1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/quic/quic_packet_creator.h"
7 #include "base/stl_util.h"
8 #include "net/quic/crypto/null_encrypter.h"
9 #include "net/quic/crypto/quic_decrypter.h"
10 #include "net/quic/crypto/quic_encrypter.h"
11 #include "net/quic/quic_utils.h"
12 #include "net/quic/test_tools/mock_random.h"
13 #include "net/quic/test_tools/quic_framer_peer.h"
14 #include "net/quic/test_tools/quic_packet_creator_peer.h"
15 #include "net/quic/test_tools/quic_test_utils.h"
16 #include "net/test/gtest_util.h"
17 #include "testing/gmock/include/gmock/gmock.h"
19 using base::StringPiece;
24 using testing::InSequence;
25 using testing::Return;
26 using testing::SaveArg;
33 // Run tests with combinations of {QuicVersion, ToggleVersionSerialization}.
35 TestParams(QuicVersion version,
36 bool version_serialization)
38 version_serialization(version_serialization) {
41 friend ostream& operator<<(ostream& os, const TestParams& p) {
42 os << "{ client_version: " << QuicVersionToString(p.version)
43 << " include version: " << p.version_serialization << " }";
48 bool version_serialization;
51 // Constructs various test permutations.
52 vector<TestParams> GetTestParams() {
53 vector<TestParams> params;
54 QuicVersionVector all_supported_versions = QuicSupportedVersions();
55 for (size_t i = 0; i < all_supported_versions.size(); ++i) {
56 params.push_back(TestParams(all_supported_versions[i], true));
57 params.push_back(TestParams(all_supported_versions[i], false));
62 class QuicPacketCreatorTest : public ::testing::TestWithParam<TestParams> {
64 QuicPacketCreatorTest()
65 : server_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(),
67 client_framer_(SupportedVersions(GetParam().version), QuicTime::Zero(),
72 creator_(connection_id_, &client_framer_, &mock_random_) {
73 client_framer_.set_visitor(&framer_visitor_);
74 client_framer_.set_received_entropy_calculator(&entropy_calculator_);
75 server_framer_.set_visitor(&framer_visitor_);
78 virtual ~QuicPacketCreatorTest() OVERRIDE {
81 void ProcessPacket(QuicPacket* packet) {
82 scoped_ptr<QuicEncryptedPacket> encrypted(
83 server_framer_.EncryptPacket(ENCRYPTION_NONE, sequence_number_,
85 server_framer_.ProcessPacket(*encrypted);
88 void CheckStreamFrame(const QuicFrame& frame,
89 QuicStreamId stream_id,
91 QuicStreamOffset offset,
93 EXPECT_EQ(STREAM_FRAME, frame.type);
94 ASSERT_TRUE(frame.stream_frame);
95 EXPECT_EQ(stream_id, frame.stream_frame->stream_id);
96 scoped_ptr<string> frame_data(frame.stream_frame->GetDataAsString());
97 EXPECT_EQ(data, *frame_data);
98 EXPECT_EQ(offset, frame.stream_frame->offset);
99 EXPECT_EQ(fin, frame.stream_frame->fin);
102 // Returns the number of bytes consumed by the header of packet, including
104 size_t GetPacketHeaderOverhead(InFecGroup is_in_fec_group) {
105 return GetPacketHeaderSize(creator_.connection_id_length(),
107 creator_.next_sequence_number_length(),
111 // Returns the number of bytes of overhead that will be added to a packet
112 // of maximum length.
113 size_t GetEncryptionOverhead() {
114 return creator_.max_packet_length() - client_framer_.GetMaxPlaintextSize(
115 creator_.max_packet_length());
118 // Returns the number of bytes consumed by the non-data fields of a stream
119 // frame, assuming it is the last frame in the packet
120 size_t GetStreamFrameOverhead(InFecGroup is_in_fec_group) {
121 return QuicFramer::GetMinStreamFrameSize(kClientDataStreamId1, kOffset,
122 true, is_in_fec_group);
125 // Enables and turns on FEC protection. Returns true if FEC protection is on.
126 bool SwitchFecProtectionOn(size_t max_packets_per_fec_group) {
127 creator_.set_max_packets_per_fec_group(max_packets_per_fec_group);
128 creator_.StartFecProtectingPackets();
129 return creator_.IsFecProtected();
132 static const QuicStreamOffset kOffset = 1u;
135 QuicFramer server_framer_;
136 QuicFramer client_framer_;
137 testing::StrictMock<MockFramerVisitor> framer_visitor_;
138 QuicPacketSequenceNumber sequence_number_;
139 QuicConnectionId connection_id_;
141 MockRandom mock_random_;
142 QuicPacketCreator creator_;
143 MockEntropyCalculator entropy_calculator_;
146 // Run all packet creator tests with all supported versions of QUIC, and with
147 // and without version in the packet header.
