summaryrefslogtreecommitdiffstats
path: root/net/quic
diff options
context:
space:
mode:
authorrtenneti <rtenneti@chromium.org>2015-08-26 22:34:26 -0700
committerCommit bot <commit-bot@chromium.org>2015-08-27 05:34:59 +0000
commit48f371c687a11f0098c86ca521ad7a0c53800293 (patch)
tree9dee3ebd93faab0a6517491f29a8f28f78d33e00 /net/quic
parent87fada6fc517218158f69e41b17d16bd6b2fa0da (diff)
downloadchromium_src-48f371c687a11f0098c86ca521ad7a0c53800293.zip
chromium_src-48f371c687a11f0098c86ca521ad7a0c53800293.tar.gz
chromium_src-48f371c687a11f0098c86ca521ad7a0c53800293.tar.bz2
Landing Recent QUIC changes until 8/19/2015 17:00 UTC.
relnote: Compute parity faster by only XORing bytes which are needed and doing that word at a time. No behavior change. FIXED=22811863 Merge internal change: 101033533 https://codereview.chromium.org/1320743002/ Added QuicConfig::SetInitialReceivedConnectionOptions to set initial received connection options and added unittests. The following is the internal merge note: Enable setting of connection options via relodable flag for testing Added a new flag for setting server-side connection options explicitly via command-line flag. Previously, the only way to turn an option on for the server was through a message sent from the client. For live testing, we sometimes want to be able to turn such options on the server, without having to introduce a special flag for enabling each option. The new flag takes a comma-separated list of options as its value. It parses the list and sets the tag for each value. If the flag is set on a live server, it will only have effect on newly created sessions, not existing ones. relnote: n/a. New options flag will only be used for testing. Merge internal change: 100966796 https://codereview.chromium.org/1302263003/ relnote: n/a (QUIC test only). Remove RunValidate method from crypto_server_test.cc. Not very helpful, only used in a couple of places. Merge internal change: 100955404 https://codereview.chromium.org/1301333003/ relnote: n/a (QUIC test only). Remove CryptoTestUtils::BuildMessage and InchoateClientHello (confusingly named as it was often called with tags not from an inchoate CHLO...). Changes due to "git cl format net" and added clang-format off/on to avoid reformatting. Merge internal change: 100952704 https://codereview.chromium.org/1311813003/ Working on other changes in this file, getting annoyed that clang formatting my CL was resulting in more changes than I'd expected. This CL runs clang-format against quic/crypto/crypto_server_test.cc (and protects some handshake message formatting) $ clang-format --style="{BasedOnStyle: Chromium, Standard: Cpp11}" ./quic/crypto/crypto_server_test.cc Merge internal change: 100955098 https://codereview.chromium.org/1311813003/ relnote: After a server silo receives a packet from a migrated client, a GO_AWAY frame is sent to the client. Protected behind FLAGS_send_goaway_after_client_migration. Merge internal change: 100947609 https://codereview.chromium.org/1319433006/ relnote: Deprecate FLAGS_increase_time_wait_list. Merge internal change: 100922172 https://codereview.chromium.org/1320713002/ relnote: Depreacate FLAGS_quic_limit_pacing_burst. Merge internal change: 100852361 https://codereview.chromium.org/1305313006/ relnote: Cleanup changes. No behavior changes expected. Change name of FakeTimeEpollServer::AdvanceByAndCallCallbacks to AdvanceByAndWaitForEventsAndExecuteCallbacks. Merge internal change: 100850550 https://codereview.chromium.org/1302233005/ R=rch@chromium.org Review URL: https://codereview.chromium.org/1315023003 Cr-Commit-Position: refs/heads/master@{#345803}
Diffstat (limited to 'net/quic')
-rw-r--r--net/quic/congestion_control/pacing_sender.cc12
-rw-r--r--net/quic/congestion_control/pacing_sender_test.cc19
-rw-r--r--net/quic/crypto/crypto_server_test.cc178
-rw-r--r--net/quic/quic_config.cc11
-rw-r--r--net/quic/quic_config.h7
-rw-r--r--net/quic/quic_config_test.cc17
-rw-r--r--net/quic/quic_connection.cc4
-rw-r--r--net/quic/quic_connection.h3
-rw-r--r--net/quic/quic_fec_group.cc40
-rw-r--r--net/quic/quic_fec_group.h4
-rw-r--r--net/quic/quic_fec_group_test.cc70
-rw-r--r--net/quic/quic_flags.cc13
-rw-r--r--net/quic/quic_flags.h3
-rw-r--r--net/quic/quic_sent_packet_manager_test.cc18
-rw-r--r--net/quic/quic_session.cc2
-rw-r--r--net/quic/quic_session.h1
-rw-r--r--net/quic/quic_session_test.cc6
-rw-r--r--net/quic/test_tools/crypto_test_utils.cc9
-rw-r--r--net/quic/test_tools/crypto_test_utils.h7
-rw-r--r--net/quic/test_tools/quic_test_utils.h1
20 files changed, 272 insertions, 153 deletions
diff --git a/net/quic/congestion_control/pacing_sender.cc b/net/quic/congestion_control/pacing_sender.cc
index c6f33ef..a8bd13f 100644
--- a/net/quic/congestion_control/pacing_sender.cc
+++ b/net/quic/congestion_control/pacing_sender.cc
@@ -4,8 +4,6 @@
#include "net/quic/congestion_control/pacing_sender.h"
-#include "net/quic/quic_flags.h"
-
using std::min;
namespace net {
@@ -68,13 +66,9 @@ bool PacingSender::OnPacketSent(
// Add more burst tokens anytime the connection is leaving quiescence, but
// limit it to the equivalent of a single bulk write, not exceeding the
// current CWND in packets.
