_packet_size() { 443 size_t last_sent_packet_size() {
309 return helper_->last_packet_size(); 444 return helper_->last_packet_size();
310 } 445 }
311 446
447 uint32 final_bytes_of_last_packet() {
448 return helper_->final_bytes_of_last_packet();
449 }
450
451 void use_tagging_decrypter() {
452 helper_->use_tagging_decrypter();
453 }
454
312 void ProcessPacket(QuicPacketSequenceNumber number) { 455 void ProcessPacket(QuicPacketSequenceNumber number) {
313 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)) 456 EXPECT_CALL(visitor_, OnPacket(_, _, _, _))
314 .WillOnce(Return(accept_packet_)); 457 .WillOnce(Return(accept_packet_));
315 ProcessDataPacket(number, 0, !kEntropyFlag); 458 ProcessDataPacket(number, 0, !kEntropyFlag);
316 } 459 }
317 460
318 QuicPacketEntropyHash ProcessFramePacket(QuicFrame frame) { 461 QuicPacketEntropyHash ProcessFramePacket(QuicFrame frame) {
319 QuicFrames frames; 462 QuicFrames frames;
320 frames.push_back(QuicFrame(frame)); 463 frames.push_back(QuicFrame(frame));
321 QuicPacketCreatorPeer::SetSendVersionInPacket(&creator_, 464 QuicPacketCreatorPeer::SetSendVersionInPacket(&creator_,
322 connection_.is_server()); 465 connection_.is_server());
323 SerializedPacket serialized_packet = creator_.SerializeAllFrames(frames); 466 SerializedPacket serialized_packet = creator_.SerializeAllFrames(frames);
324 scoped_ptr<QuicPacket> packet(serialized_packet.packet); 467 scoped_ptr<QuicPacket> packet(serialized_packet.packet);
325 scoped_ptr<QuicEncryptedPacket> encrypted( 468 scoped_ptr<QuicEncryptedPacket> encrypted(
326 framer_.EncryptPacket(serialized_packet.sequence_number, *packet)); 469 framer_.EncryptPacket(ENCRYPTION_NONE,
470 serialized_packet.sequence_number, *packet));
327 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); 471 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
328 return serialized_packet.entropy_hash; 472 return serialized_packet.entropy_hash;
329 } 473 }
330 474
331 size_t ProcessFecProtectedPacket(QuicPacketSequenceNumber number, 475 size_t ProcessFecProtectedPacket(QuicPacketSequenceNumber number,
332 bool expect_revival) { 476 bool expect_revival) {
333 if (expect_revival) { 477 if (expect_revival) {
334 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)).Times(2).WillRepeatedly( 478 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)).Times(2).WillRepeatedly(
335 Return(accept_packet_)); 479 Return(accept_packet_));
336 } else { 480 } else {
337 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)).WillOnce( 481 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)).WillOnce(
338 Return(accept_packet_)); 482 Return(accept_packet_));
339 } 483 }
340 return ProcessDataPacket(number, 1, !kEntropyFlag); 484 return ProcessDataPacket(number, 1, !kEntropyFlag);
341 } 485 }
342 486
343 size_t ProcessDataPacket(QuicPacketSequenceNumber number, 487 size_t ProcessDataPacket(QuicPacketSequenceNumber number,
344 QuicFecGroupNumber fec_group, 488 QuicFecGroupNumber fec_group,
345 bool entropy_flag) { 489 bool entropy_flag) {
346 scoped_ptr<QuicPacket> packet(ConstructDataPacket(number, fec_group, 490 scoped_ptr<QuicPacket> packet(ConstructDataPacket(number, fec_group,
347 entropy_flag)); 491 entropy_flag));
348 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(number, 492 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
349 *packet)); 493 ENCRYPTION_NONE, number, *packet));
350 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); 494 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
351 return encrypted->length(); 495 return encrypted->length();
352 } 496 }
353 497
354 void ProcessClosePacket(QuicPacketSequenceNumber number, 498 void ProcessClosePacket(QuicPacketSequenceNumber number,
355 QuicFecGroupNumber fec_group) { 499 QuicFecGroupNumber fec_group) {
356 scoped_ptr<QuicPacket> packet(ConstructClosePacket(number, fec_group)); 500 scoped_ptr<QuicPacket> packet(ConstructClosePacket(number, fec_group));
357 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(number, 501 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(
358 *packet)); 502 ENCRYPTION_NONE, number, *packet));
