blob_id
stringlengths
40
40
directory_id
stringlengths
40
40
path
stringlengths
3
264
content_id
stringlengths
40
40
detected_licenses
listlengths
0
85
license_type
stringclasses
2 values
repo_name
stringlengths
5
140
snapshot_id
stringlengths
40
40
revision_id
stringlengths
40
40
branch_name
stringclasses
986 values
visit_date
timestamp[us]
revision_date
timestamp[us]
committer_date
timestamp[us]
github_id
int64
3.89k
681M
star_events_count
int64
0
209k
fork_events_count
int64
0
110k
gha_license_id
stringclasses
23 values
gha_event_created_at
timestamp[us]
gha_created_at
timestamp[us]
gha_language
stringclasses
145 values
src_encoding
stringclasses
34 values
language
stringclasses
1 value
is_vendor
bool
1 class
is_generated
bool
2 classes
length_bytes
int64
3
10.4M
extension
stringclasses
122 values
content
stringlengths
3
10.4M
authors
listlengths
1
1
author_id
stringlengths
0
158
550dd9c79b7e5238869bbf71acd6b09e2ab8bcaf
2b8b15793fa88c44163950a9543bcec36f168623
/src/B3DetectorConstruction.cc
84e03fa16038b86fc3f51c8cc660720ad24c8b37
[]
no_license
gsmith23/Magnetic_Fields
b06a61d4531b086e0eea4b9f1d4078ddb61d20fa
8c1f4b4710bde5322505ad63d35da4f406bd0ada
refs/heads/master
2020-06-28T19:38:12.886711
2018-07-23T19:37:19
2018-07-23T19:37:19
74,477,288
0
0
null
null
null
null
UTF-8
C++
false
false
17,256
cc
// // ******************************************************************** // * License and Disclaimer * // * * // * The Geant4 software is copyright of the Copyright Holders of * // * the Geant4 Collaboration. It is provided under the terms and * // * conditions of the Geant4 Software License, included in the file * // * LICENSE and available at http://cern.ch/geant4/license . These * // * include a list of copyright holders. * // * * // * Neither the authors of this software system, nor their employing * // * institutes,nor the agencies providing financial support for this * // * work make any representation or warranty, express or implied, * // * regarding this software system or assume any liability for its * // * use. Please see the license in the file LICENSE and URL above * // * for the full disclaimer and the limitation of liability. * // * * // * This code implementation is the result of the scientific and * // * technical work of the GEANT4 collaboration. * // * By using, copying, modifying or distributing the software (or * // * any work based on the software) you agree to acknowledge its * // * use in resulting scientific publications, and indicate your * // * acceptance of all terms of the Geant4 Software license. * // ******************************************************************** // // $Id: B3DetectorConstruction.cc 71323 2013-06-13 16:54:23Z gcosmo $ // /// \file B3DetectorConstruction.cc /// \brief Implementation of the B3DetectorConstruction class #include "B3DetectorConstruction.hh" #include "G4NistManager.hh" #include "G4Box.hh" #include "G4Tubs.hh" #include "G4LogicalVolume.hh" #include "G4PVPlacement.hh" #include "G4RotationMatrix.hh" #include "G4Transform3D.hh" #include "G4SDManager.hh" #include "G4MultiFunctionalDetector.hh" #include "G4VPrimitiveScorer.hh" #include "G4PSEnergyDeposit.hh" #include "G4PSDoseDeposit.hh" #include "G4VisAttributes.hh" #include "G4PhysicalConstants.hh" #include "G4SystemOfUnits.hh" #include "G4GlobalMagFieldMessenger.hh" ///// Task 1c.1 // Add here the include for the Magnetic Field Messenger //....oooOO0OOooo........oooOO0OOooo........oooOO0OOooo........oooOO0OOooo...... B3DetectorConstruction::B3DetectorConstruction() : G4VUserDetectorConstruction(), fCheckOverlaps(true) { // **Material definition** DefineMaterials(); } //....oooOO0OOooo........oooOO0OOooo........oooOO0OOooo........oooOO0OOooo...... B3DetectorConstruction::~B3DetectorConstruction() { } //....oooOO0OOooo........oooOO0OOooo........oooOO0OOooo........oooOO0OOooo...... void B3DetectorConstruction::DefineMaterials() { G4double a; // mass of a mole G4double z; // mean number of protons G4String name, symbol; // Definition of element Oxygen a=16.00*g/mole; G4Element* elO = new G4Element(name="Oxygen", symbol="O", z=8., a); a=28.09*g/mole; G4Element* elSi = new G4Element(name="Silicon", symbol="Si", z=14., a); a=174.97*g/mole; G4Element* elLu = new G4Element(name="Lutetium", symbol="Lu", z=71., a); a=88.91*g/mole; G4Element* elYt = new G4Element(name="Yttrium", symbol="Lu", z=39., a); G4double density; density = 7.4*g/cm3; // Declare the material with its density and number of components G4Material * LSO; LSO = new G4Material("Lu2SiO5",//name density,//density 3);//number of elements LSO->AddElement(elLu,2); LSO->AddElement(elSi,1); LSO->AddElement(elO,5); density = 7.1*g/cm3; G4Material * LYSO; LYSO = new G4Material("LYSO",//name density,//density 4);//number of elements LYSO->AddElement(elLu,18); LYSO->AddElement(elYt,2); LYSO->AddElement(elSi,10); LYSO->AddElement(elO,50); // Dump the Table of registered materials G4cout << *(G4Material::GetMaterialTable()) << G4endl; } //....oooOO0OOooo........oooOO0OOooo........oooOO0OOooo........oooOO0OOooo...... G4VPhysicalVolume* B3DetectorConstruction::Construct() { // // First of all, fix the general parameters // // Gamma detector Parameters // // Crystals sizes // Notice that the crystals will be rotated to be placed // in the ring. What is called "cryst_dX" corresponds to // to the z direction in the final system. The "cryst_dZ" is // the "thickness" of the crystal in the ring // ///// Task 1b.1: // Modify the present geometry by slightly changing // cryst_dY from 6. cm to 10. cm. G4double cryst_dX = 10*cm, cryst_dY = 10*cm, cryst_dZ = 3*cm; // Number of crystals per ring, and number of rings. ///// Task 1b.1: // Change the crystals granularity in the detector, // for example decrease the number of crystals per ring // from 32 to 16 G4int nb_cryst = 16; G4int nb_rings = 9; // The inner radius of the ring is accomodated such that // the nb_cryst crystals do not overlap. The approach presented // here is pratically equivalent to ring_R1*twopi = nb_cryst*cryst_dY, // i.e. the crystals fill entirely the inner circumference. // The outer radius is calculated accordingly, by adding the thickness // of the crystals and an extra term 1/cos. The computation might // screw up if there are too-few crystals. // G4double dPhi = twopi/nb_cryst, half_dPhi = 0.5*dPhi; G4double cosdPhi = std::cos(half_dPhi); G4double tandPhi = std::tan(half_dPhi); // G4double ring_R1 = 0.5*cryst_dY/tandPhi; G4double ring_R2 = (ring_R1+cryst_dZ)/cosdPhi; // // total length of the detector: nb_rings, each having // thickness of cryst_dX along the z-axis (in the final reference // frame). G4double detector_dZ = nb_rings*cryst_dX; // G4NistManager* nist = G4NistManager::Instance(); // **Retrieve Nist Materials** G4Material* default_mat = nist->FindOrBuildMaterial("G4_AIR"); //G4Material* cryst_mat = nist->FindOrBuildMaterial("Lu2SiO5"); G4Material* cryst_mat = nist->FindOrBuildMaterial("LYSO"); //G4Material* cryst_mat = nist->FindOrBuildMaterial("G4_SODIUM_IODIDE"); // // ***** World ***** // G4double world_sizeXY = 1.0*m; G4double world_sizeZ = 1.0*m; // Create the world volume as a box. This is big enough to contain // all the detector rings. G4Box* solidWorld = new G4Box("World", //its name 0.5*world_sizeXY, 0.5*world_sizeXY, 0.5*world_sizeZ); //its size // World Logical Volume definition G4LogicalVolume* logicWorld = new G4LogicalVolume(solidWorld, //its solid default_mat, //its material "World"); //its name // World Physical Volume Placement at (0,0,0) G4VPhysicalVolume* physWorld = new G4PVPlacement(0, //no rotation G4ThreeVector(), //at (0,0,0) logicWorld, //its logical volume "World", //its name 0, //its mother volume false, //no boolean operation 0, //copy number fCheckOverlaps); // checking overlaps // // ring // // define one ring as an "envelope" made of air. This will be filled // by the crystals (dautgher volumes). The logical volume of the ring // (which contains all daughters) will be then placed many times // G4Tubs* solidRing = new G4Tubs("Ring", //name ring_R1, //inner radius ring_R2, //outer radius 0.5*cryst_dX, //height 0., //start angle twopi); //spanning angle G4LogicalVolume* logicRing = new G4LogicalVolume(solidRing, //its solid default_mat, //its material "Ring"); //its name // // define crystal // // define one crystal now. It is made a bit smaller than the // real size, to allow for wrapping. The same logical volume is // placed many times in its mother volume, to produce the actual // ring of crystals. // G4double gap = 0.5*mm; //a gap for wrapping G4double dX = cryst_dX - gap, dY = cryst_dY - gap; G4Box* solidCryst = new G4Box("crystal", dX/2, dY/2, cryst_dZ/2); G4LogicalVolume* logicCryst = new G4LogicalVolume(solidCryst, //its solid cryst_mat, //its material "CrystalLV"); //its name // place crystals within a ring: loop // for (G4int icrys = 0; icrys < nb_cryst ; icrys++) { G4double phi = icrys*dPhi; // create a rotation matrix... (identity, by defauly) G4RotationMatrix rotm = G4RotationMatrix(); //... and apply rotations. Notice that all rotations are // referred to the mother volume. rotm.rotateY(90*deg); rotm.rotateZ(phi); // Calculate position with respect to the reference frame // of the mother volume G4ThreeVector uz = G4ThreeVector(std::cos(phi), std::sin(phi),0.); G4ThreeVector position = (ring_R1+0.5*cryst_dZ)*uz; G4Transform3D transform = G4Transform3D(rotm,position); // Place the crystal with the appropriate transformation new G4PVPlacement(transform, //rotation,position logicCryst, //its logical volume "crystal", //its name logicRing, //its mother volume false, //no boolean operation icrys, //copy number fCheckOverlaps); // checking overlaps } // // full detector. This is an "envelope" made of air which contains // the rings. It is a big hollow cylinder, which will then host all rings // as daughters (multiple placement). Notice that the cylinder is "hollow" // so the central part will still belong to the mother (world) volume. // G4Tubs* solidDetector = new G4Tubs("Detector", ring_R1, ring_R2, 0.5*detector_dZ, 0., twopi); G4LogicalVolume* logicDetector = new G4LogicalVolume(solidDetector, //its solid default_mat, //its material "Detector"); //its name // // place rings within detector // G4double OG = -0.5*(detector_dZ + cryst_dX); for (G4int iring = 0; iring < nb_rings ; iring++) { OG += cryst_dX; new G4PVPlacement(0, //no rotation G4ThreeVector(0,0,OG), //position logicRing, //its logical volume "ring", //its name logicDetector, //its mother volume false, //no boolean operation iring, //copy number fCheckOverlaps); // checking overlaps } // // place detector in world, right in the centter // // new G4PVPlacement(0, //no rotation // G4ThreeVector(), //at (0,0,0) // logicDetector, //its logical volume // "Detector", //its name // logicWorld, //its mother volume // false, //no boolean operation // 0, //copy number // fCheckOverlaps); // checking overlaps // // patient // // create a cylinder to simulate the brain of the patient. The // G4_BRAIN_ICRP NIST material is used. The patient is placed at // the center of the world. G4double patient_radius = 8*cm; G4double patient_dZ = 10*cm; G4Material* patient_mat = nist->FindOrBuildMaterial("G4_BRAIN_ICRP"); G4Tubs* solidPatient = new G4Tubs("Patient", 0., patient_radius, 0.5*patient_dZ, 0., twopi); G4LogicalVolume* logicPatient = new G4LogicalVolume(solidPatient, //its solid patient_mat, //its material "PatientLV"); //its name // // place patient in world // // new G4PVPlacement(0, //no rotation // G4ThreeVector(), //at (0,0,0) // logicPatient, //its logical volume // "Patient", //its name // logicWorld, //its mother volume // false, //no boolean operation // 0, //copy number // fCheckOverlaps); // checking overlaps ///// Task 1b.2 // Here create the solid for patient's body G4double body_dZ = 150*cm; G4Tubs* solidBody = new G4Tubs("Body", // the name 0, 12*cm, 0.5*body_dZ,// in z direction 0., // in radians twopi); // in radians ///// Task 1b.3 // Here recover the body-tissue material from NIST DB. G4Material* body_mat = nist->FindOrBuildMaterial("G4_TISSUE_SOFT_ICRP"); // The create the body logical volume and set its visualization attributes // following intructions on the exercise text G4LogicalVolume* logicBody = new G4LogicalVolume(solidBody, //its solid body_mat, //its material "BodyLV"); //its name G4Colour red = G4Colour(1.0, 0.0, 0.0); logicBody->SetVisAttributes(new G4VisAttributes(red)); ///// Task 1b.4 // Here place an instance of the body-logical volume in the world volume // new G4PVPlacement(0, //no rotation // G4ThreeVector(0,0,-0.5*(body_dZ + patient_dZ + 0.002)), // logicBody, //its logical volume // "Body", //its name // logicWorld, //its mother volume // false, //no boolean operation // 0, //copy number // fCheckOverlaps); // checking overlaps // Visualization attributes // the two "envelopes" that were created to accomodate crystals and // rings are set as invisible: they are made out of air and they are // not real physical objects. They help to code the geometry in Geant4. logicRing->SetVisAttributes (G4VisAttributes::Invisible); logicDetector->SetVisAttributes (G4VisAttributes::Invisible); // Print materials G4cout << *(G4Material::GetMaterialTable()) << G4endl; //always return the physical World // return physWorld; } //....oooOO0OOooo........oooOO0OOooo........oooOO0OOooo........oooOO0OOooo...... void B3DetectorConstruction::ConstructSDandField() { // // Register some of the volumes as "sensitive" and decide the // type of sensitivity that they have // G4SDManager::GetSDMpointer()->SetVerboseLevel(1); // declare crystal as a MultiFunctionalDetector scorer // // Create a new scorer (G4MultiFunctionalDetector) and set its // "capability" to G4PSEnergyDeposit (will score total energy deposit) G4MultiFunctionalDetector* cryst = new G4MultiFunctionalDetector("crystal"); G4VPrimitiveScorer* primitiv1 = new G4PSEnergyDeposit("edep"); cryst->RegisterPrimitive(primitiv1); // Attach the scorer to the logical volume SetSensitiveDetector("CrystalLV",cryst); // declare patient as a MultiFunctionalDetector scorer // // Create a new scorer (G4MultiFunctionalDetector) and set its // "capability" to G4PSDoseDeposit (will score total dose) G4MultiFunctionalDetector* patient = new G4MultiFunctionalDetector("patient"); G4VPrimitiveScorer* primitiv2 = new G4PSDoseDeposit("dose"); patient->RegisterPrimitive(primitiv2); // Attach the scorer to the proper logical volume SetSensitiveDetector("PatientLV",patient); ///// Task 1c.1 // Here is the place to set the magnetic field G4double Bz = 1 * tesla; G4GlobalMagFieldMessenger* fMagFieldMessenger = new G4GlobalMagFieldMessenger(G4ThreeVector(0,0,Bz)); fMagFieldMessenger->SetVerboseLevel(1); } //....oooOO0OOooo........oooOO0OOooo........oooOO0OOooo........oooOO0OOooo......
[ "gsmith23@ph.ed.ac.uk" ]
gsmith23@ph.ed.ac.uk
a6b49abc137bb61aa01cad690adde2c71f59bba5
2d495c7c0d1fc5cc2f93d8589d171582f664c5ec
/Lab1/Reverse/code.cpp
a13f85ab6b1f9154448eccac80acde2d0dab3999
[]
no_license
RyanSaini/UCM-CSE165-Labs
14247487856e61df82107f592e26056f286d8710
5e9f88ab0a669fa15b893b72401d60a6d837d676
refs/heads/master
2023-05-10T08:43:24.865729
2021-06-14T22:31:31
2021-06-14T22:31:31
376,971,783
0
1
null
null
null
null
UTF-8
C++
false
false
314
cpp
#include <iostream> #include <math.h> using namespace std; int main(int argc, const char * argv[]) { double a, b, c; cin >> a; cin >> b; cin >> c; cout << (-b + (sqrt((b * b) - (4 * a * c)))) / (2 * a) <<endl; cout << (-b - (sqrt((b*b) - (4 * a * c)))) / (2 * a ) <<endl; }
[ "61637919+RyanSaini@users.noreply.github.com" ]
61637919+RyanSaini@users.noreply.github.com
f21ca3cc249d9e2f49829b236a08e14f41d06465
50fa39e33468fab2d9bbc807241c6e2297403f12
/include/thor/meta/list/algorithm/replace.h
e63b714e909f8a727e90bb7e9cc4228483fe8aba
[]
no_license
wzppengpeng/thor
41f63ed6eacdf59d712a8bdf40caeace8e4602fc
169f2e2b2d81ab3af67f4f0e8f0f0bf4199baed9
refs/heads/master
2020-04-16T22:39:47.222022
2019-01-16T08:29:37
2019-01-16T08:29:37
165,978,049
0
0
null
null
null
null
UTF-8
C++
false
false
1,626
h
#ifndef THOR_META_LIST_ALGORITHM_REPLACE_H_ #define THOR_META_LIST_ALGORITHM_REPLACE_H_ #include "thor/meta/list/type_list.h" /** * replace the type A to be type B in TypeList */ TM_NS_BEGIN // replace the first A to B // //////////////////////// template<typename TL, typename A, typename B> struct ListReplaceFirst; template<typename Head, typename Tail, typename A, typename B> struct ListReplaceFirst<TypeElem<Head, Tail>, A, B> { using type = TypeElem<Head, typename ListReplaceFirst<Tail, A, B>::type>; }; template<typename Head, typename Tail, typename B> struct ListReplaceFirst<TypeElem<Head, Tail>, Head, B> { using type = TypeElem<B, Tail>; }; template<typename A, typename B> struct ListReplaceFirst<NullType, A, B> { using type = NullType; }; // replace all A to B // //////////////////////// template<typename TL, typename A, typename B> struct ListReplaceAll; template<typename Head, typename Tail, typename A, typename B> struct ListReplaceAll<TypeElem<Head, Tail>, A, B> { using type = TypeElem<Head, typename ListReplaceAll<Tail, A, B>::type>; }; template<typename Head, typename Tail, typename B> struct ListReplaceAll<TypeElem<Head, Tail>, Head, B> { using type = TypeElem<B, typename ListReplaceAll<Tail, Head, B>::type>; }; template<typename A, typename B> struct ListReplaceAll<NullType, A, B> { using type = NullType; }; TM_NS_END // help macro functions #define __tl_replace__(...) typename TM_NS::ListReplaceFirst<__VA_ARGS__>::type #define __tl_replace_all__(...) typename TM_NS::ListReplaceAll<__VA_ARGS__>::type #endif /*THOR_META_LIST_ALGORITHM_REPLACE_H_*/
[ "wzpycg@qq.com" ]
wzpycg@qq.com
6629c3bcc9a26bb9015972c026206dfd5dddb133
a33aac97878b2cb15677be26e308cbc46e2862d2
/program_data/PKU_raw/14/956.c
289c14991c15891b34a4238ad380aa2330f8d034
[]
no_license
GabeOchieng/ggnn.tensorflow
f5d7d0bca52258336fc12c9de6ae38223f28f786
7c62c0e8427bea6c8bec2cebf157b6f1ea70a213
refs/heads/master
2022-05-30T11:17:42.278048
2020-05-02T11:33:31
2020-05-02T11:33:31
null
0
0
null
null
null
null
UTF-8
C++
false
false
1,006
c
struct Student { long id; int chn; int mth; int total; struct Student *next; }; struct Student * insert(struct Student *head,struct Student *stu) { int j=0; struct Student *p0,*p1,*p2; p1=head; p0=stu; if(head==NULL) {head=p0;p0->next=NULL;} else { while((p0->total<=p1->total)&&(p1->next!=NULL)&&j<4) {p2=p1;p1=p1->next;j++;} if(p0->total>p1->total) { if(head==p1) head=p0; else p2->next=p0; p0->next=p1; } else {p1->next=p0;p0->next=NULL;} } return(head); } void main() { struct Student *p1,*head,*stu; long int i,n; scanf("%ld",&n); p1=head=(struct Student*)malloc(sizeof(struct Student)); scanf("%d %d %d",&head->id,&head->chn,&head->mth); head->total=head->chn + head->mth; head->next=NULL; for(i=1;i<n;i++) { stu=(struct Student*)malloc(sizeof(struct Student)); scanf("%d %d %d",&stu->id,&stu->chn,&stu->mth); stu->total=stu->chn + stu->mth; head=insert(head,stu); } p1=head; for(i=0;i<3;i++) {printf("%d %d\n",p1->id,p1->total);p1=p1->next;} }
[ "bdqnghi@gmail.com" ]
bdqnghi@gmail.com
6a44f7d97e9ed05d97055278cd39fa5a55814524
6e7140b7d68df7b41490216b303c73491e5e8021
/PhysiCell_Performance_Test/core/PhysiCell_phenotype.cpp
5edfb111488c9a4fb31f8e2c399f3578ce9035b2
[]
no_license
furkankurtoglu/PhysiCell-SBML-trials
ff328460a732504155a193a27bdf4f5b0ff91c53
02cdfb8b9ebc210029083e7d2c26eb1582728ec8
refs/heads/master
2022-03-21T19:42:21.332782
2022-03-05T16:37:29
2022-03-05T16:37:29
243,384,961
1
0
null
null
null
null
UTF-8
C++
false
false
30,314
cpp
/* ############################################################################### # If you use PhysiCell in your project, please cite PhysiCell and the version # # number, such as below: # # # # We implemented and solved the model using PhysiCell (Version x.y.z) [1]. # # # # [1] A Ghaffarizadeh, R Heiland, SH Friedman, SM Mumenthaler, and P Macklin, # # PhysiCell: an Open Source Physics-Based Cell Simulator for Multicellu- # # lar Systems, PLoS Comput. Biol. 14(2): e1005991, 2018 # # DOI: 10.1371/journal.pcbi.1005991 # # # # See VERSION.txt or call get_PhysiCell_version() to get the current version # # x.y.z. Call display_citations() to get detailed information on all cite-# # able software used in your PhysiCell application. # # # # Because PhysiCell extensively uses BioFVM, we suggest you also cite BioFVM # # as below: # # # # We implemented and solved the model using PhysiCell (Version x.y.z) [1], # # with BioFVM [2] to solve the transport equations. # # # # [1] A Ghaffarizadeh, R Heiland, SH Friedman, SM Mumenthaler, and P Macklin, # # PhysiCell: an Open Source Physics-Based Cell Simulator for Multicellu- # # lar Systems, PLoS Comput. Biol. 14(2): e1005991, 2018 # # DOI: 10.1371/journal.pcbi.1005991 # # # # [2] A Ghaffarizadeh, SH Friedman, and P Macklin, BioFVM: an efficient para- # # llelized diffusive transport solver for 3-D biological simulations, # # Bioinformatics 32(8): 1256-8, 2016. DOI: 10.1093/bioinformatics/btv730 # # # ############################################################################### # # # BSD 3-Clause License (see https://opensource.org/licenses/BSD-3-Clause) # # # # Copyright (c) 2015-2018, Paul Macklin and the PhysiCell Project # # All rights reserved. # # # # Redistribution and use in source and binary forms, with or without # # modification, are permitted provided that the following conditions are met: # # # # 1. Redistributions of source code must retain the above copyright notice, # # this list of conditions and the following disclaimer. # # # # 2. Redistributions in binary form must reproduce the above copyright # # notice, this list of conditions and the following disclaimer in the # # documentation and/or other materials provided with the distribution. # # # # 3. Neither the name of the copyright holder nor the names of its # # contributors may be used to endorse or promote products derived from this # # software without specific prior written permission. # # # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" # # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE # # IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE # # ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE # # LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR # # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF # # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS # # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN # # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) # # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE # # POSSIBILITY OF SUCH DAMAGE. # # # ############################################################################### */ #include "./PhysiCell_phenotype.h" #include "../BioFVM/BioFVM.h" #include "./PhysiCell_constants.h" #include "./PhysiCell_utilities.h" using namespace BioFVM; namespace PhysiCell{ Phase::Phase() { index = 0; code = 0; name = "unnamed"; division_at_phase_exit = false; removal_at_phase_exit = false; entry_function = NULL; return; } Phase_Link::Phase_Link() { start_phase_index = 0; end_phase_index = 0; fixed_duration = false; arrest_function = NULL; exit_function = NULL; return; } Cycle_Data::Cycle_Data() { inverse_index_maps.resize(0); pCycle_Model = NULL; time_units = "min"; transition_rates.resize( 0 ); current_phase_index = 0; elapsed_time_in_phase = 0.0; return; } void Cycle_Data::sync_to_cycle_model( void ) { // make sure the inverse map is the right size int n = pCycle_Model->phases.size(); inverse_index_maps.resize( n ); // sync the inverse map to the cell cycle model by // querying the phase_links transition_rates.resize( n ); // also make sure the transition_rates[] are the right size for( int i=0 ; i < pCycle_Model->phase_links.size() ; i++ ) { inverse_index_maps[i].clear(); for( int j=0 ; j < pCycle_Model->phase_links[i].size() ; j++ ) { inverse_index_maps[i][ pCycle_Model->phase_links[i][j].end_phase_index ] = j; transition_rates[i].resize( pCycle_Model->phase_links[i].size() ); } } return; } double& Cycle_Data::transition_rate( int start_phase_index , int end_phase_index ) { return transition_rates[ start_phase_index ][ inverse_index_maps[start_phase_index][end_phase_index] ]; } double& Cycle_Data::exit_rate(int phase_index ) { return transition_rates[phase_index][0]; } Cycle_Model::Cycle_Model() { inverse_index_maps.resize( 0 ); name = "unnamed"; phases.resize(0); phase_links.resize(0); data.pCycle_Model = this; code = PhysiCell_constants::custom_cycle_model; default_phase_index = 0; return; } int Cycle_Model::add_phase( int code, std::string name ) { int n = phases.size(); // resize the data structures phases.resize( n+1 ); phase_links.resize( n+1 ); phase_links[n].resize(0); inverse_index_maps.resize( n+1 ); inverse_index_maps[n].clear(); // update phase n phases[n].code = code; phases[n].index = n; phases[n].name.assign( name ); // make sure the cycle_data is also correctly sized data.sync_to_cycle_model(); return n; } int Cycle_Model::add_phase_link( int start_index, int end_index , bool (*arrest_function)(Cell* pCell, Phenotype& phenotype, double dt) ) { // first, resize the phase links int n = phase_links[start_index].size(); phase_links[start_index].resize( n + 1 ); // now, update the new phase links phase_links[start_index][n].start_phase_index = start_index; phase_links[start_index][n].end_phase_index = end_index; phase_links[start_index][n].arrest_function = arrest_function; // now, update the inverse index map inverse_index_maps[start_index][end_index] = n; // lastly, make sure the transition rates are the right size; data.sync_to_cycle_model(); return n; } int Cycle_Model::add_phase_link( int start_index, int end_index , double rate , bool (*arrest_function)(Cell* pCell, Phenotype& phenotype, double dt) ) { int n = add_phase_link( start_index , end_index , arrest_function ); data.transition_rate( start_index , end_index ) = rate; return n; } int Cycle_Model::find_phase_index( int code ) { for( int i=0 ; i < phases.size() ; i++ ) { if( phases[i].code == code ) { return i; } } return 0; } int Cycle_Model::find_phase_index( std::string name ) { for( int i=0 ; i < phases.size() ; i++ ) { if( phases[i].name == name ) { return i; } } return 0; } std::ostream& Cycle_Model::display( std::ostream& os ) { os << "Cycle Model: " << name << " (PhysiCell code: " << code << ")" << std::endl; os << "Phases and links: (* denotes phase with cell division)" << std::endl; for( int i=0; i < phases.size() ; i++ ) { os << "Phase " << i << " (" << phases[i].name << ") "; if( phases[i].division_at_phase_exit ) { os << "*"; } os << " links to: " << std::endl; for( int k=0 ; k < phase_links[i].size() ; k++ ) { int j = phase_links[i][k].end_phase_index; os << "\tPhase " << j << " (" << phases[j].name << ") with rate " << data.transition_rate(i,j) << " " << data.time_units << "^-1; " << std::endl; } os << std::endl; } return os; } double& Cycle_Model::transition_rate( int start_index , int end_index ) { return data.transition_rate( start_index , end_index ); } Phase_Link& Cycle_Model::phase_link( int start_index, int end_index ) { return phase_links[start_index][ inverse_index_maps[start_index][end_index] ]; } void Cycle_Model::advance_model( Cell* pCell, Phenotype& phenotype, double dt ) { int i = phenotype.cycle.data.current_phase_index; phenotype.cycle.data.elapsed_time_in_phase += dt; // Evaluate each linked phase: // advance to that phase IF probabiltiy is in the range, // and if the arrest function (if any) is false int j; for( int k=0 ; k < phase_links[i].size() ; k++ ) { j = phase_links[i][k].end_phase_index; // check for arrest. If arrested, skip to the next transition bool transition_arrested = false; if( phase_links[i][k].arrest_function ) { transition_arrested = phase_links[i][k].arrest_function( pCell,phenotype,dt ); } if( !transition_arrested ) { // check to see if we should transition bool continue_transition = false; if( phase_links[i][k].fixed_duration ) { if( phenotype.cycle.data.elapsed_time_in_phase > 1.0/phenotype.cycle.data.transition_rates[i][k] ) { continue_transition = true; } } else { double prob = phenotype.cycle.data.transition_rates[i][k]*dt; if( UniformRandom() <= prob ) { continue_transition = true; } } // if we should transition, check if we're not supposed to divide or die if( continue_transition ) { // if the phase transition has an exit function, execute it if( phase_links[i][k].exit_function ) { phase_links[i][k].exit_function( pCell,phenotype,dt ); } // check if division or removal are required if( phases[i].division_at_phase_exit ) { // pCell->flag_for_division(); phenotype.flagged_for_division = true; } if( phases[i].removal_at_phase_exit ) { // pCell->flag_for_removal(); phenotype.flagged_for_removal = true; return; } // move to the next phase, and reset the elapsed time phenotype.cycle.data.current_phase_index = j; phenotype.cycle.data.elapsed_time_in_phase = 0.0; // if the new phase has an entry function, execute it if( phases[j].entry_function ) { phases[j].entry_function( pCell,phenotype,dt ); } return; } } } return; } Phase& Cycle_Data::current_phase( void ) { return pCycle_Model->phases[current_phase_index]; } Death_Parameters::Death_Parameters() { time_units = "min"; // reference values: MCF-7 (1/min) unlysed_fluid_change_rate = 3.0/60.0; // apoptosis lysed_fluid_change_rate = 0.05/60.0; // lysed necrotic cell cytoplasmic_biomass_change_rate = 1.0/60.0; // apoptosis nuclear_biomass_change_rate = 0.35/60.0; // apoptosis calcification_rate = 0.0; // 0.0042 for necrotic cells relative_rupture_volume = 2.0; return; } Death::Death() { rates.resize( 0 ); models.resize( 0 ); parameters.resize( 0 ); dead = false; current_death_model_index = 0; return; } int Death::add_death_model( double rate , Cycle_Model* pModel ) { rates.push_back( rate ); models.push_back( pModel ); parameters.resize( rates.size() ); return rates.size() - 1; } int Death::add_death_model( double rate, Cycle_Model* pModel, Death_Parameters& death_parameters) { rates.push_back( rate ); models.push_back( pModel ); parameters.push_back( death_parameters ); return rates.size() - 1; } int Death::find_death_model_index( int code ) { for( int i=0 ; i < models.size() ; i++ ) { if( models[i]->code == code ) { return i; } } return 0; } int Death::find_death_model_index( std::string name ) { for( int i=0 ; i < models.size() ; i++ ) { if( models[i]->name == name ) { return i; } } return 0; } bool Death::check_for_death( double dt ) { // If the cell is already dead, exit. if( dead == true ) { return false; } // If the cell is alive, evaluate all the // death rates for each registered death type. int i = 0; while( !dead && i < rates.size() ) { if( UniformRandom() < rates[i]*dt ) { // update the Death data structure dead = true; current_death_model_index = i; // and set the cycle model to this death model return dead; } i++; } return dead; } void Death::trigger_death( int death_model_index ) { dead = true; current_death_model_index = death_model_index; /* // if so, change the cycle model to the current death model phenotype.cycle.sync_to_cycle_model( phenotype.death.current_model() ); // also, turn off motility. phenotype.motility.is_motile = false; phenotype.motility.motility_vector.assign( 3, 0.0 ); functions.update_migration_bias = NULL; // turn off secretion, and reduce uptake by a factor of 10 phenotype.secretion.set_all_secretion_to_zero(); phenotype.secretion.scale_all_uptake_by_factor( 0.10 ); // make sure to run the death entry function if( phenotype.cycle.current_phase().entry_function ) { phenotype.cycle.current_phase().entry_function( this, phenotype, dt_ ); } */ return; } Cycle_Model& Death::current_model( void ) { return *models[current_death_model_index]; } Cycle::Cycle() { pCycle_Model = NULL; return; } void Cycle::advance_cycle( Cell* pCell, Phenotype& phenotype, double dt ) { pCycle_Model->advance_model( pCell, phenotype , dt ); return; } Cycle_Model& Cycle::model( void ) { return *pCycle_Model; } Phase& Cycle::current_phase( void ) { return data.current_phase(); } int& Cycle::current_phase_index( void ) { return data.current_phase_index; } void Cycle::sync_to_cycle_model( Cycle_Model& cm ) { pCycle_Model = &cm; data = cm.data; return; } Death_Parameters& Death::current_parameters( void ) { return parameters[ current_death_model_index ]; } Volume::Volume() { // reference parameter values for MCF-7, in cubic microns fluid_fraction = 0.75; total = 2494; fluid = fluid_fraction * total; solid = total-fluid; nuclear = 540.0; nuclear_fluid = fluid_fraction * nuclear; nuclear_solid = nuclear - nuclear_fluid; cytoplasmic = total - nuclear; cytoplasmic_fluid = fluid_fraction*cytoplasmic; cytoplasmic_solid = cytoplasmic - cytoplasmic_fluid; // rates are in units of 1/min cytoplasmic_biomass_change_rate = 0.27 / 60.0; nuclear_biomass_change_rate = 0.33 / 60.0; fluid_change_rate = 3.0 / 60.0; calcified_fraction = 0.0; calcification_rate = 0.0; target_solid_cytoplasmic = cytoplasmic_solid; target_solid_nuclear = nuclear_solid; target_fluid_fraction = fluid_fraction; cytoplasmic_to_nuclear_ratio = cytoplasmic / ( 1e-16 + nuclear); target_cytoplasmic_to_nuclear_ratio = cytoplasmic_to_nuclear_ratio; // the cell bursts at these volumes relative_rupture_volume = 2.0; // as fraction of volume at entry to the current phase rupture_volume = relative_rupture_volume * total; // in volume units return; }; void Volume::multiply_by_ratio( double ratio ) { total *= ratio; solid *= ratio; fluid *= ratio; nuclear *= ratio; nuclear_fluid *= ratio; nuclear_solid *= ratio; cytoplasmic *= ratio; cytoplasmic_fluid *= ratio; cytoplasmic_solid *= ratio; rupture_volume *= ratio; target_solid_nuclear *= ratio; target_solid_cytoplasmic *= ratio; return; } void Volume::divide( void ) { multiply_by_ratio( 0.5 ); return; } Geometry::Geometry() { // reference values for MCF-7, based on // volume = 2494 cubic microns // nuclear volume = 540 cubic microns radius = 8.412710547954228; nuclear_radius = 5.051670902881889; surface_area = 889.3685284131693; polarity = 0.0; return; } void Geometry::update_radius( Cell* pCell, Phenotype& phenotype, double dt ) { static double four_thirds_pi = 4.188790204786391; radius = phenotype.volume.total; radius /= four_thirds_pi; radius = pow( radius , 0.333333333333333333333333333333333333333 ); return; } void Geometry::update_nuclear_radius( Cell* pCell, Phenotype& phenotype, double dt ) { static double four_thirds_pi = 4.188790204786391; nuclear_radius = phenotype.volume.nuclear; nuclear_radius /= four_thirds_pi; nuclear_radius = pow( nuclear_radius , 0.333333333333333333333333333333333333333 ); return; } void Geometry::update_surface_area( Cell* pCell, Phenotype& phenotype, double dt ) { // 4pi / (4pi/3)^(2/3) static double the_constant = 4.835975862049409; surface_area = pow( phenotype.volume.total , 0.666666666666667 ); surface_area /= the_constant; return; } void Geometry::update( Cell* pCell, Phenotype& phenotype, double dt ) { update_radius(pCell,phenotype,dt); update_nuclear_radius(pCell,phenotype,dt); // surface area = 4*pi*r^2 = (4/3)*pi*r^3 / (r/3) surface_area = phenotype.volume.total; surface_area /= radius; surface_area *= 3.0; return; } Mechanics::Mechanics() { cell_cell_adhesion_strength = 0.4; cell_BM_adhesion_strength = 4.0; cell_cell_repulsion_strength = 10.0; cell_BM_repulsion_strength = 10.0; // this is a multiple of the cell (equivalent) radius relative_maximum_adhesion_distance = 1.25; // maximum_adhesion_distance = 0.0; return; } // new on July 29, 2018 // change the ratio without changing the repulsion strength or equilibrium spacing void Mechanics::set_relative_maximum_adhesion_distance( double new_value ) { // get old equilibrium spacing, based on equilibriation of pairwise adhesive/repulsive forces at that distance. // relative equilibrium spacing (relative to mean cell radius) double s_relative = 2.0; double temp1 = cell_cell_adhesion_strength; temp1 /= cell_cell_repulsion_strength; temp1 = sqrt( temp1 ); double temp2 = 1.0; temp2 -= temp1; // 1 - sqrt( alpha_CCA / alpha_CCR ); s_relative *= temp2; // 2*( 1 - sqrt( alpha_CCA / alpha_CCR ) ); temp1 /= relative_maximum_adhesion_distance; // sqrt( alpha_CCA / alpha_CCR)/f; temp2 = 1.0; temp2 -= temp1; // 1 - sqrt( alpha_CCA / alpha_CCR )/f; s_relative /= temp2; // 2*( 1 - sqrt( alpha_CCA / alpha_CCR ) ) / ( 1-1/f) ; // now, adjust the relative max adhesion distance relative_maximum_adhesion_distance = new_value; // adjust the adhesive coefficient to preserve the old equilibrium distance temp1 = s_relative; temp1 /= 2.0; temp2 = 1.0; temp2 -= temp1; // 1 - s_relative/2.0 temp1 /= relative_maximum_adhesion_distance; // s_relative/(2*relative_maximum_adhesion_distance); temp1 *= -1.0; // -s_relative/(2*relative_maximum_adhesion_distance); temp1 += 1.0; // 1.0 -s_relative/(2*relative_maximum_adhesion_distance); temp2 /= temp1; temp2 *= temp2; cell_cell_adhesion_strength = cell_cell_repulsion_strength; cell_cell_adhesion_strength *= temp2; return; } // new on July 29, 2018 // set the cell-cell equilibrium spacing, accomplished by changing the // cell-cell adhesion strength, while leaving the cell-cell repulsion // strength and the maximum adhesion distance unchanged void Mechanics::set_relative_equilibrium_distance( double new_value ) { if( new_value > 2.0 ) { std::cout << "**** Warning in function " << __FUNCTION__ << " in " << __FILE__ << " : " << std::endl << "\tAttempted to set equilibrium distance exceeding two cell radii." << std::endl << "\tWe will cap the equilibrium distance at 2.0 cell radii." << std::endl << "****" << std::endl << std::endl; new_value = 2.0; } // adjust the adhesive coefficient to achieve the new (relative) equilibrium distance double temp1 = new_value; temp1 /= 2.0; double temp2 = 1.0; temp2 -= temp1; // 1 - s_relative/2.0 temp1 /= relative_maximum_adhesion_distance; // s_relative/(2*relative_maximum_adhesion_distance); temp1 *= -1.0; // -s_relative/(2*relative_maximum_adhesion_distance); temp1 += 1.0; // 1.0 -s_relative/(2*relative_maximum_adhesion_distance); temp2 /= temp1; temp2 *= temp2; cell_cell_adhesion_strength = cell_cell_repulsion_strength; cell_cell_adhesion_strength *= temp2; return; } void Mechanics::set_absolute_equilibrium_distance( Phenotype& phenotype, double new_value ) { return set_relative_equilibrium_distance( new_value / phenotype.geometry.radius ); } // void Mechanics::set_absolute_maximum_adhesion_distance( double new_value ); // void Motility::Motility() { is_motile = false; persistence_time = 1.0; migration_speed = 1.0; migration_bias_direction.resize( 3 , 0.0 ); migration_bias = 0.0; restrict_to_2D = false; // update_migration_bias_direction = NULL; motility_vector.resize( 3 , 0.0 ); chemotaxis_index = 0; chemotaxis_direction = 1; return; } Secretion::Secretion() { pMicroenvironment = get_default_microenvironment(); sync_to_current_microenvironment(); return; } void Secretion::sync_to_current_microenvironment( void ) { if( pMicroenvironment ) { sync_to_microenvironment( pMicroenvironment ); } else { secretion_rates.resize( 0 , 0.0 ); uptake_rates.resize( 0 , 0.0 ); saturation_densities.resize( 0 , 0.0 ); net_export_rates.resize( 0, 0.0 ); } return; } void Secretion::sync_to_microenvironment( Microenvironment* pNew_Microenvironment ) { pMicroenvironment = pNew_Microenvironment; secretion_rates.resize( pMicroenvironment->number_of_densities() , 0.0 ); uptake_rates.resize( pMicroenvironment->number_of_densities() , 0.0 ); saturation_densities.resize( pMicroenvironment->number_of_densities() , 0.0 ); net_export_rates.resize( pMicroenvironment->number_of_densities() , 0.0 ); return; } void Secretion::advance( Basic_Agent* pCell, Phenotype& phenotype , double dt ) { // if this phenotype is not associated with a cell, exit if( pCell == NULL ) { return; } // if there is no microenvironment, attempt to sync. if( pMicroenvironment == NULL ) { // first, try the cell's microenvironment if( pCell->get_microenvironment() ) { sync_to_microenvironment( pCell->get_microenvironment() ); } // otherwise, try the default microenvironment else { sync_to_microenvironment( get_default_microenvironment() ); } // if we've still failed, return. if( pMicroenvironment == NULL ) { return; } } // make sure the associated cell has the correct rate vectors if( pCell->secretion_rates != &secretion_rates ) { delete pCell->secretion_rates; delete pCell->uptake_rates; delete pCell->saturation_densities; delete pCell->net_export_rates; pCell->secretion_rates = &secretion_rates; pCell->uptake_rates = &uptake_rates; pCell->saturation_densities = &saturation_densities; pCell->net_export_rates = &net_export_rates; pCell->set_total_volume( phenotype.volume.total ); pCell->set_internal_uptake_constants( dt ); } // now, call the BioFVM secretion/uptake function pCell->simulate_secretion_and_uptake( pMicroenvironment , dt ); return; } void Secretion::set_all_secretion_to_zero( void ) { for( int i=0; i < secretion_rates.size(); i++ ) { secretion_rates[i] = 0.0; net_export_rates[i] = 0.0; } return; } void Secretion::set_all_uptake_to_zero( void ) { for( int i=0; i < uptake_rates.size(); i++ ) { uptake_rates[i] = 0.0; } return; } void Secretion::scale_all_secretion_by_factor( double factor ) { for( int i=0; i < secretion_rates.size(); i++ ) { secretion_rates[i] *= factor; net_export_rates[i] *= factor; } return; } void Secretion::scale_all_uptake_by_factor( double factor ) { for( int i=0; i < uptake_rates.size(); i++ ) { uptake_rates[i] *= factor; } return; } Molecular::Molecular() { pMicroenvironment = get_default_microenvironment(); sync_to_current_microenvironment(); return; } void Molecular::sync_to_current_microenvironment( void ) { if( pMicroenvironment ) { sync_to_microenvironment( pMicroenvironment ); } else { internalized_total_substrates.resize( 0 , 0.0 ); fraction_released_at_death.resize( 0 , 0.0 ); fraction_transferred_when_ingested.resize( 0, 0.0 ); } return; } void Molecular::sync_to_microenvironment( Microenvironment* pNew_Microenvironment ) { pMicroenvironment = pNew_Microenvironment; int number_of_densities = pMicroenvironment->number_of_densities() ; internalized_total_substrates.resize( number_of_densities , 0.0 ); fraction_released_at_death.resize( number_of_densities , 0.0 ); fraction_transferred_when_ingested.resize( number_of_densities , 0.0 ); return; } void Molecular::sync_to_cell( Basic_Agent* pCell ) { delete pCell->internalized_substrates; pCell->internalized_substrates = &internalized_total_substrates; delete pCell->fraction_released_at_death; pCell->fraction_released_at_death = &fraction_released_at_death; delete pCell->fraction_transferred_when_ingested; pCell->fraction_transferred_when_ingested = &fraction_transferred_when_ingested; return; } /* void Molecular::advance( Basic_Agent* pCell, Phenotype& phenotype , double dt ) { // if this phenotype is not associated with a cell, exit if( pCell == NULL ) { return; } // if there is no microenvironment, attempt to sync. if( pMicroenvironment == NULL ) { // first, try the cell's microenvironment if( pCell->get_microenvironment() ) { sync_to_microenvironment( pCell->get_microenvironment() ); } // otherwise, try the default microenvironment else { sync_to_microenvironment( get_default_microenvironment() ); } // if we've still failed, return. if( pMicroenvironment == NULL ) { return; } } // make sure the associated cell has the correct rate vectors if( pCell->internalized_substrates != &internalized_substrates ) { // copy the data over internalized_substrates = *(pCell->internalized_substrates); // remove the BioFVM copy delete pCell->internalized_substrates; // point BioFVM to this one pCell->internalized_substrates = &internalized_substrates; } // now, call the functions // if( pCell->functions.internal_substrate_function ) // { pCell->functions.internal_substrate_function( pCell,phenotype,dt); } // if( pCell->functions.molecular_model_function ) // { pCell->functions.molecular_model_function( pCell,phenotype,dt); } return; } */ Cell_Functions::Cell_Functions() { instantiate_cell = NULL; volume_update_function = NULL; update_migration_bias = NULL; update_phenotype = NULL; custom_cell_rule = NULL; update_velocity = NULL; add_cell_basement_membrane_interactions = NULL; calculate_distance_to_membrane = NULL; set_orientation = NULL; contact_function = NULL; custom_adhesion = NULL; custom_repulsion = NULL; /* internal_substrate_function = NULL; molecular_model_function = NULL; */ return; } void Phenotype::sync_to_functions( Cell_Functions& functions ) { cycle.sync_to_cycle_model( functions.cycle_model ); return; } Phenotype::Phenotype() { flagged_for_division = false; flagged_for_removal = false; // sync the molecular stuff here automatically? intracellular = NULL; //rwh: review return; } void Phenotype::operator=(const Phenotype &p ) { flagged_for_division = p.flagged_for_division; flagged_for_removal = p.flagged_for_removal; cycle = p.cycle; death = p.death; volume = p.volume; geometry = p.geometry; mechanics = p.mechanics; motility = p.motility; secretion = p.secretion; molecular = p.molecular; if (p.intracellular != NULL) { intracellular = p.intracellular->clone(); } } void Phenotype::operator=(Phenotype &p ) { flagged_for_division = p.flagged_for_division; flagged_for_removal = p.flagged_for_removal; cycle = p.cycle; death = p.death; volume = p.volume; geometry = p.geometry; mechanics = p.mechanics; motility = p.motility; secretion = p.secretion; molecular = p.molecular; if (p.intracellular != NULL) { intracellular = p.intracellular->clone(); } } /* class Bools { public: std::vector<bool> values; std::unordered_map<std::string,int> name_map; std::string& name( int i ); std::vector<std::string> units; void resize( int n ); int add( std::string name , std::string units , bool value ); bool& operator[]( int i ); bool& operator[]( std::string name ); Bools(); } */ Bools::Bools() { values.resize( 0 , true ); name_map.clear(); return; } int Bools::size( void ) { return values.size(); } void Phenotype::sync_to_microenvironment( Microenvironment* pMicroenvironment ) { secretion.sync_to_microenvironment( pMicroenvironment ); molecular.sync_to_microenvironment( pMicroenvironment ); return; } };
[ "fkurtog@iu.edu" ]
fkurtog@iu.edu
90b39b98cc85846dc155533752e3cff4254e5d8d
9e44370e60902484235bf474b64d5b2bdaf5c621
/RPNCalculator/RPNCalculator/SubtractionOperation.h
5572d940f490540ad823e56b1a4fe8600c4456fb
[]
no_license
guardhao104/COMP_3512_Lab5
da3b18db998788ed03bbaab8d3c8cbae6d47bac4
730e5ef671b7b1444ed3458400b94cbf6864c515
refs/heads/master
2021-09-11T18:22:02.438198
2018-04-11T01:01:15
2018-04-11T01:01:15
121,799,555
0
0
null
null
null
null
UTF-8
C++
false
false
315
h
#pragma once #include "AbstractOperation.h" class SubtractionOperation : public AbstractOperation { public: static const char OPERATION_CODE = '-'; SubtractionOperation() : AbstractOperation(OPERATION_CODE) {}; int perform(int a, int b) override { return a - b; }; virtual inline ~SubtractionOperation() {}; };
[ "guardhao@outlook.com" ]
guardhao@outlook.com
027aca067d7f26bed79300a14b49b2dbbdcd7ace
ca64b4571ee17d5796833d60aa5f0d4368921d93
/src/point.h
16a7fc1fe899e473777a7a46ae48fabab53f9b23
[ "BSD-3-Clause" ]
permissive
greatyang/kmeans
a92881a8e14017f0c3f67b698b2cac8c0c92c69d
3af446c0cb973ae2f39a6e6a421ac396b3c243ac
refs/heads/master
2022-11-25T23:04:17.220027
2016-06-21T07:19:34
2016-06-21T07:19:34
281,397,073
0
0
BSD-3-Clause
2020-07-21T12:52:00
2020-07-21T12:52:00
null
UTF-8
C++
false
false
1,060
h
// Basic storage class for an n-dimensional point with a cluster assignment. // // Author: Felix Duvallet #ifndef __KMEANS_POINT_H__ #define __KMEANS_POINT_H__ #include <vector> #include <iostream> class Point { public: Point() { } // Initialize the number of dimensions, optionally set all values to zero. Point(int num_dimensions, bool init_zeros = true); Point(double x, double y, double z); // Initialize from a vector. Point(const std::vector<double> &vector); ~Point() { } // Compute distance between two points. static double distance(const Point &p1, const Point &p2); // Adds a point to the current point. void add(const Point &point); // Update the cluster assignment. Returns true if cluster assignment // changed, false if it stayed the same. bool update(int k); // Members: the data, the number of dimensions, and the cluster ID. std::vector<double> data_; int dimensions_; int cluster_; friend std::ostream &operator<<(std::ostream &target, const Point &point); }; #endif // __KMEANS_POINT_H_
[ "felix.duvallet@epfl.ch" ]
felix.duvallet@epfl.ch
645a8b082dd40c4a063fea7187c52d38644f9095
c475cd8531a94ffae69cc92371d41531dbbddb6c
/Libraries/breakpad/src/google_breakpad/processor/process_state.h
728656f2bd7cffa0313a4fdd2242932209f5de4c
[ "Apache-2.0", "LicenseRef-scancode-free-unknown", "BSD-3-Clause", "LicenseRef-scancode-unicode-mappings" ]
permissive
WolfireGames/overgrowth
72d3dd29cbd7254337265c29f8de3e5c32400114
594a2a4f9da0855304ee8cd5335d042f8e954ce1
refs/heads/main
2023-08-15T19:36:56.156578
2023-05-17T08:17:53
2023-05-17T08:20:36
467,448,492
2,264
245
Apache-2.0
2023-05-09T07:29:58
2022-03-08T09:38:54
C++
UTF-8
C++
false
false
8,042
h
// Copyright (c) 2006, Google Inc. // All rights reserved. // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following disclaimer // in the documentation and/or other materials provided with the // distribution. // * Neither the name of Google Inc. nor the names of its // contributors may be used to endorse or promote products derived from // this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // process_state.h: A snapshot of a process, in a fully-digested state. // // Author: Mark Mentovai #ifndef GOOGLE_BREAKPAD_PROCESSOR_PROCESS_STATE_H__ #define GOOGLE_BREAKPAD_PROCESSOR_PROCESS_STATE_H__ #include <string> #include <vector> #include "common/using_std_string.h" #include "google_breakpad/common/breakpad_types.h" #include "google_breakpad/processor/system_info.h" #include "google_breakpad/processor/minidump.h" namespace google_breakpad { using std::vector; class CallStack; class CodeModules; enum ExploitabilityRating { EXPLOITABILITY_HIGH, // The crash likely represents // a exploitable memory corruption // vulnerability. EXPLOITABILITY_MEDIUM, // The crash appears to corrupt // memory in a way which may be // exploitable in some situations. EXPLOITABLITY_MEDIUM = EXPLOITABILITY_MEDIUM, // an old misspelling EXPLOITABILITY_LOW, // The crash either does not corrupt // memory directly or control over // the affected data is limited. The // issue may still be exploitable // on certain platforms or situations. EXPLOITABILITY_INTERESTING, // The crash does not appear to be // directly exploitable. However it // represents a condition which should // be further analyzed. EXPLOITABILITY_NONE, // The crash does not appear to represent // an exploitable condition. EXPLOITABILITY_NOT_ANALYZED, // The crash was not analyzed for // exploitability because the engine // was disabled. EXPLOITABILITY_ERR_NOENGINE, // The supplied minidump's platform does // not have a exploitability engine // associated with it. EXPLOITABILITY_ERR_PROCESSING // An error occured within the // exploitability engine and no rating // was calculated. }; class ProcessState { public: ProcessState() : modules_(NULL) { Clear(); } ~ProcessState(); // Resets the ProcessState to its default values void Clear(); // Accessors. See the data declarations below. uint32_t time_date_stamp() const { return time_date_stamp_; } uint32_t process_create_time() const { return process_create_time_; } bool crashed() const { return crashed_; } string crash_reason() const { return crash_reason_; } uint64_t crash_address() const { return crash_address_; } string assertion() const { return assertion_; } int requesting_thread() const { return requesting_thread_; } const vector<CallStack*>* threads() const { return &threads_; } const vector<MemoryRegion*>* thread_memory_regions() const { return &thread_memory_regions_; } const SystemInfo* system_info() const { return &system_info_; } const CodeModules* modules() const { return modules_; } const vector<const CodeModule*>* modules_without_symbols() const { return &modules_without_symbols_; } const vector<const CodeModule*>* modules_with_corrupt_symbols() const { return &modules_with_corrupt_symbols_; } ExploitabilityRating exploitability() const { return exploitability_; } private: // MinidumpProcessor and MicrodumpProcessor are responsible for building // ProcessState objects. friend class MinidumpProcessor; friend class MicrodumpProcessor; // The time-date stamp of the minidump (time_t format) uint32_t time_date_stamp_; // The time-date stamp when the process was created (time_t format) uint32_t process_create_time_; // True if the process crashed, false if the dump was produced outside // of an exception handler. bool crashed_; // If the process crashed, the type of crash. OS- and possibly CPU- // specific. For example, "EXCEPTION_ACCESS_VIOLATION" (Windows), // "EXC_BAD_ACCESS / KERN_INVALID_ADDRESS" (Mac OS X), "SIGSEGV" // (other Unix). string crash_reason_; // If the process crashed, and if crash_reason implicates memory, // the memory address that caused the crash. For data access errors, // this will be the data address that caused the fault. For code errors, // this will be the address of the instruction that caused the fault. uint64_t crash_address_; // If there was an assertion that was hit, a textual representation // of that assertion, possibly including the file and line at which // it occurred. string assertion_; // The index of the thread that requested a dump be written in the // threads vector. If a dump was produced as a result of a crash, this // will point to the thread that crashed. If the dump was produced as // by user code without crashing, and the dump contains extended Breakpad // information, this will point to the thread that requested the dump. // If the dump was not produced as a result of an exception and no // extended Breakpad information is present, this field will be set to -1, // indicating that the dump thread is not available. int requesting_thread_; // Stacks for each thread (except possibly the exception handler // thread) at the time of the crash. vector<CallStack*> threads_; vector<MemoryRegion*> thread_memory_regions_; // OS and CPU information. SystemInfo system_info_; // The modules that were loaded into the process represented by the // ProcessState. const CodeModules *modules_; // The modules that didn't have symbols when the report was processed. vector<const CodeModule*> modules_without_symbols_; // The modules that had corrupt symbols when the report was processed. vector<const CodeModule*> modules_with_corrupt_symbols_; // The exploitability rating as determined by the exploitability // engine. When the exploitability engine is not enabled this // defaults to EXPLOITABILITY_NOT_ANALYZED. ExploitabilityRating exploitability_; }; } // namespace google_breakpad #endif // GOOGLE_BREAKPAD_PROCESSOR_PROCESS_STATE_H__
[ "max@autious.net" ]
max@autious.net
f0f2bc83cb16db4cddfa2c3134b32e0e7ad03ef3
82b6551a79786cbe0727b8b8473bc69d11260cec
/Exception.cpp
6f83ec4a0b6d57f12e6f0d4a26883ade1a228f99
[]
no_license
lfxy/netframe
831dddcf7e0b02b663a66e989214317b13249a66
e11b3b0bf1fc9641884d97b03e0704259f251a79
refs/heads/master
2020-04-16T15:41:46.017639
2016-04-22T10:25:08
2016-04-22T10:25:08
32,329,060
0
0
null
null
null
null
UTF-8
C++
false
false
1,004
cpp
