blob: 8ea16c8a69f1d834d4c4221c9cea7adde3d9ac21 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/spdy/spdy_test_utils.h"
#include <cstring>
#include <vector>
#include "base/base64.h"
#include "base/logging.h"
#include "base/memory/scoped_ptr.h"
#include "base/strings/string_number_conversions.h"
#include "base/sys_byteorder.h"
#include "net/http/transport_security_state.h"
#include "net/ssl/ssl_info.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace net {
namespace test {
std::string HexDumpWithMarks(const unsigned char* data, int length,
const bool* marks, int mark_length) {
static const char kHexChars[] = "0123456789abcdef";
static const int kColumns = 4;
const int kSizeLimit = 1024;
if (length > kSizeLimit || mark_length > kSizeLimit) {
LOG(ERROR) << "Only dumping first " << kSizeLimit << " bytes.";
length = std::min(length, kSizeLimit);
mark_length = std::min(mark_length, kSizeLimit);
}
std::string hex;
for (const unsigned char* row = data; length > 0;
row += kColumns, length -= kColumns) {
for (const unsigned char *p = row; p < row + 4; ++p) {
if (p < row + length) {
const bool mark =
(marks && (p - data) < mark_length && marks[p - data]);
hex += mark ? '*' : ' ';
hex += kHexChars[(*p & 0xf0) >> 4];
hex += kHexChars[*p & 0x0f];
hex += mark ? '*' : ' ';
} else {
hex += " ";
}
}
hex = hex + " ";
for (const unsigned char *p = row; p < row + 4 && p < row + length; ++p)
hex += (*p >= 0x20 && *p <= 0x7f) ? (*p) : '.';
hex = hex + '\n';
}
return hex;
}
void CompareCharArraysWithHexError(
const std::string& description,
const unsigned char* actual,
const int actual_len,
const unsigned char* expected,
const int expected_len) {
const int min_len = std::min(actual_len, expected_len);
const int max_len = std::max(actual_len, expected_len);
scoped_ptr<bool[]> marks(new bool[max_len]);
bool identical = (actual_len == expected_len);
for (int i = 0; i < min_len; ++i) {
if (actual[i] != expected[i]) {
marks[i] = true;
identical = false;
} else {
marks[i] = false;
}
}
for (int i = min_len; i < max_len; ++i) {
marks[i] = true;
}
if (identical) return;
ADD_FAILURE()
<< "Description:\n"
<< description
<< "\n\nExpected:\n"
<< HexDumpWithMarks(expected, expected_len, marks.get(), max_len)
<< "\nActual:\n"
<< HexDumpWithMarks(actual, actual_len, marks.get(), max_len);
}
void SetFrameFlags(SpdyFrame* frame,
uint8 flags,
SpdyMajorVersion spdy_version) {
switch (spdy_version) {
case SPDY2:
case SPDY3:
case SPDY4:
frame->data()[4] = flags;
break;
default:
LOG(FATAL) << "Unsupported SPDY version.";
}
}
void SetFrameLength(SpdyFrame* frame,
size_t length,
SpdyMajorVersion spdy_version) {
switch (spdy_version) {
case SPDY2:
case SPDY3:
CHECK_EQ(0u, length & ~kLengthMask);
{
int32 wire_length = base::HostToNet32(length);
// The length field in SPDY 2 and 3 is a 24-bit (3B) integer starting at
// offset 5.
memcpy(frame->data() + 5, reinterpret_cast<char*>(&wire_length) + 1, 3);
}
break;
case SPDY4:
CHECK_GT(1u<<14, length);
{
int32 wire_length = base::HostToNet32(length);
memcpy(frame->data(),
reinterpret_cast<char*>(&wire_length) + 1,
3);
}
break;
default:
LOG(FATAL) << "Unsupported SPDY version.";
}
}
std::string a2b_hex(const char* hex_data) {
std::vector<uint8> output;
std::string result;
if (base::HexStringToBytes(hex_data, &output))
result.assign(reinterpret_cast<const char*>(&output[0]), output.size());
return result;
}
HashValue GetTestHashValue(uint8_t label) {
HashValue hash_value(HASH_VALUE_SHA256);
memset(hash_value.data(), label, hash_value.size());
return hash_value;
}
std::string GetTestPin(uint8_t label) {
HashValue hash_value = GetTestHashValue(label);
std::string base64;
base::Base64Encode(base::StringPiece(
reinterpret_cast<char*>(hash_value.data()), hash_value.size()), &base64);
return std::string("pin-sha256=\"") + base64 + "\"";
}
void AddPin(TransportSecurityState* state,
const std::string& host,
uint8_t primary_label,
uint8_t backup_label) {
std::string primary_pin = GetTestPin(primary_label);
std::string backup_pin = GetTestPin(backup_label);
std::string header = "max-age = 10000; " + primary_pin + "; " + backup_pin;
// Construct a fake SSLInfo that will pass AddHPKPHeader's checks.
SSLInfo ssl_info;
ssl_info.is_issued_by_known_root = true;
ssl_info.public_key_hashes.push_back(GetTestHashValue(primary_label));
EXPECT_TRUE(state->AddHPKPHeader(host, header, ssl_info));
}
} // namespace test
} // namespace net