- if (FLAGS_quic_limit_pacing_burst) {
- burst_tokens_ = min(
- initial_packet_burst_,
- static_cast<uint32>(sender_->GetCongestionWindow() / kDefaultTCPMSS));
- } else {
- burst_tokens_ = initial_packet_burst_;
- }
+ burst_tokens_ = min(
+ initial_packet_burst_,
+ static_cast<uint32>(sender_->GetCongestionWindow() / kDefaultTCPMSS));
}
if (burst_tokens_ > 0) {
--burst_tokens_;
diff --git a/net/quic/congestion_control/pacing_sender_test.cc b/net/quic/congestion_control/pacing_sender_test.cc
index 8412f34..b7e3755 100644
--- a/net/quic/congestion_control/pacing_sender_test.cc
+++ b/net/quic/congestion_control/pacing_sender_test.cc
@@ -6,7 +6,6 @@
#include "base/logging.h"
#include "base/memory/scoped_ptr.h"
-#include "net/quic/quic_flags.h"
#include "net/quic/quic_protocol.h"
#include "net/quic/test_tools/mock_clock.h"
#include "net/quic/test_tools/quic_test_utils.h"
@@ -200,10 +199,8 @@ TEST_F(PacingSenderTest, InitialBurst) {
InitPacingRate(10, QuicBandwidth::FromBytesAndTimeDelta(
kMaxPacketSize, QuicTime::Delta::FromMilliseconds(1)));
- if (FLAGS_quic_limit_pacing_burst) {
- EXPECT_CALL(*mock_sender_, GetCongestionWindow())
- .WillOnce(Return(10 * kDefaultTCPMSS));
- }
+ EXPECT_CALL(*mock_sender_, GetCongestionWindow())
+ .WillOnce(Return(10 * kDefaultTCPMSS));
// Update the RTT and verify that the first 10 packets aren't paced.
UpdateRtt();
@@ -240,10 +237,8 @@ TEST_F(PacingSenderTest, InitialBurstNoRttMeasurement) {
InitPacingRate(10, QuicBandwidth::FromBytesAndTimeDelta(
kMaxPacketSize, QuicTime::Delta::FromMilliseconds(1)));
- if (FLAGS_quic_limit_pacing_burst) {
- EXPECT_CALL(*mock_sender_, GetCongestionWindow())
- .WillOnce(Return(10 * kDefaultTCPMSS));
- }
+ EXPECT_CALL(*mock_sender_, GetCongestionWindow())
+ .WillOnce(Return(10 * kDefaultTCPMSS));
// Send 10 packets, and verify that they are not paced.
for (int i = 0 ; i < kInitialBurstPackets; ++i) {
CheckPacketIsSentImmediately();
@@ -281,10 +276,8 @@ TEST_F(PacingSenderTest, FastSending) {
QuicBandwidth::FromBytesAndTimeDelta(
2 * kMaxPacketSize, QuicTime::Delta::FromMilliseconds(1)));
- if (FLAGS_quic_limit_pacing_burst) {
- EXPECT_CALL(*mock_sender_, GetCongestionWindow())
- .WillOnce(Return(10 * kDefaultTCPMSS));
- }
+ EXPECT_CALL(*mock_sender_, GetCongestionWindow())
+ .WillOnce(Return(10 * kDefaultTCPMSS));
// Update the RTT and verify that the first 10 packets aren't paced.
UpdateRtt();
diff --git a/net/quic/crypto/crypto_server_test.cc b/net/quic/crypto/crypto_server_test.cc
index 46db166..c8c8cfe 100644
--- a/net/quic/crypto/crypto_server_test.cc
+++ b/net/quic/crypto/crypto_server_test.cc
@@ -107,8 +107,7 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
void SetUp() override {
scoped_ptr<CryptoHandshakeMessage> msg(
- config_.AddDefaultConfig(rand_, &clock_,
- config_options_));
+ config_.AddDefaultConfig(rand_, &clock_, config_options_));
StringPiece orbit;
CHECK(msg->GetStringPiece(kORBT, &orbit));
@@ -122,6 +121,7 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
nonce_hex_ = "#" + base::HexEncode(nonce_str.data(), nonce_str.size());
pub_hex_ = "#" + base::HexEncode(public_value, sizeof(public_value));
+ // clang-format off
CryptoHandshakeMessage client_hello = CryptoTestUtils::Message(
"CHLO",
"AEAD", "AESG",
@@ -131,13 +131,13 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
nullptr);
+ // clang-format on
ShouldSucceed(client_hello);
// The message should be rejected because the source-address token is
// missing.
CheckRejectTag();
const HandshakeFailureReason kRejectReasons[] = {
- SERVER_CONFIG_INCHOATE_HELLO_FAILURE
- };
+ SERVER_CONFIG_INCHOATE_HELLO_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
CheckForServerDesignatedConnectionId();
@@ -181,8 +181,8 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
base::AutoLock lock(*m);
}
ASSERT_FALSE(*called_);
- test_->ProcessValidationResult(
- client_hello, result, should_succeed_, error_substr_);
+ test_->ProcessValidationResult(client_hello, result, should_succeed_,
+ error_substr_);
*called_ = true;
}
@@ -212,15 +212,9 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
void ShouldSucceed(const CryptoHandshakeMessage& message) {
bool called = false;
- RunValidate(message, new ValidateCallback(this, true, "", &called));
- EXPECT_TRUE(called);
- }
-
- void RunValidate(
- const CryptoHandshakeMessage& message,
- ValidateClientHelloResultCallback* cb) {
config_.ValidateClientHello(message, client_address_.address(), &clock_,
- cb);
+ new ValidateCallback(this, true, "", &called));
+ EXPECT_TRUE(called);
}
void ShouldFailMentioning(const char* error_substr,
@@ -253,30 +247,18 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
&params_, &out_, &error_details);
if (should_succeed) {
- ASSERT_EQ(error, QUIC_NO_ERROR)
- << "Message failed with error " << error_details << ": "
- << message.DebugString();
+ ASSERT_EQ(error, QUIC_NO_ERROR) << "Message failed with error "
+ << error_details << ": "
+ << message.DebugString();
} else {
- ASSERT_NE(error, QUIC_NO_ERROR)
- << "Message didn't fail: " << message.DebugString();
+ ASSERT_NE(error, QUIC_NO_ERROR) << "Message didn't fail: "
+ << message.DebugString();
EXPECT_TRUE(error_details.find(error_substr) != string::npos)
<< error_substr << " not in " << error_details;
}
}
- CryptoHandshakeMessage InchoateClientHello(const char* message_tag, ...) {
- va_list ap;
- va_start(ap, message_tag);
-
- CryptoHandshakeMessage message =
- CryptoTestUtils::BuildMessage(message_tag, ap);
- va_end(ap);
-
- message.SetStringPiece(kPAD, string(kClientHelloMinimumSize, '-'));
- return message;
- }
-
string GenerateNonce() {
string nonce;
CryptoUtils::GenerateNonce(
@@ -292,8 +274,8 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
const uint32* reject_reasons;
size_t num_reject_reasons;
COMPILE_ASSERT(sizeof(QuicTag) == sizeof(uint32), header_out_of_sync);
- QuicErrorCode error_code = out_.GetTaglist(kRREJ, &reject_reasons,
- &num_reject_reasons);
+ QuicErrorCode error_code =
+ out_.GetTaglist(kRREJ, &reject_reasons, &num_reject_reasons);
ASSERT_EQ(QUIC_NO_ERROR, error_code);
if (FLAGS_use_early_return_when_verifying_chlo) {
@@ -350,8 +332,8 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
uint8 orbit_[kOrbitSize];
bool use_stateless_rejects_;
- // These strings contain hex escaped values from the server suitable for
- // passing to |InchoateClientHello| when constructing client hello messages.