// Use of this source code is governed by a BSD-style license // that can be found in the License file. // // Author: Shuo Chen (chenshuo at chenshuo dot com) #include <Exception.h> //#include <cxxabi.h> #include <execinfo.h> #include <stdlib.h> Exception::Exception(const char* msg) : message_(msg) { fillStackTrace(); } Exception::Exception(const std::string& msg) : message_(msg) { fillStackTrace(); } Exception::~Exception() throw () { } const char* Exception::what() const throw() { return message_.c_str(); } const char* Exception::stackTrace() const throw() { return stack_.c_str(); } void Exception::fillStackTrace() { const int len = 200; void* buffer[len]; int nptrs = ::backtrace(buffer, len); char** strings = ::backtrace_symbols(buffer, nptrs); if (strings) { for (int i = 0; i < nptrs; ++i) { // TODO demangle funcion name with abi::__cxa_demangle stack_.append(strings[i]); stack_.push_back('\n'); } free(strings); } }
[ "zhiqiang.cao@emc.com" ]
zhiqiang.cao@emc.com
629638e8911603d13c54cf077141ef08f6014e0e
6d1c143787686870c2bd792b75836c5a707dad3f
/Server/SceneServer/SSBattleMgr/SSBTreeCon_NoEnemyHero.h
a61e6001c06e4cd2a7b14c29630bd41a5f0eadc8
[]
no_license
jakeowner/lastbattle
66dad639dd0ac43fd46bac7a0005cc157d350cc9
22d310f5bca796461678ccf044389ed5f60e03e0
refs/heads/master
2021-05-06T18:25:48.932112
2017-11-24T08:21:59
2017-11-24T08:21:59
111,915,246
45
34
null
2017-11-24T12:19:15
2017-11-24T12:19:15
null
UTF-8
C++
false
false
602
h
/* * file name :SSBTreeCon_NoEnemyHero.h * file mark : * summary : * * version :1.0 * author :LiuLu * complete date :November 11 2014 * summary : * */ #pragma once #include "stdafx.h" #include "SSBTreeCondition.h" namespace SceneServer{ class CSSHero; class CSSBTreeCon_NoEnemyHero : public CSSBTreeCondition{ private: public: CSSBTreeCon_NoEnemyHero(INT32 id, INT32 parameters[]):CSSBTreeCondition(id,parameters){} ~CSSBTreeCon_NoEnemyHero(){}; BOOLEAN Travel(CSSAI_HeroRobot* pAI,CSSBTreeNode *&pActionNode,vector<SBTreeResult> *rstVec); }; };
[ "613961636@qq.com" ]
613961636@qq.com
4c4ed686f582dbcc08758fc34bcabe993a648705
38698091bf4e8bd30685f0accd281b92507e6d5f
/advancedLighting/HDR-toneMapping/HDR2/toneMapping.cpp
461db24ba5e34e3733d7cc6bee7a8c6448bd627c
[ "MIT" ]
permissive
Ron3/noteForOpenGL
0e49a6c09d15e119c8058a7ca1ad84ff6782928e
c59e8b55d7cb17085a455fad6b6f300cfe500f0f
refs/heads/master
2021-01-20T12:28:39.360336
2017-02-19T08:23:30
2017-02-19T08:23:30
null
0
0
null
null
null
null
GB18030
C++
false
false
14,213
cpp
// 引入GLEW库 定义静态链接 #define GLEW_STATIC #include <GLEW/glew.h> // 引入GLFW库 #include <GLFW/glfw3.h> // 引入SOIL库 #include <SOIL/SOIL.h> // 引入GLM库 #include <GLM/glm.hpp> #include <GLM/gtc/matrix_transform.hpp> #include <GLM/gtc/type_ptr.hpp> #include <iostream> #include <vector> #include <sstream> // 包含着色器加载库 #include "shader.h" // 包含相机控制辅助类 #include "camera.h" // 包含纹理加载辅助类 #include "texture.h" // 键盘回调函数原型声明 void key_callback(GLFWwindow* window, int key, int scancode, int action, int mods); // 鼠标移动回调函数原型声明 void mouse_move_callback(GLFWwindow* window, double xpos, double ypos); // 鼠标滚轮回调函数原型声明 void mouse_scroll_callback(GLFWwindow* window, double xoffset, double yoffset); // 场景中移动 void do_movement(); // 定义程序常量 const int WINDOW_WIDTH = 800, WINDOW_HEIGHT = 600; // 用于相机交互参数 GLfloat lastX = WINDOW_WIDTH / 2.0f, lastY = WINDOW_HEIGHT / 2.0f; bool firstMouseMove = true; bool keyPressedStatus[1024]; // 按键情况记录 GLfloat deltaTime = 0.0f; // 当前帧和上一帧的时间差 GLfloat lastFrame = 0.0f; // 上一帧时间 Camera camera(glm::vec3(0.0f, 0.0f, 5.0f)); GLfloat exposureFactor = 1.0f; GLuint CubeVAOId, CubeVBOId; GLuint quadVAOId, quadVBOId; GLuint sceneTextId; void prepareVBO(); GLuint HDRTextId, HDRFBOId; bool prepareHDRFBO(GLuint& HDRFBOId, GLuint& HDRTextId); void renderScene(Shader& shader); void renderAdjustedScene(Shader& shader); int main(int argc, char** argv) { if (!glfwInit()) // 初始化glfw库 { std::cout << "Error::GLFW could not initialize GLFW!" << std::endl; return -1; } // 开启OpenGL 3.3 core profile std::cout << "Start OpenGL core profile version 3.3" << std::endl; glfwWindowHint(GLFW_CONTEXT_VERSION_MAJOR, 3); glfwWindowHint(GLFW_CONTEXT_VERSION_MINOR, 3); glfwWindowHint(GLFW_OPENGL_PROFILE, GLFW_OPENGL_CORE_PROFILE); glfwWindowHint(GLFW_RESIZABLE, GL_FALSE); // 创建窗口 GLFWwindow* window = glfwCreateWindow(WINDOW_WIDTH, WINDOW_HEIGHT, "Demo of HDR-tone mapping(use up down change exposure)", NULL, NULL); if (!window) { std::cout << "Error::GLFW could not create winddow!" << std::endl; glfwTerminate(); return -1; } // 创建的窗口的context指定为当前context glfwMakeContextCurrent(window); // 注册窗口键盘事件回调函数 glfwSetKeyCallback(window, key_callback); // 注册鼠标事件回调函数 glfwSetCursorPosCallback(window, mouse_move_callback); // 注册鼠标滚轮事件回调函数 glfwSetScrollCallback(window, mouse_scroll_callback); // 鼠标捕获 停留在程序内 glfwSetInputMode(window, GLFW_CURSOR, GLFW_CURSOR_DISABLED); // 初始化GLEW 获取OpenGL函数 glewExperimental = GL_TRUE; // 让glew获取所有拓展函数 GLenum status = glewInit(); if (status != GLEW_OK) { std::cout << "Error::GLEW glew version:" << glewGetString(GLEW_VERSION) << " error string:" << glewGetErrorString(status) << std::endl; glfwTerminate(); return -1; } // 设置视口参数 glViewport(0, 0, WINDOW_WIDTH, WINDOW_HEIGHT); // Section1 准备顶点数据 prepareVBO(); prepareHDRFBO(HDRFBOId, HDRTextId); // Section2 加载纹理 sceneTextId = TextureHelper::load2DTexture("../../resources/textures/wood.png"); // Section3 准备着色器程序 Shader shader("scene.vertex", "scene.frag"); Shader HDRShader("hdrAdjust.vertex", "hdrAdjust.frag"); // Section4 准备光源数据 struct LightAttr { LightAttr(glm::vec3 pos, glm::vec3 diff, glm::vec3 spec) { position = pos; diffuse = diff; specular = spec; } glm::vec3 position; glm::vec3 diffuse; glm::vec3 specular; }; std::vector<LightAttr> seqLightAttr; seqLightAttr.push_back(LightAttr(glm::vec3(0.0f, 0.0f, 49.5f), glm::vec3(200.0f / 5.0f, 200.0f / 5.0f, 200.0f / 5.0f), glm::vec3(200.0f, 200.0f, 200.0f))); seqLightAttr.push_back(LightAttr(glm::vec3(-1.4f, -1.9f, 9.0f), glm::vec3(0.1f / 5.0f, 0.0f, 0.0f), glm::vec3(0.1f, 0.0f, 0.0f))); seqLightAttr.push_back(LightAttr(glm::vec3(0.0f, -1.8f, 4.0f), glm::vec3(0.0f, 0.0f, 0.2f / 5.0f), glm::vec3(0.0f, 0.0f, 0.2f))); seqLightAttr.push_back(LightAttr(glm::vec3(0.8f, -1.7f, 6.0f), glm::vec3(0.0f, 0.1f / 5.0f, 0.0f), glm::vec3(0.0f, 0.1f, 0.0f))); glEnable(GL_DEPTH_TEST); // 开始游戏主循环 while (!glfwWindowShouldClose(window)) { GLfloat currentFrame = (GLfloat)glfwGetTime(); deltaTime = currentFrame - lastFrame; lastFrame = currentFrame; glfwPollEvents(); // 处理例如鼠标 键盘等事件 do_movement(); // 根据用户操作情况 更新相机属性 glm::mat4 projection = glm::perspective(camera.mouse_zoom, (GLfloat)(WINDOW_WIDTH) / WINDOW_HEIGHT, 1.0f, 100.0f); // 投影矩阵 glm::mat4 view = camera.getViewMatrix(); // 视变换矩阵 // 这里填写场景绘制代码 glm::mat4 model = glm::mat4(); // 第一遍 绘制场景到HDR Frame buffer glBindFramebuffer(GL_FRAMEBUFFER, HDRFBOId); shader.use(); // 清除颜色缓冲区 重置为指定颜色 glClearColor(0.18f, 0.04f, 0.14f, 1.0f); glClear(GL_COLOR_BUFFER_BIT | GL_DEPTH_BUFFER_BIT); // 设置光源属性 for (size_t i = 0; i < seqLightAttr.size(); ++i) { std::stringstream strStream; strStream << "lights[" << i << "]"; std::string indexStr = strStream.str(); glUniform3fv(glGetUniformLocation(shader.programId, (indexStr + ".diffuse").c_str()), 1, glm::value_ptr(seqLightAttr[i].diffuse)); glUniform3fv(glGetUniformLocation(shader.programId, (indexStr + ".specular").c_str()), 1, glm::value_ptr(seqLightAttr[i].specular)); glUniform3fv(glGetUniformLocation(shader.programId, (indexStr + ".position").c_str()), 1, glm::value_ptr(seqLightAttr[i].position)); } // 设置观察者位置 GLint viewPosLoc = glGetUniformLocation(shader.programId, "viewPos"); glUniform3f(viewPosLoc, camera.position.x, camera.position.y, camera.position.z); // 设置变换矩阵 glUniformMatrix4fv(glGetUniformLocation(shader.programId, "projection"), 1, GL_FALSE, glm::value_ptr(projection)); glUniformMatrix4fv(glGetUniformLocation(shader.programId, "view"), 1, GL_FALSE, glm::value_ptr(view)); model = glm::mat4(); model = glm::translate(model, glm::vec3(0.0f, 0.0f, 25.0)); model = glm::scale(model, glm::vec3(5.0f, 5.0f, 55.0f)); glUniformMatrix4fv(glGetUniformLocation(shader.programId, "model"), 1, GL_FALSE, glm::value_ptr(model)); glUniform1i(glGetUniformLocation(shader.programId, "inverse_normals"), GL_TRUE); renderScene(shader); glBindFramebuffer(GL_FRAMEBUFFER, 0); // 第二遍 调整HDR中color buffer 绘制到平面上 glClearColor(0.18f, 0.04f, 0.14f, 1.0f); glClear(GL_COLOR_BUFFER_BIT | GL_DEPTH_BUFFER_BIT); HDRShader.use(); glUniform1f(glGetUniformLocation(HDRShader.programId, "exposureFactor"), exposureFactor); renderAdjustedScene(HDRShader); glBindVertexArray(0); glUseProgram(0); glfwSwapBuffers(window); // 交换缓存 } // 释放资源 glDeleteVertexArrays(1, &quadVAOId); glDeleteBuffers(1, &quadVBOId); glfwTerminate(); return 0; } void key_callback(GLFWwindow* window, int key, int scancode, int action, int mods) { if (key >= 0 && key < 1024) { if (action == GLFW_PRESS) keyPressedStatus[key] = true; else if (action == GLFW_RELEASE) keyPressedStatus[key] = false; } if (key == GLFW_KEY_ESCAPE && action == GLFW_PRESS) { glfwSetWindowShouldClose(window, GL_TRUE); // 关闭窗口 } else if (key == GLFW_KEY_UP && action == GLFW_PRESS) { exposureFactor += 0.1f; std::cout << "exposure: " << exposureFactor << std::endl; } else if (key == GLFW_KEY_DOWN && action == GLFW_PRESS) { exposureFactor -= 0.1f; std::cout << "exposure: " << exposureFactor << std::endl; } } void mouse_move_callback(GLFWwindow* window, double xpos, double ypos) { if (firstMouseMove) // 首次鼠标移动 { lastX = xpos; lastY = ypos; firstMouseMove = false; } GLfloat xoffset = xpos - lastX; GLfloat yoffset = lastY - ypos; lastX = xpos; lastY = ypos; camera.handleMouseMove(xoffset, yoffset); } // 由相机辅助类处理鼠标滚轮控制 void mouse_scroll_callback(GLFWwindow* window, double xoffset, double yoffset) { camera.handleMouseScroll(yoffset); } // 由相机辅助类处理键盘控制 void do_movement() { if (keyPressedStatus[GLFW_KEY_W]) camera.handleKeyPress(FORWARD, deltaTime); if (keyPressedStatus[GLFW_KEY_S]) camera.handleKeyPress(BACKWARD, deltaTime); if (keyPressedStatus[GLFW_KEY_A]) camera.handleKeyPress(LEFT, deltaTime); if (keyPressedStatus[GLFW_KEY_D]) camera.handleKeyPress(RIGHT, deltaTime); } void prepareVBO() { // 指定立方体顶点属性数据 顶点位置 法向量 纹理 GLfloat cubeVertices[] = { -0.5f, -0.5f, 0.5f, 0.0f, 0.0f, 1.0f, 0.0f, 0.0f, // A 0.5f, -0.5f, 0.5f, 0.0f, 0.0f, 1.0f, 1.0f, 0.0f, // B 0.5f, 0.5f, 0.5f, 0.0f, 0.0f, 1.0f, 1.0f, 1.0f, // C 0.5f, 0.5f, 0.5f, 0.0f, 0.0f, 1.0f, 1.0f, 1.0f, // C -0.5f, 0.5f, 0.5f, 0.0f, 0.0f, 1.0f, 0.0f, 1.0f, // D -0.5f, -0.5f, 0.5f, 0.0f, 0.0f, 1.0f, 0.0f, 0.0f, // A -0.5f, -0.5f, -0.5f, 0.0f, 0.0f, -1.0f, 0.0f, 0.0f, // E -0.5f, 0.5f, -0.5f, 0.0f, 0.0f, -1.0f, 0.0, 1.0f, // H 0.5f, 0.5f, -0.5f, 0.0f, 0.0f, -1.0f, 1.0f, 1.0f, // G 0.5f, 0.5f, -0.5f, 0.0f, 0.0f, -1.0f, 1.0f, 1.0f, // G 0.5f, -0.5f, -0.5f, 0.0f, 0.0f, -1.0f, 1.0f, 0.0f, // F -0.5f, -0.5f, -0.5f, 0.0f, 0.0f, -1.0f, 0.0f, 0.0f, // E -0.5f, 0.5f, 0.5f, -1.0f, 0.0f, 0.0f, 0.0f, 1.0f, // D -0.5f, 0.5f, -0.5f, -1.0f, 0.0f, 0.0f, 1.0, 1.0f, // H -0.5f, -0.5f, -0.5f, -1.0f, 0.0f, 0.0f, 1.0f, 0.0f, // E -0.5f, -0.5f, -0.5f, -1.0f, 0.0f, 0.0f, 1.0f, 0.0f, // E -0.5f, -0.5f, 0.5f, -1.0f, 0.0f, 0.0f, 0.0f, 0.0f, // A -0.5f, 0.5f, 0.5f, -1.0f, 0.0f, 0.0f, 0.0f, 1.0f, // D 0.5f, -0.5f, -0.5f, 1.0f, 0.0f, 0.0f, 1.0f, 0.0f, // F 0.5f, 0.5f, -0.5f, 1.0f, 0.0f, 0.0f, 1.0f, 1.0f, // G 0.5f, 0.5f, 0.5f, 1.0f, 0.0f, 0.0f, 0.0f, 1.0f, // C 0.5f, 0.5f, 0.5f, 1.0f, 0.0f, 0.0f, 0.0f, 1.0f, // C 0.5f, -0.5f, 0.5f, 1.0f, 0.0f, 0.0f, 0.0f, 0.0f,// B 0.5f, -0.5f, -0.5f, 1.0f, 0.0f, 0.0f, 1.0f, 0.0f,// F 0.5f, 0.5f, -0.5f, 0.0f, 1.0f, 0.0f, 1.0f, 1.0f, // G -0.5f, 0.5f, -0.5f, 0.0f, 1.0f, 0.0f, 0.0, 1.0f, // H -0.5f, 0.5f, 0.5f, 0.0f, 1.0f, 0.0f, 0.0f, 0.0f, // D -0.5f, 0.5f, 0.5f, 0.0f, 1.0f, 0.0f, 0.0f, 0.0f, // D 0.5f, 0.5f, 0.5f, 0.0f, 1.0f, 0.0f, 1.0f, 0.0f, // C 0.5f, 0.5f, -0.5f, 0.0f, 1.0f, 0.0f, 1.0f, 1.0f, // G -0.5f, -0.5f, 0.5f, 0.0f, -1.0f, 0.0f, 0.0f, 0.0f, // A -0.5f, -0.5f, -0.5f, 0.0f, -1.0f, 0.0f, 0.0f, 1.0f, // E 0.5f, -0.5f, -0.5f, 0.0f, -1.0f, 0.0f, 1.0f, 1.0f, // F 0.5f, -0.5f, -0.5f, 0.0f, -1.0f, 0.0f, 1.0f, 1.0f, // F 0.5f, -0.5f, 0.5f, 0.0f, -1.0f, 0.0f, 1.0f, 0.0f, // B -0.5f, -0.5f, 0.5f, 0.0f, -1.0f, 0.0f, 0.0f, 0.0f, // A }; // 创建物体缓存对象 glGenVertexArrays(1, &CubeVAOId); glBindVertexArray(CubeVAOId); glGenBuffers(1, &CubeVBOId); glBindBuffer(GL_ARRAY_BUFFER, CubeVBOId); glBufferData(GL_ARRAY_BUFFER, sizeof(cubeVertices), cubeVertices, GL_STATIC_DRAW); glVertexAttribPointer(0, 3, GL_FLOAT, GL_FALSE, 8 * sizeof(GL_FLOAT), (GLvoid*)0); glEnableVertexAttribArray(0); glVertexAttribPointer(1, 3, GL_FLOAT, GL_FALSE, 8 * sizeof(GL_FLOAT), (GLvoid*)(3 * sizeof(GL_FLOAT))); glEnableVertexAttribArray(1); glVertexAttribPointer(2, 2, GL_FLOAT, GL_FALSE, 8 * sizeof(GL_FLOAT), (GLvoid*)(6 * sizeof(GL_FLOAT))); glEnableVertexAttribArray(2); glBindBuffer(GL_ARRAY_BUFFER, 0); glBindVertexArray(0); // 指定用于展示的矩形顶点属性数据 位置 纹理 GLfloat quadVertices[] = { -1.0f, 1.0f, 0.0f, 0.0f, 1.0f, -1.0f, -1.0f, 0.0f, 0.0f, 0.0f, 1.0f, 1.0f, 0.0f, 1.0f, 1.0f, 1.0f, -1.0f, 0.0f, 1.0f, 0.0f, }; glGenVertexArrays(1, &quadVAOId); glGenBuffers(1, &quadVBOId); glBindVertexArray(quadVAOId); glBindBuffer(GL_ARRAY_BUFFER, quadVBOId); glBufferData(GL_ARRAY_BUFFER, sizeof(quadVertices), &quadVertices, GL_STATIC_DRAW); glEnableVertexAttribArray(0); glVertexAttribPointer(0, 3, GL_FLOAT, GL_FALSE, 5 * sizeof(GLfloat), (GLvoid*)0); glEnableVertexAttribArray(1); glVertexAttribPointer(1, 2, GL_FLOAT, GL_FALSE, 5 * sizeof(GLfloat), (GLvoid*)(3 * sizeof(GLfloat))); } /* * 准备HDR的FBO */ bool prepareHDRFBO(GLuint& HDRFBOId, GLuint& HDRTextId) { glGenFramebuffers(1, &HDRFBOId); glBindFramebuffer(GL_FRAMEBUFFER, HDRFBOId); // 创建color buffer 注意这里的格式需要指定 GL_RGB16F GL_RGBA16F 等这类浮点表示的存储 glGenTextures(1, &HDRTextId); glBindTexture(GL_TEXTURE_2D, HDRTextId); glTexImage2D(GL_TEXTURE_2D, 0, GL_RGBA16F, WINDOW_WIDTH, WINDOW_HEIGHT, 0, GL_RGBA, GL_FLOAT, NULL); glTexParameteri(GL_TEXTURE_2D, GL_TEXTURE_MIN_FILTER, GL_LINEAR); glTexParameteri(GL_TEXTURE_2D, GL_TEXTURE_MAG_FILTER, GL_LINEAR); // 创建depth buffer GLuint rboDepth; glGenRenderbuffers(1, &rboDepth); glBindRenderbuffer(GL_RENDERBUFFER, rboDepth); glRenderbufferStorage(GL_RENDERBUFFER, GL_DEPTH_COMPONENT,WINDOW_WIDTH, WINDOW_HEIGHT); // 绑定buffer glFramebufferTexture2D(GL_FRAMEBUFFER, GL_COLOR_ATTACHMENT0, GL_TEXTURE_2D, HDRTextId, 0); glFramebufferRenderbuffer(GL_FRAMEBUFFER, GL_DEPTH_ATTACHMENT, GL_RENDERBUFFER, rboDepth); // 检查构建是否成功 if (glCheckFramebufferStatus(GL_FRAMEBUFFER) != GL_FRAMEBUFFER_COMPLETE) { glBindFramebuffer(GL_FRAMEBUFFER, 0); return false; } glBindFramebuffer(GL_FRAMEBUFFER, 0); return true; } void renderScene(Shader& shader) { glBindVertexArray(CubeVAOId); glActiveTexture(GL_TEXTURE0); glBindTexture(GL_TEXTURE_2D, sceneTextId); glUniform1i(glGetUniformLocation(shader.programId, "text"), 0); glDrawArrays(GL_TRIANGLES, 0, 36); glBindTexture(GL_TEXTURE_2D, 0); glBindVertexArray(0); } void renderAdjustedScene(Shader& shader) { glBindVertexArray(quadVAOId); glActiveTexture(GL_TEXTURE0); glBindTexture(GL_TEXTURE_2D, HDRTextId); // 使用浮点表示的颜色分量的HDR纹理 glUniform1i(glGetUniformLocation(shader.programId, "hdrText"), 0); glDrawArrays(GL_TRIANGLE_STRIP, 0, 4); glBindTexture(GL_TEXTURE_2D, 0); glBindVertexArray(0); }
[ "393524628@qq.com" ]
393524628@qq.com
f72fa3ea20f8edb2c3b492277e4daaf7ed332921
140d78334109e02590f04769ec154180b2eaf78d
/aws-cpp-sdk-application-autoscaling/source/model/ScalableTarget.cpp
ec0ebf9f2d53ef31651414331f5d0c27486b285e
[ "Apache-2.0", "MIT", "JSON" ]
permissive
coderTong/aws-sdk-cpp
da140feb7e5495366a8d2a6a02cf8b28ba820ff6
5cd0c0a03b667c5a0bd17394924abe73d4b3754a
refs/heads/master
2021-07-08T07:04:40.181622
2017-08-22T21:50:00
2017-08-22T21:50:00
101,145,374
0
1
Apache-2.0
2021-05-04T21:06:36
2017-08-23T06:24:37
C++
UTF-8
C++
false
false
3,990
cpp
/* * Copyright 2010-2017 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ #include <aws/application-autoscaling/model/ScalableTarget.h> #include <aws/core/utils/json/JsonSerializer.h> #include <utility> using namespace Aws::Utils::Json; using namespace Aws::Utils; namespace Aws { namespace ApplicationAutoScaling { namespace Model { ScalableTarget::ScalableTarget() : m_serviceNamespace(ServiceNamespace::NOT_SET), m_serviceNamespaceHasBeenSet(false), m_resourceIdHasBeenSet(false), m_scalableDimension(ScalableDimension::NOT_SET), m_scalableDimensionHasBeenSet(false), m_minCapacity(0), m_minCapacityHasBeenSet(false), m_maxCapacity(0), m_maxCapacityHasBeenSet(false), m_roleARNHasBeenSet(false), m_creationTimeHasBeenSet(false) { } ScalableTarget::ScalableTarget(const JsonValue& jsonValue) : m_serviceNamespace(ServiceNamespace::NOT_SET), m_serviceNamespaceHasBeenSet(false), m_resourceIdHasBeenSet(false), m_scalableDimension(ScalableDimension::NOT_SET), m_scalableDimensionHasBeenSet(false), m_minCapacity(0), m_minCapacityHasBeenSet(false), m_maxCapacity(0), m_maxCapacityHasBeenSet(false), m_roleARNHasBeenSet(false), m_creationTimeHasBeenSet(false) { *this = jsonValue; } ScalableTarget& ScalableTarget::operator =(const JsonValue& jsonValue) { if(jsonValue.ValueExists("ServiceNamespace")) { m_serviceNamespace = ServiceNamespaceMapper::GetServiceNamespaceForName(jsonValue.GetString("ServiceNamespace")); m_serviceNamespaceHasBeenSet = true; } if(jsonValue.ValueExists("ResourceId")) { m_resourceId = jsonValue.GetString("ResourceId"); m_resourceIdHasBeenSet = true; } if(jsonValue.ValueExists("ScalableDimension")) { m_scalableDimension = ScalableDimensionMapper::GetScalableDimensionForName(jsonValue.GetString("ScalableDimension")); m_scalableDimensionHasBeenSet = true; } if(jsonValue.ValueExists("MinCapacity")) { m_minCapacity = jsonValue.GetInteger("MinCapacity"); m_minCapacityHasBeenSet = true; } if(jsonValue.ValueExists("MaxCapacity")) { m_maxCapacity = jsonValue.GetInteger("MaxCapacity"); m_maxCapacityHasBeenSet = true; } if(jsonValue.ValueExists("RoleARN")) { m_roleARN = jsonValue.GetString("RoleARN"); m_roleARNHasBeenSet = true; } if(jsonValue.ValueExists("CreationTime")) { m_creationTime = jsonValue.GetDouble("CreationTime"); m_creationTimeHasBeenSet = true; } return *this; } JsonValue ScalableTarget::Jsonize() const { JsonValue payload; if(m_serviceNamespaceHasBeenSet) { payload.WithString("ServiceNamespace", ServiceNamespaceMapper::GetNameForServiceNamespace(m_serviceNamespace)); } if(m_resourceIdHasBeenSet) { payload.WithString("ResourceId", m_resourceId); } if(m_scalableDimensionHasBeenSet) { payload.WithString("ScalableDimension", ScalableDimensionMapper::GetNameForScalableDimension(m_scalableDimension)); } if(m_minCapacityHasBeenSet) { payload.WithInteger("MinCapacity", m_minCapacity); } if(m_maxCapacityHasBeenSet) { payload.WithInteger("MaxCapacity", m_maxCapacity); } if(m_roleARNHasBeenSet) { payload.WithString("RoleARN", m_roleARN); } if(m_creationTimeHasBeenSet) { payload.WithDouble("CreationTime", m_creationTime.SecondsWithMSPrecision()); } return payload; } } // namespace Model } // namespace ApplicationAutoScaling } // namespace Aws
[ "henso@amazon.com" ]
henso@amazon.com
6a5d1a2ec37880fcf4e37edc0ade4d109421b3d4
2b71f9562f48985c0ac78c0addd90518b2b38d9d
/Exàmens/2019/recuperació/P34239-Suma_màxima.cc
b486538d0dc90e21acb81b4dc60ef1ccad9d3ab6
[]
no_license
delefme/jutge-informatica
ed05fdd1aa8d95847022dc6cb847749b5817e907
4fc45bee293708074b35a62b2a43af44c66092c0
refs/heads/master
2023-08-13T17:47:02.779225
2020-08-08T22:16:24
2020-08-08T22:16:24
286,070,634
10
4
null
2021-09-23T19:55:18
2020-08-08T15:36:29
C++
UTF-8
C++
false
false
446
cc
#include <iostream> #include <vector> #include <algorithm> using namespace std; int abs(int x) { if (x < 0) return -x; return x; } int main() { int n, d; while (cin >> n >> d) { vector<int> v(n); for (int i = 0; i < n; i++) cin >> v[i]; sort(v.begin(), v.end()); int suma = v[n-1]; int ultim = n-1; for (int i = n-2; i >= 0; i--) { if (abs(v[i] - v[ultim]) >= d) {suma += v[i]; ultim = i;} } cout << suma << endl; } }
[ "andreuhuguet@gmail.com" ]
andreuhuguet@gmail.com
5f6f0560ea4b7263418363327c0644b019507e9c
c32ee8ade268240a8064e9b8efdbebfbaa46ddfa
/Libraries/m2sdk/mafia/gui/menu/C_ObjectCreator_TPL_335D96A2.h
23ffb6347296613242052566ace01a7d03475423
[]
no_license
hopk1nz/maf2mp
6f65bd4f8114fdeb42f9407a4d158ad97f8d1789
814cab57dc713d9ff791dfb2a2abeb6af0e2f5a8
refs/heads/master
2021-03-12T23:56:24.336057
2015-08-22T13:53:10
2015-08-22T13:53:10
41,209,355
19
21
null
2015-08-31T05:28:13
2015-08-22T13:56:04
C++
UTF-8
C++
false
false
547
h
// auto-generated file (rttidump-exporter by h0pk1nz) #pragma once #include <mafia/gui/menu/C_Functor_TPL_8727B5BD.h> namespace mafia { namespace gui { namespace menu { /** mafia::gui::menu::C_ObjectCreator<mafia::gui::menu::actions::C_SelectSaveDifficulty> (VTable=0x01E71E68) */ class C_ObjectCreator_TPL_335D96A2 : public C_Functor_TPL_8727B5BD { public: virtual void vfn_0001_1A6E1F87() = 0; virtual void vfn_0002_1A6E1F87() = 0; virtual void vfn_0003_1A6E1F87() = 0; }; } // namespace menu } // namespace gui } // namespace mafia
[ "hopk1nz@gmail.com" ]
hopk1nz@gmail.com
53b59dd34064c10aebff80bc37d9a894be0a8abe
23716a63aeffdddb0af68e8ed9acb22081e5f453
/data/maps/AlteringCave_SubCave8/scripts.inc
7a97b290afc94cfe0faa351a3270ad05f41b7464
[]
no_license
Dabomstew/pokeemerald-ex-speedchoice
7ed4ab716591140049ca567550a7c04d219e6e15
dfe57e873e9a517efe43f45e5e7384fd08f3b12e
refs/heads/master
2023-04-14T18:06:38.850868
2021-05-01T22:59:04
2021-05-01T22:59:04
363,359,727
1
0
null
2021-05-01T08:25:23
2021-05-01T08:25:23
null
UTF-8
C++
false
false
44
inc
AlteringCave_SubCave8_MapScripts:: .byte 0
[ "projectrevotpp@hotmail.com" ]
projectrevotpp@hotmail.com
f8367340490469b3fec83e0e2bc814a39e9a16ec
91a882547e393d4c4946a6c2c99186b5f72122dd
/Source/XPSP1/NT/multimedia/directx/dmusic/dmscript/englog.cpp
86fe8cdb493fb7529d453448b600154f3ab6e3fe
[]
no_license
IAmAnubhavSaini/cryptoAlgorithm-nt5src
94f9b46f101b983954ac6e453d0cf8d02aa76fc7
d9e1cdeec650b9d6d3ce63f9f0abe50dabfaf9e2
refs/heads/master
2023-09-02T10:14:14.795579
2021-11-20T13:47:06
2021-11-20T13:47:06
null
0
0
null
null
null
null
WINDOWS-1252
C++
false
false
8,267
cpp
// Copyright (c) 1999 Microsoft Corporation. All rights reserved. // // Helper functions for logging script parsing. Useful for debugging, but never turned on in released builds. // #error This file should never be used in released builds. // §§ #include "stdinc.h" #include "englog.h" void LogToken(Lexer &l) { char msg[500] = ""; char type[500] = ""; char more[500] = ""; switch (l) { case TOKEN_eof: if (l.error_num()) { sprintf(msg, "%d(%d): error #%d - %s\n", l.line(), l.column(), l.error_num(), l.error_descr()); OutputDebugString(msg); return; } strcpy(type, "end-of-file"); break; case TOKEN_sub: strcpy(type, "sub"); break; case TOKEN_dim: strcpy(type, "dim"); break; case TOKEN_if: strcpy(type, "if"); break; case TOKEN_then: strcpy(type, "then"); break; case TOKEN_end: strcpy(type, "end"); break; case TOKEN_elseif: strcpy(type, "elseif"); break; case TOKEN_else: strcpy(type, "else"); break; case TOKEN_set: strcpy(type, "set"); break; case TOKEN_call: strcpy(type, "call"); break; case TOKEN_lparen: strcpy(type, "("); break; case TOKEN_rparen: strcpy(type, ")"); break; case TOKEN_comma: strcpy(type, ","); break; case TOKEN_op_minus: strcpy(type, "-"); break; case TOKEN_op_not: strcpy(type, "not"); break; case TOKEN_op_pow: strcpy(type, "^"); break; case TOKEN_op_mult: strcpy(type, "*"); break; case TOKEN_op_div: strcpy(type, "\\"); break; case TOKEN_op_mod: strcpy(type, "mod"); break; case TOKEN_op_plus: strcpy(type, "+"); break; case TOKEN_op_lt: strcpy(type, "<"); break; case TOKEN_op_leq: strcpy(type, "<="); break; case TOKEN_op_gt: strcpy(type, ">"); break; case TOKEN_op_geq: strcpy(type, ">="); break; case TOKEN_op_eq: strcpy(type, "="); break; case TOKEN_op_neq: strcpy(type, "<>"); break; case TOKEN_is: strcpy(type, "is"); break; case TOKEN_and: strcpy(type, "and"); break; case TOKEN_or: strcpy(type, "or"); break; case TOKEN_linebreak: strcpy(type, "linebreak"); break; case TOKEN_identifier: strcpy(type, "identifier"); strcpy(more, l.identifier_name()); break; case TOKEN_identifierdot: strcpy(type, "identifier."); strcpy(more, l.identifier_name()); break; case TOKEN_stringliteral: strcpy(type, "string-literal"); strcpy(more, l.stringliteral_text()); break; case TOKEN_numericliteral: strcpy(type, "numeric-literal"); _itoa(l.numericliteral_val(), more, 10); break; default: strcpy(type, "invalid token type!"); break; } static const char format[] = "%d(%d): %s\n"; static const char formatmore[] = "%d(%d): %s(%s)\n"; sprintf(msg, *more ? formatmore : format, l.line(), l.column(), type, more); OutputDebugString(msg); } SmartRef::AString GetVarrefName(Script &script, VariableReferences::index ivarref) { VariableReference r = script.varrefs[ivarref]; const char *pszKind; if (r.k == VariableReference::_global) pszKind = "G"; else if (r.k == VariableReference::_local) pszKind = "L"; bool fFirst = true; char namebuf[500] = ""; for (ReferenceNames::index irname = r.irname; script.rnames[irname].istrIdentifier != -1; ++irname) { if (fFirst) fFirst = false; else strcat(namebuf, "."); strcat(namebuf, script.strings[script.rnames[irname].istrIdentifier]); } Variables::index islot = r.ivar; // check if it's a dispatch item if (r.k == VariableReference::_global) { DISPID dispid = script.globals[islot].dispid; if (dispid != DISPID_UNKNOWN) { pszKind = "D"; islot = dispid; // show the dispid instead of the slot } } char buf[500]; sprintf(buf, "{%s%d}%s", pszKind, islot, namebuf); return buf; } SmartRef::AString GetValueName(Script &script, Values::index ival) { const Value &v = script.vals[ival]; char buf[500]; if (v.k == Value::_numvalue) { sprintf(buf, "%d", v.inumvalue); } else if (v.k == Value::_strvalue) { sprintf(buf, "\"%s\"", script.strings[v.istrvalue]); } else { assert(v.k == Value::_varref); return GetVarrefName(script, v.ivarref); } return buf; } void Indent(int iNesting) { for (int i = 0; i < iNesting; ++i) OutputDebugString(" "); } // forward declaration due to mutual recursion with LogExpression void LogCall(Script &script, Calls::index icall); ExprBlocks::index LogExpression(Script &script, ExprBlocks::index _iexpr) { char msg[500] = ""; bool fFirst = true; for (ExprBlocks::index iexpr = _iexpr; script.exprs[iexpr]; ++iexpr) { ExprBlock expr = script.exprs[iexpr]; if (fFirst) fFirst = false; else OutputDebugString("|"); if (expr.k == ExprBlock::_op) { bool fUnary = false; const char *pszOp = ""; switch (expr.op) { case TOKEN_sub: fUnary = true; pszOp = "-"; break; case TOKEN_op_not: fUnary = true; pszOp = "not"; break; case TOKEN_op_minus: pszOp = "-"; break; case TOKEN_op_pow: pszOp = "^"; break; case TOKEN_op_mult: pszOp = "*"; break; case TOKEN_op_div: pszOp = "\\"; break; case TOKEN_op_mod: pszOp = "mod"; break; case TOKEN_op_plus: pszOp = "+"; break; case TOKEN_op_lt: pszOp = "<"; break; case TOKEN_op_leq: pszOp = "<="; break; case TOKEN_op_gt: pszOp = ">"; break; case TOKEN_op_geq: pszOp = ">="; break; case TOKEN_op_eq: pszOp = "="; break; case TOKEN_op_neq: pszOp = "<>"; break; case TOKEN_is: pszOp = "is"; break; case TOKEN_and: pszOp = "and"; break; case TOKEN_or: pszOp = "or"; break; default: assert(false); break; } if (fUnary) sprintf(msg, "%su", pszOp); else sprintf(msg, "%sb", pszOp); OutputDebugString(msg); } else if (expr.k == ExprBlock::_val) { SmartRef::AString astrVal = GetValueName(script, expr.ival); OutputDebugString(astrVal); } else { assert(expr.k == ExprBlock::_call); LogCall(script, expr.icall); } } return iexpr; } void LogCall(Script &script, Calls::index icall) { Call c = script.calls[icall]; if (c.k == Call::_global) { OutputDebugString(script.strings[c.istrname]); } else { assert(c.k == Call::_dereferenced); SmartRef::AString astrCall = GetVarrefName(script, c.ivarref); OutputDebugString(astrCall); } OutputDebugString("("); bool fFirst = true; for (ExprBlocks::index iexpr = c.iexprParams; script.exprs[iexpr]; ++iexpr) { if (fFirst) fFirst = false; else OutputDebugString(", "); iexpr = LogExpression(script, iexpr); } OutputDebugString(")"); } void LogStatements(Script &script, Statements::index istmt, int iNesting) { char msg[500] = ""; for (; script.statements[istmt].k; ++istmt) { Statement s = script.statements[istmt]; if (s.k == Statement::_asgn) { Assignment a = script.asgns[s.iasgn]; SmartRef::AString astrLHS = GetVarrefName(script, a.ivarrefLHS); sprintf(msg, "%s = ", astrLHS); Indent(iNesting); OutputDebugString(msg); LogExpression(script, a.iexprRHS); OutputDebugString("\n"); } else if (s.k == Statement::_if) { bool fFirst = true; for (IfBlocks::index iif = s.iif; script.ifs[iif].k != IfBlock::_end; ++iif) { Indent(iNesting); IfBlock ib = script.ifs[iif]; if (fFirst) { assert(ib.k == IfBlock::_cond); OutputDebugString("if "); fFirst = false; } else { if (ib.k == IfBlock::_cond) OutputDebugString("elseif "); else if (ib.k == IfBlock::_else) OutputDebugString("else"); } if (ib.k == IfBlock::_cond) { LogExpression(script, ib.iexprCondition); } OutputDebugString("\n"); LogStatements(script, ib.istmtBlock, iNesting + 3); } istmt = s.istmtIfTail - 1; // -1 to offset the loop, which will increment it back } else if (s.k == Statement::_call) { Indent(iNesting); LogCall(script, s.icall); OutputDebugString("\n"); } else { assert(false); Indent(iNesting); OutputDebugString(" Unknown statement type!\n"); } } } void LogRoutine(Script &script, Routines::index irtn) { Routine r = script.routines[irtn]; const char *pszName = script.strings[r.istrIdentifier]; int cLocals = r.ivarNextLocal; char msg[500] = ""; sprintf(msg, "@ Sub %s (%d locals)\n", pszName, cLocals); OutputDebugString(msg); LogStatements(script, r.istmtBody, 3); }
[ "support@cryptoalgo.cf" ]
support@cryptoalgo.cf
d962ab189552266680b8211b9c5802150935b1c8
3837a03fceb06dbe8d4546366750cf5c5478819d
/include/dlstreamer/opencl/tensor_ref_counted.h
0b6f7fd0b58116c73cf542b14c3d52f64323067d
[ "MIT" ]
permissive
dlstreamer/dlstreamer
b1453b1a79437cf74eaf0438e38f809dd82afae2
20f2bb6a0be2cfdb351ab2297a4ac7c4db090ed8
refs/heads/master
2023-08-18T14:54:36.496564
2023-03-03T20:31:16
2023-03-03T20:51:34
175,417,729
135
53
MIT
2023-02-07T14:59:51
2019-03-13T12:35:56
C++
UTF-8
C++
false
false
1,241
h
/******************************************************************************* * Copyright (C) 2022 Intel Corporation * * SPDX-License-Identifier: MIT ******************************************************************************/ #pragma once #include "dlstreamer/opencl/tensor.h" namespace dlstreamer { class OpenCLTensorRefCounted : public OpenCLTensor { public: OpenCLTensorRefCounted(const TensorInfo &info, ContextPtr context, cl_mem mem) : OpenCLTensor(info, context, mem) { clRetainMemObject(mem); } OpenCLTensorRefCounted(const TensorInfo &info, ContextPtr context) : OpenCLTensor(info, context, create_buffer(info, context)) { } ~OpenCLTensorRefCounted() { clReleaseMemObject(clmem()); } private: cl_mem create_buffer(const TensorInfo &info, ContextPtr context) { cl_context clcontext = static_cast<cl_context>(context->handle(OpenCLContext::key::cl_context)); cl_int errcode = 0; cl_mem clmem = clCreateBuffer(clcontext, 0, info.nbytes(), 0, &errcode); if (!clmem || errcode) throw std::runtime_error("Error creating OpenCL buffer " + std::to_string(errcode)); return clmem; } }; } // namespace dlstreamer
[ "mikhail.y.nikolsky@intel.com" ]
mikhail.y.nikolsky@intel.com
abdfd0ae7308fda854a52fd4f0e1b72f0ff860ee
5346087552643fae073c6114014649a972abf79f
/Project3/Project3/SinhVien.h
51f6da79353922fa005f6d7ab3473b140d724210
[]
no_license
nhomlienquan/Quan-Ly-Thu-Vien
39f2f3fcffda66a4ed5cb3f04485a6fcd39f93c4
396b58cca5194d59097fd4f52a1062aeaa5731eb
refs/heads/master
2020-05-31T05:03:48.993145
2019-06-04T03:01:51
2019-06-04T03:01:51
190,110,245
0
1
null
null
null
null
UTF-8
C++
false
false
679
h
#pragma once #include "BanDoc.h" class SinhVien :public BanDoc { private: int nKhoaHoc; int nLoaiBD; Date xDate; public: SinhVien() { nKhoaHoc = 0; } SinhVien(string sMaBD, string sHoTen, string sKhoa, int nKhoaHoc) :BanDoc(sMaBD, sHoTen, sKhoa) { this->nLoaiBD = 2; this->nKhoaHoc = nKhoaHoc; } SinhVien(int nLoaiBD,string sMaBD, string sHoTen, string sKhoa, int nNgay, int nThang, int nNam,int nKhoaHoc) :BanDoc(sMaBD, sHoTen, sKhoa, nNgay, nThang, nNam) { this->nLoaiBD = 2; this->nKhoaHoc = nKhoaHoc; } void outputBanDoc(); void readBanDoc(ifstream &fin); void writeBanDoc(ofstream &fout); ~SinhVien(void) {}; };
[ "noreply@github.com" ]
nhomlienquan.noreply@github.com
d6d9f5e382316214e129a83a9b24a4f2fa072173
3a7434fcdce3d90a2518ec62f37f027e7a207585
/27. regex/main.cpp
5e74da911e5c01c3613001ed6b1b2b91ced86fea
[]
no_license
shoter/ADV_Seminarium
6d792dc40ecd2df85acecc842aaa31d0e0cd5539
7237aadf99a41dfaf6e6ac524ec501b794e516e6
refs/heads/master
2021-01-10T03:17:22.989661
2016-04-06T00:13:33
2016-04-06T00:13:33
55,480,293
0
0
null
null
null
null
UTF-8
C++
false
false
1,660
cpp
#include <iostream> #include <dirent.h> #include <vector> #include <regex> #include <string> #include <algorithm> std::vector<std::string> getDirectories(const char * location) { DIR *dir; std::vector<std::string> vec; struct dirent *ent; if ((dir = opendir (location)) != NULL) { /* print all the files and directories within directory */ while ((ent = readdir (dir)) != NULL) { vec.push_back(ent->d_name); } closedir (dir); } return vec; } using namespace std::regex_constants; int main() { auto directories = getDirectories("c:\\"); std::regex dirExpr( "^[aeiouy].*", icase ); for(auto directory : directories) { if(std::regex_match(directory, dirExpr)) { std::cout << directory << std::endl; } } std::cout << "\nUsuniemy teraz wszystkie samogloski" << std::endl; std::cin.get(); std::regex replaceExpr( "[aeiouy]", icase); for(auto directory : directories) { std::string str; str = std::regex_replace(directory, replaceExpr, ".", format_no_copy); std::cout << str << std::endl; } std::cout << "\n\nCzas na regex_search" << std::endl; std::cin.get(); std::regex searchExpr("^(.+)\\.(.+)$", icase); std::smatch matchResults; for(auto directory : directories) { std::regex_search(directory, matchResults, searchExpr); if(std::regex_match(directory, searchExpr)) { std::cout << "Plik " << matchResults[1] << " ma rozszerzenie " << matchResults[2] << std::endl; } } std::cin.get(); return 0; }
[ "lubiebardzozelki@gmail.com" ]
lubiebardzozelki@gmail.com
179bbd34aac622ea9303d908eee753fe0a849536
85e5e67b0ddb32701b6aad5c3d2a428c768bb41c
/Engine/Camera.h
b3782ce30e520ae09f62cb6f1bc7d86c3c8b1416
[]
no_license
lim-james/Allure
a6ebca6b2ca1c70bc2108f8ae710c2a88117657d
6d837a49254d181babf546d829fc871e468d66db
refs/heads/master
2021-07-18T04:31:08.130059
2020-08-21T03:30:54
2020-08-21T03:30:54
205,639,206
0
0
null
null
null
null
UTF-8
C++
false
false
1,587
h
#ifndef CAMERA_H #define CAMERA_H #include "Component.h" #include "Framebuffer.h" #include <Events/Event.h> #include <Math/Vectors.h> #include <Math/Mat4.hpp> #include <Bit/BitField.h> #define PERSPECTIVE 0 #define ORTHOGRAPHIC 1 struct Camera : Component { using base_type = Camera; bool isHidden; bool shouldClear; vec4f clearColor; short projection; float FOV; float nearPlane; float farPlane; bool captureDepth; BitField cullingMask; Camera(); ~Camera() override; void Initialize() override; Component* Clone() const override; void SetActive(bool const& state) override; float const& GetSize() const; void SetSize(float const& value); void SetMatch(float const& value); float const& GetDepth() const; void SetDepth(float const& value); mat4f GetProjectionMatrix() const; vec2f const& GetFrameSize() const; void SetViewportRect(vec4f const& rect); vec4f const& GetViewport() const; void SetFramebuffer(Framebuffer* const fb); Framebuffer* const GetFramebuffer() const; void SetDepthBuffer(Framebuffer* const fb); Framebuffer* const GetDepthBuffer() const; vec2f ScreenToWorldPosition(vec2f const& mousePosition) const; bool UseProcess() const; void SetUseProcess(bool const& state); private: float size; float match; float depth; vec4f viewportRect; float aspectRatio; float left, right, bottom, top; vec2f frameSize; vec4f viewport; vec2f windowSize; Framebuffer* framebuffer; Framebuffer* depthBuffer; bool useProcess; void WindowResizeHandler(Events::Event* event); void UpdateViewport(); }; #endif
[ "jameslimbj@gmail.com" ]
jameslimbj@gmail.com
62306e5127e11ceac18f78b3351d53bcfeef0577
75933a7ef9c77ffb3a06a1cecde79205c2b327ab
/renderdoc/driver/d3d11/d3d11_serialise.cpp
ab6776610bc23a11b983b74c5ebace821e2aa4ca
[ "LicenseRef-scancode-unknown-license-reference", "MIT" ]
permissive
gvvynplaine/renderdoc
983aac678006942e938aa9599cc4d58b48e04e21
efafd0b766ea88b8563c7911dd111cbd0c6ffd65
refs/heads/v1.x
2023-01-01T19:32:13.183376
2020-07-07T14:40:55
2020-07-07T17:15:09
278,307,900
0
0
MIT
2020-10-30T12:17:30
2020-07-09T08:30:17
null
UTF-8
C++
false
false
28,174
cpp
/****************************************************************************** * The MIT License (MIT) * * Copyright (c) 2019-2020 Baldur Karlsson * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. ******************************************************************************/ #include "common/common.h" #include "serialise/serialiser.h" #include "d3d11_common.h" #include "d3d11_manager.h" #include "d3d11_resources.h" // serialisation of object handles via IDs. template <class SerialiserType, class Interface> void DoSerialiseViaResourceId(SerialiserType &ser, Interface *&el) { D3D11ResourceManager *rm = (D3D11ResourceManager *)ser.GetUserData(); ResourceId id; if(ser.IsWriting() && rm) id = GetIDForResource(el); DoSerialise(ser, id); if(ser.IsReading()) { if(id != ResourceId() && rm && rm->HasLiveResource(id)) el = (Interface *)rm->GetLiveResource(id); else el = NULL; } } #undef SERIALISE_INTERFACE #define SERIALISE_INTERFACE(iface) \ template <class SerialiserType> \ void DoSerialise(SerialiserType &ser, iface *&el) \ { \ DoSerialiseViaResourceId(ser, el); \ } \ INSTANTIATE_SERIALISE_TYPE(iface *); SERIALISE_D3D_INTERFACES(); template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_BUFFER_DESC &el) { SERIALISE_MEMBER(ByteWidth); SERIALISE_MEMBER(Usage); SERIALISE_MEMBER_TYPED(D3D11_BIND_FLAG, BindFlags); SERIALISE_MEMBER_TYPED(D3D11_CPU_ACCESS_FLAG, CPUAccessFlags); SERIALISE_MEMBER_TYPED(D3D11_RESOURCE_MISC_FLAG, MiscFlags); SERIALISE_MEMBER(StructureByteStride); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEXTURE1D_DESC &el) { SERIALISE_MEMBER(Width); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(ArraySize); SERIALISE_MEMBER(Format); SERIALISE_MEMBER(Usage); SERIALISE_MEMBER_TYPED(D3D11_BIND_FLAG, BindFlags); SERIALISE_MEMBER_TYPED(D3D11_CPU_ACCESS_FLAG, CPUAccessFlags); SERIALISE_MEMBER_TYPED(D3D11_RESOURCE_MISC_FLAG, MiscFlags); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEXTURE2D_DESC &el) { SERIALISE_MEMBER(Width); SERIALISE_MEMBER(Height); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(ArraySize); SERIALISE_MEMBER(Format); SERIALISE_MEMBER(SampleDesc); SERIALISE_MEMBER(Usage); SERIALISE_MEMBER_TYPED(D3D11_BIND_FLAG, BindFlags); SERIALISE_MEMBER_TYPED(D3D11_CPU_ACCESS_FLAG, CPUAccessFlags); SERIALISE_MEMBER_TYPED(D3D11_RESOURCE_MISC_FLAG, MiscFlags); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEXTURE2D_DESC1 &el) { SERIALISE_MEMBER(Width); SERIALISE_MEMBER(Height); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(ArraySize); SERIALISE_MEMBER(Format); SERIALISE_MEMBER(SampleDesc); SERIALISE_MEMBER(Usage); SERIALISE_MEMBER_TYPED(D3D11_BIND_FLAG, BindFlags); SERIALISE_MEMBER_TYPED(D3D11_CPU_ACCESS_FLAG, CPUAccessFlags); SERIALISE_MEMBER_TYPED(D3D11_RESOURCE_MISC_FLAG, MiscFlags); SERIALISE_MEMBER(TextureLayout); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEXTURE3D_DESC &el) { SERIALISE_MEMBER(Width); SERIALISE_MEMBER(Height); SERIALISE_MEMBER(Depth); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(Format); SERIALISE_MEMBER(Usage); SERIALISE_MEMBER_TYPED(D3D11_BIND_FLAG, BindFlags); SERIALISE_MEMBER_TYPED(D3D11_CPU_ACCESS_FLAG, CPUAccessFlags); SERIALISE_MEMBER_TYPED(D3D11_RESOURCE_MISC_FLAG, MiscFlags); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEXTURE3D_DESC1 &el) { SERIALISE_MEMBER(Width); SERIALISE_MEMBER(Height); SERIALISE_MEMBER(Depth); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(Format); SERIALISE_MEMBER(Usage); SERIALISE_MEMBER_TYPED(D3D11_BIND_FLAG, BindFlags); SERIALISE_MEMBER_TYPED(D3D11_CPU_ACCESS_FLAG, CPUAccessFlags); SERIALISE_MEMBER_TYPED(D3D11_RESOURCE_MISC_FLAG, MiscFlags); SERIALISE_MEMBER(TextureLayout); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_BUFFER_SRV &el) { SERIALISE_MEMBER(FirstElement); SERIALISE_MEMBER(NumElements); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_BUFFEREX_SRV &el) { SERIALISE_MEMBER(FirstElement); SERIALISE_MEMBER(NumElements); SERIALISE_MEMBER_TYPED(D3D11_BUFFEREX_SRV_FLAG, Flags); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX1D_SRV &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX1D_ARRAY_SRV &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_SRV &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_ARRAY_SRV &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_SRV1 &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(PlaneSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_ARRAY_SRV1 &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); SERIALISE_MEMBER(PlaneSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX3D_SRV &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEXCUBE_SRV &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEXCUBE_ARRAY_SRV &el) { SERIALISE_MEMBER(MostDetailedMip); SERIALISE_MEMBER(MipLevels); SERIALISE_MEMBER(First2DArrayFace); SERIALISE_MEMBER(NumCubes); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2DMS_SRV &el) { } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2DMS_ARRAY_SRV &el) { SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_SHADER_RESOURCE_VIEW_DESC &el) { SERIALISE_MEMBER(Format); SERIALISE_MEMBER(ViewDimension); switch(el.ViewDimension) { case D3D11_SRV_DIMENSION_UNKNOWN: break; case D3D11_SRV_DIMENSION_BUFFER: SERIALISE_MEMBER(Buffer); break; case D3D11_SRV_DIMENSION_TEXTURE1D: SERIALISE_MEMBER(Texture1D); break; case D3D11_SRV_DIMENSION_TEXTURE1DARRAY: SERIALISE_MEMBER(Texture1DArray); break; case D3D11_SRV_DIMENSION_TEXTURE2D: SERIALISE_MEMBER(Texture2D); break; case D3D11_SRV_DIMENSION_TEXTURE2DARRAY: SERIALISE_MEMBER(Texture2DArray); break; case D3D11_SRV_DIMENSION_TEXTURE2DMS: SERIALISE_MEMBER(Texture2DMS); break; case D3D11_SRV_DIMENSION_TEXTURE2DMSARRAY: SERIALISE_MEMBER(Texture2DMSArray); break; case D3D11_SRV_DIMENSION_TEXTURE3D: SERIALISE_MEMBER(Texture3D); break; case D3D11_SRV_DIMENSION_TEXTURECUBE: SERIALISE_MEMBER(TextureCube); break; case D3D11_SRV_DIMENSION_TEXTURECUBEARRAY: SERIALISE_MEMBER(TextureCubeArray); break; case D3D11_SRV_DIMENSION_BUFFEREX: SERIALISE_MEMBER(BufferEx); break; default: RDCERR("Unrecognised SRV Dimension %d", el.ViewDimension); break; } } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_SHADER_RESOURCE_VIEW_DESC1 &el) { SERIALISE_MEMBER(Format); SERIALISE_MEMBER(ViewDimension); switch(el.ViewDimension) { case D3D11_SRV_DIMENSION_UNKNOWN: break; case D3D11_SRV_DIMENSION_BUFFER: SERIALISE_MEMBER(Buffer); break; case D3D11_SRV_DIMENSION_TEXTURE1D: SERIALISE_MEMBER(Texture1D); break; case D3D11_SRV_DIMENSION_TEXTURE1DARRAY: SERIALISE_MEMBER(Texture1DArray); break; case D3D11_SRV_DIMENSION_TEXTURE2D: SERIALISE_MEMBER(Texture2D); break; case D3D11_SRV_DIMENSION_TEXTURE2DARRAY: SERIALISE_MEMBER(Texture2DArray); break; case D3D11_SRV_DIMENSION_TEXTURE2DMS: SERIALISE_MEMBER(Texture2DMS); break; case D3D11_SRV_DIMENSION_TEXTURE2DMSARRAY: SERIALISE_MEMBER(Texture2DMSArray); break; case D3D11_SRV_DIMENSION_TEXTURE3D: SERIALISE_MEMBER(Texture3D); break; case D3D11_SRV_DIMENSION_TEXTURECUBE: SERIALISE_MEMBER(TextureCube); break; case D3D11_SRV_DIMENSION_TEXTURECUBEARRAY: SERIALISE_MEMBER(TextureCubeArray); break; case D3D11_SRV_DIMENSION_BUFFEREX: SERIALISE_MEMBER(BufferEx); break; default: RDCERR("Unrecognised SRV Dimension %d", el.ViewDimension); break; } } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_BUFFER_RTV &el) { SERIALISE_MEMBER(FirstElement); SERIALISE_MEMBER(NumElements); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX1D_RTV &el) { SERIALISE_MEMBER(MipSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX1D_ARRAY_RTV &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_RTV &el) { SERIALISE_MEMBER(MipSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_ARRAY_RTV &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2DMS_RTV &el) { } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2DMS_ARRAY_RTV &el) { SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_RTV1 &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(PlaneSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_ARRAY_RTV1 &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); SERIALISE_MEMBER(PlaneSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX3D_RTV &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstWSlice); SERIALISE_MEMBER(WSize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_RENDER_TARGET_VIEW_DESC &el) { SERIALISE_MEMBER(Format); SERIALISE_MEMBER(ViewDimension); switch(el.ViewDimension) { case D3D11_RTV_DIMENSION_UNKNOWN: break; case D3D11_RTV_DIMENSION_BUFFER: SERIALISE_MEMBER(Buffer); break; case D3D11_RTV_DIMENSION_TEXTURE1D: SERIALISE_MEMBER(Texture1D); break; case D3D11_RTV_DIMENSION_TEXTURE1DARRAY: SERIALISE_MEMBER(Texture1DArray); break; case D3D11_RTV_DIMENSION_TEXTURE2D: SERIALISE_MEMBER(Texture2D); break; case D3D11_RTV_DIMENSION_TEXTURE2DARRAY: SERIALISE_MEMBER(Texture2DArray); break; case D3D11_RTV_DIMENSION_TEXTURE2DMS: SERIALISE_MEMBER(Texture2DMS); break; case D3D11_RTV_DIMENSION_TEXTURE2DMSARRAY: SERIALISE_MEMBER(Texture2DMSArray); break; case D3D11_RTV_DIMENSION_TEXTURE3D: SERIALISE_MEMBER(Texture3D); break; default: RDCERR("Unrecognised RTV Dimension %d", el.ViewDimension); break; } } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_RENDER_TARGET_VIEW_DESC1 &el) { SERIALISE_MEMBER(Format); SERIALISE_MEMBER(ViewDimension); switch(el.ViewDimension) { case D3D11_RTV_DIMENSION_UNKNOWN: break; case D3D11_RTV_DIMENSION_BUFFER: SERIALISE_MEMBER(Buffer); break; case D3D11_RTV_DIMENSION_TEXTURE1D: SERIALISE_MEMBER(Texture1D); break; case D3D11_RTV_DIMENSION_TEXTURE1DARRAY: SERIALISE_MEMBER(Texture1DArray); break; case D3D11_RTV_DIMENSION_TEXTURE2D: SERIALISE_MEMBER(Texture2D); break; case D3D11_RTV_DIMENSION_TEXTURE2DARRAY: SERIALISE_MEMBER(Texture2DArray); break; case D3D11_RTV_DIMENSION_TEXTURE2DMS: SERIALISE_MEMBER(Texture2DMS); break; case D3D11_RTV_DIMENSION_TEXTURE2DMSARRAY: SERIALISE_MEMBER(Texture2DMSArray); break; case D3D11_RTV_DIMENSION_TEXTURE3D: SERIALISE_MEMBER(Texture3D); break; default: RDCERR("Unrecognised RTV Dimension %d", el.ViewDimension); break; } } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_BUFFER_UAV &el) { SERIALISE_MEMBER(FirstElement); SERIALISE_MEMBER(NumElements); SERIALISE_MEMBER_TYPED(D3D11_BUFFER_UAV_FLAG, Flags); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX1D_UAV &el) { SERIALISE_MEMBER(MipSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX1D_ARRAY_UAV &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_UAV &el) { SERIALISE_MEMBER(MipSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_ARRAY_UAV &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_UAV1 &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(PlaneSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_ARRAY_UAV1 &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); SERIALISE_MEMBER(PlaneSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX3D_UAV &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstWSlice); SERIALISE_MEMBER(WSize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_UNORDERED_ACCESS_VIEW_DESC &el) { SERIALISE_MEMBER(Format); SERIALISE_MEMBER(ViewDimension); switch(el.ViewDimension) { case D3D11_UAV_DIMENSION_UNKNOWN: break; case D3D11_UAV_DIMENSION_BUFFER: SERIALISE_MEMBER(Buffer); break; case D3D11_UAV_DIMENSION_TEXTURE1D: SERIALISE_MEMBER(Texture1D); break; case D3D11_UAV_DIMENSION_TEXTURE1DARRAY: SERIALISE_MEMBER(Texture1DArray); break; case D3D11_UAV_DIMENSION_TEXTURE2D: SERIALISE_MEMBER(Texture2D); break; case D3D11_UAV_DIMENSION_TEXTURE2DARRAY: SERIALISE_MEMBER(Texture2DArray); break; case D3D11_UAV_DIMENSION_TEXTURE3D: SERIALISE_MEMBER(Texture3D); break; default: RDCERR("Unrecognised RTV Dimension %d", el.ViewDimension); break; } } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_UNORDERED_ACCESS_VIEW_DESC1 &el) { SERIALISE_MEMBER(Format); SERIALISE_MEMBER(ViewDimension); switch(el.ViewDimension) { case D3D11_UAV_DIMENSION_UNKNOWN: break; case D3D11_UAV_DIMENSION_BUFFER: SERIALISE_MEMBER(Buffer); break; case D3D11_UAV_DIMENSION_TEXTURE1D: SERIALISE_MEMBER(Texture1D); break; case D3D11_UAV_DIMENSION_TEXTURE1DARRAY: SERIALISE_MEMBER(Texture1DArray); break; case D3D11_UAV_DIMENSION_TEXTURE2D: SERIALISE_MEMBER(Texture2D); break; case D3D11_UAV_DIMENSION_TEXTURE2DARRAY: SERIALISE_MEMBER(Texture2DArray); break; case D3D11_UAV_DIMENSION_TEXTURE3D: SERIALISE_MEMBER(Texture3D); break; default: RDCERR("Unrecognised UAV Dimension %d", el.ViewDimension); break; } } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX1D_DSV &el) { SERIALISE_MEMBER(MipSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX1D_ARRAY_DSV &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_DSV &el) { SERIALISE_MEMBER(MipSlice); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2D_ARRAY_DSV &el) { SERIALISE_MEMBER(MipSlice); SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2DMS_DSV &el) { } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_TEX2DMS_ARRAY_DSV &el) { SERIALISE_MEMBER(FirstArraySlice); SERIALISE_MEMBER(ArraySize); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_DEPTH_STENCIL_VIEW_DESC &el) { SERIALISE_MEMBER(Format); SERIALISE_MEMBER(ViewDimension); SERIALISE_MEMBER_TYPED(D3D11_DSV_FLAG, Flags); switch(el.ViewDimension) { case D3D11_DSV_DIMENSION_UNKNOWN: break; case D3D11_DSV_DIMENSION_TEXTURE1D: SERIALISE_MEMBER(Texture1D); break; case D3D11_DSV_DIMENSION_TEXTURE1DARRAY: SERIALISE_MEMBER(Texture1DArray); break; case D3D11_DSV_DIMENSION_TEXTURE2D: SERIALISE_MEMBER(Texture2D); break; case D3D11_DSV_DIMENSION_TEXTURE2DARRAY: SERIALISE_MEMBER(Texture2DArray); break; case D3D11_DSV_DIMENSION_TEXTURE2DMS: SERIALISE_MEMBER(Texture2DMS); break; case D3D11_DSV_DIMENSION_TEXTURE2DMSARRAY: SERIALISE_MEMBER(Texture2DMSArray); break; default: RDCERR("Unrecognised DSV Dimension %d", el.ViewDimension); break; } } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_RENDER_TARGET_BLEND_DESC &el) { SERIALISE_MEMBER_TYPED(bool, BlendEnable); SERIALISE_MEMBER(SrcBlend); SERIALISE_MEMBER(DestBlend); SERIALISE_MEMBER(BlendOp); SERIALISE_MEMBER(SrcBlendAlpha); SERIALISE_MEMBER(DestBlendAlpha); SERIALISE_MEMBER(BlendOpAlpha); SERIALISE_MEMBER_TYPED(D3D11_COLOR_WRITE_ENABLE, RenderTargetWriteMask); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_RENDER_TARGET_BLEND_DESC1 &el) { SERIALISE_MEMBER_TYPED(bool, BlendEnable); SERIALISE_MEMBER_TYPED(bool, LogicOpEnable); SERIALISE_MEMBER(SrcBlend); SERIALISE_MEMBER(DestBlend); SERIALISE_MEMBER(BlendOp); SERIALISE_MEMBER(SrcBlendAlpha); SERIALISE_MEMBER(DestBlendAlpha); SERIALISE_MEMBER(BlendOpAlpha); SERIALISE_MEMBER(LogicOp); SERIALISE_MEMBER_TYPED(D3D11_COLOR_WRITE_ENABLE, RenderTargetWriteMask); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_BLEND_DESC &el) { SERIALISE_MEMBER_TYPED(bool, AlphaToCoverageEnable); SERIALISE_MEMBER_TYPED(bool, IndependentBlendEnable); SERIALISE_MEMBER(RenderTarget); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_BLEND_DESC1 &el) { SERIALISE_MEMBER_TYPED(bool, AlphaToCoverageEnable); SERIALISE_MEMBER_TYPED(bool, IndependentBlendEnable); SERIALISE_MEMBER(RenderTarget); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_DEPTH_STENCILOP_DESC &el) { SERIALISE_MEMBER(StencilFailOp); SERIALISE_MEMBER(StencilDepthFailOp); SERIALISE_MEMBER(StencilPassOp); SERIALISE_MEMBER(StencilFunc); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_DEPTH_STENCIL_DESC &el) { SERIALISE_MEMBER_TYPED(bool, DepthEnable); SERIALISE_MEMBER(DepthWriteMask); SERIALISE_MEMBER(DepthFunc); SERIALISE_MEMBER_TYPED(bool, StencilEnable); SERIALISE_MEMBER(StencilReadMask); SERIALISE_MEMBER(StencilWriteMask); SERIALISE_MEMBER(FrontFace); SERIALISE_MEMBER(BackFace); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_RASTERIZER_DESC &el) { SERIALISE_MEMBER(FillMode); SERIALISE_MEMBER(CullMode); SERIALISE_MEMBER_TYPED(bool, FrontCounterClockwise); SERIALISE_MEMBER(DepthBias); SERIALISE_MEMBER(DepthBiasClamp); SERIALISE_MEMBER(SlopeScaledDepthBias); SERIALISE_MEMBER_TYPED(bool, DepthClipEnable); SERIALISE_MEMBER_TYPED(bool, ScissorEnable); SERIALISE_MEMBER_TYPED(bool, MultisampleEnable); SERIALISE_MEMBER_TYPED(bool, AntialiasedLineEnable); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_RASTERIZER_DESC1 &el) { SERIALISE_MEMBER(FillMode); SERIALISE_MEMBER(CullMode); SERIALISE_MEMBER_TYPED(bool, FrontCounterClockwise); SERIALISE_MEMBER(DepthBias); SERIALISE_MEMBER(DepthBiasClamp); SERIALISE_MEMBER(SlopeScaledDepthBias); SERIALISE_MEMBER_TYPED(bool, DepthClipEnable); SERIALISE_MEMBER_TYPED(bool, ScissorEnable); SERIALISE_MEMBER_TYPED(bool, MultisampleEnable); SERIALISE_MEMBER_TYPED(bool, AntialiasedLineEnable); SERIALISE_MEMBER(ForcedSampleCount); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_RASTERIZER_DESC2 &el) { SERIALISE_MEMBER(FillMode); SERIALISE_MEMBER(CullMode); SERIALISE_MEMBER_TYPED(bool, FrontCounterClockwise); SERIALISE_MEMBER(DepthBias); SERIALISE_MEMBER(DepthBiasClamp); SERIALISE_MEMBER(SlopeScaledDepthBias); SERIALISE_MEMBER_TYPED(bool, DepthClipEnable); SERIALISE_MEMBER_TYPED(bool, ScissorEnable); SERIALISE_MEMBER_TYPED(bool, MultisampleEnable); SERIALISE_MEMBER_TYPED(bool, AntialiasedLineEnable); SERIALISE_MEMBER(ForcedSampleCount); SERIALISE_MEMBER(ConservativeRaster); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_QUERY_DESC &el) { SERIALISE_MEMBER(Query); SERIALISE_MEMBER(MiscFlags); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_QUERY_DESC1 &el) { SERIALISE_MEMBER(Query); SERIALISE_MEMBER(MiscFlags); SERIALISE_MEMBER(ContextType); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_COUNTER_DESC &el) { SERIALISE_MEMBER(Counter); SERIALISE_MEMBER(MiscFlags); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_SAMPLER_DESC &el) { SERIALISE_MEMBER(Filter); SERIALISE_MEMBER(AddressU); SERIALISE_MEMBER(AddressV); SERIALISE_MEMBER(AddressW); SERIALISE_MEMBER(MipLODBias); SERIALISE_MEMBER(MaxAnisotropy); SERIALISE_MEMBER(ComparisonFunc); SERIALISE_MEMBER(BorderColor); SERIALISE_MEMBER(MinLOD); SERIALISE_MEMBER(MaxLOD); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_SO_DECLARATION_ENTRY &el) { SERIALISE_MEMBER(Stream); SERIALISE_MEMBER(SemanticName); SERIALISE_MEMBER(SemanticIndex); SERIALISE_MEMBER(StartComponent); SERIALISE_MEMBER(ComponentCount); SERIALISE_MEMBER(OutputSlot); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_INPUT_ELEMENT_DESC &el) { SERIALISE_MEMBER(SemanticName); SERIALISE_MEMBER(SemanticIndex); SERIALISE_MEMBER(Format); SERIALISE_MEMBER(InputSlot); SERIALISE_MEMBER(AlignedByteOffset); SERIALISE_MEMBER(InputSlotClass); SERIALISE_MEMBER(InstanceDataStepRate); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_SUBRESOURCE_DATA &el) { // don't serialise pSysMem, just set it to NULL. See the definition of SERIALISE_MEMBER_DUMMY SERIALISE_MEMBER_ARRAY_EMPTY(pSysMem); SERIALISE_MEMBER(SysMemPitch); SERIALISE_MEMBER(SysMemSlicePitch); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_VIEWPORT &el) { SERIALISE_MEMBER(TopLeftX); SERIALISE_MEMBER(TopLeftY); SERIALISE_MEMBER(Width); SERIALISE_MEMBER(Height); SERIALISE_MEMBER(MinDepth); SERIALISE_MEMBER(MaxDepth); } template <class SerialiserType> void DoSerialise(SerialiserType &ser, D3D11_BOX &el) { SERIALISE_MEMBER(left); SERIALISE_MEMBER(top); SERIALISE_MEMBER(front); SERIALISE_MEMBER(right); SERIALISE_MEMBER(bottom); SERIALISE_MEMBER(back); } INSTANTIATE_SERIALISE_TYPE(D3D11_BUFFER_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_TEXTURE1D_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_TEXTURE2D_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_TEXTURE2D_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_TEXTURE3D_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_TEXTURE3D_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_BUFFER_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_BUFFEREX_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX1D_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX1D_ARRAY_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_ARRAY_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_SRV1); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_ARRAY_SRV1); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX3D_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEXCUBE_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEXCUBE_ARRAY_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2DMS_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2DMS_ARRAY_SRV); INSTANTIATE_SERIALISE_TYPE(D3D11_SHADER_RESOURCE_VIEW_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_SHADER_RESOURCE_VIEW_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_BUFFER_RTV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX1D_RTV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX1D_ARRAY_RTV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_RTV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_ARRAY_RTV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2DMS_RTV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2DMS_ARRAY_RTV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_RTV1); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_ARRAY_RTV1); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX3D_RTV); INSTANTIATE_SERIALISE_TYPE(D3D11_RENDER_TARGET_VIEW_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_RENDER_TARGET_VIEW_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_BUFFER_UAV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX1D_UAV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX1D_ARRAY_UAV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_UAV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_ARRAY_UAV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_UAV1); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_ARRAY_UAV1); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX3D_UAV); INSTANTIATE_SERIALISE_TYPE(D3D11_UNORDERED_ACCESS_VIEW_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_UNORDERED_ACCESS_VIEW_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX1D_DSV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX1D_ARRAY_DSV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_DSV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2D_ARRAY_DSV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2DMS_DSV); INSTANTIATE_SERIALISE_TYPE(D3D11_TEX2DMS_ARRAY_DSV); INSTANTIATE_SERIALISE_TYPE(D3D11_DEPTH_STENCIL_VIEW_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_RENDER_TARGET_BLEND_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_RENDER_TARGET_BLEND_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_BLEND_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_BLEND_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_DEPTH_STENCILOP_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_DEPTH_STENCIL_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_RASTERIZER_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_RASTERIZER_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_RASTERIZER_DESC2); INSTANTIATE_SERIALISE_TYPE(D3D11_QUERY_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_QUERY_DESC1); INSTANTIATE_SERIALISE_TYPE(D3D11_COUNTER_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_SAMPLER_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_SO_DECLARATION_ENTRY); INSTANTIATE_SERIALISE_TYPE(D3D11_INPUT_ELEMENT_DESC); INSTANTIATE_SERIALISE_TYPE(D3D11_SUBRESOURCE_DATA); INSTANTIATE_SERIALISE_TYPE(D3D11_VIEWPORT); INSTANTIATE_SERIALISE_TYPE(D3D11_RECT); INSTANTIATE_SERIALISE_TYPE(D3D11_BOX);