148 INSTANTIATE_TEST_CASE_P(QuicPacketCreatorTests,
149 QuicPacketCreatorTest,
150 ::testing::ValuesIn(GetTestParams()));
152 TEST_P(QuicPacketCreatorTest, SerializeFrames) {
153 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u))));
154 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
155 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, true, 0u, IOVector())));
156 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
157 delete frames_[0].ack_frame;
158 delete frames_[1].stream_frame;
159 delete frames_[2].stream_frame;
163 EXPECT_CALL(framer_visitor_, OnPacket());
164 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
165 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
166 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
167 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
168 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
169 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
170 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
171 EXPECT_CALL(framer_visitor_, OnPacketComplete());
173 ProcessPacket(serialized.packet);
174 delete serialized.packet;
177 TEST_P(QuicPacketCreatorTest, SerializeWithFEC) {
178 // Enable FEC protection, and send FEC packet every 6 packets.
179 EXPECT_TRUE(SwitchFecProtectionOn(6));
180 // Should return false since we do not have enough packets in the FEC group to
181 // trigger an FEC packet.
182 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
184 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
185 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
186 delete frames_[0].stream_frame;
190 EXPECT_CALL(framer_visitor_, OnPacket());
191 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
192 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
193 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
194 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
195 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_));
196 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
197 EXPECT_CALL(framer_visitor_, OnPacketComplete());
199 ProcessPacket(serialized.packet);
200 delete serialized.packet;
202 // Should return false since we do not have enough packets in the FEC group to
203 // trigger an FEC packet.
204 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
205 // Should return true since there are packets in the FEC group.
206 ASSERT_TRUE(creator_.ShouldSendFec(/*force_close=*/true));
208 serialized = creator_.SerializeFec();
209 ASSERT_EQ(2u, serialized.sequence_number);
212 EXPECT_CALL(framer_visitor_, OnPacket());
213 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
214 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
215 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
216 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
217 EXPECT_CALL(framer_visitor_, OnFecData(_));
218 EXPECT_CALL(framer_visitor_, OnPacketComplete());
220 ProcessPacket(serialized.packet);
221 delete serialized.packet;
224 TEST_P(QuicPacketCreatorTest, SerializeChangingSequenceNumberLength) {
225 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u))));
226 creator_.AddSavedFrame(frames_[0]);
227 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER);
228 SerializedPacket serialized = creator_.SerializePacket();
229 // The sequence number length will not change mid-packet.
230 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
234 EXPECT_CALL(framer_visitor_, OnPacket());
235 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
236 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
237 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
238 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
239 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
240 EXPECT_CALL(framer_visitor_, OnPacketComplete());
242 ProcessPacket(serialized.packet);
243 delete serialized.packet;
245 creator_.AddSavedFrame(frames_[0]);
246 serialized = creator_.SerializePacket();
247 // Now the actual sequence number length should have changed.
248 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
249 delete frames_[0].ack_frame;
253 EXPECT_CALL(framer_visitor_, OnPacket());
254 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
255 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
256 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
257 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
258 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
259 EXPECT_CALL(framer_visitor_, OnPacketComplete());
261 ProcessPacket(serialized.packet);
262 delete serialized.packet;
265 TEST_P(QuicPacketCreatorTest, ChangeSequenceNumberLengthMidPacket) {
266 // Changing the sequence number length with queued frames in the creator
267 // should hold the change until after any currently queued frames are
271 // Queue a frame in the creator.
272 EXPECT_FALSE(creator_.HasPendingFrames());
273 QuicFrame ack_frame = QuicFrame(new QuicAckFrame(MakeAckFrame(0u)));
274 creator_.AddSavedFrame(ack_frame);
276 // Now change sequence number length.
277 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER);
279 // Add a STOP_WAITING frame since it contains a packet sequence number,
280 // whose length should be 1.
281 QuicStopWaitingFrame stop_waiting_frame;
282 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame)));
283 EXPECT_TRUE(creator_.HasPendingFrames());
285 // Ensure the packet is successfully created.
286 SerializedPacket serialized = creator_.SerializePacket();
287 ASSERT_TRUE(serialized.packet);
288 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
290 // Verify that header in transmitted packet has 1 byte sequence length.
291 QuicPacketHeader header;
294 EXPECT_CALL(framer_visitor_, OnPacket());
295 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
296 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
297 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
298 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce(
299 DoAll(SaveArg<0>(&header), Return(true)));
300 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
301 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_));
302 EXPECT_CALL(framer_visitor_, OnPacketComplete());
304 ProcessPacket(serialized.packet);
305 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
306 header.public_header.sequence_number_length);
307 delete serialized.packet;
310 EXPECT_FALSE(creator_.HasPendingFrames());
311 // Generate Packet 2 with one frame -- sequence number length should now
312 // change to 4 bytes.
313 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&stop_waiting_frame)));
314 EXPECT_TRUE(creator_.HasPendingFrames());
316 // Ensure the packet is successfully created.
317 serialized = creator_.SerializePacket();
318 ASSERT_TRUE(serialized.packet);
319 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
321 // Verify that header in transmitted packet has 4 byte sequence length.
324 EXPECT_CALL(framer_visitor_, OnPacket());
325 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
326 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
327 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
328 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce(
329 DoAll(SaveArg<0>(&header), Return(true)));
330 EXPECT_CALL(framer_visitor_, OnStopWaitingFrame(_));
331 EXPECT_CALL(framer_visitor_, OnPacketComplete());
333 ProcessPacket(serialized.packet);
334 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
335 header.public_header.sequence_number_length);
337 delete serialized.packet;
338 delete ack_frame.ack_frame;
341 TEST_P(QuicPacketCreatorTest, SerializeWithFECChangingSequenceNumberLength) {
342 // Test goal is to test the following sequence (P1 => generate Packet 1):
343 // P1 <change seq num length> P2 FEC,
344 // and we expect that sequence number length should not change until the end
345 // of the open FEC group.