359 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); 503 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
360 } 504 }
361 505
362 size_t ProcessFecProtectedPacket(QuicPacketSequenceNumber number, 506 size_t ProcessFecProtectedPacket(QuicPacketSequenceNumber number,
363 bool expect_revival, bool entropy_flag) { 507 bool expect_revival, bool entropy_flag) {
364 if (expect_revival) { 508 if (expect_revival) {
365 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)).WillOnce(DoAll( 509 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)).WillOnce(DoAll(
366 SaveArg<2>(&revived_header_), Return(accept_packet_))); 510 SaveArg<2>(&revived_header_), Return(accept_packet_)));
367 } 511 }
368 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)).WillOnce(Return(accept_packet_)) 512 EXPECT_CALL(visitor_, OnPacket(_, _, _, _)).WillOnce(Return(accept_packet_))
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after
402 for (size_t i = GetStartOfFecProtectedData( 546 for (size_t i = GetStartOfFecProtectedData(
403 header_.public_header.version_flag); 547 header_.public_header.version_flag);
404 i < data_packet->length(); ++i) { 548 i < data_packet->length(); ++i) {
405 data_packet->mutable_data()[i] ^= data_packet->data()[i]; 549 data_packet->mutable_data()[i] ^= data_packet->data()[i];
406 } 550 }
407 } 551 }
408 fec_data.redundancy = data_packet->FecProtectedData(); 552 fec_data.redundancy = data_packet->FecProtectedData();
409 scoped_ptr<QuicPacket> fec_packet( 553 scoped_ptr<QuicPacket> fec_packet(
410 framer_.ConstructFecPacket(header_, fec_data).packet); 554 framer_.ConstructFecPacket(header_, fec_data).packet);
411 scoped_ptr<QuicEncryptedPacket> encrypted( 555 scoped_ptr<QuicEncryptedPacket> encrypted(
412 framer_.EncryptPacket(number, *fec_packet)); 556 framer_.EncryptPacket(ENCRYPTION_NONE, number, *fec_packet));
413 557
414 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); 558 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
415 return encrypted->length(); 559 return encrypted->length();
416 } 560 }
417 561
418 QuicByteCount SendStreamDataToPeer(QuicStreamId id, StringPiece data, 562 QuicByteCount SendStreamDataToPeer(QuicStreamId id, StringPiece data,
419 QuicStreamOffset offset, bool fin, 563 QuicStreamOffset offset, bool fin,
420 QuicPacketSequenceNumber* last_packet) { 564 QuicPacketSequenceNumber* last_packet) {
421 QuicByteCount packet_size; 565 QuicByteCount packet_size;
422 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)).WillOnce( 566 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)).WillOnce(
(...skipping 720 matching lines...) Expand 10 before | Expand all | Expand 10 after
1143 EXPECT_EQ(default_retransmission_time, helper_->retransmission_alarm()); 1287 EXPECT_EQ(default_retransmission_time, helper_->retransmission_alarm());
1144 // Simulate the retransimission alarm firing 1288 // Simulate the retransimission alarm firing
1145 clock_.AdvanceTime(kDefaultRetransmissionTime); 1289 clock_.AdvanceTime(kDefaultRetransmissionTime);
1146 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)); 1290 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _));
1147 EXPECT_CALL(*send_algorithm_, AbandoningPacket(1, _)).Times(1); 1291 EXPECT_CALL(*send_algorithm_, AbandoningPacket(1, _)).Times(1);
1148 connection_.RetransmitPacket(1); 1292 connection_.RetransmitPacket(1);
1149 EXPECT_EQ(2u, last_header()->packet_sequence_number); 1293 EXPECT_EQ(2u, last_header()->packet_sequence_number);
1150 EXPECT_EQ(2u, outgoing_ack()->sent_info.least_unacked); 1294 EXPECT_EQ(2u, outgoing_ack()->sent_info.least_unacked);
1151 } 1295 }
1152 1296
1297 TEST_F(QuicConnectionTest, RetransmitWithSameEncryptionLevel) {
1298 const QuicTime::Delta kDefaultRetransmissionTime =
1299 QuicTime::Delta::FromMilliseconds(500);
1300
1301 QuicTime default_retransmission_time = clock_.ApproximateNow().Add(
1302 kDefaultRetransmissionTime);
1303 use_tagging_decrypter();
1304
1305 // A TaggingEncrypter puts 16 copies of the given byte (0x01 here) at the end
1306 // of the packet. We can test this to check which encrypter was used.