[ "baldurk@baldurk.org" ]
baldurk@baldurk.org
8c8e85d96a99520c24de828a2df78b3979bb6d8a
a4138202e6d036691bc12e8e868b911bcd6fe641
/Greedy/kbookings.cpp
9b55f890d2bf65159a627b64af789dcbd71953c3
[]
no_license
Irhu007/Programming
c76dc88f3acbdff0f11cc5ae0a615daa853eb2f9
5b7053c3f7b6196438b881458a8be806b74ecbe4
refs/heads/master
2020-03-22T13:32:38.883895
2018-07-18T10:57:13
2018-07-18T10:57:13
null
0
0
null
null
null
null
UTF-8
C++
false
false
805
cpp
#include <bits/stdc++.h> using namespace std; bool areBookingsPossible(int arrival[], int departure[], int n, int k) { int last_date= departure[0]; int j=0; int room=1; for(int i = 1;i<n;i++) { if(arrival[i]>last_date) { last_date = departure[i]; j=i; } else { if(last_date>arrival[i]) room++; else { j=j+1; last_date = departure[j]; } } } //cout<<room<<" "; return room>k?0:1; } int main() { int arrival[] = { 1, 3, 5, 7 }; int departure[] = { 2, 8, 8, 10 }; int n = sizeof(arrival) / sizeof(arrival[0]); cout << (areBookingsPossible(arrival, departure, n, 1) ? "Yes\n" : "No\n"); return 0; }
[ "amann12997@gmail.com" ]
amann12997@gmail.com
8a0a31c3e8443e1369bfb69b79f3fc3566c0056d
93343c49771b6e6f2952d03df7e62e6a4ea063bb
/HDOJ/4825_autoAC.cpp
1698f3392137a96d013f587ca6be6c69711f4f35
[]
no_license
Kiritow/OJ-Problems-Source
5aab2c57ab5df01a520073462f5de48ad7cb5b22
1be36799dda7d0e60bd00448f3906b69e7c79b26
refs/heads/master
2022-10-21T08:55:45.581935
2022-09-24T06:13:47
2022-09-24T06:13:47
55,874,477
36
9
null
2018-07-07T00:03:15
2016-04-10T01:06:42
C++
UTF-8
C++
false
false
2,439
cpp
#include<iostream> #include<cstdio> #include<cmath> #include<cstring> #define LL __int64 using namespace std; struct Node { int num; Node *next[2]; Node() { num = 0; for(int i=0; i<2; i++) { next[i] = NULL; } } }; char ans[123]; int n,m; void tstrrev(char s[]) { int l=strlen(s); for(int i=0,j=l-1; i<l; i++,j--) { if(i<j) { s[i]^=s[j]; s[j]^=s[i]; s[i]^=s[j]; } } } void insert(Node *root,char *s) { Node *p; p = root; for(int i=0; s[i]; i++) { int x = s[i] - '0'; if(p->next[x] == NULL) p->next[x] = new Node; p = p->next[x]; p->num ++; } } void search(Node *root,char *s) { memset(ans,0,sizeof(ans)); Node *p; p = root; for(int i=0; i<32; i++) { int x = s[i] - '0'; if(p->next[x] != NULL) { p = p->next[x]; ans[i] = s[i]; } else { if(x == 1) x = 0; else x = 1; p = p->next[x]; ans[i] = x + '0'; } } } int main() { int _; scanf("%d",&_); for(int cas=1; cas<=_; cas++) { scanf("%d%d",&n,&m); LL tmp; Node *root = new Node; while(n--) { scanf("%I64d",&tmp); char str[40]; for(int i=0; i<32; i++) { str[i] = tmp % 2 + '0'; tmp /= 2; } str[32] = '\0'; tstrrev(str); insert(root,str); } printf("Case #%d:\n",cas); while(m--) { scanf("%I64d",&tmp); char str[40]; for(int i=0; i<32; i++) { str[i] = tmp % 2 + '0'; tmp /= 2; } str[32] = '\0'; tstrrev(str); for(int i=0; i<32; i++) { if(str[i] == '1') { str[i] = '0'; } else { str[i] = '1'; } } search(root,str); tstrrev(ans); LL hehe = 0; LL mul = 1; for(int i=0; i<32; i++) { hehe += mul * (ans[i] - '0'); mul *= 2; } printf("%I64d\n",hehe); } } return 0; }
[ "noreply@github.com" ]
Kiritow.noreply@github.com
398191191b8bbf426f2d5e4ce6f3d7603948f450
972b3db50e228c2959dd3edf3c9bae025638d82b
/huffmanelementscount.h
0fcfb2e4984c1f23f142b4ad2a2c801dcb16602e
[ "MIT" ]
permissive
amirduran/jpeg-encoder-decoder
294977f02e5f3091f177a074f53039e1c907cc49
61b6dee27e64587651063a19b5653729bde0047f
refs/heads/master
2021-01-22T19:14:09.342614
2020-06-16T10:01:10
2020-06-16T10:01:10
27,594,465
16
4
null
null
null
null
UTF-8
C++
false
false
272
h
#ifndef HUFFMANELEMENTSCOUNT_H #define HUFFMANELEMENTSCOUNT_H using namespace std; #include <vector> class HuffmanElementsCount { public: int codeLength; vector<int>elementsCodedWithCodeLengthBits; HuffmanElementsCount(); }; #endif // HUFFMANELEMENTSCOUNT_H
[ "amirduran" ]
amirduran
e80c86eb6b18ae6dd4bd766b16320fdb39128e18
94e5a9e157d3520374d95c43fe6fec97f1fc3c9b
/@DOC by DIPTA/Old/graph/flow.cpp
29832badc954e1633f8356d2aeb2b39c8eea92a3
[ "MIT" ]
permissive
dipta007/Competitive-Programming
0127c550ad523884a84eb3ea333d08de8b4ba528
998d47f08984703c5b415b98365ddbc84ad289c4
refs/heads/master
2021-01-21T14:06:40.082553
2020-07-06T17:40:46
2020-07-06T17:40:46
54,851,014
8
4
null
2020-05-02T13:14:41
2016-03-27T22:30:02
C++
UTF-8
C++
false
false
4,104
cpp
struct node { int x, y, next, cap, cost; }; /** 1. Clear graph 2. Add edge 3. Assign source and sink 4. Pass highestNumberOfNode to maxFlow() or minCostMaxFlow() */ ///Try to make size of edge array as large possible const int NODE=101,EDGE=50001; struct FLOW { int source, sink; int head[NODE]; void clear() { e = 0; clr_(head); } node edge[EDGE]; int e; ///cap holo max koto flow deoa jabe ///cap2 holo koto flow deoa hoise void addEdge ( int u, int v, int cap, int cap2, int cost ) { edge[e].x = u; edge[e].y = v; edge[e].cap = cap; edge[e].cost = cost; edge[e].next = head[u]; head[u] = e; e++; edge[e].x = v; edge[e].y = u; edge[e].cap = cap; edge[e].cost = -cost; edge[e].next = head[v]; head[v] = e; e++; } int vis[NODE], q[NODE], now[NODE]; bool bfs ( ) { memset ( vis, -1, sizeof vis ); vis[source] = 0; int ini = 0, qend = 0; q[qend++] = source; while ( ini < qend && vis[sink] == -1 ) { int s = q[ini++]; int i; for (i=head[s];i!=-1;i= edge[i].next){ int t = edge[i].y; if ( vis[t] == -1 && edge[i].cap){ vis[t] = vis[s] + 1; q[qend++] = t; } } } if ( vis[sink] != -1 ) return true; else return false; } int dfs ( int s, int f ) { if ( f == 0 ) return 0; if ( s == sink ) return f; for ( int &i=now[s];i!=-1;i=edge[i].next){ int t = edge[i].y; if ( vis[s] + 1 != vis[t] ) continue; int pushed=dfs(t,min(f,edge[i].cap)); if ( pushed ) { edge[i].cap -= pushed; edge[i^1].cap += pushed; return pushed; } } return 0; } int maxFlow ( int highestNumberOfNode, int flow ) { int res = 0; while ( 1 ) { if ( flow == 0 ) break; if ( bfs () == false ) break; int i; for ( i=0;i<=highestNumberOfNode;i++)now[i]= head[i]; while (int pushed=dfs(source,flow ) ) { res += pushed; ///Can overflow depending on Max Flow flow -= pushed; } } return res; } int inq[NODE], par[NODE], record[NODE]; int minCostFlow ( int highestNumberOfNode ) { int res = 0, i, j, k, fl = 0; while ( 1 ) { for ( i = 0; i <= highestNumberOfNode; i++ ) vis[i] = inf; vis[source] = 0; deque < int > dq; dq.pb ( source ); while ( !dq.empty() ) { int s = dq.front(); dq.pop_front(); inq[s] = 0; for ( i = head[s]; i != -1; i = edge[i].next ) { int t = edge[i].y; if ( edge[i].cap ) { if ( vis[s] + edge[i].cost < vis[t] ) { vis[t] = vis[s] + edge[i].cost; par[t] = s; record[t] = i; if ( inq[t] == 0 ) { inq[t] = 1; if ( dq.empty() == false && vis[dq.front()] > vis[t] ) dq.push_front( t ); else dq.pb ( t ); } } } } } //if ( vis[sink] > 0 ) break; ///Cost Getting minimized, Change Here if ( vis[sink] == inf ) break; //Flow getting maximized. Either this, or the one above fl++; ///Total flow res += vis[sink]; ///Cost of Flow for ( i = sink; i != source; i = par[i] ) { //Travel from sink to source int t = record[i]; //Record which edge was used to travel to t edge[t].cap--; edge[t^1].cap++; } } return res; ///Min cost of max flow } }graph;
[ "iamdipta@gmail.com" ]
iamdipta@gmail.com
87351728ad3d226d02eda82adfecd20888bd191d
877fff5bb313ccd23d1d01bf23b1e1f2b13bb85a
/app/src/main/cpp/dir521/dir3871/dir4221/dir4222/file4304.cpp
cae5c15284bd8f179160f3639fc85ab384a9d6dd
[]
no_license
tgeng/HugeProject
829c3bdfb7cbaf57727c41263212d4a67e3eb93d
4488d3b765e8827636ce5e878baacdf388710ef2
refs/heads/master
2022-08-21T16:58:54.161627
2020-05-28T01:54:03
2020-05-28T01:54:03
267,468,475
0
0
null
null
null
null
UTF-8
C++
false
false
111
cpp
#ifndef file4304 #error "macro file4304 must be defined" #endif static const char* file4304String = "file4304";
[ "tgeng@google.com" ]
tgeng@google.com
c4fdc1c3221103302c8dc5fefff6e774fe7cd2a7
2ae0b8d95d439ccfd55ea7933ad4a2994ad0f6c5
/src/plugins/template/tests/functional/op_reference/gather_tree.cpp
e79917a18264679e922f10a706852b8670334b8c
[ "Apache-2.0" ]
permissive
openvinotoolkit/openvino
38ea745a247887a4e14580dbc9fc68005e2149f9
e4bed7a31c9f00d8afbfcabee3f64f55496ae56a
refs/heads/master
2023-08-18T03:47:44.572979
2023-08-17T21:24:59
2023-08-17T21:24:59
153,097,643
3,953
1,492
Apache-2.0
2023-09-14T21:42:24
2018-10-15T10:54:40
C++
UTF-8
C++
false
false
8,054
cpp
// Copyright (C) 2018-2023 Intel Corporation // SPDX-License-Identifier: Apache-2.0 // #include <gtest/gtest.h> #include "openvino/opsets/opset1.hpp" #include "base_reference_test.hpp" using namespace reference_tests; using namespace ov; namespace { struct GatherTreeParams { reference_tests::Tensor stepIds; reference_tests::Tensor parentIdx; reference_tests::Tensor maxSeqLen; reference_tests::Tensor endToken; reference_tests::Tensor finalIdx; std::string testcaseName; }; struct Builder : ParamsBuilder<GatherTreeParams> { REFERENCE_TESTS_ADD_SET_PARAM(Builder, stepIds); REFERENCE_TESTS_ADD_SET_PARAM(Builder, parentIdx); REFERENCE_TESTS_ADD_SET_PARAM(Builder, maxSeqLen); REFERENCE_TESTS_ADD_SET_PARAM(Builder, endToken); REFERENCE_TESTS_ADD_SET_PARAM(Builder, finalIdx); REFERENCE_TESTS_ADD_SET_PARAM(Builder, testcaseName); }; class ReferenceGatherTreeTest : public testing::TestWithParam<GatherTreeParams>, public CommonReferenceTest { public: void SetUp() override { auto params = GetParam(); function = CreateFunction(params); inputData = {params.stepIds.data, params.parentIdx.data, params.maxSeqLen.data, params.endToken.data}; refOutData = {params.finalIdx.data}; } static std::string getTestCaseName(const testing::TestParamInfo<GatherTreeParams>& obj) { auto param = obj.param; std::ostringstream result; result << "sType=" << param.stepIds.type; result << "_sShape=" << param.stepIds.shape; result << "_pType=" << param.parentIdx.type; result << "_pShape=" << param.parentIdx.shape; result << "_mType=" << param.maxSeqLen.type; result << "_mShape=" << param.maxSeqLen.shape; result << "_eType=" << param.endToken.type; result << "_eShape=" << param.endToken.shape; result << "_fType=" << param.finalIdx.type; result << "_fShape=" << param.finalIdx.shape; if (!param.testcaseName.empty()) { result << "_=" << param.testcaseName; } return result.str(); } private: static std::shared_ptr<Model> CreateFunction(const GatherTreeParams& params) { const auto step_ids = std::make_shared<opset1::Parameter>(params.stepIds.type, params.stepIds.shape); const auto parent_idx = std::make_shared<opset1::Parameter>(params.parentIdx.type, params.parentIdx.shape); const auto max_seq_len = std::make_shared<opset1::Parameter>(params.maxSeqLen.type, params.maxSeqLen.shape); const auto end_token = std::make_shared<opset1::Parameter>(params.endToken.type, params.endToken.shape); const auto gather_tree = std::make_shared<opset1::GatherTree>(step_ids, parent_idx, max_seq_len, end_token); const auto f = std::make_shared<Model>(gather_tree, ParameterVector{step_ids, parent_idx, max_seq_len, end_token}); return f; } }; TEST_P(ReferenceGatherTreeTest, CompareWithRefs) { Exec(); } template <element::Type_t ET> std::vector<GatherTreeParams> generateParams() { using T = typename element_type_traits<ET>::value_type; std::vector<GatherTreeParams> params { Builder {} .stepIds(reference_tests::Tensor(ET, {1, 1, 10}, std::vector<T>{ 1, 4, 9, 7, 9, 1, 2, 3, 9, 9})) .parentIdx(reference_tests::Tensor(ET, {1, 1, 10}, std::vector<T>{ 1, 4, 9, 7, 9, 1, 2, 3, 9, 9})) .maxSeqLen(reference_tests::Tensor(ET, {1}, std::vector<T>{9})) .endToken(reference_tests::Tensor(ET, {}, std::vector<T>{9})) .finalIdx(reference_tests::Tensor(ET, {1, 1, 10}, std::vector<T>{ 1, 4, 9, 7, 9, 1, 2, 3, 9, 9})) .testcaseName("gather_tree_1"), Builder {} .stepIds(reference_tests::Tensor(ET, {5, 1, 10}, std::vector<T>{ 1, 4, 9, 7, 9, 1, 2, 3, 9, 2, 3, 1, 4, 2, 4, 4, 7, 4, 9, 5, 8, 4, 3, 7, 5, 2, 4, 8, 3, 1, 5, 7, 9, 4, 5, 6, 4, 2, 9, 2, 8, 8, 7, 9, 8, 3, 1, 7, 5, 9})) .parentIdx(reference_tests::Tensor(ET, {5, 1, 10}, std::vector<T>{ 1, 4, 9, 7, 9, 1, 2, 3, 9, 2, 3, 1, 4, 2, 4, 4, 7, 4, 9, 5, 8, 4, 3, 7, 5, 2, 4, 8, 3, 1, 5, 7, 9, 4, 5, 6, 4, 2, 9, 2, 8, 8, 7, 9, 8, 3, 1, 7, 5, 9})) .maxSeqLen(reference_tests::Tensor(ET, {1}, std::vector<T>{9})) .endToken(reference_tests::Tensor(ET, {}, std::vector<T>{9})) .finalIdx(reference_tests::Tensor(ET, {5, 1, 10}, std::vector<T>{ 4, 4, 9, 9, 4, 9, 2, 9, 9, 9, 1, 1, 9, 9, 1, 9, 9, 9, 9, 9, 1, 1, 9, 9, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9})) .testcaseName("gather_tree_5"), Builder {} .stepIds(reference_tests::Tensor(ET, {20, 1, 10}, std::vector<T>{ 1, 4, 9, 7, 9, 1, 2, 3, 9, 2, 3, 1, 4, 2, 4, 4, 7, 4, 9, 5, 8, 4, 3, 7, 5, 2, 4, 8, 3, 1, 5, 7, 9, 4, 5, 6, 4, 2, 9, 2, 8, 8, 7, 9, 8, 3, 1, 7, 5, 8, 8, 9, 8, 1, 8, 1, 3, 2, 1, 8, 7, 1, 6, 4, 7, 9, 4, 5, 2, 7, 3, 3, 2, 7, 8, 8, 4, 1, 1, 7, 6, 9, 6, 7, 3, 3, 5, 8, 2, 1, 1, 5, 5, 9, 1, 3, 9, 3, 2, 2, 5, 1, 1, 7, 9, 2, 9, 3, 3, 5, 6, 1, 6, 6, 6, 2, 9, 6, 3, 7, 3, 1, 5, 4, 9, 7, 5, 4, 5, 1, 7, 5, 1, 6, 2, 5, 8, 9, 1, 6, 8, 9, 5, 2, 5, 2, 9, 8, 4, 4, 5, 2, 6, 9, 4, 4, 6, 7, 6, 7, 2, 8, 7, 6, 6, 7, 4, 4, 7, 3, 4, 9, 7, 4, 8, 9, 1, 6, 5, 6, 1, 2, 8, 9, 1, 5, 4, 6, 9, 4, 4, 3, 7, 9, 7, 6, 3, 1, 7, 9})) .parentIdx(reference_tests::Tensor(ET, {20, 1, 10}, std::vector<T>{ 1, 4, 9, 7, 9, 1, 2, 3, 9, 2, 3, 1, 4, 2, 4, 4, 7, 4, 9, 5, 8, 4, 3, 7, 5, 2, 4, 8, 3, 1, 5, 7, 9, 4, 5, 6, 4, 2, 9, 2, 8, 8, 7, 9, 8, 3, 1, 7, 5, 8, 8, 9, 8, 1, 8, 1, 3, 2, 1, 8, 7, 1, 6, 4, 7, 9, 4, 5, 2, 7, 3, 3, 2, 7, 8, 8, 4, 1, 1, 7, 6, 9, 6, 7, 3, 3, 5, 8, 2, 1, 1, 5, 5, 9, 1, 3, 9, 3, 2, 2, 5, 1, 1, 7, 9, 2, 9, 3, 3, 5, 6, 1, 6, 6, 6, 2, 9, 6, 3, 7, 3, 1, 5, 4, 9, 7, 5, 4, 5, 1, 7, 5, 1, 6, 2, 5, 8, 9, 1, 6, 8, 9, 5, 2, 5, 2, 9, 8, 4, 4, 5, 2, 6, 9, 4, 4, 6, 7, 6, 7, 2, 8, 7, 6, 6, 7, 4, 4, 7, 3, 4, 9, 7, 4, 8, 9, 1, 6, 5, 6, 1, 2, 8, 9, 1, 5, 4, 6, 9, 4, 4, 3, 7, 9, 7, 6, 3, 1, 7, 9})) .maxSeqLen(reference_tests::Tensor(ET, {1}, std::vector<T>{9})) .endToken(reference_tests::Tensor(ET, {}, std::vector<T>{9})) .finalIdx(reference_tests::Tensor(ET, {20, 1, 10}, std::vector<T>{ 9, 4, 9, 4, 4, 4, 9, 4, 9, 9, 9, 1, 9, 1, 1, 1, 9, 1, 9, 9, 9, 1, 9, 1, 1, 1, 9, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9})) .testcaseName("gather_tree_10"), }; return params; } std::vector<GatherTreeParams> generateCombinedParams() { const std::vector<std::vector<GatherTreeParams>> generatedParams { generateParams<element::Type_t::i32>(), generateParams<element::Type_t::f32>(), }; std::vector<GatherTreeParams> combinedParams; for (const auto& params : generatedParams) { combinedParams.insert(combinedParams.end(), params.begin(), params.end()); } return combinedParams; } INSTANTIATE_TEST_SUITE_P(smoke_GatherTree_With_Hardcoded_Refs, ReferenceGatherTreeTest, testing::ValuesIn(generateCombinedParams()), ReferenceGatherTreeTest::getTestCaseName); } // namespace
[ "noreply@github.com" ]
openvinotoolkit.noreply@github.com
ddc878f2b673205bcb35a1700fb5fa15b057f9d6
19a98c9965cf0ece2b1c419852f7c7b02b6aca52
/Task5/Task5/Task5.cpp
fdd8fd2acd6eb9a8bc3287f19079614242b4729b
[]
no_license
rekinx/SW
273a3429e9d7bc709fe5b503c2a981150e596ce2
03dc36a248f5b653fdf3ce6565aa2a90ee38aaf5
refs/heads/main
2023-08-28T06:37:36.842928
2021-10-27T22:56:09
2021-10-27T22:56:09
411,675,504
0
0
null
2021-09-29T13:00:00
2021-09-29T12:59:59
null
UTF-8
C++
false
false
917
cpp
#include<string> #include<iostream> #include <random> using namespace std; int main() { int num1 = rand() % 10, num2 = rand() % 10, num3 = rand() % 10, num4 = rand() % 10, num; //5 задание string hid_num, ans = "0000"; hid_num = to_string(num1) + to_string(num2) + to_string(num3) + to_string(num4); for (int i = 0; i <= 9; i++) { ans.replace(3, 1, to_string(i)); if (ans == hid_num) { cout << "password: " << ans << endl; } for (int j = 0; j <= 9; j++) { ans.replace(2, 1, to_string(j)); if (ans == hid_num) { cout << "password: " << ans << endl; } for (int l = 0; l <= 9; l++) { ans.replace(1, 1, to_string(l)); if (ans == hid_num) { cout << "password: " << ans << endl; } for (int f = 0; f <= 9; f++) { ans.replace(0, 1, to_string(f)); if (ans == hid_num) { cout << "password: " << ans << endl; } } } } } system("pause"); return 0; }
[ "makary787898@gmail.com" ]
makary787898@gmail.com
acece0a9e6628529a6bcc6080544e77c3ea3e8ca
dd1645a024f8c17b033bb496df6d97c6539f6a54
/base/inter/Expr.cpp
fc3484767251a00e4f460471d19e82eefd98718d
[]
no_license
shnere/CParserFinal
741bd4fcedd91bac0f62f6518dca5aaa4286e882
899f9202193a8f3aefd9f7e997a932f0bf2022f6
refs/heads/master
2020-12-24T13:21:50.928950
2013-05-13T14:33:27
2013-05-13T14:33:27
null
0
0
null
null
null
null
UTF-8
C++
false
false
953
cpp
#include <sstream> #include "Expr.hh" std::stringstream out; Expr::Expr(Token * tok, Type * p) { this->op = tok; this->type = p; } Expr::~Expr() { } Expr * Expr::gen() { return this; } Expr * Expr::reduce() { return this; } void Expr::jumping(int t, int f) { this->emitjumps( this->toString(), t, f); } void Expr::emitjumps(std::string const &test, int t, int f) { if( t != 0 && f != 0){ out << t; Node::emit("if "+ test +" goto "+ out.str()); out.str(""); out << f; Node::emit("goto L"+out.str()); out.str(""); }else if( t != 0){ out << f; Node::emit("if "+ test +" goto L "+ out.str()); out.str(""); } else if ( f != 0){ out << f; Node::emit("iffalse " + test + " goto L" + out.str()); out.str(""); } } std::string const Expr::toString() { Word * w = dynamic_cast<Word *>(this->op); if(w != 0) { return w->toString(); } else { return this->op->toString(); } }
[ "alanrodriguezromero@gmail.com" ]
alanrodriguezromero@gmail.com
d20de5c1fd31bf863c7f5a24ac8637b79032bb51
ea1328695989667c9ab168facfa1095ffe55639c
/libs/harfbuzz-ng/src/hb-ot-shape-complex-arabic-fallback.hh
a77f24ec849b6b0b9a9a11b79709d3619ea22fb9
[ "LicenseRef-scancode-other-permissive", "MIT-Modern-Variant", "LicenseRef-scancode-unknown-license-reference", "Apache-2.0" ]
permissive
amarullz/libaroma
c075058d9e434bdd2faf6ed1d3e3e008666f3146
cdbe5847d967ae85c442eaf2db7beb08a8cf6713
refs/heads/master
2022-12-22T16:09:39.500801
2022-12-15T02:37:18
2022-12-15T02:37:18
29,760,977
51
33
Apache-2.0
2022-07-11T02:47:17
2015-01-24T01:17:06
C
UTF-8
C++
false
false
12,325
hh
/* * Copyright © 2012 Google, Inc. * * This is part of HarfBuzz, a text shaping library. * * Permission is hereby granted, without written agreement and without * license or royalty fees, to use, copy, modify, and distribute this * software and its documentation for any purpose, provided that the * above copyright notice and the following two paragraphs appear in * all copies of this software. * * IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE TO ANY PARTY FOR * DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES * ARISING OUT OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN * IF THE COPYRIGHT HOLDER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH * DAMAGE. * * THE COPYRIGHT HOLDER SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING, * BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND * FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS * ON AN "AS IS" BASIS, AND THE COPYRIGHT HOLDER HAS NO OBLIGATION TO * PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS. * * Google Author(s): Behdad Esfahbod */ #ifndef HB_OT_SHAPE_COMPLEX_ARABIC_FALLBACK_HH #define HB_OT_SHAPE_COMPLEX_ARABIC_FALLBACK_HH #include "hb-private.hh" #include "hb-ot-shape-private.hh" #include "hb-ot-layout-gsub-table.hh" /* Features ordered the same as the entries in shaping_table rows, * followed by rlig. Don't change. */ static const hb_tag_t arabic_fallback_features[] = { HB_TAG('i','n','i','t'), HB_TAG('m','e','d','i'), HB_TAG('f','i','n','a'), HB_TAG('i','s','o','l'), HB_TAG('r','l','i','g'), }; static OT::SubstLookup * arabic_fallback_synthesize_lookup_single (const hb_ot_shape_plan_t *plan HB_UNUSED, hb_font_t *font, unsigned int feature_index) { OT::GlyphID glyphs[SHAPING_TABLE_LAST - SHAPING_TABLE_FIRST + 1]; OT::GlyphID substitutes[SHAPING_TABLE_LAST - SHAPING_TABLE_FIRST + 1]; unsigned int num_glyphs = 0; /* Populate arrays */ for (hb_codepoint_t u = SHAPING_TABLE_FIRST; u < SHAPING_TABLE_LAST + 1; u++) { hb_codepoint_t s = shaping_table[u - SHAPING_TABLE_FIRST][feature_index]; hb_codepoint_t u_glyph, s_glyph; if (!s || !hb_font_get_glyph (font, u, 0, &u_glyph) || !hb_font_get_glyph (font, s, 0, &s_glyph) || u_glyph == s_glyph || u_glyph > 0xFFFFu || s_glyph > 0xFFFFu) continue; glyphs[num_glyphs].set (u_glyph); substitutes[num_glyphs].set (s_glyph); num_glyphs++; } if (!num_glyphs) return NULL; /* Bubble-sort! * May not be good-enough for presidential candidate interviews, but good-enough for us... */ hb_bubble_sort (&glyphs[0], num_glyphs, OT::GlyphID::cmp, &substitutes[0]); OT::Supplier<OT::GlyphID> glyphs_supplier (glyphs, num_glyphs); OT::Supplier<OT::GlyphID> substitutes_supplier (substitutes, num_glyphs); /* Each glyph takes four bytes max, and there's some overhead. */ char buf[(SHAPING_TABLE_LAST - SHAPING_TABLE_FIRST + 1) * 4 + 128]; OT::hb_serialize_context_t c (buf, sizeof (buf)); OT::SubstLookup *lookup = c.start_serialize<OT::SubstLookup> (); bool ret = lookup->serialize_single (&c, OT::LookupFlag::IgnoreMarks, glyphs_supplier, substitutes_supplier, num_glyphs); c.end_serialize (); /* TODO sanitize the results? */ return ret ? c.copy<OT::SubstLookup> () : NULL; } static OT::SubstLookup * arabic_fallback_synthesize_lookup_ligature (const hb_ot_shape_plan_t *plan HB_UNUSED, hb_font_t *font) { OT::GlyphID first_glyphs[ARRAY_LENGTH_CONST (ligature_table)]; unsigned int first_glyphs_indirection[ARRAY_LENGTH_CONST (ligature_table)]; unsigned int ligature_per_first_glyph_count_list[ARRAY_LENGTH_CONST (first_glyphs)]; unsigned int num_first_glyphs = 0; /* We know that all our ligatures are 2-component */ OT::GlyphID ligature_list[ARRAY_LENGTH_CONST (first_glyphs) * ARRAY_LENGTH_CONST(ligature_table[0].ligatures)]; unsigned int component_count_list[ARRAY_LENGTH_CONST (ligature_list)]; OT::GlyphID component_list[ARRAY_LENGTH_CONST (ligature_list) * 1/* One extra component per ligature */]; unsigned int num_ligatures = 0; /* Populate arrays */ /* Sort out the first-glyphs */ for (unsigned int first_glyph_idx = 0; first_glyph_idx < ARRAY_LENGTH (first_glyphs); first_glyph_idx++) { hb_codepoint_t first_u = ligature_table[first_glyph_idx].first; hb_codepoint_t first_glyph; if (!hb_font_get_glyph (font, first_u, 0, &first_glyph)) continue; first_glyphs[num_first_glyphs].set (first_glyph); ligature_per_first_glyph_count_list[num_first_glyphs] = 0; first_glyphs_indirection[num_first_glyphs] = first_glyph_idx; num_first_glyphs++; } hb_bubble_sort (&first_glyphs[0], num_first_glyphs, OT::GlyphID::cmp, &first_glyphs_indirection[0]); /* Now that the first-glyphs are sorted, walk again, populate ligatures. */ for (unsigned int i = 0; i < num_first_glyphs; i++) { unsigned int first_glyph_idx = first_glyphs_indirection[i]; for (unsigned int second_glyph_idx = 0; second_glyph_idx < ARRAY_LENGTH (ligature_table[0].ligatures); second_glyph_idx++) { hb_codepoint_t second_u = ligature_table[first_glyph_idx].ligatures[second_glyph_idx].second; hb_codepoint_t ligature_u = ligature_table[first_glyph_idx].ligatures[second_glyph_idx].ligature; hb_codepoint_t second_glyph, ligature_glyph; if (!second_u || !hb_font_get_glyph (font, second_u, 0, &second_glyph) || !hb_font_get_glyph (font, ligature_u, 0, &ligature_glyph)) continue; ligature_per_first_glyph_count_list[i]++; ligature_list[num_ligatures].set (ligature_glyph); component_count_list[num_ligatures] = 2; component_list[num_ligatures].set (second_glyph); num_ligatures++; } } if (!num_ligatures) return NULL; OT::Supplier<OT::GlyphID> first_glyphs_supplier (first_glyphs, num_first_glyphs); OT::Supplier<unsigned int > ligature_per_first_glyph_count_supplier (ligature_per_first_glyph_count_list, num_first_glyphs); OT::Supplier<OT::GlyphID> ligatures_supplier (ligature_list, num_ligatures); OT::Supplier<unsigned int > component_count_supplier (component_count_list, num_ligatures); OT::Supplier<OT::GlyphID> component_supplier (component_list, num_ligatures); /* 16 bytes per ligature ought to be enough... */ char buf[ARRAY_LENGTH_CONST (ligature_list) * 16 + 128]; OT::hb_serialize_context_t c (buf, sizeof (buf)); OT::SubstLookup *lookup = c.start_serialize<OT::SubstLookup> (); bool ret = lookup->serialize_ligature (&c, OT::LookupFlag::IgnoreMarks, first_glyphs_supplier, ligature_per_first_glyph_count_supplier, num_first_glyphs, ligatures_supplier, component_count_supplier, component_supplier); c.end_serialize (); /* TODO sanitize the results? */ return ret ? c.copy<OT::SubstLookup> () : NULL; } static OT::SubstLookup * arabic_fallback_synthesize_lookup (const hb_ot_shape_plan_t *plan, hb_font_t *font, unsigned int feature_index) { if (feature_index < 4) return arabic_fallback_synthesize_lookup_single (plan, font, feature_index); else return arabic_fallback_synthesize_lookup_ligature (plan, font); } #define ARABIC_FALLBACK_MAX_LOOKUPS 5 struct arabic_fallback_plan_t { ASSERT_POD (); unsigned int num_lookups; bool free_lookups; hb_mask_t mask_array[ARABIC_FALLBACK_MAX_LOOKUPS]; OT::SubstLookup *lookup_array[ARABIC_FALLBACK_MAX_LOOKUPS]; hb_ot_layout_lookup_accelerator_t accel_array[ARABIC_FALLBACK_MAX_LOOKUPS]; }; static const arabic_fallback_plan_t arabic_fallback_plan_nil = {}; #if (defined(_WIN32) || defined(__CYGWIN__)) && !defined(HB_NO_WIN1256) #define HB_WITH_WIN1256 #endif #ifdef HB_WITH_WIN1256 #include "hb-ot-shape-complex-arabic-win1256.hh" #endif struct ManifestLookup { OT::Tag tag; OT::OffsetTo<OT::SubstLookup> lookupOffset; }; typedef OT::ArrayOf<ManifestLookup> Manifest; static bool arabic_fallback_plan_init_win1256 (arabic_fallback_plan_t *fallback_plan, const hb_ot_shape_plan_t *plan, hb_font_t *font) { #ifdef HB_WITH_WIN1256 /* Does this font look like it's Windows-1256-encoded? */ hb_codepoint_t g; if (!(hb_font_get_glyph (font, 0x0627u, 0, &g) && g == 199 /* ALEF */ && hb_font_get_glyph (font, 0x0644u, 0, &g) && g == 225 /* LAM */ && hb_font_get_glyph (font, 0x0649u, 0, &g) && g == 236 /* ALEF MAKSURA */ && hb_font_get_glyph (font, 0x064Au, 0, &g) && g == 237 /* YEH */ && hb_font_get_glyph (font, 0x0652u, 0, &g) && g == 250 /* SUKUN */)) return false; const Manifest &manifest = reinterpret_cast<const Manifest&> (arabic_win1256_gsub_lookups.manifest); ASSERT_STATIC (sizeof (arabic_win1256_gsub_lookups.manifestData) / sizeof (ManifestLookup) <= ARABIC_FALLBACK_MAX_LOOKUPS); /* TODO sanitize the table? */ unsigned j = 0; unsigned int count = manifest.len; for (unsigned int i = 0; i < count; i++) { fallback_plan->mask_array[j] = plan->map.get_1_mask (manifest[i].tag); if (fallback_plan->mask_array[j]) { fallback_plan->lookup_array[j] = const_cast<OT::SubstLookup*> (&(&manifest+manifest[i].lookupOffset)); if (fallback_plan->lookup_array[j]) { fallback_plan->accel_array[j].init (*fallback_plan->lookup_array[j]); j++; } } } fallback_plan->num_lookups = j; fallback_plan->free_lookups = false; return j > 0; #else return false; #endif } static bool arabic_fallback_plan_init_unicode (arabic_fallback_plan_t *fallback_plan, const hb_ot_shape_plan_t *plan, hb_font_t *font) { ASSERT_STATIC (ARRAY_LENGTH_CONST(arabic_fallback_features) <= ARABIC_FALLBACK_MAX_LOOKUPS); unsigned int j = 0; for (unsigned int i = 0; i < ARRAY_LENGTH(arabic_fallback_features) ; i++) { fallback_plan->mask_array[j] = plan->map.get_1_mask (arabic_fallback_features[i]); if (fallback_plan->mask_array[j]) { fallback_plan->lookup_array[j] = arabic_fallback_synthesize_lookup (plan, font, i); if (fallback_plan->lookup_array[j]) { fallback_plan->accel_array[j].init (*fallback_plan->lookup_array[j]); j++; } } } fallback_plan->num_lookups = j; fallback_plan->free_lookups = true; return j > 0; } static arabic_fallback_plan_t * arabic_fallback_plan_create (const hb_ot_shape_plan_t *plan, hb_font_t *font) { arabic_fallback_plan_t *fallback_plan = (arabic_fallback_plan_t *) calloc (1, sizeof (arabic_fallback_plan_t)); if (unlikely (!fallback_plan)) return const_cast<arabic_fallback_plan_t *> (&arabic_fallback_plan_nil); fallback_plan->num_lookups = 0; fallback_plan->free_lookups = false; /* Try synthesizing GSUB table using Unicode Arabic Presentation Forms, * in case the font has cmap entries for the presentation-forms characters. */ if (arabic_fallback_plan_init_unicode (fallback_plan, plan, font)) return fallback_plan; /* See if this looks like a Windows-1256-encoded font. If it does, use a * hand-coded GSUB table. */ if (arabic_fallback_plan_init_win1256 (fallback_plan, plan, font)) return fallback_plan; free (fallback_plan); return const_cast<arabic_fallback_plan_t *> (&arabic_fallback_plan_nil); } static void arabic_fallback_plan_destroy (arabic_fallback_plan_t *fallback_plan) { if (!fallback_plan || fallback_plan == &arabic_fallback_plan_nil) return; for (unsigned int i = 0; i < fallback_plan->num_lookups; i++) if (fallback_plan->lookup_array[i]) { fallback_plan->accel_array[i].fini (); if (fallback_plan->free_lookups) free (fallback_plan->lookup_array[i]); } free (fallback_plan); } static void arabic_fallback_plan_shape (arabic_fallback_plan_t *fallback_plan, hb_font_t *font, hb_buffer_t *buffer) { OT::hb_apply_context_t c (0, font, buffer); for (unsigned int i = 0; i < fallback_plan->num_lookups; i++) if (fallback_plan->lookup_array[i]) { c.set_lookup_mask (fallback_plan->mask_array[i]); hb_ot_layout_substitute_lookup (&c, *fallback_plan->lookup_array[i], fallback_plan->accel_array[i]); } } #endif /* HB_OT_SHAPE_COMPLEX_ARABIC_FALLBACK_HH */
[ "amarullz@yahoo.com" ]
amarullz@yahoo.com
cad84a45c36ed3018d7bdd265d864d385ec5b345
6681adf01f381e276ee5a86942e7075ea8891dbb
/Graph/include/Node/RouterNode.h
d61002a9ac567b6212c1a5e70c2453db341fd5c7
[]
no_license
k-pypin/BandwidthGraph
7359c9d4b2bec7c913fe330892d3f30bcf521efb
17810a0f3a6c57e4d5d9b1fd55bd26c2c316e8f9
refs/heads/master
2023-02-05T13:42:12.875974
2020-12-28T23:34:38
2020-12-28T23:34:38
null
0
0
null
null
null
null
UTF-8
C++
false
false
476
h
// // Created by Trojan on 07.12.2020. // #ifndef BANDWIDTHGRAPH_ROUTERNODE_H #define BANDWIDTHGRAPH_ROUTERNODE_H #include "Node/BaseBandwidthNode.h" class RouterNode : public BaseBandwidthNode { public: RouterNode() = default; virtual ~RouterNode() {}; explicit RouterNode(const nlohmann::json& j) { BaseBandwidthNode::fromJSON(j); }; NodeType getNodeType() override { return NODETYPE_ROUTER; } }; #endif //BANDWIDTHGRAPH_ROUTERNODE_H
[ "kirill_131097@mail.ru" ]
kirill_131097@mail.ru
fd43d95c13430163e9683b7845642c337475b0fe
1d7baf8f25e3cdc2c028f0642a38fb3303a1f831
/src/param/bean/param.hpp
5488769dab388ccb61472c836f78cdf672d3ac0f
[]
no_license
fightinggg/pocker
e0cbfd19b47d982c2aa2f50116744573e8119b75
dd40f8b51ebd3e5f380a67168eaa06c4753119b0
refs/heads/master
2023-05-15T03:35:47.037576
2021-06-05T03:11:10
2021-06-05T03:11:10
359,097,772
10
0
null
null
null
null
UTF-8
C++
false
false
87
hpp
#pragma once #include "./param_type.hpp" class param { public: param_type type; };
[ "246553278@qq.com" ]
246553278@qq.com
fb663bba326ade165d83724de7b480b13da69221
debe78f4b03165cb6da68c3b076aa2d1257b967d
/display_list/display_list.h
a20f93f56a025ac66e2c107f50f562c8682ea281
[ "BSD-3-Clause" ]
permissive
anql/engine
dfa95d60d1b2e5ecaed67a8e07ee27e6c023d1f1
c9ee05b68e6e54ec95add31378f8d21299bf9e7e
refs/heads/main
2023-03-17T15:20:48.762580
2022-12-21T04:36:48
2022-12-21T04:36:48
533,702,798
0
0
BSD-3-Clause
2022-09-07T09:48:25
2022-09-07T09:48:25
null
UTF-8
C++
false
false
10,999
h
// Copyright 2013 The Flutter Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef FLUTTER_DISPLAY_LIST_DISPLAY_LIST_H_ #define FLUTTER_DISPLAY_LIST_DISPLAY_LIST_H_ #include <memory> #include <optional> #include "flutter/display_list/display_list_rtree.h" #include "flutter/display_list/display_list_sampling_options.h" #include "flutter/display_list/types.h" #include "flutter/fml/logging.h" // The Flutter DisplayList mechanism encapsulates a persistent sequence of // rendering operations. // // This file contains the definitions for: // DisplayList: the base class that holds the information about the // sequence of operations and can dispatch them to a Dispatcher // Dispatcher: a pure virtual interface which can be implemented to field // the requests for purposes such as sending them to an SkCanvas // or detecting various rendering optimization scenarios // DisplayListBuilder: a class for constructing a DisplayList from the same // calls defined in the Dispatcher // // Other files include various class definitions for dealing with display // lists, such as: // display_list_canvas.h: classes to interact between SkCanvas and DisplayList // (SkCanvas->DisplayList adapter and vice versa) // // display_list_utils.h: various utility classes to ease implementing // a Dispatcher, including NOP implementations of // the attribute, clip, and transform methods, // classes to track attributes, clips, and transforms // and a class to compute the bounds of a DisplayList // Any class implementing Dispatcher can inherit from // these utility classes to simplify its creation // // The Flutter DisplayList mechanism can be used in place of the Skia // SkPicture mechanism. The primary means of communication into and out // of the DisplayList is through the Dispatcher virtual class which // provides a nearly 1:1 translation between the records of the DisplayList // to method calls. // // A DisplayList can be created directly using a DisplayListBuilder and // the Dispatcher methods that it implements, or it can be created from // a sequence of SkCanvas calls using the DisplayListCanvasRecorder class. // // A DisplayList can be read back by implementing the Dispatcher virtual // methods (with help from some of the classes in the utils file) and // passing an instance to the dispatch() method, or it can be rendered // to Skia using a DisplayListCanvasDispatcher or simply by passing an // SkCanvas pointer to its renderTo() method. // // The mechanism is inspired by the SkLiteDL class that is not directly // supported by Skia, but has been recommended as a basis for custom // display lists for a number of their customers. namespace flutter { #define FOR_EACH_DISPLAY_LIST_OP(V) \ V(SetAntiAlias) \ V(SetDither) \ V(SetInvertColors) \ \ V(SetStrokeCap) \ V(SetStrokeJoin) \ \ V(SetStyle) \ V(SetStrokeWidth) \ V(SetStrokeMiter) \ \ V(SetColor) \ V(SetBlendMode) \ \ V(SetBlender) \ V(ClearBlender) \ \ V(SetSkPathEffect) \ V(SetPodPathEffect) \ V(ClearPathEffect) \ \ V(ClearColorFilter) \ V(SetPodColorFilter) \ V(SetSkColorFilter) \ \ V(ClearColorSource) \ V(SetPodColorSource) \ V(SetSkColorSource) \ V(SetImageColorSource) \ V(SetRuntimeEffectColorSource) \ \ V(ClearImageFilter) \ V(SetPodImageFilter) \ V(SetSkImageFilter) \ V(SetSharedImageFilter) \ \ V(ClearMaskFilter) \ V(SetPodMaskFilter) \ V(SetSkMaskFilter) \ \ V(Save) \ V(SaveLayer) \ V(SaveLayerBounds) \ V(SaveLayerBackdrop) \ V(SaveLayerBackdropBounds) \ V(Restore) \ \ V(Translate) \ V(Scale) \ V(Rotate) \ V(Skew) \ V(Transform2DAffine) \ V(TransformFullPerspective) \ V(TransformReset) \ \ V(ClipIntersectRect) \ V(ClipIntersectRRect) \ V(ClipIntersectPath) \ V(ClipDifferenceRect) \ V(ClipDifferenceRRect) \ V(ClipDifferencePath) \ \ V(DrawPaint) \ V(DrawColor) \ \ V(DrawLine) \ V(DrawRect) \ V(DrawOval) \ V(DrawCircle) \ V(DrawRRect) \ V(DrawDRRect) \ V(DrawArc) \ V(DrawPath) \ \ V(DrawPoints) \ V(DrawLines) \ V(DrawPolygon) \ V(DrawVertices) \ V(DrawSkVertices) \ \ V(DrawImage) \ V(DrawImageWithAttr) \ V(DrawImageRect) \ V(DrawImageNine) \ V(DrawImageNineWithAttr) \ V(DrawImageLattice) \ V(DrawAtlas) \ V(DrawAtlasCulled) \ \ V(DrawSkPicture) \ V(DrawSkPictureMatrix) \ V(DrawDisplayList) \ V(DrawTextBlob) \ \ V(DrawShadow) \ V(DrawShadowTransparentOccluder) #define DL_OP_TO_ENUM_VALUE(name) k##name, enum class DisplayListOpType { FOR_EACH_DISPLAY_LIST_OP(DL_OP_TO_ENUM_VALUE) }; #undef DL_OP_TO_ENUM_VALUE class Dispatcher; class DisplayListBuilder; class SaveLayerOptions { public: static const SaveLayerOptions kWithAttributes; static const SaveLayerOptions kNoAttributes; SaveLayerOptions() : flags_(0) {} SaveLayerOptions(const SaveLayerOptions& options) : flags_(options.flags_) {} SaveLayerOptions(const SaveLayerOptions* options) : flags_(options->flags_) {} SaveLayerOptions without_optimizations() const { SaveLayerOptions options; options.fRendersWithAttributes = fRendersWithAttributes; return options; } bool renders_with_attributes() const { return fRendersWithAttributes; } SaveLayerOptions with_renders_with_attributes() const { SaveLayerOptions options(this); options.fRendersWithAttributes = true; return options; } bool can_distribute_opacity() const { return fCanDistributeOpacity; } SaveLayerOptions with_can_distribute_opacity() const { SaveLayerOptions options(this); options.fCanDistributeOpacity = true; return options; } SaveLayerOptions& operator=(const SaveLayerOptions& other) { flags_ = other.flags_; return *this; } bool operator==(const SaveLayerOptions& other) const { return flags_ == other.flags_; } bool operator!=(const SaveLayerOptions& other) const { return flags_ != other.flags_; } private: union { struct { unsigned fRendersWithAttributes : 1; unsigned fCanDistributeOpacity : 1; }; uint32_t flags_; }; }; // Manages a buffer allocated with malloc. class DisplayListStorage { public: DisplayListStorage() = default; DisplayListStorage(DisplayListStorage&&) = default; uint8_t* get() const { return ptr_.get(); } void realloc(size_t count) { ptr_.reset(static_cast<uint8_t*>(std::realloc(ptr_.release(), count))); FML_CHECK(ptr_); } private: struct FreeDeleter { void operator()(uint8_t* p) { std::free(p); } }; std::unique_ptr<uint8_t, FreeDeleter> ptr_; }; // The base class that contains a sequence of rendering operations // for dispatch to a Dispatcher. These objects must be instantiated // through an instance of DisplayListBuilder::build(). class DisplayList : public SkRefCnt { public: DisplayList(); ~DisplayList(); void Dispatch(Dispatcher& ctx) const { uint8_t* ptr = storage_.get(); Dispatch(ctx, ptr, ptr + byte_count_); } void RenderTo(DisplayListBuilder* builder, SkScalar opacity = SK_Scalar1) const; void RenderTo(SkCanvas* canvas, SkScalar opacity = SK_Scalar1) const; // SkPicture always includes nested bytes, but nested ops are // only included if requested. The defaults used here for these // accessors follow that pattern. size_t bytes(bool nested = true) const { return sizeof(DisplayList) + byte_count_ + (nested ? nested_byte_count_ : 0); } unsigned int op_count(bool nested = false) const { return op_count_ + (nested ? nested_op_count_ : 0); } uint32_t unique_id() const { return unique_id_; } const SkRect& bounds() { return bounds_; } sk_sp<const DlRTree> rtree() { return rtree_; } bool Equals(const DisplayList* other) const; bool Equals(const DisplayList& other) const { return Equals(&other); } bool Equals(sk_sp<const DisplayList> other) const { return Equals(other.get()); } bool can_apply_group_opacity() { return can_apply_group_opacity_; } static void DisposeOps(uint8_t* ptr, uint8_t* end); private: DisplayList(DisplayListStorage&& ptr, size_t byte_count, unsigned int op_count, size_t nested_byte_count, unsigned int nested_op_count, const SkRect& bounds, bool can_apply_group_opacity, sk_sp<const DlRTree> rtree); DisplayListStorage storage_; size_t byte_count_; unsigned int op_count_; size_t nested_byte_count_; unsigned int nested_op_count_; uint32_t unique_id_; SkRect bounds_; bool can_apply_group_opacity_; sk_sp<const DlRTree> rtree_; void Dispatch(Dispatcher& ctx, uint8_t* ptr, uint8_t* end) const; friend class DisplayListBuilder; }; } // namespace flutter #endif // FLUTTER_DISPLAY_LIST_DISPLAY_LIST_H_
[ "noreply@github.com" ]
anql.noreply@github.com
12f03b6af4f0f2c1ed2af7f4e6efe7c9f6eaeaa2
21f5356e9fd0b3ab9ee7a5c54e30fd94bb660ee4
/win32/src/win32crypt/PyCTL_CONTEXT.cpp
805495386aefe5e81b21722db47ca65515463ab0
[]
no_license
chevah/pywin32
90850232a557ecf054bc316e324aaf60188f2cca
d4ff0b440147ab65f1945991e81163fb1cf1ceaf
refs/heads/master
2020-03-29T09:46:04.465546
2014-10-24T09:11:17
2014-10-24T09:11:17
25,680,336
5
1
null
null
null
null
UTF-8
C++
false
false
6,881
cpp
// @doc #include "win32crypt.h" // @object PyCTL_CONTEXT|Object containing a Certificate Trust List struct PyMethodDef PyCTL_CONTEXT::methods[] = { // @pymeth CertFreeCTLContext|Closes the context handle {"CertFreeCTLContext", PyCTL_CONTEXT::PyCertFreeCTLContext, METH_NOARGS}, // @pymeth CertEnumCTLContextProperties|Lists property id's for the context {"CertEnumCTLContextProperties", PyCTL_CONTEXT::PyCertEnumCTLContextProperties, METH_NOARGS}, // @pymeth CertEnumSubjectInSortedCTL|Retrieves trusted subjects contained in CTL {"CertEnumSubjectInSortedCTL", PyCTL_CONTEXT::PyCertEnumSubjectInSortedCTL, METH_NOARGS}, // @pymeth CertDeleteCTLFromStore|Removes the CTL from the store that it is contained in {"CertDeleteCTLFromStore", PyCTL_CONTEXT::PyCertDeleteCTLFromStore, METH_NOARGS}, // @pymeth CertSerializeCTLStoreElement|Serializes the CTL and its properties {"CertSerializeCTLStoreElement", (PyCFunction)PyCTL_CONTEXT::PyCertSerializeCTLStoreElement, METH_KEYWORDS|METH_VARARGS}, {NULL} }; PyTypeObject PyCTL_CONTEXTType = { PYWIN_OBJECT_HEAD "PyCTL_CONTEXT", sizeof(PyCTL_CONTEXT), 0, PyCTL_CONTEXT::deallocFunc, /* tp_dealloc */ 0, /* tp_print */ 0, /* tp_getattr */ 0, /* tp_setattr */ 0, /* tp_compare */ 0, /* tp_repr */ 0, /* tp_as_number */ 0, /* tp_as_sequence */ 0, /* tp_as_mapping */ 0, 0, /* tp_call */ 0, /* tp_str */ PyCTL_CONTEXT::getattro, PyCTL_CONTEXT::setattro, 0, // PyBufferProcs *tp_as_buffer Py_TPFLAGS_DEFAULT | Py_TPFLAGS_BASETYPE, // tp_flags 0, // tp_doc 0, // traverseproc tp_traverse 0, // tp_clear 0, // richcmpfunc tp_richcompare 0, // tp_weaklistoffset 0, // getiterfunc tp_iter 0, // iternextfunc tp_iternext PyCTL_CONTEXT::methods, PyCTL_CONTEXT::members }; struct PyMemberDef PyCTL_CONTEXT::members[] = { // @prop int|HCTL_CONTEXT|Raw message handle {"PCCTL_CONTEXT", T_OBJECT, offsetof(PyCTL_CONTEXT, obctl_context), READONLY, "Integet context handle"}, {NULL} /* Sentinel */ }; int PyCTL_CONTEXT::setattro(PyObject *self, PyObject *obname, PyObject *v) { return PyObject_GenericSetAttr(self, obname, v); } PyObject *PyCTL_CONTEXT::getattro(PyObject *self, PyObject *obname) { return PyObject_GenericGetAttr(self,obname); } BOOL PyWinObject_AsCTL_CONTEXT(PyObject *ob, PCCTL_CONTEXT *ppctl_context, BOOL bNoneOK) { if (bNoneOK && (ob==Py_None)){ *ppctl_context=NULL; return true; } if (ob->ob_type!=&PyCTL_CONTEXTType){ PyErr_SetString(PyExc_TypeError,"Object must be of type PyCTL_CONTEXT"); return FALSE; } *ppctl_context=((PyCTL_CONTEXT *)ob)->GetCTL_CONTEXT(); return TRUE; } PyObject *PyWinObject_FromCTL_CONTEXT(PCCTL_CONTEXT pcc) { if (pcc==NULL){ Py_INCREF(Py_None); return Py_None; } PyObject *ret = new PyCTL_CONTEXT(pcc); if (ret==NULL) PyErr_SetString(PyExc_MemoryError, "PyWinObject_FromCTL_CONTEXT: Unable to create PyCTL_CONTEXT instance"); return ret; } PyCTL_CONTEXT::~PyCTL_CONTEXT(void) { if (pctl_context!=NULL) CertFreeCTLContext(pctl_context); Py_XDECREF(this->obctl_context); } void PyCTL_CONTEXT::deallocFunc(PyObject *ob) { delete (PyCTL_CONTEXT *)ob; } PyCTL_CONTEXT::PyCTL_CONTEXT(PCCTL_CONTEXT pcc) { ob_type = &PyCTL_CONTEXTType; _Py_NewReference(this); this->pctl_context=pcc; this->obctl_context=PyLong_FromVoidPtr((void *)pcc); this->obdummy=NULL; } // @pymethod |PyCTL_CONTEXT|CertFreeCTLContext|Closes the CTL handle PyObject *PyCTL_CONTEXT::PyCertFreeCTLContext(PyObject *self, PyObject *args) { PCCTL_CONTEXT pcc=((PyCTL_CONTEXT *)self)->GetCTL_CONTEXT(); if(!CertFreeCTLContext(pcc)) return PyWin_SetAPIError("CertFreeCTLContext"); Py_INCREF(Py_None); return Py_None; } // @pymethod (int,...)|PyCTL_CONTEXT|CertEnumCTLContextProperties|Lists property id's for the context PyObject *PyCTL_CONTEXT::PyCertEnumCTLContextProperties(PyObject *self, PyObject *args) { PCCTL_CONTEXT pctl=((PyCTL_CONTEXT *)self)->GetCTL_CONTEXT(); PyObject *ret_item=NULL; DWORD err=0, prop=0; PyObject *ret=PyList_New(0); if (ret==NULL) return NULL; while (TRUE){ prop=CertEnumCTLContextProperties(pctl, prop); if (prop == 0) break; ret_item=PyLong_FromUnsignedLong(prop); if ((ret_item==NULL) || (PyList_Append(ret, ret_item)==-1)){ Py_XDECREF(ret_item); Py_DECREF(ret); ret=NULL; break; } Py_DECREF(ret_item); } return ret; } // @pymethod ((str,str),...)|PyCTL_CONTEXT|CertEnumSubjectInSortedCTL|Retrieves trusted subjects contained in CRL // @rdesc Returns a sequence of tuples containing two strings (SubjectIdentifier, EncodedAttributes) PyObject *PyCTL_CONTEXT::PyCertEnumSubjectInSortedCTL(PyObject *self, PyObject *args) { PCCTL_CONTEXT pctl=((PyCTL_CONTEXT *)self)->GetCTL_CONTEXT(); void *ctxt=NULL; CRYPT_DER_BLOB subject, attr; PyObject *ret_item=NULL; PyObject *ret=PyList_New(0); if (ret==NULL) return NULL; while (CertEnumSubjectInSortedCTL(pctl, &ctxt, &subject, &attr)){ ret_item=Py_BuildValue("NN", PyString_FromStringAndSize((char *)subject.pbData, subject.cbData), PyString_FromStringAndSize((char *)attr.pbData, attr.cbData)); if ((ret_item==NULL) || (PyList_Append(ret, ret_item)==-1)){ Py_XDECREF(ret_item); Py_DECREF(ret); ret=NULL; break; } Py_DECREF(ret_item); } return ret; } // @pymethod |PyCTL_CONTEXT|CertDeleteCTLFromStore|Removes the CTL from the store that it is contained in PyObject *PyCTL_CONTEXT::PyCertDeleteCTLFromStore(PyObject *self, PyObject *args) { PCCTL_CONTEXT pctl=((PyCTL_CONTEXT *)self)->GetCTL_CONTEXT(); if (!CertDeleteCTLFromStore(pctl)) return PyWin_SetAPIError("CertDeleteCTLFromStore"); Py_INCREF(Py_None); return Py_None; } // @pymethod string|PyCTL_CONTEXT|CertSerializeCTLStoreElement|Serializes the CTL and its properties PyObject *PyCTL_CONTEXT::PyCertSerializeCTLStoreElement(PyObject *self, PyObject *args, PyObject *kwargs) { static char *keywords[]={"Flags", NULL}; PyObject *ret=NULL; DWORD flags=0, bufsize=0; PCCTL_CONTEXT pctl=((PyCTL_CONTEXT *)self)->GetCTL_CONTEXT(); BYTE *buf=NULL; if (!PyArg_ParseTupleAndKeywords(args, kwargs, "|k:CertSerializeCTLStoreElement", keywords, &flags)) // @pyparm int|Flags|0|Reserved, use only 0 if passed in return NULL; if (!CertSerializeCTLStoreElement(pctl, flags, buf, &bufsize)) return PyWin_SetAPIError("CertSerializeCTLStoreElement"); buf=(BYTE *)malloc(bufsize); if (buf==NULL) return PyErr_Format(PyExc_MemoryError, "Unable to allocate %d bytes", bufsize); if (!CertSerializeCTLStoreElement(pctl, flags, buf, &bufsize)) PyWin_SetAPIError("CertSerializeCTLStoreElement"); else ret=PyString_FromStringAndSize((char *)buf, bufsize); free(buf); return ret; }
[ "adi.roiban@chevah.com" ]
adi.roiban@chevah.com
6c7635822a95cb81406f8dacc32328f49a6a9ca5
3ae5046511f265e9ba1be9008e4d22a51601b6e8
/Source/SideScroller1/World/ColorSwitch.h
5622c927401126a280c37da2e6f206037607bcc8
[]
no_license
Daveiac/Master
3429532d1451ff2f034d8164029e9abfd5ba5300
d9bdf5d8de0ca03f7312814c846b50ef41a05c76
refs/heads/master
2021-01-12T13:54:50.529112
2016-06-17T18:54:36
2016-06-17T18:54:36
54,957,290
0
0
null
null
null
null
UTF-8
C++
false
false
408
h
// Fill out your copyright notice in the Description page of Project Settings. #pragma once #include "Switch.h" #include "ColorSwitch.generated.h" /** * */ UCLASS() class SIDESCROLLER1_API AColorSwitch : public ASwitch { GENERATED_BODY() public: UPROPERTY(EditAnywhere, Category = "ColorBox") int32 Channel; virtual void Activate() override; virtual void Deactivate() override; void Toggle(); };
[ "daveiac@hotmail.com" ]
daveiac@hotmail.com
868e9dfd97439641e1c4adc679cd2abc8f3d589f
7f2743effa89a8a36f3b30a7df8e3cec061a2202
/comlineargs.cc
849517e413f110a75cf51517020a2126871c50a7
[]
no_license
allisonchanykei/SchoolCplusplus
2745972ed33ea995651fa357919fadb5b69be758
2c88d5334891692d8f3b7f1715706161716664b1
refs/heads/master
2021-01-13T10:21:07.566840
2016-09-24T20:56:18
2016-09-24T20:56:18
null
0
0
null
null
null
null
UTF-8
C++
false
false
155
cc
#include <iostream> using namespace std; int main (int argc, char* argv[]){ for (int x=0;x<argc;x++){ cout<<argv[x]<<" "; } cout<<endl; return 0; }
[ "allisonchanykei@gmail.com" ]
allisonchanykei@gmail.com
fa91af7654a8ad07b6ff07b4ec937bc0207fe6a4
2b82c7a6b694ff9a99604fee2037df4ecc966df3
/src/curvaturetensor.cpp
aaa3f2a6340bf92394ebd49d1298e0904e3dcbd5
[]
no_license
juliendvl/modeleur-bmesh
b983bb534078c2bcdeddf2b3a3876d0998346b67
027f5ceb8c4d931b25e48f2f3bd4ba9d43f74f3c
refs/heads/master
2021-01-10T09:28:24.569504
2015-07-01T16:44:39
2015-07-01T16:44:39
35,996,303
3
0
null
null
null
null
UTF-8
C++
false
false
3,481
cpp
#include <iostream> #include <Eigen/Eigenvalues> #include "curvaturetensor.h" #include "mathutils.h" using namespace std; using namespace Eigen; using OpenMesh::Vec2f; /////////////////////////////////////////////////////////////////////////////// CurvatureTensor::CurvatureTensor(BMesh *m) : m(m) {} /////////////////////////////////////////////////////////////////////////////// bool CurvatureTensor::compute(const BMesh::VertexHandle &p, const vector<BMesh::VertexHandle> &neighbors) { this->p = p; this->neighbors = neighbors; curvatures.clear(); directions.clear(); Vector3f px = OMEigen::toEigen(m->point(p)); Vector3f nx = OMEigen::toEigen(m->normal(p)); // We construct the tangent plane tp = getTangentPlane(px, nx); // We only need 2 neighbors to compute Weingarten matrix Vector3f n0 = OMEigen::toEigen(m->normal(neighbors[1])); Vector3f n1 = OMEigen::toEigen(m->normal(neighbors[2])); Vector3f p0 = OMEigen::toEigen(m->point(neighbors[1])); Vector3f p1 = OMEigen::toEigen(m->point(neighbors[2])); float n0u = (n0 - nx).dot(tp[0]); float n0v = (n0 - nx).dot(tp[1]); float n1u = (n1 - nx).dot(tp[0]); Vector3f pe0 = MathUtils::projectVector(p0 - px, nx); Vector3f pe1 = MathUtils::projectVector(p1 - px, nx); float e0u = pe0.dot(tp[0]); float e0v = pe0.dot(tp[1]); float e1u = pe1.dot(tp[0]); float e1v = pe1.dot(tp[1]); // We construct the linear system Matrix3f A; A << e0u, e0v, 0, 0, e0u + e1u, e0v + e1v, e1u, e1v, 0; Vector3f B; B << n0u, n0v, n1u; // We solve the linear system Vector3f X = A.jacobiSvd(ComputeFullU | ComputeFullV).solve(B); // We construct the Weingarten matrix Matrix2f W; W << X(0), X(1), X(1), X(2); // We set curvatures and directions EigenSolver<Matrix2f> es(W); Vector2cf eval = es.eigenvalues(); curvatures.push_back(eval[0].real()); curvatures.push_back(eval[1].real()); Matrix2cf evec = es.eigenvectors(); directions.push_back(Vector2f(evec(0,0).real(), evec(0,1).real())); directions.push_back(Vector2f(evec(1,0).real(), evec(1,1).real())); directions[0].normalize(); directions[1].normalize(); return true; } /////////////////////////////////////////////////////////////////////////////// vector<float> CurvatureTensor::getCurvatures() const { return this->curvatures; } /////////////////////////////////////////////////////////////////////////////// vector<Vector2f> CurvatureTensor::getDirections() const { return this->directions; } /////////////////////////////////////////////////////////////////////////////// vector<Vector3f> CurvatureTensor::getTangentPlane(const Vector3f &px, const Vector3f &nx) { vector<Vector3f> res; // First, we must project ont neighbor in the tangent plane Vector3f pnbor = OMEigen::toEigen(m->point(neighbors[0])); pnbor = MathUtils::projectPoint(px, pnbor, nx); // "X" axis Vector3f xAxis = pnbor - px; xAxis.normalize(); res.push_back(xAxis); // "Y" axis Vector3f yAxis = nx.cross(xAxis); yAxis.normalize(); res.push_back(yAxis); res.push_back(nx); return res; } /////////////////////////////////////////////////////////////////////////////// vector<Vector3f> CurvatureTensor::tangentPlane() const { return tp; }
[ "julien.daval@ensimag.grenoble-inp.fr" ]
julien.daval@ensimag.grenoble-inp.fr
b17eb7939de08d31f71aa2e655732ab5a965628f
30f1ea99942ebeca2d91eb83b338f6bb0f8cda8a
/library/skia/ext/skia_utils_win.h
5551db7705f2a27090fab240f00dedd1a894eae0
[]
no_license
thinkincforeveryone/putty-nd6x
8d085839b72ad07092eb1b194e0a9b397a8c8ffd
e3efbcdf22bd5323004dccccafd81ce11a359a2f
refs/heads/master
2020-09-26T18:04:11.415969
2019-12-06T10:50:35
2019-12-06T10:50:35
226,306,231
0
0
null
null
null
null
GB18030
C++
false
false
1,167
h