+ // These strings contain hex escaped values from the server suitable for using
+ // when constructing client hello messages.
string nonce_hex_, pub_hex_, srct_hex_, scid_hex_;
scoped_ptr<CryptoHandshakeMessage> server_config_;
};
@@ -363,6 +345,7 @@ INSTANTIATE_TEST_CASE_P(CryptoServerTests,
::testing::ValuesIn(GetTestParams()));
TEST_P(CryptoServerTest, BadSNI) {
+ // clang-format off
static const char* const kBadSNIs[] = {
"",
"foo",
@@ -371,19 +354,23 @@ TEST_P(CryptoServerTest, BadSNI) {
"127.0.0.1",
"ffee::1",
};
+ // clang-format on
- string client_version = QuicUtils::TagToString(
- QuicVersionToQuicTag(supported_versions_.front()));
+ string client_version =
+ QuicUtils::TagToString(QuicVersionToQuicTag(supported_versions_.front()));
for (size_t i = 0; i < arraysize(kBadSNIs); i++) {
- ShouldFailMentioning("SNI", InchoateClientHello(
+ // clang-format off
+ CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"SNI", kBadSNIs[i],
"VER\0", client_version.data(),
- nullptr));
+ "$padding", static_cast<int>(kClientHelloMinimumSize),
+ nullptr);
+ // clang-format on
+ ShouldFailMentioning("SNI", msg);
const HandshakeFailureReason kRejectReasons[] = {
- SERVER_CONFIG_INCHOATE_HELLO_FAILURE
- };
+ SERVER_CONFIG_INCHOATE_HELLO_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
}
@@ -393,7 +380,8 @@ TEST_P(CryptoServerTest, BadSNI) {
TEST_F(CryptoServerTest, DISABLED_DefaultCert) {
// Check that the server replies with a default certificate when no SNI is
// specified.
- ShouldSucceed(InchoateClientHello(
+ // clang-format off
+ CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"AEAD", "AESG",
"KEXS", "C255",
@@ -401,72 +389,83 @@ TEST_F(CryptoServerTest, DISABLED_DefaultCert) {
"#004b5453", srct_hex_.c_str(),
"PUBS", pub_hex_.c_str(),
"NONC", nonce_hex_.c_str(),
- "$padding", static_cast<int>(kClientHelloMinimumSize),
"PDMD", "X509",
"VER\0", client_version_.data(),
- nullptr));
+ "$padding", static_cast<int>(kClientHelloMinimumSize),
+ nullptr);
+ // clang-format on
+ ShouldSucceed(msg);
StringPiece cert, proof;
EXPECT_TRUE(out_.GetStringPiece(kCertificateTag, &cert));
EXPECT_TRUE(out_.GetStringPiece(kPROF, &proof));
EXPECT_NE(0u, cert.size());
EXPECT_NE(0u, proof.size());
const HandshakeFailureReason kRejectReasons[] = {
- CLIENT_NONCE_INVALID_TIME_FAILURE
- };
+ CLIENT_NONCE_INVALID_TIME_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
TEST_P(CryptoServerTest, TooSmall) {
+ // clang-format off
ShouldFailMentioning("too small", CryptoTestUtils::Message(
"CHLO",
"VER\0", client_version_.data(),
nullptr));
+ // clang-format on
const HandshakeFailureReason kRejectReasons[] = {
- SERVER_CONFIG_INCHOATE_HELLO_FAILURE
- };
+ SERVER_CONFIG_INCHOATE_HELLO_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
TEST_P(CryptoServerTest, BadSourceAddressToken) {
// Invalid source-address tokens should be ignored.
+ // clang-format off
static const char* const kBadSourceAddressTokens[] = {
"",
"foo",
"#0000",
"#0000000000000000000000000000000000000000",
};
+ // clang-format on
for (size_t i = 0; i < arraysize(kBadSourceAddressTokens); i++) {
- ShouldSucceed(InchoateClientHello(
+ // clang-format off
+ CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"STK", kBadSourceAddressTokens[i],
"VER\0", client_version_.data(),
- nullptr));
+ "$padding", static_cast<int>(kClientHelloMinimumSize), nullptr);
+ // clang-format on
+ ShouldSucceed(msg);
const HandshakeFailureReason kRejectReasons[] = {
- SERVER_CONFIG_INCHOATE_HELLO_FAILURE
- };
+ SERVER_CONFIG_INCHOATE_HELLO_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
}
TEST_P(CryptoServerTest, BadClientNonce) {
// Invalid nonces should be ignored.