347 // Enable FEC protection, and send FEC packet every 6 packets.
348 EXPECT_TRUE(SwitchFecProtectionOn(6));
349 // Should return false since we do not have enough packets in the FEC group to
350 // trigger an FEC packet.
351 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
352 frames_.push_back(QuicFrame(new QuicAckFrame(MakeAckFrame(0u))));
354 // Generate Packet 1.
355 creator_.AddSavedFrame(frames_[0]);
356 // Change the sequence number length mid-FEC group and it should not change.
357 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER);
358 SerializedPacket serialized = creator_.SerializePacket();
359 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
363 EXPECT_CALL(framer_visitor_, OnPacket());
364 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
365 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
366 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
367 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
368 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_));
369 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
370 EXPECT_CALL(framer_visitor_, OnPacketComplete());
372 ProcessPacket(serialized.packet);
373 delete serialized.packet;
375 // Generate Packet 2.
376 creator_.AddSavedFrame(frames_[0]);
377 serialized = creator_.SerializePacket();
378 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
382 EXPECT_CALL(framer_visitor_, OnPacket());
383 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
384 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
385 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
386 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
387 EXPECT_CALL(framer_visitor_, OnFecProtectedPayload(_));
388 EXPECT_CALL(framer_visitor_, OnAckFrame(_));
389 EXPECT_CALL(framer_visitor_, OnPacketComplete());
391 ProcessPacket(serialized.packet);
392 delete serialized.packet;
394 // Should return false since we do not have enough packets in the FEC group to
395 // trigger an FEC packet.
396 ASSERT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
397 // Should return true since there are packets in the FEC group.
398 ASSERT_TRUE(creator_.ShouldSendFec(/*force_close=*/true));
400 // Force generation of FEC packet.
401 serialized = creator_.SerializeFec();
402 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
403 ASSERT_EQ(3u, serialized.sequence_number);
407 EXPECT_CALL(framer_visitor_, OnPacket());
408 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
409 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
410 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
411 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
412 EXPECT_CALL(framer_visitor_, OnFecData(_));
413 EXPECT_CALL(framer_visitor_, OnPacketComplete());
415 ProcessPacket(serialized.packet);
416 delete serialized.packet;
418 // Ensure the next FEC group starts using the new sequence number length.
419 serialized = creator_.SerializeAllFrames(frames_);
420 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
421 delete frames_[0].ack_frame;
422 delete serialized.packet;
425 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithSequenceNumberLength) {
426 // If the original packet sequence number length, the current sequence number
427 // length, and the configured send sequence number length are different, the
428 // retransmit must sent with the original length and the others do not change.
429 creator_.set_next_sequence_number_length(PACKET_4BYTE_SEQUENCE_NUMBER);
430 QuicPacketCreatorPeer::SetSequenceNumberLength(&creator_,
431 PACKET_2BYTE_SEQUENCE_NUMBER);
432 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
433 SerializedPacket serialized =
434 creator_.ReserializeAllFrames(frames_, PACKET_1BYTE_SEQUENCE_NUMBER);
435 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
436 creator_.next_sequence_number_length());
437 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER,
438 QuicPacketCreatorPeer::GetSequenceNumberLength(&creator_));
439 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER, serialized.sequence_number_length);
440 delete frames_[0].stream_frame;
444 EXPECT_CALL(framer_visitor_, OnPacket());
445 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
446 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
447 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
448 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
449 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
450 EXPECT_CALL(framer_visitor_, OnPacketComplete());
452 ProcessPacket(serialized.packet);
453 delete serialized.packet;
456 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithPadding) {
457 scoped_ptr<QuicStreamFrame> stream_frame(
458 new QuicStreamFrame(kCryptoStreamId, /*fin=*/ false, /*offset=*/ 0,
459 MakeIOVector("fake handshake message data")));
460 frames_.push_back(QuicFrame(stream_frame.get()));
461 SerializedPacket serialized =
462 creator_.ReserializeAllFrames(frames_,
463 creator_.next_sequence_number_length());
465 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize),
466 serialized.packet->length());
467 delete serialized.packet;
470 TEST_P(QuicPacketCreatorTest, ReserializeFramesWithFullPacketAndPadding) {
471 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
472 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
473 size_t capacity = kDefaultMaxPacketSize - overhead;
474 for (int delta = -5; delta <= 0; ++delta) {
475 string data(capacity + delta, 'A');
476 size_t bytes_free = 0 - delta;
478 scoped_ptr<QuicStreamFrame> stream_frame(
479 new QuicStreamFrame(kCryptoStreamId, /*fin=*/ false, kOffset,
480 MakeIOVector(data)));
481 frames_.push_back(QuicFrame(stream_frame.get()));
482 SerializedPacket serialized =
483 creator_.ReserializeAllFrames(frames_,
484 creator_.next_sequence_number_length());
486 // If there is not enough space in the packet to fit a padding frame
487 // (1 byte) and to expand the stream frame (another 2 bytes) the packet
488 // will not be padded.
