1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/quic/quic_chromium_client_session.h"
9 #include "base/base64.h"
10 #include "base/files/file_path.h"
11 #include "base/rand_util.h"
12 #include "base/thread_task_runner_handle.h"
13 #include "net/base/test_completion_callback.h"
14 #include "net/base/test_data_directory.h"
15 #include "net/cert/cert_verify_result.h"
16 #include "net/http/transport_security_state.h"
17 #include "net/log/test_net_log.h"
18 #include "net/quic/crypto/aes_128_gcm_12_encrypter.h"
19 #include "net/quic/crypto/crypto_protocol.h"
20 #include "net/quic/crypto/proof_verifier_chromium.h"
21 #include "net/quic/crypto/quic_decrypter.h"
22 #include "net/quic/crypto/quic_encrypter.h"
23 #include "net/quic/crypto/quic_server_info.h"
24 #include "net/quic/test_tools/crypto_test_utils.h"
25 #include "net/quic/test_tools/quic_chromium_client_session_peer.h"
26 #include "net/quic/test_tools/quic_spdy_session_peer.h"
27 #include "net/quic/test_tools/quic_test_utils.h"
28 #include "net/quic/test_tools/simple_quic_framer.h"
29 #include "net/socket/socket_test_util.h"
30 #include "net/spdy/spdy_test_utils.h"
31 #include "net/test/cert_test_util.h"
32 #include "net/udp/datagram_client_socket.h"
40 const char kServerHostname
[] = "www.example.org";
41 const uint16 kServerPort
= 80;
43 class QuicChromiumClientSessionTest
44 : public ::testing::TestWithParam
<QuicVersion
> {
46 QuicChromiumClientSessionTest()
47 : connection_(new PacketSavingConnection(Perspective::IS_CLIENT
,
48 SupportedVersions(GetParam()))),
51 /*stream_factory=*/nullptr,
52 /*crypto_client_stream_factory=*/nullptr,
53 &transport_security_state_
,
54 make_scoped_ptr((QuicServerInfo
*)nullptr),
55 QuicServerId(kServerHostname
,
58 PRIVACY_MODE_DISABLED
),
59 /*cert_verify_flags=*/0,
63 base::TimeTicks::Now(),
64 base::ThreadTaskRunnerHandle::Get().get(),
66 session_
.Initialize();
67 // Advance the time, because timers do not like uninitialized times.
68 connection_
->AdvanceTime(QuicTime::Delta::FromSeconds(1));
71 void TearDown() override
{
72 session_
.CloseSessionOnError(ERR_ABORTED
, QUIC_INTERNAL_ERROR
);
75 scoped_ptr
<DatagramClientSocket
> GetSocket() {
76 socket_factory_
.AddSocketDataProvider(&socket_data_
);
77 return socket_factory_
.CreateDatagramClientSocket(
78 DatagramSocket::DEFAULT_BIND
, base::Bind(&base::RandInt
), &net_log_
,
82 void CompleteCryptoHandshake() {
83 ASSERT_EQ(ERR_IO_PENDING
,
84 session_
.CryptoConnect(false, callback_
.callback()));
85 CryptoTestUtils::HandshakeWithFakeServer(connection_
,
86 session_
.GetCryptoStream());
87 ASSERT_EQ(OK
, callback_
.WaitForResult());
90 PacketSavingConnection
* connection_
;
92 MockClientSocketFactory socket_factory_
;
93 StaticSocketDataProvider socket_data_
;
94 TransportSecurityState transport_security_state_
;
95 QuicChromiumClientSession session_
;
98 QuicConnectionVisitorInterface
* visitor_
;
99 TestCompletionCallback callback_
;
100 QuicCryptoClientConfig crypto_config_
;
103 INSTANTIATE_TEST_CASE_P(Tests
,
104 QuicChromiumClientSessionTest
,
105 ::testing::ValuesIn(QuicSupportedVersions()));
107 TEST_P(QuicChromiumClientSessionTest
, CryptoConnect
) {
108 CompleteCryptoHandshake();
111 TEST_P(QuicChromiumClientSessionTest
, MaxNumStreams
) {
112 CompleteCryptoHandshake();
114 std::vector
<QuicReliableClientStream
*> streams
;
115 for (size_t i
= 0; i
< kDefaultMaxStreamsPerConnection
; i
++) {
116 QuicReliableClientStream
* stream
= session_
.CreateOutgoingDynamicStream();
118 streams
.push_back(stream
);
120 EXPECT_FALSE(session_
.CreateOutgoingDynamicStream());
122 // Close a stream and ensure I can now open a new one.