+ // clang-format off
static const char* const kBadNonces[] = {
"",
"#0000",
"#0000000000000000000000000000000000000000",
};
+ // clang-format on
for (size_t i = 0; i < arraysize(kBadNonces); i++) {
- ShouldSucceed(InchoateClientHello(
+ // clang-format off
+ CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"NONC", kBadNonces[i],
"VER\0", client_version_.data(),
- nullptr));
+ "$padding", static_cast<int>(kClientHelloMinimumSize),
+ nullptr);
+ // clang-format on
+ ShouldSucceed(msg);
const HandshakeFailureReason kRejectReasons[] = {
- SERVER_CONFIG_INCHOATE_HELLO_FAILURE
- };
+ SERVER_CONFIG_INCHOATE_HELLO_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
}
@@ -478,21 +477,25 @@ TEST_P(CryptoServerTest, DowngradeAttack) {
}
// Set the client's preferred version to a supported version that
// is not the "current" version (supported_versions_.front()).
- string bad_version = QuicUtils::TagToString(
- QuicVersionToQuicTag(supported_versions_.back()));
+ string bad_version =
+ QuicUtils::TagToString(QuicVersionToQuicTag(supported_versions_.back()));
- ShouldFailMentioning("Downgrade", InchoateClientHello(
+ // clang-format off
+ CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"VER\0", bad_version.data(),
- nullptr));
+ "$padding", static_cast<int>(kClientHelloMinimumSize),
+ nullptr);
+ // clang-format on
+ ShouldFailMentioning("Downgrade", msg);
const HandshakeFailureReason kRejectReasons[] = {
- SERVER_CONFIG_INCHOATE_HELLO_FAILURE
- };
+ SERVER_CONFIG_INCHOATE_HELLO_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
TEST_P(CryptoServerTest, CorruptServerConfig) {
// This tests corrupted server config.
+ // clang-format off
CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"AEAD", "AESG",
@@ -504,16 +507,17 @@ TEST_P(CryptoServerTest, CorruptServerConfig) {
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
nullptr);
+ // clang-format on
ShouldSucceed(msg);
CheckRejectTag();
const HandshakeFailureReason kRejectReasons[] = {
- SERVER_CONFIG_UNKNOWN_CONFIG_FAILURE
- };
+ SERVER_CONFIG_UNKNOWN_CONFIG_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
TEST_P(CryptoServerTest, CorruptSourceAddressToken) {
// This tests corrupted source address token.
+ // clang-format off
CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"AEAD", "AESG",
@@ -525,16 +529,17 @@ TEST_P(CryptoServerTest, CorruptSourceAddressToken) {
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
nullptr);
+ // clang-format on
ShouldSucceed(msg);
CheckRejectTag();
const HandshakeFailureReason kRejectReasons[] = {
- SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE
- };
+ SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
TEST_P(CryptoServerTest, CorruptClientNonceAndSourceAddressToken) {
// This test corrupts client nonce and source address token.
+ // clang-format off
CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"AEAD", "AESG",
@@ -546,17 +551,17 @@ TEST_P(CryptoServerTest, CorruptClientNonceAndSourceAddressToken) {
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
nullptr);
+ // clang-format on
ShouldSucceed(msg);
CheckRejectTag();
const HandshakeFailureReason kRejectReasons[] = {
- SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE,
- CLIENT_NONCE_INVALID_FAILURE
- };
+ SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE, CLIENT_NONCE_INVALID_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
TEST_P(CryptoServerTest, CorruptMultipleTags) {
// This test corrupts client nonce, server nonce and source address token.
+ // clang-format off
CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"AEAD", "AESG",
@@ -569,18 +574,19 @@ TEST_P(CryptoServerTest, CorruptMultipleTags) {
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
nullptr);
+ // clang-format on
ShouldSucceed(msg);
CheckRejectTag();
const HandshakeFailureReason kRejectReasons[] = {
- SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE,
- CLIENT_NONCE_INVALID_FAILURE,
- SERVER_NONCE_DECRYPTION_FAILURE,
+ SOURCE_ADDRESS_TOKEN_DECRYPTION_FAILURE, CLIENT_NONCE_INVALID_FAILURE,
+ SERVER_NONCE_DECRYPTION_FAILURE,
};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
TEST_P(CryptoServerTest, ReplayProtection) {
// This tests that disabling replay protection works.
+ // clang-format off
CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"AEAD", "AESG",
@@ -592,14 +598,14 @@ TEST_P(CryptoServerTest, ReplayProtection) {
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
nullptr);
+ // clang-format on
ShouldSucceed(msg);
// The message should be rejected because the strike-register is still
// quiescent.
CheckRejectTag();
const HandshakeFailureReason kRejectReasons[] = {
- CLIENT_NONCE_INVALID_TIME_FAILURE
- };
+ CLIENT_NONCE_INVALID_TIME_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
config_.set_replay_protection(false);
@@ -692,21 +698,23 @@ class CryptoServerTestNoConfig : public CryptoServerTest {
};
TEST_P(CryptoServerTestNoConfig, DontCrash) {
- ShouldFailMentioning("No config", InchoateClientHello(
+ // clang-format off
+ CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"VER\0", client_version_.data(),
- nullptr));
+ "$padding", static_cast<int>(kClientHelloMinimumSize),
+ nullptr);
+ // clang-format on
+ ShouldFailMentioning("No config", msg);
const HandshakeFailureReason kRejectReasons[] = {
- SERVER_CONFIG_INCHOATE_HELLO_FAILURE
- };
+ SERVER_CONFIG_INCHOATE_HELLO_FAILURE};
CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
}
class AsyncStrikeServerVerificationTest : public CryptoServerTest {
protected:
- AsyncStrikeServerVerificationTest() {
- }
+ AsyncStrikeServerVerificationTest() {}
void SetUp() override {
const string kOrbit = "12345678";
@@ -715,7 +723,7 @@ class AsyncStrikeServerVerificationTest : public CryptoServerTest {
10000, // strike_register_max_entries
static_cast<uint32>(clock_.WallNow().ToUNIXSeconds()),
60, // strike_register_window_secs
- reinterpret_cast<const uint8 *>(kOrbit.data()),
+ reinterpret_cast<const uint8*>(kOrbit.data()),
StrikeRegister::NO_STARTUP_PERIOD_NEEDED);
config_.SetStrikeRegisterClient(strike_register_client_);
CryptoServerTest::SetUp();
@@ -727,6 +735,7 @@ class AsyncStrikeServerVerificationTest : public CryptoServerTest {
TEST_P(AsyncStrikeServerVerificationTest, AsyncReplayProtection) {
// This tests async validation with a strike register works.