489 if (bytes_free < 3) {
490 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize)
491 - bytes_free, serialized.packet->length());
493 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize),
494 serialized.packet->length());
497 delete serialized.packet;
502 TEST_P(QuicPacketCreatorTest, SerializeConnectionClose) {
503 QuicConnectionCloseFrame frame;
504 frame.error_code = QUIC_NO_ERROR;
505 frame.error_details = "error";
507 SerializedPacket serialized = creator_.SerializeConnectionClose(&frame);
508 ASSERT_EQ(1u, serialized.sequence_number);
509 ASSERT_EQ(1u, creator_.sequence_number());
512 EXPECT_CALL(framer_visitor_, OnPacket());
513 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
514 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
515 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
516 EXPECT_CALL(framer_visitor_, OnPacketHeader(_));
517 EXPECT_CALL(framer_visitor_, OnConnectionCloseFrame(_));
518 EXPECT_CALL(framer_visitor_, OnPacketComplete());
520 ProcessPacket(serialized.packet);
521 delete serialized.packet;
524 TEST_P(QuicPacketCreatorTest, SwitchFecOnOffWithNoGroup) {
525 // Enable FEC protection.
526 creator_.set_max_packets_per_fec_group(6);
527 EXPECT_TRUE(creator_.IsFecEnabled());
528 EXPECT_FALSE(creator_.IsFecProtected());
530 // Turn on FEC protection.
531 creator_.StartFecProtectingPackets();
532 EXPECT_TRUE(creator_.IsFecProtected());
533 // We have no packets in the FEC group, so no FEC packet can be created.
534 EXPECT_FALSE(creator_.ShouldSendFec(/*force_close=*/true));
535 // Since no packets are in FEC group yet, we should be able to turn FEC
536 // off with no trouble.
537 creator_.StopFecProtectingPackets();
538 EXPECT_FALSE(creator_.IsFecProtected());
541 TEST_P(QuicPacketCreatorTest, SwitchFecOnOffWithGroupInProgress) {
542 // Enable FEC protection, and send FEC packet every 6 packets.
543 EXPECT_TRUE(SwitchFecProtectionOn(6));
544 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
545 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
546 delete frames_[0].stream_frame;
547 delete serialized.packet;
549 EXPECT_TRUE(creator_.IsFecProtected());
550 // We do not have enough packets in the FEC group to trigger an FEC packet.
551 EXPECT_FALSE(creator_.ShouldSendFec(/*force_close=*/false));
552 // Should return true since there are packets in the FEC group.
553 EXPECT_TRUE(creator_.ShouldSendFec(/*force_close=*/true));
555 // Switching FEC off should not change creator state, since there is an
556 // FEC packet under construction.
557 EXPECT_DFATAL(creator_.StopFecProtectingPackets(),
558 "Cannot stop FEC protection with open FEC group.");
559 EXPECT_TRUE(creator_.IsFecProtected());
560 // Confirm that FEC packet is still under construction.
561 EXPECT_TRUE(creator_.ShouldSendFec(/*force_close=*/true));
563 serialized = creator_.SerializeFec();
564 delete serialized.packet;
566 // Switching FEC on/off should work now.
567 creator_.StopFecProtectingPackets();
568 EXPECT_FALSE(creator_.IsFecProtected());
569 creator_.StartFecProtectingPackets();
570 EXPECT_TRUE(creator_.IsFecProtected());
573 TEST_P(QuicPacketCreatorTest, SwitchFecOnWithStreamFrameQueued) {
574 // Add a stream frame to the creator.
576 size_t consumed = creator_.CreateStreamFrame(
577 1u, MakeIOVector("test"), 0u, false, &frame);
578 EXPECT_EQ(4u, consumed);
579 ASSERT_TRUE(frame.stream_frame);
580 EXPECT_TRUE(creator_.AddSavedFrame(frame));
581 EXPECT_TRUE(creator_.HasPendingFrames());
583 // Enable FEC protection, and send FEC packet every 6 packets.
584 creator_.set_max_packets_per_fec_group(6);
585 EXPECT_TRUE(creator_.IsFecEnabled());
586 EXPECT_DFATAL(creator_.StartFecProtectingPackets(),
587 "Cannot start FEC protection with pending frames.");
588 EXPECT_FALSE(creator_.IsFecProtected());
590 // Serialize packet for transmission.
591 SerializedPacket serialized = creator_.SerializePacket();
592 delete serialized.packet;
593 delete serialized.retransmittable_frames;
594 EXPECT_FALSE(creator_.HasPendingFrames());
596 // Since all pending frames have been serialized, turning FEC on should work.
