// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/quic/quic_packet_creator.h" #include #include "base/macros.h" #include "base/stl_util.h" #include "net/quic/crypto/null_encrypter.h" #include "net/quic/crypto/quic_decrypter.h" #include "net/quic/crypto/quic_encrypter.h" #include "net/quic/quic_flags.h" #include "net/quic/quic_simple_buffer_allocator.h" #include "net/quic/quic_utils.h" #include "net/quic/test_tools/mock_random.h" #include "net/quic/test_tools/quic_framer_peer.h" #include "net/quic/test_tools/quic_packet_creator_peer.h" #include "net/quic/test_tools/quic_test_utils.h" #include "net/test/gtest_util.h" #include "testing/gmock/include/gmock/gmock.h" using base::StringPiece; using std::ostream; using std::string; using std::vector; using testing::DoAll; using testing::InSequence; using testing::Return; using testing::SaveArg; using testing::StrictMock; using testing::_; namespace net { namespace test { namespace { // Run tests with combinations of {QuicVersion, ToggleVersionSerialization}. struct TestParams { TestParams(QuicVersion version, bool version_serialization, QuicConnectionIdLength length) : version(version), connection_id_length(length), version_serialization(version_serialization) {} friend ostream& operator<<(ostream& os, const TestParams& p) { os << "{ client_version: " << QuicVersionToString(p.version) << " connection id length: " << p.connection_id_length << " include version: " << p.version_serialization << " }"; return os; } QuicVersion version; QuicConnectionIdLength connection_id_length; bool version_serialization; }; // Constructs various test permutations. vector GetTestParams() { vector params; QuicConnectionIdLength max = PACKET_8BYTE_CONNECTION_ID; QuicVersionVector all_supported_versions = QuicSupportedVersions(); for (size_t i = 0; i < all_supported_versions.size(); ++i) { params.push_back(TestParams(all_supported_versions[i], true, max)); params.push_back(TestParams(all_supported_versions[i], false, max)); } params.push_back( TestParams(all_supported_versions[0], true, PACKET_0BYTE_CONNECTION_ID)); params.push_back( TestParams(all_supported_versions[0], true, PACKET_1BYTE_CONNECTION_ID)); params.push_back( TestParams(all_supported_versions[0], true, PACKET_4BYTE_CONNECTION_ID)); params.push_back(TestParams(all_supported_versions[0], true, max)); return params; } class MockDelegate : public QuicPacketCreator::DelegateInterface { public: MockDelegate() {} ~MockDelegate() override {} MOCK_METHOD1(OnSerializedPacket, void(SerializedPacket* packet)); MOCK_METHOD2(OnUnrecoverableError, void(QuicErrorCode, ConnectionCloseSource source)); private: DISALLOW_COPY_AND_ASSIGN(MockDelegate); }; class QuicPacketCreatorTest : public ::testing::TestWithParam { public: void ClearSerializedPacket(SerializedPacket* serialized_packet) { if (serialized_packet == nullptr) { return; } QuicUtils::ClearSerializedPacket(serialized_packet); } void SaveSerializedPacket(SerializedPacket* serialized_packet) { if (serialized_packet == nullptr) { return; } delete[] serialized_packet_.encrypted_buffer; serialized_packet_ = *serialized_packet; serialized_packet_.encrypted_buffer = QuicUtils::CopyBuffer(*serialized_packet); serialized_packet->retransmittable_frames.clear(); } void DeleteSerializedPacket() { delete[] serialized_packet_.encrypted_buffer; serialized_packet_.encrypted_buffer = nullptr; ClearSerializedPacket(&serialized_packet_); } protected: QuicPacketCreatorTest() : server_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(), Perspective::IS_SERVER), client_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(), Perspective::IS_CLIENT), connection_id_(2), data_("foo"), creator_(connection_id_, &client_framer_, &mock_random_, &buffer_allocator_, &delegate_), serialized_packet_(creator_.NoPacket()) { FLAGS_quic_always_log_bugs_for_tests = true; creator_.set_connection_id_length(GetParam().connection_id_length); creator_.SetEncrypter(ENCRYPTION_INITIAL, new NullEncrypter()); creator_.SetEncrypter(ENCRYPTION_FORWARD_SECURE, new NullEncrypter()); client_framer_.set_visitor(&framer_visitor_); client_framer_.set_received_entropy_calculator(&entropy_calculator_); server_framer_.set_visitor(&framer_visitor_); // TODO(ianswett): Fix this test so it uses a non-null encrypter. FLAGS_quic_never_write_unencrypted_data = false; } ~QuicPacketCreatorTest() override { delete[] serialized_packet_.encrypted_buffer; ClearSerializedPacket(&serialized_packet_); } SerializedPacket SerializeAllFrames(const QuicFrames& frames) { SerializedPacket packet = QuicPacketCreatorPeer::SerializeAllFrames( &creator_, frames, buffer_, kMaxPacketSize); EXPECT_EQ(QuicPacketCreatorPeer::GetEncryptionLevel(&creator_), packet.encryption_level); return packet; } void ProcessPacket(const SerializedPacket& packet) { QuicEncryptedPacket encrypted_packet(packet.encrypted_buffer, packet.encrypted_length); server_framer_.ProcessPacket(encrypted_packet); } void CheckStreamFrame(const QuicFrame& frame, QuicStreamId stream_id, const string& data, QuicStreamOffset offset, bool fin) { EXPECT_EQ(STREAM_FRAME, frame.type); ASSERT_TRUE(frame.stream_frame); EXPECT_EQ(stream_id, frame.stream_frame->stream_id); EXPECT_EQ(data, StringPiece(frame.stream_frame->frame_buffer, frame.stream_frame->frame_length)); EXPECT_EQ(offset, frame.stream_frame->offset); EXPECT_EQ(fin, frame.stream_frame->fin); } // Returns the number of bytes consumed by the header of packet, including // the version. size_t GetPacketHeaderOverhead() { return GetPacketHeaderSize( creator_.connection_id_length(), kIncludeVersion, !kIncludePathId, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); } // Returns the number of bytes of overhead that will be added to a packet // of maximum length. size_t GetEncryptionOverhead() { return creator_.max_packet_length() - client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); } // Returns the number of bytes consumed by the non-data fields of a stream // frame, assuming it is the last frame in the packet size_t GetStreamFrameOverhead() { return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset, true); } QuicIOVector MakeIOVector(StringPiece s) { return ::net::MakeIOVector(s, &iov_); } PendingRetransmission CreateRetransmission( const QuicFrames& retransmittable_frames, bool has_crypto_handshake, bool needs_padding, EncryptionLevel encryption_level, QuicPacketNumberLength packet_number_length) { return PendingRetransmission(1u, 1u, NOT_RETRANSMISSION, retransmittable_frames, has_crypto_handshake, needs_padding, encryption_level, packet_number_length); } static const QuicStreamOffset kOffset = 1u; char buffer_[kMaxPacketSize]; QuicFrames frames_; QuicFramer server_framer_; QuicFramer client_framer_; StrictMock framer_visitor_; StrictMock delegate_; QuicConnectionId connection_id_; string data_; struct iovec iov_; MockRandom mock_random_; SimpleBufferAllocator buffer_allocator_; QuicPacketCreator creator_; MockEntropyCalculator entropy_calculator_; SerializedPacket serialized_packet_; }; // Run all packet creator tests with all supported versions of QUIC, and with // and without version in the packet header, as well as doing a run for each // length of truncated connection id. INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests, QuicPacketCreatorTest, ::testing::ValuesIn(GetTestParams())); TEST_P(QuicPacketCreatorTest, SerializeFrames) { for (int i = ENCRYPTION_NONE; i < NUM_ENCRYPTION_LEVELS; ++i) { EncryptionLevel level = static_cast(i); creator_.set_encryption_level(level); frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); frames_.push_back( QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); frames_.push_back( QuicFrame(new QuicStreamFrame(0u, true, 0u, StringPiece()))); SerializedPacket serialized = SerializeAllFrames(frames_); EXPECT_EQ(level, serialized.encryption_level); delete frames_[0].ack_frame; delete frames_[1].stream_frame; delete frames_[2].stream_frame; frames_.clear(); { InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); EXPECT_CALL(framer_visitor_, OnAckFrame(_)); EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); EXPECT_CALL(framer_visitor_, OnPacketComplete()); } ProcessPacket(serialized); } } TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) { frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u)))); creator_.AddSavedFrame(frames_[0]); QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, PACKET_4BYTE_PACKET_NUMBER); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillRepeatedly( Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.Flush(); // The packet number length will not change mid-packet. EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, serialized_packet_.packet_number_length); { InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); EXPECT_CALL(framer_visitor_, OnAckFrame(_)); EXPECT_CALL(framer_visitor_, OnPacketComplete()); } ProcessPacket(serialized_packet_); DeleteSerializedPacket(); creator_.AddSavedFrame(frames_[0]); creator_.Flush(); // Now the actual packet number length should have changed. EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, serialized_packet_.packet_number_length); delete