1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/tools/quic/quic_client_session.h"
#include <vector>
#include "net/base/ip_endpoint.h"
#include "net/quic/crypto/aes_128_gcm_12_encrypter.h"
#include "net/quic/test_tools/crypto_test_utils.h"
#include "net/quic/test_tools/quic_test_utils.h"
#include "net/tools/quic/quic_reliable_client_stream.h"
#include "testing/gtest/include/gtest/gtest.h"
using testing::_;
using net::test::CryptoTestUtils;
using net::test::PacketSavingConnection;
namespace net {
namespace tools {
namespace test {
namespace {
const char kServerHostname[] = "www.example.com";
class ToolsQuicClientSessionTest : public ::testing::Test {
protected:
ToolsQuicClientSessionTest()
: guid_(1),
connection_(new PacketSavingConnection(guid_, IPEndPoint(), false)) {
crypto_config_.SetDefaults();
session_.reset(new QuicClientSession(kServerHostname, QuicConfig(),
connection_, &crypto_config_));
session_->config()->SetDefaults();
session_->config()->set_max_streams_per_connection(1, 1);
}
void CompleteCryptoHandshake() {
ASSERT_TRUE(session_->CryptoConnect());
CryptoTestUtils::HandshakeWithFakeServer(
connection_, session_->GetCryptoStream());
}
QuicGuid guid_;
PacketSavingConnection* connection_;
scoped_ptr<QuicClientSession> session_;
QuicCryptoClientConfig crypto_config_;
};
TEST_F(ToolsQuicClientSessionTest, CryptoConnect) {
if (!Aes128Gcm12Encrypter::IsSupported()) {
LOG(INFO) << "AES GCM not supported. Test skipped.";
return;
}
CompleteCryptoHandshake();
}
TEST_F(ToolsQuicClientSessionTest, DISABLED_MaxNumConnections) {
if (!Aes128Gcm12Encrypter::IsSupported()) {
LOG(INFO) << "AES GCM not supported. Test skipped.";
return;
}
// FLAGS_max_streams_per_connection = 1;
// Initialize crypto before the client session will create a stream.
CompleteCryptoHandshake();
QuicReliableClientStream* stream =
session_->CreateOutgoingReliableStream();
ASSERT_TRUE(stream);
EXPECT_FALSE(session_->CreateOutgoingReliableStream());
// Close a stream and ensure I can now open a new one.
session_->CloseStream(stream->id());
stream = session_->CreateOutgoingReliableStream();
EXPECT_TRUE(stream);
}
TEST_F(ToolsQuicClientSessionTest, GoAwayReceived) {
if (!Aes128Gcm12Encrypter::IsSupported()) {
LOG(INFO) << "AES GCM not supported. Test skipped.";
return;
}
CompleteCryptoHandshake();
// After receiving a GoAway, I should no longer be able to create outgoing
// streams.
session_->OnGoAway(QuicGoAwayFrame(QUIC_PEER_GOING_AWAY, 1u, "Going away."));
EXPECT_EQ(NULL, session_->CreateOutgoingReliableStream());
}
} // namespace
} // namespace test
} // namespace tools
} // namespace net
|