597 creator_.StartFecProtectingPackets();
598 EXPECT_TRUE(creator_.IsFecProtected());
601 TEST_P(QuicPacketCreatorTest, CreateStreamFrame) {
603 size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 0u,
605 EXPECT_EQ(4u, consumed);
606 CheckStreamFrame(frame, 1u, "test", 0u, false);
607 delete frame.stream_frame;
610 TEST_P(QuicPacketCreatorTest, CreateStreamFrameFin) {
612 size_t consumed = creator_.CreateStreamFrame(1u, MakeIOVector("test"), 10u,
614 EXPECT_EQ(4u, consumed);
615 CheckStreamFrame(frame, 1u, "test", 10u, true);
616 delete frame.stream_frame;
619 TEST_P(QuicPacketCreatorTest, CreateStreamFrameFinOnly) {
621 size_t consumed = creator_.CreateStreamFrame(1u, IOVector(), 0u, true,
623 EXPECT_EQ(0u, consumed);
624 CheckStreamFrame(frame, 1u, string(), 0u, true);
625 delete frame.stream_frame;
628 TEST_P(QuicPacketCreatorTest, CreateAllFreeBytesForStreamFrames) {
629 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
630 + GetEncryptionOverhead();
631 for (size_t i = overhead; i < overhead + 100; ++i) {
632 creator_.set_max_packet_length(i);
633 const bool should_have_room = i > overhead + GetStreamFrameOverhead(
635 ASSERT_EQ(should_have_room, creator_.HasRoomForStreamFrame(
636 kClientDataStreamId1, kOffset));
637 if (should_have_room) {
639 size_t bytes_consumed = creator_.CreateStreamFrame(
640 kClientDataStreamId1, MakeIOVector("testdata"), kOffset, false,
642 EXPECT_LT(0u, bytes_consumed);
643 ASSERT_TRUE(creator_.AddSavedFrame(frame));
644 SerializedPacket serialized_packet = creator_.SerializePacket();
645 ASSERT_TRUE(serialized_packet.packet);
646 delete serialized_packet.packet;
647 delete serialized_packet.retransmittable_frames;
652 TEST_P(QuicPacketCreatorTest, StreamFrameConsumption) {
653 // Compute the total overhead for a single frame in packet.
654 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
655 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
656 size_t capacity = kDefaultMaxPacketSize - overhead;
657 // Now, test various sizes around this size.
658 for (int delta = -5; delta <= 5; ++delta) {
659 string data(capacity + delta, 'A');
660 size_t bytes_free = delta > 0 ? 0 : 0 - delta;
662 size_t bytes_consumed = creator_.CreateStreamFrame(
663 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame);
664 EXPECT_EQ(capacity - bytes_free, bytes_consumed);
666 ASSERT_TRUE(creator_.AddSavedFrame(frame));
667 // BytesFree() returns bytes available for the next frame, which will
668 // be two bytes smaller since the stream frame would need to be grown.
669 EXPECT_EQ(2u, creator_.ExpansionOnNewFrame());
670 size_t expected_bytes_free = bytes_free < 3 ? 0 : bytes_free - 2;
671 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta;
672 SerializedPacket serialized_packet = creator_.SerializePacket();
673 ASSERT_TRUE(serialized_packet.packet);
674 delete serialized_packet.packet;
675 delete serialized_packet.retransmittable_frames;
679 TEST_P(QuicPacketCreatorTest, StreamFrameConsumptionWithFec) {
680 // Enable FEC protection, and send FEC packet every 6 packets.
681 EXPECT_TRUE(SwitchFecProtectionOn(6));
682 // Compute the total overhead for a single frame in packet.
683 const size_t overhead = GetPacketHeaderOverhead(IN_FEC_GROUP)
684 + GetEncryptionOverhead() + GetStreamFrameOverhead(IN_FEC_GROUP);
685 size_t capacity = kDefaultMaxPacketSize - overhead;
686 // Now, test various sizes around this size.
687 for (int delta = -5; delta <= 5; ++delta) {
688 string data(capacity + delta, 'A');
689 size_t bytes_free = delta > 0 ? 0 : 0 - delta;
691 size_t bytes_consumed = creator_.CreateStreamFrame(
692 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame);
693 EXPECT_EQ(capacity - bytes_free, bytes_consumed);
695 ASSERT_TRUE(creator_.AddSavedFrame(frame));
696 // BytesFree() returns bytes available for the next frame. Since stream
697 // frame does not grow for FEC protected packets, this should be the same
698 // as bytes_free (bound by 0).
699 EXPECT_EQ(0u, creator_.ExpansionOnNewFrame());
700 size_t expected_bytes_free = bytes_free > 0 ? bytes_free : 0;
701 EXPECT_EQ(expected_bytes_free, creator_.BytesFree()) << "delta: " << delta;
702 SerializedPacket serialized_packet = creator_.SerializePacket();
703 ASSERT_TRUE(serialized_packet.packet);
704 delete serialized_packet.packet;
705 delete serialized_packet.retransmittable_frames;
709 TEST_P(QuicPacketCreatorTest, CryptoStreamFramePacketPadding) {
710 // Compute the total overhead for a single frame in packet.
711 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
712 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
713 ASSERT_GT(kMaxPacketSize, overhead);
714 size_t capacity = kDefaultMaxPacketSize - overhead;
715 // Now, test various sizes around this size.