#ifndef __skia_skia_utils_win_h__ #define __skia_skia_utils_win_h__ #pragma once #include "SkColor.h" struct SkIRect; struct SkPoint; struct SkRect; typedef unsigned long DWORD; typedef DWORD COLORREF; typedef struct tagPOINT POINT; typedef struct tagRECT RECT; namespace skia { // Skia的点转换成Windows的POINT. POINT SkPointToPOINT(const SkPoint& point); // Windows的RECT转换成Skia的矩形. SkRect RECTToSkRect(const RECT& rect); // Windows的RECT转换成Skia的矩形. // 两者使用相同的内存格式. 在skia_utils.cpp中通过COMPILE_ASSERT() // 验证. inline const SkIRect& RECTToSkIRect(const RECT& rect) { return reinterpret_cast<const SkIRect&>(rect); } // Skia的矩形转换成Windows的RECT. // 两者使用相同的内存格式. 在skia_utils.cpp中通过COMPILE_ASSERT() // 验证. inline const RECT& SkIRectToRECT(const SkIRect& rect) { return reinterpret_cast<const RECT&>(rect); } // 转换COLORREFs(0BGR)到Skia支持的ARGB排列方式. SkColor COLORREFToSkColor(COLORREF color); // 转换ARGB到COLORREFs(0BGR). COLORREF SkColorToCOLORREF(SkColor color); } // namespace skia #endif //__skia_skia_utils_win_h__
[ "thinkinc@163.com" ]
thinkinc@163.com
ec6b8b34581bd0fe6cfbf062a8e1dfbe01934469
9c451121eaa5e0131110ad0b969d75d9e6630adb
/NIT/399.cpp
1ce37a0869136c0c9362687f06bbdec31462b8d7
[]
no_license
tokitsu-kaze/ACM-Solved-Problems
69e16c562a1c72f2a0d044edd79c0ab949cc76e3
77af0182401904f8d2f8570578e13d004576ba9e
refs/heads/master
2023-09-01T11:25:12.946806
2023-08-25T03:26:50
2023-08-25T03:26:50
138,472,754
5
1
null
null
null
null
UTF-8
C++
false
false
1,743
cpp
#include <bits/stdc++.h> using namespace std; #pragma comment(linker, "/STACK:1024000000,1024000000") #define mem(a,b) memset((a),(b),sizeof(a)) #define MP make_pair #define pb push_back #define fi first #define se second #define sz(x) (int)x.size() #define all(x) x.begin(),x.end() #define _GLIBCXX_PERMIT_BACKWARD_HASH #include <ext/hash_map> using namespace __gnu_cxx; typedef long long ll; typedef unsigned long long ull; typedef pair<int,int> PII; typedef pair<ll,ll> PLL; typedef vector<int> VI; typedef vector<ll> VL; struct str_hash{size_t operator()(const string& str)const{return __stl_hash_string(str.c_str());}}; const int INF=0x3f3f3f3f; const ll LLINF=0x3f3f3f3f3f3f3f3f; const double PI=acos(-1.0); const double eps=1e-4; const int MAX=1e5+10; const ll mod=1e9+7; /**************************************** head ****************************************/ ll dp[66][3]; ll gao(ll x) { vector<int> p; if(x==-1) return 0; while(1) { p.pb(x%2); x/=2; if(!x) break; } function<ll(int,int,int,int)> dfs=[&](int pos,int lead,int sta,int limt)->ll { if(pos==-1) return 1; if(!limt&&!lead&&dp[pos][sta]!=-1) return dp[pos][sta]; ll res=0; for(int i=(limt?p[pos]:1);~i;i--) { if(sta==1&&i==1) continue; res+=dfs(pos-1,lead&&i==0&&pos,i,limt&&i==p[pos]); } if(!limt&&!lead) dp[pos][sta]=res; return res; }; return dfs(sz(p)-1,1,0,1); } int main() { ll n; mem(dp,-1); while(~scanf("%lld",&n)) { ll l,r,mid; l=1; r=1e14; while(l<r) { mid=(l+r)>>1; if(gao(mid)-1<n) l=mid+1; else r=mid; } // cout<<l<<" "<<gao(l)-1<<endl; VI res; while(1) { res.pb(l%2); l/=2; if(!l) break; } reverse(all(res)); for(auto it:res) printf("%d",it); puts(""); } return 0; }
[ "861794979@qq.com" ]
861794979@qq.com
1e5018b48d119ce45f302b78919feed1c2207eaf
ba1faf375c740ac60eb0b3ab334575466b6832b1
/simple_app/library_dynamic/include/lib_dyn.h
a6b71a76037317f7c9561136c7b288531bfa4f24
[ "MIT" ]
permissive
UNDEFINED-BEHAVIOR/More-Modern-CMake
a0529a6c352e387a48b65d278dcd1319195b1756
e8d3e7376b889963eb5ed513c642c9e5f01b228b
refs/heads/master
2021-07-14T17:51:07.233667
2020-07-29T14:16:17
2020-07-29T14:16:17
192,394,830
0
0
null
2019-06-17T18:02:32
2019-06-17T18:02:31
null
UTF-8
C++
false
false
195
h
#pragma once #ifndef NOEXPORT // Not declared #define EXPORT_OR_NOT __declspec(dllexport) #else #define EXPORT_OR_NOT #endif class EXPORT_OR_NOT LibDynamic { public: static void hi_fn(); };
[ "bo.bantukulolarn@gmail.com" ]
bo.bantukulolarn@gmail.com
e5c3355bf90aa0de9323d7d30d09981f143a21c8
16bb3fc4c2966939d41a55d37e226cfdc7e4b186
/src/cTexture.cpp
0dfd4a18f7a85dfb82ea7b848b154b7dc55a34b9
[]
no_license
alexgg-developer/3d_vj2014
f050d47e2705f4998f4c3a72d997898637f63bb6
eed25756da422a5e4db4c41f38387a2dcd1b6c10
refs/heads/master
2021-01-22T00:58:33.284237
2014-06-01T23:10:50
2014-06-01T23:10:50
20,878,843
1
0
null
null
null
null
UTF-8
C++
false
false
6,246
cpp
#include "cTexture.hpp" #include <iostream> Texture::Texture(): mTexture(0), mWidth(0), mHeight(0), mTextureSurface(nullptr), mProgramID(0) { } Texture::~Texture() {} bool Texture::init() { bool success = true; mProgramID = glCreateProgram(); GLShader defaultVertexShader; defaultVertexShader.init(GLShader::VERTEX, mProgramID); success = defaultVertexShader.compile(); mVertexShader.push_back(defaultVertexShader); GLShader defaultFragmentShader; defaultFragmentShader.init(GLShader::FRAGMENT, mProgramID); success = defaultFragmentShader.compile(); mFragmentShader.push_back(defaultFragmentShader); success = GLShader::linkProgram(mProgramID); GLfloat vertexData[] = { -0.5f, -0.5f, 0.5f, -0.5f, 0.5f, 0.5f, -0.5f, 0.5f }; GLuint indexData[] = { 0, 1, 2, 3 }; GLuint vbo = 0; glGenBuffers( 1, &vbo ); glBindBuffer( GL_ARRAY_BUFFER, vbo ); glBufferData( GL_ARRAY_BUFFER, 2 * 4 * sizeof(GLfloat), vertexData, GL_STATIC_DRAW ); mVBO.push_back(vbo); GLuint ibo = 0; glGenBuffers( 1, &ibo ); glBindBuffer( GL_ELEMENT_ARRAY_BUFFER, ibo ); glBufferData( GL_ELEMENT_ARRAY_BUFFER, 4 * sizeof(GLuint), indexData, GL_STATIC_DRAW ); mIBO.push_back(ibo); glBindBuffer( GL_ARRAY_BUFFER, NULL ); glBindBuffer( GL_ELEMENT_ARRAY_BUFFER, NULL ); GLenum error = glGetError(); if( error != GL_NO_ERROR ) { std::cout << "Error initializing App!" << gluErrorString( error ) << std::endl; success = false; } return success; } bool Texture::load(std::string fileName) { bool success = true; free(); int imgFlags = IMG_INIT_PNG | IMG_INIT_JPG; if( !( IMG_Init( imgFlags ) & imgFlags ) ) { std::cout << "SDL_image could not initialize! SDL_image Error: " << IMG_GetError() << std::endl; success = false; } else { mTextureSurface = IMG_Load(fileName.c_str()); if( mTextureSurface == nullptr ) { std::cout << "Unable to load image " << fileName.c_str() << " SDL Error: " << SDL_GetError() << std::endl; success = false; } else { mWidth = mTextureSurface->w; mHeight = mTextureSurface->h; glGenTextures( 1, &mTexture ); glBindTexture( GL_TEXTURE_2D, mTexture ); GLenum format = GL_RGB; if (isBMP(fileName)) { format = GL_BGR; } glTexImage2D(GL_TEXTURE_2D, 0, GL_RGB, mWidth, mHeight, 0, format, GL_UNSIGNED_BYTE, mTextureSurface->pixels); glTexParameteri(GL_TEXTURE_2D, GL_TEXTURE_MIN_FILTER, GL_LINEAR); glTexParameteri(GL_TEXTURE_2D, GL_TEXTURE_MAG_FILTER, GL_LINEAR); glTexParameterf(GL_TEXTURE_2D, GL_TEXTURE_WRAP_S, GL_CLAMP); glTexParameterf(GL_TEXTURE_2D, GL_TEXTURE_WRAP_T, GL_CLAMP); glBindTexture( GL_TEXTURE_2D, 0 ); //Check for error GLenum error = glGetError(); if( error != GL_NO_ERROR ) { std::cout << "Error loading texture" << gluErrorString( error ) << std::endl; success = false; } success = init(); } } return success; } bool Texture::load(std::string fileName, vec3 const & colorKey ) { bool success = true; free(); int imgFlags = IMG_INIT_PNG | IMG_INIT_JPG; if( !( IMG_Init( imgFlags ) & imgFlags ) ) { std::cout << "SDL_image could not initialize! SDL_image Error: " << IMG_GetError() << std::endl; success = false; } else { mTextureSurface = IMG_Load( fileName.c_str() ); if( mTextureSurface == nullptr ) { std::cout << "Unable to load image " << fileName.c_str() << " SDL Error: " << SDL_GetError() << std::endl; success = false; } else { GLenum format = GL_RGBA; if (isBMP(fileName)) { format = GL_BGRA; } SDL_SetColorKey( mTextureSurface, SDL_TRUE, SDL_MapRGB( mTextureSurface->format, colorKey.x, colorKey.y, colorKey.z ) ); mWidth = mTextureSurface->w; mHeight = mTextureSurface->h; glGenTextures( 1, &mTexture ); glBindTexture( GL_TEXTURE_2D, mTexture ); glTexImage2D( GL_TEXTURE_2D, 0, GL_RGBA, mWidth, mHeight, 0, format, GL_UNSIGNED_BYTE, mTextureSurface->pixels ); glTexParameterf(GL_TEXTURE_2D, GL_TEXTURE_WRAP_S, GL_CLAMP); glTexParameterf(GL_TEXTURE_2D, GL_TEXTURE_WRAP_T, GL_CLAMP); glTexParameteri(GL_TEXTURE_2D, GL_TEXTURE_MIN_FILTER, GL_LINEAR); glTexParameteri(GL_TEXTURE_2D, GL_TEXTURE_MAG_FILTER, GL_LINEAR); glBindTexture( GL_TEXTURE_2D, 0 ); //Check for error GLenum error = glGetError(); if( error != GL_NO_ERROR ) { std::cout << "Error loading texture" << gluErrorString( error ) << std::endl; success = false; } success = init(); } } return success; } void Texture::free() { if( mTexture != 0 ) { glDeleteTextures( 1, &mTexture ); mTexture = 0; } if (mTextureSurface != nullptr) { SDL_FreeSurface(mTextureSurface); mTextureSurface = nullptr; } if (mProgramID != 0) glDeleteProgram( mProgramID ); for(uint i = 0; i < mVBO.size(); ++i) { glDeleteBuffers( 1, &mVBO[0] ); } for(uint i = 0; i < mIBO.size(); ++i) { glDeleteBuffers( 1, &mIBO[0] ); } } void Texture::bind() { glBindTexture(GL_TEXTURE_2D, mTexture); } void Texture::unbind() { glBindTexture(GL_TEXTURE_2D, 0); } void Texture::draw() { glUseProgram( mProgramID ); bind(); GLuint attributeLocation = mVertexShader[0].setAttribute("LVertexPos2D"); glEnableVertexAttribArray( attributeLocation ); glBindBuffer( GL_ARRAY_BUFFER, mVBO[0] ); glVertexAttribPointer( attributeLocation, 2, GL_FLOAT, GL_FALSE, 2 * sizeof(GLfloat), NULL ); glBindBuffer( GL_ELEMENT_ARRAY_BUFFER, mIBO[0] ); glDrawElements( GL_TRIANGLE_FAN, 4, GL_UNSIGNED_INT, NULL ); mVertexShader[0].unsetAttribute(attributeLocation); unbind(); glUseProgram( NULL ); } bool Texture::isBMP(std::string fileName) { bool isB = fileName.at(fileName.size() - 3) == 'b' || fileName.at(fileName.size() - 3) == 'B'; bool isM = fileName.at(fileName.size() - 2) == 'm' || fileName.at(fileName.size() - 2) == 'M'; bool isP = fileName.at(fileName.size() - 1) == 'p' || fileName.at(fileName.size() - 1) == 'P'; return isB && isM && isP; }
[ "alexgg.developer@gmail.com" ]
alexgg.developer@gmail.com
de1f95c0528852dfa0e8eca5c9e1627785902e71
55cebabd188a4c2053c1cc8134f0f46b158e7c26
/src/algorithm/AASqlStructs.cpp
aab53dc62e100f96a873bc0a80e5b0d7cb82fd07
[ "BSD-3-Clause" ]
permissive
Army-Ant/ArmyAntLib_Old
8755d41e76058e1769403402dcb171a80252ffbe
f00dc2227870c1bfa7806a91db336300195dabf4
refs/heads/master
2021-09-22T22:46:24.102310
2018-09-18T10:47:37
2018-09-18T10:47:37
null
0
0
null
null
null
null
UTF-8
C++
false
false
15,046
cpp
/* Copyright (c) 2015 ArmyAnt * 版权所有 (c) 2015 ArmyAnt * * Licensed under the BSD License, Version 2.0 (the License); * 本软件使用BSD协议保护, 协议版本:2.0 * you may not use this file except in compliance with the License. * 使用本开源代码文件的内容, 视为同意协议 * You can read the license content in the file "LICENSE" at the root of this project * 您可以在本项目的根目录找到名为"LICENSE"的文件, 来阅读协议内容 * You may also obtain a copy of the License at * 您也可以在此处获得协议的副本: * * http://opensource.org/licenses/BSD-3-Clause * * Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an AS IS BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * 除非法律要求或者版权所有者书面同意,本软件在本协议基础上的发布没有任何形式的条件和担保,无论明示的或默许的. * See the License for the specific language governing permissions and limitations under the License. * 请在特定限制或语言管理权限下阅读协议 * This file is the internal source file of this project, is not contained by the closed source release part of this software * 本文件为内部源码文件, 不会包含在闭源发布的本软件中 */ #include <vector> #include "../../inc/AASqlStructs.h" #include "../../inc/AAClassPrivateHandle.hpp" #define AA_SQL_EXPRESS_HANDLE_MANAGER ClassPrivateHandleManager<SqlExpress, SqlExpress_inner>::getInstance() #define AA_SQL_CLAUSE_HANDLE_MANAGER ClassPrivateHandleManager<SqlClause, SqlClause_inner>::getInstance() namespace ArmyAnt { String SqlStructHelper::getDataTypeName(SqlFieldType type) { switch (type) { case SqlFieldType::Null: return "null"; case SqlFieldType::MySql_BIT: return "bit"; case SqlFieldType::MySql_CHAR: // TODO: mysql所有项目以及部分SqlServer项目都应当对括号内的长度限制作处理 return "char(255)"; case SqlFieldType::MySql_VARCHAR: // return "varchar(1024)"; case SqlFieldType::MySql_GEOMETRY: return "geometry"; case SqlFieldType::MsSqlServer_text: return "text"; case SqlFieldType::MySql_BINARY: // return "binary(4096)"; case SqlFieldType::MySql_VARBINARY: // return "varbinary(32768)"; case SqlFieldType::MySql_LONGVARCHAR: // return "varchar(32768)"; case SqlFieldType::MySql_LONGVARBINARY: // return "varbinary(262144)"; case SqlFieldType::MySql_JSON: return "json"; case SqlFieldType::MySql_ENUM: return "enum()"; // TODO: 需要对mysql枚举作特殊处理,下面set同 case SqlFieldType::MySql_SET: return "set"; case SqlFieldType::MySql_TINYINT: return "tinyint"; case SqlFieldType::MySql_SMALLINT: return "smallint"; case SqlFieldType::MySql_MEDIUMINT: return "mediumint"; case SqlFieldType::MySql_INT: return "int"; case SqlFieldType::MySql_BIGINT: return "bigint"; case SqlFieldType::MySql_FLOAT: return "float"; case SqlFieldType::MySql_DOUBLE: return "double"; case SqlFieldType::MySql_DEMICAL: return "demical"; case SqlFieldType::MySql_DATE: case SqlFieldType::MsSqlServer_date: return "date"; case SqlFieldType::MySql_DATETIME: case SqlFieldType::MsSqlServer_datetime: return "datetime"; case SqlFieldType::MySql_TIMESTAMP: case SqlFieldType::MsSqlServer_timestamp: return "timestamp"; case SqlFieldType::MySql_TIME: case SqlFieldType::MsSqlServer_time: return "time"; case SqlFieldType::MySql_YEAR: return "year"; case SqlFieldType::MsAccess_Currency: return "Currency"; case SqlFieldType::MsAccess_AutoNumber: return "AutoNumber"; case SqlFieldType::MsAccess_YesNo: return "Yes/No"; case SqlFieldType::MsAccess_Hyperlink: return "Hyperlink"; case SqlFieldType::MsAccess_Text:// = MySql_Varchar, return "Text"; case SqlFieldType::MsAccess_Memo:// = MySql_Text, return "Memo"; case SqlFieldType::MsAccess_Byte:// = MySql_TinyInt, return "Byte"; case SqlFieldType::MsAccess_Integer:// = MySql_SmallInt, return "Integer"; case SqlFieldType::MsAccess_Long:// = MySql_Int, return "Long"; case SqlFieldType::MsAccess_Single:// = MySql_Float, return "Single"; case SqlFieldType::MsAccess_Double:// = MySql_Double, return "Double"; case SqlFieldType::MsAccess_DateTime:// = MySql_DateTime, return "Date/Time"; case SqlFieldType::MsAccess_OleObject:// = MySql_LongBlob, return "Ole Object"; case SqlFieldType::MsAccess_LookupWizard:// = MySql_Enum, return "Lookup Wizard"; case SqlFieldType::MsSqlServer_char: return "char(8000)"; case SqlFieldType::MsSqlServer_varchar: return "varchar(max)"; case SqlFieldType::MsSqlServer_nchar: return "nchar(4000)"; case SqlFieldType::MsSqlServer_nvarchar: return "nvarchar(4000)"; case SqlFieldType::MsSqlServer_ntext: return "ntext"; case SqlFieldType::MsSqlServer_bit: return "bit"; case SqlFieldType::MsSqlServer_binary: return "binary(8000)"; case SqlFieldType::MsSqlServer_varbinary: return "varbinary(max)"; case SqlFieldType::MsSqlServer_image: return "image"; case SqlFieldType::MsSqlServer_tinyint: return "tinyint"; case SqlFieldType::MsSqlServer_smallint: return "smallint"; case SqlFieldType::MsSqlServer_int: return "int"; case SqlFieldType::MsSqlServer_bigint: return "bigint"; case SqlFieldType::MsSqlServer_decimal: return "demical"; case SqlFieldType::MsSqlServer_numeric: return "numeric"; case SqlFieldType::MsSqlServer_smallmoney: return "smallmoney"; case SqlFieldType::MsSqlServer_money: return "money"; case SqlFieldType::MsSqlServer_float: return "float"; case SqlFieldType::MsSqlServer_real: return "real"; case SqlFieldType::MsSqlServer_datetime2: return "datetime2"; case SqlFieldType::MsSqlServer_smalldatetime: return "smalldatetime"; case SqlFieldType::MsSqlServer_datetimeoffset: return "datetimeoffset"; case SqlFieldType::MsSqlServer_sql_variant: return "sql_variant"; case SqlFieldType::MsSqlServer_uniqueidentifier: return "uniqueidentifier"; case SqlFieldType::MsSqlServer_xml: return "xml"; case SqlFieldType::MsSqlServer_cursor: return "cursor"; case SqlFieldType::MsSqlServer_table: return "table"; case SqlFieldType::MsExcel_Normal: return "excel"; default: return ""; } } SqlField::SqlField() :head(nullptr), value("") { } SqlField::SqlField(const String & value, const SqlFieldHead * head) :head(head), value(value) { } SqlField::~SqlField() { } bool SqlField::setValue(const String & v) { value = v; return true; } const String & SqlField::getValue() const { return value; } const SqlFieldHead * SqlField::getHead() const { return head; } SqlRow::SqlRow(const SqlRow & copied) :length(copied.length), fields(nullptr) { if (length <= 0) return; fields = new SqlField[length]; for (uint32 i = 0; i < length; ++i) { fields[i] = copied.fields[i]; } } SqlRow::SqlRow(SqlRow && moved) :length(moved.length), fields(moved.fields) { moved.length = 0; moved.fields = nullptr; } SqlRow::~SqlRow() { Fragment::AA_SAFE_DELALL(fields); } uint32 SqlRow::size() const { return length; } const SqlField & SqlRow::operator[](int32 index)const { return const_cast<SqlRow*>(this)->operator[](index); } SqlField & SqlRow::operator[](int32 index){ if(index < 0) index += length; if(index >= length || index < 0) throw nullptr; return fields[index]; } SqlColumn::SqlColumn(const SqlColumn & copied) :fields(nullptr), indexes(nullptr), length(copied.length) { if (length <= 0) return; fields = new SqlField[length]; indexes = new uint32[length]; for (uint32 i = 0; i < length; ++i) { fields[i] = copied.fields[i]; indexes[i] = copied.indexes[i]; } } SqlColumn::SqlColumn(SqlColumn && moved) :fields(moved.fields), indexes(moved.indexes), length(moved.length) { moved.fields = nullptr; moved.length = 0; moved.indexes = nullptr; } SqlColumn::~SqlColumn() { Fragment::AA_SAFE_DELALL(indexes); Fragment::AA_SAFE_DELALL(fields); } uint32 SqlColumn::size() const { return length; } const SqlFieldHead * SqlColumn::getHead(uint32 index) const { return operator[](index).getHead(); } const SqlField & SqlColumn::operator[](int32 index) const { return const_cast<SqlColumn*>(this)->operator[](index); } SqlField & SqlColumn::operator[](int32 index){ if(index < 0) index += length; if(index >= length || index < 0) throw nullptr; return fields[index]; } SqlTable::SqlTable(const SqlTable & copied) :_width(copied._width), _height(copied._height), heads(nullptr), fields(nullptr) { if (_width > 0) { heads = new SqlFieldHead[_width]; for (uint32 i = 0; i < _width; ++i) { heads[i] = copied.heads[i]; } if (_height > 0) { fields = new SqlField*[_height]; for (uint32 i = 0; i < _height; ++i) { fields[i] = new SqlField[_width]; for (uint32 n = 0; n < _width; ++n) { fields[i][n] = copied.fields[i][n]; } } } } } SqlTable::SqlTable(SqlTable && moved) :_width(moved._width), _height(moved._height), heads(moved.heads), fields(moved.fields) { moved.heads = nullptr; moved.fields = nullptr; moved._width = 0; moved._height = 0; } SqlTable & SqlTable::operator=(const SqlTable & copied){ Fragment::AA_SAFE_DELALL(heads); for(uint32 i = 0; i < _height; ++i){ Fragment::AA_SAFE_DELALL(fields[i]); } Fragment::AA_SAFE_DELALL(fields); _width = copied._width; _height = copied._height; if(_width > 0){ heads = new SqlFieldHead[_width]; for(uint32 i = 0; i < _width; ++i){ heads[i] = copied.heads[i]; } if(_height > 0){ fields = new SqlField*[_height]; for(uint32 i = 0; i < _height; ++i){ fields[i] = new SqlField[_width]; for(uint32 n = 0; n < _width; ++n){ fields[i][n] = copied.fields[i][n]; } } } } return *this; } SqlTable & SqlTable::operator=(SqlTable && moved){ _width = moved._width; _height = moved._height; heads = moved.heads; fields = moved.fields; moved._width = 0; moved._height = 0; moved.heads = nullptr; moved.fields = nullptr; return *this; } SqlTable::~SqlTable() { Fragment::AA_SAFE_DELALL(heads); for (uint32 i = 0; i < _height; ++i) { Fragment::AA_SAFE_DELALL(fields[i]); } Fragment::AA_SAFE_DELALL(fields); } uint32 SqlTable::size() const { return _width*_height; } uint32 SqlTable::width() const { return _width; } uint32 SqlTable::height() const { return _height; } const SqlFieldHead * SqlTable::getHead(int32 index) const { if (index < 0) index += _width; if (index >= _width || index < 0) throw nullptr; return heads + index; } SqlRow SqlTable::operator[](int32 index){ if(index < 0) index += _height; if(index >= _height || index < 0 || _width <= 0) throw nullptr; char tmp[sizeof(SqlRow)] = ""; SqlRow ret = *reinterpret_cast<SqlRow*>(tmp); ret.length = _width; ret.fields = new SqlField[_width]; for(uint32 i = 0; i < _width; ++i){ ret.fields[i] = fields[index][i]; } return ret; } const SqlField & SqlTable::operator()(int32 rowIndex, int32 colIndex)const{ return const_cast<SqlTable*>(this)->operator()(rowIndex, colIndex); } SqlField & SqlTable::operator()(int32 rowIndex, int32 colIndex){ if(rowIndex < 0) rowIndex += _height; if(colIndex < 0) colIndex += _width; if(rowIndex >= _height || rowIndex < 0 || colIndex >= _width || colIndex < 0) throw nullptr; return fields[rowIndex][colIndex]; } SqlColumn SqlTable::operator()(std::nullptr_t, int32 colIndex) { if (colIndex < 0) colIndex += _width; if (colIndex >= _width || colIndex < 0 || _height <= 0) throw nullptr; char tmp[sizeof(SqlColumn)] = ""; SqlColumn ret = *reinterpret_cast<SqlColumn*>(tmp); ret.length = _height; ret.fields = new SqlField[_height]; ret.indexes = new uint32[_height]; for (uint32 i = 0; i < _height; ++i) { ret.fields[i] = fields[i][colIndex]; ret.indexes[i] = i; } return ret; } const SqlColumn SqlTable::operator()(std::nullptr_t, int32 colIndex)const { return const_cast<SqlTable *>(this)->operator()(nullptr, colIndex); } SqlTable::SqlTable(const SqlFieldHead* heads, uint32 width, uint32 height) :_width(width), _height(height), heads(nullptr), fields(nullptr){ if(width > 0){ this->heads = new SqlFieldHead[width]; for(uint32 i = 0; i < width; ++i){ this->heads[i] = heads[i]; } if(_height > 0){ fields = new SqlField*[_height]; for(uint32 i = 0; i < _height; ++i){ fields[i] = new SqlField[width]; for(uint32 n = 0; n < _width; ++n){ fields[i][n].head = heads + n; fields[i][n].value = ""; } } } } } /********************* Sql Express ************************************/ class SqlExpress_inner { std::vector<String> expresses; }; SqlExpress::SqlExpress(const String & str) :type(SqlOperatorType::none) { AA_SQL_EXPRESS_HANDLE_MANAGER.GetHandle(this); AAAssert(pushValue(str), ); } SqlExpress::~SqlExpress() { delete AA_SQL_EXPRESS_HANDLE_MANAGER.ReleaseHandle(this); } bool SqlExpress::pushValue(const String & value) { // TODO return false; } /********************* Sql Clause *************************************/ class SqlClause_inner { std::vector<SqlExpress> expresses; }; SqlClause::SqlClause(const String & str) :type(SqlClauseType::Null) { AA_SQL_CLAUSE_HANDLE_MANAGER.GetHandle(this); } SqlClause::~SqlClause() { delete AA_SQL_CLAUSE_HANDLE_MANAGER.ReleaseHandle(this); } } #undef AA_SQL_EXPRESS_HANDLE_MANAGER #undef AA_SQL_CLAUSE_HANDLE_MANAGER
[ "261343578@qq.com" ]
261343578@qq.com
5a00ce37eae7703621ead3e3ff25327a70440ac9
bb0fcccf60fa9e0ffc2c36a2a381e5812b43dc08
/LEETCODE/INTERVIEW/136.cpp
e6273e4aaf7e8f18bcb5f7d7eda1791c70f7a4cf
[ "CC0-1.0", "LicenseRef-scancode-public-domain" ]
permissive
PraneshASP/COMPETITVE-PROGRAMMING
eec52f14f1a77892b4dac5a35d1bda731de0faa3
2fb68734146ef64f5c6eb6cf3e8191e362301d75
refs/heads/master
2022-12-21T15:29:04.443467
2020-10-01T05:45:47
2020-10-01T05:45:47
298,556,530
0
0
NOASSERTION
2020-09-25T11:43:12
2020-09-25T11:43:11
null
UTF-8
C++
false
false
1,259
cpp
/* 136. Single Number Given a non-empty array of integers, every element appears twice except for one. Find that single one. Note: Your algorithm should have a linear runtime complexity. Could you implement it without using extra memory? Example 1: Input: [2,2,1] Output: 1 Example 2: Input: [4,1,2,1,2] Output: 4 */ #include <bits/stdc++.h> using namespace std; int singleNumber(vector<int> &nums) { // using hashmap will take O(n) space map<int, int> m; for (int i = 0; i < nums.size(); i++) { auto itr = m.find(nums[i]); if (itr != m.end()) itr->second++; else m.insert(make_pair(nums[i], 1)); } for (auto itr = m.begin(); itr != m.end();) { if (itr->second == 1) return itr->first; } } int solution2(vector<int> &nums) { /* Concept If we take XOR of zero and some bit, it will return that bit If we take XOR of two same bits, it will return 0 So we can XOR all bits together to find the unique number. */ int a = 0; for (int i = 0; i < nums.size(); i++) a ^= nums[i]; return a; } int main() { vector<int> nums({2, 2, 1}); cout << singleNumber(nums) << endl << solution2(nums) << endl; return 0; }
[ "duhan.sachin2610@gmail.com" ]
duhan.sachin2610@gmail.com
855af90b76f61a8ae60052e59f3ec86dcc04805c
e79e60cbad3a63c308c0d4dd2f1dcf47d1a7c6e9
/src/Util/Random.cpp
ffd61ff549c3a839f8aeafa94866f1b64d1b80fc
[]
no_license
sfalexrog/cmc-terrain
d50de1918b7816c2e5a1d7c748dfe538c045de62
d11057eeff577ad0c2af49dff8033786c3c9a2ac
refs/heads/main
2023-07-15T22:08:09.531727
2021-08-21T18:34:27
2021-08-21T18:34:27
338,887,096
0
0
null
null
null
null
UTF-8
C++
false
false
692
cpp
#include "Random.hpp" #include <chrono> #include <limits> namespace rng { Xorshift128p::Xorshift128p() { auto currentTime = std::chrono::system_clock::now(); auto epochTime = currentTime.time_since_epoch(); currState.a = epochTime.count(); // FIXME: needs more random initial state currState.b = currState.a + 42; } uint64_t Xorshift128p::randRaw() { uint64_t t = currState.a; uint64_t s = currState.b; currState.a = s; t ^= t << 23; t ^= t >> 17; t ^= s ^ (s >> 26); currState.b = t; return t + s; } double Xorshift128p::rand01() { auto raw = randRaw(); return double(raw) / double(std::numeric_limits<uint64_t>::max()); } }
[ "sfalexrog@gmail.com" ]
sfalexrog@gmail.com
7a8035250e9cd87e177e86ed442f69c46ad2d1eb
e687e5b301ac021be140d11f88dc4b6309e78a48
/Arrays/2. Maximum and Minimum.cpp
a89a13a9c01a386f85ea5c9abb1f6044f953c16c
[]
no_license
impolska742/dsa-450
00811d7b3f595085094e81cbef8ffaa272e686d8
f26a61af920cea0f00dd51dc1f0a5dc8711eb10d
refs/heads/master
2023-05-26T08:14:17.789961
2021-06-14T11:13:18
2021-06-14T11:13:18
372,952,500
1
0
null
null
null
null
UTF-8
C++
false
false
1,889
cpp
#include "useful.h" // O(n) => O(N) + O(N) // Time complexity => O(N) // Space Complexity => O(1) pair<int, int> naiveSolution(int arr[], int n) { int minimumElement, maximumElement; minimumElement = INT_MAX; maximumElement = INT_MIN; // For minimum element for (int i = 0; i < n; i++) { if (arr[i] < minimumElement) { minimumElement = arr[i]; } } for (int i = 0; i < n; i++) { if (arr[i] > maximumElement) { maximumElement = arr[i]; } } return make_pair(minimumElement, maximumElement); } pair<int, int> singleSolution(int arr[], int n) { int minimumElement, maximumElement; minimumElement = INT_MAX; maximumElement = INT_MIN; // For minimum element for (int i = 0; i < n; i++) { if (arr[i] < minimumElement) { minimumElement = arr[i]; } if (arr[i] > maximumElement) { maximumElement = arr[i]; } } return make_pair(minimumElement, maximumElement); } pair<int, int> secondMaxAndMinimum(int arr[], int n) { int firstMin, secondMin, firstMax, secondMax; firstMin = secondMin = INT_MAX; firstMax = secondMax = INT_MIN; // For minimum element // 1 2 3 4 5 for (int i = 0; i < n; i++) { if (arr[i] < firstMin) { secondMin = firstMin; firstMin = arr[i]; } else if (arr[i] < secondMin and arr[i] > firstMin) { secondMin = arr[i]; } else if (arr[i] > firstMax) { secondMax = firstMax; firstMax = arr[i]; } else if (arr[i] > secondMax and arr[i] < firstMax) { secondMax = arr[i]; } } return make_pair(secondMin, secondMax); } int main(int argc, char const *argv[]) { int arr[] = {4, 28, 56, 1, 3, 84}; int arr_size = sizeof(arr) / sizeof(arr[0]); // 84 56 // 1 3 Display(arr, arr_size); pair<int, int> p = naiveSolution(arr, arr_size); pair<int, int> p2 = secondMaxAndMinimum(arr, arr_size); cout << p.first << " " << p.second << endl; cout << p2.first << " " << p2.second << endl; return 0; }
[ "vaibhav19bhardwaj@gmail.com" ]
vaibhav19bhardwaj@gmail.com
bbce506ffb62d5d739e3de18fb4e1adb7f71c059
44db1ec8d639d2e78583e2844e5de1b38a1ca26f
/C(++)/GFX/GDI01/GDI01/GDI01.cpp
5e93e01c0df1cd3e86437e2db29ace56b489e1a7
[]
no_license
braindef/code
adfb4e8980fd0fdbf23e051a5ffad72be22ae12d
f6fbaf3f1b1c41df391c706278b5bcb4e83d2ac2
refs/heads/master
2020-04-01T08:00:59.721124
2018-10-14T20:02:56
2018-10-14T20:02:56
153,013,739
0
0
null
null
null
null
ISO-8859-1
C++
false
false
2,845
cpp
#include <GDI01.h> #include <windows.h> #include <string.h> //für strcpy #define MAXSIZE 500 LRESULT CALLBACK WinProc(HWND, UINT, WPARAM, LPARAM); double hektor(long); HINSTANCE hProgram; HWND hWnd; HDC hDC; double x[MAXSIZE*MAXSIZE+1], y[MAXSIZE*MAXSIZE+1]; double z[MAXSIZE*MAXSIZE+1]; double result; int itoggle=1; int WINAPI WinMain(HINSTANCE hInstance, HINSTANCE hPrevInstance, PSTR scCmdLine, int iCmdShow) { extern HINSTANCE hProgram; extern HWND hWnd; MSG msg; WNDCLASSEX wndclass; char capname[3]; hProgram=hInstance; strcpy(capname, "W4"); wndclass.cbSize = sizeof(wndclass); wndclass.style = CS_HREDRAW | CS_VREDRAW; wndclass.lpfnWndProc = WinProc; wndclass.cbClsExtra = 0; wndclass.cbWndExtra = 0; wndclass.hInstance = hProgram; wndclass.hIcon = LoadIcon(hprogram, MB_ICONERROR); wndclass.hCursor = LoadCursor(NULL, IDC_ARROW); wndclass.hbrBackground = CreateSolidBrush(RGB(255,255,255)); wndclass.lpszMenuName = capname; wndclass.lpszClassName = capname; wndclass.hIcon = NULL; RegisterClassEx(&wndclass); hWnd=CreateWindow(capname, "Windows Programm", WS_OVERLAPPEDWINDOW, 100, 100, 540, 140, NULL, NULL, hProgram, NULL); ShowWindow(hWnd, iCmdShow); UpdateWindow(hWnd); while(GetMessage(&msg); { TranslateMessage(&msg) DispatchMessage(&msg); } return msg.wParam; } LRESULT CALLBACK WinProc(HWND hWnd, UINT Message, WPARAM wParam, LPARAM l Param) { extern HDC hDC; PAINTSTRUCT ps; RECT rect; extern double result; extern int itoggle; switch(Message) { case WM_COMMAND: switch (LOWORD(wParam)) { case IDM_RECHNE: hDC=GetDC(hWnd); TextOut(hDC, 10, 10 "Start der Berechnung",20); ReleaseDC(hWnd,hDC); SetCursor(LoadCursor(NULL, IDC_WAIT)); result=hektor((long)MAXSIZE); SetCursor(LoadCursor(NULL, IDC_ARROW)); hDC = GetDC(hWnd); TextOut(hDC,10,70,"Ende der Berechnung!",20); ReleaseDC(hWnd, hDC); return 0; case IDM_LOESCHEN: rect.left=0; rect.top=0; rect.right=270; rect.bottom=70; InvalidateRect(hWnd, &rect, TRUE); return 0; case IDM_WERISTS_ MessageBox(NULL, "Windows Programm W4", "W4W, MB_OK | MB_ICONINFORMATION); return 0; case IDM_ENDE: PostQuitMessage(0); return 0; } case WM_PAINT: hDC=BeginPaint(hWnd, &ps); if(itoggle==1) { TextOut(hDC,300, 10, "WM_PAINT gesendet! ",22); itoggle=0; } else { TextOut(hDC, 300, 10, " WM_PAINT gesendet !", 22); itoggle=1; } EndPaint(hWnd, &ps); return 0; case WM_MOVE: InvalidateRect(hWnd, NULL, TRUE); return 0; case WM_DESTROY: PostQuitMessage(0); return 0; default: return DefWindowProc(hWnd, Message, wParam, lParam); } } case
[ "asdf@asdf.com" ]
asdf@asdf.com
565e2b3d13a87d627a5b2c4f8a96f31c56334d7e
d93159d0784fc489a5066d3ee592e6c9563b228b
/JetMETCorrections/FFTJetObjects/interface/FFTJetRcdMapper.h
88cce934c331f37fc23640f0529565ec6868fee7
[]
permissive
simonecid/cmssw
86396e31d41a003a179690f8c322e82e250e33b2
2559fdc9545b2c7e337f5113b231025106dd22ab
refs/heads/CAallInOne_81X
2021-08-15T23:25:02.901905
2016-09-13T08:10:20
2016-09-13T08:53:42
176,462,898
0
1
Apache-2.0
2019-03-19T08:30:28
2019-03-19T08:30:24
null
UTF-8
C++
false
false
3,750
h
#ifndef JetMETCorrections_FFTJetObjects_FFTJetRcdMapper_h #define JetMETCorrections_FFTJetObjects_FFTJetRcdMapper_h // // A factory to combat the proliferation of ES record types // (multiple record types are necessary due to deficiencies // in the record dependency tracking mechanism). Templated // upon the data type which records hold. // // Igor Volobouev // 08/03/2012 #include <map> #include <string> #include "FWCore/Framework/interface/EventSetup.h" #include "FWCore/Framework/interface/ESHandle.h" #include "FWCore/Utilities/interface/Exception.h" template<class DataType> struct AbsFFTJetRcdMapper { virtual ~AbsFFTJetRcdMapper() {} virtual void load(const edm::EventSetup& iSetup, edm::ESHandle<DataType>& handle) const = 0; virtual void load(const edm::EventSetup& iSetup, const std::string& label, edm::ESHandle<DataType>& handle) const = 0; }; template<class DataType, class RecordType> struct ConcreteFFTJetRcdMapper : public AbsFFTJetRcdMapper<DataType> { virtual ~ConcreteFFTJetRcdMapper() {} inline void load(const edm::EventSetup& iSetup, edm::ESHandle<DataType>& handle) const {iSetup.get<RecordType>().get(handle);} inline void load(const edm::EventSetup& iSetup, const std::string& label, edm::ESHandle<DataType>& handle) const {iSetup.get<RecordType>().get(label, handle);} }; template<class DataType> struct DefaultFFTJetRcdMapper : public std::map<std::string, AbsFFTJetRcdMapper<DataType>*> { typedef DataType data_type; inline DefaultFFTJetRcdMapper() : std::map<std::string, AbsFFTJetRcdMapper<DataType>*>() {} virtual ~DefaultFFTJetRcdMapper() { for (typename std::map<std::string, AbsFFTJetRcdMapper<DataType>*>:: iterator it = this->begin(); it != this->end(); ++it) delete it->second; } inline void load(const edm::EventSetup& iSetup, const std::string& record, edm::ESHandle<DataType>& handle) const { typename std::map<std::string, AbsFFTJetRcdMapper<DataType>*>:: const_iterator it = this->find(record); if (it == this->end()) throw cms::Exception("KeyNotFound") << "Record \"" << record << "\" is not registered\n"; it->second->load(iSetup, handle); } inline void load(const edm::EventSetup& iSetup, const std::string& record, const std::string& label, edm::ESHandle<DataType>& handle) const { typename std::map<std::string, AbsFFTJetRcdMapper<DataType>*>:: const_iterator it = this->find(record); if (it == this->end()) throw cms::Exception("KeyNotFound") << "Record \"" << record << "\" is not registered\n"; it->second->load(iSetup, label, handle); } private: DefaultFFTJetRcdMapper(const DefaultFFTJetRcdMapper&); DefaultFFTJetRcdMapper& operator=(const DefaultFFTJetRcdMapper&); }; // // Singleton for the mapper // template <class Mapper> class StaticFFTJetRcdMapper { public: typedef typename Mapper::Base::data_type data_type; static const Mapper& instance() { static Mapper obj; return obj; } template <class Record> static void registerRecord(const std::string& record) { Mapper& rd = const_cast<Mapper&>(instance()); delete rd[record]; rd[record] = new ConcreteFFTJetRcdMapper<data_type,Record>(); } private: StaticFFTJetRcdMapper(); }; #endif // JetMETCorrections_FFTJetObjects_FFTJetRcdMapper_h
[ "giulio.eulisse@gmail.com" ]
giulio.eulisse@gmail.com
f197b2984e997da7ff0be7c18266d824913a92f8
b6eabe93e2f67577f0c797a033a5d74a8a60cb17
/Exercice1-1/main.cpp
d1d1c810b5f6f6c9fa085a4874e4413ee671972e
[]
no_license
gottburgm/INF1
9a884b25f5bbc992a854409809111b1752d86444
eeab08da1a623b2102c55570387c5d52bfa3d19e
refs/heads/master
2021-01-21T20:47:59.743569
2018-09-19T15:21:11
2018-09-19T15:21:11
69,362,560
0
0
null
null
null
null
UTF-8
C++
false
false
508
cpp
/* ----------------------------------------------------------------------------------- Fichier : main.cpp Auteur(s) : Robin Fournier Date : 27.09.2016 But : Afficher un bonhomme dans la console Remarque(s) : - Compilateur : MinGW-g++ 4.8.1 ----------------------------------------------------------------------------------- */ #include <iostream> using namespace std; /* * */ int main() { cout << " /////\n +-----+\n(| ° ° |)\n | ^ |\n | '-' |\n +-----+" << endl; return 0; }
[ "fournier.robin@gmail.com" ]
fournier.robin@gmail.com
9255221f3bc9e73c9b71e36d9fbde7bf42aca5a9
208c9c4fc8d8ad06f1ca56a0a68470927534c190
/Hello.cpp
5b2f5662b0751da3d700506a1927f671e219a178
[]
no_license
Tenderest/CPP-Learning
e367adf5c0abb497992c0d4f5c8ce2289db0faf9
7fc92c96b00f9ecf8c27f68039a6fea4bb1fbb8d
refs/heads/main
2022-10-15T19:36:29.384763
2022-05-27T08:55:27
2022-05-27T08:55:27
233,337,137
0
0
null
null
null
null
UTF-8
C++
false
false
139
cpp
#include <iostream> int main(void) { // using namespace std; std::cout << "Hello World!" << std::endl; return 0; }
[ "2087886585@qq.com" ]
2087886585@qq.com
7fba1477c13b05331f2f38f8288c871834f013a3
ed9e559e7292285afce8070576eff1ac852af399
/src/Widget.hpp
a6c7d97a998125f939bd3c73c9b8a06841af09b6
[ "Unlicense" ]
permissive
tybl/goon
ea035853d098614d98d9c4b56a04b24f7bcb68fb
9c7ae6e309457327465252f200964d95c8dfde17
refs/heads/dev
2023-09-01T10:57:53.373716
2023-08-18T19:36:22
2023-08-18T19:37:46
672,677,647
0
0
Unlicense
2023-08-18T19:37:48
2023-07-30T22:17:06
C++
UTF-8
C++
false
false
506
hpp
// License: The Unlicense (https://unlicense.org) #include <SDL2/SDL.h> struct widget { widget(SDL_Renderer* p_renderer); void render(SDL_Renderer* p_renderer); void handle_keyboard_event(SDL_Keycode p_key); void handle_window_event(SDL_WindowEvent p_key); private: void move_forward(void); private: double m_x_pos; double m_x_vel; double m_y_pos; double m_y_vel; double m_angle; double m_angle_momentum; int m_window_width; int m_window_height; SDL_Texture* m_texture; };
[ "t.brandon.lyons@gmail.com" ]
t.brandon.lyons@gmail.com
d00642527075c5696b0823290468ae9fdd993368
39d02ab2d4b1dbaaa94030dc2f0d1020ed308cb2
/snowman.cpp
c4af3c111dcf02d09f14fa9ef75a7f994bd01011
[ "MIT" ]
permissive
shayperetz6/cpp-snowman-b
f3a8480be98f84b984c9648af566c2662a64844d
fe3a4b69d2e98bf74c49e1e10523c2c8737f30dc
refs/heads/main
2023-03-24T01:00:40.077943
2021-03-20T23:55:47
2021-03-20T23:55:47
347,577,036
0
0
null
null
null
null
UTF-8
C++
false
false
2,994
cpp
#include <string> #include <array> #include <iostream> #include <stdexcept> #include "snowman.hpp" const int ROW =8; const int COL= 4; const int SIZE =8; using namespace std; const int HEAD=0; const int NOSE=1; const int LEFTEYE=2; const int RIGHTEYE=3; const int LEFTARM=4; const int RIGHTARM=5; const int TORSO=6; const int BASE=7; const int MININPUT=11111111; const int MAXINPUT=44444444; const int TEN=10; namespace ariel{ const array<array <string, COL>, ROW> snowManMatrix={{ {" \n _===_ \n"," ___ \n ..... \n"," _ \n /_\\ \n"," ___ \n (_*_) \n"}, {",",".","_"," "}, {"(.","(o", "(O","(-" }, {".)","o)","O)","-)"}, {"<","\\","/"," "}, {">","/","\\"," "}, {"( : )","(] [)","(> <)","( )"}, {"( : )","(\" \")","(___)","( )"} }}; /** * the function gets array reprsent the number we get from the user and build a string * of the snowman and return the string * @param array * @return string */ string drawsnowman(std::array<int,SIZE> &array) { string snowman; snowman+=snowManMatrix[HEAD][array[HEAD]-1]; // check if the left arm is upwards if yes she need to be before the eyes if(array[LEFTARM]==2) { snowman+=snowManMatrix[LEFTARM][array[LEFTARM]-1]; } else{ snowman+=" "; } snowman+=snowManMatrix[LEFTEYE][array[LEFTEYE]-1]; snowman+=snowManMatrix[NOSE][array[NOSE]-1]; snowman+=snowManMatrix[RIGHTEYE][array[RIGHTEYE]-1]; // check if the right arm is upwards if yes she need to be after the eyes if(array[RIGHTARM]==2) { snowman+=snowManMatrix[RIGHTARM][array[RIGHTARM]-1]; } snowman+="\n"; // if the left arm isnt upwards she need to be before the torso if(array[LEFTARM]!=2){ snowman+=snowManMatrix[LEFTARM][array[LEFTARM]-1];} else { snowman+=" "; } snowman+=snowManMatrix[TORSO][array[TORSO]-1]; // if the left arm isnt upwards she need to be after the torso if(array[RIGHTARM]!=2){ snowman+=snowManMatrix[RIGHTARM][array[RIGHTARM]-1];} snowman+="\n"; snowman+=" "; snowman+=snowManMatrix[BASE][array[BASE]-1]; return snowman; } /** * the function get number from the user represent the snow man and return * a string of the snow man * @param num * @return string */ string snowman(int num) { std::array<int,SIZE> array{}; if (num<0){ throw std::out_of_range{" the number must be positive"};} if((num<MININPUT)|| (num>MAXINPUT)){ throw std::out_of_range{"the number is not in the range"};} int x=num; int i=SIZE-1; while(x>0) { if((x%TEN==0)||(x%TEN>4)){ throw std::out_of_range{"the digit needs to be between 1 to 4"};} array.at(i)=x%TEN; i--; x=x/TEN; } string ans=drawsnowman(array); return ans; } }
[ "noreply@github.com" ]
shayperetz6.noreply@github.com
3274f4755c1641ffb401e688a3d276a755b8ad6e
71f2a62b3bb20eac1f3e0736a6de5f39d8fa8d5b
/src/codegen/cc_hash_table_proxy.cpp
ee3bb2a9a1b297524df7762b23761e8848b5e8cb
[ "Apache-2.0" ]
permissive
hanli32/peloton
aef49911fef78df2af621c5237f2835c63ae5a97
6afba19f530311a498a3e5e9160c98d1b8b93695
refs/heads/master
2021-01-11T18:04:42.584128
2017-05-06T02:41:02
2017-05-06T02:41:02
87,267,565
1
1
null
2017-04-27T03:08:18
2017-04-05T04:57:26
C++
UTF-8
C++
false
false
5,585
cpp
//===----------------------------------------------------------------------===// // // Peloton // // cc_hash_table_proxy.cpp // // Identification: src/codegen/cc_hash_table_proxy.cpp // // Copyright (c) 2015-17, Carnegie Mellon University Database Group // //===----------------------------------------------------------------------===// #include "codegen/cc_hash_table_proxy.h" namespace peloton { namespace codegen { //===----------------------------------------------------------------------===// // Return the LLVM type that matches the memory layout of our HashTable //===----------------------------------------------------------------------===// llvm::Type *CCHashTableProxy::GetType(CodeGen &codegen) { static const std::string kHashTableTypeName = "peloton::CCHashTable"; // Check if the hash table type has been registered/cached in the module // already auto *hash_table_type = codegen.LookupTypeByName(kHashTableTypeName); if (hash_table_type != nullptr) { return hash_table_type; } // Define and register the type std::vector<llvm::Type *> layout{ HashEntryProxy::GetType(codegen)->getPointerTo()->getPointerTo(), codegen.Int64Type(), codegen.Int64Type(), codegen.Int64Type()}; hash_table_type = llvm::StructType::create(codegen.GetContext(), layout, kHashTableTypeName); return hash_table_type; } //===----------------------------------------------------------------------===// // INIT PROXY //===----------------------------------------------------------------------===// const std::string &CCHashTableProxy::_Init::GetFunctionName() { static const std::string kInitFnName = #ifdef __APPLE__ "_ZN7peloton7codegen5utils11CCHashTable4InitEv"; #else "_ZN7peloton7codegen5utils11CCHashTable4InitEv"; #endif return kInitFnName; } llvm::Function *CCHashTableProxy::_Init::GetFunction(CodeGen &codegen) { const std::string fn_name = GetFunctionName(); // Has the function already been registered? llvm::Function *llvm_fn = codegen.LookupFunction(fn_name); if (llvm_fn != nullptr) { return llvm_fn; } // The function hasn't been registered, let's do it now llvm::Type *ht_type = CCHashTableProxy::GetType(codegen)->getPointerTo(); llvm::FunctionType *fn_type = llvm::FunctionType::get(codegen.VoidType(), ht_type); return codegen.RegisterFunction(fn_name, fn_type); }; //===----------------------------------------------------------------------===// // DESTROY PROXY //===----------------------------------------------------------------------===// const std::string &CCHashTableProxy::_Destroy::GetFunctionName() { static const std::string kStoreTupleFnName = #ifdef __APPLE__ "_ZN7peloton7codegen5utils11CCHashTable7DestroyEv"; #else "_ZN7peloton7codegen5utils11CCHashTable7DestroyEv"; #endif return kStoreTupleFnName; } llvm::Function *CCHashTableProxy::_Destroy::GetFunction(CodeGen &codegen) { const std::string fn_name = GetFunctionName(); // Has the function already been registered? llvm::Function *llvm_fn = codegen.LookupFunction(fn_name); if (llvm_fn != nullptr) { return llvm_fn; } // The function hasn't been registered, let's do it now llvm::Type *ht_type = CCHashTableProxy::GetType(codegen)->getPointerTo(); llvm::FunctionType *fn_type = llvm::FunctionType::get(codegen.VoidType(), ht_type); return codegen.RegisterFunction(fn_name, fn_type); } //===----------------------------------------------------------------------===// // STORE TUPLE PROXY //===----------------------------------------------------------------------===// const std::string &CCHashTableProxy::_StoreTuple::GetFunctionName() { static const std::string kStoreTupleFnName = #ifdef __APPLE__ "_ZN7peloton7codegen5utils11CCHashTable10StoreTupleEmj"; #else "_ZN7peloton7codegen5utils11CCHashTable10StoreTupleEmj"; #endif return kStoreTupleFnName; } llvm::Function *CCHashTableProxy::_StoreTuple::GetFunction(CodeGen &codegen) { const std::string fn_name = GetFunctionName(); // Has the function already been registered? llvm::Function *llvm_fn = codegen.LookupFunction(fn_name); if (llvm_fn != nullptr) { return llvm_fn; } // The function hasn't been registered, let's do it now llvm::Type *ht_type = CCHashTableProxy::GetType(codegen)->getPointerTo(); std::vector<llvm::Type *> parameter_types{ht_type, codegen.Int64Type(), codegen.Int32Type()}; llvm::FunctionType *fn_type = llvm::FunctionType::get(codegen.CharPtrType(), parameter_types, false); return codegen.RegisterFunction(fn_name, fn_type); } //===----------------------------------------------------------------------===// // HASH ENTRY //===----------------------------------------------------------------------===// llvm::Type *HashEntryProxy::GetType(CodeGen &codegen) { static const std::string kHashEntryTypeName = "peloton::CCHashEntry"; // Check if the hash entry is already defined in the module auto *llvm_type = codegen.LookupTypeByName(kHashEntryTypeName); if (llvm_type != nullptr) { return llvm_type; } // Define the thing (the first field is the 64-bit hash, the second is the // next HashEntry* pointer) auto *hash_entry_type = llvm::StructType::create(codegen.GetContext(), kHashEntryTypeName); hash_entry_type->setBody( {codegen.Int64Type(), hash_entry_type->getPointerTo()}, /*is_packed*/ false); return hash_entry_type; } } // namespace codegen } // namespace peloton
[ "pavlo@cs.brown.edu" ]
pavlo@cs.brown.edu
2b89fc51532092f80c3a6853550370877bdacccc
f8573941754a429f481c18b46ad5337d1bb55609
/PhysX.Net 3.3.1/PhysX.Net-3.3/PhysX.Net-3/Source/ArticulationLink.cpp
64f449251d27e025305d583b990a9c746fe13a17
[]
no_license
frbyles/ExcavatorSimulator
409fa4ad56ba3d786dedfffb5d981db86d89f4f5
c4be4ea60cd1c62c0d0207af31dfed4a47ef6124
refs/heads/master
2021-01-19T11:38:04.166440
2015-11-12T17:45:52
2015-11-12T17:45:52
null
0
0
null
null
null
null
UTF-8
C++
false
false
1,457
cpp
#include "StdAfx.h" #include "ArticulationLink.h" #include "Articulation.h" #include "Scene.h" #include "Physics.h" //#include <PxArticulation.h> ArticulationLink::ArticulationLink(PxArticulationLink* articulationLink, PhysX::Articulation^ owner) : RigidBody(articulationLink, owner->Scene->Physics) { } ArticulationLink::~ArticulationLink() { this->!ArticulationLink(); } ArticulationLink::!ArticulationLink() { } PhysX::Articulation^ ArticulationLink::Articulation::get() { return ObjectTable::GetObject<PhysX::Articulation^>((intptr_t)&this->UnmanagedPointer->getArticulation()); } PhysX::ArticulationJoint^ ArticulationLink::ArticulationJoint::get() { auto j = this->UnmanagedPointer->getInboundJoint(); return ObjectTable::GetObject<PhysX::ArticulationJoint^>((intptr_t)&j); } array<PhysX::ArticulationLink^>^ ArticulationLink::Children::get() { int n = this->UnmanagedPointer->getNbChildren(); auto l = gcnew array<ArticulationLink^>(n); PxArticulationLink** links = new PxArticulationLink*[n]; int q = this->UnmanagedPointer->getChildren(links, n); assert(q<=n); for (int i = 0; i < q; i++) { PxArticulation& a = links[i]->getArticulation(); auto articulation = ObjectTable::GetObject<PhysX::Articulation^>((intptr_t)&a); l[i] = gcnew ArticulationLink(links[i], articulation); } return l; } PxArticulationLink* ArticulationLink::UnmanagedPointer::get() { return (PxArticulationLink*)RigidBody::UnmanagedPointer; }
[ "seifes1@gmail.com" ]
seifes1@gmail.com
053548065b2fb986ca150fc64269fb0819229dc1
62a75cc643e0d9214c0f2020bcb2ae282a57e9c6
/sdk/core/azure-core/test/ut/datetime_test.cpp
c577efee95605cc20af0fdf4d644ddd4ab34b83a
[ "MIT", "LicenseRef-scancode-generic-cla", "curl", "LGPL-2.1-or-later", "BSD-3-Clause", "ISC" ]
permissive
ysriram-adobe/azure-sdk-for-cpp
93a2e1b1225c2bb58206fe68c6878edfa8ab7920
cfd115ed59ab264b51f434266559a7816a258deb
refs/heads/master
2023-08-11T02:59:16.517625
2021-10-01T21:06:49
2021-10-01T21:06:49
281,162,863
0
0
MIT
2020-07-20T16:00:53
2020-07-20T16:00:52
null
UTF-8
C++
false
false
34,148
cpp