+ // clang-format off
CryptoHandshakeMessage msg = CryptoTestUtils::Message(
"CHLO",
"AEAD", "AESG",
@@ -738,12 +747,14 @@ TEST_P(AsyncStrikeServerVerificationTest, AsyncReplayProtection) {
"VER\0", client_version_.data(),
"$padding", static_cast<int>(kClientHelloMinimumSize),
nullptr);
+ // clang-format on
// Clear the message tag.
out_.set_tag(0);
bool called = false;
- RunValidate(msg, new ValidateCallback(this, true, "", &called));
+ config_.ValidateClientHello(msg, client_address_.address(), &clock_,
+ new ValidateCallback(this, true, "", &called));
// The verification request was queued.
ASSERT_FALSE(called);
EXPECT_EQ(0u, out_.tag());
@@ -757,7 +768,8 @@ TEST_P(AsyncStrikeServerVerificationTest, AsyncReplayProtection) {
EXPECT_EQ(kSHLO, out_.tag());
// Rejected if replayed.
- RunValidate(msg, new ValidateCallback(this, true, "", &called));
+ config_.ValidateClientHello(msg, client_address_.address(), &clock_,
+ new ValidateCallback(this, true, "", &called));
// The verification request was queued.
ASSERT_FALSE(called);
EXPECT_EQ(1, strike_register_client_->PendingVerifications());
diff --git a/net/quic/quic_config.cc b/net/quic/quic_config.cc
index 675716c..d91fd7b 100644
--- a/net/quic/quic_config.cc
+++ b/net/quic/quic_config.cc
@@ -366,6 +366,17 @@ QuicConfig::QuicConfig()
QuicConfig::~QuicConfig() {}
+bool QuicConfig::SetInitialReceivedConnectionOptions(
+ const QuicTagVector& tags) {
+ if (HasReceivedConnectionOptions()) {
+ // If we have already received connection options (via handshake or due to a
+ // previous call), don't re-initialize.
+ return false;
+ }
+ connection_options_.SetReceivedValues(tags);
+ return true;
+}
+
void QuicConfig::SetConnectionOptionsToSend(
const QuicTagVector& connection_options) {
connection_options_.SetSendValues(connection_options);
diff --git a/net/quic/quic_config.h b/net/quic/quic_config.h
index 20d71c60..755aa39 100644
--- a/net/quic/quic_config.h
+++ b/net/quic/quic_config.h
@@ -223,6 +223,13 @@ class NET_EXPORT_PRIVATE QuicConfig {
bool HasReceivedConnectionOptions() const;
+ // Sets initial received connection options. All received connection options
+ // will be initialized with these fields. Initial received options may only be
+ // set once per config, prior to the setting of any other options. If options
+ // have already been set (either by previous calls or via handshake), this
+ // function does nothing and returns false.
+ bool SetInitialReceivedConnectionOptions(const QuicTagVector& tags);
+
QuicTagVector ReceivedConnectionOptions() const;
bool HasSendConnectionOptions() const;
diff --git a/net/quic/quic_config_test.cc b/net/quic/quic_config_test.cc
index dcf19a5..0a568c2 100644
--- a/net/quic/quic_config_test.cc
+++ b/net/quic/quic_config_test.cc
@@ -83,8 +83,18 @@ TEST_F(QuicConfigTest, ProcessClientHello) {
client_config.ToHandshakeMessage(&msg);
string error_details;
+ QuicTagVector initial_received_options;
+ initial_received_options.push_back(kIW50);
+ EXPECT_TRUE(
+ config_.SetInitialReceivedConnectionOptions(initial_received_options));
+ EXPECT_FALSE(
+ config_.SetInitialReceivedConnectionOptions(initial_received_options))
+ << "You can only set initial options once.";
const QuicErrorCode error =
config_.ProcessPeerHello(msg, CLIENT, &error_details);
+ EXPECT_FALSE(
+ config_.SetInitialReceivedConnectionOptions(initial_received_options))
+ << "You cannot set initial options after the hello.";
EXPECT_EQ(QUIC_NO_ERROR, error);
EXPECT_TRUE(config_.negotiated());
EXPECT_EQ(QuicTime::Delta::FromSeconds(kMaximumIdleTimeoutSecs),
@@ -93,9 +103,10 @@ TEST_F(QuicConfigTest, ProcessClientHello) {
config_.MaxStreamsPerConnection());
EXPECT_EQ(10 * kNumMicrosPerMilli, config_.ReceivedInitialRoundTripTimeUs());
EXPECT_TRUE(config_.HasReceivedConnectionOptions());
- EXPECT_EQ(2u, config_.ReceivedConnectionOptions().size());
- EXPECT_EQ(config_.ReceivedConnectionOptions()[0], kTBBR);
- EXPECT_EQ(config_.ReceivedConnectionOptions()[1], kFHDR);
+ EXPECT_EQ(3u, config_.ReceivedConnectionOptions().size());
+ EXPECT_EQ(config_.ReceivedConnectionOptions()[0], kIW50);
+ EXPECT_EQ(config_.ReceivedConnectionOptions()[1], kTBBR);
+ EXPECT_EQ(config_.ReceivedConnectionOptions()[2], kFHDR);
EXPECT_EQ(config_.ReceivedInitialStreamFlowControlWindowBytes(),
2 * kInitialStreamFlowControlWindowForTest);
EXPECT_EQ(config_.ReceivedInitialSessionFlowControlWindowBytes(),
diff --git a/net/quic/quic_connection.cc b/net/quic/quic_connection.cc
index 7ed5942..47be9ce 100644
--- a/net/quic/quic_connection.cc
+++ b/net/quic/quic_connection.cc
@@ -1476,6 +1476,10 @@ bool QuicConnection::ProcessValidatedPacket() {
DVLOG(1) << ENDPOINT << "Peer's ip:port changed from "
<< old_peer_address.ToString() << " to "
<< peer_address_.ToString() << ", migrating connection.";
+
+ if (FLAGS_send_goaway_after_client_migration) {
+ visitor_->OnConnectionMigration();
+ }
}
time_of_last_received_packet_ = clock_->Now();
diff --git a/net/quic/quic_connection.h b/net/quic/quic_connection.h
index b2dc646..b5f44c4 100644
--- a/net/quic/quic_connection.h
+++ b/net/quic/quic_connection.h
@@ -128,6 +128,9 @@ class NET_EXPORT_PRIVATE QuicConnectionVisitorInterface {
// Called when the connection experiences a change in congestion window.
virtual void OnCongestionWindowChange(QuicTime now) = 0;
+ // Called when the connection receives a packet from a migrated client.