123 session_
.CloseStream(streams
[0]->id());
124 EXPECT_TRUE(session_
.CreateOutgoingDynamicStream());
127 TEST_P(QuicChromiumClientSessionTest
, MaxNumStreamsViaRequest
) {
128 CompleteCryptoHandshake();
130 std::vector
<QuicReliableClientStream
*> streams
;
131 for (size_t i
= 0; i
< kDefaultMaxStreamsPerConnection
; i
++) {
132 QuicReliableClientStream
* stream
= session_
.CreateOutgoingDynamicStream();
134 streams
.push_back(stream
);
137 QuicReliableClientStream
* stream
;
138 QuicChromiumClientSession::StreamRequest stream_request
;
139 TestCompletionCallback callback
;
140 ASSERT_EQ(ERR_IO_PENDING
,
141 stream_request
.StartRequest(session_
.GetWeakPtr(), &stream
,
142 callback
.callback()));
144 // Close a stream and ensure I can now open a new one.
145 session_
.CloseStream(streams
[0]->id());
146 ASSERT_TRUE(callback
.have_result());
147 EXPECT_EQ(OK
, callback
.WaitForResult());
148 EXPECT_TRUE(stream
!= nullptr);
151 TEST_P(QuicChromiumClientSessionTest
, GoAwayReceived
) {
152 CompleteCryptoHandshake();
154 // After receiving a GoAway, I should no longer be able to create outgoing
156 session_
.connection()->OnGoAwayFrame(
157 QuicGoAwayFrame(QUIC_PEER_GOING_AWAY
, 1u, "Going away."));
158 EXPECT_EQ(nullptr, session_
.CreateOutgoingDynamicStream());
161 TEST_P(QuicChromiumClientSessionTest
, CanPool
) {
162 // Load a cert that is valid for:
167 ProofVerifyDetailsChromium details
;
168 details
.cert_verify_result
.verified_cert
=
169 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem");
170 ASSERT_TRUE(details
.cert_verify_result
.verified_cert
.get());
172 session_
.OnProofVerifyDetailsAvailable(details
);
173 CompleteCryptoHandshake();
175 EXPECT_TRUE(session_
.CanPool("www.example.org", PRIVACY_MODE_DISABLED
));
176 EXPECT_FALSE(session_
.CanPool("www.example.org", PRIVACY_MODE_ENABLED
));
177 EXPECT_TRUE(session_
.CanPool("mail.example.org", PRIVACY_MODE_DISABLED
));
178 EXPECT_TRUE(session_
.CanPool("mail.example.com", PRIVACY_MODE_DISABLED
));
179 EXPECT_FALSE(session_
.CanPool("mail.google.com", PRIVACY_MODE_DISABLED
));
182 TEST_P(QuicChromiumClientSessionTest
, ConnectionPooledWithTlsChannelId
) {
183 // Load a cert that is valid for:
188 ProofVerifyDetailsChromium details
;
189 details
.cert_verify_result
.verified_cert
=
190 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem");
191 ASSERT_TRUE(details
.cert_verify_result
.verified_cert
.get());
193 session_
.OnProofVerifyDetailsAvailable(details
);
194 CompleteCryptoHandshake();
195 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_
, true);
197 EXPECT_TRUE(session_
.CanPool("www.example.org", PRIVACY_MODE_DISABLED
));
198 EXPECT_TRUE(session_
.CanPool("mail.example.org", PRIVACY_MODE_DISABLED
));
199 EXPECT_FALSE(session_
.CanPool("mail.example.com", PRIVACY_MODE_DISABLED
));
200 EXPECT_FALSE(session_
.CanPool("mail.google.com", PRIVACY_MODE_DISABLED
));
203 TEST_P(QuicChromiumClientSessionTest
, ConnectionNotPooledWithDifferentPin
) {
204 uint8 primary_pin
= 1;
205 uint8 backup_pin
= 2;
207 AddPin(&transport_security_state_
, "mail.example.org", primary_pin
,
210 ProofVerifyDetailsChromium details
;
211 details
.cert_verify_result
.verified_cert
=
212 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem");
213 details
.cert_verify_result
.is_issued_by_known_root
= true;
214 details
.cert_verify_result
.public_key_hashes
.push_back(
215 GetTestHashValue(bad_pin
));
217 ASSERT_TRUE(details
.cert_verify_result
.verified_cert
.get());
219 session_
.OnProofVerifyDetailsAvailable(details
);
220 CompleteCryptoHandshake();
221 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_
, true);
223 EXPECT_FALSE(session_
.CanPool("mail.example.org", PRIVACY_MODE_DISABLED
));
226 TEST_P(QuicChromiumClientSessionTest
, ConnectionPooledWithMatchingPin
) {
227 uint8 primary_pin
= 1;
228 uint8 backup_pin
= 2;
229 AddPin(&transport_security_state_
, "mail.example.org", primary_pin
,
232 ProofVerifyDetailsChromium details
;
233 details
.cert_verify_result
.verified_cert
=
234 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem");
235 details
.cert_verify_result
.is_issued_by_known_root
= true;
236 details
.cert_verify_result
.public_key_hashes
.push_back(
237 GetTestHashValue(primary_pin
));
239 ASSERT_TRUE(details
.cert_verify_result
.verified_cert
.get());
241 session_
.OnProofVerifyDetailsAvailable(details
);
242 CompleteCryptoHandshake();
243 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_
, true);
245 EXPECT_TRUE(session_
.CanPool("mail.example.org", PRIVACY_MODE_DISABLED
));