// Copyright (c) Microsoft Corporation. All rights reserved. // SPDX-License-Identifier: MIT #include <gtest/gtest.h> #include <azure/core/datetime.hpp> #include <chrono> #include <limits> using namespace Azure; // cspell:words AGMT, CEST TEST(DateTime, ParseDateAndTimeBasic) { auto dt1 = DateTime::Parse("20130517T00:00:00Z", DateTime::DateFormat::Rfc3339); auto dt2 = DateTime::Parse("Fri, 17 May 2013 00:00:00 GMT", DateTime::DateFormat::Rfc1123); EXPECT_NE(0, dt2.time_since_epoch().count()); EXPECT_EQ(dt1, dt2); } TEST(DateTime, ParseDateAndTimeExtended) { auto dt1 = DateTime::Parse("2013-05-17T00:00:00Z", DateTime::DateFormat::Rfc3339); EXPECT_NE(0, dt1.time_since_epoch().count()); auto dt2 = DateTime::Parse("Fri, 17 May 2013 00:00:00 GMT", DateTime::DateFormat::Rfc1123); EXPECT_NE(0, dt2.time_since_epoch().count()); EXPECT_EQ(dt1, dt2); } TEST(DateTime, ParseDateBasic) { { auto dt = DateTime::Parse("20130517", DateTime::DateFormat::Rfc3339); EXPECT_NE(0, dt.time_since_epoch().count()); EXPECT_EQ(dt.ToString(), "2013-05-17T00:00:00Z"); } } TEST(DateTime, ParseDateExtended) { auto dt = DateTime::Parse("2013-05-17", DateTime::DateFormat::Rfc3339); EXPECT_NE(0, dt.time_since_epoch().count()); } namespace { template <DateTime::TimeFractionFormat TF = DateTime::TimeFractionFormat::DropTrailingZeros> void TestDateTimeRoundtrip(std::string const& str, std::string const& strExpected) { auto dt = DateTime::Parse(str, DateTime::DateFormat::Rfc3339); auto const str2 = dt.ToString(DateTime::DateFormat::Rfc3339, TF); EXPECT_EQ(str2, strExpected); } template <DateTime::TimeFractionFormat TF = DateTime::TimeFractionFormat::DropTrailingZeros> void TestDateTimeRoundtrip(std::string const& str) { TestDateTimeRoundtrip<TF>(str, str); } } // namespace TEST(DateTime, ParseTimeRoundrip1) { // Preserve all 7 digits after the comma: TestDateTimeRoundtrip("2013-11-19T14:30:59.1234567Z"); } TEST(DateTime, ParseTimeRoundrip2) { // lose the last '000' TestDateTimeRoundtrip("2013-11-19T14:30:59.1234567000Z", "2013-11-19T14:30:59.1234567Z"); // Round up TestDateTimeRoundtrip("2013-11-19T14:30:59.123456650Z", "2013-11-19T14:30:59.1234567Z"); // Round up TestDateTimeRoundtrip("2013-11-19T14:30:59.999999950Z", "2013-11-19T14:31:00Z"); // Round down TestDateTimeRoundtrip("2013-11-19T14:30:59.123456749Z", "2013-11-19T14:30:59.1234567Z"); } TEST(DateTime, decimals) { { std::string strExpected("2020-10-13T21:06:15.3300000Z"); auto dt = DateTime::Parse("2020-10-13T21:06:15.33Z", DateTime::DateFormat::Rfc3339); auto const str2 = dt.ToString(DateTime::DateFormat::Rfc3339, DateTime::TimeFractionFormat::AllDigits); EXPECT_EQ(str2, strExpected); } { std::string strExpected("2020-10-13T21:06:15.0000000Z"); auto dt = DateTime::Parse("2020-10-13T21:06:15Z", DateTime::DateFormat::Rfc3339); auto const str2 = dt.ToString(DateTime::DateFormat::Rfc3339, DateTime::TimeFractionFormat::AllDigits); EXPECT_EQ(str2, strExpected); } { std::string strExpected("2020-10-13T21:06:15.1234500Z"); auto dt = DateTime::Parse("2020-10-13T21:06:15.12345Z", DateTime::DateFormat::Rfc3339); auto const str2 = dt.ToString(DateTime::DateFormat::Rfc3339, DateTime::TimeFractionFormat::AllDigits); EXPECT_EQ(str2, strExpected); } } TEST(DateTime, noDecimals) { { std::string strExpected("2020-10-13T21:06:15Z"); auto dt = DateTime::Parse("2020-10-13T21:06:15Z", DateTime::DateFormat::Rfc3339); auto const str2 = dt.ToString(DateTime::DateFormat::Rfc3339, DateTime::TimeFractionFormat::Truncate); EXPECT_EQ(str2, strExpected); } { std::string strExpected("2020-10-13T21:06:15Z"); auto dt = DateTime::Parse("2020-10-13T21:06:15.99999Z", DateTime::DateFormat::Rfc3339); auto const str2 = dt.ToString(DateTime::DateFormat::Rfc3339, DateTime::TimeFractionFormat::Truncate); EXPECT_EQ(str2, strExpected); } } TEST(DateTime, sameResultFromDefaultRfc3339) { { auto dt = DateTime::Parse("2020-10-13T21:06:15.33000000Z", DateTime::DateFormat::Rfc3339); auto dt2 = DateTime::Parse("2020-10-13T21:06:15.330000000Z", DateTime::DateFormat::Rfc3339); auto const str1 = dt.ToString( DateTime::DateFormat::Rfc3339, DateTime::TimeFractionFormat::DropTrailingZeros); auto const str2 = dt2.ToString(DateTime::DateFormat::Rfc3339); EXPECT_EQ(str1, str2); EXPECT_EQ(str1, dt2.ToString()); } } TEST(DateTime, ParseTimeRoundrip3) { // leading 0-s after the comma, tricky to parse correctly TestDateTimeRoundtrip("2013-11-19T14:30:59.00123Z"); } TEST(DateTime, ParseTimeRoundrip4) { // another leading 0 test TestDateTimeRoundtrip("2013-11-19T14:30:59.0000001Z"); } TEST(DateTime, ParseTimeRoundrip5) { // this is going to be truncated TestDateTimeRoundtrip("2013-11-19T14:30:59.00000001Z", "2013-11-19T14:30:59Z"); } TEST(DateTime, ParseTimeRoundrip6) { // Only one digit after the dot TestDateTimeRoundtrip("2013-11-19T14:30:59.5Z"); } TEST(DateTime, ParseTimeRoundripYear0001) { TestDateTimeRoundtrip("0001-01-01T00:00:00Z"); } TEST(DateTime, ParseTimeRoundripYear9999) { TestDateTimeRoundtrip("9999-12-31T23:59:59.9999999Z"); } TEST(DateTime, EmittingTimeCorrectDay) { DateTime const test = DateTime() + std::chrono::seconds(63691573964LL); // 2019-04-22T23:52:44 is a Monday auto const actual = test.ToString(DateTime::DateFormat::Rfc1123); std::string const expected("Mon"); EXPECT_EQ(actual.substr(0, 3), expected); } namespace { void TestRfc1123IsTimeT(char const* str, int64_t t) { auto const dt = DateTime::Parse(str, DateTime::DateFormat::Rfc1123); int64_t interval = dt.time_since_epoch().count(); EXPECT_EQ(0, interval % 10000000); interval /= 10000000; interval -= 11644473600; // NT epoch adjustment interval -= 50491123200; // Diff between NT epoch and year 0001 EXPECT_EQ(t, interval); } } // namespace TEST(DateTime, ParseTimeRfc1123AcceptsEachDay) { TestRfc1123IsTimeT("1 Jan 1970 00:00:00 GMT", 0); TestRfc1123IsTimeT("01 Jan 1970 00:00:00 GMT", 0); TestRfc1123IsTimeT("Fri, 2 Jan 1970 00:00:00 GMT", 86400 * 1); TestRfc1123IsTimeT("Fri, 02 Jan 1970 00:00:00 GMT", 86400 * 1); TestRfc1123IsTimeT("Sat, 03 Jan 1970 00:00:00 GMT", 86400 * 2); TestRfc1123IsTimeT("Sun, 04 Jan 1970 00:00:00 GMT", 86400 * 3); TestRfc1123IsTimeT("Mon, 05 Jan 1970 00:00:00 GMT", 86400 * 4); TestRfc1123IsTimeT("Tue, 06 Jan 1970 00:00:00 GMT", 86400 * 5); TestRfc1123IsTimeT("Wed, 07 Jan 1970 00:00:00 GMT", 86400 * 6); } TEST(DateTime, ParseTimeRfc1123BoundaryCases) { TestRfc1123IsTimeT("01 Jan 1970 00:00:00 GMT", 0); TestRfc1123IsTimeT( "19 Jan 2038 03:14:06 GMT", static_cast<int64_t>(std::numeric_limits<int>::max()) - 1); TestRfc1123IsTimeT("19 Jan 2038 03:13:07 -0001", std::numeric_limits<int>::max()); TestRfc1123IsTimeT("19 Jan 2038 03:14:07 -0000", std::numeric_limits<int>::max()); TestRfc1123IsTimeT("14 Jan 2019 23:16:21 +0000", 1547507781); TestRfc1123IsTimeT("14 Jan 2019 23:16:21 -0001", 1547507841); TestRfc1123IsTimeT("14 Jan 2019 23:16:21 +0001", 1547507721); TestRfc1123IsTimeT("14 Jan 2019 23:16:21 -0100", 1547511381); TestRfc1123IsTimeT("14 Jan 2019 23:16:21 +0100", 1547504181); } TEST(DateTime, ParseTimeRfc1123UseEachField) { TestRfc1123IsTimeT("02 Jan 1970 00:00:00 GMT", 86400); TestRfc1123IsTimeT("12 Jan 1970 00:00:00 GMT", 950400); TestRfc1123IsTimeT("01 Feb 1970 00:00:00 GMT", 2678400); TestRfc1123IsTimeT("01 Jan 2000 00:00:00 GMT", 946684800); TestRfc1123IsTimeT("01 Jan 2100 00:00:00 GMT", 4102444800); TestRfc1123IsTimeT("01 Jan 1990 00:00:00 GMT", 631152000); TestRfc1123IsTimeT("01 Jan 1971 00:00:00 GMT", 31536000); TestRfc1123IsTimeT("01 Jan 1970 10:00:00 GMT", 36000); TestRfc1123IsTimeT("01 Jan 1970 01:00:00 GMT", 3600); TestRfc1123IsTimeT("01 Jan 1970 00:10:00 GMT", 600); TestRfc1123IsTimeT("01 Jan 1970 00:01:00 GMT", 60); TestRfc1123IsTimeT("01 Jan 1970 00:00:10 GMT", 10); TestRfc1123IsTimeT("01 Jan 1970 00:00:01 GMT", 1); TestRfc1123IsTimeT("01 Jan 1970 10:00:00 GMT", 36000); TestRfc1123IsTimeT("01 Jan 1970 02:00:00 PST", 36000); TestRfc1123IsTimeT("01 Jan 1970 03:00:00 PDT", 36000); TestRfc1123IsTimeT("01 Jan 1970 03:00:00 MST", 36000); TestRfc1123IsTimeT("01 Jan 1970 04:00:00 MDT", 36000); TestRfc1123IsTimeT("01 Jan 1970 04:00:00 CST", 36000); TestRfc1123IsTimeT("01 Jan 1970 05:00:00 CDT", 36000); TestRfc1123IsTimeT("01 Jan 1970 05:00:00 EST", 36000); TestRfc1123IsTimeT("01 Jan 1970 06:00:00 EDT", 36000); TestRfc1123IsTimeT("01 Jan 1970 06:00:00 -0400", 36000); TestRfc1123IsTimeT("01 Jan 1970 05:59:00 -0401", 36000); } TEST(DateTime, ParseTimeRfc1123MaxDays) { TestRfc1123IsTimeT("31 Jan 1970 00:00:00 GMT", 2592000); TestRfc1123IsTimeT("28 Feb 2019 00:00:00 GMT", 1551312000); // non leap year allows feb 28 TestRfc1123IsTimeT("29 Feb 2020 00:00:00 GMT", 1582934400); // leap year allows feb 29 TestRfc1123IsTimeT("31 Mar 1970 00:00:00 GMT", 7689600); TestRfc1123IsTimeT("30 Apr 1970 00:00:00 GMT", 10281600); TestRfc1123IsTimeT("31 May 1970 00:00:00 GMT", 12960000); TestRfc1123IsTimeT("30 Jun 1970 00:00:00 GMT", 15552000); TestRfc1123IsTimeT("31 Jul 1970 00:00:00 GMT", 18230400); TestRfc1123IsTimeT("31 Aug 1970 00:00:00 GMT", 20908800); TestRfc1123IsTimeT("30 Sep 1970 00:00:00 GMT", 23500800); TestRfc1123IsTimeT("31 Oct 1970 00:00:00 GMT", 26179200); TestRfc1123IsTimeT("30 Nov 1970 00:00:00 GMT", 28771200); TestRfc1123IsTimeT("31 Dec 1970 00:00:00 GMT", 31449600); } TEST(DateTime, ParseTimeRfc1123InvalidCases) { std::string const badStrings[] = { "Ahu, 01 Jan 1970 00:00:00 GMT", // bad letters in each place "TAu, 01 Jan 1970 00:00:00 GMT", "ThA, 01 Jan 1970 00:00:00 GMT", "ThuA 01 Jan 1970 00:00:00 GMT", "Thu,A01 Jan 1970 00:00:00 GMT", "Thu, A1 Jan 1970 00:00:00 GMT", "Thu, 0A Jan 1970 00:00:00 GMT", "Thu, 01AJan 1970 00:00:00 GMT", "Thu, 01 Aan 1970 00:00:00 GMT", "Thu, 01 JAn 1970 00:00:00 GMT", "Thu, 01 JaA 1970 00:00:00 GMT", "Thu, 01 JanA1970 00:00:00 GMT", "Thu, 01 Jan A970 00:00:00 GMT", "Thu, 01 Jan 1A70 00:00:00 GMT", "Thu, 01 Jan 19A0 00:00:00 GMT", "Thu, 01 Jan 197A 00:00:00 GMT", "Thu, 01 Jan 1970A00:00:00 GMT", "Thu, 01 Jan 1970 A0:00:00 GMT", "Thu, 01 Jan 1970 0A:00:00 GMT", "Thu, 01 Jan 1970 00A00:00 GMT", "Thu, 01 Jan 1970 00:A0:00 GMT", "Thu, 01 Jan 1970 00:0A:00 GMT", "Thu, 01 Jan 1970 00:00A00 GMT", "Thu, 01 Jan 1970 00:00:A0 GMT", "Thu, 01 Jan 1970 00:00:0A GMT", "Thu, 01 Jan 1970 00:00:00AGMT", "Thu, 01 Jan 1970 00:00:00 AMT", "Thu, 01 Jan 1970 00:00:00 GAT", "Thu, 01 Jan 1970 00:00:00 GMA", "", // truncation "T", "Th", "Thu", "Thu,", "Thu, ", "Thu, 0", "Thu, 01", "Thu, 01 ", "Thu, 01 J", "Thu, 01 Ja", "Thu, 01 Jan", "Thu, 01 Jan ", "Thu, 01 Jan 1", "Thu, 01 Jan 19", "Thu, 01 Jan 197", "Thu, 01 Jan 1970", "Thu, 01 Jan 1970 ", "Thu, 01 Jan 1970 0", "Thu, 01 Jan 1970 00", "Thu, 01 Jan 1970 00:", "Thu, 01 Jan 1970 00:0", "Thu, 01 Jan 1970 00:00", "Thu, 01 Jan 1970 00:00:", "Thu, 01 Jan 1970 00:00:0", "Thu, 01 Jan 1970 00:00:00", "Thu, 01 Jan 1970 00:00:00 ", "Thu, 01 Jan 1970 00:00:00 G", "Thu, 01 Jan 1970 00:00:00 GM", "Fri, 01 Jan 1970 00:00:00 GMT", // wrong day "01 Jan 0000 00:00:00 GMT", // year too small "01 Xxx 1971 00:00:00 GMT", // month bad "00 Jan 1971 00:00:00 GMT", // day too small "32 Jan 1971 00:00:00 GMT", // day too big "30 Feb 1971 00:00:00 GMT", // day too big for feb "30 Feb 1971 00:00:00 GMT", // day too big for feb (non-leap year) "32 Mar 1971 00:00:00 GMT", // other months "31 Apr 1971 00:00:00 GMT", "32 May 1971 00:00:00 GMT", "31 Jun 1971 00:00:00 GMT", "32 Jul 1971 00:00:00 GMT", "32 Aug 1971 00:00:00 GMT", "31 Sep 1971 00:00:00 GMT", "32 Oct 1971 00:00:00 GMT", "31 Nov 1971 00:00:00 GMT", "32 Dec 1971 00:00:00 GMT", "01 Jan 1971 70:00:00 GMT", // hour too big "01 Jan 1971 24:00:00 GMT", "01 Jan 1971 00:60:00 GMT", // minute too big "01 Jan 1971 00:00:70 GMT", // second too big "01 Jan 1971 00:00:61 GMT", "01 Jan 1969 00:00:00 CEST", // bad tz "14 Jan 2019 23:16:21 G0100", // bad tz offsets //"01 Jan 1970 00:00:00 +2400", //"01 Jan 1970 00:00:00 -3000", "01 Jan 1970 00:00:00 +2160", //"01 Jan 1970 00:00:00 -2400", "01 Jan 1970 00:00:00 -2160", "00 Jan 1971 00:00:00 GMT", // zero month day }; for (auto const& str : badStrings) { EXPECT_THROW(DateTime::Parse(str, DateTime::DateFormat::Rfc1123), std::invalid_argument); } } TEST(DateTime, ParseTimeRfc3339BoundaryCases) { // boundary cases: TestDateTimeRoundtrip("1970-01-01T00:00:00Z"); // epoch TestDateTimeRoundtrip("2038-01-19T03:14:06+00:00", "2038-01-19T03:14:06Z"); // INT_MAX - 1 TestDateTimeRoundtrip( "2038-01-19T03:13:07-00:01", "2038-01-19T03:14:07Z"); // INT_MAX after subtacting 1 TestDateTimeRoundtrip("2038-01-19T03:14:07-00:00", "2038-01-19T03:14:07Z"); } TEST(DateTime, ParseTimeRfc3339UsesEachTimezoneDigit) { TestDateTimeRoundtrip("2019-01-14T23:16:21+00:00", "2019-01-14T23:16:21Z"); TestDateTimeRoundtrip("2019-01-14T23:16:21-00:01", "2019-01-14T23:17:21Z"); TestDateTimeRoundtrip("2019-01-14T23:16:21+00:01", "2019-01-14T23:15:21Z"); TestDateTimeRoundtrip("2019-01-14T23:16:21-01:00", "2019-01-15T00:16:21Z"); TestDateTimeRoundtrip("2019-01-14T23:16:21+01:00", "2019-01-14T22:16:21Z"); } TEST(DateTime, ParseTimeRfc3339UsesEachDigit) { TestDateTimeRoundtrip("1970-01-01T00:00:01Z"); TestDateTimeRoundtrip("1970-01-01T00:01:00Z"); TestDateTimeRoundtrip("1970-01-01T01:00:00Z"); TestDateTimeRoundtrip("1970-01-02T00:00:00Z"); TestDateTimeRoundtrip("1970-02-01T00:00:00Z"); TestDateTimeRoundtrip("1971-01-01T00:00:00Z"); TestDateTimeRoundtrip("1999-01-01T00:00:00Z"); TestDateTimeRoundtrip("1970-12-01T00:00:00Z"); TestDateTimeRoundtrip("1970-09-01T00:00:00Z"); TestDateTimeRoundtrip("1970-01-30T00:00:00Z"); TestDateTimeRoundtrip("1970-01-31T00:00:00Z"); TestDateTimeRoundtrip("1970-01-01T23:00:00Z"); TestDateTimeRoundtrip("1970-01-01T19:00:00Z"); TestDateTimeRoundtrip("1970-01-01T00:59:00Z"); TestDateTimeRoundtrip("1970-01-01T00:00:59Z"); TestDateTimeRoundtrip("1970-01-01T00:00:60Z", "1970-01-01T00:01:00Z"); // leap seconds } TEST(DateTime, ParseTimeRfc3339AcceptsMonthMaxDays) { TestDateTimeRoundtrip("1970-01-31T00:00:00Z"); // jan TestDateTimeRoundtrip("2019-02-28T00:00:00Z"); // non leap year allows feb 28 TestDateTimeRoundtrip("2020-02-29T00:00:00Z"); // leap year allows feb 29 TestDateTimeRoundtrip("1970-03-31T00:00:00Z"); // mar TestDateTimeRoundtrip("1970-04-30T00:00:00Z"); // apr TestDateTimeRoundtrip("1970-05-31T00:00:00Z"); // may TestDateTimeRoundtrip("1970-06-30T00:00:00Z"); // jun TestDateTimeRoundtrip("1970-07-31T00:00:00Z"); // jul TestDateTimeRoundtrip("1970-08-31T00:00:00Z"); // aug TestDateTimeRoundtrip("1970-09-30T00:00:00Z"); // sep TestDateTimeRoundtrip("1970-10-31T00:00:00Z"); // oct TestDateTimeRoundtrip("1970-11-30T00:00:00Z"); // nov TestDateTimeRoundtrip("1970-12-31T00:00:00Z"); // dec } TEST(DateTime, ParseTimeRfc3339AcceptsLowercaseTZ) { TestDateTimeRoundtrip("1970-01-01t00:00:00Z", "1970-01-01T00:00:00Z"); TestDateTimeRoundtrip("1970-01-01T00:00:00z", "1970-01-01T00:00:00Z"); } TEST(DateTime, ParsingTimeRoundtripLeapYearLastDay) { TestDateTimeRoundtrip("2016-12-31T20:59:59Z"); TestDateTimeRoundtrip("2020-12-31T20:59:59Z"); TestDateTimeRoundtrip("2021-01-01T20:59:59Z"); } TEST(DateTime, ParseTimeRoundtripAcceptsInvalidNoTrailingTimezone) { // No digits after the dot, or non-digits. This is not a valid input, but we should not choke on // it, Simply ignore the bad fraction std::string const badStrings[] = {"2013-11-19T14:30:59.Z", "2013-11-19T14:30:59.a12Z"}; std::string const strCorrected = "2013-11-19T14:30:59Z"; for (auto const& str : badStrings) { auto const dt = DateTime::Parse(str, DateTime::DateFormat::Rfc3339); auto const str2 = dt.ToString(DateTime::DateFormat::Rfc3339); EXPECT_EQ(str2, strCorrected); } } TEST(DateTime, ToStringNoArg) { auto dt = DateTime::Parse("2013-05-17T01:02:03.1230000Z", DateTime::DateFormat::Rfc3339); EXPECT_EQ(dt.ToString(), "2013-05-17T01:02:03.123Z"); } TEST(DateTime, ToStringOneArg) { auto dt = DateTime::Parse("2013-05-17T01:02:03.1230000Z", DateTime::DateFormat::Rfc3339); EXPECT_EQ(dt.ToString(DateTime::DateFormat::Rfc3339), "2013-05-17T01:02:03.123Z"); EXPECT_EQ(dt.ToString(DateTime::DateFormat::Rfc1123), "Fri, 17 May 2013 01:02:03 GMT"); } TEST(DateTime, ToStringInvalid) { auto dt = DateTime::Parse("2013-05-17T01:02:03.1230000Z", DateTime::DateFormat::Rfc3339); EXPECT_THROW(dt.ToString(static_cast<DateTime::DateFormat>(2)), std::invalid_argument); EXPECT_THROW( dt.ToString(DateTime::DateFormat::Rfc1123, DateTime::TimeFractionFormat::AllDigits), std::invalid_argument); EXPECT_THROW( dt.ToString(DateTime::DateFormat::Rfc1123, DateTime::TimeFractionFormat::DropTrailingZeros), std::invalid_argument); EXPECT_THROW( dt.ToString(DateTime::DateFormat::Rfc1123, DateTime::TimeFractionFormat::Truncate), std::invalid_argument); EXPECT_THROW( dt.ToString(DateTime::DateFormat::Rfc1123, static_cast<DateTime::TimeFractionFormat>(3)), std::invalid_argument); } TEST(DateTime, ParseTimeInvalid2) { // Various unsupported cases. In all cases, we have produce an empty date time std::string const badStrings[] = { "", // empty ".Z", // too short ".Zx", // no trailing Z "3.14Z" // not a valid date "a971-01-01T00:00:00Z", // any non digits or valid separators "1a71-01-01T00:00:00Z", "19a1-01-01T00:00:00Z", "197a-01-01T00:00:00Z", "1971a01-01T00:00:00Z", "1971-a1-01T00:00:00Z", "1971-0a-01T00:00:00Z", "1971-01a01T00:00:00Z", "1971-01-a1T00:00:00Z", "1971-01-0aT00:00:00Z", // "1971-01-01a00:00:00Z", parsed as complete date "1971-01-01Ta0:00:00Z", "1971-01-01T0a:00:00Z", "1971-01-01T00a00:00Z", "1971-01-01T00:a0:00Z", "1971-01-01T00:0a:00Z", "1971-01-01T00:00a00Z", "1971-01-01T00:00:a0Z", "1971-01-01T00:00:0aZ", // "1971-01-01T00:00:00a", accepted as per invalid_no_trailing_timezone above "1", // truncation "19", "197", "1970", "1970-", "1970-0", "1970-01", "1970-01-", "1970-01-0", // "1970-01-01", complete date "1970-01-01T", "1970-01-01T0", "1970-01-01T00", "1970-01-01T00:", "1970-01-01T00:0", "1970-01-01T00:00", "1970-01-01T00:00:", "1970-01-01T00:00:0", // "1970-01-01T00:00:00", // accepted as invalid timezone above "0000-01-01T00:00:00Z", // year too small "1971-00-01T00:00:00Z", // month too small "1971-20-01T00:00:00Z", // month too big "1971-13-01T00:00:00Z", "1971-01-00T00:00:00Z", // day too small "1971-01-32T00:00:00Z", // day too big "1971-02-30T00:00:00Z", // day too big for feb "1971-02-30T00:00:00Z", // day too big for feb (non-leap year) "1971-03-32T00:00:00Z", // other months "1971-04-31T00:00:00Z", "1971-05-32T00:00:00Z", "1971-06-31T00:00:00Z", "1971-07-32T00:00:00Z", "1971-08-32T00:00:00Z", "1971-09-31T00:00:00Z", "1971-10-32T00:00:00Z", "1971-11-31T00:00:00Z", "1971-12-32T00:00:00Z", "1971-01-01T70:00:00Z", // hour too big "1971-01-01T24:00:00Z", "1971-01-01T00:60:00Z", // minute too big "1971-01-01T00:00:70Z", // second too big "1971-01-01T00:00:61Z", "0001-01-01T00:00:00+00:01", // time zone underflow // "1970-01-01T00:00:00.Z", // accepted as invalid timezone above //"1970-01-01T00:00:00+24:00", // bad tz offsets //"1970-01-01T00:00:00-30:00", "1970-01-01T00:00:00+21:60", //"1970-01-01T00:00:00-24:00", "1970-01-01T00:00:00-21:60", "1971-01-00", // zero month day }; for (auto const& str : badStrings) { EXPECT_THROW(DateTime::Parse(str, DateTime::DateFormat::Rfc3339), std::invalid_argument); } } TEST(DateTime, ParseDatesBefore1900) { TestDateTimeRoundtrip("1899-01-01T00:00:00Z"); auto dt1 = DateTime::Parse("1899-01-01T00:00:00Z", DateTime::DateFormat::Rfc3339); auto dt2 = DateTime::Parse("Sun, 1 Jan 1899 00:00:00 GMT", DateTime::DateFormat::Rfc1123); EXPECT_EQ(dt1, dt2); TestDateTimeRoundtrip("0001-01-01T00:00:00Z"); auto dt3 = DateTime::Parse("0001-01-01T00:00:00Z", DateTime::DateFormat::Rfc3339); auto dt4 = DateTime::Parse("Mon, 1 Jan 0001 00:00:00 GMT", DateTime::DateFormat::Rfc1123); EXPECT_EQ(dt3, dt4); EXPECT_EQ(0, dt3.time_since_epoch().count()); } TEST(DateTime, ConstructorAndDuration) { auto dt1 = DateTime::Parse("2020-11-03T15:30:45.1234567Z", DateTime::DateFormat::Rfc3339); auto dt2 = DateTime(2020, 11, 03, 15, 30, 45); dt2 += std::chrono::duration_cast<DateTime::duration>(std::chrono::nanoseconds(123456700)); EXPECT_EQ(dt1, dt2); using namespace std::chrono_literals; auto duration = 8h + 29min + 14s + 876543300ns; auto dt3 = dt1 + duration; auto dt4 = DateTime::Parse("2020-11-04T00:00:00Z", DateTime::DateFormat::Rfc3339); EXPECT_EQ(dt3, dt4); } TEST(DateTime, ArithmeticOperators) { auto const dt1 = DateTime(2020, 11, 03, 15, 30, 45); auto const dt2 = DateTime(2020, 11, 04, 15, 30, 45); auto dt3 = dt1; EXPECT_EQ(dt3, dt1); EXPECT_EQ(dt1, dt3); EXPECT_NE(dt3, dt2); EXPECT_NE(dt2, dt3); EXPECT_LT(dt1, dt2); EXPECT_LE(dt1, dt2); EXPECT_LE(dt1, dt3); EXPECT_LE(dt3, dt1); EXPECT_LE(dt3, dt2); EXPECT_GT(dt2, dt1); EXPECT_GE(dt2, dt1); using namespace std::chrono_literals; auto const diff = dt2 - dt1; EXPECT_EQ(24h, diff); EXPECT_LE(24h, diff); EXPECT_GE(24h, diff); dt3 += 24h; EXPECT_EQ(dt3, dt2); EXPECT_NE(dt3, dt1); dt3 -= 24h; EXPECT_EQ(dt3, dt1); EXPECT_NE(dt3, dt2); dt3 = dt1 + 12h; EXPECT_GT(dt3, dt1); EXPECT_LT(dt3, dt2); dt3 = dt2 - 24h; EXPECT_EQ(dt3, dt1); } TEST(DateTime, DefaultConstructible) { DateTime dt; EXPECT_EQ(0, dt.time_since_epoch().count()); } TEST(DateTime, ComparisonOperators) { std::chrono::system_clock::time_point const chronoPast = std::chrono::system_clock::now(); std::chrono::system_clock::time_point const chronoFuture = chronoPast + std::chrono::hours(1); DateTime const azcorePast = chronoPast; DateTime const azcoreFuture = chronoFuture; EXPECT_LT(azcorePast, chronoFuture); EXPECT_LT(chronoPast, azcoreFuture); EXPECT_GT(azcoreFuture, chronoPast); EXPECT_GT(chronoFuture, azcorePast); EXPECT_NE(azcorePast, chronoFuture); EXPECT_NE(azcoreFuture, chronoPast); EXPECT_NE(chronoPast, azcoreFuture); EXPECT_NE(chronoFuture, azcorePast); EXPECT_EQ(azcorePast, chronoPast); EXPECT_EQ(azcoreFuture, chronoFuture); EXPECT_EQ(chronoPast, azcorePast); EXPECT_EQ(chronoFuture, azcoreFuture); EXPECT_LE(azcorePast, chronoFuture); EXPECT_LE(azcorePast, chronoPast); EXPECT_LE(azcoreFuture, chronoFuture); EXPECT_LE(chronoPast, azcoreFuture); EXPECT_LE(chronoPast, azcorePast); EXPECT_LE(chronoFuture, azcoreFuture); EXPECT_GE(azcoreFuture, chronoPast); EXPECT_GE(azcorePast, chronoPast); EXPECT_GE(azcoreFuture, chronoFuture); EXPECT_GE(chronoFuture, azcorePast); EXPECT_GE(chronoPast, azcorePast); EXPECT_GE(chronoFuture, azcoreFuture); } TEST(DateTime, TimeRoundtrip) { TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000001Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000002Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000003Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000004Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000005Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000006Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000007Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000008Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000009Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000010Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000020Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000030Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000040Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000050Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000060Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000070Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000080Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000090Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000100Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000200Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000300Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000400Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000500Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000600Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000700Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000800Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0000900Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0001000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0002000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0003000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0004000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0005000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0006000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0007000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0008000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0009000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0010000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0020000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0030000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0040000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0050000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0060000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0070000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0080000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0090000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0100000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0200000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0300000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0400000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0500000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0600000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0700000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0800000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.0900000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.1000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.2000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.3000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.4000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.5000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.6000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.7000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.8000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:00.9000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:01.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:02.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:03.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:04.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:05.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:06.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:07.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:08.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:09.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:10.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:20.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:30.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:40.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:00:50.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:01:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:02:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:03:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:04:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:05:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:06:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:07:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:08:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:09:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:10:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:20:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:30:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:40:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T00:50:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T01:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T02:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T03:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T04:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T05:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T06:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T07:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T08:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T09:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T10:00:00.0000000Z"); TestDateTimeRoundtrip<DateTime::TimeFractionFormat::AllDigits>("2021-02-05T20:00:00.0000000Z"); }
[ "noreply@github.com" ]
ysriram-adobe.noreply@github.com
af9f437e2fd28e26933b59f51a2dd3432b8309a4
ef7f3ee0f60aa7d0673b7b2371762d053e13a1e3
/sidak/competitive.cpp
77d823a12bc2d718926c5271069c566d417772d5
[]
no_license
sidakwalia/c-code
d571a105e5a3df1a71b8a7eb576dd3856ca50763
76509573814c608fa75cce7bee779f49cd17e1c4
refs/heads/master
2021-05-22T15:55:02.722813
2020-04-04T18:22:58
2020-04-04T18:22:58
252,991,419
0
0
null
null
null
null
UTF-8
C++
false
false
519
cpp
#include<iostream> using namespace std; void printArr(int arr[], int n) { for (int i = 0; i < n; i++) cout << arr[i] << " "; } void sum(int arr[],int n){ if(n<3) return ; int first=arr[0]; int second=arr[1]; for(int i=0;i<n-2;i++){ arr[i]=arr[i+1]+arr[i+2]; arr[n - 2] = arr[n - 1] + first; arr[n - 1] = first + second; printArr(arr,n); } } int main(){ int arr[] = { 3,4,2,1,6}; int n = sizeof(arr) / sizeof(arr[0]); sum(arr,n); return 0;}
[ "sidakw@gmail.com" ]
sidakw@gmail.com
64208fa6abd9843898830983519145ffe2ab39b4
eaf2c3ee81884c54137844315dc37b26bde11404
/sfmf2/source/taskbar.cpp
935e4b9568c4652c5b6c02c788b715f39e8d9318
[]
no_license
sfpgmr/sfmf2
fa2f4a9cf0f219f7f2e9570e51906128dcc98874
73091ed5ca0f9e8e7435e1779bce08dc3412ef48
refs/heads/master
2016-08-04T09:08:41.963714
2014-03-22T21:54:48
2014-03-22T21:54:48
14,905,785
2
0
null
null
null
null
UTF-8
C++
false
false
2,948
cpp
#include "StdAfx.h" #if _DEBUG #define _CRTDBG_MAP_ALLOC #include <crtdbg.h> #define new new(_NORMAL_BLOCK, __FILE__, __LINE__) #endif #include "sf_windows.h" #include "taskbar.h" namespace sf { const int taskbar::none = TBPF_NOPROGRESS; const int taskbar::indeterminate = TBPF_INDETERMINATE; const int taskbar::normal = TBPF_NORMAL; const int taskbar::error = TBPF_ERROR; const int taskbar::paused = TBPF_PAUSED; long taskbar::register_message() { return ::RegisterWindowMessage(L"TaskbarButtonCreated"); } struct taskbar::impl { typedef throw_if_err<sf::taskbar::exception> throw_if_err_; impl(){} ~impl() { discard(); } void create() { throw_if_err_()(CoCreateInstance(CLSID_TaskbarList,nullptr,CLSCTX::CLSCTX_INPROC_SERVER,__uuidof(ITaskbarList4),(LPVOID*)taskbar_.GetAddressOf())); } bool is_create() const { return (taskbar_ != 0); } void discard() { safe_release(taskbar_); } void overlay_icon(const sf::base_window& w,const sf::icon& ic,const std::wstring& description) { throw_if_err_()(taskbar_->SetOverlayIcon(w.hwnd(),ic.get(),description.c_str())); } void progress_state(const sf::base_window& w,TBPFLAG state) { throw_if_err_()(taskbar_->SetProgressState(w.hwnd(),state)); } void progress_value(const sf::base_window& w,boost::uint64_t completed, boost::uint64_t total) { throw_if_err_()(taskbar_->SetProgressValue(w.hwnd(),completed,total)); } void add_thumb_buttons(const sf::base_window& w,const std::vector<THUMBBUTTON>& tbs){ taskbar_->ThumbBarAddButtons(w.hwnd(),tbs.size(),const_cast<LPTHUMBBUTTON>(&(tbs[0]))); }; void update_thumb_buttons(const sf::base_window& w,const std::vector<THUMBBUTTON>& tbs){ taskbar_->ThumbBarUpdateButtons(w.hwnd(),tbs.size(),const_cast<LPTHUMBBUTTON>(&(tbs[0]))); }; private: _WRL_PTR_TYPEDEF(ITaskbarList4); ITaskbarList4Ptr taskbar_; }; taskbar::taskbar() : impl_(new sf::taskbar::impl()) {} taskbar::~taskbar() { discard();}; void taskbar::create(){impl_->create();}; bool taskbar::is_create() const {return impl_->is_create();}; void taskbar::discard(){impl_->discard();}; void taskbar::overlay_icon(const sf::base_window& w,const icon& ic,const std::wstring& description){impl_->overlay_icon(w,ic,description);}; void taskbar::progress_state(const sf::base_window& w,int state){impl_->progress_state(w,(TBPFLAG)state);}; void taskbar::progress_value(const sf::base_window& w,boost::uint64_t completed, boost::uint64_t total){impl_->progress_value(w,completed,total);}; void taskbar::add_thumb_buttons(const sf::base_window& w,const thumb_button_manager& tm){ BOOST_ASSERT(!tm.is_added); impl_->add_thumb_buttons(w,tm.thumbbuttons_); tm.is_added = true; }; void taskbar::update_thumb_buttons(const sf::base_window& w,const thumb_button_manager& tm){ BOOST_ASSERT(tm.is_added); if(tm.is_added){ impl_->update_thumb_buttons(w,tm.thumbbuttons_); } }; }
[ "sfpgmr@gihub.com" ]
sfpgmr@gihub.com
2a8b577a4a9ef62bb0dc61820d0f831ed760b176
b10c93bc8fb4973e2a5aa0f258326d8e18f92ef8
/src/ParticleSystem.cpp
562a4fad989396b71931abfbf6a7c24ffd0ccf17
[]
no_license
erumeldir/musicVisualizer
3138b6e68f183531c79096e9928f044f4b756eac
61a9a4098722932ba295701fd407ba54127d53a2
refs/heads/master
2021-01-22T13:46:48.496495
2013-12-14T00:54:27
2013-12-14T00:54:27
14,517,434
1
1
null
null
null
null
UTF-8
C++
false
false
4,912
cpp
#include "ParticleSystem.h" #include "SOIL.h" ParticleSystem::ParticleSystem(Vector3 pos, int nParticles, double lifetime, char* spriteName, Shader* partShader) { // create space for all for the particles particles = new Particle[nParticles]; numParticles = nParticles; position = pos; globalLifetime = lifetime; particleSprite = SOIL_load_OGL_texture ( spriteName, SOIL_LOAD_AUTO, SOIL_CREATE_NEW_ID, SOIL_FLAG_MIPMAPS | SOIL_FLAG_INVERT_Y | SOIL_FLAG_NTSC_SAFE_RGB | SOIL_FLAG_COMPRESS_TO_DXT ); if (0 == particleSprite) { printf("SOIL loading error: '%s'\n", SOIL_last_result()); } particleShader = partShader; } ParticleSystem::~ParticleSystem() { // deallocate particle array delete[] particles; } /*********************GETTERS AND SETTERSi*******************/ // gets position of system Vector3 ParticleSystem::getPosition() { return position; } // sets position void ParticleSystem::setPosition(Vector3 pos) { position = pos; } // gets particle in the particle array Particle& ParticleSystem::getParticle(int particleNum) { return particles[particleNum]; } // sets particle in the array to the given particle void ParticleSystem::setParticle(int particleNum, Particle newValue) { particles[particleNum] = newValue; } // gets number of particles int ParticleSystem::getNumParticles() { return numParticles; } // gets the reference point for all the lifetimes of the particles int ParticleSystem::getGlobalLifetime() { return globalLifetime; } // sets the reference point for lifetimes of the particles void ParticleSystem::setGlobalLifetime(int newLifetime) { globalLifetime = newLifetime; } // TODO: optimize this!! // finds next available spot in the particle array and returns its index // returns -1 if no spot was found int ParticleSystem::findNext() { for (int i = 0; i < numParticles; i++) { if (particles[i].state == DEAD) { return i; } } // no available spots right now return -1; } // finds next avaialbe spot and makes it into new emitter void ParticleSystem::triggerEmitter(Vector3 direction) { // find next available spot int index = findNext(); // if there WAS an available spot if (index != -1) { particles[index].state = ALIVE; particles[index].p0 = position; particles[index].lifetime = globalLifetime + rand() % 500; particles[index].time = 0; particles[index].v0 = direction; } } /* * draw * * overidden draw method from Node. * updates each particles lifetimes, * draws all of the children * and passes them to the vertex shader */ void ParticleSystem::draw(Matrix4, Frustum, bool) { // turning on flag in shader particleShader->uniform1i("particle", 1); glActiveTexture(GL_TEXTURE0 + 2); glBindTexture(GL_TEXTURE_2D, particleSprite); particleShader->uniform1i("tex", 2); glEnable(GL_POINT_SPRITE); // get the current time int currentTime = frameTimer.getElapsedTimeInMilliSec(); // array of vertices to pass to shader float* vertices = new float[numParticles * 3]; float* initialVel = new float[numParticles * 3]; float* time = new float[numParticles]; glPointSize(7); //glTexEnvi(GL_POINT_SPRITE, GL_COORD_REPLACE, GL_TRUE); // update particles' existence time for (int i = 0; i < numParticles; i++) { // initial position of current point Vector3 currPoint = particles[i].p0; // initial vel of current point Vector3 currVel = particles[i].v0; particles[i].time += currentTime - prevFrameTime; // check if particle exceeds its lifetime if (particles[i].time > particles[i].lifetime) particles[i].reset(); else { if (particles[i].state == ALIVE) { // draw particles' vertices glBegin(GL_POINTS); glColor4f(1, 1, 1, 1); Vector3 g(0, -9.8 * 30, 0); float t = particles[i].time / 1000.0; g.scale(0.5 * t * t); currVel.scale(t); currPoint += currVel + g; glVertex3f(currPoint[0], currPoint[1], currPoint[2]); glEnd(); } else{ // draw particles' vertices /* glBegin(GL_POINTS); glColor4f(0,0,0,0); glVertex3f(currPoint[0], currPoint[1], currPoint[2]); glEnd();*/ } } glBindTexture(GL_TEXTURE_2D, 0); // set initial position for vertex shader vertices[i * 3] = currPoint[0]; vertices[i * 3 + 1] = currPoint[1]; vertices[i * 3 + 2] = currPoint[2]; // initial velocity for shader initialVel[i * 3] = currVel[0]; initialVel[i * 3 + 1] = currVel[1]; initialVel[i * 3 + 2] = currVel[2]; // set time for shader time[i] = particles[i].time; } // update prevTime prevFrameTime = currentTime; // particleShader->uniform1i("particle", 0); } // overidden bounding sphere method from Node void ParticleSystem::computeBoundingSphere(Matrix4) { }
[ "ding@ucsd.edu" ]
ding@ucsd.edu
de2b205e1edbd394b15fee753ab3ae280d0ba9ec
b62a2498f227f9dee8c999bef091b08f2338ce78
/src/ControlWithLabel.cpp
eaf775241184e60e0f59a06c27412e3c0533b56c
[ "MIT" ]
permissive
morphogencc/Cinder-UI
864c6d8a6260cb5becdedb4fe7e7802fce94b7b4
c69aa02fdf0ad5d60bfb270c35f10bfc590f6850
refs/heads/master
2020-03-24T19:11:56.954176
2020-03-07T20:06:55
2020-03-07T20:06:55
142,911,467
0
0
null
2018-07-30T18:11:18
2018-07-30T18:11:18
null
UTF-8
C++
false
false
422
cpp
#include "ControlWithLabel.h" using namespace reza::ui; using namespace ci; using namespace std; ControlWithLabel::ControlWithLabel() : Control() { } ControlWithLabel::~ControlWithLabel() { } void ControlWithLabel::changeState() { Control::changeState(); if( mLabelRef ) mLabelRef->setState( mState ); } void ControlWithLabel::setLabel( const std::string &label ) { if( mLabelRef ) mLabelRef->setLabel( label ); }
[ "syed.reza.ali@gmail.com" ]
syed.reza.ali@gmail.com
8789090baa14bfba57009c25e7197f77f05c0adf
25e1610996ec35ebc32bbadaf01c1706c754110e
/glorious/Debug.h
28fd11ef05148bc54139dfb5d2746a08a0165c17
[]
no_license
ianpas/glorious
7f94f726945465a947cf583cf78c1a55c5e08f19
8ed3b7c1d552d97c7d2250f201a2d59606679171
refs/heads/master
2021-01-24T20:26:08.036898
2018-02-28T12:15:53
2018-02-28T12:15:53
123,251,353
0
0
null
null
null
null
UTF-8
C++
false
false
170
h
#pragma once namespace Glorious { class Debug { public: static void Log(std::string const& message); static void PopMessageBox(std::string const& message); }; }
[ "ianpas@126.com" ]
ianpas@126.com
e4147390da9ad7c7f54e64c42c1e9e6812bba82f
84cf2dc2cddb2e5963d8d5427183a364614f0e14
/dec4/part2.cpp
50662ae091ad411f427c16e1205e24e67d545b28
[]
no_license
cmavrogiannis/adventofcode2017
1baba8500c13703f645ac8ca1a9606570b893edc
0364352753a639dba3998ccff01384c58f41b139
refs/heads/master
2021-08-24T12:40:55.893253
2017-12-09T23:23:21
2017-12-09T23:23:21
113,380,944
1
0
null
null
null
null
UTF-8
C++
false
false
740
cpp
#include <iostream> #include <fstream> #include <sstream> #include <vector> #include <algorithm> using namespace std; bool is_valid(istream &input) { vector<string> word; string w; string line; getline(input,line); istringstream is(line); while(is >> w) { word.push_back(w); } int N = word.size(); for (int i{0}; i < N-1; i++) { for (int j{i+1}; j < N; j++ ) { sort(word[i].begin(),word[i].end()); sort(word[j].begin(),word[j].end()); if ( word[i] == word[j] ) { return false; } } } return true; } int main(int argc, char *argv[]) { int n{0}; ifstream input("data.txt"); while(!input.eof()) { if (is_valid(input)) { n++; } } cout << "the answer is " << n << endl; return 0; }
[ "ccmavrogiannis@gmail.com" ]
ccmavrogiannis@gmail.com
b800afd3b17005459a70168690c1883d90ff5ebc
0c51500f87101f13c471f0c310e9451a87adc714
/flammap/win32/burnupw.cpp
ab23a6c27cefaeaaf306669edeed152270a7decc
[ "LicenseRef-scancode-public-domain", "Unlicense" ]
permissive
firelab/wfips
a5e589fde41579e87008a7900a87692ec985e529
6b3bd4934d281ebb31164bd242a57079a82053b0
refs/heads/master
2020-05-01T06:03:41.792664
2017-01-27T19:31:55
2017-01-27T19:31:55
14,540,320
2
1
null
null
null
null
UTF-8
C++
false
false
65,942
cpp
//------------------------------------------------------------------------------ // Burnup, Albini and Reinhardt // // //------------------------------------------------------------------------------ #include <stdio.h> #include <stdlib.h> #include <math.h> #include <string.h> #include <windows.h> #include "burnupcw.h" //#include "nonlin.h" static const double ch2o=4186.0; static const double tpdry=353.0; static const double smallx=1.e-06; static const double big= 1.e+06; #define min(a,b) ((a<b) ? a : b) #define max(a,b) ((a>b) ? a : b) double BurnUp::pow2(double input) { return input*input; } void BurnUp::ResetEmissionsData() { long i; for(i=0; i<MAXNO; i++) { Smoldering[i]=0.0; Flaming[i]=0.0; } Smoldering[MAXNO]=0.0; } BurnUp::BurnUp() { long i; ntimes=0; number=0; fi =0.0; ti =0.0; u =0.0; d =0.0; tamb =0.0; ak =0.0; r0 =0.0; dr =0.0; dt =0.0; wdf =0.0; dfm =2.0; for(i=0; i<MAXNO; i++) { wdry[i] =0.0; ash[i] =0.0; htval[i] =0.0; fmois[i] =0.0; dendry[i] =0.0; sigma[i] =0.0; cheat[i] =0.0; condry[i] =0.0; alfa[i] =0.0; tpig[i] =0.0; tchar[i] =0.0; flit[i] =0.0; fout[i] =0.0; work[i] =0.0; alone[i] =0.0; area[i] =0.0; fint[i] =0.0; Smoldering[i]=0.0; Flaming[i]=0.0; } Smoldering[MAXNO]=0.0; //memset(Message, 0x0, sizeof(Message)); ZeroMemory(Message, sizeof(Message)); fistart=-1.0; NumAllocRegrData=0; x=y=w=0; // arrays for regression ux=vx=0; sig=0; FintSwitch=15.0; bs=0; } BurnUp::~BurnUp() { FreeBurnStruct(); FreeRegressionData(NumAllocRegrData); } bool BurnUp::CheckData() { long i; const double ash1=0.0001, ash2=0.1; const double htv1=1.0e07, htv2=3.0e7; const double fms1=0.01, fms2=3.0; const double den1=200.0, den2=1000.0; const double sig1=4.0, sig2=1.0e4; const double cht1=1000.0, cht2=4000.0; const double con1=0.025, con2=0.25; const double tig1=200.0, tig2=400.0; const double tch1=250.0, tch2=500.0; const double fir1=0.1, fir2=1.0e5; const double ti1=1.0, ti2=200.0; const double u1=0.0, u2=5.0; const double d1=0.1, d2=5.0; const double tam1=-40.0, tam2=40.0; const double wdf1=0.1, wdf2=30.0; const double dfm1=0.1, dfm2=1.972; for(i=0; i<number; i++) { sprintf(Message, "%s %ld", "Line Number", i); if(wdry[i]<=smallx || wdry[i]>=big) { strcat(Message, " dry loading out of range (kg/m2)"); break; } if(ash[i]<=ash1 || ash[i]>=ash2) { strcat(Message, " ash content out of range (fraction)"); break; } if(htval[i]<=htv1 || htval[i]>=htv2) { strcat(Message, " heat content out of range (J/kg)"); break; } if(fmois[i]<=fms1 || fmois[i]>=fms2) { strcat(Message, " fuel moisture out of range (fraction)"); break; } if(dendry[i]<=den1 || dendry[i]>=den2) { strcat(Message, " dry mass density out of range (kg/m3)"); break; } if(sigma[i]<=sig1 || sigma[i]>=sig2) { strcat(Message, " SAV out of range (1/m)"); break; } if(cheat[i]<=cht1 || cheat[i]>=cht2) { strcat(Message, " heat capacity out of range (J/kg/K"); break; } if(condry[i]<=con1 || condry[i]>=con2) { strcat(Message, " thermal conductivity out of range (W/m/K)"); break; } if(tpig[i]<=tig1 || tpig[i]>=tig2) { strcat(Message, " ignition temperature out of range (C)"); break; } if(tchar[i]<=tch1 || tchar[i]>=tch2) { strcat(Message, " char end pyrolisis temperature out of range (C)"); break; } } if(i<number) return false; //memset(Message, 0x0, sizeof(Message)); ZeroMemory(Message, sizeof(Message)); if(ti<ti1) { double rat, tempf, tempt; rat=fistart/ti; tempf=fir1; tempt=(fistart-fir1)/rat; ti+=tempt; fistart=tempf; } if(fistart<fir1 || fistart>fir2) strcat(Message, " igniting fire intensity out of range (kW/m2)"); else if(ti<ti1)// || ti>ti2 ) strcat(Message, " igniting surface fire res. time out of range (s)"); else if(u<u1 || u>u2) strcat(Message, " windspeed at top of fuelbed out of range (m/s)"); else if(d<d1 || d>d2) strcat(Message, " depth of fuel bed out of range (m)"); else if(tamb-273<tam1 || tamb-273>tam2) strcat(Message, " ambient temperature out of range (C)"); //else if(wdf<wdf1 || wdf>wdf2) // strcat(Message, " duff dry weight loading out of range (kg/m2)"); else if(dfm<dfm1 || dfm>dfm2) strcat(Message, " duff moisture out of range (fraction)"); if(strlen(Message)>0) return false; AllocBurnStruct(); // allocate for ntimes of output data return true; } bool BurnUp::GetDatFile(char *InFile, long Number) { long i; double drywt, ashes, hots, fms, dryd, sigs, cpd, cond, tigi, tchi; FILE *infile; number=Number; // class copy of Number of fuel classes if(number>MAXNO) return false; if((infile=fopen(InFile, "r"))==NULL) return false; for(i=0; i<number; i++) { fscanf(infile, "%lf %lf %lf %lf %lf %lf %lf %lf %lf %lf", &drywt, &ashes, &hots, &fms, &dryd, &sigs, &cpd, &cond, &tigi, &tchi); wdry[i]=drywt; ash[i]=ashes; htval[i]=hots; fmois[i]=fms; dendry[i]=dryd; sigma[i]=sigs; cheat[i]=cpd; condry[i]=cond; tpig[i]=tigi+273.0; tchar[i]=tchi+273.0; } fscanf(infile, "%lf %lf %lf %lf %lf %lf %lf %lf %lf %ld %lf %lf", &fi, &ti, &u, &d, &tamb, &ak, &r0, &dr, &dt, &ntimes, &wdf, &dfm); tamb+=273; fclose(infile); if(!CheckData()) return false; return true; } bool BurnUp::SetFuelStruct(long NumParts, FuelStruct *fs) { long i; number=NumParts; if(number>MAXNO) { sprintf(Message, "%s %ld", "Number of fuel partitions exceeds max:", MAXNO); return false; } for(i=0; i<number; i++) { wdry[i]=fs[i].wdry; ash[i]=fs[i].ash; htval[i]=fs[i].htval*1000.0; fmois[i]=fs[i].fmois; dendry[i]=fs[i].dendry; sigma[i]=fs[i].sigma; cheat[i]=fs[i].cheat; condry[i]=fs[i].condry; tpig[i]=fs[i].tpig+273.0; tchar[i]=fs[i].tchar+273.0; } return true; } bool BurnUp::SetFuelDat(long NumParts, double *drywt, double *ashes, double *hots, double *fms, double *dryd, double *sigs, double *cpd, double *cond, double *tigi, double *tchi) { long i; number=NumParts; if(number>MAXNO) { sprintf(Message, "%s %ld", "Number of fuel partitions exceeds max:", MAXNO); return false; } for(i=0; i<number; i++) { wdry[i]=drywt[i]; ash[i]=ashes[i]; htval[i]=hots[i]; fmois[i]=fms[i]; dendry[i]=dryd[i]; sigma[i]=sigs[i]; cheat[i]=cpd[i]; condry[i]=cond[i]; tpig[i]=tigi[i]+273.0; tchar[i]=tchi[i]+273.0; } return true; } bool BurnUp::SetFuelInfo(long NumParts, double *datastruct) { long i; number=NumParts; if(number>MAXNO) { sprintf(Message, "%s %ld", "Number of fuel partitions exceeds max:", MAXNO); return false; } for(i=0; i<number; i++) { sigma[i]=datastruct[i*5]; wdry[i]=datastruct[i*5+1]; htval[i]=datastruct[i*5+2]*1000.0; dendry[i]=datastruct[i*5+3]; fmois[i]=datastruct[i*5+4]; ash[i]= 0.05; cheat[i]= 2750.0; condry[i]=0.133; tpig[i]= 327;// deg C+273; tchar[i]= 377;// deg C+273; } return true; } bool BurnUp::SetFireDat(long NumIter, double Fi, double Ti, double U, double D, double Tamb, double R0, double Dr, double Dt, double Wdf, double Dfm) { ntimes=NumIter; if(ntimes<=0) { sprintf(Message, "%s", "Number of Iterations too smallx (<=0"); return false; } fistart=Fi; ti=Ti; u=U; d=D; tamb=Tamb+273.0; r0=R0; dr=Dr; dt=Dt; wdf=Wdf; dfm=Dfm; return true; } bool BurnUp::Burnup() { char HistFile[]="burn_hist.txt"; char SnapFile[]="burn_snap.txt"; long nruns = 0; long now, nohist=0; double fimin = 0.1; double tis, dfi, tdf, fid; if(ntimes==0 || number==0) return false; ResetEmissionsData(); fi=fistart; Arrays(); now=1; tis=ti; DuffBurn(wdf, dfm, &dfi, &tdf); Start(tis, now, &nruns); if(tis<tdf) fid=dfi; else fid=0.0; if(!nohist) Stash(HistFile, SnapFile, tis, now); fi=FireIntensity(); if(fi>fimin) { do { Step(dt, tis, fid, &nruns); now++; tis+=dt; if(tis<tdf) fid=dfi; else fid=0.0; fi=FireIntensity(); if(fi<=fimin) break; if(!nohist) Stash(HistFile, SnapFile, tis, now); } while(now<=ntimes); } Summary(HistFile); return true; } bool BurnUp::StartLoop() { fimin = 0.1; fi=fistart; if(ntimes==0 || number==0) return false; ResetEmissionsData(); Arrays(); now=1; tis=ti; DuffBurn(wdf, dfm, &dfi, &tdf); if(Start(tis, now, &nruns)) { if(tis<tdf) fid=dfi; else fid=0.0; SetBurnStruct(0.0, now); fi=FireIntensity(); SetBurnStruct(tis, now); nruns=0; if(fi<=fimin) return false; } else return false; return true; } bool BurnUp::BurnLoop() { Step(dt, tis, fid, &nruns); now++; tis+=dt; if(tis<tdf) fid=dfi; else fid=0.0; fi=FireIntensity(); if(fi<=fimin) { fi=fistart; while(tis<tdf && now<ntimes) { fi=fid; SetBurnStruct(tis, now++); tis+=dt; }; return false; } SetBurnStruct(tis, now); if(now>ntimes) return false; return true; } long BurnUp::loc(long k, long l) { return k*(k+1.0)/2.0+l-1; //return k*((long) ((k+1)/2))+l-1; /* double HalfK; HalfK=(double) (k+1.0)/2.0; return (long) ((double) k*HalfK+l)-1; */ } long BurnUp::Nint(double input) { long Input; Input=(long) input; if(input-(double) Input>=0.5) Input+=1; return Input; } //------------------------------------------------------------------------------ // // Tignit // //------------------------------------------------------------------------------ // subroutine TIGNIT( tpam , tpdr , tpig , tpfi , cond , // + chtd , fmof , dend , hbar , tmig ) //c tpam = ambient temperature , K //c tpdr = fuel temperature at start of drying , K //c tpig = fuel surface temperature at ignition , K //c tpfi = fire environment temperature , K //c cond = fuel ovendry thermal conductivity , W / m K //c chtd = fuel ovendry specific heat capacity , J / kg K //c fmof = fuel moisture content , fraction dry weight //c dend = fuel ovendry density , kg / cu m //c hbar = effective film heat transfer coefficient [< HEATX] W / sq m K //c tmig = predicted time to piloted ignition , s double BurnUp::ff(double x, double tpfi, double tpig) { const double a03=-1.3371565; const double a13=0.4653628; const double a23=-0.1282064; double b03; b03=a03*(tpfi-tpig)/(tpfi-tamb); return b03+x*(a13+x*(a23+x)); } double BurnUp::TIgnite(double tpdr, double tpig, double tpfi, double cond, double chtd, double fmof, double dend, double hbar) { const double pinv=2.125534; const double hvap=2.177e+06; const double cpm=4186.0; const double conc=4.27e-04; double xlo, xhi, xav, fav, beta, conw, dtb, dti, ratio, rhoc, tmig; // MOVED TO function FF(...) //------------------------------------------------------------------------------ //c approximate function of beta to be solved is ff( x ) where //c x = 1 / ( 1 + p * beta ) { Hastings, Approximations for //c digital computers } and we employ pinv = 1 / p // ff( x ) = b03 + x * ( a13 + x * ( a23 + x ) ) //c radiant heating equivalent form gives end condition fixes beta // b03 = a03 * ( tpfi - tpig ) / ( tpfi - tpam ) //------------------------------------------------------------------------------ //c find x that solves ff( x ) = 0 ; method is binary search xlo = 0.0; xhi = 1.0; do { xav = 0.5 * ( xlo + xhi ); fav = ff(xav, tpfi, tpig); if(fabs(fav)>smallx) { if(fav<0.0) xlo = xav; if(fav>0.0) xhi = xav; } } while(fabs(fav)>smallx); beta = pinv*(1.0-xav)/xav; conw = cond+conc*dend*fmof; dtb = tpdr-tamb; dti = tpig-tamb; ratio = (hvap+cpm*dtb)/(chtd*dti); rhoc = dend*chtd*(1.0+fmof*ratio); tmig = pow2(beta/hbar)*conw*rhoc; return tmig; } //------------------------------------------------------------------------------ // // DuffBurn // //------------------------------------------------------------------------------ void BurnUp::DuffBurn(double wdf, double dfm, double *dfi, double *tdf) { //c Duff burning rate (ergo, intensity) and duration double ff; *dfi = 0.0; *tdf = 0.0; if((wdf<=0.0) || (dfm >=1.96)) return; *dfi=11.25-4.05*dfm; ff=0.837-0.426*dfm; *tdf=1.e+04*ff*wdf/(7.5-2.7*dfm); Smoldering[MAXNO]+=((ff*wdf)/(*tdf)); } //------------------------------------------------------------------------------ // // Arrays // //------------------------------------------------------------------------------ void BurnUp::Arrays() { // subroutine ARRAYS( maxno , number , wdry , ash , dendry , fmois , // + sigma , htval , cheat , condry , tpig , tchar , // + diam , key , work , ak , elam , alone , xmat , // + wo , maxkl ) //c Orders the fuel description arrays according to the paradigm described in //c subroutine SORTER and computes the interaction matrix xmat from the array //c elam and the list alone returned from subroutine OVLAPS. Parameters in //c arrays are defined in terms of initial values as: //c wdry ovendry mass loading , kg / sq m //c ash mineral content , fraction dry mass //c dendry ovendry mass density , kg / cu m //c fmois moisture content , fraction dry mass //c sigma surface to volume ratio , 1 / m //c htval low heat of combustion , J / kg //c cheat specific heat capacity , ( J / K ) / kg dry mass //c condry thermal conductivity , W / m K , ovendry //c tpig ignition temperature , K //c tchar char temperature , K //c diam initial diameter , m [ by interaction pairs ] //c key ordered index list //c work workspace array //c elam interaction matrix from OVLAPS //c alone noninteraction fraction list from OVLAPS //c xmat consolidated interaction matrix //c wo initial dry loading by interaction pairs // real*4 wdry( maxno ) , ash( maxno ) , dendry( maxno ) // real*4 fmois( maxno ) , sigma( maxno ) , htval( maxno ) // real*4 cheat( maxno ) , condry( maxno ) , tpig( maxno ) // real*4 tchar( maxno ) , work( maxno ) // real*4 elam( maxno , maxno ) , alone( maxno ) // real*4 xmat( maxkl ) , diam( maxkl ) , wo( maxkl ) // integer key( maxno ) double diak, wtk; long j, k, kl, kj; Sorter(); // call SORTER( maxno , number , sigma , fmois , dendry , key ) for(j=0; j<number; j++) { k = key[j]; work[j]= wdry[k]; } for(j=0; j<number; j++) wdry[j] = work[j]; for(j=0; j<number; j++) { k = key[j]; work[j]= ash[k]; } for(j=0; j<number; j++) ash[j] = work[j]; for(j=0; j<number; j++) { k = key[j]; work[j]= htval[k]; } for(j=0; j<number; j++) htval[j]= work[j]; for(j=0; j<number; j++) { k = key[j]; work[j]= cheat[k]; } for(j=0; j<number; j++) cheat[j] = work[j]; for(j=0; j<number; j++) { k = key[j]; work[j]= condry[k]; } for(j=0; j<number; j++) condry[j] = work[j]; for(j=0; j<number; j++) { k = key[j]; work[j]= tpig[k]; } for(j=0; j<number; j++) tpig[j] = work[j]; for(j=0; j<number; j++) { k = key[j]; work[j]= tchar[k]; } for(j=0; j<number; j++) tchar[j] = work[j]; OverLaps(); // call OVLAPS( wdry , sigma , dendry , ak , number , maxno , maxkl , xmat , elam , alone ) for(k=1; k<=number; k++) //do k = 1 , number { diak = 4.0/sigma[k-1]; wtk = wdry[k-1]; kl = loc(k, 0); diam[kl] = diak; xmat[kl] = alone[k-1]; wo[kl] = wtk * xmat[kl]; for(j=1; j<=k; j++) //do j = 1 , k { kj = loc(k, j); diam[kj] = diak; xmat[kj] = elam[k-1][j-1]; wo[kj] = wtk * xmat[kj]; } } } //------------------------------------------------------------------------------ // // TempF // //------------------------------------------------------------------------------ double BurnUp::TempF(double q, double r) { // function TEMPF( q , r , tamb ) //c Returns a fire environment temperature , TEMPF , given the fire intensity //c q in kW / square meter , the ambient temperature tamb in Kelvins, and the //c dimensionless mixing parameter r. const double err=1.0e-04; const double aa=20.0; double term, rlast, den, rnext, test, tempf; term=r/(aa*q); rlast=r; do { den=1.0+term*(rlast+1.0)*(rlast*rlast+1.0); rnext=0.5*(rlast+1.0+r/den); test=fabs(rnext-rlast); if(test<err) { tempf=rnext*tamb; break; } rlast=rnext; } while(test>=err); return tempf; } //---------------------------------------------------------------------------- // // Step // //---------------------------------------------------------------------------- /* subroutine STEP( dt , MXSTEP , now , maxno , number , wo , alfa , + dendry , fmois , cheat , condry , diam , tpig , + tchar , xmat , tambb , tpdry , fi , flit , fout , + tdry , tign , tout , qcum , tcum , acum , qdot , + ddot , wodot , work , u , d , r0 , dr , ch2o , + ncalls , maxkl , tin , fint , fid ) c Updates status of all fuel component pairs and returns a snapshot c c Input parameters: c c tin = start of current time step c dt = time step , sec c MXSTEP = max dimension of historical sequences c now = index marks end of time step c maxno = max number of fuel components c number = actual number of fuel components c wo = current ovendry loading for the larger of c each component pair, kg / sq m c alfa = dry thermal diffusivity of component , sq m / s c dendry = ovendry density of component , kg / cu m c fmois = moisture fraction of component c cheat = specific heat capacity of component , J / kg K c condry = ovendry thermal conductivity , w / sq m K c diam = current diameter of the larger of each c fuel component pair , m c tpig = ignition temperature ( K ) , by component c tchar = end - pyrolysis temperature ( K ) , by component c xmat = table of influence fractions between components c tambb = ambient temperature ( K ) c tpdry = temperature ( all components ) start drying ( K ) c fi = current fire intensity ( site avg ) , kW / sq m c work( k ) = factor of heat transfer rate hbar * (Tfire - Tchar) c that yields ddot( k ) c fint( k ) = correction to fi to compute local intensity c that may be different due to k burning c fid = fire intensity due to duff burning ... this is c used to up the fire intensity for fuel pieces c that are burning without interacting with others c plus the following constants and bookkeeping parameters c u , d , r0 , dr , ch20 , ncalls , maxkl c c Parameters updated [input and output] c c ncalls = counter of calls to this routine ... c = 0 on first call or reset c cumulates after first call c flit = fraction of each component currently alight c fout = fraction of each component currently gone out c tdry = time of drying start of the larger of each c fuel component pair c tign = ignition time for the larger of each c fuel component pair c tout = burnout time of larger component of pairs c qcum = cumulative heat input to larger of pair , J / sq m c tcum = cumulative temp integral for qcum ( drying ) c acum = heat pulse area for historical rate averaging c qdot = history ( post ignite ) of heat transfer rate c to the larger of component pair , W / sq m c ddot = diameter reduction rate , larger of pair , m / s c wodot = dry loading loss rate for larger of pair c c Constant parameters c c u = mean horizontal windspeed at top of fuelbed c d = fuelbed depth c r0 = minimum value of mixing parameter c dr = max - min value of mixing parameter c ch2o = specific heat capacity of water , J / kg K c hvap = heat of vaporization of water , J / kg */ //real*4 wo( maxkl ) , alfa( maxno ) , dendry( maxno ) //real*4 fmois( maxno ) , cheat( maxno ) //real*4 condry( maxno ) , diam( maxkl ) , tpig( maxno ) //real*4 tchar( maxno ) , xmat( maxkl ) //real*4 tdry( maxkl ) , tign( maxkl ) //real*4 tout( maxkl ) , qcum( maxkl ) //real*4 tcum( maxkl ) , acum( maxkl ) //real*4 qdot( maxkl , MXSTEP ) , ddot( maxkl ) //real*4 wodot( maxkl ) , flit( maxno ) , fout( maxno ) //real*4 work( maxno ) , fint( maxno ) void BurnUp::Step(double dt, double tin, double fid, long *ncalls) { int nspan; long k, l, j, kl, next, now, mu, index; double c, rindef=1.e+30; double tnext, tnow, tgo, tdun, tifi; double aint, tav1, tav2, tav3, tavg; double qdavg, qdsum, tspan, deltim; double tlit, ts, r, gi, tf, dia, hf, hb; double e, qqq, tst, dnext, wnext, rate, ddt, dryt, dtemp, dqdt; double dteff, heff, tfe, dtlite, qd, delt, factor; double conwet, dtcum, he, dtef, thd, biot, cpwet, tbar, fac; bool flag; *ncalls+=1; now=*ncalls; tnow = tin; tnext = tnow + dt; //c tifi = time when fire ignition phase ended ( at now = 1 ) tifi = tnow-((double)(now-1))*dt; next = now+1; for(k=1; k<=number; k++) //do k = 1 , number { c = condry[k-1]; for(l=0; l<=k; l++) //do l = 0 , k { kl = loc(k, l); tdun = tout[kl]; //c See if k of ( k , l ) pair burned out if(tnow>=tdun) { ddot[kl]=0.0; wodot[kl]=0.0; continue; // goto 10 } if(tnext>=tdun) { tgo = tdun-tnow; ddot[kl] = diam[kl]/tgo; wodot[kl] = wo[kl]/tgo; wo[kl] = 0.0; diam[kl]= 0.0; continue; } //c k has not yet burned out ... see if k of ( k , l ) pair is ignited tlit = tign[kl]; if(tnow>=tlit) { ts = tchar[k-1]; if(l==0) { r = r0 + 0.5 * dr; gi = fi + fid; } else if(l==k) { r =r0+0.5*(1.0+flit[k-1])*dr; gi =fi+flit[k-1]*fint[k-1]; } else//(l!=0 && l!=k) { r = r0+0.5*(1.0+flit[l-1])*dr; gi =fi+fint[k-1]+flit[l-1]*fint[l-1]; } tf = TempF(gi, r); dia = diam[kl]; HeatExchange(dia, tf, ts, &hf, &hb, c, &e); qqq = hb * max(tf-ts, 0.0); tst = max(tlit, tifi); nspan = max((long) 1, Nint((tnext-tst)/dt)); //nint((tnext-tst)/dt)); if(nspan<=MXSTEP) qdot[kl][nspan-1]=qqq; else if(nspan>MXSTEP) { for(mu=2; mu<=MXSTEP; mu++) //do mu = 2 , MXSTEP qdot[kl][mu-2]=qdot[kl][mu-1]; qdot[kl][MXSTEP-1]=qqq; } aint = pow2(c/hb); acum[kl]+=(aint*dt); tav1 = tnext-tlit; tav2 = acum[kl]/alfa[k-1]; tav3 = pow2(dia/4.0)/alfa[k-1]; tavg=tav1; if(tav2<tavg) tavg=tav2; if(tav3<tavg) tavg=tav3; index=min(nspan, MXSTEP); //index = 1+min(nspan, MXSTEP); qdsum=0.0; tspan=0.0; deltim=dt; do { index-=1; if(index==0) //==1 deltim=tnext-tspan-tlit; if((tspan+deltim)>=tavg) deltim=tavg-tspan; qdsum+=(qdot[kl][index]*deltim); tspan+=deltim; if(tspan>=tavg) break; } while(index>0); qdavg = max(qdsum/tspan, 0.0); ddot[kl] =qdavg*work[k-1]; dnext = max(0.0, dia-dt*ddot[kl]); wnext = wo[kl]*pow2(dnext/dia); if((dnext==0.0) && (ddot[kl]>0.0)) tout[kl]=tnow+dia/ddot[kl]; else if((dnext>0.0) && (dnext<dia)) { rate=dia/(dia-dnext); tout[kl]=tnow+rate*dt; } if(qdavg<=(double) MXSTEP) // <=20.0 in Albini's code tout[kl]=0.5*(tnow+tnext); ddt = min(dt, (tout[kl]-tnow)); wodot[kl]=(wo[kl]-wnext)/ddt; diam[kl]=dnext; wo[kl]=wnext; continue; //goto 10 } //c See if k of ( k , l ) has reached outer surface drying stage yet dryt = tdry[kl]; if(tnow>=dryt && tnow<tlit) { if(l==0) { r=r0; gi=fi+fid; } else if(l==k) { r=r0; gi=fi; } else// if(l!=0 && l!=k) { r=r0+0.5*flit[l-1]*dr; gi=fi+flit[l-1]*fint[l-1]; } tf = TempF(gi, r); ts = tamb; dia = diam[kl]; HeatExchange(dia, tf, ts, &hf, &hb, c, &e); //call heatx( u , d , dia , tf , ts , hf , hb , c , e ) dtemp=max(0.0, tf-ts); dqdt=hb*dtemp; qcum[kl]+=(dqdt*dt); tcum[kl]+=(dtemp*dt); dteff=tcum[kl]/(tnext-dryt); heff=qcum[kl]/tcum[kl]; tfe=ts+dteff; dtlite=rindef; if(tfe>(tpig[k-1]+10.0)) dtlite=TIgnite(tpdry, tpig[k-1], tfe, condry[k-1], cheat[k-1], fmois[k-1], dendry[k-1], heff); tign[kl]=0.5*(dryt+dtlite); //c If k will ignite before time step over , must interpolate if(tnext>tign[kl]) { ts = tchar[k-1]; HeatExchange(dia, tf, ts, &hf, &hb, c, &e); qdot[kl][0]=hb*max(tf-ts, 0.0); qd=qdot[kl][0]; ddot[kl]=qd*work[k-1]; delt=tnext-tign[kl]; dnext=max(0.0, dia-delt*ddot[kl]); wnext=wo[kl]*pow2(dnext/dia); if(dnext==0.0) tout[kl]=tnow+dia/ddot[kl]; else if((dnext>0.0) && dnext<dia) { rate=dia/(dia-dnext); tout[kl]=tnow+rate*dt; } if(tout[kl]>tnow) { ddt=min(dt, (tout[kl]-tnow)); wodot[kl]=(wo[kl]-wnext)/ddt; } else wodot[kl]=0.0; diam[kl]=dnext; wo[kl]=wnext; } continue; // goto 10 } //c If k of ( k , l ) still coming up to drying temperature , accumulate //c heat input and driving temperature difference , predict drying start if(tnow<dryt) { factor=fmois[k-1]*dendry[k-1]; conwet=condry[k-1]+4.27e-04*factor; if(l==0) { r=r0; gi=fi+fid; } else if(l==k) { r=r0; gi=fi; } else if((l!=0) && (l!