716 for (int delta = -5; delta <= 5; ++delta) {
717 string data(capacity + delta, 'A');
718 size_t bytes_free = delta > 0 ? 0 : 0 - delta;
721 size_t bytes_consumed = creator_.CreateStreamFrame(
722 kCryptoStreamId, MakeIOVector(data), kOffset, false, &frame);
723 EXPECT_LT(0u, bytes_consumed);
724 ASSERT_TRUE(creator_.AddSavedFrame(frame));
725 SerializedPacket serialized_packet = creator_.SerializePacket();
726 ASSERT_TRUE(serialized_packet.packet);
727 // If there is not enough space in the packet to fit a padding frame
728 // (1 byte) and to expand the stream frame (another 2 bytes) the packet
729 // will not be padded.
730 if (bytes_free < 3) {
731 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize)
732 - bytes_free, serialized_packet.packet->length());
734 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize),
735 serialized_packet.packet->length());
737 delete serialized_packet.packet;
738 delete serialized_packet.retransmittable_frames;
742 TEST_P(QuicPacketCreatorTest, NonCryptoStreamFramePacketNonPadding) {
743 // Compute the total overhead for a single frame in packet.
744 const size_t overhead = GetPacketHeaderOverhead(NOT_IN_FEC_GROUP)
745 + GetEncryptionOverhead() + GetStreamFrameOverhead(NOT_IN_FEC_GROUP);
746 ASSERT_GT(kDefaultMaxPacketSize, overhead);
747 size_t capacity = kDefaultMaxPacketSize - overhead;
748 // Now, test various sizes around this size.
749 for (int delta = -5; delta <= 5; ++delta) {
750 string data(capacity + delta, 'A');
751 size_t bytes_free = delta > 0 ? 0 : 0 - delta;
754 size_t bytes_consumed = creator_.CreateStreamFrame(
755 kClientDataStreamId1, MakeIOVector(data), kOffset, false, &frame);
756 EXPECT_LT(0u, bytes_consumed);
757 ASSERT_TRUE(creator_.AddSavedFrame(frame));
758 SerializedPacket serialized_packet = creator_.SerializePacket();
759 ASSERT_TRUE(serialized_packet.packet);
760 if (bytes_free > 0) {
761 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize)
762 - bytes_free, serialized_packet.packet->length());
764 EXPECT_EQ(client_framer_.GetMaxPlaintextSize(kDefaultMaxPacketSize),
765 serialized_packet.packet->length());
767 delete serialized_packet.packet;
768 delete serialized_packet.retransmittable_frames;
772 TEST_P(QuicPacketCreatorTest, SerializeVersionNegotiationPacket) {
773 QuicFramerPeer::SetIsServer(&client_framer_, true);
774 QuicVersionVector versions;
775 versions.push_back(test::QuicVersionMax());
776 scoped_ptr<QuicEncryptedPacket> encrypted(
777 creator_.SerializeVersionNegotiationPacket(versions));
781 EXPECT_CALL(framer_visitor_, OnPacket());
782 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
783 EXPECT_CALL(framer_visitor_, OnVersionNegotiationPacket(_));
785 QuicFramerPeer::SetIsServer(&client_framer_, false);
786 client_framer_.ProcessPacket(*encrypted);
789 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthLeastAwaiting) {
790 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
791 creator_.next_sequence_number_length());
793 size_t max_packets_per_fec_group = 10;
794 creator_.set_max_packets_per_fec_group(max_packets_per_fec_group);
795 creator_.set_sequence_number(64 - max_packets_per_fec_group);
796 creator_.UpdateSequenceNumberLength(2, 10000);
797 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
798 creator_.next_sequence_number_length());
800 creator_.set_sequence_number(64 * 256 - max_packets_per_fec_group);
801 creator_.UpdateSequenceNumberLength(2, 10000);
802 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER,
803 creator_.next_sequence_number_length());
805 creator_.set_sequence_number(64 * 256 * 256 - max_packets_per_fec_group);
806 creator_.UpdateSequenceNumberLength(2, 10000);
807 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
808 creator_.next_sequence_number_length());
810 creator_.set_sequence_number(
811 GG_UINT64_C(64) * 256 * 256 * 256 * 256 - max_packets_per_fec_group);
812 creator_.UpdateSequenceNumberLength(2, 10000);
813 EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER,
814 creator_.next_sequence_number_length());
817 TEST_P(QuicPacketCreatorTest, UpdatePacketSequenceNumberLengthBandwidth) {
818 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
819 creator_.next_sequence_number_length());
821 creator_.UpdateSequenceNumberLength(1, 10000);
822 EXPECT_EQ(PACKET_1BYTE_SEQUENCE_NUMBER,
823 creator_.next_sequence_number_length());
825 creator_.UpdateSequenceNumberLength(1, 10000 * 256);
826 EXPECT_EQ(PACKET_2BYTE_SEQUENCE_NUMBER,
827 creator_.next_sequence_number_length());
829 creator_.UpdateSequenceNumberLength(1, 10000 * 256 * 256);
830 EXPECT_EQ(PACKET_4BYTE_SEQUENCE_NUMBER,
831 creator_.next_sequence_number_length());
833 creator_.UpdateSequenceNumberLength(
834 1, GG_UINT64_C(1000) * 256 * 256 * 256 * 256);
835 EXPECT_EQ(PACKET_6BYTE_SEQUENCE_NUMBER,
836 creator_.next_sequence_number_length());
839 TEST_P(QuicPacketCreatorTest, CreateStreamFrameWithNotifier) {
840 // Ensure that if CreateStreamFrame does not consume any data (e.g. a FIN only