+ virtual void OnConnectionMigration() = 0;
+
// Called to ask if the visitor wants to schedule write resumption as it both
// has pending data to write, and is able to write (e.g. based on flow control
// limits).
diff --git a/net/quic/quic_fec_group.cc b/net/quic/quic_fec_group.cc
index b06f63e..9a784e9 100644
--- a/net/quic/quic_fec_group.cc
+++ b/net/quic/quic_fec_group.cc
@@ -152,10 +152,7 @@ bool QuicFecGroup::UpdateParity(StringPiece payload) {
return true;
}
// Update the parity by XORing in the data (padding with 0s if necessary).
- for (size_t i = 0; i < kMaxPacketSize; ++i) {
- uint8 byte = i < payload.size() ? payload[i] : 0x00;
- payload_parity_[i] ^= byte;
- }
+ XorBuffers(payload.data(), payload.size(), payload_parity_);
return true;
}
@@ -168,4 +165,39 @@ QuicPacketCount QuicFecGroup::NumMissingPackets() const {
received_packets_.size());
}
+void QuicFecGroup::XorBuffers(const char* input,
+ size_t size_in_bytes,
+ char* output) {
+#if defined(__i386__) || defined(__x86_64__)
+ // On x86, alignment is not required and casting bytes to words is safe.
+
+ // size_t is a reasonable approximation of how large a general-purpose
+ // register is for the platforms and compilers Chrome is built on.
+ typedef size_t platform_word;
+ const size_t size_in_words = size_in_bytes / sizeof(platform_word);
+
+ const platform_word* input_words =
+ reinterpret_cast<const platform_word*>(input);
+ platform_word* output_words = reinterpret_cast<platform_word*>(output);
+
+ // Handle word-sized part of the buffer.
+ size_t offset_in_words = 0;
+ for (; offset_in_words < size_in_words; offset_in_words++) {
+ output_words[offset_in_words] ^= input_words[offset_in_words];
+ }
+
+ // Handle the tail which does not fit into the word.
+ for (size_t offset_in_bytes = offset_in_words * sizeof(platform_word);
+ offset_in_bytes < size_in_bytes; offset_in_bytes++) {
+ output[offset_in_bytes] ^= input[offset_in_bytes];
+ }
+#else
+ // On ARM and most other plaforms, the code above could fail due to the
+ // alignment errors. Stick to byte-by-byte comparison.
+ for (size_t offset = 0; offset < size_in_bytes; offset++) {
+ output[offset] ^= input[offset];
+ }
+#endif /* defined(__i386__) || defined(__x86_64__) */
+}
+
} // namespace net
diff --git a/net/quic/quic_fec_group.h b/net/quic/quic_fec_group.h
index 0ce0987..b3982cf 100644
--- a/net/quic/quic_fec_group.h
+++ b/net/quic/quic_fec_group.h
@@ -72,6 +72,10 @@ class NET_EXPORT_PRIVATE QuicFecGroup {
return effective_encryption_level_;
}
+ // An optimized version of running |output| ^= |input|, where ^ is
+ // byte-by-byte XOR and both |output| and |input| are of size |size_in_bytes|.
+ static void XorBuffers(const char* input, size_t size_in_bytes, char* output);
+
private:
bool UpdateParity(base::StringPiece payload);
// Returns the number of missing packets, or QuicPacketCount max
diff --git a/net/quic/quic_fec_group_test.cc b/net/quic/quic_fec_group_test.cc
index 9f38da7..e793511 100644
--- a/net/quic/quic_fec_group_test.cc
+++ b/net/quic/quic_fec_group_test.cc
@@ -14,6 +14,7 @@
using ::testing::_;
using base::StringPiece;
+using std::string;
namespace net {
@@ -249,4 +250,73 @@ TEST_F(QuicFecGroupTest, EffectiveEncryptionLevel) {
EXPECT_EQ(ENCRYPTION_NONE, group.effective_encryption_level());
}
+// Test the code assuming it is going to be operating in 128-bit chunks (which
+// is something that can happen if it is compiled with full vectorization).
+const QuicByteCount kWordSize = 128 / 8;
+
+// A buffer which stores the data with the specified offset with respect to word
+// alignment boundary.
+class MisalignedBuffer {
+ public:
+ MisalignedBuffer(const string& original, size_t offset);
+
+ char* buffer() { return buffer_; }
+ size_t size() { return size_; }
+
+ StringPiece AsStringPiece() { return StringPiece(buffer_, size_); }
+
+ private:
+ char* buffer_;
+ size_t size_;
+
+ scoped_ptr<char[]> allocation_;
+};
+
+MisalignedBuffer::MisalignedBuffer(const string& original, size_t offset) {
+ CHECK_LT(offset, kWordSize);
+ size_ = original.size();
+
+ // Allocate aligned buffer two words larger than needed.
+ const size_t aligned_buffer_size = size_ + 2 * kWordSize;
+ allocation_.reset(new char[aligned_buffer_size]);
+ char* aligned_buffer =
+ allocation_.get() +
+ (kWordSize - reinterpret_cast<uintptr_t>(allocation_.get()) % kWordSize);
+ CHECK_EQ(0u, reinterpret_cast<uintptr_t>(aligned_buffer) % kWordSize);
+
+ buffer_ = aligned_buffer + offset;
+ CHECK_EQ(offset, reinterpret_cast<uintptr_t>(buffer_) % kWordSize);
+ memcpy(buffer_, original.data(), size_);
+}
+
+// Checks whether XorBuffers works correctly with buffers aligned in various
+// ways.
+TEST(XorBuffersTest, XorBuffers) {
+ const string longer_data =
+ "Having to care about memory alignment can be incredibly frustrating.";
+ const string shorter_data = "strict aliasing";
+
+ // Compute the reference XOR using simpler slow way.