=k)) { r=r0+0.5*flit[l-1]*dr; gi=fi+flit[l-1]*fint[l-1]; } tf = TempF(gi, r); if(tf<=(tpdry+10.0)) continue; // goto 10 dia=diam[kl]; ts=0.5*(tamb+tpdry); HeatExchange(dia, tf, ts, &hf, &hb, c, &e); dtcum = max((tf-ts)*dt, 0.0); tcum[kl]+=dtcum; qcum[kl]+=(hb*dtcum); he=qcum[kl]/tcum[kl]; dtef=tcum[kl]/tnext; thd=(tpdry-tamb)/dtef; if(thd>0.9) continue; biot=he*dia/conwet; dryt=DryTime(biot, thd); cpwet=cheat[k-1]+ch2o*fmois[k-1]; fac=pow2(0.5*dia)/conwet; fac=fac*cpwet*dendry[k-1]; tdry[kl]=fac*dryt; if(tdry[kl]<tnext) { ts=tpdry; HeatExchange(dia, tf, ts, &hf, &hb, c, &e); dqdt=hb*(tf-ts); delt=tnext-tdry[kl]; qcum[kl]=dqdt*delt; tcum[kl]=(tf-ts)*delt; tbar=0.5*(tpdry+tpig[k-1]); //c See if ignition to occur before time step complete if(tf<=(tpig[k-1]+10.0)) continue; dtlite=TIgnite(tpdry, tpig[k-1], tf, condry[k-1], cheat[k-1] , fmois[k-1] , dendry[k-1], hb); tign[kl]=0.5*(tdry[kl]+dtlite); if(tnext>tign[kl]) { ts=tchar[k-1]; qdot[kl][0]=hb*max(tf-ts, 0.0); } } } } } //c Update fractions ignited and burned out , to apply at next step start for(k=1; k<=number; k++) // do k = 1 , number { flit[k-1]=0.0; fout[k-1]=0.0; for(l=0; l<=k; l++) //do l = 0 , k { kl=loc(k, l); if(tnext>=tign[kl]) flag=true; else flag=false; if(flag && tnext<=tout[kl]) flit[k-1]+=xmat[kl]; if(tnext>tout[kl]) fout[k-1]+=xmat[kl]; } } } //------------------------------------------------------------------------------ // // Start // //------------------------------------------------------------------------------ // subroutine START( dt , MXSTEP , now , maxno , number , wo , alfa , // + dendry , fmois , cheat , condry , diam , tpig , // + tchar , xmat , tambb , tpdry , fi , flit , fout , // + tdry , tign , tout , qcum , tcum , acum , qdot , // + ddot , wodot , work , u , d , r0 , dr , ch2o , // + ncalls , maxkl ) //c This routine initializes variables prior to starting sequence of calls //c to subroutine STEP. On input here, fi is area intensity of spreading //c fire , dt is the residence time for the spreading fire. Only physical //c parameters specified are the fuel array descriptors. To call STEP , //c one must initialize the following variables. //c //c Input parameters: //c //c dt = spreading fire residence time , sec //c MXSTEP = max dimension of historical sequences //c now = index marks end of time step //c maxno = max number of fuel components //c number = actual number of fuel components //c wo = current ovendry loading for the larger of //c each component pair, kg / sq m //c alfa = dry thermal diffusivity of component , sq m / s //c dendry = ovendry density of component , kg / cu m //c fmois = moisture fraction of component //c cheat = specific heat capacity of component , J / kg K //c condry = ovendry thermal conductivity , W / sq m K //c diam = current diameter of the larger of each //c fuel component pair , m //c tpig = ignition temperature ( K ) , by component //c tchar = end - pyrolysis temperature ( K ) , by component //c xmat = table of influence fractions between components //c tambb = ambient temperature ( K ) //c fi = current fire intensity ( site avg ) , kW / sq m //c //c Parameters updated [input and output] //c //c ncalls = counter of calls to this routine ... //c = 0 on first call or reset //c cumulates after first call //c flit = fraction of each component currently alight //c fout = fraction of each component currently gone out //c tdry = time of drying start of the larger of each //c fuel component pair //c tign = ignition time for the larger of each //c fuel component pair //c tout = burnout time of larger component of pairs //c qcum = cumulative heat input to larger of pair , J / sq m //c tcum = cumulative temp integral for qcum ( drying ) //c acum = heat pulse area for historical rate averaging //c qdot = history ( post ignite ) of heat transfer rate //c to the larger of each component pair //c ddot = diameter reduction rate , larger of pair , m / s //c wodot = dry loading loss rate for larger of pair //c //c Constant parameters //c //c u = mean horizontal windspeed at top of fuelbed //c d = fuelbed depth //c r0 = minimum value of mixing parameter //c dr = max - min value of mixing parameter //c ch2o = specific heat capacity of water , J / kg K //c hvap = heat of vaporization of water J / kg //c tpdry = temperature ( all components ) start drying ( K ) // real*4 wo( maxkl ) , alfa( maxno ) , dendry( maxno ) // real*4 fmois( maxno ) , cheat( maxno ) // real*4 condry( maxno ) , diam( maxkl ) , tpig( maxno ) // real*4 tchar( maxno ) , xmat( maxkl ) // real*4 tdry( maxkl ) , tign( maxkl ) // real*4 tout( maxkl ) , qcum( maxkl ) // real*4 tcum( maxkl ) , acum( maxkl ) // real*4 qdot( maxkl , MXSTEP ) , ddot( maxkl ) // real*4 wodot( maxkl ) , flit( maxno ) , fout( maxno ) // real*4 work( maxno ) bool BurnUp::Start(double dt, long now, long *ncalls) { long k, l, kl, nlit; double delm, heatk, r, tf, ts, thd, tx, factor; double conwet, dia, hg, hb, en, cpwet, fac; double hf, dryt, tsd, c, tigk, e, dtign, trt; double aint, ddt, dnext, wnext, df; const double rindef=1.e+30; //c Initialize time varying quantities and set up work( k ) //c The diameter reduction rate of fuel component k is given //c by the product of the rate of heat transfer to it, per //c unit surface area, and the quantity work( k ) for(k=1; k<=number; k++) //do k = 1 , number { fout[k-1]=0.0; flit[k-1]=0.0; alfa[k-1]=condry[k-1]/(dendry[k-1]*cheat[k-1]); //c effect of moisture content on burning rate (scale factor) delm=1.67* fmois[k-1]; //c effect of component mass density (empirical) heatk=dendry[k-1] / 446.0; //c empirical burn rate factor, J / cu m - K heatk=heatk*2.01e+06*(1.0+delm); //c normalize out driving temperature difference (Tfire - Tchar) //c to average value of lab experiments used to find above constants work[k-1]=1.0/(255.0*heatk); for(l=0; l<=k; l++) //do l = 0 , k { kl=loc(k, l); tout[kl]=rindef; tign[kl]=rindef; tdry[kl]=rindef; tcum[kl]=0.0; qcum[kl]=0.0; } } //c Make first estimate of drying start times for all components //c These times are usually brief and make little or no difference r=r0+0.25*dr; tf=TempF(fi, r); ts=tamb; if(tf<=(tpdry+10.0)) { strcat(Message, " STOP: Igniting fire cannot dry fuel"); return false; } thd=(tpdry-ts)/(tf-ts); tx=0.5*(ts+tpdry); //tpamb=tamb; for(k=1; k<=number; k++) //do k = 1 , number { factor=dendry[k-1]*fmois[k-1]; conwet=condry[k-1]+4.27e-04*factor; for(l=0; l<=k; l++) //do l = 0 , k { kl=loc(k, l); dia=diam[kl]; HeatExchange(dia, tf, tx, &hf, &hb, conwet, &en); dryt=DryTime(en, thd); cpwet=cheat[k-1]+fmois[k-1]*ch2o; fac=pow2(0.5*dia)/conwet; fac=fac*dendry[k-1]*cpwet; dryt=fac*dryt; tdry[kl]=dryt; } } //c Next , determine which components are alight in spreading fire tsd=tpdry; for(k=1; k<=number; k++) //do k = 1 , number { c=condry[k-1]; tigk=tpig[k-1]; for(l=0; l<=k; l++) //do l = 0 , k { kl=loc(k, l); dryt=tdry[kl]; if(dryt>=dt) continue; dia=diam[kl]; ts=0.5*(tsd+tigk); HeatExchange(dia, tf, ts, &hf, &hb, c, &e); tcum[kl]=max((tf-ts)*(dt-dryt), 0.0); qcum[kl]=hb * tcum[kl]; if(tf<=(tigk+10.0)) continue; dtign=TIgnite(tpdry, tpig[k-1], tf, condry[k-1], cheat[k-1], fmois[k-1], dendry[k-1], hb); trt=dryt+dtign; tign[kl]=0.5*trt; if(dt>trt) flit[k-1]+=xmat[kl]; } } nlit = 0; trt = rindef; //c Determine minimum ignition time and verify ignition exists for(k=1; k<=number; k++) //do k = 1 , number { if(flit[k-1]>0.0) nlit+=1; for(l=0; l<=k; l++) //do l = 0 , k { kl=loc(k, l); trt=min(trt, tign[kl]); } } if(nlit==0) { strcat(Message, " STOP: No Fuel Ignited"); return false; } //c Deduct trt from all time estimates , resetting time origin for(k=1; k<=number; k++) //do k = 1 , number { for(l=0; l<=k; l++)// do l = 0 , k { kl = loc(k, l); if(tdry[kl]<rindef) tdry[kl]-=trt; if(tign[kl]<rindef) tign[kl]-=trt; } } //c Now go through all component pairs and establish burning rates //c for all the components that are ignited; extrapolate to end time dt for(k=1; k<=number; k++) //do k = 1 , number { if(flit[k-1]==0.0) { for(l=0; l<=k; l++)// do l = 0 , k { kl=loc(k, l); ddot[kl]=0.0; tout[kl]=rindef; wodot[kl]=0.0; } } else { ts=tchar[k-1]; c=condry[k-1]; for(l=0; l<=k; l++) //do l = 0 , k { kl=loc(k, l); dia=diam[kl]; HeatExchange(dia, tf, ts, &hf, &hb, c, &e); qdot[kl][now-1]=hb*max((tf-ts), 0.0); aint=pow2(c/hb); ddt=dt-tign[kl]; acum[kl]=aint * ddt; ddot[kl]=qdot[kl][now-1]*work[k-1]; tout[kl]=dia/ddot[kl]; dnext=max(0.0, (dia-ddt*ddot[kl])); wnext=wo[kl]*pow2(dnext/dia); wodot[kl]=(wo[kl]-wnext)/ddt; diam[kl]=dnext; wo[kl]=wnext; df=0.0; if(dnext<=0.0) { df=xmat[kl]; wodot[kl]=0.0; ddot[kl]=0.0; } flit[k-1]-=df; fout[k-1]+=df; } } } *ncalls = 0; return true; } //------------------------------------------------------------------------------ // // Sorter // //------------------------------------------------------------------------------ // subroutine SORTER( maxno , number , sigma , fmois , dendry , key ) // //c Sorts fuel element list in order of increasing size (decreasing sigma) //c For elements with same size, order determined on increasing moisture //c content (fmois). If items have same size and moisture content, order //c on the basis of increasing mass density (dendry). "number" elements are //c included in the list, which has a maximum length of "maxno". The integer //c list: key( j ) , j = 1 , number holds the indices in order, so other //c fuel parameters can be ordered and associated as necessary. // real*4 sigma( maxno ) , fmois( maxno ) , dendry( maxno ) // integer key( maxno ) void BurnUp::Sorter() { long i, j, keep; double s, fm, de, usi; bool diam, mois, dens, tied, earlyout; for(j=0; j<MAXNO; j++) //do j=1 , maxno key[j]=j; //c Replacement sort: order on increasing size , moisture , density for(j=2; j<=number; j++) //do j = 2 , number { s=1.0/sigma[j-1]; fm = fmois[j-1]; de = dendry[j-1]; keep = key[j-1]; for(i=(j-2); i>=0; i--) //do i = ( j - 1 ) , 1 , -1 { earlyout=true; usi = 1.0/sigma[i]; if(usi<s) diam=true; else diam=false; if(diam) break;// goto 10 if(usi==s) tied=true; else tied=false; if(tied) //goto 05 { if(fmois[i]<fm) mois=true; else mois=false; if( mois ) break; //goto 10 if(fmois[i]==fm) tied=true; else tied=false; if(tied) { if(dendry[i]<=de) dens=true; else dens=false; if(dens) break;// goto 10 } } sigma[i+1]=sigma[i]; fmois[i+1]=fmois[i]; dendry[i+1]=dendry[i]; key[i+1]=key[i]; earlyout=false; } if(!earlyout) i=0; sigma[i+1]=1.0/s; fmois[i+1]=fm; dendry[i+1]=de; key[i+1]=keep; } } //------------------------------------------------------------------------------ // // OvLaps // //------------------------------------------------------------------------------ void BurnUp::OverLaps() { // wdry , sigma , dendry , ak , number , maxno , maxkl , beta , elam , alone , area ) // Computes the interaction matrix elam( j , k ) which apportions the // influence of smallxer and equal size pieces on each size class for the // purpose of establishing the rates at which the elements burn out. // Input quantities are: wdry , the ovendry mass per unit area of each // element available for burning after the passage of the igniting surface // fire; sigma , the particle's surface / volume ratio , and dendry , the // ovendry mass density of the particle; ak a dimensionless parameter that // scales the planform area of a particle to its area of influence. There // are "number" separate particle classes, of a maximum number = maxno. // It is assumed that the lists are ordered on size class (nonincreasing // surface / volume ratio). List "alone" gives the fraction of each loading // that is not influenced by any other category. //double wdry[MAXNO] , sigma[MAXNO] , dendry[MAXNO]; //double beta[MAXKL] , elam[MAXNO][MAXNO] , alone[MAXNO]; //double area[MAXNO]; long j, k, l, kj, kl; double a, bb, pi, siga, frac; pi = fabs(acos(-1.0)); for(j=1; j<=number; j++) //do j = 1 , number { alone[j-1]=0.0; for(k=1; k<=j; k++)// do k = 1 , j { kj = loc(j, k); xmat[kj]=0.0; } for(k=1; k<=number; k++) //do k = 1 , number elam[j-1][k-1] = 0.0; } for(k=1; k<=number; k++) // do k = 1 , number { for(l=1; l<=k; l++) //do l = 1 , k { ak=3.25*exp(-20.0*pow2(fmois[l-1])); siga = ak * sigma[k-1]/pi; kl = loc(k, l); a = siga*wdry[l-1]/dendry[l-1]; if(k==l) { bb = 1.0 - exp(-a); if(bb<1e-30) bb=1e-30; area[k-1]=bb; } else //if(k!=1) bb = min(1.0, a); xmat[kl]=bb; } } if(number==1) { elam[0][0]=xmat[1]; alone[0]=1.0- elam[0][0]; return; } for(k=1; k<=number; k++) // do k = 1 , number { frac=0.0; for(l=1; l<=k; l++) // do l = 1 , k { kl=loc(k, l); frac+=xmat[kl]; } if(frac>1.0) { for(l=1; l<=k; l++) //do l = 1 , k { kl=loc(k, l); elam[k-1][l-1]=xmat[kl]/frac; } alone[k-1]=0.0; } else { for(l=1; l<=k; l++) // do l = 1 , k { kl=loc(k, l); elam[k-1][l-1]=xmat[kl]; } alone[k-1]=1.0-frac; } } } //------------------------------------------------------------------------------ // // subroutine HEATX() // //------------------------------------------------------------------------------ void BurnUp::HeatExchange(double dia , double tf , double ts , double *hfm , double *hbar , double cond, double *en)// returns en { // Given horizontal windspeed u at height d [top of fuelbed], cylindrical // fuel particle diameter dia, fire environment temperature tf, and mean // surface temperature, ts, subroutine returns film heat transfer coefficient // hfm and an "effective" film heat transfer coefficient including radiation // heat transfer, hbar. Using the wood's thermal conductivity, cond, the // modified Nusselt number [ en ] used to estimate onset of surface drying // is returned as well. double v, re, enuair, conair, fac, hfmin; const double g = 9.8; const double vis = 7.5e-05; const double a = 8.75e-03; const double b = 5.75e-05; const double rad = 5.67e-08; const double fmfac = 0.382; const double hradf = 0.5; double hrad; *hfm = 0.0; if(dia>b) { v =sqrt(u*u+0.53*g*d); re =v*dia/vis; enuair =0.344*pow(re, 0.56); conair =a+b*tf; fac =sqrt(fabs(tf-ts)/dia); hfmin =fmfac*sqrt(fac); *hfm =max((enuair*conair/dia), hfmin); } hrad=hradf*rad*(tf+ts)*(tf*tf+ts*ts); *hbar=*hfm+hrad; *en=*hbar*dia/cond; } //------------------------------------------------------------------------------ // // FIRINT.CPP // //------------------------------------------------------------------------------ double BurnUp::FireIntensity() { //wodot , ash , htval , maxno , number , maxkl , area , fint , fi ) // Computes fi = site avg fire intensity given the burning rates of all // interacting pairs of fuel components [ wodot ] , the mineral ash content // of each component [ ash ] , the heat of combustion value [ htval ] for // each , and the number of fuel components [ number ] , where max = maxno. // fi is in kW / sq m , while htval is in J / kg. // fint( k ) is the correction to fi to adjust // the intensity level to be the local value where size k is burning. // real*4 ash( maxno ) , htval( maxno ) // real*4 wodot( maxkl ) , area( maxno ) , fint( maxno ) // data smallx / 1.e-06 / long k, l, kl, k0; double sum, wdotk, ark, term; double wnoduff, wnoduffsum, noduffsum, test, noduffterm;//, fintnoduff[MAXNO]; double fracf; sum=noduffsum=wnoduffsum=0.0; for(k=1; k<=number; k++) { wdotk=wnoduff=0.0; for(l=0; l<=k; l++) { kl = loc(k, l); wdotk+=wodot[kl]; //if(l>0) // wnoduff+=wodot[kl]; //else // Smoldering[k-1]+=wodot[kl]; } term=(1.0-ash[k-1])*htval[k-1]*wdotk*1.e-03; ark=area[k-1]; if(ark>smallx) fint[k-1]=term/ark-term; else fint[k-1] = 0.0; k0=loc(k, 0); Smoldering[k-1]=wodot[k0]; wnoduff=wdotk-Smoldering[k-1]; noduffterm=(1.0-ash[k-1])*htval[k-1]*wnoduff*1.e-03; if(wnoduff>0.0) { fracf=wnoduff/wdotk; test=fracf*fint[k-1]; } else test=0.0; //-------------------------------------- // flaming and smoldering decision here //-------------------------------------- if(test>FintSwitch/ark-FintSwitch) Flaming[k-1]+=wnoduff; //wdotk; else Smoldering[k-1]+=wnoduff; //wdotk; //-------------------------------------- //-------------------------------------- sum+=term; noduffsum+=noduffterm; wnoduffsum+=wnoduff; } return sum; } void BurnUp::SetFintSwitch(double fint) { FintSwitch=fint; } long BurnUp::GetFintSwitch() { return FintSwitch; } //------------------------------------------------------------------------------ // // subroutine DRYTIM( enu , theta , tau ) // //------------------------------------------------------------------------------ double BurnUp::func(double h, double theta) { const double a = 0.7478556; const double b = 0.4653628; const double c = 0.1282064; return h*(b-h*(c-h))-(1.0-theta)/a; } double BurnUp::DryTime(double enu, double theta) { // Given a Nusselt number ( enu , actually Biot number = h D / k ) // and the dimensionless temperature rise required for the start // of surface drying ( theta ), returns the dimensionless time ( tau ) // needed to achieve it. The time is given multiplied by thermal // diffusivity and divided by radius squared. Solution by binary search. long n; double tau; double x, xl, xh, xm; const double p = 0.47047; xl=0.0; xh=1.0; for(n=0; n<15; n++) { xm=0.5*(xl+xh); if(func(xm, theta)<0.0) xl = xm; else xh = xm; } x=(1.0/xm-1.0)/p; tau=pow2(0.5*x/enu); return tau; } //------------------------------------------------------------------------------ // // Stash // //------------------------------------------------------------------------------ // subroutine STASH( time , now , maxno , number , outfil , fi , // + flit , fout , wo , wodot , diam , ddot , // + tdry , tign , tout , fmois , maxkl , nun ) //c This routine stashes output from the BURNUP model package on a snapshot //c basis. Every time it is called, it "dumps" a picture of the status of //c each component of the fuel complex, as a table of interacting pairs. // real*4 wo( maxkl ) , wodot( maxkl ) // real*4 diam( maxkl ) , ddot( maxkl ) // real*4 flit( maxno ) , fout( maxno ) // real*4 tdry( maxkl ) , tign( maxkl ) // real*4 tout( maxkl ) , fmois( maxno ) // character*12 outfil , histry // logical snaps void BurnUp::Stash(char *HistFile, char *SnapFile, double time, long now) { long m, mn, n; double wd, wg, wgm; double wdm, wgf, wdf, fmm; FILE *histfile, *snapfile; if(now==1)// if( now .EQ. 1 ) then { histfile=fopen(HistFile, "w"); snapfile=fopen(SnapFile, "w"); wd = 0.0; wg = 0.0; for(m=1; m<=number; m++) //do m = 1 , number { fmm = fmois[m-1]; wdm = 0.0; for(n=0; n<=m; n++) //do n = 0 , m { mn = loc(m, n); wdm = wdm + wo[mn]; } wgm=wdm*(1.0+fmm); wd+=wdm; wg+=wgm; } wd0=wd; wg0=wg; } else { histfile=fopen(HistFile, "a"); snapfile=fopen(SnapFile, "a"); } fprintf(snapfile, "\n%lf %lf\n", time, fi); wd=0.0; wg=0.0; for(m=1; m<=number; m++) //do m = 1 , number { fmm=fmois[m-1]; wdm=0.0; fprintf(snapfile, "%lf %lf %lf\n", time, flit[m-1], fout[m-1]); for(n=0; n<=m; n++) //do n = 0 , m { mn=loc(m, n); wdm+=wo[mn];//(wo[mn]*wodot[mn]*dt); fprintf(snapfile, " %lf %lf %lf %lf %lf %lf %lf %lf\n", time, wo[mn], wodot[mn], diam[mn], ddot[mn], tdry[mn], tign[mn], tout[mn]); } fprintf(snapfile, "\n"); wgm=wdm*(1.0+fmm); wd+=wdm; wg+=wgm; } wgf = wg/wg0; wdf = wd/wd0; fprintf(histfile, "%lf %lf %lf %lf %lf %lf\n", time, wg, wd, wgf, wdf, fi); fclose(histfile); fclose(snapfile); } bool BurnUp::AllocBurnStruct() { FreeBurnStruct(); bs=new BurnStruct[ntimes]; if(bs==NULL) return false; ZeroMemory(bs, ntimes*sizeof(BurnStruct)); return true; } void BurnUp::FreeBurnStruct() { if(bs) delete[] bs; bs=0; } void BurnUp::SetBurnStruct(double time, long now) { long i, m, mn, n; double wd; double wdm, wdf; double wt[2]={0.0, 0.0}; if(now==1)// if( now .EQ. 1 ) then { wd = 0.0; for(m=1; m<=number; m++) //do m = 1 , number { wdm = 0.0; for(n=0; n<=m; n++) //do n = 0 , m { mn = loc(m, n); wdm = wdm + wo[mn]; } wd+=wdm; } wd0=wd; } wd=0.0; for(m=1; m<=number; m++) //do m = 1 , number { wdm=0.0; for(n=0; n<=m; n++) //do n = 0 , m { mn=loc(m, n); wdm+=wo[mn];//(wo[mn]*wodot[mn]*dt); } wd+=wdm; } wdf = wd/wd0; for(i=0; i<MAXNO; i++) { wt[0]+=Flaming[i]; wt[1]+=Smoldering[i]; Flaming[i]=Smoldering[i]=0.0; } wt[1]+=Smoldering[MAXNO]; if(now>ntimes) // don't overflow the buffer return; bs[now-1].time=time; bs[now-1].wdf=wdf; if(wt[0]+wt[1]>0.0) bs[now-1].ff=wt[0]/(wt[0]+wt[1]); else bs[now-1].ff=0.0; } bool BurnUp::Summary(char *OutFile) { long m, n, mn; double fr, ti, ts, to, tf, wd, rem, di; FILE *outfile; if((outfile=fopen(OutFile, "w"))==NULL) return false; fprintf(outfile, "%s\t %s\t %s\t %s\t %s\t %s\t %s\t %s\n", "#", "wt", "fmst", "~D", "ts", "tf", "rem", "%rem"); for(m=1; m<=number; m++) { fprintf(outfile, "%3ld\t %3.2lf\t %3.2lf\t %3.2lf\t", m, wdry[m-1], fmois[m-1], 4.0/sigma[m-1]); rem=0.0; ts=1.0e31; tf=0.0; for(n=0; n<=m; n++) { mn = loc(m, n); fr = xmat[mn]; ti = tign[mn]; ts = min(ti, ts); to = tout[mn]; tf = max(to, tf); wd = wo[mn]; rem = rem + wd; di = diam[mn]; // fprintf(outfile, "\n %ld %lf %lf %lf %lf", n, fr, ti, to, wd, di); } fprintf(outfile, " %8.2lf\t %10.2lf\t %3.4lf\t %3.2lf\n", ts, tf, rem, rem/wdry[m-1]); } fclose(outfile); return true; } //------------------------------------------------------------------------------ // // CurveFit Stuff // //------------------------------------------------------------------------------ /* long BurnUp::GetRegressionCoefficients(double **coefs, long *NumCalcs) { *coefs=aa; *NumCalcs=now; return ma; } */ bool BurnUp::AllocRegressionData(long ndata) { if(ndata>=NumAllocRegrData) { FreeRegressionData(ndata); x=new double[ndata]; y=new double[ndata]; if(x==NULL || y==NULL) { FreeRegressionData(ndata); return false; } NumAllocRegrData=ndata; } ZeroMemory(x, ndata*sizeof(double)); ZeroMemory(y, ndata*sizeof(double)); return true; } void BurnUp::FreeRegressionData(long /*ndata*/) { if(x) delete[] x; if(y) delete[] y; x=y=0; NumAllocRegrData=0; } long BurnUp::GetSamplePoints(long Flaming, long NumberOfPts)//, double **xs, double **ys, long *numcalcs) { long i, j; long NewPointPos, *pts, NewPoint, NumInSample, MaxNum; double NewX, NewY; double interval, xtest, ytest, ymid, ydiff, ymax; ma=NumberOfPts; if(ma<4) ma=4; AllocRegressionData(ma); pts=new long[ma]; NumInSample=3; if(Flaming) // find end of flaming period { for(i=0; i<now; i++) { if(bs[i].ff>0.0) MaxNum=i; } MaxNum++; } else MaxNum=now; MaxNum--; while(bs[MaxNum].time==0.0) { MaxNum--; if(MaxNum<0) break; } interval=(double) (MaxNum)/(double) NumInSample; // fill out the initial array if(interval==0) { if(pts) delete[] pts; return NumInSample; } else if(interval<1.0) interval=1.0; NumInSample++; for(i=0; i<NumInSample; i++) { j=(long)((double) i * interval); //GetBurnStruct(j, &bpx); pts[i]=j; x[i]=bs[j].time/60.0; if(!Flaming) y[i]=bs[j].wdf; // for nonlinear stuff and .wdf else y[i]=bs[j].ff; } NewPointPos=0; NewPoint=1; NewX=x[0]; do { // check error for individual spans ymax=0.0; for(i=1; i<NumInSample; i++) { interval=pts[i]-pts[i-1]; j=(long) ((double) pts[i-1] + interval/2.0); if(j<1) continue; //GetBurnStruct(j, &bpx); xtest=bs[j].time/60.0;//bpx.time/3600.0; if(!Flaming) ytest=bs[j].wdf;//bpx.wdf; // for nonlinear stuff and .wdf else ytest=bs[j].ff;//bpx.fi; if(fabs(x[i-1]-x[i])>1e-6) { ymid=y[i-1]-(y[i-1]-y[i])*(x[i-1]-xtest)/(x[i-1]-x[i]); ydiff=fabs(ymid-ytest); if(ydiff>ymax) { ymax=ydiff; NewX=xtest; NewY=ytest; NewPointPos=i; NewPoint=j; } } } if(NewX!=x[NewPointPos]) { MoveMemory(&x[NewPointPos+1], &x[NewPointPos], (NumInSample-NewPointPos)*sizeof(double)); MoveMemory(&y[NewPointPos+1], &y[NewPointPos], (NumInSample-NewPointPos)*sizeof(double)); MoveMemory(&pts[NewPointPos+1], &pts[NewPointPos], (NumInSample-NewPointPos)*sizeof(long)); x[NewPointPos]=NewX; y[NewPointPos]=NewY; pts[NewPointPos]=NewPoint; NumInSample++; } else ma--; } while(NumInSample<ma); if(pts) delete[] pts; //*xs=x; //*ys=y; //*numcalcs=MaxNum; return ma; } bool BurnUp::GetSample(long num, double *xpt, double *ypt) { if(num<NumAllocRegrData) { *xpt=x[num]; *ypt=y[num]; return true; } return false; } bool BurnUp::GetBurnStruct(long Num, BurnStruct *Bs) { if(Num>now-1) return false; *Bs=bs[Num]; return true; } long BurnUp::GetNumOutputData() { return now; } /* void polynom(double x, double a[], long n); void polynom(double x, double a[], long n) { long i; a[1]=1.0; for(i=2; i<=n; i++) a[i]=a[i-1]*x; } long BurnUp::RunPolynomialRegression(long Flaming) { long ndata; long i, j, maxnum; double maxval; double oldchisq, chisq; double tempaa[20]={0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}; maxval=0.0; maxnum=0; for(i=0; i<now; i++) { if(bs[i].wdf>maxval) // really just using weight loss % { maxval=bs[i].wdf; maxnum=i; } } ndata=now-maxnum; if(AllocRegressionData(ndata)==false) return 0; j=-1; if(Flaming) { for(i=maxnum; i<now; i++) { j++; x[j]=bs[i].time/60.0; y[j]=bs[i].ff; // for nonlinear stuff and .wdf } } else { for(i=maxnum; i<now; i++) { j++; x[j]=bs[i].time/60.0; y[j]=bs[i].wdf; // for nonlinear stuff and .wdf } } for(i=0; i<ndata; i++) sig[i]=1;///=maxval+0.00001; if(!Flaming) { sig[ndata-1]=0.01; sig[0]=0.01; // no weighted regression with intensity data } // find regression with minimum chi-squared, start with 4 parameters ma=4; LinearModel(ma, ndata, &chisq); memcpy(tempaa, aa, 4*sizeof(double)); oldchisq=chisq; for(i=5; i<20; i++) { LinearModel(i, ndata, &chisq); if(oldchisq-chisq>0.01) { oldchisq=chisq; memcpy(tempaa, aa, i*sizeof(double)); ma=i; } else break; } memcpy(aa, tempaa, 20*sizeof(double)); return ma; } long BurnUp::LinearModel(long ma, long ndata, double *Chisq) { double chisq; vx=dmatrix(1, ma, 1, ma); svdfit(x-1, y-1, sig-1, ndata, aa-1, ma, ux, vx, w, &chisq, (*polynom)); *Chisq=chisq; if(vx) GlobalFree_dmatrix(vx, 1, ma, 1, ma); vx=0; return ndata; } */
[ "kyle@pobox.com" ]
kyle@pobox.com
c7ff5731b2195f26cfba0441cdef4ca83d639f67
bcf6d899cdb948b17cadff23cb229bc6992949d7
/TP1/1°Lista/.Primeira Lista - Projetos UI end + UML/_PRONTO!!!/ProjetoPaciente/ProjetoPaciente/mainwindow.cpp
86ba2992e9f1d3cb6e12fd472ade6a362d2975cd
[]
no_license
YugoVtr/QT
06d8b10f6de6dc98e7be82799b6f3c16f0d9b2ce
702985b63d5473529e407069e0945aca0c17acc1
refs/heads/master
2021-01-21T20:34:07.379678
2017-06-08T02:52:43
2017-06-08T02:52:43
92,247,583
0
0
null
null
null
null
UTF-8
C++
false
false
978
cpp
#include "mainwindow.h" #include "ui_mainwindow.h" MainWindow::MainWindow(QWidget *parent) : QMainWindow(parent), ui(new Ui::MainWindow) { ui->setupUi(this); } MainWindow::~MainWindow() { delete ui; } void MainWindow::on_pushButtonCalcular_clicked() { try {//Monitoramento das exeções //capturar as informações QString nome = ui->lineEditNome->text(); int peso = ui->lineEditPeso->text().toInt(); float altura = ui->lineEditAltura->text().toFloat(); //Criar valore porpassar valores por parametro PrimeiraLista::Paciente pacienteX; pacienteX.setNome(nome); pacienteX.setPeso(peso); pacienteX.setAltura(altura); //Variavel para saida QString saida; saida = pacienteX.getNome()+" esta "+pacienteX.calcularFaixaDePeso(); ui->lineEditSaida->setText(saida); } catch (QString &erro) { QMessageBox::information(this,"ERRO",erro); } }
[ "vtrhg69@hotmail.com" ]
vtrhg69@hotmail.com
416d883b4203b13e145824ec280064926ee1773f
005ead270fdff9ad85513d0b2e345dea11e2fbb4
/Q040_Combination Sum II.cpp
f1cd96ec21b99ec245f23040524fce212d21e8c4
[]
no_license
wangqinghe95/Code-Leetcode
222d5d50e5f81b25549d61810618a50849fc3269
3cdcdf2047e0c41485817e04c8e23853e9332c63
refs/heads/master
2023-04-29T20:44:22.764343
2021-05-16T05:40:27
2021-05-16T05:40:27
274,806,554
0
0
null
null
null
null
UTF-8
C++
false
false
2,094
cpp
/* 在一个数组中找到和为target的组合 用一个hash映射来表示出现数字的值和次数关系 再用回溯直接求出所有可能 采用两个措施来剪枝 1、判断当前选中的值是否大于target(或者剩余的值是否大于0) 2、选择的数的个数是否超出总体个数 */ class Solution { vector<pair<int,int>> freq; vector<vector<int>> ans; vector<int> sequence; public: void dfs(int pos, int rest){ if(rest == 0){ ans.push_back(sequence); return; } if (pos == freq.size() || rest < freq[pos].first){ return; } dfs(pos+1, rest); int most = min(rest / freq[pos].first, freq[pos].second); for (int i = 1; i <= most; ++i){ sequence.push_back(freq[pos].first); dfs(pos+1, rest-i*freq[pos].first); } for(int i = 1; i <= most; ++i){ sequence.pop_back(); } } vector<vector<int>> combinationSum2(vector<int>& candidates, int target) { sort(candidates.begin(), candidates.end()); for(int num : candidates){ if (freq.empty() || num != freq.back().first){ freq.emplace_back(num, 1); } else{ ++freq.back().second; } } dfs(0, target); return ans; } }; /* 方法二使用排序来代替方法一的频率 */ \class Solution { public: vector<vector<int>> res; vector<int> tmp; void backtrace(vector<int>& candidates, int target, int index) { if (0 == target) { res.push_back(tmp); return; } for (int i = index; i < candidates.size() && target - candidates[i] >= 0; ++i) { if (i > index && candidates[i] == candidates[i - 1]) { continue; } tmp.push_back(candidates[i]); backtrace(candidates, target - candidates[i], i + 1); tmp.pop_back(); } } vector<vector<int>> combinationSum2(vector<int>& candidates, int target) { sort(candidates.begin(), candidates.end()); backtrace(candidates, target, 0); return res; } };
[ "675072584@qq.com" ]
675072584@qq.com
78712305cb7823b556e6f3b8156418cbcb6b2c97
a9a18e8bbe336b9c5e89d280c91a050c58f9ee01
/node/c++_addon/hello.cc
1af055ccac0c7801da436c2f9a6c56db51d2af26
[]
no_license
dalent/gitcode
1757ae95326f1080ceeaa58d25ee55ca1f275c8c
53267bfae1f6268323639a3a28ee9aec381f87e0
refs/heads/master
2021-01-17T10:45:50.640395
2017-03-02T02:21:16
2017-03-02T02:21:16
13,564,066
1
0
null
null
null
null
UTF-8
C++
false
false
342
cc
#include <node.h> #include <v8.h> using namespace v8; Handle<Value> Method(const Arguments& args) { HandleScope scope; return scope.Close(String::New("world")); } void init(Handle<Object> exports) { exports->Set(String::NewSymbol("hello"), FunctionTemplate::New(Method)->GetFunction()); } NODE_MODULE(hello, init)
[ "anqiu1987@sina.com" ]
anqiu1987@sina.com
2a9737e712be3e710a6d1dc1fec45bd9993f3359
8f72438d5f4ca7219df3ae7799c3282faab5e33e
/Uva/Uva - 1124 Celebrity jeopardy.cpp
b50076e1d1fa55f5974b24ca9c77e0e0d879c983
[]
no_license
mdzobayer/Problem-Solving
01eda863ef2f1e80aedcdc59bbaa48bcaeef9430
a5b129b6817d9ec7648150f01325d9dcad282aed
refs/heads/master
2022-08-15T22:04:18.161409
2022-08-08T11:46:00
2022-08-08T11:46:00
165,687,520
0
1
null
null
null
null
UTF-8
C++
false
false
990
cpp
#include <bits/stdc++.h> using namespace std; /// Read & Write to File Short-Cut #define fRead(x) freopen(x, "r", stdin) #define fWrite(x) freopen(x, "w", stdout) /// Data type Short-Cut #define LLI long long int #define ULL unsigned long long int #define ff first #define ss second #define mk make_pair #define phb push_back #define ppb pop_back #define phf push_front #define ppf pop_front /// Input Short-Cut #define scan(a) scanf("%d", &a); #define scan2(a, b) scanf("%d %d", &a, &b); #define scan3(a, b, c) scanf("%d %d %d", &a, &b, &c); #define scan4(a, b, c, d) scanf("%d %d %d %d", &a, &b, &c, &d); /// Utility #define SQR(x) ((x) * (x)) #define PI acos(-1.0) /// Fast Read and de-active buffer flash #define FastRead std::cin.sync_with_stdio(false);std::cin.tie(nullptr); ///======================== Let's GO ======================== int main() { FastRead fRead("in.txt"); string s; while(getline(cin, s)) { cout << s << endl; } return (0); }
[ "mdzobayer@rocketmail.com" ]
mdzobayer@rocketmail.com
582603f034c5e65c5645c63a5833769a0ea394e4
4b86dafab3b94532e4308988352a53659fa7b854
/hls/resnet50_3/solution1/syn/systemc/dataflow_in_loop.cpp
d9dcd7f91b9978bc5b83929565cc739f89609260
[]
no_license
sterngerlach/ResNet-50_INT8
22842ee435f8d7574f05b1c40aa82cb714df8edf
e813beb03158b7df5eee46e9382011a140f6ead2
refs/heads/main
2023-08-25T01:41:56.795030
2021-11-04T04:49:11
2021-11-04T04:49:11
null
0
0
null
null
null
null
UTF-8
C++
false
false
36,438
cpp
// ============================================================== // RTL generated by Vivado(TM) HLS - High-Level Synthesis from C, C++ and SystemC // Version: 2019.1.3 // Copyright (C) 1986-2019 Xilinx, Inc. All Rights Reserved. // // =========================================================== #include "dataflow_in_loop.h" #include "AESL_pkg.h" using namespace std; namespace ap_rtl { const sc_logic dataflow_in_loop::ap_const_logic_1 = sc_dt::Log_1; const sc_lv<4> dataflow_in_loop::ap_const_lv4_0 = "0000"; const sc_logic dataflow_in_loop::ap_const_logic_0 = sc_dt::Log_0; const sc_lv<1024> dataflow_in_loop::ap_const_lv1024_lc_1 = "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"; const sc_lv<10> dataflow_in_loop::ap_const_lv10_0 = "0000000000"; const sc_lv<32> dataflow_in_loop::ap_const_lv32_0 = "00000000000000000000000000000000"; const sc_lv<2> dataflow_in_loop::ap_const_lv2_0 = "00"; const sc_lv<2> dataflow_in_loop::ap_const_lv2_1 = "1"; const sc_lv<1> dataflow_in_loop::ap_const_lv1_0 = "0"; const sc_lv<1> dataflow_in_loop::ap_const_lv1_1 = "1"; const sc_lv<3> dataflow_in_loop::ap_const_lv3_0 = "000"; const sc_lv<128> dataflow_in_loop::ap_const_lv128_lc_1 = "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"; const sc_lv<16> dataflow_in_loop::ap_const_lv16_0 = "0000000000000000"; dataflow_in_loop::dataflow_in_loop(sc_module_name name) : sc_module(name), mVcdFile(0) { weight_V_U = new dataflow_in_loop_weight_V("weight_V_U"); weight_V_U->clk(ap_clk); weight_V_U->reset(ap_rst); weight_V_U->i_address0(fc_load_weight_U0_weight_V_address0); weight_V_U->i_ce0(fc_load_weight_U0_weight_V_ce0); weight_V_U->i_we0(fc_load_weight_U0_weight_V_we0); weight_V_U->i_d0(fc_load_weight_U0_weight_V_d0); weight_V_U->i_q0(weight_V_i_q0); weight_V_U->t_address0(fc_compute_1_U0_weight_V_address0); weight_V_U->t_ce0(fc_compute_1_U0_weight_V_ce0); weight_V_U->t_we0(ap_var_for_const0); weight_V_U->t_d0(ap_var_for_const1); weight_V_U->t_q0(weight_V_t_q0); weight_V_U->i_ce(ap_var_for_const2); weight_V_U->t_ce(ap_var_for_const2); weight_V_U->i_full_n(weight_V_i_full_n); weight_V_U->i_write(fc_load_weight_U0_ap_done); weight_V_U->t_empty_n(weight_V_t_empty_n); weight_V_U->t_read(fc_compute_1_U0_ap_ready); fc_load_weight_U0 = new fc_load_weight("fc_load_weight_U0"); fc_load_weight_U0->ap_clk(ap_clk); fc_load_weight_U0->ap_rst(ap_rst); fc_load_weight_U0->ap_start(fc_load_weight_U0_ap_start); fc_load_weight_U0->ap_done(fc_load_weight_U0_ap_done); fc_load_weight_U0->ap_continue(fc_load_weight_U0_ap_continue); fc_load_weight_U0->ap_idle(fc_load_weight_U0_ap_idle); fc_load_weight_U0->ap_ready(fc_load_weight_U0_ap_ready); fc_load_weight_U0->weight_V_address0(fc_load_weight_U0_weight_V_address0); fc_load_weight_U0->weight_V_ce0(fc_load_weight_U0_weight_V_ce0); fc_load_weight_U0->weight_V_we0(fc_load_weight_U0_weight_V_we0); fc_load_weight_U0->weight_V_d0(fc_load_weight_U0_weight_V_d0); fc_load_weight_U0->m_axi_ddr_V_AWVALID(fc_load_weight_U0_m_axi_ddr_V_AWVALID); fc_load_weight_U0->m_axi_ddr_V_AWREADY(ap_var_for_const0); fc_load_weight_U0->m_axi_ddr_V_AWADDR(fc_load_weight_U0_m_axi_ddr_V_AWADDR); fc_load_weight_U0->m_axi_ddr_V_AWID(fc_load_weight_U0_m_axi_ddr_V_AWID); fc_load_weight_U0->m_axi_ddr_V_AWLEN(fc_load_weight_U0_m_axi_ddr_V_AWLEN); fc_load_weight_U0->m_axi_ddr_V_AWSIZE(fc_load_weight_U0_m_axi_ddr_V_AWSIZE); fc_load_weight_U0->m_axi_ddr_V_AWBURST(fc_load_weight_U0_m_axi_ddr_V_AWBURST); fc_load_weight_U0->m_axi_ddr_V_AWLOCK(fc_load_weight_U0_m_axi_ddr_V_AWLOCK); fc_load_weight_U0->m_axi_ddr_V_AWCACHE(fc_load_weight_U0_m_axi_ddr_V_AWCACHE); fc_load_weight_U0->m_axi_ddr_V_AWPROT(fc_load_weight_U0_m_axi_ddr_V_AWPROT); fc_load_weight_U0->m_axi_ddr_V_AWQOS(fc_load_weight_U0_m_axi_ddr_V_AWQOS); fc_load_weight_U0->m_axi_ddr_V_AWREGION(fc_load_weight_U0_m_axi_ddr_V_AWREGION); fc_load_weight_U0->m_axi_ddr_V_AWUSER(fc_load_weight_U0_m_axi_ddr_V_AWUSER); fc_load_weight_U0->m_axi_ddr_V_WVALID(fc_load_weight_U0_m_axi_ddr_V_WVALID); fc_load_weight_U0->m_axi_ddr_V_WREADY(ap_var_for_const0); fc_load_weight_U0->m_axi_ddr_V_WDATA(fc_load_weight_U0_m_axi_ddr_V_WDATA); fc_load_weight_U0->m_axi_ddr_V_WSTRB(fc_load_weight_U0_m_axi_ddr_V_WSTRB); fc_load_weight_U0->m_axi_ddr_V_WLAST(fc_load_weight_U0_m_axi_ddr_V_WLAST); fc_load_weight_U0->m_axi_ddr_V_WID(fc_load_weight_U0_m_axi_ddr_V_WID); fc_load_weight_U0->m_axi_ddr_V_WUSER(fc_load_weight_U0_m_axi_ddr_V_WUSER); fc_load_weight_U0->m_axi_ddr_V_ARVALID(fc_load_weight_U0_m_axi_ddr_V_ARVALID); fc_load_weight_U0->m_axi_ddr_V_ARREADY(m_axi_ddr_V_ARREADY); fc_load_weight_U0->m_axi_ddr_V_ARADDR(fc_load_weight_U0_m_axi_ddr_V_ARADDR); fc_load_weight_U0->m_axi_ddr_V_ARID(fc_load_weight_U0_m_axi_ddr_V_ARID); fc_load_weight_U0->m_axi_ddr_V_ARLEN(fc_load_weight_U0_m_axi_ddr_V_ARLEN); fc_load_weight_U0->m_axi_ddr_V_ARSIZE(fc_load_weight_U0_m_axi_ddr_V_ARSIZE); fc_load_weight_U0->m_axi_ddr_V_ARBURST(fc_load_weight_U0_m_axi_ddr_V_ARBURST); fc_load_weight_U0->m_axi_ddr_V_ARLOCK(fc_load_weight_U0_m_axi_ddr_V_ARLOCK); fc_load_weight_U0->m_axi_ddr_V_ARCACHE(fc_load_weight_U0_m_axi_ddr_V_ARCACHE); fc_load_weight_U0->m_axi_ddr_V_ARPROT(fc_load_weight_U0_m_axi_ddr_V_ARPROT); fc_load_weight_U0->m_axi_ddr_V_ARQOS(fc_load_weight_U0_m_axi_ddr_V_ARQOS); fc_load_weight_U0->m_axi_ddr_V_ARREGION(fc_load_weight_U0_m_axi_ddr_V_ARREGION); fc_load_weight_U0->m_axi_ddr_V_ARUSER(fc_load_weight_U0_m_axi_ddr_V_ARUSER); fc_load_weight_U0->m_axi_ddr_V_RVALID(m_axi_ddr_V_RVALID); fc_load_weight_U0->m_axi_ddr_V_RREADY(fc_load_weight_U0_m_axi_ddr_V_RREADY); fc_load_weight_U0->m_axi_ddr_V_RDATA(m_axi_ddr_V_RDATA); fc_load_weight_U0->m_axi_ddr_V_RLAST(m_axi_ddr_V_RLAST); fc_load_weight_U0->m_axi_ddr_V_RID(m_axi_ddr_V_RID); fc_load_weight_U0->m_axi_ddr_V_RUSER(m_axi_ddr_V_RUSER); fc_load_weight_U0->m_axi_ddr_V_RRESP(m_axi_ddr_V_RRESP); fc_load_weight_U0->m_axi_ddr_V_BVALID(ap_var_for_const0); fc_load_weight_U0->m_axi_ddr_V_BREADY(fc_load_weight_U0_m_axi_ddr_V_BREADY); fc_load_weight_U0->m_axi_ddr_V_BRESP(ap_var_for_const3); fc_load_weight_U0->m_axi_ddr_V_BID(ap_var_for_const4); fc_load_weight_U0->m_axi_ddr_V_BUSER(ap_var_for_const4); fc_load_weight_U0->och_0(och_0); fc_load_weight_U0->och_0_out_din(fc_load_weight_U0_och_0_out_din); fc_load_weight_U0->och_0_out_full_n(och_0_c_full_n); fc_load_weight_U0->och_0_out_write(fc_load_weight_U0_och_0_out_write); fc_compute_1_U0 = new fc_compute_1("fc_compute_1_U0"); fc_compute_1_U0->ap_clk(ap_clk); fc_compute_1_U0->ap_rst(ap_rst); fc_compute_1_U0->ap_start(fc_compute_1_U0_ap_start); fc_compute_1_U0->ap_done(fc_compute_1_U0_ap_done); fc_compute_1_U0->ap_continue(fc_compute_1_U0_ap_continue); fc_compute_1_U0->ap_idle(fc_compute_1_U0_ap_idle); fc_compute_1_U0->ap_ready(fc_compute_1_U0_ap_ready); fc_compute_1_U0->weight_V_address0(fc_compute_1_U0_weight_V_address0); fc_compute_1_U0->weight_V_ce0(fc_compute_1_U0_weight_V_ce0); fc_compute_1_U0->weight_V_q0(weight_V_t_q0); fc_compute_1_U0->input_V_address0(fc_compute_1_U0_input_V_address0); fc_compute_1_U0->input_V_ce0(fc_compute_1_U0_input_V_ce0); fc_compute_1_U0->input_V_q0(input_V_q0); fc_compute_1_U0->bias_address0(fc_compute_1_U0_bias_address0); fc_compute_1_U0->bias_ce0(fc_compute_1_U0_bias_ce0); fc_compute_1_U0->bias_q0(bias_q0); fc_compute_1_U0->scale_address0(fc_compute_1_U0_scale_address0); fc_compute_1_U0->scale_ce0(fc_compute_1_U0_scale_ce0); fc_compute_1_U0->scale_q0(scale_q0); fc_compute_1_U0->output_r_address0(fc_compute_1_U0_output_r_address0); fc_compute_1_U0->output_r_ce0(fc_compute_1_U0_output_r_ce0); fc_compute_1_U0->output_r_we0(fc_compute_1_U0_output_r_we0); fc_compute_1_U0->output_r_d0(fc_compute_1_U0_output_r_d0); fc_compute_1_U0->och_dout(och_0_c_dout); fc_compute_1_U0->och_empty_n(och_0_c_empty_n); fc_compute_1_U0->och_read(fc_compute_1_U0_och_read); och_0_c_U = new fifo_w10_d2_A("och_0_c_U"); och_0_c_U->clk(ap_clk); och_0_c_U->reset(ap_rst); och_0_c_U->if_read_ce(ap_var_for_const2); och_0_c_U->if_write_ce(ap_var_for_const2); och_0_c_U->if_din(fc_load_weight_U0_och_0_out_din); och_0_c_U->if_full_n(och_0_c_full_n); och_0_c_U->if_write(fc_load_weight_U0_och_0_out_write); och_0_c_U->if_dout(och_0_c_dout); och_0_c_U->if_empty_n(och_0_c_empty_n); och_0_c_U->if_read(fc_compute_1_U0_och_read); SC_METHOD(thread_ap_channel_done_weight_V); sensitive << ( fc_load_weight_U0_ap_done ); SC_METHOD(thread_ap_done); sensitive << ( fc_compute_1_U0_ap_done ); SC_METHOD(thread_ap_idle); sensitive << ( fc_load_weight_U0_ap_idle ); sensitive << ( fc_compute_1_U0_ap_idle ); sensitive << ( weight_V_t_empty_n ); SC_METHOD(thread_ap_ready); sensitive << ( fc_load_weight_U0_ap_ready ); SC_METHOD(thread_ap_sync_continue); sensitive << ( ap_continue ); SC_METHOD(thread_ap_sync_done); sensitive << ( fc_compute_1_U0_ap_done ); SC_METHOD(thread_ap_sync_ready); sensitive << ( fc_load_weight_U0_ap_ready ); SC_METHOD(thread_bias_address0); sensitive << ( fc_compute_1_U0_bias_address0 ); SC_METHOD(thread_bias_address1); SC_METHOD(thread_bias_ce0); sensitive << ( fc_compute_1_U0_bias_ce0 ); SC_METHOD(thread_bias_ce1); SC_METHOD(thread_bias_d0); SC_METHOD(thread_bias_d1); SC_METHOD(thread_bias_we0); SC_METHOD(thread_bias_we1); SC_METHOD(thread_fc_compute_1_U0_ap_continue); sensitive << ( ap_continue ); SC_METHOD(thread_fc_compute_1_U0_ap_start); sensitive << ( weight_V_t_empty_n ); SC_METHOD(thread_fc_compute_1_U0_start_full_n); SC_METHOD(thread_fc_compute_1_U0_start_write); SC_METHOD(thread_fc_load_weight_U0_ap_continue); sensitive << ( weight_V_i_full_n ); SC_METHOD(thread_fc_load_weight_U0_ap_start); sensitive << ( ap_start ); SC_METHOD(thread_fc_load_weight_U0_start_full_n); SC_METHOD(thread_fc_load_weight_U0_start_write); SC_METHOD(thread_fc_load_weight_U0_weight_V_full_n); sensitive << ( weight_V_i_full_n ); SC_METHOD(thread_input_V_address0); sensitive << ( fc_compute_1_U0_input_V_address0 ); SC_METHOD(thread_input_V_address1); SC_METHOD(thread_input_V_ce0); sensitive << ( fc_compute_1_U0_input_V_ce0 ); SC_METHOD(thread_input_V_ce1); SC_METHOD(thread_input_V_d0); SC_METHOD(thread_input_V_d1); SC_METHOD(thread_input_V_we0); SC_METHOD(thread_input_V_we1); SC_METHOD(thread_m_axi_ddr_V_ARADDR); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARADDR ); SC_METHOD(thread_m_axi_ddr_V_ARBURST); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARBURST ); SC_METHOD(thread_m_axi_ddr_V_ARCACHE); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARCACHE ); SC_METHOD(thread_m_axi_ddr_V_ARID); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARID ); SC_METHOD(thread_m_axi_ddr_V_ARLEN); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARLEN ); SC_METHOD(thread_m_axi_ddr_V_ARLOCK); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARLOCK ); SC_METHOD(thread_m_axi_ddr_V_ARPROT); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARPROT ); SC_METHOD(thread_m_axi_ddr_V_ARQOS); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARQOS ); SC_METHOD(thread_m_axi_ddr_V_ARREGION); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARREGION ); SC_METHOD(thread_m_axi_ddr_V_ARSIZE); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARSIZE ); SC_METHOD(thread_m_axi_ddr_V_ARUSER); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARUSER ); SC_METHOD(thread_m_axi_ddr_V_ARVALID); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_ARVALID ); SC_METHOD(thread_m_axi_ddr_V_AWADDR); SC_METHOD(thread_m_axi_ddr_V_AWBURST); SC_METHOD(thread_m_axi_ddr_V_AWCACHE); SC_METHOD(thread_m_axi_ddr_V_AWID); SC_METHOD(thread_m_axi_ddr_V_AWLEN); SC_METHOD(thread_m_axi_ddr_V_AWLOCK); SC_METHOD(thread_m_axi_ddr_V_AWPROT); SC_METHOD(thread_m_axi_ddr_V_AWQOS); SC_METHOD(thread_m_axi_ddr_V_AWREGION); SC_METHOD(thread_m_axi_ddr_V_AWSIZE); SC_METHOD(thread_m_axi_ddr_V_AWUSER); SC_METHOD(thread_m_axi_ddr_V_AWVALID); SC_METHOD(thread_m_axi_ddr_V_BREADY); SC_METHOD(thread_m_axi_ddr_V_RREADY); sensitive << ( fc_load_weight_U0_m_axi_ddr_V_RREADY ); SC_METHOD(thread_m_axi_ddr_V_WDATA); SC_METHOD(thread_m_axi_ddr_V_WID); SC_METHOD(thread_m_axi_ddr_V_WLAST); SC_METHOD(thread_m_axi_ddr_V_WSTRB); SC_METHOD(thread_m_axi_ddr_V_WUSER); SC_METHOD(thread_m_axi_ddr_V_WVALID); SC_METHOD(thread_output_r_address0); sensitive << ( fc_compute_1_U0_output_r_address0 ); SC_METHOD(thread_output_r_ce0); sensitive << ( fc_compute_1_U0_output_r_ce0 ); SC_METHOD(thread_output_r_d0); sensitive << ( fc_compute_1_U0_output_r_d0 ); SC_METHOD(thread_output_r_we0); sensitive << ( fc_compute_1_U0_output_r_we0 ); SC_METHOD(thread_scale_address0); sensitive << ( fc_compute_1_U0_scale_address0 ); SC_METHOD(thread_scale_address1); SC_METHOD(thread_scale_ce0); sensitive << ( fc_compute_1_U0_scale_ce0 ); SC_METHOD(thread_scale_ce1); SC_METHOD(thread_scale_d0); SC_METHOD(thread_scale_d1); SC_METHOD(thread_scale_we0); SC_METHOD(thread_scale_we1); SC_THREAD(thread_ap_var_for_const2); SC_THREAD(thread_ap_var_for_const0); SC_THREAD(thread_ap_var_for_const1); SC_THREAD(thread_ap_var_for_const3); SC_THREAD(thread_ap_var_for_const4); static int apTFileNum = 0; stringstream apTFilenSS; apTFilenSS << "dataflow_in_loop_sc_trace_" << apTFileNum ++; string apTFn = apTFilenSS.str(); mVcdFile = sc_create_vcd_trace_file(apTFn.c_str()); mVcdFile->set_time_unit(1, SC_PS); if (1) { #ifdef __HLS_TRACE_LEVEL_PORT_HIER__ sc_trace(mVcdFile, ap_clk, "(port)ap_clk"); sc_trace(mVcdFile, ap_rst, "(port)ap_rst"); sc_trace(mVcdFile, m_axi_ddr_V_AWVALID, "(port)m_axi_ddr_V_AWVALID"); sc_trace(mVcdFile, m_axi_ddr_V_AWREADY, "(port)m_axi_ddr_V_AWREADY"); sc_trace(mVcdFile, m_axi_ddr_V_AWADDR, "(port)m_axi_ddr_V_AWADDR"); sc_trace(mVcdFile, m_axi_ddr_V_AWID, "(port)m_axi_ddr_V_AWID"); sc_trace(mVcdFile, m_axi_ddr_V_AWLEN, "(port)m_axi_ddr_V_AWLEN"); sc_trace(mVcdFile, m_axi_ddr_V_AWSIZE, "(port)m_axi_ddr_V_AWSIZE"); sc_trace(mVcdFile, m_axi_ddr_V_AWBURST, "(port)m_axi_ddr_V_AWBURST"); sc_trace(mVcdFile, m_axi_ddr_V_AWLOCK, "(port)m_axi_ddr_V_AWLOCK"); sc_trace(mVcdFile, m_axi_ddr_V_AWCACHE, "(port)m_axi_ddr_V_AWCACHE"); sc_trace(mVcdFile, m_axi_ddr_V_AWPROT, "(port)m_axi_ddr_V_AWPROT"); sc_trace(mVcdFile, m_axi_ddr_V_AWQOS, "(port)m_axi_ddr_V_AWQOS"); sc_trace(mVcdFile, m_axi_ddr_V_AWREGION, "(port)m_axi_ddr_V_AWREGION"); sc_trace(mVcdFile, m_axi_ddr_V_AWUSER, "(port)m_axi_ddr_V_AWUSER"); sc_trace(mVcdFile, m_axi_ddr_V_WVALID, "(port)m_axi_ddr_V_WVALID"); sc_trace(mVcdFile, m_axi_ddr_V_WREADY, "(port)m_axi_ddr_V_WREADY"); sc_trace(mVcdFile, m_axi_ddr_V_WDATA, "(port)m_axi_ddr_V_WDATA"); sc_trace(mVcdFile, m_axi_ddr_V_WSTRB, "(port)m_axi_ddr_V_WSTRB"); sc_trace(mVcdFile, m_axi_ddr_V_WLAST, "(port)m_axi_ddr_V_WLAST"); sc_trace(mVcdFile, m_axi_ddr_V_WID, "(port)m_axi_ddr_V_WID"); sc_trace(mVcdFile, m_axi_ddr_V_WUSER, "(port)m_axi_ddr_V_WUSER"); sc_trace(mVcdFile, m_axi_ddr_V_ARVALID, "(port)m_axi_ddr_V_ARVALID"); sc_trace(mVcdFile, m_axi_ddr_V_ARREADY, "(port)m_axi_ddr_V_ARREADY"); sc_trace(mVcdFile, m_axi_ddr_V_ARADDR, "(port)m_axi_ddr_V_ARADDR"); sc_trace(mVcdFile, m_axi_ddr_V_ARID, "(port)m_axi_ddr_V_ARID"); sc_trace(mVcdFile, m_axi_ddr_V_ARLEN, "(port)m_axi_ddr_V_ARLEN"); sc_trace(mVcdFile, m_axi_ddr_V_ARSIZE, "(port)m_axi_ddr_V_ARSIZE"); sc_trace(mVcdFile, m_axi_ddr_V_ARBURST, "(port)m_axi_ddr_V_ARBURST"); sc_trace(mVcdFile, m_axi_ddr_V_ARLOCK, "(port)m_axi_ddr_V_ARLOCK"); sc_trace(mVcdFile, m_axi_ddr_V_ARCACHE, "(port)m_axi_ddr_V_ARCACHE"); sc_trace(mVcdFile, m_axi_ddr_V_ARPROT, "(port)m_axi_ddr_V_ARPROT"); sc_trace(mVcdFile, m_axi_ddr_V_ARQOS, "(port)m_axi_ddr_V_ARQOS"); sc_trace(mVcdFile, m_axi_ddr_V_ARREGION, "(port)m_axi_ddr_V_ARREGION"); sc_trace(mVcdFile, m_axi_ddr_V_ARUSER, "(port)m_axi_ddr_V_ARUSER"); sc_trace(mVcdFile, m_axi_ddr_V_RVALID, "(port)m_axi_ddr_V_RVALID"); sc_trace(mVcdFile, m_axi_ddr_V_RREADY, "(port)m_axi_ddr_V_RREADY"); sc_trace(mVcdFile, m_axi_ddr_V_RDATA, "(port)m_axi_ddr_V_RDATA"); sc_trace(mVcdFile, m_axi_ddr_V_RLAST, "(port)m_axi_ddr_V_RLAST"); sc_trace(mVcdFile, m_axi_ddr_V_RID, "(port)m_axi_ddr_V_RID"); sc_trace(mVcdFile, m_axi_ddr_V_RUSER, "(port)m_axi_ddr_V_RUSER"); sc_trace(mVcdFile, m_axi_ddr_V_RRESP, "(port)m_axi_ddr_V_RRESP"); sc_trace(mVcdFile, m_axi_ddr_V_BVALID, "(port)m_axi_ddr_V_BVALID"); sc_trace(mVcdFile, m_axi_ddr_V_BREADY, "(port)m_axi_ddr_V_BREADY"); sc_trace(mVcdFile, m_axi_ddr_V_BRESP, "(port)m_axi_ddr_V_BRESP"); sc_trace(mVcdFile, m_axi_ddr_V_BID, "(port)m_axi_ddr_V_BID"); sc_trace(mVcdFile, m_axi_ddr_V_BUSER, "(port)m_axi_ddr_V_BUSER"); sc_trace(mVcdFile, och_0, "(port)och_0"); sc_trace(mVcdFile, input_V_address0, "(port)input_V_address0"); sc_trace(mVcdFile, input_V_ce0, "(port)input_V_ce0"); sc_trace(mVcdFile, input_V_d0, "(port)input_V_d0"); sc_trace(mVcdFile, input_V_q0, "(port)input_V_q0"); sc_trace(mVcdFile, input_V_we0, "(port)input_V_we0"); sc_trace(mVcdFile, input_V_address1, "(port)input_V_address1"); sc_trace(mVcdFile, input_V_ce1, "(port)input_V_ce1"); sc_trace(mVcdFile, input_V_d1, "(port)input_V_d1"); sc_trace(mVcdFile, input_V_q1, "(port)input_V_q1"); sc_trace(mVcdFile, input_V_we1, "(port)input_V_we1"); sc_trace(mVcdFile, bias_address0, "(port)bias_address0"); sc_trace(mVcdFile, bias_ce0, "(port)bias_ce0"); sc_trace(mVcdFile, bias_d0, "(port)bias_d0"); sc_trace(mVcdFile, bias_q0, "(port)bias_q0"); sc_trace(mVcdFile, bias_we0, "(port)bias_we0"); sc_trace(mVcdFile, bias_address1, "(port)bias_address1"); sc_trace(mVcdFile, bias_ce1, "(port)bias_ce1"); sc_trace(mVcdFile, bias_d1, "(port)bias_d1"); sc_trace(mVcdFile, bias_q1, "(port)bias_q1"); sc_trace(mVcdFile, bias_we1, "(port)bias_we1"); sc_trace(mVcdFile, scale_address0, "(port)scale_address0"); sc_trace(mVcdFile, scale_ce0, "(port)scale_ce0"); sc_trace(mVcdFile, scale_d0, "(port)scale_d0"); sc_trace(mVcdFile, scale_q0, "(port)scale_q0"); sc_trace(mVcdFile, scale_we0, "(port)scale_we0"); sc_trace(mVcdFile, scale_address1, "(port)scale_address1"); sc_trace(mVcdFile, scale_ce1, "(port)scale_ce1"); sc_trace(mVcdFile, scale_d1, "(port)scale_d1"); sc_trace(mVcdFile, scale_q1, "(port)scale_q1"); sc_trace(mVcdFile, scale_we1, "(port)scale_we1"); sc_trace(mVcdFile, output_r_address0, "(port)output_r_address0"); sc_trace(mVcdFile, output_r_ce0, "(port)output_r_ce0"); sc_trace(mVcdFile, output_r_d0, "(port)output_r_d0"); sc_trace(mVcdFile, output_r_q0, "(port)output_r_q0"); sc_trace(mVcdFile, output_r_we0, "(port)output_r_we0"); sc_trace(mVcdFile, och_0_ap_vld, "(port)och_0_ap_vld"); sc_trace(mVcdFile, ap_start, "(port)ap_start"); sc_trace(mVcdFile, ap_done, "(port)ap_done"); sc_trace(mVcdFile, ap_ready, "(port)ap_ready"); sc_trace(mVcdFile, ap_idle, "(port)ap_idle"); sc_trace(mVcdFile, ap_continue, "(port)ap_continue"); #endif #ifdef __HLS_TRACE_LEVEL_INT__ sc_trace(mVcdFile, weight_V_i_q0, "weight_V_i_q0"); sc_trace(mVcdFile, weight_V_t_q0, "weight_V_t_q0"); sc_trace(mVcdFile, fc_load_weight_U0_ap_start, "fc_load_weight_U0_ap_start"); sc_trace(mVcdFile, fc_load_weight_U0_ap_done, "fc_load_weight_U0_ap_done"); sc_trace(mVcdFile, fc_load_weight_U0_ap_continue, "fc_load_weight_U0_ap_continue"); sc_trace(mVcdFile, fc_load_weight_U0_ap_idle, "fc_load_weight_U0_ap_idle"); sc_trace(mVcdFile, fc_load_weight_U0_ap_ready, "fc_load_weight_U0_ap_ready"); sc_trace(mVcdFile, fc_load_weight_U0_weight_V_address0, "fc_load_weight_U0_weight_V_address0"); sc_trace(mVcdFile, fc_load_weight_U0_weight_V_ce0, "fc_load_weight_U0_weight_V_ce0"); sc_trace(mVcdFile, fc_load_weight_U0_weight_V_we0, "fc_load_weight_U0_weight_V_we0"); sc_trace(mVcdFile, fc_load_weight_U0_weight_V_d0, "fc_load_weight_U0_weight_V_d0"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWVALID, "fc_load_weight_U0_m_axi_ddr_V_AWVALID"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWADDR, "fc_load_weight_U0_m_axi_ddr_V_AWADDR"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWID, "fc_load_weight_U0_m_axi_ddr_V_AWID"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWLEN, "fc_load_weight_U0_m_axi_ddr_V_AWLEN"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWSIZE, "fc_load_weight_U0_m_axi_ddr_V_AWSIZE"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWBURST, "fc_load_weight_U0_m_axi_ddr_V_AWBURST"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWLOCK, "fc_load_weight_U0_m_axi_ddr_V_AWLOCK"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWCACHE, "fc_load_weight_U0_m_axi_ddr_V_AWCACHE"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWPROT, "fc_load_weight_U0_m_axi_ddr_V_AWPROT"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWQOS, "fc_load_weight_U0_m_axi_ddr_V_AWQOS"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWREGION, "fc_load_weight_U0_m_axi_ddr_V_AWREGION"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_AWUSER, "fc_load_weight_U0_m_axi_ddr_V_AWUSER"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_WVALID, "fc_load_weight_U0_m_axi_ddr_V_WVALID"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_WDATA, "fc_load_weight_U0_m_axi_ddr_V_WDATA"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_WSTRB, "fc_load_weight_U0_m_axi_ddr_V_WSTRB"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_WLAST, "fc_load_weight_U0_m_axi_ddr_V_WLAST"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_WID, "fc_load_weight_U0_m_axi_ddr_V_WID"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_WUSER, "fc_load_weight_U0_m_axi_ddr_V_WUSER"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARVALID, "fc_load_weight_U0_m_axi_ddr_V_ARVALID"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARADDR, "fc_load_weight_U0_m_axi_ddr_V_ARADDR"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARID, "fc_load_weight_U0_m_axi_ddr_V_ARID"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARLEN, "fc_load_weight_U0_m_axi_ddr_V_ARLEN"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARSIZE, "fc_load_weight_U0_m_axi_ddr_V_ARSIZE"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARBURST, "fc_load_weight_U0_m_axi_ddr_V_ARBURST"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARLOCK, "fc_load_weight_U0_m_axi_ddr_V_ARLOCK"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARCACHE, "fc_load_weight_U0_m_axi_ddr_V_ARCACHE"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARPROT, "fc_load_weight_U0_m_axi_ddr_V_ARPROT"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARQOS, "fc_load_weight_U0_m_axi_ddr_V_ARQOS"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARREGION, "fc_load_weight_U0_m_axi_ddr_V_ARREGION"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_ARUSER, "fc_load_weight_U0_m_axi_ddr_V_ARUSER"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_RREADY, "fc_load_weight_U0_m_axi_ddr_V_RREADY"); sc_trace(mVcdFile, fc_load_weight_U0_m_axi_ddr_V_BREADY, "fc_load_weight_U0_m_axi_ddr_V_BREADY"); sc_trace(mVcdFile, fc_load_weight_U0_och_0_out_din, "fc_load_weight_U0_och_0_out_din"); sc_trace(mVcdFile, fc_load_weight_U0_och_0_out_write, "fc_load_weight_U0_och_0_out_write"); sc_trace(mVcdFile, ap_channel_done_weight_V, "ap_channel_done_weight_V"); sc_trace(mVcdFile, fc_load_weight_U0_weight_V_full_n, "fc_load_weight_U0_weight_V_full_n"); sc_trace(mVcdFile, fc_compute_1_U0_ap_start, "fc_compute_1_U0_ap_start"); sc_trace(mVcdFile, fc_compute_1_U0_ap_done, "fc_compute_1_U0_ap_done"); sc_trace(mVcdFile, fc_compute_1_U0_ap_continue, "fc_compute_1_U0_ap_continue"); sc_trace(mVcdFile, fc_compute_1_U0_ap_idle, "fc_compute_1_U0_ap_idle"); sc_trace(mVcdFile, fc_compute_1_U0_ap_ready, "fc_compute_1_U0_ap_ready"); sc_trace(mVcdFile, fc_compute_1_U0_weight_V_address0, "fc_compute_1_U0_weight_V_address0"); sc_trace(mVcdFile, fc_compute_1_U0_weight_V_ce0, "fc_compute_1_U0_weight_V_ce0"); sc_trace(mVcdFile, fc_compute_1_U0_input_V_address0, "fc_compute_1_U0_input_V_address0"); sc_trace(mVcdFile, fc_compute_1_U0_input_V_ce0, "fc_compute_1_U0_input_V_ce0"); sc_trace(mVcdFile, fc_compute_1_U0_bias_address0, "fc_compute_1_U0_bias_address0"); sc_trace(mVcdFile, fc_compute_1_U0_bias_ce0, "fc_compute_1_U0_bias_ce0"); sc_trace(mVcdFile, fc_compute_1_U0_scale_address0, "fc_compute_1_U0_scale_address0"); sc_trace(mVcdFile, fc_compute_1_U0_scale_ce0, "fc_compute_1_U0_scale_ce0"); sc_trace(mVcdFile, fc_compute_1_U0_output_r_address0, "fc_compute_1_U0_output_r_address0"); sc_trace(mVcdFile, fc_compute_1_U0_output_r_ce0, "fc_compute_1_U0_output_r_ce0"); sc_trace(mVcdFile, fc_compute_1_U0_output_r_we0, "fc_compute_1_U0_output_r_we0"); sc_trace(mVcdFile, fc_compute_1_U0_output_r_d0, "fc_compute_1_U0_output_r_d0"); sc_trace(mVcdFile, fc_compute_1_U0_och_read, "fc_compute_1_U0_och_read"); sc_trace(mVcdFile, ap_sync_continue, "ap_sync_continue"); sc_trace(mVcdFile, weight_V_i_full_n, "weight_V_i_full_n"); sc_trace(mVcdFile, weight_V_t_empty_n, "weight_V_t_empty_n"); sc_trace(mVcdFile, och_0_c_full_n, "och_0_c_full_n"); sc_trace(mVcdFile, och_0_c_dout, "och_0_c_dout"); sc_trace(mVcdFile, och_0_c_empty_n, "och_0_c_empty_n"); sc_trace(mVcdFile, ap_sync_done, "ap_sync_done"); sc_trace(mVcdFile, ap_sync_ready, "ap_sync_ready"); sc_trace(mVcdFile, fc_load_weight_U0_start_full_n, "fc_load_weight_U0_start_full_n"); sc_trace(mVcdFile, fc_load_weight_U0_start_write, "fc_load_weight_U0_start_write"); sc_trace(mVcdFile, fc_compute_1_U0_start_full_n, "fc_compute_1_U0_start_full_n"); sc_trace(mVcdFile, fc_compute_1_U0_start_write, "fc_compute_1_U0_start_write"); #endif } } dataflow_in_loop::~dataflow_in_loop() { if (mVcdFile) sc_close_vcd_trace_file(mVcdFile); delete weight_V_U; delete fc_load_weight_U0; delete fc_compute_1_U0; delete och_0_c_U; } void dataflow_in_loop::thread_ap_var_for_const2() { ap_var_for_const2 = ap_const_logic_1; } void dataflow_in_loop::thread_ap_var_for_const0() { ap_var_for_const0 = ap_const_logic_0; } void dataflow_in_loop::thread_ap_var_for_const1() { ap_var_for_const1 = ap_const_lv1024_lc_1; } void dataflow_in_loop::thread_ap_var_for_const3() { ap_var_for_const3 = ap_const_lv2_0; } void dataflow_in_loop::thread_ap_var_for_const4() { ap_var_for_const4 = ap_const_lv1_0; } void dataflow_in_loop::thread_ap_channel_done_weight_V() { ap_channel_done_weight_V = fc_load_weight_U0_ap_done.read(); } void dataflow_in_loop::thread_ap_done() { ap_done = fc_compute_1_U0_ap_done.read(); } void dataflow_in_loop::thread_ap_idle() { ap_idle = (fc_load_weight_U0_ap_idle.read() & fc_compute_1_U0_ap_idle.read() & (weight_V_t_empty_n.read() ^ ap_const_logic_1)); } void dataflow_in_loop::thread_ap_ready() { ap_ready = fc_load_weight_U0_ap_ready.read(); } void dataflow_in_loop::thread_ap_sync_continue() { ap_sync_continue = ap_continue.read(); } void dataflow_in_loop::thread_ap_sync_done() { ap_sync_done = fc_compute_1_U0_ap_done.read(); } void dataflow_in_loop::thread_ap_sync_ready() { ap_sync_ready = fc_load_weight_U0_ap_ready.read(); } void dataflow_in_loop::thread_bias_address0() { bias_address0 = fc_compute_1_U0_bias_address0.read(); } void dataflow_in_loop::thread_bias_address1() { bias_address1 = ap_const_lv10_0; } void dataflow_in_loop::thread_bias_ce0() { bias_ce0 = fc_compute_1_U0_bias_ce0.read(); } void dataflow_in_loop::thread_bias_ce1() { bias_ce1 = ap_const_logic_0; } void dataflow_in_loop::thread_bias_d0() { bias_d0 = ap_const_lv32_0; } void dataflow_in_loop::thread_bias_d1() { bias_d1 = ap_const_lv32_0; } void dataflow_in_loop::thread_bias_we0() { bias_we0 = ap_const_logic_0; } void dataflow_in_loop::thread_bias_we1() { bias_we1 = ap_const_logic_0; } void dataflow_in_loop::thread_fc_compute_1_U0_ap_continue() { fc_compute_1_U0_ap_continue = ap_continue.read(); } void dataflow_in_loop::thread_fc_compute_1_U0_ap_start() { fc_compute_1_U0_ap_start = weight_V_t_empty_n.read(); } void dataflow_in_loop::thread_fc_compute_1_U0_start_full_n() { fc_compute_1_U0_start_full_n = ap_const_logic_1; } void dataflow_in_loop::thread_fc_compute_1_U0_start_write() { fc_compute_1_U0_start_write = ap_const_logic_0; } void dataflow_in_loop::thread_fc_load_weight_U0_ap_continue() { fc_load_weight_U0_ap_continue = weight_V_i_full_n.read(); } void dataflow_in_loop::thread_fc_load_weight_U0_ap_start() { fc_load_weight_U0_ap_start = ap_start.read(); } void dataflow_in_loop::thread_fc_load_weight_U0_start_full_n() { fc_load_weight_U0_start_full_n = ap_const_logic_1; } void dataflow_in_loop::thread_fc_load_weight_U0_start_write() { fc_load_weight_U0_start_write = ap_const_logic_0; } void dataflow_in_loop::thread_fc_load_weight_U0_weight_V_full_n() { fc_load_weight_U0_weight_V_full_n = weight_V_i_full_n.read(); } void dataflow_in_loop::thread_input_V_address0() { input_V_address0 = fc_compute_1_U0_input_V_address0.read(); } void dataflow_in_loop::thread_input_V_address1() { input_V_address1 = ap_const_lv4_0; } void dataflow_in_loop::thread_input_V_ce0() { input_V_ce0 = fc_compute_1_U0_input_V_ce0.read(); } void dataflow_in_loop::thread_input_V_ce1() { input_V_ce1 = ap_const_logic_0; } void dataflow_in_loop::thread_input_V_d0() { input_V_d0 = ap_const_lv1024_lc_1; } void dataflow_in_loop::thread_input_V_d1() { input_V_d1 = ap_const_lv1024_lc_1; } void dataflow_in_loop::thread_input_V_we0() { input_V_we0 = ap_const_logic_0; } void dataflow_in_loop::thread_input_V_we1() { input_V_we1 = ap_const_logic_0; } void dataflow_in_loop::thread_m_axi_ddr_V_ARADDR() { m_axi_ddr_V_ARADDR = fc_load_weight_U0_m_axi_ddr_V_ARADDR.