841 // frame) then any QuicAckNotifier that is passed in still gets attached to
843 scoped_refptr<MockAckNotifierDelegate> delegate(new MockAckNotifierDelegate);
844 QuicAckNotifier notifier(delegate.get());
846 IOVector empty_iovector;
848 size_t consumed_bytes = creator_.CreateStreamFrameWithNotifier(
849 1u, empty_iovector, 0u, fin, ¬ifier, &frame);
850 EXPECT_EQ(0u, consumed_bytes);
851 EXPECT_EQ(¬ifier, frame.stream_frame->notifier);
852 delete frame.stream_frame;
855 TEST_P(QuicPacketCreatorTest, SerializeFrame) {
856 if (!GetParam().version_serialization) {
857 creator_.StopSendingVersion();
859 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
860 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
861 delete frames_[0].stream_frame;
863 QuicPacketHeader header;
866 EXPECT_CALL(framer_visitor_, OnPacket());
867 EXPECT_CALL(framer_visitor_, OnUnauthenticatedPublicHeader(_));
868 EXPECT_CALL(framer_visitor_, OnUnauthenticatedHeader(_));
869 EXPECT_CALL(framer_visitor_, OnDecryptedPacket(_));
870 EXPECT_CALL(framer_visitor_, OnPacketHeader(_)).WillOnce(
871 DoAll(SaveArg<0>(&header), Return(true)));
872 EXPECT_CALL(framer_visitor_, OnStreamFrame(_));
873 EXPECT_CALL(framer_visitor_, OnPacketComplete());
875 ProcessPacket(serialized.packet);
876 EXPECT_EQ(GetParam().version_serialization,
877 header.public_header.version_flag);
878 delete serialized.packet;
881 TEST_P(QuicPacketCreatorTest, CreateStreamFrameTooLarge) {
882 if (!GetParam().version_serialization) {
883 creator_.StopSendingVersion();
885 // A string larger than fits into a frame.
886 size_t payload_length;
887 creator_.set_max_packet_length(GetPacketLengthForOneStream(
888 client_framer_.version(),
889 QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
890 PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP, &payload_length));
892 const string too_long_payload(payload_length * 2, 'a');
893 size_t consumed = creator_.CreateStreamFrame(
894 1u, MakeIOVector(too_long_payload), 0u, true, &frame);
895 EXPECT_EQ(payload_length, consumed);
896 const string payload(payload_length, 'a');
897 CheckStreamFrame(frame, 1u, payload, 0u, false);
898 delete frame.stream_frame;
901 TEST_P(QuicPacketCreatorTest, AddFrameAndSerialize) {
902 if (!GetParam().version_serialization) {
903 creator_.StopSendingVersion();
905 const size_t max_plaintext_size =
906 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length());
907 EXPECT_FALSE(creator_.HasPendingFrames());
908 EXPECT_EQ(max_plaintext_size -
910 creator_.connection_id_length(),
911 QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
912 PACKET_1BYTE_SEQUENCE_NUMBER, NOT_IN_FEC_GROUP),
913 creator_.BytesFree());
915 // Add a variety of frame types and then a padding frame.
916 QuicAckFrame ack_frame(MakeAckFrame(0u));
917 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
918 EXPECT_TRUE(creator_.HasPendingFrames());
920 QuicCongestionFeedbackFrame congestion_feedback;
921 congestion_feedback.type = kTCP;
922 congestion_feedback.tcp.receive_window = 0x4030;
923 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&congestion_feedback)));
924 EXPECT_TRUE(creator_.HasPendingFrames());
927 size_t consumed = creator_.CreateStreamFrame(
928 1u, MakeIOVector("test"), 0u, false, &frame);
929 EXPECT_EQ(4u, consumed);
930 ASSERT_TRUE(frame.stream_frame);
931 EXPECT_TRUE(creator_.AddSavedFrame(frame));
932 EXPECT_TRUE(creator_.HasPendingFrames());
934 QuicPaddingFrame padding_frame;
935 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&padding_frame)));
936 EXPECT_TRUE(creator_.HasPendingFrames());
937 EXPECT_EQ(0u, creator_.BytesFree());
939 EXPECT_FALSE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
941 // Ensure the packet is successfully created.
942 SerializedPacket serialized = creator_.SerializePacket();
943 ASSERT_TRUE(serialized.packet);
944 delete serialized.packet;
945 ASSERT_TRUE(serialized.retransmittable_frames);
946 RetransmittableFrames* retransmittable = serialized.retransmittable_frames;
947 ASSERT_EQ(1u, retransmittable->frames().size());
948 EXPECT_EQ(STREAM_FRAME, retransmittable->frames()[0].type);
949 ASSERT_TRUE(retransmittable->frames()[0].stream_frame);
950 delete serialized.retransmittable_frames;
952 EXPECT_FALSE(creator_.HasPendingFrames());
953 EXPECT_EQ(max_plaintext_size -
955 creator_.connection_id_length(),
956 QuicPacketCreatorPeer::SendVersionInPacket(&creator_),
957 PACKET_1BYTE_SEQUENCE_NUMBER,
959 creator_.BytesFree());
962 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithLargePacketSize) {
963 if (!GetParam().version_serialization) {
964 creator_.StopSendingVersion();
966 creator_.set_max_packet_length(kMaxPacketSize);
967 const size_t max_plaintext_size =
968 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length());
970 // Serialized length of ack frame with 2000 nack ranges should be limited by
971 // the number of nack ranges that can be fit in an ack frame.