1307 connection_.SetEncrypter(ENCRYPTION_NONE, new TaggingEncrypter(0x01));
1308 SendStreamDataToPeer(1, "foo", 0, !kFin, NULL);
1309 EXPECT_EQ(0x01010101u, final_bytes_of_last_packet());
1310
1311 connection_.SetEncrypter(ENCRYPTION_INITIAL, new TaggingEncrypter(0x02));
1312 connection_.SetDefaultEncryptionLevel(ENCRYPTION_INITIAL);
1313 SendStreamDataToPeer(1, "foo", 0, !kFin, NULL);
1314 EXPECT_EQ(0x02020202u, final_bytes_of_last_packet());
1315
1316 EXPECT_EQ(default_retransmission_time, helper_->retransmission_alarm());
1317 // Simulate the retransimission alarm firing
1318 clock_.AdvanceTime(kDefaultRetransmissionTime);
1319 EXPECT_CALL(*send_algorithm_, AbandoningPacket(_, _)).Times(2);
1320
1321 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _));
1322 connection_.RetransmitPacket(1);
1323 // Packet should have been sent with ENCRYPTION_NONE.
1324 EXPECT_EQ(0x01010101u, final_bytes_of_last_packet());
1325
1326 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _));
1327 connection_.RetransmitPacket(2);
1328 // Packet should have been sent with ENCRYPTION_INITIAL.
1329 EXPECT_EQ(0x02020202u, final_bytes_of_last_packet());
1330 }
1331
1153 TEST_F(QuicConnectionTest, TestRetransmitOrder) { 1332 TEST_F(QuicConnectionTest, TestRetransmitOrder) {
1154 QuicByteCount first_packet_size; 1333 QuicByteCount first_packet_size;
1155 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)).WillOnce( 1334 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)).WillOnce(
1156 SaveArg<2>(&first_packet_size)); 1335 SaveArg<2>(&first_packet_size));
1157 EXPECT_CALL(*send_algorithm_, AbandoningPacket(_, _)).Times(2); 1336 EXPECT_CALL(*send_algorithm_, AbandoningPacket(_, _)).Times(2);
1158 1337
1159 connection_.SendStreamData(1, "first_packet", 0, !kFin); 1338 connection_.SendStreamData(1, "first_packet", 0, !kFin);
1160 QuicByteCount second_packet_size; 1339 QuicByteCount second_packet_size;
1161 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)).WillOnce( 1340 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)).WillOnce(
1162 SaveArg<2>(&second_packet_size)); 1341 SaveArg<2>(&second_packet_size));
(...skipping 185 matching lines...) Expand 10 before | Expand all | Expand 10 after
1348 1527
1349 // TODO(ianswett): Add scheduler tests when should_retransmit is false. 1528 // TODO(ianswett): Add scheduler tests when should_retransmit is false.
1350 TEST_F(QuicConnectionTest, SendScheduler) { 1529 TEST_F(QuicConnectionTest, SendScheduler) {
1351 // Test that if we send a packet without delay, it is not queued. 1530 // Test that if we send a packet without delay, it is not queued.