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARBURST() { m_axi_ddr_V_ARBURST = fc_load_weight_U0_m_axi_ddr_V_ARBURST.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARCACHE() { m_axi_ddr_V_ARCACHE = fc_load_weight_U0_m_axi_ddr_V_ARCACHE.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARID() { m_axi_ddr_V_ARID = fc_load_weight_U0_m_axi_ddr_V_ARID.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARLEN() { m_axi_ddr_V_ARLEN = fc_load_weight_U0_m_axi_ddr_V_ARLEN.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARLOCK() { m_axi_ddr_V_ARLOCK = fc_load_weight_U0_m_axi_ddr_V_ARLOCK.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARPROT() { m_axi_ddr_V_ARPROT = fc_load_weight_U0_m_axi_ddr_V_ARPROT.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARQOS() { m_axi_ddr_V_ARQOS = fc_load_weight_U0_m_axi_ddr_V_ARQOS.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARREGION() { m_axi_ddr_V_ARREGION = fc_load_weight_U0_m_axi_ddr_V_ARREGION.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARSIZE() { m_axi_ddr_V_ARSIZE = fc_load_weight_U0_m_axi_ddr_V_ARSIZE.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARUSER() { m_axi_ddr_V_ARUSER = fc_load_weight_U0_m_axi_ddr_V_ARUSER.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_ARVALID() { m_axi_ddr_V_ARVALID = fc_load_weight_U0_m_axi_ddr_V_ARVALID.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_AWADDR() { m_axi_ddr_V_AWADDR = ap_const_lv32_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWBURST() { m_axi_ddr_V_AWBURST = ap_const_lv2_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWCACHE() { m_axi_ddr_V_AWCACHE = ap_const_lv4_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWID() { m_axi_ddr_V_AWID = ap_const_lv1_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWLEN() { m_axi_ddr_V_AWLEN = ap_const_lv32_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWLOCK() { m_axi_ddr_V_AWLOCK = ap_const_lv2_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWPROT() { m_axi_ddr_V_AWPROT = ap_const_lv3_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWQOS() { m_axi_ddr_V_AWQOS = ap_const_lv4_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWREGION() { m_axi_ddr_V_AWREGION = ap_const_lv4_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWSIZE() { m_axi_ddr_V_AWSIZE = ap_const_lv3_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWUSER() { m_axi_ddr_V_AWUSER = ap_const_lv1_0; } void dataflow_in_loop::thread_m_axi_ddr_V_AWVALID() { m_axi_ddr_V_AWVALID = ap_const_logic_0; } void dataflow_in_loop::thread_m_axi_ddr_V_BREADY() { m_axi_ddr_V_BREADY = ap_const_logic_0; } void dataflow_in_loop::thread_m_axi_ddr_V_RREADY() { m_axi_ddr_V_RREADY = fc_load_weight_U0_m_axi_ddr_V_RREADY.read(); } void dataflow_in_loop::thread_m_axi_ddr_V_WDATA() { m_axi_ddr_V_WDATA = ap_const_lv128_lc_1; } void dataflow_in_loop::thread_m_axi_ddr_V_WID() { m_axi_ddr_V_WID = ap_const_lv1_0; } void dataflow_in_loop::thread_m_axi_ddr_V_WLAST() { m_axi_ddr_V_WLAST = ap_const_logic_0; } void dataflow_in_loop::thread_m_axi_ddr_V_WSTRB() { m_axi_ddr_V_WSTRB = ap_const_lv16_0; } void dataflow_in_loop::thread_m_axi_ddr_V_WUSER() { m_axi_ddr_V_WUSER = ap_const_lv1_0; } void dataflow_in_loop::thread_m_axi_ddr_V_WVALID() { m_axi_ddr_V_WVALID = ap_const_logic_0; } void dataflow_in_loop::thread_output_r_address0() { output_r_address0 = fc_compute_1_U0_output_r_address0.read(); } void dataflow_in_loop::thread_output_r_ce0() { output_r_ce0 = fc_compute_1_U0_output_r_ce0.read(); } void dataflow_in_loop::thread_output_r_d0() { output_r_d0 = fc_compute_1_U0_output_r_d0.read(); } void dataflow_in_loop::thread_output_r_we0() { output_r_we0 = fc_compute_1_U0_output_r_we0.read(); } void dataflow_in_loop::thread_scale_address0() { scale_address0 = fc_compute_1_U0_scale_address0.read(); } void dataflow_in_loop::thread_scale_address1() { scale_address1 = ap_const_lv10_0; } void dataflow_in_loop::thread_scale_ce0() { scale_ce0 = fc_compute_1_U0_scale_ce0.read(); } void dataflow_in_loop::thread_scale_ce1() { scale_ce1 = ap_const_logic_0; } void dataflow_in_loop::thread_scale_d0() { scale_d0 = ap_const_lv32_0; } void dataflow_in_loop::thread_scale_d1() { scale_d1 = ap_const_lv32_0; } void dataflow_in_loop::thread_scale_we0() { scale_we0 = ap_const_logic_0; } void dataflow_in_loop::thread_scale_we1() { scale_we1 = ap_const_logic_0; } }
[ "yasu@am.ics.keio.ac.jp" ]
yasu@am.ics.keio.ac.jp
9d6b8257ab794de7fe5b208f7ed2cde5eace3181
0348744c233b0e94f623b8ee7b662aea4faaf0ea
/Magical_Tree.cpp
eec0f73924aee0fe77b685a149a6a0196d3be8a1
[]
no_license
Shashank-Varnekar/Basic-Programming-Hackerearth
bbf495884cac38d111deeefae92f32b3bed9d791
42a179f08be38878057107bb46698bddf51b7434
refs/heads/master
2023-04-28T20:28:59.760056
2021-05-17T15:31:16
2021-05-17T15:31:16
null
0
0
null
null
null
null
UTF-8
C++
false
false
641
cpp
#include<iostream> using namespace std; int main() { int L; cin >> L; int n = L; int arr[n]; int k=0; while(L--){ string str; cin >> str; int sum = (str[0] - '0'); int len = str.length(); for(int i=1; i<len-1; i+=2){; if(str[i] == '+'){ sum += (str[i+1] - '0'); } else{ sum -= (str[i+1] - '0'); } } arr[k] = sum; k++; } int max = arr[0]; for(int i=0; i<n; i++){ if(max < arr[i]) max = arr[i]; } cout << max << endl; return 0; }
[ "noreply@github.com" ]
Shashank-Varnekar.noreply@github.com
2a46f108bc5e5cbe69f8eb18b33dc7f32c505825
35142ada4f02ef34ad47307d3b9770b7c97674b5
/include/engine/eval.hpp
c8280d0e8756a07de0f5fb480009cc16729d44cb
[]
no_license
BK1603/Wolf-Gang-Engine
83e58ed1b79b6538dd3493fd7e7fb1ea1f8378e5
182c87dbefd3bfd1014f09dd151f4729b7045838
refs/heads/master
2020-03-08T16:28:17.659552
2018-03-29T03:40:20
2018-03-29T03:40:20
null
0
0
null
null
null
null
UTF-8
C++
false
false
2,505
hpp
#include <string> #include <map> #include <functional> #include "utility.hpp" class evaluator { std::string expression; std::map<std::string, double> variables; std::map<std::string, std::function<double(double)>> functions; bool is_whitespace(char c) { return ( c == ' ' || c == '\t' || c == '\n' || c == '\r' ); } bool is_letter(char c) { return ( c >= 'a' && c <= 'z' ); } void skip_whitespace(std::string::iterator& iter) { while (iter != expression.end() && is_whitespace(*iter)) ++iter; } std::string read_name(std::string::iterator& iter) { std::string name; while (iter != expression.end() && is_letter(*iter)) { name += *iter; ++iter; } return std::move(name); } double factor(std::string::iterator& iter) { skip_whitespace(iter); // Default at one to avoid divid-by-zero error double val = 1; if (iter == expression.end()) return val; if (*iter == '(') val = summands(++iter); else if (*iter == '-') val = -factor(++iter); // Function else if (*iter == '$') { auto &func = functions.find(read_name(++iter)); if (func == functions.end()) return 0; val = func->second(factor(iter)); } // Variable else if (is_letter(*iter)) val = variables[read_name(iter)]; // Numeral else val = util::to_numeral<double>(expression, iter); if (iter == expression.end()) return val; if (*iter == '*') val *= factor(++iter); else if (*iter == '/') val /= factor(++iter); else if (*iter == '^') val = std::pow(val, factor(++iter)); return val; } double summands(std::string::iterator& iter) { double v1 = factor(iter); while (iter != expression.end()) { skip_whitespace(iter); if (*iter == '+') v1 += factor(++iter); else if (*iter == '-') v1 -= factor(++iter); else if (*iter == ')') return (++iter, v1); else return v1; } return v1; } public: void set_expression(const std::string& ex) { expression = ex; } void set_function(const std::string& name, std::function<double(double)> func) { functions[name] = func; } double& operator[](const std::string& name) { return variables[name]; } double evaluate() { std::string::iterator iter = expression.begin(); return summands(iter); } double evaluate(const std::string& ex) { set_expression(ex); return evaluate(); } static double quick_evaluate(const std::string& ex) { evaluator eval; return eval.evaluate(ex); } };
[ "capnsword@gmail.com" ]
capnsword@gmail.com
56f95a32d82e982bab0f45d3abd4ee867826d463
b27cbaad60e5489353d3c78c8e5784d6f7bfa1d6
/unityplugin/UnityEmulator/src/DiligentGraphicsAdapterD3D12.cpp
18e2ae0197f0700c995ce3a29e1c96ce91ebe8eb
[ "Apache-2.0" ]
permissive
southdy/DiligentEngine
55ad45b3b1754e5efe26e76b372f13d84214392c
b8d12b47de3213beb873630ca4a9c0110d875334
refs/heads/master
2020-05-07T18:25:22.789723
2019-04-07T20:24:13
2019-04-07T20:24:13
null
0
0
null
null
null
null
UTF-8
C++
false
false
10,488
cpp
#include <array> #define NOMINMAX #include <D3D12.h> #include <dxgi1_4.h> #include <atlbase.h> #include "UnityGraphicsD3D12Impl.h" #include "DiligentGraphicsAdapterD3D12.h" #include "UnityGraphicsD3D12Emulator.h" #include "SwapChainD3D12.h" #include "TextureD3D12.h" #include "RenderDeviceD3D12.h" #include "DeviceContextD3D12.h" #include "CommandQueueD3D12.h" #include "EngineFactoryD3D12.h" #include "SwapChainBase.h" #include "DefaultRawMemoryAllocator.h" #include "DXGITypeConversions.h" using namespace Diligent; namespace { class ProxyCommandQueueD3D12 : public ObjectBase<ICommandQueueD3D12> { public: using TBase = ObjectBase<ICommandQueueD3D12>; ProxyCommandQueueD3D12(IReferenceCounters *pRefCounters, UnityGraphicsD3D12Impl& GraphicsD3D12Impl) : TBase(pRefCounters), m_GraphicsD3D12Impl(GraphicsD3D12Impl) { } ~ProxyCommandQueueD3D12() { } IMPLEMENT_QUERY_INTERFACE_IN_PLACE( IID_CommandQueueD3D12, TBase ) // Returns the fence value that will be signaled next time virtual Uint64 GetNextFenceValue()override final { return m_GraphicsD3D12Impl.GetNextFenceValue(); } // Executes a given command list virtual Uint64 Submit(ID3D12GraphicsCommandList* commandList)override final { return m_GraphicsD3D12Impl.ExecuteCommandList(commandList); } // Returns D3D12 command queue. May return null if queue is anavailable virtual ID3D12CommandQueue* GetD3D12CommandQueue() { return nullptr; } /// Returns value of the last completed fence virtual Uint64 GetCompletedFenceValue()override final { return m_GraphicsD3D12Impl.GetCompletedFenceValue(); } /// Blocks execution until all pending GPU commands are complete virtual Uint64 WaitForIdle()override final { return m_GraphicsD3D12Impl.IdleGPU(); } virtual void SignalFence(ID3D12Fence* pFence, Uint64 Value)override final { m_GraphicsD3D12Impl.GetCommandQueue()->Signal(pFence, Value); } private: UnityGraphicsD3D12Impl& m_GraphicsD3D12Impl; }; class ProxySwapChainD3D12 : public SwapChainBase<ISwapChainD3D12> { public: using TBase = SwapChainBase<ISwapChainD3D12>; ProxySwapChainD3D12( IReferenceCounters *pRefCounters, IRenderDevice *pDevice, IDeviceContext *pDeviceContext, const SwapChainDesc& SCDesc ) : TBase(pRefCounters, pDevice, pDeviceContext,SCDesc) { } IMPLEMENT_QUERY_INTERFACE_IN_PLACE(IID_SwapChainD3D12, TBase) virtual IDXGISwapChain *GetDXGISwapChain()override final { UNEXPECTED("DXGI swap chain cannot be requested through the proxy swap chain"); return nullptr; } virtual ITextureViewD3D12* GetCurrentBackBufferRTV() { return m_RTVs[m_CurrentBackBufferIndex]; } virtual ITextureViewD3D12* GetDepthBufferDSV() { return m_DSV; } virtual void Present(Uint32 SyncInterval)override final { UNEXPECTED("Present is not expected to be called directly"); } virtual void SetFullscreenMode(const DisplayModeAttribs &DisplayMode)override final { UNEXPECTED("Fullscreen mode cannot be set through the proxy swap chain"); } virtual void SetWindowedMode()override final { UNEXPECTED("Windowed mode cannot be set through the proxy swap chain"); } virtual void Resize(Uint32 NewWidth, Uint32 NewHeight)override final { TBase::Resize(NewWidth, NewHeight, 0); } void ReleaseBuffers() { m_BackBuffers.clear(); m_RTVs.clear(); m_DepthBuffer.Release(); m_DSV.Release(); } void SetBackBufferIndex(Uint32 BackBufferIndex) { m_CurrentBackBufferIndex = BackBufferIndex; } void CreateBuffers(IDXGISwapChain3 *pDXGISwapChain, ID3D12Resource *pd3d12DepthBuffer) { DXGI_SWAP_CHAIN_DESC1 SwapChainDesc; pDXGISwapChain->GetDesc1(&SwapChainDesc); m_SwapChainDesc.BufferCount = SwapChainDesc.BufferCount; m_SwapChainDesc.SamplesCount = SwapChainDesc.SampleDesc.Count; m_SwapChainDesc.Width = SwapChainDesc.Width; m_SwapChainDesc.Height = SwapChainDesc.Height; m_SwapChainDesc.ColorBufferFormat = DXGI_FormatToTexFormat(SwapChainDesc.Format); const auto DepthBufferDesc = pd3d12DepthBuffer->GetDesc(); m_SwapChainDesc.DepthBufferFormat = DXGI_FormatToTexFormat(DepthBufferDesc.Format); RefCntAutoPtr<IRenderDeviceD3D12> pRenderDeviceD3D12(m_pRenderDevice, IID_RenderDeviceD3D12); m_BackBuffers.reserve(m_SwapChainDesc.BufferCount); m_RTVs.reserve(m_SwapChainDesc.BufferCount); for(Uint32 backbuff = 0; backbuff < m_SwapChainDesc.BufferCount; ++backbuff) { CComPtr<ID3D12Resource> pd3d12BackBuffer; auto hr = pDXGISwapChain->GetBuffer(backbuff, __uuidof(pd3d12BackBuffer), reinterpret_cast<void**>( static_cast<ID3D12Resource**>(&pd3d12BackBuffer) )); if(FAILED(hr)) LOG_ERROR_AND_THROW("Failed to get back buffer ", backbuff," from the swap chain"); RefCntAutoPtr<ITexture> pBackBuffer; pRenderDeviceD3D12->CreateTextureFromD3DResource(pd3d12BackBuffer, RESOURCE_STATE_UNDEFINED, &pBackBuffer); m_BackBuffers.emplace_back( RefCntAutoPtr<ITextureD3D12>(pBackBuffer, IID_TextureD3D12) ); TextureViewDesc TexViewDesc; TexViewDesc.ViewType = TEXTURE_VIEW_RENDER_TARGET; TexViewDesc.Format = TEX_FORMAT_RGBA8_UNORM_SRGB; RefCntAutoPtr<ITextureView> pRTV; pBackBuffer->CreateView(TexViewDesc, &pRTV); m_RTVs.emplace_back(RefCntAutoPtr<ITextureViewD3D12>(pRTV, IID_TextureViewD3D12)); } RefCntAutoPtr<ITexture> pDepthBuffer; pRenderDeviceD3D12->CreateTextureFromD3DResource(pd3d12DepthBuffer, RESOURCE_STATE_UNDEFINED, &pDepthBuffer); m_DepthBuffer = RefCntAutoPtr<ITextureD3D12>(pDepthBuffer, IID_TextureD3D12); auto *pDSV = m_DepthBuffer->GetDefaultView(TEXTURE_VIEW_DEPTH_STENCIL); m_DSV = RefCntAutoPtr<ITextureViewD3D12>(pDSV, IID_TextureViewD3D12); } ITextureD3D12* GetCurrentBackBuffer() { return m_BackBuffers[m_CurrentBackBufferIndex]; } ITextureD3D12* GetDepthBuffer() { return m_DepthBuffer; } private: std::vector<RefCntAutoPtr<ITextureD3D12>> m_BackBuffers; std::vector<RefCntAutoPtr<ITextureViewD3D12>> m_RTVs; RefCntAutoPtr<ITextureD3D12> m_DepthBuffer; RefCntAutoPtr<ITextureViewD3D12> m_DSV; Uint32 m_CurrentBackBufferIndex = 0; }; } DiligentGraphicsAdapterD3D12::DiligentGraphicsAdapterD3D12(UnityGraphicsD3D12Emulator& UnityGraphicsD3D12)noexcept : m_UnityGraphicsD3D12(UnityGraphicsD3D12) { auto *GraphicsImpl = UnityGraphicsD3D12.GetGraphicsImpl(); auto *d3d12Device = GraphicsImpl->GetD3D12Device(); auto &DefaultAllocator = DefaultRawMemoryAllocator::GetAllocator(); auto CmdQueue = NEW_RC_OBJ(DefaultAllocator, "UnityCommandQueueImpl instance", ProxyCommandQueueD3D12)(*GraphicsImpl); auto *pFactoryD3D12 = GetEngineFactoryD3D12(); EngineD3D12CreateInfo Attribs; std::array<ICommandQueueD3D12*, 1> CmdQueues = {CmdQueue}; pFactoryD3D12->AttachToD3D12Device(d3d12Device, CmdQueues.size(), CmdQueues.data(), Attribs, &m_pDevice, &m_pDeviceCtx); } void DiligentGraphicsAdapterD3D12::InitProxySwapChain() { auto *GraphicsImpl = m_UnityGraphicsD3D12.GetGraphicsImpl(); auto &DefaultAllocator = DefaultRawMemoryAllocator::GetAllocator(); SwapChainDesc SCDesc; auto ProxySwapChain = NEW_RC_OBJ(DefaultAllocator, "UnityCommandQueueImpl instance", ProxySwapChainD3D12)(m_pDevice, m_pDeviceCtx, SCDesc); ProxySwapChain->CreateBuffers(GraphicsImpl->GetDXGISwapChain(), GraphicsImpl->GetDepthBuffer()); m_pProxySwapChain = ProxySwapChain; m_pDeviceCtx->SetSwapChain(ProxySwapChain); } void DiligentGraphicsAdapterD3D12::PreSwapChainResize() { auto *pProxySwapChainD3D12 = m_pProxySwapChain.RawPtr<ProxySwapChainD3D12>(); auto *pDeviceD3D12 = m_pDevice.RawPtr<IRenderDeviceD3D12>(); pProxySwapChainD3D12->ReleaseBuffers(); auto *GraphicsImpl = m_UnityGraphicsD3D12.GetGraphicsImpl(); pDeviceD3D12->ReleaseStaleResources(); // We must idle GPU GraphicsImpl->IdleGPU(); // And call FinishFrame() to release references to swap chain resources m_pDeviceCtx->FinishFrame(); pDeviceD3D12->ReleaseStaleResources(); } void DiligentGraphicsAdapterD3D12::PostSwapChainResize() { auto *GraphicsImpl = m_UnityGraphicsD3D12.GetGraphicsImpl(); auto *pProxySwapChainD3D12 = m_pProxySwapChain.RawPtr<ProxySwapChainD3D12>(); pProxySwapChainD3D12->CreateBuffers(GraphicsImpl->GetDXGISwapChain(), GraphicsImpl->GetDepthBuffer()); } void DiligentGraphicsAdapterD3D12::BeginFrame() { auto *GraphicsImpl = m_UnityGraphicsD3D12.GetGraphicsImpl(); auto *pProxySwapChainD3D12 = m_pProxySwapChain.RawPtr<ProxySwapChainD3D12>(); pProxySwapChainD3D12->SetBackBufferIndex(GraphicsImpl->GetCurrentBackBufferIndex()); // Unity graphics emulator transitions render target to D3D12_RESOURCE_STATE_RENDER_TARGET, // and depth buffer to D3D12_RESOURCE_STATE_DEPTH_WRITE state pProxySwapChainD3D12->GetCurrentBackBuffer()->SetD3D12ResourceState(D3D12_RESOURCE_STATE_RENDER_TARGET); pProxySwapChainD3D12->GetDepthBuffer()->SetD3D12ResourceState(D3D12_RESOURCE_STATE_DEPTH_WRITE); } void DiligentGraphicsAdapterD3D12::EndFrame() { // Unity graphics emulator expects render target to be D3D12_RESOURCE_STATE_RENDER_TARGET, // and depth buffer to be in D3D12_RESOURCE_STATE_DEPTH_WRITE state auto *pCtxD3D12 = m_pDeviceCtx.RawPtr<IDeviceContextD3D12>(); auto *pProxySwapChainD3D12 = m_pProxySwapChain.RawPtr<ProxySwapChainD3D12>(); auto *pCurrentBackBuffer = pProxySwapChainD3D12->GetCurrentBackBuffer(); auto *pDepthBuffer = pProxySwapChainD3D12->GetDepthBuffer(); pCtxD3D12->TransitionTextureState(pCurrentBackBuffer, D3D12_RESOURCE_STATE_RENDER_TARGET); pCtxD3D12->TransitionTextureState(pDepthBuffer, D3D12_RESOURCE_STATE_DEPTH_WRITE); m_pDeviceCtx->Flush(); m_pDeviceCtx->FinishFrame(); m_pDeviceCtx->InvalidateState(); m_pDevice.RawPtr<IRenderDeviceD3D12>()->ReleaseStaleResources(); } bool DiligentGraphicsAdapterD3D12::UsesReverseZ() { return m_UnityGraphicsD3D12.UsesReverseZ(); }
[ "egor.yusov@gmail.com" ]
egor.yusov@gmail.com
2b3147ba06127460b739925f045c63efb7a4eece
8c5124aca14e5dff9038afd13d59731143e7da91
/June Challenge/Day 22.cpp
75a3ae7f8e1c4b0c37d63fae65eb4d4008c4a5d4
[]
no_license
raghavagrawal52/Data-Structures-and-Algorithms
48a1536eaa5d23f11770d37c8902f5a4015b2aed
b91bd620f444ab2d6956dbff73b4784c5522b9ed
refs/heads/master
2022-11-18T09:56:07.957461
2020-07-19T07:18:10
2020-07-19T07:18:10
265,901,366
0
0
null
null
null
null
UTF-8
C++
false
false
330
cpp
static int x = [](){ios::sync_with_stdio(false),cin.tie(NULL); return 0;}(); class Solution { public: int singleNumber(vector<int>& nums) { int first = 0, second = 0; for(int i: nums) { first = (first^i) & ~second; second = (second^i) & ~first; } return first; } };
[ "noreply@github.com" ]
raghavagrawal52.noreply@github.com
ae2dbea8aa24e30cc2fece02b143d3c125bbc517
7487c08a56546157df3f3681b03a7ec5d3bb9c44
/pgn/mainwindow.cpp
b1281b3e786af00435f740faff8b4b0b07a24392
[]
no_license
ifanatic/chessgameviewer2
431dbdf41474e7d1a2876ba85b431f8827602091
90966a7f36f9358666a4a5300f59989389e19d9e
refs/heads/master
2021-01-22T20:25:49.698309
2012-09-13T02:54:30
2012-09-13T02:54:30
null
0
0
null
null
null
null
UTF-8
C++
false
false
7,331
cpp
#include "mainwindow.h" #include "ui_mainwindow.h" #include <QSqlQuery> #include <iostream> #include <sstream> #include <QSqlRecord> #include <QMessageBox> #include <QModelIndexList> #include <iostream> #include "ply.h" #include "fenform.h" #include <QFileDialog> #include <QProgressDialog> #include "pgnimporter.h" #include "gamefinder.h" #include "pgnexporter.h" #include "positionstatdialog.h" #include "piecepathtracer.h" #include "piecepathdialog.h" bool MainWindow::openGame(int id) { cout << "opengame: " << endl; GameFinder finder; Game game = finder.getGameById(id); ui->lBlack->setText(game.tags()["Black"].value().c_str()); ui->lWhite->setText(game.tags()["White"].value().c_str()); ui->lWinner->setText(game.tags()["Result"].value().c_str()); vector<pgn::Ply> moves; ui->lwMoves->clear(); MoveList::iterator moveIter = game.moves().begin(); MoveList::iterator moveIterEnd = game.moves().end(); QString whitePattern = "White: %1"; QString blackPattern = "Black: %1"; while(moveIter != moveIterEnd) { ostringstream notation; if(moveIter->white() != NULL) { notation << (*moveIter->white()); ui->lwMoves->addItem(new QListWidgetItem(whitePattern.arg( notation.str().c_str()), ui->lwMoves)); moves.push_back(*moveIter->white()); } if(moveIter->black() != NULL) { notation.clear(); notation.str(""); notation << (*moveIter->black()); ui->lwMoves->addItem(new QListWidgetItem(blackPattern.arg( notation.str().c_str()), ui->lwMoves)); moves.push_back(*moveIter->black()); } ++moveIter; } _player->setMoves(moves); _player->goToBegin(); updateViews(); return true; } void MainWindow::updateViews() { if(_player->getCurrentPos() > 0) { ui->lwMoves->item(_player->getCurrentPos())->setSelected(true); ui->lwMoves->scrollTo(ui->lwMoves->selectionModel()->currentIndex()); } ui->cbvGame->updateChessboard(); if(_player->getCurrentPos() < 1) { ui->pbPrev->setEnabled(false); } else { ui->pbPrev->setEnabled(true); } if(_player->getCurrentPos() == (_player->movesCount() - 1)) { ui->pbNext->setEnabled(false); } else { ui->pbNext->setEnabled(true); } } MainWindow::MainWindow(QWidget *parent) : QMainWindow(parent), ui(new Ui::MainWindow) { ui->setupUi(this); connect(ui->cbvGame, SIGNAL(onPieceClick(int,int)), this, SLOT(onPieceClicked(int,int))); _gamesModel = new QSqlQueryModel(this); _gamesModel->setQuery("SELECT * FROM GAMES"); _player = new GamePlayer(); ui->tvGames->setModel(_gamesModel); ui->tvGames->hideColumn(0); _isNeedSelectFigure = false; } MainWindow::~MainWindow() { if(_player != NULL) { delete _player; } delete ui; } void MainWindow::on_pbSearch_clicked() { QString pattern = "select * from games where id in (select game_id from moves where " "fen like '%1')"; pattern = pattern.arg(ui->leSearchString->text().trimmed()); _gamesModel->setQuery(pattern); } void MainWindow::on_pbClear_clicked() { _gamesModel->setQuery("SELECT * FROM GAMES"); } void MainWindow::on_pbOpen_clicked() { QModelIndexList selRows = ui->tvGames->selectionModel()->selectedRows(); if(selRows.size() == 0) { std::cout << "No items selected" << std::endl; return; } QModelIndex selectedElement = selRows.at(0); QString text = _gamesModel->data(_gamesModel->index(selectedElement.row(), 0)).toString(); if(!openGame(text.toInt())) { QMessageBox msg; msg.setText(QString("Cannot open game #") + text); msg.exec(); } else { cout << "Open complete" << endl; ui->cbvGame->setChessboard(&_player->chessBoard()); } } void MainWindow::on_pbNext_clicked() { _player->next(); updateViews(); } void MainWindow::on_pbPrev_clicked() { _player->prev(); updateViews(); } void MainWindow::on_pbBegin_clicked() { _player->goToBegin(); updateViews(); } void MainWindow::on_pbEnd_clicked() { _player->goToEnd(); updateViews(); } void MainWindow::on_pbFindPgn_clicked() { FENForm fen; QString fenStr = fen.getFENForm(_player->chessBoard(), _player->currentColor()).c_str(); ui->leSearchString->setText(fenStr); ui->pbSearch->click(); } void MainWindow::on_actionImport_PGN_triggered() { QFileDialog openFileDialog(this); openFileDialog.exec(); openFileDialog.setFilter("*.pgn"); if(openFileDialog.result() == QDialog::Accepted) { if(openFileDialog.selectedFiles().size() == 0) { return; } PGNImporter importer; QProgressDialog progressDialog(QString("Import"), "", 0, 100); connect(&importer, SIGNAL(onProgress(int)), &progressDialog, SLOT(setValue(int))); importer.importFromFile(openFileDialog.selectedFiles()[0]); ui->pbClear->click(); } } void MainWindow::on_actionExport_to_PGN_triggered() { QFileDialog openFileDialog(this); openFileDialog.exec(); openFileDialog.setFilter("*.pgn"); if(openFileDialog.result() == QDialog::Accepted) { if(openFileDialog.selectedFiles().size() == 0) { return; } vector<int> ids; for(int i = 0; i < _gamesModel->rowCount(); ++i) { QModelIndex selectedElement = _gamesModel->index(i, 0); QString text = _gamesModel->data( _gamesModel->index(selectedElement.row(), 0)).toString(); ids.push_back(text.toInt()); } PGNExporter exporter; QProgressDialog progressDialog(QString("Import"), "", 0, 100); connect(&exporter, SIGNAL(onProgress(int)), &progressDialog, SLOT(setValue(int))); exporter.exportToFile(ids, openFileDialog.selectedFiles()[0]); // ui->pbClear->click(); } } void MainWindow::on_qpbStatForPos_clicked() { PositionStatDialog statDialog(_player->chessBoard(), _player->currentColor(), this); statDialog.exec(); } void MainWindow::onPieceClicked(int row, int col) { if(_isNeedSelectFigure) { PiecePathTracer pathTracer; vector<ChessPosition> path = pathTracer.path( _player->getMoves(), _player->getCurrentPos(), ChessPosition(row, col)); _isNeedSelectFigure = false; PiecePathDialog pathDialog( _player->chessBoard().getPiece(row, col), path, this); pathDialog.exec(); } } void MainWindow::on_qlTrackFigure_clicked() { _isNeedSelectFigure = true; }
[ "nikolay@3divi.com" ]
nikolay@3divi.com
f9d623267c033a6e82fca7fb5445b45ae28d8443
2ac1753652a65cb0beb4d1f83ae860060741d4f0
/MartaVegaBayo_MasterThesis/PubmedParser/AbstractParser.h
4ba7b705e2e3aedba3512367c9b206407c38caa5
[]
no_license
marta123456/ReferenceRecommendationForScientificArticles
b732acaf6b018876a60fda9c3e7f5a7edb30c3c5
762fa608427efb983f73daa23f0d61187dc8ae8f
refs/heads/master
2021-01-10T07:18:59.057105
2016-01-24T09:41:56
2016-01-24T09:41:56
50,256,680
0
0
null
null
null
null
UTF-8
C++
false
false
688
h
//Declaration of the class AbstractParser #if !defined (_ABSTRACTPARSER_H_) #define _ABSTRACTPARSER_H_ #include "../DataModel/CArticleParsed.h" #include "../Pugixml/pugixml.hpp" #include "ParserBase.h" /** AbstractParser class. This class has methods and attributes to parse from the DOM of an XML article with the JATS schema the abstract of the article and set with it the corresponding attribute of the CArticleParsed object inherited form ParserBase. */ class AbstractParser: public virtual ParserBase { private: pugi::xml_node aArticleMetaNode; //DOM node from where the abstract will be looked for public: void loadXMLnodes(pugi::xml_node &rootNode); void parse(); }; #endif
[ "martavegabayo@gmail.com" ]
martavegabayo@gmail.com
0b8d6c1d1e21e4b9cfd3040652dfc69dcbbc8d7c
b22588340d7925b614a735bbbde1b351ad657ffc
/athena/MuonSpectrometer/MuonCnv/MuonEventTPCnv/src/MuonRIO_OnTrack/CscClusterOnTrackCnv_p2.cxx
25b4e6853bfe1154f1aedded9c52d5188f41e0c3
[]
no_license
rushioda/PIXELVALID_athena
90befe12042c1249cbb3655dde1428bb9b9a42ce
22df23187ef85e9c3120122c8375ea0e7d8ea440
refs/heads/master
2020-12-14T22:01:15.365949
2020-01-19T03:59:35
2020-01-19T03:59:35
234,836,993
1
0
null
null
null
null
UTF-8
C++
false
false
3,097
cxx
/* Copyright (C) 2002-2017 CERN for the benefit of the ATLAS collaboration */ //----------------------------------------------------------------------------- // // file: CscClusterOnTrackCnv_p2.cxx // //----------------------------------------------------------------------------- #include "MuonRIO_OnTrack/CscClusterOnTrack.h" #include "MuonEventTPCnv/MuonRIO_OnTrack/CscClusterOnTrackCnv_p2.h" #include "TrkEventTPCnv/helpers/EigenHelpers.h" void CscClusterOnTrackCnv_p2:: persToTrans( const Muon::CscClusterOnTrack_p2 *persObj, Muon::CscClusterOnTrack *transObj, MsgStream &log ) { ElementLinkToIDC_CSC_Container rio; m_elCnv.persToTrans(&persObj->m_prdLink,&rio,log); Trk::LocalParameters localParams; fillTransFromPStore( &m_localParCnv, persObj->m_localParams, &localParams, log ); Trk::ErrorMatrix dummy; Amg::MatrixX localCovariance; fillTransFromPStore( &m_errorMxCnv, persObj->m_localErrMat, &dummy, log ); EigenHelpers::vectorToEigenMatrix(dummy.values, localCovariance, "CscClusterOnTrackCnv_p2"); *transObj = Muon::CscClusterOnTrack (rio, localParams, localCovariance, Identifier(persObj->m_id), nullptr, // detEL persObj->m_positionAlongStrip, static_cast<const Muon::CscClusterStatus>((persObj->m_status)&0xFF), // First 8 bits reserved for ClusterStatus. static_cast<const Muon::CscTimeStatus>((persObj->m_status)>>8), persObj->m_time); m_eventCnvTool->recreateRIO_OnTrack(const_cast<Muon::CscClusterOnTrack *>(transObj)); if (transObj->detectorElement()==0) log << MSG::WARNING<<"Unable to reset DetEl for this RIO_OnTrack, " << "probably because of a problem with the Identifier/IdentifierHash : (" << transObj->identify()<<"/"<<transObj->idDE()<<endreq; } void CscClusterOnTrackCnv_p2:: transToPers( const Muon::CscClusterOnTrack *transObj, Muon::CscClusterOnTrack_p2 *persObj, MsgStream &log ) { // Prepare ELs m_eventCnvTool->prepareRIO_OnTrack(const_cast<Muon::CscClusterOnTrack *>(transObj)); m_elCnv.transToPers(&transObj->prepRawDataLink(),&persObj->m_prdLink,log); persObj->m_id = transObj->identify().get_identifier32().get_compact(); persObj->m_localParams = toPersistent( &m_localParCnv, &transObj->localParameters(), log ); // persObj->m_localErrMat = toPersistent( &m_errorMxCnv, &transObj->m_localErrMat, log ); Trk::ErrorMatrix pMat; EigenHelpers::eigenMatrixToVector(pMat.values, transObj->localCovariance(), "CscClusterOnTrackCnv_p2"); persObj->m_localErrMat = toPersistent( &m_errorMxCnv, &pMat, log ); persObj->m_status = (transObj->timeStatus()<<8); // First 8 bits reserved for ClusterStatus. persObj->m_status += transObj->status(); persObj->m_positionAlongStrip = transObj->positionAlongStrip(); persObj->m_time = transObj->time(); }
[ "rushioda@lxplus754.cern.ch" ]
rushioda@lxplus754.cern.ch
9b016bed6b32fc0d377b62f31ea865f1bc4b5cea
0202c7495ff3513cac263ed9efda87269cb5f49a
/hazelcast/src/hazelcast/client/connection/HeartbeatManager.cpp
cad80c6f7a581a1935b2c398a520aa4dcd1bf7a4
[ "Apache-2.0" ]
permissive
dpwegener/hazelcast-cpp-client
66ebf2aadd5c8ba63ceabca75485b1d554e4ede0
3b50b88f434fbc49e39c8b00601756233990c2a8
refs/heads/master
2020-03-19T04:38:18.089140
2018-06-01T11:36:42
2018-06-01T11:36:42
135,848,799
0
0
Apache-2.0
2018-06-02T20:08:35
2018-06-02T20:08:35
null
UTF-8
C++
false
false
8,145
cpp
/* * Copyright (c) 2008-2018, Hazelcast, Inc. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "hazelcast/util/IOUtil.h" #include "hazelcast/client/protocol/codec/ClientPingCodec.h" #include "hazelcast/client/connection/HeartbeatManager.h" #include "hazelcast/client/spi/ClientContext.h" #include "hazelcast/client/spi/impl/ClientExecutionServiceImpl.h" #include "hazelcast/client/ClientProperties.h" #include "hazelcast/client/connection/ClientConnectionManagerImpl.h" #include "hazelcast/client/spi/impl/ClientInvocation.h" #include "hazelcast/client/spi/impl/ClientInvocationFuture.h" namespace hazelcast { namespace client { namespace connection { HeartbeatManager::HeartbeatManager(spi::ClientContext &client) : client(client), clientConnectionManager( client.getConnectionManager()), logger(util::ILogger::getLogger()) { ClientProperties &clientProperties = client.getClientProperties(); int timeoutSeconds = clientProperties.getHeartbeatTimeout().getInteger(); heartbeatTimeout = timeoutSeconds > 0 ? timeoutSeconds * 1000 : util::IOUtil::to_value<int>( (std::string) ClientProperties::PROP_HEARTBEAT_TIMEOUT_DEFAULT) * 1000; int intervalSeconds = clientProperties.getHeartbeatInterval().getInteger(); heartbeatInterval = intervalSeconds > 0 ? intervalSeconds * 1000 : util::IOUtil::to_value<int>( (std::string) ClientProperties::PROP_HEARTBEAT_INTERVAL_DEFAULT) * 1000; } void HeartbeatManager::start() { spi::impl::ClientExecutionServiceImpl &clientExecutionService = client.getClientExecutionService(); clientExecutionService.scheduleWithRepetition( boost::shared_ptr<util::Runnable>(new util::RunnableDelegator(*this)), heartbeatInterval, heartbeatInterval); } void HeartbeatManager::run() { if (!clientConnectionManager.isAlive()) { return; } int64_t now = util::currentTimeMillis(); BOOST_FOREACH (boost::shared_ptr<Connection> connection, clientConnectionManager.getActiveConnections()) { checkConnection(now, connection); } } const std::string HeartbeatManager::getName() const { return "HeartbeatManager"; } void HeartbeatManager::checkConnection(int64_t now, boost::shared_ptr<Connection> &connection) { if (!connection->isAlive()) { return; } if (now - connection->lastReadTimeMillis() > heartbeatTimeout) { if (connection->isHeartBeating()) { logger.warning() << "Heartbeat failed over the connection: " << *connection; connection->onHeartbeatFailed(); fireHeartbeatStopped(connection); } } if (now - connection->lastReadTimeMillis() > heartbeatInterval) { std::auto_ptr<protocol::ClientMessage> request = protocol::codec::ClientPingCodec::encodeRequest(); boost::shared_ptr<spi::impl::ClientInvocation> clientInvocation = spi::impl::ClientInvocation::create( client, request, "", connection); clientInvocation->setBypassHeartbeatCheck(true); connection->onHeartbeatRequested(); boost::shared_ptr<spi::impl::ClientInvocationFuture> clientInvocationFuture = clientInvocation->invokeUrgent(); clientInvocationFuture->andThen(boost::shared_ptr< impl::ExecutionCallback<boost::shared_ptr<protocol::ClientMessage> > >( new HearbeatCallback(connection, logger))); } else { if (!connection->isHeartBeating()) { logger.warning() << "Heartbeat is back to healthy for the connection: " << *connection; connection->onHeartbeatResumed(); fireHeartbeatResumed(connection); } } } void HeartbeatManager::fireHeartbeatStopped(boost::shared_ptr<Connection> &connection) { std::vector<boost::shared_ptr<spi::impl::ConnectionHeartbeatListener> > listeners = heartbeatListeners; BOOST_FOREACH (boost::shared_ptr<spi::impl::ConnectionHeartbeatListener> heartbeatListener, listeners) { heartbeatListener->heartbeatStopped(connection); } } void HeartbeatManager::fireHeartbeatResumed(boost::shared_ptr<Connection> &connection) { std::vector<boost::shared_ptr<spi::impl::ConnectionHeartbeatListener> > listeners = heartbeatListeners; BOOST_FOREACH (boost::shared_ptr<spi::impl::ConnectionHeartbeatListener> heartbeatListener, listeners) { heartbeatListener->heartbeatResumed(connection); } } void HeartbeatManager::addConnectionHeartbeatListener( const boost::shared_ptr<spi::impl::ConnectionHeartbeatListener> &connectionHeartbeatListener) { do { std::vector<boost::shared_ptr<spi::impl::ConnectionHeartbeatListener> > listeners = heartbeatListeners; std::vector<boost::shared_ptr<spi::impl::ConnectionHeartbeatListener> > newListeners = listeners; newListeners.push_back(connectionHeartbeatListener); if (heartbeatListeners.compareAndSet(listeners, newListeners)) { break; } } while (true); } void HeartbeatManager::shutdown() { heartbeatListeners = std::vector<boost::shared_ptr<spi::impl::ConnectionHeartbeatListener> >(); } HeartbeatManager::HearbeatCallback::HearbeatCallback(const boost::shared_ptr<Connection> &connection, util::ILogger &logger) : connection(connection), logger(logger) {} void HeartbeatManager::HearbeatCallback::onResponse(const boost::shared_ptr<protocol::ClientMessage> &response) { if (connection->isAlive()) { connection->onHeartbeatReceived(); } } void HeartbeatManager::HearbeatCallback::onFailure(const boost::shared_ptr<exception::IException> &e) { if (connection->isAlive()) { logger.warning() << "Error receiving ping answer from the connection: " << *connection << *e; } } void HeartbeatManager::HeartbeatTask::run() { while (heartbeatManager.clientConnectionManager.isAlive()) { heartbeatManager.run(); } } const std::string HeartbeatManager::HeartbeatTask::getName() const { return "HeartbeatTask"; } HeartbeatManager::HeartbeatTask::HeartbeatTask(HeartbeatManager &heartbeatManager) : heartbeatManager( heartbeatManager) { } } } }
[ "noreply@github.com" ]
dpwegener.noreply@github.com
26f9bc83b6f87b7132a67994d1d42aad8c5076fc
fae551eb54ab3a907ba13cf38aba1db288708d92
/chrome/browser/ash/web_applications/help_app/help_app_discover_tab_notification_unittest.cc
0930803f8dd02d010f944dc5b02a052fb3724bc0
[ "BSD-3-Clause" ]
permissive
xtblock/chromium
d4506722fc6e4c9bc04b54921a4382165d875f9a
5fe0705b86e692c65684cdb067d9b452cc5f063f
refs/heads/main
2023-04-26T18:34:42.207215
2021-05-27T04:45:24
2021-05-27T04:45:24
371,258,442
2
1
BSD-3-Clause
2021-05-27T05:36:28
2021-05-27T05:36:28
null
UTF-8
C++
false
false
5,122
cc
// Copyright 2021 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/browser/ash/web_applications/help_app/help_app_discover_tab_notification.h" #include "base/test/metrics/user_action_tester.h" #include "base/test/mock_callback.h" #include "chrome/browser/notifications/notification_display_service_tester.h" #include "chrome/browser/notifications/notification_handler.h" #include "chrome/browser/notifications/system_notification_helper.h" #include "chrome/browser/ui/web_applications/system_web_app_ui_utils.h" #include "chrome/browser/web_applications/system_web_apps/system_web_app_types.h" #include "chrome/test/base/browser_with_test_window_test.h" #include "chrome/test/base/testing_browser_process.h" #include "chrome/test/base/testing_profile.h" #include "chrome/test/base/testing_profile_manager.h" namespace chromeos { class HelpAppDiscoverTabNotificationTest : public BrowserWithTestWindowTest { public: HelpAppDiscoverTabNotificationTest() {} ~HelpAppDiscoverTabNotificationTest() override = default; HelpAppDiscoverTabNotificationTest( const HelpAppDiscoverTabNotificationTest&) = delete; HelpAppDiscoverTabNotificationTest& operator=( const HelpAppDiscoverTabNotificationTest&) = delete; TestingProfile* CreateProfile() override { return profile_manager()->CreateTestingProfile("user@gmail.com"); } void SetUp() override { BrowserWithTestWindowTest::SetUp(); TestingBrowserProcess::GetGlobal()->SetSystemNotificationHelper( std::make_unique<SystemNotificationHelper>()); discover_tab_notification_ = std::make_unique<HelpAppDiscoverTabNotification>(profile()); notification_tester_ = std::make_unique<NotificationDisplayServiceTester>(nullptr); } void TearDown() override { discover_tab_notification_.reset(); notification_tester_.reset(); BrowserWithTestWindowTest::TearDown(); } protected: bool HasDiscoverTabNotification() { return notification_tester_ ->GetNotification(kShowHelpAppDiscoverTabNotificationId) .has_value(); } message_center::Notification GetDiscoverTabNotification() { return notification_tester_ ->GetNotification(kShowHelpAppDiscoverTabNotificationId) .value(); } std::unique_ptr<HelpAppDiscoverTabNotification> discover_tab_notification_; std::unique_ptr<NotificationDisplayServiceTester> notification_tester_; }; TEST_F(HelpAppDiscoverTabNotificationTest, ShowsNotificationCorrectly) { discover_tab_notification_->Show(); EXPECT_EQ(true, HasDiscoverTabNotification()); EXPECT_EQ("Design and build your own games", base::UTF16ToASCII(GetDiscoverTabNotification().title())); EXPECT_EQ("Learn from a game creator, get game design apps, and more", base::UTF16ToASCII(GetDiscoverTabNotification().message())); } TEST_F(HelpAppDiscoverTabNotificationTest, LogsMetricWhenNotificationShown) { base::UserActionTester user_action_tester; EXPECT_EQ(0, user_action_tester.GetActionCount( "Discover.DiscoverTabNotification.Shown")); discover_tab_notification_->Show(); EXPECT_EQ(1, user_action_tester.GetActionCount( "Discover.DiscoverTabNotification.Shown")); } TEST_F(HelpAppDiscoverTabNotificationTest, ClickingNotificationDismissesIt) { discover_tab_notification_->Show(); notification_tester_->SimulateClick(NotificationHandler::Type::TRANSIENT, kShowHelpAppDiscoverTabNotificationId, /*action_index=*/0, /*reply=*/absl::nullopt); EXPECT_EQ(false, HasDiscoverTabNotification()); } TEST_F(HelpAppDiscoverTabNotificationTest, ClickingNotificationCallsOnClickCallback) { base::MockCallback<base::RepeatingClosure> mock_callback; EXPECT_CALL(mock_callback, Run()); discover_tab_notification_->SetOnClickCallbackForTesting(mock_callback.Get()); discover_tab_notification_->Show(); notification_tester_->SimulateClick(NotificationHandler::Type::TRANSIENT, kShowHelpAppDiscoverTabNotificationId, /*action_index=*/0, /*reply=*/absl::nullopt); EXPECT_EQ(false, HasDiscoverTabNotification()); } TEST_F(HelpAppDiscoverTabNotificationTest, LogsMetricWhenNotificationClicked) { base::UserActionTester user_action_tester; discover_tab_notification_->Show(); EXPECT_EQ(0, user_action_tester.GetActionCount( "Discover.DiscoverTabNotification.Clicked")); notification_tester_->SimulateClick(NotificationHandler::Type::TRANSIENT, kShowHelpAppDiscoverTabNotificationId, /*action_index=*/0, /*reply=*/absl::nullopt); EXPECT_EQ(1, user_action_tester.GetActionCount( "Discover.DiscoverTabNotification.Clicked")); } } // namespace chromeos
[ "chromium-scoped@luci-project-accounts.iam.gserviceaccount.com" ]
chromium-scoped@luci-project-accounts.iam.gserviceaccount.com
06a39cab64afdba9214f36e027eeae3605e911f3
3a484e659d6e621e518ef12b898bcd8d1ba88bc3
/BitBuffer.cpp
ee0b39cef48eaeb4499ab56d0bb3f44379efa74b
[]
no_license
jyeon2yu/Forensic_Watermarking_Program1
ff64297257a0a0788593061e78063658b88695f4
fe64aa088254202ea65770881cd088612756a8b5
refs/heads/master
2021-12-13T16:59:21.945357
2021-11-12T09:08:35
2021-11-12T09:08:35
188,376,224
3
0
null
null
null
null
UTF-8
C++
false
false
418
cpp
#include "stdafx.h" #include <stdexcept> #include "BitBuffer.hpp" namespace qrcodegen { BitBuffer::BitBuffer() : std::vector<bool>() {} void BitBuffer::appendBits(std::uint32_t val, int len) { if (len < 0 || len > 31 || val >> len != 0) throw std::domain_error("Value out of range"); for (int i = len - 1; i >= 0; i--) // Append bit by bit { this->push_back(((val >> i) & 1) != 0); } } }
[ "jyeon2yu@gmail.com" ]
jyeon2yu@gmail.com
4ef4be8ea52b65e8b9428002122ad3ce2d70a913
a94d0b0346493372ef475781c417b62b04cf4ed7
/compose.cpp
7937ecd68b040988b32d98571e7bd86bcaefd71a
[]
no_license
VibhuGautam/Cpp
ad8878b0a13d4275bc4bdb85de5cd92695fbab08
5a9ed7a3a1ed420ec505dcde04ab50597d01e26d
refs/heads/master
2023-04-22T22:34:23.790941
2021-04-25T05:39:59
2021-04-25T05:39:59
361,340,435
0
0
null
null
null
null
UTF-8
C++
false
false
1,041
cpp
/*------------------------------------ Author : Vibhu Gautam Date = 24/04/2021 Time = 10:57:50 ------------------------------------*/ #pragma GCC optimize("Ofast") #pragma GCC target("sse,sse2,sse3,ssse3,sse4,popcnt,abm,mmx,avx,avx2,fma") #pragma GCC optimize("unroll-loops") #include <bits/stdc++.h> using namespace std; typedef long long ll; const ll MOD = 998244353 , mod = 1e9 + 7; #define rep(i,a,b) for(ll i = a; i < b; ++i) #define repr(i,a,b) for(ll i = a; i >= b; --i) #define pb push_back #define fast_cin() ios_base::sync_with_stdio(false); cin.tie(NULL); cout.tie(NULL) // compose(g, f) -- returns a function h such that h(x) == g(f(x)). template <typename Function> auto COMPOSE(Function f, Function g) { return [f, g](auto const &input) { return f(g(input)); }; } ll a(ll x) { return 2 * x; } ll b(ll x) { return 3 * x; } void solve() { auto h = COMPOSE(a, b); cout << h(2); } int main() { fast_cin(); ll t = 1; // cin >> t; for(ll it=1;it<=t;it++) { solve(); } return 0; }
[ "vibhuparmar13@gmail.com" ]
vibhuparmar13@gmail.com
98f4db4b4ff3a42ab99685aa60a1415c17a7c910
983cf97b4b0142eadfcdbd3e39590ba31f926fec
/filesystem.cpp
529dc5eb28a6bd45f60b32f07b6c0788917992f9
[]
no_license
gschueler/mcmap
f82d0b7881251d702ff2b88e66c0b44bf2a60f35
caab0d21894111547ccac1bdb790254e92e07736
refs/heads/master
2020-12-30T17:19:33.455996
2010-10-20T10:52:07
2010-10-20T10:52:07
null
0
0
null
null
null
null
UTF-8
C++
false
false
7,328
cpp
#include "filesystem.h" #ifdef MSVCP #include <direct.h> // See http://en.wikipedia.org/wiki/Stdint.h#External_links #include <stdint.h> #else #include <sys/types.h> #include <sys/stat.h> #include <sys/param.h> #include <unistd.h> #endif #include <cstdarg> #include <cstdlib> #include <cstring> #define CCEND ((char*)0) #ifdef MSVCP // For UTF8 conversion #define LOWER_6_BIT(u) ((u) & 0x003f) #define LOWER_7_BIT(u) ((u) & 0x007f) #define BIT7(a) ((a) & 0x80) #define BIT6(a) ((a) & 0x40) #define BIT5(a) ((a) & 0x20) #define BIT54(a) ((a) & 0x30) #define BIT543(a) ((a) & 0x38) #define BIT2(a) ((a) & 0x04) #define BIT1(a) ((a) & 0x02) #define BIT0(a) ((a) & 0x01) // Return: -1 = at least one nullpointer, 1 = success, 0 = outbuffer too small static int Utf8ToWideChar(char *pUTF8, size_t cchSrc, wchar_t *pWCHAR, size_t cchDest, bool *isvalid) { if (!pUTF8 || !pWCHAR) { return -1; // Valid pointers? } int nTB = 0; // Number of bytes left for current char wchar_t *pDestEnd = pWCHAR + cchDest; char *pSrcEnd = pUTF8 + cchSrc; char UTF8; if (isvalid != NULL) { *isvalid = true; } while ((pUTF8 < pSrcEnd) && (pWCHAR < pDestEnd)) { if (BIT7(*pUTF8) == 0) { // normal ASCII if (nTB) { // last mulibyte char not complete, insert '?' nTB = 0; *pWCHAR++ = 63; if (isvalid != NULL) { *isvalid = false; } } else { // just convert *pWCHAR++ = (wchar_t)*pUTF8++; } } else if (BIT6(*pUTF8) == 0) { // utf8 sequence byte (not first) if (nTB != 0) { *pWCHAR <<= 6; *pWCHAR |= LOWER_6_BIT(*pUTF8); if (--nTB == 0) { ++pWCHAR; } } else { // No more trailing bytes expected, insert '?' *pWCHAR++ = 63; if (isvalid != NULL) { *isvalid = false; } } ++pUTF8; } else { // No ASCII and no trailing byte if (nTB) { // but last char was multibyte and not complete yet, insert '?' nTB = 0; *pWCHAR++ = 63; if (isvalid != NULL) { *isvalid = false; } } else { // OK, check how many bytes UTF8 = *pUTF8; while (BIT7(UTF8) != 0) { // count number of bytes for this char UTF8 <<= 1; nTB++; } if (nTB > 4) { // too long, utf8 specs allow only up to 4 bytes per char nTB = 0; *pWCHAR++ = 63; // time for a '?' if (isvalid != NULL) { *isvalid = false; } } else { // just shift bits back and assign *pWCHAR = UTF8 >> nTB--; } } ++pUTF8; } } if (nTB != 0 && isvalid != NULL) { *isvalid = false; } if (pWCHAR < pDestEnd) { *pWCHAR = 0; return 1; } *(pWCHAR-1) = 0; return 0; } // Return: -1 = at least one nullpointer, 1 = success, 0 = outbuffer too small template <class T> int WideCharToUtf8(T pWCHAR, size_t cchSrc, uint8_t *pUTF8, size_t cchDest) { if (!pUTF8 || !pWCHAR) { return -1; // Valid pointers? } uint8_t *pDestEnd = pUTF8 + cchDest; T pSrcEnd = pWCHAR + cchSrc; uint8_t UTF8[4]; while ((pWCHAR < pSrcEnd) && (pUTF8 < pDestEnd)) { if (LOWER_7_BIT(*pWCHAR) == *pWCHAR) { // normal ASCII *pUTF8++ = (uint8_t)*pWCHAR++; } else { // utf8 encode! int i; for (i = 0; i < 4; ++i) { UTF8[i] = LOWER_6_BIT(*pWCHAR) | 0x80; *pWCHAR >>= 6; if (*pWCHAR == 0) { break; } } bool exp = false; if (i == 1 && BIT5(UTF8[1])) { exp = true; } else if (i == 2 && BIT54(UTF8[2])) { exp = true; } else if (i == 3 && BIT543(UTF8[3])) { exp = true; } if (exp) { ++i; UTF8[i] = (0xff) << (7 - i); } else if (i == 1) { UTF8[1] |= 0xc0; } else if (i == 2) { UTF8[2] |= 0xe0; } else if (i == 3) { UTF8[3] |= 0xf0; } do { *pUTF8++ = UTF8[i]; if (pUTF8 >= pDestEnd) { *(pUTF8-1) = '\0'; return 0; } } while (i-- > 0); ++pWCHAR; } } if (pUTF8 >= pDestEnd) { *(pUTF8-1) = '\0'; return 0; } *pUTF8 = 0; return 1; } #endif static size_t concat(char *buffer, const size_t len, char *source, ...) { if (len <= 0) { return 0; } va_list parg; size_t count = 0; va_start(parg, source); if (source != CCEND) do { while (*source != 0) { *buffer++ = *source++; if (++count >= len) { *(buffer-1) = 0; va_end(parg); /* End variable argument process */ return count; } } } while((source = va_arg(parg, char*)) != CCEND); va_end(parg); /* End variable argument process */ *buffer = 0; return count; } namespace Dir { DIRHANDLE open(char* path, myFile &file) { if (path == NULL) { return NULL; } #ifdef MSVCP char buffer[1000]; wchar_t wbuffer[1000]; _WIN32_FIND_DATAW ffd; concat(buffer, 1000, path, "/*", CCEND); bool b; Utf8ToWideChar(buffer, strlen(buffer), wbuffer, 1000, &b); HANDLE h = FindFirstFileW(wbuffer, &ffd); if (h == INVALID_HANDLE_VALUE) { return NULL; } WideCharToUtf8(ffd.cFileName, wcslen(ffd.cFileName), (uint8_t*)file.name, sizeof(file.name)); file.isdir = ((ffd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY) == FILE_ATTRIBUTE_DIRECTORY); file.size = ffd.nFileSizeLow; #else DIR* h = opendir(path); if (h == NULL) { return NULL; } dirent *dirp = readdir(h); char buffer[1000]; concat(buffer, 1000, path, "/", dirp->d_name, CCEND); struct stat stDirInfo; if (stat(buffer, &stDirInfo) < 0) { closedir(h); return NULL; } strncpy(file.name, dirp->d_name, sizeof(file.name)); file.isdir = S_ISDIR(stDirInfo.st_mode); file.size = stDirInfo.st_size; #endif return h; } bool next(DIRHANDLE handle, char* path, myFile &file) { #ifdef MSVCP _WIN32_FIND_DATAW ffd; bool ret = FindNextFileW(handle, &ffd) == TRUE; if (!ret) { return false; } WideCharToUtf8(ffd.cFileName, wcslen(ffd.cFileName), (uint8_t*)file.name, sizeof(file.name)); file.isdir = ((ffd.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY) == FILE_ATTRIBUTE_DIRECTORY); file.size = ffd.nFileSizeLow; #else dirent *dirp = readdir(handle); if (dirp == NULL) { return false; } char buffer[1000]; concat(buffer, 1000, path, "/", dirp->d_name, CCEND); struct stat stDirInfo; if (stat(buffer, &stDirInfo) < 0) { return false; } strncpy(file.name, dirp->d_name, sizeof(file.name)); file.isdir = S_ISDIR(stDirInfo.st_mode); file.size = stDirInfo.st_size; #endif return true; } void close(DIRHANDLE handle) { #ifdef MSVCP FindClose(handle); #else closedir(handle); #endif } }
[ "spam@aol.com" ]
spam@aol.com
1b430879275db5bdcff91a3608df64446a65a5d8
a3f825ea90fa6038dd50f05409fc51f960eb3856
/OTA.ino
e69e0ec8e19262638dc8553b445dc4cd84d5891c
[]
no_license
PanegyricLyric/NODEMCU-OTA-BLYNK-LED
d6f46ba7f0a16b9eef2428f704a275b745e80d3e
5a827361e21189b94a489f6e3e058c2acfffc764
refs/heads/master
2020-03-23T14:52:49.330593
2018-11-17T21:38:34
2018-11-17T21:38:34
141,705,237
0
0
null
null
null
null
UTF-8
C++
false
false
2,042
ino
//---------------------------FOR-WIFI-UPDATE----------------------SETUP void OTA_Conf(){ Serial.println("Booting"); WiFi.mode(WIFI_STA); WiFi.begin(ssid, password); while (WiFi.waitForConnectResult() != WL_CONNECTED) { Serial.println("Connection Failed! Rebooting..."); delay(5000); ESP.restart(); } // Port defaults to 8266 // ArduinoOTA.setPort(8266); ArduinoOTA.setHostname("esp8266"); // No authentication by default // ArduinoOTA.setPassword("admin"); // Password can be set with it's md5 value as well // MD5(admin) = 21232f297a57a5a743894a0e4a801fc3 // ArduinoOTA.setPasswordHash("21232f297a57a5a743894a0e4a801fc3"); ArduinoOTA.onStart([]() { String type; if (ArduinoOTA.getCommand() == U_FLASH) type = "sketch"; else // U_SPIFFS type = "filesystem"; // NOTE: if updating SPIFFS this would be the place to unmount SPIFFS using SPIFFS.end() Serial.println("Start updating " + type); }); ArduinoOTA.onEnd([]() { Serial.println("\nEnd"); }); ArduinoOTA.onProgress([](unsigned int progress, unsigned int total) { Serial.printf("Progress: %u%%\r", (progress / (total / 100))); }); ArduinoOTA.onError([](ota_error_t error) { Serial.printf("Error[%u]: ", error); if (error == OTA_AUTH_ERROR) Serial.println("Auth Failed"); else if (error == OTA_BEGIN_ERROR) Serial.println("Begin Failed"); else if (error == OTA_CONNECT_ERROR) Serial.println("Connect Failed"); else if (error == OTA_RECEIVE_ERROR) Serial.println("Receive Failed"); else if (error == OTA_END_ERROR) Serial.println("End Failed"); }); ArduinoOTA.begin(); Serial.println("Ready"); Serial.print("IP address: "); Serial.println(WiFi.localIP()); }
[ "39015426+PanegyricLyric@users.noreply.github.com" ]
39015426+PanegyricLyric@users.noreply.github.com
6be1fd378687beaaf1659f5c2409a122a7faa4a5
a756eed9030c5afa645436412d777a1774357c70
/dsa/Graphs/Strongly _connected _components_with backedge.cpp
b5dd8293df1c5cf83c2a7da47bb8b109dfb6c04b
[]
no_license
jainsourav43/DSA
fc92faa7f8e95151c8f0af4c69228d4db7e1e5ce
deb46f70a1968b44bb28389d01b35cb571a8c293
refs/heads/master
2021-05-25T09:13:42.418930
2020-06-30T07:36:56
2020-06-30T07:36:56
126,943,860
0
1
null
2020-06-30T07:36:57
2018-03-27T07:07:51
C++
UTF-8
C++
false
false
3,302
cpp