+ string output_reference;
+ for (size_t i = 0; i < longer_data.size(); i++) {
+ char shorter_byte = i < shorter_data.size() ? shorter_data[i] : 0;
+ output_reference.push_back(longer_data[i] ^ shorter_byte);
+ }
+
+ // Check whether XorBuffers works correctly for all possible misalignments.
+ for (size_t offset_shorter = 0; offset_shorter < kWordSize;
+ offset_shorter++) {
+ for (size_t offset_longer = 0; offset_longer < kWordSize; offset_longer++) {
+ // Prepare the misaligned buffer.
+ MisalignedBuffer longer(longer_data, offset_longer);
+ MisalignedBuffer shorter(shorter_data, offset_shorter);
+
+ // XOR the buffers and compare the result with the reference.
+ QuicFecGroup::XorBuffers(shorter.buffer(), shorter.size(),
+ longer.buffer());
+ EXPECT_EQ(output_reference, longer.AsStringPiece());
+ }
+ }
+}
+
} // namespace net
diff --git a/net/quic/quic_flags.cc b/net/quic/quic_flags.cc
index d63db76..b0bf2c0 100644
--- a/net/quic/quic_flags.cc
+++ b/net/quic/quic_flags.cc
@@ -63,11 +63,6 @@ bool FLAGS_quic_allow_ip_migration = true;
// Estimate that only 60% of QUIC's receive buffer is usable as opposed to 95%.
bool FLAGS_quic_use_conservative_receive_buffer = true;
-// If true, default quic_time_wait_list_seconds (time to keep a connection ID on
-// the time-wait list) is 200 seconds rather than 5 seconds and increase the
-// maximum time-wait list size to 600,000.
-bool FLAGS_increase_time_wait_list = true;
-
// Limits QUIC's max CWND to 200 packets.
bool FLAGS_quic_limit_max_cwnd = true;
@@ -76,10 +71,6 @@ bool FLAGS_quic_limit_max_cwnd = true;
// get_max_open_streams().
bool FLAGS_exact_stream_id_delta = true;
-// Limits the pacing burst out of quiescence to the current congestion window in
-// packets.
-bool FLAGS_quic_limit_pacing_burst = true;
-
// If true, require handshake confirmation for QUIC connections, functionally
// disabling 0-rtt handshakes.
// TODO(rtenneti): Enable this flag after fixing tests.
@@ -88,3 +79,7 @@ bool FLAGS_quic_require_handshake_confirmation = false;
// Disables special treatment of truncated acks, since older retransmissions are
// proactively discarded in QUIC.
bool FLAGS_quic_disable_truncated_ack_handling = true;
+
+// If true, after a server silo receives a packet from a migrated QUIC
+// client, a GO_AWAY frame is sent to the client.
+bool FLAGS_send_goaway_after_client_migration = true;
diff --git a/net/quic/quic_flags.h b/net/quic/quic_flags.h
index 140a463..de30e86 100644
--- a/net/quic/quic_flags.h
+++ b/net/quic/quic_flags.h
@@ -24,11 +24,10 @@ NET_EXPORT_PRIVATE extern bool FLAGS_quic_process_frames_inline;
NET_EXPORT_PRIVATE extern bool FLAGS_quic_dont_write_when_flow_unblocked;
NET_EXPORT_PRIVATE extern bool FLAGS_quic_allow_ip_migration;
NET_EXPORT_PRIVATE extern bool FLAGS_quic_use_conservative_receive_buffer;
-NET_EXPORT_PRIVATE extern bool FLAGS_increase_time_wait_list;
NET_EXPORT_PRIVATE extern bool FLAGS_quic_limit_max_cwnd;
NET_EXPORT_PRIVATE extern bool FLAGS_exact_stream_id_delta;
-NET_EXPORT_PRIVATE extern bool FLAGS_quic_limit_pacing_burst;
NET_EXPORT_PRIVATE extern bool FLAGS_quic_require_handshake_confirmation;
NET_EXPORT_PRIVATE extern bool FLAGS_quic_disable_truncated_ack_handling;
+NET_EXPORT_PRIVATE extern bool FLAGS_send_goaway_after_client_migration;
#endif // NET_QUIC_QUIC_FLAGS_H_
diff --git a/net/quic/quic_sent_packet_manager_test.cc b/net/quic/quic_sent_packet_manager_test.cc
index fe76de0..2245fd9 100644
--- a/net/quic/quic_sent_packet_manager_test.cc
+++ b/net/quic/quic_sent_packet_manager_test.cc
@@ -1119,10 +1119,8 @@ TEST_F(QuicSentPacketManagerTest, NewRetransmissionTimeout) {
EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
EXPECT_CALL(*send_algorithm_, PacingRate())
.WillRepeatedly(Return(QuicBandwidth::Zero()));
- if (FLAGS_quic_limit_pacing_burst) {
- EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
- .WillOnce(Return(10 * kDefaultTCPMSS));
- }
+ EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
+ .WillOnce(Return(10 * kDefaultTCPMSS));
manager_.SetFromConfig(client_config);
EXPECT_TRUE(QuicSentPacketManagerPeer::GetUseNewRto(&manager_));
@@ -1625,10 +1623,8 @@ TEST_F(QuicSentPacketManagerTest, NegotiateReceiveWindowFromOptions) {
SetMaxCongestionWindow(kMinSocketReceiveBuffer * 0.95));
EXPECT_CALL(*send_algorithm_, PacingRate())
.WillRepeatedly(Return(QuicBandwidth::Zero()));
- if (FLAGS_quic_limit_pacing_burst) {
- EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
- .WillOnce(Return(10 * kDefaultTCPMSS));
- }
+ EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
+ .WillOnce(Return(10 * kDefaultTCPMSS));
EXPECT_CALL(*network_change_visitor_, OnCongestionWindowChange());
EXPECT_CALL(*network_change_visitor_, OnRttChange());
manager_.SetFromConfig(client_config);
@@ -1670,10 +1666,8 @@ TEST_F(QuicSentPacketManagerTest,
SetMaxCongestionWindow(kMinSocketReceiveBuffer * 0.6));