1352 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1531 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1353 EXPECT_CALL(*send_algorithm_, 1532 EXPECT_CALL(*send_algorithm_,
1354 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1533 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1355 testing::Return(QuicTime::Delta::Zero())); 1534 testing::Return(QuicTime::Delta::Zero()));
1356 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)); 1535 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _));
1357 connection_.SendOrQueuePacket( 1536 connection_.SendOrQueuePacket(
1358 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1537 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1359 EXPECT_EQ(0u, connection_.NumQueuedPackets()); 1538 EXPECT_EQ(0u, connection_.NumQueuedPackets());
1360 } 1539 }
1361 1540
1362 TEST_F(QuicConnectionTest, SendSchedulerDelay) { 1541 TEST_F(QuicConnectionTest, SendSchedulerDelay) {
1363 // Test that if we send a packet with a delay, it ends up queued. 1542 // Test that if we send a packet with a delay, it ends up queued.
1364 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1543 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1365 EXPECT_CALL(*send_algorithm_, 1544 EXPECT_CALL(*send_algorithm_,
1366 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1545 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1367 testing::Return(QuicTime::Delta::FromMicroseconds(1))); 1546 testing::Return(QuicTime::Delta::FromMicroseconds(1)));
1368 EXPECT_CALL(*send_algorithm_, SentPacket(_, 1, _, _)).Times(0); 1547 EXPECT_CALL(*send_algorithm_, SentPacket(_, 1, _, _)).Times(0);
1369 connection_.SendOrQueuePacket( 1548 connection_.SendOrQueuePacket(
1370 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1549 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1371 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1550 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1372 } 1551 }
1373 1552
1374 TEST_F(QuicConnectionTest, SendSchedulerForce) { 1553 TEST_F(QuicConnectionTest, SendSchedulerForce) {
1375 // Test that if we force send a packet, it is not queued. 1554 // Test that if we force send a packet, it is not queued.
1376 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1555 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1377 EXPECT_CALL(*send_algorithm_, 1556 EXPECT_CALL(*send_algorithm_,
1378 TimeUntilSend(_, IS_RETRANSMISSION, _)).Times(0); 1557 TimeUntilSend(_, IS_RETRANSMISSION, _)).Times(0);
1379 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)); 1558 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _));
1380 connection_.SendOrQueuePacket( 1559 connection_.SendOrQueuePacket(
1381 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1560 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1382 // XXX: fixme. was: connection_.SendOrQueuePacket(1, packet, kForce); 1561 // XXX: fixme. was: connection_.SendOrQueuePacket(1, packet, kForce);
1383 EXPECT_EQ(0u, connection_.NumQueuedPackets()); 1562 EXPECT_EQ(0u, connection_.NumQueuedPackets());
1384 } 1563 }
1385 1564
1386 TEST_F(QuicConnectionTest, SendSchedulerEAGAIN) { 1565 TEST_F(QuicConnectionTest, SendSchedulerEAGAIN) {
1387 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1566 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1388 helper_->set_blocked(true); 1567 helper_->set_blocked(true);
1389 EXPECT_CALL(*send_algorithm_, 1568 EXPECT_CALL(*send_algorithm_,
1390 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1569 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1391 testing::Return(QuicTime::Delta::Zero())); 1570 testing::Return(QuicTime::Delta::Zero()));
1392 EXPECT_CALL(*send_algorithm_, SentPacket(_, 1, _, _)).Times(0); 1571 EXPECT_CALL(*send_algorithm_, SentPacket(_, 1, _, _)).Times(0);
1393 connection_.SendOrQueuePacket( 1572 connection_.SendOrQueuePacket(
1394 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1573 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1395 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1574 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1396 } 1575 }
1397 1576
1398 TEST_F(QuicConnectionTest, SendSchedulerDelayThenSend) { 1577 TEST_F(QuicConnectionTest, SendSchedulerDelayThenSend) {
1399 // Test that if we send a packet with a delay, it ends up queued. 1578 // Test that if we send a packet with a delay, it ends up queued.