972 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u);
973 size_t frame_len = client_framer_.GetSerializedFrameLength(
974 QuicFrame(&ack_frame), creator_.BytesFree(), true, true,
975 NOT_IN_FEC_GROUP, PACKET_1BYTE_SEQUENCE_NUMBER);
976 EXPECT_GT(creator_.BytesFree(), frame_len);
977 EXPECT_GT(max_plaintext_size, creator_.PacketSize());
979 // Add ack frame to creator.
980 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
981 EXPECT_TRUE(creator_.HasPendingFrames());
982 EXPECT_GT(max_plaintext_size, creator_.PacketSize());
983 EXPECT_LT(0u, creator_.BytesFree());
985 // Make sure that an additional stream frame can be added to the packet.
986 QuicFrame stream_frame;
987 size_t consumed = creator_.CreateStreamFrame(
988 2u, MakeIOVector("test"), 0u, false, &stream_frame);
989 EXPECT_EQ(4u, consumed);
990 ASSERT_TRUE(stream_frame.stream_frame);
991 EXPECT_TRUE(creator_.AddSavedFrame(stream_frame));
992 EXPECT_TRUE(creator_.HasPendingFrames());
994 // Ensure the packet is successfully created, and the packet size estimate
995 // matches the serialized packet length.
996 EXPECT_CALL(entropy_calculator_,
997 EntropyHash(_)).WillOnce(testing::Return(0));
998 size_t est_packet_size = creator_.PacketSize();
999 SerializedPacket serialized = creator_.SerializePacket();
1000 ASSERT_TRUE(serialized.packet);
1001 EXPECT_EQ(est_packet_size, serialized.packet->length());
1002 delete serialized.retransmittable_frames;
1003 delete serialized.packet;
1006 TEST_P(QuicPacketCreatorTest, SerializeTruncatedAckFrameWithSmallPacketSize) {
1007 if (!GetParam().version_serialization) {
1008 creator_.StopSendingVersion();
1010 creator_.set_max_packet_length(500u);
1012 const size_t max_plaintext_size =
1013 client_framer_.GetMaxPlaintextSize(creator_.max_packet_length());
1014 EXPECT_EQ(max_plaintext_size - creator_.PacketSize(), creator_.BytesFree());
1016 // Serialized length of ack frame with 2000 nack ranges should be limited by
1018 QuicAckFrame ack_frame = MakeAckFrameWithNackRanges(2000u, 0u);
1019 size_t frame_len = client_framer_.GetSerializedFrameLength(
1020 QuicFrame(&ack_frame), creator_.BytesFree(), true, true,
1021 NOT_IN_FEC_GROUP, PACKET_1BYTE_SEQUENCE_NUMBER);
1022 EXPECT_EQ(creator_.BytesFree(), frame_len);
1024 // Add ack frame to creator.
1025 EXPECT_TRUE(creator_.AddSavedFrame(QuicFrame(&ack_frame)));
1026 EXPECT_TRUE(creator_.HasPendingFrames());
1027 EXPECT_EQ(max_plaintext_size, creator_.PacketSize());
1028 EXPECT_EQ(0u, creator_.BytesFree());
1030 // Ensure the packet is successfully created, and the packet size estimate
1031 // may not match the serialized packet length.
1032 EXPECT_CALL(entropy_calculator_,
1033 EntropyHash(_)).WillOnce(Return(0));
1034 size_t est_packet_size = creator_.PacketSize();
1035 SerializedPacket serialized = creator_.SerializePacket();
1036 ASSERT_TRUE(serialized.packet);
1037 EXPECT_GE(est_packet_size, serialized.packet->length());
1038 delete serialized.packet;
1042 TEST_P(QuicPacketCreatorTest, EntropyFlag) {
1043 frames_.push_back(QuicFrame(new QuicStreamFrame(0u, false, 0u, IOVector())));
1045 for (int i = 0; i < 2; ++i) {
1046 for (int j = 0; j < 64; ++j) {
1047 SerializedPacket serialized = creator_.SerializeAllFrames(frames_);
1048 // Verify both BoolSource and hash algorithm.
1049 bool expected_rand_bool =
1050 (mock_random_.RandUint64() & (GG_UINT64_C(1) << j)) != 0;
1051 bool observed_rand_bool =
1052 (serialized.entropy_hash & (1 << ((j+1) % 8))) != 0;
1053 uint8 rest_of_hash = serialized.entropy_hash & ~(1 << ((j+1) % 8));
1054 EXPECT_EQ(expected_rand_bool, observed_rand_bool);
1055 EXPECT_EQ(0, rest_of_hash);
1056 delete serialized.packet;
1058 // After 64 calls, BoolSource will refresh the bucket - make sure it does.
1059 mock_random_.ChangeValue();
1062 delete frames_[0].stream_frame;