1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/quic/quic_crypto_stream.h"
6
7 #include <string>
8 #include <vector>
9
10 #include "base/memory/scoped_ptr.h"
11 #include "net/quic/crypto/crypto_handshake.h"
12 #include "net/quic/crypto/crypto_protocol.h"
13 #include "net/quic/test_tools/crypto_test_utils.h"
14 #include "net/quic/test_tools/quic_test_utils.h"
15 #include "testing/gmock/include/gmock/gmock.h"
16 #include "testing/gtest/include/gtest/gtest.h"
17
18 using std::string;
19 using std::vector;
20
21 namespace net {
22 namespace test {
23 namespace {
24
25 class MockQuicCryptoStream : public QuicCryptoStream {
26 public:
MockQuicCryptoStream(QuicSession * session)27 explicit MockQuicCryptoStream(QuicSession* session)
28 : QuicCryptoStream(session) {
29 }
30
OnHandshakeMessage(const CryptoHandshakeMessage & message)31 virtual void OnHandshakeMessage(
32 const CryptoHandshakeMessage& message) OVERRIDE {
33 messages_.push_back(message);
34 }
35
messages()36 vector<CryptoHandshakeMessage>* messages() {
37 return &messages_;
38 }
39
40 private:
41 vector<CryptoHandshakeMessage> messages_;
42
43 DISALLOW_COPY_AND_ASSIGN(MockQuicCryptoStream);
44 };
45
46 class QuicCryptoStreamTest : public ::testing::Test {
47 public:
QuicCryptoStreamTest()48 QuicCryptoStreamTest()
49 : connection_(new MockConnection(false)),
50 session_(connection_),
51 stream_(&session_) {
52 message_.set_tag(kSHLO);
53 message_.SetStringPiece(1, "abc");
54 message_.SetStringPiece(2, "def");
55 ConstructHandshakeMessage();
56 }
57
ConstructHandshakeMessage()58 void ConstructHandshakeMessage() {
59 CryptoFramer framer;
60 message_data_.reset(framer.ConstructHandshakeMessage(message_));
61 }
62
63 protected:
64 MockConnection* connection_;
65 MockSession session_;
66 MockQuicCryptoStream stream_;
67 CryptoHandshakeMessage message_;
68 scoped_ptr<QuicData> message_data_;
69
70 private:
71 DISALLOW_COPY_AND_ASSIGN(QuicCryptoStreamTest);
72 };
73
TEST_F(QuicCryptoStreamTest,NotInitiallyConected)74 TEST_F(QuicCryptoStreamTest, NotInitiallyConected) {
75 EXPECT_FALSE(stream_.encryption_established());
76 EXPECT_FALSE(stream_.handshake_confirmed());
77 }
78
TEST_F(QuicCryptoStreamTest,ProcessRawData)79 TEST_F(QuicCryptoStreamTest, ProcessRawData) {
80 EXPECT_EQ(message_data_->length(),
81 stream_.ProcessRawData(message_data_->data(),
82 message_data_->length()));
83 ASSERT_EQ(1u, stream_.messages()->size());
84 const CryptoHandshakeMessage& message = (*stream_.messages())[0];
85 EXPECT_EQ(kSHLO, message.tag());
86 EXPECT_EQ(2u, message.tag_value_map().size());
87 EXPECT_EQ("abc", CryptoTestUtils::GetValueForTag(message, 1));
88 EXPECT_EQ("def", CryptoTestUtils::GetValueForTag(message, 2));
89 }
90
TEST_F(QuicCryptoStreamTest,ProcessBadData)91 TEST_F(QuicCryptoStreamTest, ProcessBadData) {
92 string bad(message_data_->data(), message_data_->length());
93 const int kFirstTagIndex = sizeof(uint32) + // message tag
94 sizeof(uint16) + // number of tag-value pairs
95 sizeof(uint16); // padding
96 EXPECT_EQ(1, bad[kFirstTagIndex]);
97 bad[kFirstTagIndex] = 0x7F; // out of order tag
98
99 EXPECT_CALL(*connection_,
100 SendConnectionClose(QUIC_CRYPTO_TAGS_OUT_OF_ORDER));
101 EXPECT_EQ(0u, stream_.ProcessRawData(bad.data(), bad.length()));
102 }
103
104 } // namespace
105 } // namespace test
106 } // namespace net
107