Don't show supervised user as "already on this device" while they're being imported.
[chromium-blink-merge.git] / net / spdy / spdy_test_utils.cc
blob8ea16c8a69f1d834d4c4221c9cea7adde3d9ac21
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/spdy/spdy_test_utils.h"
7 #include <cstring>
8 #include <vector>
10 #include "base/base64.h"
11 #include "base/logging.h"
12 #include "base/memory/scoped_ptr.h"
13 #include "base/strings/string_number_conversions.h"
14 #include "base/sys_byteorder.h"
15 #include "net/http/transport_security_state.h"
16 #include "net/ssl/ssl_info.h"
17 #include "testing/gtest/include/gtest/gtest.h"
19 namespace net {
21 namespace test {
23 std::string HexDumpWithMarks(const unsigned char* data, int length,
24 const bool* marks, int mark_length) {
25 static const char kHexChars[] = "0123456789abcdef";
26 static const int kColumns = 4;
28 const int kSizeLimit = 1024;
29 if (length > kSizeLimit || mark_length > kSizeLimit) {
30 LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
31 length = std::min(length, kSizeLimit);
32 mark_length = std::min(mark_length, kSizeLimit);
35 std::string hex;
36 for (const unsigned char* row = data; length > 0;
37 row += kColumns, length -= kColumns) {
38 for (const unsigned char *p = row; p < row + 4; ++p) {
39 if (p < row + length) {
40 const bool mark =
41 (marks && (p - data) < mark_length && marks[p - data]);
42 hex += mark ? '*' : ' ';
43 hex += kHexChars[(*p & 0xf0) >> 4];
44 hex += kHexChars[*p & 0x0f];
45 hex += mark ? '*' : ' ';
46 } else {
47 hex += " ";
50 hex = hex + " ";
52 for (const unsigned char *p = row; p < row + 4 && p < row + length; ++p)
53 hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
55 hex = hex + '\n';
57 return hex;
60 void CompareCharArraysWithHexError(
61 const std::string& description,
62 const unsigned char* actual,
63 const int actual_len,
64 const unsigned char* expected,
65 const int expected_len) {
66 const int min_len = std::min(actual_len, expected_len);
67 const int max_len = std::max(actual_len, expected_len);
68 scoped_ptr<bool[]> marks(new bool[max_len]);
69 bool identical = (actual_len == expected_len);
70 for (int i = 0; i < min_len; ++i) {
71 if (actual[i] != expected[i]) {
72 marks[i] = true;
73 identical = false;
74 } else {
75 marks[i] = false;
78 for (int i = min_len; i < max_len; ++i) {
79 marks[i] = true;
81 if (identical) return;
82 ADD_FAILURE()
83 << "Description:\n"
84 << description
85 << "\n\nExpected:\n"
86 << HexDumpWithMarks(expected, expected_len, marks.get(), max_len)
87 << "\nActual:\n"
88 << HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
91 void SetFrameFlags(SpdyFrame* frame,
92 uint8 flags,
93 SpdyMajorVersion spdy_version) {
94 switch (spdy_version) {
95 case SPDY2:
96 case SPDY3:
97 case SPDY4:
98 frame->data()[4] = flags;
99 break;
100 default:
101 LOG(FATAL) << "Unsupported SPDY version.";
105 void SetFrameLength(SpdyFrame* frame,
106 size_t length,
107 SpdyMajorVersion spdy_version) {
108 switch (spdy_version) {
109 case SPDY2:
110 case SPDY3:
111 CHECK_EQ(0u, length & ~kLengthMask);
113 int32 wire_length = base::HostToNet32(length);
114 // The length field in SPDY 2 and 3 is a 24-bit (3B) integer starting at
115 // offset 5.
116 memcpy(frame->data() + 5, reinterpret_cast<char*>(&wire_length) + 1, 3);
118 break;
119 case SPDY4:
120 CHECK_GT(1u<<14, length);
122 int32 wire_length = base::HostToNet32(length);
123 memcpy(frame->data(),
124 reinterpret_cast<char*>(&wire_length) + 1,
127 break;
128 default:
129 LOG(FATAL) << "Unsupported SPDY version.";
133 std::string a2b_hex(const char* hex_data) {
134 std::vector<uint8> output;
135 std::string result;
136 if (base::HexStringToBytes(hex_data, &output))
137 result.assign(reinterpret_cast<const char*>(&output[0]), output.size());
138 return result;
141 HashValue GetTestHashValue(uint8_t label) {
142 HashValue hash_value(HASH_VALUE_SHA256);
143 memset(hash_value.data(), label, hash_value.size());
144 return hash_value;
147 std::string GetTestPin(uint8_t label) {
148 HashValue hash_value = GetTestHashValue(label);
149 std::string base64;
150 base::Base64Encode(base::StringPiece(
151 reinterpret_cast<char*>(hash_value.data()), hash_value.size()), &base64);
153 return std::string("pin-sha256=\"") + base64 + "\"";
156 void AddPin(TransportSecurityState* state,
157 const std::string& host,
158 uint8_t primary_label,
159 uint8_t backup_label) {
160 std::string primary_pin = GetTestPin(primary_label);
161 std::string backup_pin = GetTestPin(backup_label);
162 std::string header = "max-age = 10000; " + primary_pin + "; " + backup_pin;
164 // Construct a fake SSLInfo that will pass AddHPKPHeader's checks.
165 SSLInfo ssl_info;
166 ssl_info.is_issued_by_known_root = true;
167 ssl_info.public_key_hashes.push_back(GetTestHashValue(primary_label));
168 EXPECT_TRUE(state->AddHPKPHeader(host, header, ssl_info));
171 } // namespace test
173 } // namespace net