1400 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1579 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1401 EXPECT_CALL(*send_algorithm_, 1580 EXPECT_CALL(*send_algorithm_,
1402 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1581 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1403 testing::Return(QuicTime::Delta::FromMicroseconds(1))); 1582 testing::Return(QuicTime::Delta::FromMicroseconds(1)));
1404 connection_.SendOrQueuePacket( 1583 connection_.SendOrQueuePacket(
1405 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1584 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1406 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1585 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1407 1586
1408 // Advance the clock to fire the alarm, and configure the scheduler 1587 // Advance the clock to fire the alarm, and configure the scheduler
1409 // to permit the packet to be sent. 1588 // to permit the packet to be sent.
1410 EXPECT_CALL(*send_algorithm_, 1589 EXPECT_CALL(*send_algorithm_,
1411 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillRepeatedly( 1590 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillRepeatedly(
1412 testing::Return(QuicTime::Delta::Zero())); 1591 testing::Return(QuicTime::Delta::Zero()));
1413 clock_.AdvanceTime(QuicTime::Delta::FromMicroseconds(1)); 1592 clock_.AdvanceTime(QuicTime::Delta::FromMicroseconds(1));
1414 helper_->UnregisterSendAlarmIfRegistered(); 1593 helper_->UnregisterSendAlarmIfRegistered();
1415 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _)); 1594 EXPECT_CALL(*send_algorithm_, SentPacket(_, _, _, _));
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after
1450 connection_.OnCanWrite(); 1629 connection_.OnCanWrite();
1451 EXPECT_EQ(0u, connection_.NumQueuedPackets()); 1630 EXPECT_EQ(0u, connection_.NumQueuedPackets());
1452 } 1631 }
1453 1632
1454 TEST_F(QuicConnectionTest, SendSchedulerDelayAndQueue) { 1633 TEST_F(QuicConnectionTest, SendSchedulerDelayAndQueue) {
1455 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1634 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1456 EXPECT_CALL(*send_algorithm_, 1635 EXPECT_CALL(*send_algorithm_,
1457 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1636 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1458 testing::Return(QuicTime::Delta::FromMicroseconds(1))); 1637 testing::Return(QuicTime::Delta::FromMicroseconds(1)));
1459 connection_.SendOrQueuePacket( 1638 connection_.SendOrQueuePacket(
1460 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1639 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1461 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1640 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1462 1641
1463 // Attempt to send another packet and make sure that it gets queued. 1642 // Attempt to send another packet and make sure that it gets queued.
1464 packet = ConstructDataPacket(2, 0, !kEntropyFlag); 1643 packet = ConstructDataPacket(2, 0, !kEntropyFlag);
1465 connection_.SendOrQueuePacket( 1644 connection_.SendOrQueuePacket(
1466 2, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1645 ENCRYPTION_NONE, 2, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1467 EXPECT_EQ(2u, connection_.NumQueuedPackets()); 1646 EXPECT_EQ(2u, connection_.NumQueuedPackets());
1468 } 1647 }
1469 1648
1470 TEST_F(QuicConnectionTest, SendSchedulerDelayThenAckAndSend) { 1649 TEST_F(QuicConnectionTest, SendSchedulerDelayThenAckAndSend) {
1471 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1650 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1472 EXPECT_CALL(*send_algorithm_, 1651 EXPECT_CALL(*send_algorithm_,
1473 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1652 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1474 testing::Return(QuicTime::Delta::FromMicroseconds(10))); 1653 testing::Return(QuicTime::Delta::FromMicroseconds(10)));
1475 connection_.SendOrQueuePacket( 1654 connection_.SendOrQueuePacket(
1476 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1655 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1477 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1656 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1478 1657
1479 // Now send non-retransmitting information, that we're not going to 1658 // Now send non-retransmitting information, that we're not going to
1480 // retransmit 3. The far end should stop waiting for it. 1659 // retransmit 3. The far end should stop waiting for it.