frames_[0].ack_frame; { InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); EXPECT_CALL(framer_visitor_, OnAckFrame(_)); EXPECT_CALL(framer_visitor_, OnPacketComplete()); } ProcessPacket(serialized_packet_); DeleteSerializedPacket(); } TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) { // Changing the packet number length with queued frames in the creator // should hold the change until after any currently queued frames are // serialized. // Packet 1. // Queue a frame in the creator. EXPECT_FALSE(creator_.HasPendingFrames()); QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u))); creator_.AddSavedFrame(ack_frame); // Now change packet number length. QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, PACKET_4BYTE_PACKET_NUMBER); // Add a STOP_WAITING frame since it contains a packet number, // whose length should be 1. QuicStopWaitingFrame stop_waiting_frame; EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); EXPECT_TRUE(creator_.HasPendingFrames()); // Ensure the packet is successfully created. EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillRepeatedly( Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.Flush(); ASSERT_TRUE(serialized_packet_.encrypted_buffer); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, serialized_packet_.packet_number_length); // Verify that header in transmitted packet has 1 byte sequence length. QuicPacketHeader header; { InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); EXPECT_CALL(framer_visitor_, OnAckFrame(_)); EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); EXPECT_CALL(framer_visitor_, OnPacketComplete()); } ProcessPacket(serialized_packet_); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, header.public_header.packet_number_length); DeleteSerializedPacket(); // Packet 2. EXPECT_FALSE(creator_.HasPendingFrames()); // Generate Packet 2 with one frame -- packet number length should now // change to 4 bytes. EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame))); EXPECT_TRUE(creator_.HasPendingFrames()); // Ensure the packet is successfully created. creator_.Flush(); ASSERT_TRUE(serialized_packet_.encrypted_buffer); EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, serialized_packet_.packet_number_length); // Verify that header in transmitted packet has 4 byte sequence length. { InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_)); EXPECT_CALL(framer_visitor_, OnPacketComplete()); } ProcessPacket(serialized_packet_); EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, header.public_header.packet_number_length); DeleteSerializedPacket(); delete ack_frame.ack_frame; } TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) { // If the original packet number length, the current packet number // length, and the configured send packet number length are different, the // retransmit must sent with the original length and the others do not change. QuicPacketCreatorPeer::SetNextPacketNumberLength(&creator_, PACKET_4BYTE_PACKET_NUMBER); QuicPacketCreatorPeer::SetPacketNumberLength(&creator_, PACKET_2BYTE_PACKET_NUMBER); QuicStreamFrame* stream_frame = new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece()); QuicFrames frames; frames.push_back(QuicFrame(stream_frame)); char buffer[kMaxPacketSize]; PendingRetransmission retransmission(CreateRetransmission( frames, true /* has_crypto_handshake */, true /* needs padding */, ENCRYPTION_NONE, PACKET_1BYTE_PACKET_NUMBER)); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::GetPacketNumberLength(&creator_)); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, serialized_packet_.packet_number_length); { InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); EXPECT_CALL(framer_visitor_, OnPacketComplete()); } ProcessPacket(serialized_packet_); delete stream_frame; } TEST_P(QuicPacketCreatorTest, ReserializeCryptoFrameWithForwardSecurity) { QuicStreamFrame* stream_frame = new QuicStreamFrame(kCryptoStreamId, /*fin=*/false, 0u, StringPiece()); QuicFrames frames; frames.push_back(QuicFrame(stream_frame)); creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); char buffer[kMaxPacketSize]; PendingRetransmission retransmission(CreateRetransmission( frames, true /* has_crypto_handshake */, true /* needs padding */, ENCRYPTION_NONE, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_))); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); EXPECT_EQ(ENCRYPTION_NONE, serialized_packet_.encryption_level); delete stream_frame; } TEST_P(QuicPacketCreatorTest, ReserializeFrameWithForwardSecurity) { QuicStreamFrame* stream_frame = new