EXPECT_CALL(*send_algorithm_, PacingRate())
.WillRepeatedly(Return(QuicBandwidth::Zero()));
- if (FLAGS_quic_limit_pacing_burst) {
- EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
- .WillOnce(Return(10 * kDefaultTCPMSS));
- }
+ EXPECT_CALL(*send_algorithm_, GetCongestionWindow())
+ .WillOnce(Return(10 * kDefaultTCPMSS));
EXPECT_CALL(*network_change_visitor_, OnCongestionWindowChange());
EXPECT_CALL(*network_change_visitor_, OnRttChange());
manager_.SetFromConfig(client_config);
diff --git a/net/quic/quic_session.cc b/net/quic/quic_session.cc
index 3c4e362..6085704 100644
--- a/net/quic/quic_session.cc
+++ b/net/quic/quic_session.cc
@@ -83,6 +83,8 @@ class VisitorShim : public QuicConnectionVisitorInterface {
void OnWriteBlocked() override { session_->OnWriteBlocked(); }
+ void OnConnectionMigration() override { session_->OnConnectionMigration(); }
+
bool WillingAndAbleToWrite() const override {
return session_->WillingAndAbleToWrite();
}
diff --git a/net/quic/quic_session.h b/net/quic/quic_session.h
index 8538e2b..731f05f 100644
--- a/net/quic/quic_session.h
+++ b/net/quic/quic_session.h
@@ -82,6 +82,7 @@ class NET_EXPORT_PRIVATE QuicSession : public QuicConnectionVisitorInterface {
void OnSuccessfulVersionNegotiation(const QuicVersion& version) override;
void OnCanWrite() override;
void OnCongestionWindowChange(QuicTime now) override {}
+ void OnConnectionMigration() override {}
bool WillingAndAbleToWrite() const override;
bool HasPendingHandshake() const override;
bool HasOpenDynamicStreams() const override;
diff --git a/net/quic/quic_session_test.cc b/net/quic/quic_session_test.cc
index 89e2bab..d7dae9f 100644
--- a/net/quic/quic_session_test.cc
+++ b/net/quic/quic_session_test.cc
@@ -357,12 +357,12 @@ TEST_P(QuicSessionTestServer, ManyImplicitlyOpenedStreams) {
TEST_P(QuicSessionTestServer, DebugDFatalIfMarkingClosedStreamWriteBlocked) {
TestStream* stream2 = session_.CreateOutgoingDynamicStream();
- QuicStreamId kClosedStreamId = stream2->id();
+ QuicStreamId closed_stream_id = stream2->id();
// Close the stream.
- EXPECT_CALL(*connection_, SendRstStream(kClosedStreamId, _, _));
+ EXPECT_CALL(*connection_, SendRstStream(closed_stream_id, _, _));
stream2->Reset(QUIC_BAD_APPLICATION_PAYLOAD);
EXPECT_DEBUG_DFATAL(session_.MarkConnectionLevelWriteBlocked(
- kClosedStreamId, kSomeMiddlePriority),
+ closed_stream_id, kSomeMiddlePriority),
"Marking unknown stream 2 blocked.");
}
diff --git a/net/quic/test_tools/crypto_test_utils.cc b/net/quic/test_tools/crypto_test_utils.cc
index 811da80..3f0847b 100644
--- a/net/quic/test_tools/crypto_test_utils.cc
+++ b/net/quic/test_tools/crypto_test_utils.cc
@@ -560,14 +560,6 @@ CryptoHandshakeMessage CryptoTestUtils::Message(const char* message_tag, ...) {
va_list ap;
va_start(ap, message_tag);
- CryptoHandshakeMessage message = BuildMessage(message_tag, ap);
- va_end(ap);
- return message;
-}
-
-// static
-CryptoHandshakeMessage CryptoTestUtils::BuildMessage(const char* message_tag,
- va_list ap) {
CryptoHandshakeMessage msg;
msg.set_tag(ParseTag(message_tag));
@@ -624,6 +616,7 @@ CryptoHandshakeMessage CryptoTestUtils::BuildMessage(const char* message_tag,
CryptoFramer::ParseMessage(bytes->AsStringPiece()));
CHECK(parsed.get());
+ va_end(ap);
return *parsed;
}
diff --git a/net/quic/test_tools/crypto_test_utils.h b/net/quic/test_tools/crypto_test_utils.h
index c72b904..240bd36 100644
--- a/net/quic/test_tools/crypto_test_utils.h
+++ b/net/quic/test_tools/crypto_test_utils.h
@@ -164,13 +164,6 @@ class CryptoTestUtils {
// nullptr);
static CryptoHandshakeMessage Message(const char* message_tag, ...);
- // BuildMessage is the same as |Message|, but takes the variable arguments
- // explicitly. TODO(rtenneti): Investigate whether it'd be better for
- // Message() and BuildMessage() to return a CryptoHandshakeMessage* pointer
- // instead, to avoid copying the return value.
- static CryptoHandshakeMessage BuildMessage(const char* message_tag,
- va_list ap);
-
// ChannelIDSourceForTesting returns a ChannelIDSource that generates keys
// deterministically based on the hostname given in the GetChannelIDKey call.
// This ChannelIDSource works in synchronous mode, i.e., its GetChannelIDKey
diff --git a/net/quic/test_tools/quic_test_utils.h b/net/quic/test_tools/quic_test_utils.h
index 46b7975..bf58c76 100644
--- a/net/quic/test_tools/quic_test_utils.h
+++ b/net/quic/test_tools/quic_test_utils.h
@@ -285,6 +285,7 @@ class MockConnectionVisitor : public QuicConnectionVisitorInterface {
MOCK_METHOD0(OnWriteBlocked, void());
MOCK_METHOD0(OnCanWrite, void());
MOCK_METHOD1(OnCongestionWindowChange, void(QuicTime now));
+ MOCK_METHOD0(OnConnectionMigration, void());
MOCK_CONST_METHOD0(WillingAndAbleToWrite, bool());
MOCK_CONST_METHOD0(HasPendingHandshake, bool());
MOCK_CONST_METHOD0(HasOpenDynamicStreams, bool());