1481 QuicAckFrame frame(0, QuicTime::Zero(), 1); 1660 QuicAckFrame frame(0, QuicTime::Zero(), 1);
1482 EXPECT_CALL(*send_algorithm_, 1661 EXPECT_CALL(*send_algorithm_,
1483 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillRepeatedly( 1662 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillRepeatedly(
1484 testing::Return(QuicTime::Delta::Zero())); 1663 testing::Return(QuicTime::Delta::Zero()));
1485 EXPECT_CALL(*send_algorithm_, 1664 EXPECT_CALL(*send_algorithm_,
1486 SentPacket(_, _, _, _)); 1665 SentPacket(_, _, _, _));
1487 EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(Return(true)); 1666 EXPECT_CALL(visitor_, OnCanWrite()).WillOnce(Return(true));
1488 ProcessAckPacket(&frame); 1667 ProcessAckPacket(&frame);
1489 1668
1490 EXPECT_EQ(0u, connection_.NumQueuedPackets()); 1669 EXPECT_EQ(0u, connection_.NumQueuedPackets());
1491 // Ensure alarm is not set 1670 // Ensure alarm is not set
1492 EXPECT_FALSE(helper_->IsSendAlarmSet()); 1671 EXPECT_FALSE(helper_->IsSendAlarmSet());
1493 } 1672 }
1494 1673
1495 TEST_F(QuicConnectionTest, SendSchedulerDelayThenAckAndHold) { 1674 TEST_F(QuicConnectionTest, SendSchedulerDelayThenAckAndHold) {
1496 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1675 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1497 EXPECT_CALL(*send_algorithm_, 1676 EXPECT_CALL(*send_algorithm_,
1498 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1677 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1499 testing::Return(QuicTime::Delta::FromMicroseconds(10))); 1678 testing::Return(QuicTime::Delta::FromMicroseconds(10)));
1500 connection_.SendOrQueuePacket( 1679 connection_.SendOrQueuePacket(
1501 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1680 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1502 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1681 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1503 1682
1504 // Now send non-retransmitting information, that we're not going to 1683 // Now send non-retransmitting information, that we're not going to
1505 // retransmit 3. The far end should stop waiting for it. 1684 // retransmit 3. The far end should stop waiting for it.
1506 QuicAckFrame frame(0, QuicTime::Zero(), 1); 1685 QuicAckFrame frame(0, QuicTime::Zero(), 1);
1507 EXPECT_CALL(*send_algorithm_, 1686 EXPECT_CALL(*send_algorithm_,
1508 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1687 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1509 testing::Return(QuicTime::Delta::FromMicroseconds(1))); 1688 testing::Return(QuicTime::Delta::FromMicroseconds(1)));
1510 ProcessAckPacket(&frame); 1689 ProcessAckPacket(&frame);
1511 1690
1512 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1691 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1513 } 1692 }
1514 1693
1515 TEST_F(QuicConnectionTest, SendSchedulerDelayThenOnCanWrite) { 1694 TEST_F(QuicConnectionTest, SendSchedulerDelayThenOnCanWrite) {
1516 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1695 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1517 EXPECT_CALL(*send_algorithm_, 1696 EXPECT_CALL(*send_algorithm_,
1518 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce( 1697 TimeUntilSend(_, NOT_RETRANSMISSION, _)).WillOnce(
1519 testing::Return(QuicTime::Delta::FromMicroseconds(10))); 1698 testing::Return(QuicTime::Delta::FromMicroseconds(10)));
1520 connection_.SendOrQueuePacket( 1699 connection_.SendOrQueuePacket(
1521 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1700 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1522 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1701 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1523 1702
1524 // OnCanWrite should not send the packet (because of the delay) 1703 // OnCanWrite should not send the packet (because of the delay)
1525 // but should still return true. 1704 // but should still return true.