QuicStreamFrame(0u, /*fin=*/false, 0u, StringPiece()); QuicFrames frames; frames.push_back(QuicFrame(stream_frame)); creator_.set_encryption_level(ENCRYPTION_FORWARD_SECURE); char buffer[kMaxPacketSize]; PendingRetransmission retransmission(CreateRetransmission( frames, false /* has_crypto_handshake */, false /* needs padding */, ENCRYPTION_NONE, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_))); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); EXPECT_EQ(ENCRYPTION_FORWARD_SECURE, serialized_packet_.encryption_level); delete stream_frame; } TEST_P(QuicPacketCreatorTest, ReserializeFramesWithPadding) { QuicFrame frame; QuicIOVector io_vector(MakeIOVector("fake handshake message data")); QuicPacketCreatorPeer::CreateStreamFrame(&creator_, kCryptoStreamId, io_vector, 0u, 0u, false, &frame); QuicFrames frames; frames.push_back(frame); char buffer[kMaxPacketSize]; PendingRetransmission retransmission(CreateRetransmission( frames, true /* has_crypto_handshake */, true /* needs padding */, ENCRYPTION_NONE, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_))); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); delete frame.stream_frame; } TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) { const size_t overhead = GetPacketHeaderOverhead() + GetEncryptionOverhead() + GetStreamFrameOverhead(); size_t capacity = kDefaultMaxPacketSize - overhead; for (int delta = -5; delta <= 0; ++delta) { string data(capacity + delta, 'A'); size_t bytes_free = 0 - delta; QuicFrame frame; QuicIOVector io_vector(MakeIOVector(data)); UniqueStreamBuffer stream_buffer; QuicPacketCreatorPeer::CreateStreamFrame( &creator_, kCryptoStreamId, io_vector, 0, kOffset, false, &frame); QuicFrames frames; frames.push_back(frame); char buffer[kMaxPacketSize]; PendingRetransmission retransmission(CreateRetransmission( frames, true /* has_crypto_handshake */, true /* needs padding */, ENCRYPTION_NONE, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_))); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.ReserializeAllFrames(retransmission, buffer, kMaxPacketSize); // If there is not enough space in the packet to fit a padding frame // (1 byte) and to expand the stream frame (another 2 bytes) the packet // will not be padded. if (bytes_free < 3) { EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, serialized_packet_.encrypted_length); } else { EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); } delete frame.stream_frame; frames_.clear(); } } TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) { QuicConnectionCloseFrame frame; frame.error_code = QUIC_NO_ERROR; frame.error_details = "error"; QuicFrames frames; frames.push_back(QuicFrame(&frame)); SerializedPacket serialized = SerializeAllFrames(frames); EXPECT_EQ(ENCRYPTION_NONE, serialized.encryption_level); ASSERT_EQ(1u, serialized.packet_number); ASSERT_EQ(1u, creator_.packet_number()); InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); EXPECT_CALL(framer_visitor_, OnPacketHeader(_)); EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_)); EXPECT_CALL(framer_visitor_, OnPacketComplete()); ProcessPacket(serialized); } TEST_P(QuicPacketCreatorTest, ConsumeData) { QuicFrame frame; QuicIOVector io_vector(MakeIOVector("test")); ASSERT_TRUE( creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t consumed = frame.stream_frame->frame_length; EXPECT_EQ(4u, consumed); CheckStreamFrame(frame, 1u, "test", 0u, false); EXPECT_TRUE(creator_.HasPendingFrames()); } TEST_P(QuicPacketCreatorTest, ConsumeDataFin) { QuicFrame frame; QuicIOVector io_vector(MakeIOVector("test")); ASSERT_TRUE( creator_.ConsumeData(1u, io_vector, 0u, 10u, true, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t consumed = frame.stream_frame->frame_length; EXPECT_EQ(4u, consumed); CheckStreamFrame(frame, 1u, "test", 10u, true); EXPECT_TRUE(creator_.HasPendingFrames()); } TEST_P(QuicPacketCreatorTest, ConsumeDataFinOnly) { QuicFrame frame; QuicIOVector io_vector(nullptr, 0, 0); ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t consumed = frame.stream_frame->frame_length; EXPECT_EQ(0u, consumed); CheckStreamFrame(frame, 1u, string(), 0u, true); EXPECT_TRUE(creator_.HasPendingFrames()); } TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) { const size_t overhead = GetPacketHeaderOverhead() + GetEncryptionOverhead(); for (size_t i = overhead; i < overhead + 100; ++i) { creator_.SetMaxPacketLength(i); const bool should_have_room = i > overhead + GetStreamFrameOverhead(); ASSERT_EQ(should_have_room, creator_.HasRoomForStreamFrame(kClientDataStreamId1, kOffset)); if (should_have_room) { QuicFrame frame; QuicIOVector io_vector(MakeIOVector("testdata")); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillRepeatedly( Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, kOffset, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t bytes_consumed = frame.stream_frame->frame_length; EXPECT_LT(0u, bytes_consumed); creator_.Flush(); } } } TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) { // Compute the total overhead for a single frame in packet. const size_t overhead = GetPacketHeaderOverhead() + GetEncryptionOverhead() + GetStreamFrameOverhead(); size_t capacity = kDefaultMaxPacketSize - overhead; // Now, test various sizes around this size. for (int delta = -5; delta <= 5; ++delta) { string data(capacity + delta, 'A'); size_t bytes_free = delta > 0 ? 0 : 0 - delta; QuicFrame frame; QuicIOVector io_vector(MakeIOVector(data)); ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, kOffset, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); // BytesFree() returns bytes available for the next frame, which will // be two bytes smaller since the stream frame would need to be grown. EXPECT_EQ(2u, creator_.ExpansionOnNewFrame()); size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2; EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta; EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.Flush(); ASSERT_TRUE(serialized_packet_.encrypted_buffer); DeleteSerializedPacket(); } } TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) { // Compute the total overhead for a single frame in packet. const size_t overhead = GetPacketHeaderOverhead() + GetEncryptionOverhead() + GetStreamFrameOverhead(); ASSERT_GT(kMaxPacketSize, overhead); size_t capacity = kDefaultMaxPacketSize - overhead; // Now, test various sizes around this size. for (int delta = -5; delta <= 5; ++delta) { string data(capacity + delta, 'A'); size_t bytes_free = delta > 0 ? 0 : 0 - delta; QuicFrame frame; QuicIOVector io_vector(MakeIOVector(data)); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillRepeatedly( Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); ASSERT_TRUE(creator_.ConsumeData(kCryptoStreamId, io_vector, 0u, kOffset, false, true, &frame)); ASSERT_TRUE(frame.stream_frame); size_t bytes_consumed = frame.stream_frame->frame_length; EXPECT_LT(0u, bytes_consumed); creator_.Flush(); ASSERT_TRUE(serialized_packet_.encrypted_buffer); // If there is not enough space in the packet to fit a padding frame // (1 byte) and to expand the stream frame (another 2 bytes) the packet // will not be padded. if (bytes_free < 3) { EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, serialized_packet_.encrypted_length); } else { EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); } DeleteSerializedPacket(); } } TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) { // Compute the total overhead for a single frame in packet. const size_t overhead = GetPacketHeaderOverhead() + GetEncryptionOverhead() + GetStreamFrameOverhead(); ASSERT_GT(kDefaultMaxPacketSize, overhead); size_t capacity = kDefaultMaxPacketSize - overhead; // Now, test various sizes around this size. for (int delta = -5; delta <= 5; ++delta) { string data(capacity + delta, 'A'); size_t bytes_free = delta > 0 ? 0 : 0 - delta; QuicFrame frame; QuicIOVector io_vector(MakeIOVector(data)); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); ASSERT_TRUE(creator_.ConsumeData(kClientDataStreamId1, io_vector, 0u, kOffset, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t bytes_consumed = frame.stream_frame->frame_length; EXPECT_LT(0u, bytes_consumed); creator_.Flush(); ASSERT_TRUE(serialized_packet_.encrypted_buffer); if (bytes_free > 0) { EXPECT_EQ(kDefaultMaxPacketSize - bytes_free, serialized_packet_.encrypted_length); } else { EXPECT_EQ(kDefaultMaxPacketSize, serialized_packet_.encrypted_length); } DeleteSerializedPacket(); } } TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) { QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_SERVER); QuicVersionVector versions; versions.push_back(test::QuicVersionMax()); scoped_ptr encrypted( creator_.SerializeVersionNegotiationPacket(versions)); { InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_)); } QuicFramerPeer::SetPerspective(&client_framer_, Perspective::IS_CLIENT); client_framer_.ProcessPacket(*encrypted); } TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) { EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64); creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256); creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 * 256); creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); QuicPacketCreatorPeer::SetPacketNumber(&creator_, UINT64_C(64) * 256 * 256 * 256 * 256); creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); } TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth) { EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); creator_.UpdatePacketNumberLength(1, 10000 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); creator_.UpdatePacketNumberLength(1, 10000 * 256 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); creator_.UpdatePacketNumberLength(1, 10000 * 256 * 256 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_4BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); creator_.UpdatePacketNumberLength( 1, UINT64_C(1000) * 256 * 256 * 256 * 256 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_6BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); } TEST_P(QuicPacketCreatorTest, SerializeFrame) { if (!GetParam().version_serialization) { creator_.StopSendingVersion(); } frames_.push_back( QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); SerializedPacket serialized = SerializeAllFrames(frames_); delete frames_[0].stream_frame; QuicPacketHeader header; { InSequence s; EXPECT_CALL(framer_visitor_, OnPacket()); EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_)); EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_)); EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_)); EXPECT_CALL(framer_visitor_, OnPacketHeader(_)) .WillOnce(DoAll(SaveArg<0>(&header), Return(true))); EXPECT_CALL(framer_visitor_, OnStreamFrame(_)); EXPECT_CALL(framer_visitor_, OnPacketComplete()); } ProcessPacket(serialized); EXPECT_EQ(GetParam().version_serialization, header.public_header.version_flag); } TEST_P(QuicPacketCreatorTest, ConsumeDataLargerThanOneStreamFrame) { if (!GetParam().version_serialization) { creator_.StopSendingVersion(); } // A string larger than fits into a frame. size_t payload_length; creator_.SetMaxPacketLength(GetPacketLengthForOneStream( client_framer_.version(), QuicPacketCreatorPeer::SendVersionInPacket(&creator_), QuicPacketCreatorPeer::SendPathIdInPacket(&creator_), creator_.connection_id_length(), PACKET_1BYTE_PACKET_NUMBER, &payload_length)); QuicFrame frame; const string too_long_payload(payload_length * 2, 'a'); QuicIOVector io_vector(MakeIOVector(too_long_payload)); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); ASSERT_TRUE(creator_.ConsumeData(1u, io_vector, 0u, 0u, true, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t consumed = frame.stream_frame->frame_length; EXPECT_EQ(payload_length, consumed); const string payload(payload_length, 'a'); CheckStreamFrame(frame, 1u, payload, 0u, false); creator_.Flush(); DeleteSerializedPacket(); } TEST_P(QuicPacketCreatorTest, AddFrameAndFlush) { if (!GetParam().version_serialization) { creator_.StopSendingVersion(); } const size_t max_plaintext_size = client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); EXPECT_FALSE(creator_.HasPendingFrames()); EXPECT_EQ(max_plaintext_size - GetPacketHeaderSize( creator_.connection_id_length(), QuicPacketCreatorPeer::SendVersionInPacket(&creator_), QuicPacketCreatorPeer::SendPathIdInPacket(&creator_), PACKET_1BYTE_PACKET_NUMBER), creator_.BytesFree()); // Add a variety of frame types and then a padding frame. QuicAckFrame ack_frame(MakeAckFrame(0u)); EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); EXPECT_TRUE(creator_.HasPendingFrames()); QuicFrame frame; QuicIOVector io_vector(MakeIOVector("test")); ASSERT_TRUE( creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t consumed = frame.stream_frame->frame_length; EXPECT_EQ(4u, consumed); EXPECT_TRUE(creator_.HasPendingFrames()); QuicPaddingFrame padding_frame; EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(padding_frame))); EXPECT_TRUE(creator_.HasPendingFrames()); EXPECT_EQ(0u, creator_.BytesFree()); // Packet is full. Creator will flush. EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); // Ensure the packet is successfully created. ASSERT_TRUE(serialized_packet_.encrypted_buffer); ASSERT_FALSE(serialized_packet_.retransmittable_frames.empty()); const QuicFrames& retransmittable = serialized_packet_.retransmittable_frames; ASSERT_EQ(1u, retransmittable.size()); EXPECT_EQ(STREAM_FRAME, retransmittable[0].type); ASSERT_TRUE(retransmittable[0].stream_frame); DeleteSerializedPacket(); EXPECT_FALSE(creator_.HasPendingFrames()); EXPECT_EQ(max_plaintext_size - GetPacketHeaderSize( creator_.connection_id_length(), QuicPacketCreatorPeer::SendVersionInPacket(&creator_), /*include_path_id=*/false, PACKET_1BYTE_PACKET_NUMBER), creator_.BytesFree()); } TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) { if (!GetParam().version_serialization) { creator_.StopSendingVersion(); } creator_.SetMaxPacketLength(kMaxPacketSize); // Serialized length of ack frame with 2000 nack ranges should be limited by // the number of nack ranges that can be fit in an ack frame. QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); size_t frame_len = client_framer_.GetSerializedFrameLength( QuicFrame(&ack_frame), creator_.BytesFree(), true, true, PACKET_1BYTE_PACKET_NUMBER); EXPECT_GT(creator_.BytesFree(), frame_len); EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); // Add ack frame to creator. EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); EXPECT_TRUE(creator_.HasPendingFrames()); EXPECT_GT(creator_.max_packet_length(), creator_.PacketSize()); EXPECT_LT(0u, creator_.BytesFree()); // Make sure that an additional stream frame can be added to the packet. QuicFrame frame; QuicIOVector io_vector(MakeIOVector("test")); ASSERT_TRUE( creator_.ConsumeData(2u, io_vector, 0u, 0u, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t consumed = frame.stream_frame->frame_length; EXPECT_EQ(4u, consumed); EXPECT_TRUE(creator_.HasPendingFrames()); // Ensure the packet is successfully created, and the packet size estimate // matches the serialized packet length. EXPECT_CALL(entropy_calculator_, EntropyHash(_)).WillOnce(testing::Return(0)); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); size_t est_packet_size = creator_.PacketSize(); creator_.Flush(); ASSERT_TRUE(serialized_packet_.encrypted_buffer); EXPECT_EQ(est_packet_size, client_framer_.GetMaxPlaintextSize( serialized_packet_.encrypted_length)); DeleteSerializedPacket(); } TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) { if (!GetParam().version_serialization) { creator_.StopSendingVersion(); } creator_.SetMaxPacketLength(500u); const size_t max_plaintext_size = client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()); EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree()); // Serialized length of ack frame with 2000 nack ranges should be limited by // the packet size. QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u); size_t frame_len = client_framer_.GetSerializedFrameLength( QuicFrame(&ack_frame), creator_.BytesFree(), true, true, PACKET_1BYTE_PACKET_NUMBER); EXPECT_EQ(creator_.BytesFree(), frame_len); // Add ack frame to creator. EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame))); EXPECT_TRUE(creator_.HasPendingFrames()); EXPECT_EQ(client_framer_.GetMaxPlaintextSize(creator_.max_packet_length()), creator_.PacketSize()); EXPECT_EQ(0u, creator_.BytesFree()); // Ensure the packet is successfully created, and the packet size estimate // may not match the serialized packet length. EXPECT_CALL(entropy_calculator_, EntropyHash(_)).WillOnce(Return(0)); size_t est_packet_size = creator_.PacketSize(); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillOnce(Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.Flush(); ASSERT_TRUE(serialized_packet_.encrypted_buffer); EXPECT_GE(est_packet_size, client_framer_.GetMaxPlaintextSize( serialized_packet_.encrypted_length)); DeleteSerializedPacket(); } TEST_P(QuicPacketCreatorTest, EntropyFlag) { frames_.push_back( QuicFrame(new QuicStreamFrame(0u, false, 0u, StringPiece()))); for (int i = 0; i < 2; ++i) { for (int j = 0; j < 64; ++j) { SerializedPacket serialized = SerializeAllFrames(frames_); // Verify both BoolSource and hash algorithm. bool expected_rand_bool = (mock_random_.RandUint64() & (UINT64_C(1) << j)) != 0; bool observed_rand_bool = (serialized.entropy_hash & (1 << ((j + 1) % 8))) != 0; uint8_t rest_of_hash = serialized.entropy_hash & ~(1 << ((j + 1) % 8)); EXPECT_EQ(expected_rand_bool, observed_rand_bool); EXPECT_EQ(0, rest_of_hash); } // After 64 calls, BoolSource will refresh the bucket - make sure it does. mock_random_.ChangeValue(); } delete frames_[0].stream_frame; } TEST_P(QuicPacketCreatorTest, SetCurrentPath) { // Current path is the default path. EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); EXPECT_EQ(0u, creator_.packet_number()); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); // Add a stream frame to the creator. QuicFrame frame; QuicIOVector io_vector(MakeIOVector("test")); ASSERT_TRUE( creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t consumed = frame.stream_frame->frame_length; EXPECT_EQ(4u, consumed); EXPECT_TRUE(creator_.HasPendingFrames()); EXPECT_EQ(0u, creator_.packet_number()); // Change current path. QuicPathId kPathId1 = 1; EXPECT_DFATAL(creator_.SetCurrentPath(kPathId1, 1, 0), "Unable to change paths when a packet is under construction"); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .Times(1) .WillRepeatedly( Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); creator_.Flush(); EXPECT_FALSE(creator_.HasPendingFrames()); creator_.SetCurrentPath(kPathId1, 1, 0); EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); EXPECT_FALSE(creator_.HasPendingFrames()); EXPECT_EQ(0u, creator_.packet_number()); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); // Change current path back. creator_.SetCurrentPath(kDefaultPathId, 2, 1); EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); EXPECT_EQ(1u, creator_.packet_number()); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); // Add a stream frame to the creator. ASSERT_TRUE( creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); consumed = frame.stream_frame->frame_length; EXPECT_EQ(4u, consumed); EXPECT_TRUE(creator_.HasPendingFrames()); // Does not change current path. creator_.SetCurrentPath(kDefaultPathId, 2, 0); EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); EXPECT_TRUE(creator_.HasPendingFrames()); EXPECT_EQ(1u, creator_.packet_number()); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); } TEST_P(QuicPacketCreatorTest, SetCurrentPathAndUpdatePacketSequenceNumberLength) { // Current path is the default path. EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); QuicPacketCreatorPeer::SetPacketNumber(&creator_, 64 * 256 - 2); // Add a stream frame to the creator and send the packet. QuicFrame frame; QuicIOVector io_vector(MakeIOVector("test")); ASSERT_TRUE( creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .Times(1) .WillRepeatedly( Invoke(this, &QuicPacketCreatorTest::ClearSerializedPacket)); creator_.Flush(); EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number()); creator_.UpdatePacketNumberLength(2, 10000 / kDefaultMaxPacketSize); EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); // Change current path. QuicPathId kPathId1 = 1; creator_.SetCurrentPath(kPathId1, 1, 0); EXPECT_EQ(0u, creator_.packet_number()); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); // Change current path back. creator_.SetCurrentPath(kDefaultPathId, 2, 10000 / kDefaultMaxPacketSize); EXPECT_EQ(UINT64_C(64 * 256 - 1), creator_.packet_number()); EXPECT_EQ(PACKET_2BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); } TEST_P(QuicPacketCreatorTest, SerializePacketOnDifferentPath) { // Current path is the default path. EXPECT_EQ(kDefaultPathId, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); EXPECT_EQ(0u, creator_.packet_number()); // Add a stream frame to the creator and flush the packet. QuicFrame frame; QuicIOVector io_vector(MakeIOVector("test")); ASSERT_TRUE( creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); size_t consumed = frame.stream_frame->frame_length; EXPECT_EQ(4u, consumed); EXPECT_TRUE(creator_.HasPendingFrames()); EXPECT_EQ(0u, creator_.packet_number()); EXPECT_CALL(delegate_, OnSerializedPacket(_)) .WillRepeatedly( Invoke(this, &QuicPacketCreatorTest::SaveSerializedPacket)); creator_.Flush(); EXPECT_FALSE(creator_.HasPendingFrames()); EXPECT_EQ(1u, creator_.packet_number()); // Verify serialized data packet's path id. EXPECT_EQ(kDefaultPathId, serialized_packet_.path_id); DeleteSerializedPacket(); // Change to path 1. QuicPathId kPathId1 = 1; creator_.SetCurrentPath(kPathId1, 1, 0); EXPECT_EQ(kPathId1, QuicPacketCreatorPeer::GetCurrentPath(&creator_)); EXPECT_FALSE(creator_.HasPendingFrames()); EXPECT_EQ(0u, creator_.packet_number()); EXPECT_EQ(PACKET_1BYTE_PACKET_NUMBER, QuicPacketCreatorPeer::NextPacketNumberLength(&creator_)); // Add a stream frame to the creator and flush the packet. ASSERT_TRUE( creator_.ConsumeData(1u, io_vector, 0u, 0u, false, false, &frame)); ASSERT_TRUE(frame.stream_frame); consumed = frame.stream_frame->frame_length; EXPECT_EQ(4u, consumed); EXPECT_TRUE(creator_.HasPendingFrames()); creator_.Flush(); // Verify serialized data packet's path id. EXPECT_EQ(kPathId1, serialized_packet_.path_id); DeleteSerializedPacket(); } TEST_P(QuicPacketCreatorTest, AddUnencryptedStreamDataClosesConnection) { FLAGS_quic_never_write_unencrypted_data = true; EXPECT_CALL(delegate_, OnUnrecoverableError(_, _)); QuicStreamFrame stream_frame(kHeadersStreamId, /*fin=*/false, 0u, StringPiece()); EXPECT_DFATAL(creator_.AddSavedFrame(QuicFrame(&stream_frame)), "Cannot send stream data without encryption."); } } // namespace } // namespace test } // namespace net