1526 EXPECT_TRUE(connection_.OnCanWrite()); 1705 EXPECT_TRUE(connection_.OnCanWrite());
1527 EXPECT_EQ(1u, connection_.NumQueuedPackets()); 1706 EXPECT_EQ(1u, connection_.NumQueuedPackets());
1528 } 1707 }
1529 1708
1530 TEST_F(QuicConnectionTest, TestQueueLimitsOnSendStreamData) { 1709 TEST_F(QuicConnectionTest, TestQueueLimitsOnSendStreamData) {
1531 // Limit to one byte per packet. 1710 // Limit to one byte per packet.
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after
1563 } 1742 }
1564 1743
1565 TEST_F(QuicConnectionTest, SendWhenDisconnected) { 1744 TEST_F(QuicConnectionTest, SendWhenDisconnected) {
1566 EXPECT_TRUE(connection_.connected()); 1745 EXPECT_TRUE(connection_.connected());
1567 EXPECT_CALL(visitor_, ConnectionClose(QUIC_PEER_GOING_AWAY, false)); 1746 EXPECT_CALL(visitor_, ConnectionClose(QUIC_PEER_GOING_AWAY, false));
1568 connection_.CloseConnection(QUIC_PEER_GOING_AWAY, false); 1747 connection_.CloseConnection(QUIC_PEER_GOING_AWAY, false);
1569 EXPECT_FALSE(connection_.connected()); 1748 EXPECT_FALSE(connection_.connected());
1570 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag); 1749 QuicPacket* packet = ConstructDataPacket(1, 0, !kEntropyFlag);
1571 EXPECT_CALL(*send_algorithm_, SentPacket(_, 1, _, _)).Times(0); 1750 EXPECT_CALL(*send_algorithm_, SentPacket(_, 1, _, _)).Times(0);
1572 connection_.SendOrQueuePacket( 1751 connection_.SendOrQueuePacket(
1573 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA); 1752 ENCRYPTION_NONE, 1, packet, kTestEntropyHash, HAS_RETRANSMITTABLE_DATA);
1574 } 1753 }
1575 1754
1576 TEST_F(QuicConnectionTest, PublicReset) { 1755 TEST_F(QuicConnectionTest, PublicReset) {
1577 QuicPublicResetPacket header; 1756 QuicPublicResetPacket header;
1578 header.public_header.guid = guid_; 1757 header.public_header.guid = guid_;
1579 header.public_header.reset_flag = true; 1758 header.public_header.reset_flag = true;
1580 header.public_header.version_flag = false; 1759 header.public_header.version_flag = false;
1581 header.rejected_sequence_number = 10101; 1760 header.rejected_sequence_number = 10101;
1582 scoped_ptr<QuicEncryptedPacket> packet( 1761 scoped_ptr<QuicEncryptedPacket> packet(
1583 framer_.ConstructPublicResetPacket(header)); 1762 framer_.ConstructPublicResetPacket(header));
(...skipping 98 matching lines...) Expand 10 before | Expand all | Expand 10 after
1682 QuicPacketSequenceNumber max_sequence_number = 51; 1861 QuicPacketSequenceNumber max_sequence_number = 51;
1683 for (QuicPacketSequenceNumber i = 1; i <= max_sequence_number; ++i) { 1862 for (QuicPacketSequenceNumber i = 1; i <= max_sequence_number; ++i) {
1684 bool is_missing = i % 10 != 0; 1863 bool is_missing = i % 10 != 0;
1685 bool entropy_flag = (i & (i - 1)) != 0; 1864 bool entropy_flag = (i & (i - 1)) != 0;
1686 QuicPacketEntropyHash packet_entropy_hash = 0; 1865 QuicPacketEntropyHash packet_entropy_hash = 0;
1687 if (entropy_flag) { 1866 if (entropy_flag) {
1688 packet_entropy_hash = 1 << (i % 8); 1867 packet_entropy_hash = 1 << (i % 8);
1689 } 1868 }
1690 QuicPacket* packet = ConstructDataPacket(i, 0, entropy_flag); 1869 QuicPacket* packet = ConstructDataPacket(i, 0, entropy_flag);
1691 connection_.SendOrQueuePacket( 1870 connection_.SendOrQueuePacket(
1692 i, packet, packet_entropy_hash, HAS_RETRANSMITTABLE_DATA); 1871 ENCRYPTION_NONE, i, packet, packet_entropy_hash,
1872 HAS_RETRANSMITTABLE_DATA);
1693 1873
1694 if (is_missing) { 1874 if (is_missing) {
1695 missing_packets.insert(i); 1875 missing_packets.insert(i);
1696 continue; 1876 continue;
1697 } 1877 }
1698 1878
1699 entropy_hash ^= packet_entropy_hash; 1879 entropy_hash ^= packet_entropy_hash;
1700 } 1880 }
1701 EXPECT_TRUE(QuicConnectionPeer::IsValidEntropy( 1881 EXPECT_TRUE(QuicConnectionPeer::IsValidEntropy(
1702 &connection_, max_sequence_number, missing_packets, entropy_hash)) 1882 &connection_, max_sequence_number, missing_packets, entropy_hash))
(...skipping 13 matching lines...) Expand all
1716 header.fec_flag = false; 1896 header.fec_flag = false;
1717 header.fec_entropy_flag = false; 1897 header.fec_entropy_flag = false;
1718 header.packet_sequence_number = 12; 1898 header.packet_sequence_number = 12;
1719 header.fec_group = 0; 1899 header.fec_group = 0;
1720 1900
1721 QuicFrames frames; 1901 QuicFrames frames;
1722 QuicFrame frame(&frame1_); 1902 QuicFrame frame(&frame1_);
1723 frames.push_back(frame); 1903 frames.push_back(frame);
1724 scoped_ptr<QuicPacket> packet( 1904 scoped_ptr<QuicPacket> packet(
1725 framer_.ConstructFrameDataPacket(header, frames).packet); 1905 framer_.ConstructFrameDataPacket(header, frames).packet);
1726 scoped_ptr<QuicEncryptedPacket> encrypted(framer_.EncryptPacket(12, *packet)); 1906 scoped_ptr<QuicEncryptedPacket> encrypted(
1907 framer_.EncryptPacket(ENCRYPTION_NONE, 12, *packet));
1727 1908
1728 QuicFramerPeer::SetVersion(&framer_, kQuicVersion1); 1909 QuicFramerPeer::SetVersion(&framer_, kQuicVersion1);
1729 connection_.set_is_server(true); 1910 connection_.set_is_server(true);
1730 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted); 1911 connection_.ProcessUdpPacket(IPEndPoint(), IPEndPoint(), *encrypted);
1731 EXPECT_TRUE(helper_->version_negotiation_packet() != NULL); 1912 EXPECT_TRUE(helper_->version_negotiation_packet() != NULL);
1732 EXPECT_EQ(1u, 1913 EXPECT_EQ(1u,
1733 helper_->version_negotiation_packet()->versions.size()); 1914 helper_->version_negotiation_packet()->versions.size());
1734 EXPECT_EQ(kQuicVersion1, 1915 EXPECT_EQ(kQuicVersion1,
1735 helper_->version_negotiation_packet()->versions[0]); 1916 helper_->version_negotiation_packet()->versions[0]);
1736 } 1917 }
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after
1804 EXPECT_EQ(received_bytes, stats.bytes_received); 1985 EXPECT_EQ(received_bytes, stats.bytes_received);
1805 EXPECT_EQ(4u, stats.packets_received); 1986 EXPECT_EQ(4u, stats.packets_received);
1806 1987
1807 EXPECT_EQ(1u, stats.packets_revived); 1988 EXPECT_EQ(1u, stats.packets_revived);
1808 EXPECT_EQ(1u, stats.packets_dropped); 1989 EXPECT_EQ(1u, stats.packets_dropped);
1809 } 1990 }
1810 1991
1811 } // namespace 1992 } // namespace
1812 } // namespace test 1993 } // namespace test
1813 } // namespace net 1994 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698