#include<iostream> using namespace std; struct queue { int size; int element[50]; int front; int rear; }; struct stack { int top; int size; int ele[5]; }; void enque(queue &q,int x) { if((q.rear+1)%q.size==q.front) { cout<<"Queue is overloaded\n"; } else { if(q.front==-1) q.front=0; q.rear=(q.rear+1)%q.size; q.element[q.rear]=x; } } int deque(queue &q) { int t; if(q.front==-1) { cout<<"Queue is Empty\n"; } else { t=q.front; if(q.front==q.rear) { q.front=-1; q.rear=-1; } else { q.front=(q.front+1)%q.size; } return q.element[t]; } } int a[50][50]={0},n; int in_degree(int n,int v) { int dg=0; for(int i=1;i<=n;i++) { if(a[v][i]==1) { dg++; } } return dg-1; } int out_degree(int n,int v) { int dg=0; for(int i=0;i<n;i++){ if(a[v][i]==1) { dg++; } } return dg-1; } void print(int a[][50],int n) { for(int i=0;i<n;i++) { for(int j=0;j<n;j++) { cout<<a[i][j]<<" "; } cout<<endl; } } int ve[50]; int count[50]; int s; int number[20]; int ans=1; int parent[20]; int findmin(int a,int b,int c) { if(a<=b&&a<=c) return a; else if(b<=a&&b<=c) return b; else return c; } int si=0,dft_tree[20]; void dfs(int v,int n) { int i;static int ans=1; if(ve[v]==0) { ve[v]=1; number[v]=ans++; dft_tree[si++]=v; cout<<v<<" "; for(i=1;i<=n;i++) { if(a[v][i]>0&&ve[i]==0) { count[i]++; parent[i]=v; dfs(i,n); } } } } int lowv[20]={0},low[20]; int bvi[20]={0}; void findlow(int v) { if(lowv[v]==0){ int i,j,min=1000,k,min2=1000,min3=1000; lowv[v]=1; for(i=1;i<=n;i++) { if(lowv[i]==1&&v==parent[i]) { if(min>low[i]) { min=low[i]; } } else if(lowv[i]==0&&v==parent[i]) { findlow(i); k=low[i]; if(min>k) min=k; } } min2=number[v]; int check=0; for(i=1;i<=n;i++) { if(a[v][i]>0) { if(i!=parent[v]&&v!=parent[i]) { if(min3>number[i]) { min3=number[i]; } } } } low[v]=findmin(min,min2,min3); } } int main() { int n1,i,ou,j; queue q; q.front=-1; q.rear=-1; q.size=50; cout<<"Enter the number of vertices\n"; cin>>n;int check,max; for(i=1;i<=n;i++) { ve[i]=0; count[i] =0; } int in[n],u,v,i1; cout<<"Enter the number of edges\n"; cin>>n1;int un[n1],vn[n1]; for(i=0;i<n1;i++) { cout<<"enter the u and v 'u->v' \n"; cin>>u>>v; a[u][v]=1; } cout<<"enter the starting vertex\n"; cin>>s; count[s]++; parent[s]=-1; cout<<"\nDFS is \n"; dfs(s,n);cout<<endl; while(check==0) { for(i=1;i<=n;i++) { if(ve[i]==0) { dfs(i,n); cout<<endl; } } for(j=1;j<=n;j++) { if(ve[j]==1) { check=1; } else if(ve[j]==0) { check=0; break; } } } cout<<"Numbered array\n"; for(i=1;i<=n;i++) { cout<<number[i]<<" "; } for(i=n;i>0;i--) { if(lowv[i]==0) findlow(i); } cout<<"Low of vertices are\n"; for(i=1;i<=n;i++) { cout<<low[i]<<" "; } for(i=1;i<=n;i++) { if(low[i]<number[i]) { cout<<i<<" "; } } return 0; }
[ "jainsourav43@gmail.com" ]
jainsourav43@gmail.com
52df1ddb3edebe4d512553ae12b1a496491a1460
2b79bbce9496b2c5bddcf6fa93698b77f778d9eb
/2020.10.27 確認テストその2/3.cpp
71d6b0427b01827b5114f0e164b9d707d7c099b9
[]
no_license
YumiNose/2020.10.27-2
39979d189d2b14f9655270b969688763caf7c1fb
0cec03e95f31f402680ccf5ca29d87b9eadd60e8
refs/heads/master
2023-01-04T16:55:33.541527
2020-10-27T03:12:08
2020-10-27T03:12:08
307,571,352
0
0
null
null
null
null
UTF-8
C++
false
false
288
cpp
/* #include <iostream> #include <cstdlib> #include <ctime> using namespace std; void InitRand() { srand((unsigned int)time(NULL)); } int Random() { return rand() % 10 + 1; } int main() { InitRand(); for (int i = 0; i < 10; ++i) { cout << Random() << ' '; } cout << endl; } */
[ "yumi.nose28@gmail.com" ]
yumi.nose28@gmail.com
7516128ba3af07caf113e7dda5a012acae8e07c0
a80baeb35fe6af3955d7f919670e525159c53682
/src/game/Tactical/UI_Cursors.cc
dac5e9d29eb88793472b353ffec5cf4bc0c94501
[]
no_license
hb029/JA-2-Stracciatella
6a1fcbfa27c20483f1e589569620c3cf863ddebd
6032a92164807419e2d8f49032bda8f1f67f8799
refs/heads/master
2022-12-10T10:01:14.869697
2022-12-04T03:36:47
2022-12-04T03:36:47
4,460,383
2
0
null
2022-06-17T01:32:30
2012-05-27T06:58:10
C++
UTF-8
C++
false
false
35,014
cc
#include "Handle_Items.h" #include "Items.h" #include "Soldier_Find.h" #include "Structure.h" #include "TileDef.h" #include "Timer_Control.h" #include "Weapons.h" #include "Soldier_Control.h" #include "Overhead.h" #include "Handle_UI.h" #include "Animation_Control.h" #include "Points.h" #include "Sound_Control.h" #include "Isometric_Utils.h" #include "Animation_Data.h" #include "UI_Cursors.h" #include "LOS.h" #include "Interface.h" #include "Cursors.h" #include "Cursor_Control.h" #include "Structure_Wrap.h" #include "Physics.h" #include "Soldier_Macros.h" #include "Text.h" #include "Interactive_Tiles.h" #include "PathAI.h" #include "Debug.h" #include "ContentManager.h" #include "GameInstance.h" #include <string_theory/string> // FUNCTIONS FOR ITEM CURSOR HANDLING static UICursorID HandleActivatedTargetCursor( SOLDIERTYPE*, GridNo map_pos, BOOLEAN recalc); static UICursorID HandleNonActivatedTargetCursor(SOLDIERTYPE*, GridNo map_pos, BOOLEAN show_APs, BOOLEAN fRecalc, MouseMoveState); static UICursorID HandleKnifeCursor( SOLDIERTYPE*, GridNo map_pos, BOOLEAN activated, MouseMoveState); static UICursorID HandlePunchCursor( SOLDIERTYPE*, GridNo map_pos, BOOLEAN activated, MouseMoveState); static UICursorID HandleAidCursor( SOLDIERTYPE*, GridNo map_pos, BOOLEAN activated, MouseMoveState); static UICursorID HandleActivatedTossCursor(); static UICursorID HandleNonActivatedTossCursor( SOLDIERTYPE*, GridNo map_pos, BOOLEAN recalc, MouseMoveState, ItemCursor); static UICursorID HandleWirecutterCursor( SOLDIERTYPE*, GridNo map_pos, MouseMoveState); static UICursorID HandleRepairCursor( SOLDIERTYPE*, GridNo map_pos, MouseMoveState); static UICursorID HandleRefuelCursor( SOLDIERTYPE*, GridNo map_pos, MouseMoveState); static UICursorID HandleRemoteCursor( SOLDIERTYPE*, BOOLEAN activated, MouseMoveState); static UICursorID HandleBombCursor( SOLDIERTYPE*, GridNo map_pos, BOOLEAN activated, MouseMoveState); static UICursorID HandleJarCursor( SOLDIERTYPE*, GridNo map_pos, MouseMoveState); static UICursorID HandleTinCanCursor( SOLDIERTYPE*, GridNo map_pos, MouseMoveState); static BOOLEAN gfCannotGetThrough = FALSE; static BOOLEAN gfDisplayFullCountRing = FALSE; BOOLEAN GetMouseRecalcAndShowAPFlags(MouseMoveState* const puiCursorFlags, BOOLEAN* const pfShowAPs) { static bool do_new_tile = false; // Set flags for certain mouse movements MouseMoveState const cursor_flags = GetCursorMovementFlags(); bool recalc = false; // Force if we are currently cycling guys if (gfUIForceReExamineCursorData) { do_new_tile = true; recalc = true; gfUIForceReExamineCursorData = FALSE; } bool show_APs = false; if (cursor_flags != MOUSE_STATIONARY) { // If cursor was previously stationary, make the additional check of grid // pos change RESETCOUNTER(PATHFINDCOUNTER); do_new_tile = true; } else if (COUNTERDONE(PATHFINDCOUNTER)) // Only dipslay aps after a delay { // Don't reset counter: One when we move again do we do this! show_APs = true; if (do_new_tile) { do_new_tile = false; recalc = true; } } if (puiCursorFlags) *puiCursorFlags = cursor_flags; if (pfShowAPs) *pfShowAPs = show_APs; return recalc; } // Functions for cursor determination UICursorID GetProperItemCursor(SOLDIERTYPE* const s, GridNo const map_pos, BOOLEAN const activated) { MouseMoveState cursor_flags; BOOLEAN show_APs; BOOLEAN const recalc = GetMouseRecalcAndShowAPFlags(&cursor_flags, &show_APs); // ATE: Update attacking weapon! // CC has added this attackingWeapon stuff and I need to update it constantly // for CTGH algorithms if (gTacticalStatus.ubAttackBusyCount == 0) { UINT16 const in_hand = s->inv[HANDPOS].usItem; if (GCM->getItem(in_hand)->isWeapon()) s->usAttackingWeapon = in_hand; } UICursorID cursor = NO_UICURSOR; SOLDIERTYPE const* const tgt = gUIFullTarget; GridNo const tgt_grid_no = tgt ? tgt->sGridNo : map_pos; ItemCursor const item_cursor = GetActionModeCursor(s); switch (item_cursor) { case TARGETCURS: cursor = activated ? HandleActivatedTargetCursor(s, tgt_grid_no, recalc) : HandleNonActivatedTargetCursor(s, tgt_grid_no, show_APs, recalc, cursor_flags); if (gCurrentUIMode == ACTION_MODE && gTacticalStatus.uiFlags & INCOMBAT && recalc && tgt && IsValidTargetMerc(tgt) && EnoughAmmo(s, FALSE, HANDPOS) && // ATE: Check for ammo guiUIFullTargetFlags & ENEMY_MERC && // IF it's an ememy, goto confirm action mode guiUIFullTargetFlags & VISIBLE_MERC && !(guiUIFullTargetFlags & DEAD_MERC) && !gfCannotGetThrough) { guiPendingOverrideEvent = A_CHANGE_TO_CONFIM_ACTION; } break; case TOSSCURS: case TRAJECTORYCURS: cursor = activated && gfUIHandlePhysicsTrajectory ? HandleActivatedTossCursor() : HandleNonActivatedTossCursor(s, tgt_grid_no, recalc, cursor_flags, item_cursor); break; case PUNCHCURS: cursor = HandlePunchCursor( s, tgt_grid_no, activated, cursor_flags); break; case KNIFECURS: cursor = HandleKnifeCursor( s, tgt_grid_no, activated, cursor_flags); break; case AIDCURS: cursor = HandleAidCursor( s, map_pos, activated, cursor_flags); break; case BOMBCURS: cursor = HandleBombCursor( s, tgt_grid_no, activated, cursor_flags); break; case REMOTECURS: cursor = HandleRemoteCursor( s, activated, cursor_flags); break; case WIRECUTCURS: cursor = HandleWirecutterCursor(s, tgt_grid_no, cursor_flags); break; case REPAIRCURS: cursor = HandleRepairCursor( s, tgt_grid_no, cursor_flags); break; case JARCURS: cursor = HandleJarCursor( s, tgt_grid_no, cursor_flags); break; case TINCANCURS: cursor = HandleTinCanCursor( s, tgt_grid_no, cursor_flags); break; case REFUELCURS: cursor = HandleRefuelCursor( s, tgt_grid_no, cursor_flags); break; case INVALIDCURS: cursor = INVALID_ACTION_UICURSOR; break; default: break; } return cursor; } static void DetermineCursorBodyLocation(SOLDIERTYPE*, BOOLEAN fDisplay, BOOLEAN fRecalc); static UICursorID HandleActivatedTargetCursor(SOLDIERTYPE* const s, GridNo const map_pos, BOOLEAN const recalc) { bool const is_throwing_knife = GCM->getItem(s->inv[HANDPOS].usItem)->getItemClass() == IC_THROWING_KNIFE; if (is_throwing_knife) { // If we are in realtime, follow! if (!(gTacticalStatus.uiFlags & INCOMBAT) && gAnimControl[s->usAnimState].uiFlags & ANIM_STATIONARY && gUITargetShotWaiting) { guiPendingOverrideEvent = CA_MERC_SHOOT; } } // Determine where we are shooting/aiming DetermineCursorBodyLocation(s, TRUE, TRUE); bool enough_points = true; bool max_point_limit_hit = false; if (gTacticalStatus.uiFlags & INCOMBAT) { gsCurrentActionPoints = CalcTotalAPsToAttack(s, map_pos, TRUE, s->bShownAimTime / 2); gfUIDisplayActionPoints = TRUE; gfUIDisplayActionPointsCenter = TRUE; // If we don't have any points and we are at the first refine, do nothing but warn! if (!EnoughPoints(s, gsCurrentActionPoints, 0 , FALSE)) { gfUIDisplayActionPointsInvalid = TRUE; max_point_limit_hit = true; } else { UINT8 const future_aim = s->bShownAimTime + 2; if (future_aim <= REFINE_AIM_5) { INT16 const AP_costs = MinAPsToAttack(s, map_pos, TRUE) + future_aim / 2; if (!EnoughPoints(s, AP_costs, 0, FALSE)) { enough_points = false; } } } } if (!(gTacticalStatus.uiFlags & INCOMBAT) && COUNTERDONE(TARGETREFINE)) { RESETCOUNTER(TARGETREFINE); if (s->bDoBurst) { s->bShownAimTime = REFINE_AIM_BURST; } else { ++s->bShownAimTime; if (s->bShownAimTime > REFINE_AIM_5) { s->bShownAimTime = REFINE_AIM_5; } else if (s->bShownAimTime % 2 != 0) { PlayJA2Sample(TARG_REFINE_BEEP, MIDVOLUME, 1, MIDDLEPAN); } } } if (recalc) { SOLDIERTYPE const* const tgt = gUIFullTarget; UINT8 const chance = tgt ? SoldierToSoldierBodyPartChanceToGetThrough(s, tgt, s->bAimShotLocation) : SoldierToLocationChanceToGetThrough(s, map_pos, gsInterfaceLevel, s->bTargetCubeLevel, 0); gfCannotGetThrough = chance < OK_CHANCE_TO_GET_THROUGH; } UICursorID cursor = NO_UICURSOR; if (max_point_limit_hit) { // Check if we're in burst mode! cursor = s->bDoBurst ? ACTION_TARGETREDBURST_UICURSOR : is_throwing_knife ? RED_THROW_UICURSOR : ACTION_TARGETRED_UICURSOR; } else if (s->bDoBurst) { cursor = s->fDoSpread ? ACTION_TARGETREDBURST_UICURSOR : ACTION_TARGETCONFIRMBURST_UICURSOR; } else { switch (s->bShownAimTime) { case REFINE_AIM_1: if (is_throwing_knife) { cursor = gfDisplayFullCountRing ? ACTION_THROWAIMYELLOW1_UICURSOR : enough_points ? ACTION_THROWAIM1_UICURSOR : ACTION_THROWAIMCANT1_UICURSOR; } else { cursor = gfDisplayFullCountRing ? ACTION_TARGETAIMYELLOW1_UICURSOR : enough_points ? ACTION_TARGETAIM1_UICURSOR : ACTION_TARGETAIMCANT1_UICURSOR; } break; case REFINE_AIM_2: if (is_throwing_knife) { cursor = gfDisplayFullCountRing ? ACTION_THROWAIMYELLOW2_UICURSOR : enough_points ? ACTION_THROWAIM3_UICURSOR : ACTION_THROWAIMCANT2_UICURSOR; } else { cursor = gfDisplayFullCountRing ? ACTION_TARGETAIMYELLOW2_UICURSOR : enough_points ? ACTION_TARGETAIM3_UICURSOR : ACTION_TARGETAIMCANT2_UICURSOR; } break; case REFINE_AIM_3: if (is_throwing_knife) { cursor = gfDisplayFullCountRing ? ACTION_THROWAIMYELLOW3_UICURSOR : enough_points ? ACTION_THROWAIM5_UICURSOR : ACTION_THROWAIMCANT3_UICURSOR; } else { cursor = gfDisplayFullCountRing ? ACTION_TARGETAIMYELLOW3_UICURSOR : enough_points ? ACTION_TARGETAIM5_UICURSOR : ACTION_TARGETAIMCANT3_UICURSOR; } break; case REFINE_AIM_4: if (is_throwing_knife) { cursor = gfDisplayFullCountRing ? ACTION_THROWAIMYELLOW4_UICURSOR : enough_points ? ACTION_THROWAIM7_UICURSOR : ACTION_THROWAIMCANT4_UICURSOR; } else { cursor = gfDisplayFullCountRing ? ACTION_TARGETAIMYELLOW4_UICURSOR : enough_points ? ACTION_TARGETAIM7_UICURSOR : ACTION_TARGETAIMCANT4_UICURSOR; } break; case REFINE_AIM_5: if (is_throwing_knife) { cursor = gfDisplayFullCountRing ? ACTION_THROWAIMFULL_UICURSOR : enough_points ? ACTION_THROWAIM9_UICURSOR : ACTION_THROWAIMCANT5_UICURSOR; } else { cursor = gfDisplayFullCountRing ? ACTION_TARGETAIMFULL_UICURSOR : enough_points ? ACTION_TARGETAIM9_UICURSOR : ACTION_TARGETAIMCANT5_UICURSOR; } break; case REFINE_AIM_MID1: cursor = ACTION_TARGETAIM2_UICURSOR; break; case REFINE_AIM_MID2: cursor = ACTION_TARGETAIM4_UICURSOR; break; case REFINE_AIM_MID3: cursor = ACTION_TARGETAIM6_UICURSOR; break; case REFINE_AIM_MID4: cursor = ACTION_TARGETAIM8_UICURSOR; break; } } if (!max_point_limit_hit) { UINT16 const free_cursor_name = gUICursors[cursor].usFreeCursorName; RemoveCursorFlags(free_cursor_name, CURSOR_TO_FLASH | CURSOR_TO_PLAY_SOUND); if (gfCannotGetThrough) { SetCursorSpecialFrame(free_cursor_name, 1); } else if (!InRange(s, map_pos)) { // OK, make buddy flash! SetCursorFlags(free_cursor_name, CURSOR_TO_FLASH | CURSOR_TO_PLAY_SOUND); } else { SetCursorSpecialFrame(free_cursor_name, 0); } } return cursor; } static UICursorID HandleNonActivatedTargetCursor(SOLDIERTYPE* const s, GridNo const map_pos, BOOLEAN const show_APs, BOOLEAN const fRecalc, MouseMoveState const uiCursorFlags) { bool const is_throwing_knife = GCM->getItem(s->inv[HANDPOS].usItem)->getItemClass() == IC_THROWING_KNIFE; if (!is_throwing_knife) { if (!(gTacticalStatus.uiFlags & INCOMBAT)) { DetermineCursorBodyLocation(GetSelectedMan(), show_APs, fRecalc); } if (!EnoughAmmo(s, FALSE, HANDPOS)) { // Check if ANY ammo exists if (FindAmmoToReload(s, HANDPOS, NO_SLOT) == NO_SLOT) return BAD_RELOAD_UICURSOR; gsCurrentActionPoints = GetAPsToAutoReload(s); gfUIDisplayActionPoints = TRUE; return GOOD_RELOAD_UICURSOR; } } if (gTacticalStatus.uiFlags & INCOMBAT) { DetermineCursorBodyLocation(GetSelectedMan(), show_APs, fRecalc); gsCurrentActionPoints = CalcTotalAPsToAttack(s, map_pos, TRUE, s->bShownAimTime / 2); gfUIDisplayActionPoints = TRUE; gfUIDisplayActionPointsCenter = TRUE; if (!show_APs) { gfUIDisplayActionPoints = FALSE; } else if (!EnoughPoints(s, gsCurrentActionPoints, 0 , FALSE)) { gfUIDisplayActionPointsInvalid = TRUE; } } if (fRecalc) { gfCannotGetThrough = SoldierToLocationChanceToGetThrough(s, map_pos, gsInterfaceLevel, s->bTargetCubeLevel, 0) < OK_CHANCE_TO_GET_THROUGH; } // If we begin to move, reset the cursor if (uiCursorFlags != MOUSE_STATIONARY) gfCannotGetThrough = FALSE; if (gfCannotGetThrough) { return s->bDoBurst ? ACTION_NOCHANCE_BURST_UICURSOR : is_throwing_knife ? BAD_THROW_UICURSOR : ACTION_NOCHANCE_SHOOT_UICURSOR; } else if (!InRange(s, map_pos)) { // Flash cursor! return s->bDoBurst ? ACTION_FLASH_BURST_UICURSOR : is_throwing_knife ? FLASH_THROW_UICURSOR : ACTION_FLASH_SHOOT_UICURSOR; } else { return s->bDoBurst ? ACTION_TARGETBURST_UICURSOR : is_throwing_knife ? GOOD_THROW_UICURSOR : ACTION_SHOOT_UICURSOR; } } static void DetermineCursorBodyLocation(SOLDIERTYPE* const s, BOOLEAN const display, BOOLEAN const recalc) { if (gTacticalStatus.ubAttackBusyCount > 0) { // ATE: Return if attacker busy count > 0, this helps in RT with re-setting // the flag to random return; } if (recalc) { // Always set aim location to nothing s->bAimShotLocation = AIM_SHOT_RANDOM; GridNo const map_pos = GetMouseMapPos(); if (map_pos == NOWHERE) return; SOLDIERTYPE* tgt = 0; UINT16 flags; // Determine which body part it's on for (LEVELNODE* n = gpWorldLevelData[map_pos].pMercHead; n; n = n->pNext) { if (!(n->uiFlags & LEVELNODE_MERCPLACEHOLDER)) continue; SOLDIERTYPE* const potential_tgt = n->pSoldier; if (!potential_tgt) continue; // ATE: Check their stance - if prone - return! if (gAnimControl[potential_tgt->usAnimState].ubHeight == ANIM_PRONE) { return; } // Check if we have a half tile profile flags = n->uiAnimHitLocationFlags; if (flags & (TILE_FLAG_NORTH_HALF | TILE_FLAG_SOUTH_HALF | TILE_FLAG_WEST_HALF | TILE_FLAG_EAST_HALF | TILE_FLAG_TOP_HALF | TILE_FLAG_BOTTOM_HALF)) { INT16 sCellX; INT16 sCellY; GetMouseWorldCoords(&sCellX, &sCellY); // We are only interested in the sub-tile coordinates sCellX %= CELL_X_SIZE; sCellY %= CELL_Y_SIZE; if (flags & TILE_FLAG_NORTH_HALF && sCellY > CELL_Y_SIZE / 2) continue; if (flags & TILE_FLAG_SOUTH_HALF && sCellY <= CELL_Y_SIZE / 2) continue; if (flags & TILE_FLAG_WEST_HALF && sCellX > CELL_X_SIZE / 2) continue; if (flags & TILE_FLAG_EAST_HALF && sCellX <= CELL_X_SIZE / 2) continue; if (flags & TILE_FLAG_TOP_HALF) { INT16 sScreenX; INT16 sScreenY; FromCellToScreenCoordinates(sCellX, sCellY, &sScreenX, &sScreenY); // Check for Below if (sScreenX > WORLD_TILE_Y / 2) continue; } if (flags & TILE_FLAG_BOTTOM_HALF) { INT16 sScreenX; INT16 sScreenY; FromCellToScreenCoordinates(sCellX, sCellY, &sScreenX, &sScreenY); // Check for Below if (sScreenX <= WORLD_TILE_Y / 2) continue; } } // Check if mouse is in bounding box of soldier if (!IsPointInSoldierBoundingBox(potential_tgt, gusMouseXPos, gusMouseYPos)) { continue; } tgt = potential_tgt; break; } if (!tgt) { // Check if we can find a soldier here SOLDIERTYPE* const potential_tgt = gUIFullTarget; if (potential_tgt) { flags = FindRelativeSoldierPosition(potential_tgt, gusMouseXPos, gusMouseYPos); if (flags != 0) tgt = potential_tgt; } } if (tgt && IsValidTargetMerc(tgt)) { if (flags & TILE_FLAG_FEET) s->bAimShotLocation = AIM_SHOT_LEGS; if (flags & TILE_FLAG_MID) s->bAimShotLocation = AIM_SHOT_TORSO; if (flags & TILE_FLAG_HEAD) s->bAimShotLocation = AIM_SHOT_HEAD; } } if (!display) return; if (s->bDoBurst) return; SOLDIERTYPE* const tgt = gUIFullTarget; if (!tgt) return; ST::string hit_location; if (tgt->ubBodyType == CROW) { s->bAimShotLocation = AIM_SHOT_LEGS; hit_location = TacticalStr[CROW_HIT_LOCATION_STR]; } else { if (!IS_MERC_BODY_TYPE(tgt)) return; switch (s->bAimShotLocation) { case AIM_SHOT_HEAD: hit_location = // If we have a knife in hand, change string GCM->getItem(s->inv[HANDPOS].usItem)->getItemClass() == IC_BLADE ? TacticalStr[NECK_HIT_LOCATION_STR] : TacticalStr[HEAD_HIT_LOCATION_STR]; break; case AIM_SHOT_TORSO: hit_location = TacticalStr[TORSO_HIT_LOCATION_STR]; break; case AIM_SHOT_LEGS: hit_location = TacticalStr[LEGS_HIT_LOCATION_STR]; break; default: return; } } SetHitLocationText(hit_location); } static UICursorID HandleKnifeCursor(SOLDIERTYPE* const s, GridNo const map_pos, BOOLEAN const activated, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_MERCS); if (activated) { DetermineCursorBodyLocation(s, TRUE, TRUE); if (gfUIHandleShowMoveGrid) gfUIHandleShowMoveGrid = 2; // Calculate action points bool enough_points = true; if (gTacticalStatus.uiFlags & INCOMBAT) { gsCurrentActionPoints = CalcTotalAPsToAttack(s, map_pos, TRUE, s->bShownAimTime / 2); gfUIDisplayActionPoints = TRUE; gfUIDisplayActionPointsCenter = TRUE; // If we don't have any points and we are at the first refine, do nothing but warn! if (!EnoughPoints(s, gsCurrentActionPoints, 0, FALSE)) { gfUIDisplayActionPointsInvalid = TRUE; if (s->bShownAimTime == REFINE_KNIFE_1) return KNIFE_HIT_UICURSOR; } INT8 const future_aim = REFINE_KNIFE_2; INT16 const ap_costs = CalcTotalAPsToAttack(s, map_pos, TRUE, future_aim / 2); if (!EnoughPoints(s, ap_costs, 0, FALSE)) enough_points = false; } if (!(gTacticalStatus.uiFlags & INCOMBAT) && COUNTERDONE(NONGUNTARGETREFINE)) { RESETCOUNTER(NONGUNTARGETREFINE); if (s->bShownAimTime == REFINE_KNIFE_1) { PlayJA2Sample(TARG_REFINE_BEEP, MIDVOLUME, 1, MIDDLEPAN); } s->bShownAimTime = REFINE_KNIFE_2; } switch (s->bShownAimTime) { case REFINE_KNIFE_1: return gfDisplayFullCountRing ? KNIFE_YELLOW_AIM1_UICURSOR : enough_points ? KNIFE_HIT_AIM1_UICURSOR : KNIFE_NOGO_AIM1_UICURSOR; case REFINE_KNIFE_2: return gfDisplayFullCountRing ? KNIFE_YELLOW_AIM2_UICURSOR : enough_points ? KNIFE_HIT_AIM2_UICURSOR : KNIFE_NOGO_AIM2_UICURSOR; default: Assert(FALSE); // no return value! return NO_UICURSOR; } } else { gfUIDisplayActionPointsCenter = TRUE; // Check if we are on a guy (who's not selected)! if (gUIFullTarget && !(guiUIFullTargetFlags & SELECTED_MERC)) { DetermineCursorBodyLocation(s, TRUE, TRUE); return KNIFE_HIT_UICURSOR; } else { return KNIFE_REG_UICURSOR; } } } static UICursorID HandlePunchCursor(SOLDIERTYPE* const s, GridNo const map_pos, BOOLEAN const activated, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_MERCS); if (activated) { DetermineCursorBodyLocation(s, TRUE, TRUE); if (gfUIHandleShowMoveGrid) gfUIHandleShowMoveGrid = 2; // Calculate action points bool enough_points = true; gsCurrentActionPoints = CalcTotalAPsToAttack(s, map_pos, TRUE, s->bShownAimTime / 2); gfUIDisplayActionPoints = TRUE; gfUIDisplayActionPointsCenter = TRUE; // If we don't have any points and we are at the first refine, do nothing but warn! if (!EnoughPoints(s, gsCurrentActionPoints, 0, FALSE)) { gfUIDisplayActionPointsInvalid = TRUE; if (s->bShownAimTime == REFINE_PUNCH_1) return ACTION_PUNCH_RED; } INT8 const future_aim = REFINE_PUNCH_2; INT16 const ap_costs = CalcTotalAPsToAttack(s, map_pos, TRUE, future_aim / 2); if (!EnoughPoints(s, ap_costs, 0, FALSE)) enough_points = false; if (!(gTacticalStatus.uiFlags & INCOMBAT) && COUNTERDONE(NONGUNTARGETREFINE)) { RESETCOUNTER(NONGUNTARGETREFINE); if (s->bShownAimTime == REFINE_PUNCH_1) { PlayJA2Sample(TARG_REFINE_BEEP, MIDVOLUME, 1, MIDDLEPAN); } s->bShownAimTime = REFINE_PUNCH_2; } switch (s->bShownAimTime) { case REFINE_PUNCH_1: return gfDisplayFullCountRing ? ACTION_PUNCH_YELLOW_AIM1_UICURSOR : enough_points ? ACTION_PUNCH_RED_AIM1_UICURSOR : ACTION_PUNCH_NOGO_AIM1_UICURSOR; case REFINE_PUNCH_2: return gfDisplayFullCountRing ? ACTION_PUNCH_YELLOW_AIM2_UICURSOR : enough_points ? ACTION_PUNCH_RED_AIM2_UICURSOR : ACTION_PUNCH_NOGO_AIM2_UICURSOR; default: Assert(FALSE); // no return value! return NO_UICURSOR; } } else { gfUIDisplayActionPointsCenter = TRUE; // Check if we are on a guy (who's not selected)! if (gUIFullTarget && !(guiUIFullTargetFlags & SELECTED_MERC)) { DetermineCursorBodyLocation(s, TRUE, TRUE); return ACTION_PUNCH_RED; } else { return ACTION_PUNCH_GRAY; } } } static UICursorID HandleAidCursor(SOLDIERTYPE* const s, GridNo const map_pos, BOOLEAN const activated, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_MERCSFORAID); return activated || gUIFullTarget ? ACTION_FIRSTAID_RED : ACTION_FIRSTAID_GRAY; } static UICursorID HandleActivatedTossCursor() { return ACTION_TOSS_UICURSOR; } static UICursorID HandleNonActivatedTossCursor(SOLDIERTYPE* const s, GridNo const map_pos, BOOLEAN const recalc, MouseMoveState const uiCursorFlags, ItemCursor const ubItemCursor) { static bool bad_ctgh = false; // Check for enough ammo BOOLEAN armed = FALSE; if (ubItemCursor == TRAJECTORYCURS) { if (!EnoughAmmo(s, FALSE, HANDPOS)) { // Check if ANY ammo exists if (FindAmmoToReload(s, HANDPOS, NO_SLOT) == NO_SLOT) return BAD_RELOAD_UICURSOR; gsCurrentActionPoints = GetAPsToAutoReload(s); gfUIDisplayActionPoints = TRUE; return GOOD_RELOAD_UICURSOR; } armed = TRUE; } // Add APs if (gTacticalStatus.uiFlags & INCOMBAT) { gsCurrentActionPoints = ubItemCursor == TRAJECTORYCURS ? CalcTotalAPsToAttack(s, map_pos, TRUE, s->bShownAimTime / 2) : MinAPsToThrow(*s, map_pos, TRUE); gfUIDisplayActionPoints = TRUE; gfUIDisplayActionPointsCenter = TRUE; // If we don't have any points and we are at the first refine, do nothing // but warn! if (!EnoughPoints(s, gsCurrentActionPoints, 0, FALSE)) { gfUIDisplayActionPointsInvalid = TRUE; } } // If we begin to move, reset the cursor if (uiCursorFlags != MOUSE_STATIONARY) EndPhysicsTrajectoryUI(); gfUIHandlePhysicsTrajectory = TRUE; if (recalc) { // Calculate chance to throw here if (map_pos == s->sGridNo) { bad_ctgh = false; } else { OBJECTTYPE const& o = s->inv[HANDPOS]; // ATE: Find the object to use OBJECTTYPE TempObject = o; // Do we have a launchable? for (INT8 i = 0; i != MAX_ATTACHMENTS; ++i) { UINT16 const attach_item = o.usAttachItem[i]; if (attach_item == NOTHING) continue; if (!(GCM->getItem(attach_item)->isExplosive())) continue; CreateItem(attach_item, o.bAttachStatus[i], &TempObject); break; } if (s->bWeaponMode == WM_ATTACHED) { INT8 const slot = FindAttachment(&o, UNDER_GLAUNCHER); if (slot != NO_SLOT) { CreateItem(UNDER_GLAUNCHER, o.bAttachStatus[slot], &TempObject); } } INT16 final_grid_no; INT8 level; bad_ctgh = !CalculateLaunchItemChanceToGetThrough(s, &TempObject, map_pos, gsInterfaceLevel, gsInterfaceLevel * 256, &final_grid_no, armed, &level, TRUE); BeginPhysicsTrajectoryUI(final_grid_no, level, bad_ctgh); } } return bad_ctgh ? BAD_THROW_UICURSOR : GOOD_THROW_UICURSOR; } static UICursorID HandleWirecutterCursor(SOLDIERTYPE* const s, GridNo const map_pos, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_WIREFENCE); return s->bLevel == 0 && IsCuttableWireFenceAtGridNo(map_pos) ? GOOD_WIRECUTTER_UICURSOR : BAD_WIRECUTTER_UICURSOR; } static UICursorID HandleRepairCursor(SOLDIERTYPE* const s, GridNo const map_pos, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_REPAIR); return s->bLevel == 0 && IsRepairableStructAtGridNo(map_pos, 0) ? GOOD_REPAIR_UICURSOR : BAD_REPAIR_UICURSOR; } static UICursorID HandleRefuelCursor(SOLDIERTYPE* const s, GridNo const map_pos, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_REFUEL); return s->bLevel == 0 && GetRefuelableStructAtGridNo(map_pos) ? REFUEL_RED_UICURSOR : REFUEL_GREY_UICURSOR; } static UICursorID HandleJarCursor(SOLDIERTYPE* const s, GridNo const map_pos, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_JAR); return IsCorpseAtGridNo(map_pos, s->bLevel) ? GOOD_JAR_UICURSOR : BAD_JAR_UICURSOR; } static UICursorID HandleTinCanCursor(SOLDIERTYPE* const s, GridNo const map_pos, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_CAN); // Check if a door exists here STRUCTURE* structure; INT16 int_tile_grid_no; LEVELNODE* const int_tile = GetCurInteractiveTileGridNoAndStructure(&int_tile_grid_no, &structure); return int_tile && structure->fFlags & STRUCTURE_ANYDOOR ? PLACE_TINCAN_GREY_UICURSOR : PLACE_TINCAN_RED_UICURSOR; } static UICursorID HandleRemoteCursor(SOLDIERTYPE* const s, BOOLEAN const activated, MouseMoveState const uiCursorFlags) { if (gTacticalStatus.uiFlags & INCOMBAT) { gsCurrentActionPoints = GetAPsToUseRemote(s); gfUIDisplayActionPoints = TRUE; gfUIDisplayActionPointsCenter = TRUE; // If we don't have any points and we are at the first refine, do nothing but warn! if (!EnoughPoints(s, gsCurrentActionPoints, 0, FALSE)) { gfUIDisplayActionPointsInvalid = TRUE; } } return activated ? PLACE_REMOTE_RED_UICURSOR : PLACE_REMOTE_GREY_UICURSOR; } static UICursorID HandleBombCursor(SOLDIERTYPE* const s, GridNo const map_pos, BOOLEAN const activated, MouseMoveState const uiCursorFlags) { HandleUIMovementCursor(s, uiCursorFlags, map_pos, MOVEUI_TARGET_BOMB); if (gTacticalStatus.uiFlags & INCOMBAT) { gsCurrentActionPoints = GetTotalAPsToDropBomb(s, map_pos); gfUIDisplayActionPoints = TRUE; gfUIDisplayActionPointsCenter = TRUE; // If we don't have any points and we are at the first refine, do nothing but warn! if (!EnoughPoints(s, gsCurrentActionPoints, 0, FALSE)) { gfUIDisplayActionPointsInvalid = TRUE; } } return activated ? PLACE_BOMB_RED_UICURSOR : PLACE_BOMB_GREY_UICURSOR; } void HandleLeftClickCursor( SOLDIERTYPE *pSoldier ) { ItemCursor const ubItemCursor = GetActionModeCursor(pSoldier); // OK, if we are i realtime.. goto directly to shoot if (!(gTacticalStatus.uiFlags & INCOMBAT) && ubItemCursor != TOSSCURS && ubItemCursor != TRAJECTORYCURS) { // GOTO DIRECTLY TO USING ITEM // ( only if not burst mode.. ) if ( !pSoldier->bDoBurst ) { guiPendingOverrideEvent = CA_MERC_SHOOT; } return; } const GridNo sGridNo = GetMouseMapPos(); if (sGridNo == NOWHERE) return; gfUIForceReExamineCursorData = TRUE; gfDisplayFullCountRing = FALSE; switch( ubItemCursor ) { case TARGETCURS: pSoldier->bShownAimTime = REFINE_AIM_1; // Reset counter RESETCOUNTER( TARGETREFINE ); break; case PUNCHCURS: pSoldier->bShownAimTime = REFINE_PUNCH_1; // Reset counter RESETCOUNTER( NONGUNTARGETREFINE ); break; case KNIFECURS: pSoldier->bShownAimTime = REFINE_KNIFE_1; // Reset counter RESETCOUNTER( NONGUNTARGETREFINE ); break; default: // GOTO DIRECTLY TO USING ITEM guiPendingOverrideEvent = CA_MERC_SHOOT; } } void HandleRightClickAdjustCursor( SOLDIERTYPE *pSoldier, INT16 usMapPos ) { INT16 sAPCosts; INT8 bFutureAim; INT16 sGridNo; INT8 bTargetLevel; ItemCursor const ubCursor = GetActionModeCursor(pSoldier); // 'snap' cursor to target tile.... if (gUIFullTarget != NULL) usMapPos = gUIFullTarget->sGridNo; switch( ubCursor ) { case TARGETCURS: // CHECK IF GUY HAS IN HAND A WEAPON if ( pSoldier->bDoBurst ) { // Do nothing! // pSoldier->bShownAimTime = REFINE_AIM_BURST; } else { sGridNo = usMapPos; bTargetLevel = (INT8)gsInterfaceLevel; // Look for a target here... const SOLDIERTYPE* const tgt = gUIFullTarget; if (tgt != NULL) { // Get target soldier, if one exists sGridNo = tgt->sGridNo; bTargetLevel = pSoldier->bLevel; if (!HandleCheckForBadChangeToGetThrough(pSoldier, tgt, sGridNo, bTargetLevel)) { return; } } bFutureAim = (INT8)( pSoldier->bShownAimTime + 2 ); if ( bFutureAim <= REFINE_AIM_5 ) { sAPCosts = CalcTotalAPsToAttack( pSoldier, usMapPos, TRUE, (INT8)(bFutureAim / 2) ); // Determine if we can afford! if ( EnoughPoints( pSoldier, sAPCosts, 0, FALSE ) ) { pSoldier->bShownAimTime+= 2; if ( pSoldier->bShownAimTime > REFINE_AIM_5 ) { pSoldier->bShownAimTime = REFINE_AIM_5; } } // Else - goto first level! else { if ( !gfDisplayFullCountRing ) { gfDisplayFullCountRing = TRUE; } else { pSoldier->bShownAimTime = REFINE_AIM_1; gfDisplayFullCountRing = FALSE; } } } else { if ( !gfDisplayFullCountRing ) { gfDisplayFullCountRing = TRUE; } else { pSoldier->bShownAimTime = REFINE_AIM_1; gfDisplayFullCountRing = FALSE; } } } break; case PUNCHCURS: bFutureAim = (INT8)( pSoldier->bShownAimTime + REFINE_PUNCH_2 ); if ( bFutureAim <= REFINE_PUNCH_2 ) { sAPCosts = CalcTotalAPsToAttack( pSoldier, usMapPos, TRUE, (INT8)(bFutureAim / 2) ); // Determine if we can afford! if ( EnoughPoints( pSoldier, sAPCosts, 0, FALSE ) ) { pSoldier->bShownAimTime+= REFINE_PUNCH_2; if ( pSoldier->bShownAimTime > REFINE_PUNCH_2 ) { pSoldier->bShownAimTime = REFINE_PUNCH_2; } } // Else - goto first level! else { if ( !gfDisplayFullCountRing ) { gfDisplayFullCountRing = TRUE; } else { pSoldier->bShownAimTime = REFINE_PUNCH_1; gfDisplayFullCountRing = FALSE; } } } else { if ( !gfDisplayFullCountRing ) { gfDisplayFullCountRing = TRUE; } else { pSoldier->bShownAimTime = REFINE_PUNCH_1; gfDisplayFullCountRing = FALSE; } } break; case KNIFECURS: bFutureAim = (INT8)( pSoldier->bShownAimTime + REFINE_KNIFE_2 ); if ( bFutureAim <= REFINE_KNIFE_2 ) { sAPCosts = CalcTotalAPsToAttack( pSoldier, usMapPos, TRUE, (INT8)(bFutureAim / 2) ); // Determine if we can afford! if ( EnoughPoints( pSoldier, sAPCosts, 0, FALSE ) ) { pSoldier->bShownAimTime+= REFINE_KNIFE_2; if ( pSoldier->bShownAimTime > REFINE_KNIFE_2 ) { pSoldier->bShownAimTime = REFINE_KNIFE_2; } } // Else - goto first level! else { if ( !gfDisplayFullCountRing ) { gfDisplayFullCountRing = TRUE; } else { pSoldier->bShownAimTime = REFINE_KNIFE_1; gfDisplayFullCountRing = FALSE; } } } else { if ( !gfDisplayFullCountRing ) { gfDisplayFullCountRing = TRUE; } else { pSoldier->bShownAimTime = REFINE_KNIFE_1; gfDisplayFullCountRing = FALSE; } } break; case TOSSCURS: break; default: ErasePath(); } } ItemCursor GetActionModeCursor(SOLDIERTYPE const* const pSoldier) { UINT16 usInHand; // If we are an EPC, do nothing.... //if ( ( pSoldier->uiStatusFlags & SOLDIER_VEHICLE ) ) //{ // return( INVALIDCURS ); //} // AN EPC is always not - attackable unless they are a robot! if ( AM_AN_EPC( pSoldier ) && !( pSoldier->uiStatusFlags & SOLDIER_ROBOT ) ) { return( INVALIDCURS ); } // ATE: if a vehicle.... same thing if ( pSoldier->uiStatusFlags & SOLDIER_VEHICLE ) { return( INVALIDCURS ); } // If we can't be controlled, returninvalid... if ( pSoldier->uiStatusFlags & SOLDIER_ROBOT ) { if ( !CanRobotBeControlled( pSoldier ) ) { // Display message that robot cannot be controlled.... return( INVALIDCURS ); } } // If we are in attach shoot mode, use toss cursor... if (pSoldier->bWeaponMode == WM_ATTACHED ) { return( TRAJECTORYCURS ); } usInHand = pSoldier->inv[HANDPOS].usItem; // Start off with what is in our hand ItemCursor ubCursor = GCM->getItem(usInHand)->getCursor(); // OK, check if what is in our hands has a detonator attachment... // Detonators can only be on invalidcurs things... if ( ubCursor == INVALIDCURS ) { if ( FindAttachment( &(pSoldier->inv[HANDPOS]), DETONATOR) != ITEM_NOT_FOUND ) { ubCursor = BOMBCURS; } else if ( FindAttachment( &(pSoldier->inv[HANDPOS]), REMDETONATOR) != ITEM_NOT_FOUND ) { ubCursor = BOMBCURS; } } // Now check our terrain to see if we cannot do the action now... if ( pSoldier->bOverTerrainType == DEEP_WATER ) { ubCursor = INVALIDCURS; } // If we are out of breath, no cursor... if ( pSoldier->bBreath < OKBREATH && pSoldier->bCollapsed ) { ubCursor = INVALIDCURS; } return( ubCursor ); } // Switch on item, display appropriate feedback cursor for a click.... void HandleUICursorRTFeedback( SOLDIERTYPE *pSoldier ) { ItemCursor const ubItemCursor = GetActionModeCursor(pSoldier); switch( ubItemCursor ) { case TARGETCURS: if ( pSoldier->bDoBurst ) { //BeginDisplayTimedCursor( ACTION_TARGETREDBURST_UICURSOR, 500 ); } else { if ( GCM->getItem(pSoldier->inv[ HANDPOS ].usItem)->getItemClass() == IC_THROWING_KNIFE ) { BeginDisplayTimedCursor( RED_THROW_UICURSOR, 500 ); } else { BeginDisplayTimedCursor( ACTION_TARGETRED_UICURSOR, 500 ); } } break; default: break; } }
[ "public1983@web.de" ]
public1983@web.de
fd58eace55f87353188443c6ff79aac5aec78e00
fa7f7337e829d358eea8e38b1cea41c2f7f2e60a
/Source/PacMan/Pac_GameMode.h
2a27d86cfca4181e3fcc75de4525de96a8e135b4
[]
no_license
kor-al/episodic-control-pacman
1254d7217c08c0889c95d13a5aa09dcb39e5d6df
5dc41307411fc0255c534aeb9082b58822e3a37a
refs/heads/master
2021-01-01T16:35:53.968105
2017-07-20T17:54:54
2017-07-20T17:54:54
97,863,376
0
0
null
null
null
null
UTF-8
C++
false
false
551
h
// Fill out your copyright notice in the Description page of Project Settings. #pragma once #include "GameFramework/GameMode.h" #include "Pac_GameMode.generated.h" /** * */ UCLASS() class PACMAN_API APac_GameMode : public AGameMode { GENERATED_BODY() public: UPROPERTY(EditAnywhere, BlueprintReadWrite, Category = "scoring") int Player_Score; UPROPERTY(EditAnywhere, BlueprintReadWrite, Category = "screenshots") class AScreenCapturer* ScreenCapturer; UPROPERTY(EditAnywhere, BlueprintReadWrite, Category = "game") bool isVAE; };
[ "korinalice@gmail.com" ]
korinalice@gmail.com
2ef6c8d02d962ceb725f9cabf6f3d5bbe715a7a9
3adef134af0da3b55f11fa3f8dc80cfc4e8c8fc3
/LRU_cache.cpp
ced7d73eeda2e9ea1d08cfbb017d0dbd8d223c67
[]
no_license
starmap0312/leetcode
fb402525050ea0cee5e663165d306d9c4cbaafdf
9d99ad4de20f36bc511c0c141b75b2515d04cc38
refs/heads/master
2021-01-04T14:22:04.566212
2020-11-10T03:05:08
2020-11-10T03:05:08
39,904,796
0
0
null
null
null
null
UTF-8
C++
false
false
2,563
cpp
/* - use doubly-linked list to keep the recently used elements * ex. head tail * key 4 --> 2 --> 1 * value 1 <-- 3 <-- 1 * - most recently used element is put at the head, whereas least recently used element is * put at the tail * when get or set an element, update the head and the tail if necessay * - use a hash mapping from keys to pointers to quickly access the elements of the list * when the size of the list/map exceeds the capacity, delete and update the tail */ #include <iostream> #include <unordered_map> using namespace std; class Node { public: Node *next, *prev; int key, value; Node(int k, int v) : key(k), value(v), next(NULL), prev(NULL) { } }; class LRUCache{ public: LRUCache(int capacity) { maxSize = capacity; head = tail = NULL; } int get(int key) { unordered_map<int, Node*>::iterator itr = mp.find(key); if (itr == mp.end()) return -1; else { Node *found = itr -> second; if (head != found) { if (found == tail) tail = tail -> prev; if (found -> prev != NULL) (found -> prev) -> next = found -> next; if (found -> next != NULL) (found -> next) -> prev = found -> prev; head -> prev = found; found -> next = head, found -> prev = NULL; head = found; } return found -> value; } } void set(int key, int value) { unordered_map<int, Node*>::iterator itr = mp.find(key); if (itr == mp.end()) { if (mp.size() == 0) { head = tail = new Node(key, value); } else { Node *tmp = head; head = new Node(key, value); head -> next = tmp; tmp -> prev = head; } mp[key] = head; if (mp.size() > maxSize) { Node *tmp = tail; tail = tail -> prev; tail -> next = NULL; mp.erase(tmp -> key); delete tmp; } } else { (itr -> second) -> value = value; get(key); } } private: Node *head, *tail; unordered_map<int, Node*> mp; int maxSize; }; int main() { LRUCache cache(2); cache.set(2, 1); cache.set(1, 1); cache.set(2, 3); cache.set(4, 1); cout << cache.get(1) << endl; cout << cache.get(2) << endl; return 0; }
[ "starmap0312@gmail.com" ]
starmap0312@gmail.com
325e5585443ebe29b2015ac35751a0ec8779503c
b707ed5c3e00ff8132aee5b8f4601a4a560a3f9f
/C/Progs Antigos/Programas/GRAFICO.CPP
8f8c7f4398e7e97d16f0ad21fe0243563f75dc8c
[]
no_license
WiLLStenico/TestesEOutrasBrincadeiras
84b657ebb553ed05b5784f0cc04c645be9d339a1
03c4f5a7380fdc15fa1e579d7d830ee2553e0825
refs/heads/master
2020-04-06T06:54:02.851075
2012-07-20T03:08:15
2012-07-20T03:08:15
null
0
0
null
null
null
null
ISO-8859-5
C++
false
false
1,494
cpp
#include <stdio.h> #include <conio.h> #include <math.h> #include <GRAPHICS.H> #include <stdlib.h> #include <dos.h> #include <time.h> void opengraph() { int driver, mode; detectgraph(&driver,&mode); initgraph(&driver, &mode, "c:\\borlandc\\bgi"); } void hora() { time_t now; struct tm ts;//strutura escrever hora char buf[80]; time(&now); ts=*localtime(&now); strftime(buf,sizeof(buf),"%H:%M:%S",&ts); setcolor(BLACK); settextstyle(0,HORIZ_DIR,1); outtextxy(570,470,"лллллллл"); setcolor(LIGHTGRAY); outtextxy(570,470,buf); } void matriz() { setcolor(WHITE); line(0,240,640,240); line(320,0,320,480); } void desenha(int op,float xi,float xf) { float y,d,yp,dp,inverte; setcolor(CYAN); if(xi>xf)//para numeros invertidos { inverte=xf; xf=xi; xi=inverte; } if(op==1) { outtextxy((xi*10)+317,235-(xf*10),".");//ponto } if(op==2) { for(d=xi;d<=xf;d=d+0.2)//x ao quadrado { y=d*d; dp=d+1; yp=(dp)*(dp); outtextxy((d*5)+317,235-y,"."); //line(d+320,y-240,d+320,y-240);*/ } } } void main(void) { int tecla; float xi,y,xf,d,op; int nova; opengraph(); cleardevice(); nova=0; xi=320; do{ if(nova==0) { scanf("%f",&xi); scanf("%f",&xf); nova=1; cleardevice(); } do{ matriz(); desenha(2,xi,xf); hora(); }while(!kbhit); tecla=getch(); }while(tecla!=27); cleardevice(); }
[ "willstenico@gmail.com" ]
willstenico@gmail.com
087b9899ade3c13a5df1dacb930d230b1cc530be
410e45283cf691f932b07c5fdf18d8d8ac9b57c3
/net/http/http_network_transaction_unittest.cc
d2d72e5636d5cd9409ebec35582bbffca721e32d
[ "BSD-3-Clause" ]
permissive
yanhuashengdian/chrome_browser
f52a7f533a6b8417e19b85f765f43ea63307a1fb
972d284a9ffa4b794f659f5acc4116087704394c
refs/heads/master
2022-12-21T03:43:07.108853
2019-04-29T14:20:05
2019-04-29T14:20:05
184,068,841
0
2
BSD-3-Clause
2022-12-17T17:35:55
2019-04-29T12:40:27
null
UTF-8
C++
false
false
757,316
cc
// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/http/http_network_transaction.h" #include <math.h> // ceil #include <stdarg.h> #include <stdint.h> #include <limits> #include <set> #include <string> #include <utility> #include <vector> #include "base/bind.h" #include "base/compiler_specific.h" #include "base/files/file_path.h" #include "base/files/file_util.h" #include "base/json/json_writer.h" #include "base/logging.h" #include "base/memory/ptr_util.h" #include "base/memory/weak_ptr.h" #include "base/optional.h" #include "base/run_loop.h" #include "base/stl_util.h" #include "base/strings/string_piece.h" #include "base/strings/string_util.h" #include "base/strings/stringprintf.h" #include "base/strings/utf_string_conversions.h" #include "base/test/metrics/histogram_tester.h" #include "base/test/scoped_task_environment.h" #include "base/test/simple_test_clock.h" #include "base/test/simple_test_tick_clock.h" #include "base/test/test_file_util.h" #include "base/threading/thread_task_runner_handle.h" #include "net/base/auth.h" #include "net/base/chunked_upload_data_stream.h" #include "net/base/completion_once_callback.h" #include "net/base/elements_upload_data_stream.h" #include "net/base/host_port_pair.h" #include "net/base/ip_endpoint.h" #include "net/base/load_timing_info.h" #include "net/base/load_timing_info_test_util.h" #include "net/base/net_errors.h" #include "net/base/privacy_mode.h" #include "net/base/proxy_delegate.h" #include "net/base/proxy_server.h" #include "net/base/request_priority.h" #include "net/base/test_completion_callback.h" #include "net/base/test_proxy_delegate.h" #include "net/base/upload_bytes_element_reader.h" #include "net/base/upload_file_element_reader.h" #include "net/cert/cert_status_flags.h" #include "net/cert/mock_cert_verifier.h" #include "net/dns/mock_host_resolver.h" #include "net/http/http_auth_challenge_tokenizer.h" #include "net/http/http_auth_handler_digest.h" #include "net/http/http_auth_handler_mock.h" #include "net/http/http_auth_handler_ntlm.h" #include "net/http/http_auth_scheme.h" #include "net/http/http_basic_stream.h" #include "net/http/http_network_session.h" #include "net/http/http_network_session_peer.h" #include "net/http/http_proxy_connect_job.h" #include "net/http/http_request_headers.h" #include "net/http/http_response_info.h" #include "net/http/http_server_properties_impl.h" #include "net/http/http_stream.h" #include "net/http/http_stream_factory.h" #include "net/http/http_transaction_test_util.h" #include "net/log/net_log.h" #include "net/log/net_log_event_type.h" #include "net/log/net_log_source.h" #include "net/log/test_net_log.h" #include "net/log/test_net_log_entry.h" #include "net/log/test_net_log_util.h" #include "net/proxy_resolution/mock_proxy_resolver.h" #include "net/proxy_resolution/proxy_config_service_fixed.h" #include "net/proxy_resolution/proxy_info.h" #include "net/proxy_resolution/proxy_resolution_service.h" #include "net/proxy_resolution/proxy_resolver.h" #include "net/proxy_resolution/proxy_resolver_factory.h" #include "net/socket/client_socket_factory.h" #include "net/socket/client_socket_pool.h" #include "net/socket/client_socket_pool_manager.h" #include "net/socket/connect_job.h" #include "net/socket/connection_attempts.h" #include "net/socket/mock_client_socket_pool_manager.h" #include "net/socket/next_proto.h" #include "net/socket/socket_tag.h" #include "net/socket/socket_test_util.h" #include "net/socket/socks_connect_job.h" #include "net/socket/ssl_client_socket.h" #include "net/spdy/spdy_session.h" #include "net/spdy/spdy_session_pool.h" #include "net/spdy/spdy_test_util_common.h" #include "net/ssl/ssl_cert_request_info.h" #include "net/ssl/ssl_config_service.h" #include "net/ssl/ssl_info.h" #include "net/ssl/ssl_private_key.h" #include "net/test/cert_test_util.h" #include "net/test/gtest_util.h" #include "net/test/test_data_directory.h" #include "net/test/test_with_scoped_task_environment.h" #include "net/third_party/quiche/src/spdy/core/spdy_framer.h" #include "net/traffic_annotation/network_traffic_annotation_test_helper.h" #include "net/url_request/static_http_user_agent_settings.h" #include "net/websockets/websocket_handshake_stream_base.h" #include "net/websockets/websocket_test_util.h" #include "testing/gmock/include/gmock/gmock.h" #include "testing/gtest/include/gtest/gtest.h" #include "testing/platform_test.h" #include "url/gurl.h" #if defined(NTLM_PORTABLE) #include "base/base64.h" #include "net/ntlm/ntlm_test_data.h" #endif #if BUILDFLAG(ENABLE_REPORTING) #include "net/network_error_logging/network_error_logging_service.h" #include "net/network_error_logging/network_error_logging_test_util.h" #include "net/reporting/reporting_cache.h" #include "net/reporting/reporting_client.h" #include "net/reporting/reporting_header_parser.h" #include "net/reporting/reporting_service.h" #include "net/reporting/reporting_test_util.h" #endif // BUILDFLAG(ENABLE_REPORTING) using net::test::IsError; using net::test::IsOk; using base::ASCIIToUTF16; using testing::AnyOf; //----------------------------------------------------------------------------- namespace net { namespace { const base::string16 kBar(ASCIIToUTF16("bar")); const base::string16 kBar2(ASCIIToUTF16("bar2")); const base::string16 kBar3(ASCIIToUTF16("bar3")); const base::string16 kBaz(ASCIIToUTF16("baz")); const base::string16 kFirst(ASCIIToUTF16("first")); const base::string16 kFoo(ASCIIToUTF16("foo")); const base::string16 kFoo2(ASCIIToUTF16("foo2")); const base::string16 kFoo3(ASCIIToUTF16("foo3")); const base::string16 kFou(ASCIIToUTF16("fou")); const base::string16 kSecond(ASCIIToUTF16("second")); const base::string16 kWrongPassword(ASCIIToUTF16("wrongpassword")); const char kAlternativeServiceHttpHeader[] = "Alt-Svc: h2=\"mail.example.org:443\"\r\n"; int GetIdleSocketCountInTransportSocketPool(HttpNetworkSession* session) { return session ->GetSocketPool(HttpNetworkSession::NORMAL_SOCKET_POOL, ProxyServer::Direct()) ->IdleSocketCount(); } bool IsTransportSocketPoolStalled(HttpNetworkSession* session) { return session ->GetSocketPool(HttpNetworkSession::NORMAL_SOCKET_POOL, ProxyServer::Direct()) ->IsStalled(); } // Takes in a Value created from a NetLogHttpResponseParameter, and returns // a JSONified list of headers as a single string. Uses single quotes instead // of double quotes for easier comparison. Returns false on failure. bool GetHeaders(base::DictionaryValue* params, std::string* headers) { if (!params) return false; base::ListValue* header_list; if (!params->GetList("headers", &header_list)) return false; std::string double_quote_headers; base::JSONWriter::Write(*header_list, &double_quote_headers); base::ReplaceChars(double_quote_headers, "\"", "'", headers); return true; } // Tests LoadTimingInfo in the case a socket is reused and no PAC script is // used. void TestLoadTimingReused(const LoadTimingInfo& load_timing_info) { EXPECT_TRUE(load_timing_info.socket_reused); EXPECT_NE(NetLogSource::kInvalidId, load_timing_info.socket_log_id); EXPECT_TRUE(load_timing_info.proxy_resolve_start.is_null()); EXPECT_TRUE(load_timing_info.proxy_resolve_end.is_null()); ExpectConnectTimingHasNoTimes(load_timing_info.connect_timing); EXPECT_FALSE(load_timing_info.send_start.is_null()); EXPECT_LE(load_timing_info.send_start, load_timing_info.send_end); // Set at a higher level. EXPECT_TRUE(load_timing_info.request_start_time.is_null()); EXPECT_TRUE(load_timing_info.request_start.is_null()); EXPECT_TRUE(load_timing_info.receive_headers_end.is_null()); } // Tests LoadTimingInfo in the case a new socket is used and no PAC script is // used. void TestLoadTimingNotReused(const LoadTimingInfo& load_timing_info, int connect_timing_flags) { EXPECT_FALSE(load_timing_info.socket_reused); EXPECT_NE(NetLogSource::kInvalidId, load_timing_info.socket_log_id); EXPECT_TRUE(load_timing_info.proxy_resolve_start.is_null()); EXPECT_TRUE(load_timing_info.proxy_resolve_end.is_null()); ExpectConnectTimingHasTimes(load_timing_info.connect_timing, connect_timing_flags); EXPECT_LE(load_timing_info.connect_timing.connect_end, load_timing_info.send_start); EXPECT_LE(load_timing_info.send_start, load_timing_info.send_end); // Set at a higher level. EXPECT_TRUE(load_timing_info.request_start_time.is_null()); EXPECT_TRUE(load_timing_info.request_start.is_null()); EXPECT_TRUE(load_timing_info.receive_headers_end.is_null()); } // Tests LoadTimingInfo in the case a socket is reused and a PAC script is // used. void TestLoadTimingReusedWithPac(const LoadTimingInfo& load_timing_info) { EXPECT_TRUE(load_timing_info.socket_reused); EXPECT_NE(NetLogSource::kInvalidId, load_timing_info.socket_log_id); ExpectConnectTimingHasNoTimes(load_timing_info.connect_timing); EXPECT_FALSE(load_timing_info.proxy_resolve_start.is_null()); EXPECT_LE(load_timing_info.proxy_resolve_start, load_timing_info.proxy_resolve_end); EXPECT_LE(load_timing_info.proxy_resolve_end, load_timing_info.send_start); EXPECT_LE(load_timing_info.send_start, load_timing_info.send_end); // Set at a higher level. EXPECT_TRUE(load_timing_info.request_start_time.is_null()); EXPECT_TRUE(load_timing_info.request_start.is_null()); EXPECT_TRUE(load_timing_info.receive_headers_end.is_null()); } // Tests LoadTimingInfo in the case a new socket is used and a PAC script is // used. void TestLoadTimingNotReusedWithPac(const LoadTimingInfo& load_timing_info, int connect_timing_flags) { EXPECT_FALSE(load_timing_info.socket_reused); EXPECT_NE(NetLogSource::kInvalidId, load_timing_info.socket_log_id); EXPECT_FALSE(load_timing_info.proxy_resolve_start.is_null()); EXPECT_LE(load_timing_info.proxy_resolve_start, load_timing_info.proxy_resolve_end); EXPECT_LE(load_timing_info.proxy_resolve_end, load_timing_info.connect_timing.connect_start); ExpectConnectTimingHasTimes(load_timing_info.connect_timing, connect_timing_flags); EXPECT_LE(load_timing_info.connect_timing.connect_end, load_timing_info.send_start); EXPECT_LE(load_timing_info.send_start, load_timing_info.send_end); // Set at a higher level. EXPECT_TRUE(load_timing_info.request_start_time.is_null()); EXPECT_TRUE(load_timing_info.request_start.is_null()); EXPECT_TRUE(load_timing_info.receive_headers_end.is_null()); } // ProxyResolver that records URLs passed to it, and that can be told what // result to return. class CapturingProxyResolver : public ProxyResolver { public: CapturingProxyResolver() : proxy_server_(ProxyServer::SCHEME_HTTP, HostPortPair("myproxy", 80)) {} ~CapturingProxyResolver() override = default; int GetProxyForURL(const GURL& url, ProxyInfo* results, CompletionOnceCallback callback, std::unique_ptr<Request>* request, const NetLogWithSource& net_log) override { results->UseProxyServer(proxy_server_); resolved_.push_back(url); return OK; } // Sets whether the resolver should use direct connections, instead of a // proxy. void set_proxy_server(ProxyServer proxy_server) { proxy_server_ = proxy_server; } const std::vector<GURL>& resolved() const { return resolved_; } private: std::vector<GURL> resolved_; ProxyServer proxy_server_; DISALLOW_COPY_AND_ASSIGN(CapturingProxyResolver); }; class CapturingProxyResolverFactory : public ProxyResolverFactory { public: explicit CapturingProxyResolverFactory(CapturingProxyResolver* resolver) : ProxyResolverFactory(false), resolver_(resolver) {} int CreateProxyResolver(const scoped_refptr<PacFileData>& pac_script, std::unique_ptr<ProxyResolver>* resolver, CompletionOnceCallback callback, std::unique_ptr<Request>* request) override { *resolver = std::make_unique<ForwardingProxyResolver>(resolver_); return OK; } private: ProxyResolver* resolver_; }; std::unique_ptr<HttpNetworkSession> CreateSession( SpdySessionDependencies* session_deps) { return SpdySessionDependencies::SpdyCreateSession(session_deps); } class FailingProxyResolverFactory : public ProxyResolverFactory { public: FailingProxyResolverFactory() : ProxyResolverFactory(false) {} // ProxyResolverFactory override. int CreateProxyResolver(const scoped_refptr<PacFileData>& script_data, std::unique_ptr<ProxyResolver>* result, CompletionOnceCallback callback, std::unique_ptr<Request>* request) override { return ERR_PAC_SCRIPT_FAILED; } }; class TestSSLConfigService : public SSLConfigService { public: explicit TestSSLConfigService(const SSLConfig& config) : config_(config) {} ~TestSSLConfigService() override = default; void GetSSLConfig(SSLConfig* config) override { *config = config_; } bool CanShareConnectionWithClientCerts( const std::string& hostname) const override { return false; } private: SSLConfig config_; }; } // namespace class HttpNetworkTransactionTest : public PlatformTest, public WithScopedTaskEnvironment { public: ~HttpNetworkTransactionTest() override { // Important to restore the per-pool limit first, since the pool limit must // always be greater than group limit, and the tests reduce both limits. ClientSocketPoolManager::set_max_sockets_per_pool( HttpNetworkSession::NORMAL_SOCKET_POOL, old_max_pool_sockets_); ClientSocketPoolManager::set_max_sockets_per_group( HttpNetworkSession::NORMAL_SOCKET_POOL, old_max_group_sockets_); } protected: HttpNetworkTransactionTest() : WithScopedTaskEnvironment( base::test::ScopedTaskEnvironment::MainThreadType::IO_MOCK_TIME, base::test::ScopedTaskEnvironment::NowSource:: MAIN_THREAD_MOCK_TIME), dummy_connect_job_params_( nullptr /* client_socket_factory */, nullptr /* host_resolver */, nullptr /* http_auth_cache */, nullptr /* http_auth_handler_factory */, nullptr /* spdy_session_pool */, nullptr /* quic_supported_versions */, nullptr /* quic_stream_factory */, nullptr /* proxy_delegate */, nullptr /* http_user_agent_settings */, SSLClientSocketContext(), SSLClientSocketContext(), nullptr /* socket_performance_watcher_factory */, nullptr /* network_quality_estimator */, nullptr /* net_log */, nullptr /* websocket_endpoint_lock_manager */), ssl_(ASYNC, OK), old_max_group_sockets_(ClientSocketPoolManager::max_sockets_per_group( HttpNetworkSession::NORMAL_SOCKET_POOL)), old_max_pool_sockets_(ClientSocketPoolManager::max_sockets_per_pool( HttpNetworkSession::NORMAL_SOCKET_POOL)) { session_deps_.enable_http2_alternative_service = true; } struct SimpleGetHelperResult { int rv; std::string status_line; std::string response_data; int64_t total_received_bytes; int64_t total_sent_bytes; LoadTimingInfo load_timing_info; ConnectionAttempts connection_attempts; IPEndPoint remote_endpoint_after_start; }; void SetUp() override { NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); base::RunLoop().RunUntilIdle(); // Set an initial delay to ensure that the first call to TimeTicks::Now() // before incrementing the counter does not return a null value. FastForwardBy(TimeDelta::FromSeconds(1)); } void TearDown() override { NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); base::RunLoop().RunUntilIdle(); // Empty the current queue. base::RunLoop().RunUntilIdle(); PlatformTest::TearDown(); NetworkChangeNotifier::NotifyObserversOfIPAddressChangeForTests(); base::RunLoop().RunUntilIdle(); } void Check100ResponseTiming(bool use_spdy); // Either |write_failure| specifies a write failure or |read_failure| // specifies a read failure when using a reused socket. In either case, the // failure should cause the network transaction to resend the request, and the // other argument should be NULL. void KeepAliveConnectionResendRequestTest(const MockWrite* write_failure, const MockRead* read_failure); // Either |write_failure| specifies a write failure or |read_failure| // specifies a read failure when using a reused socket. In either case, the // failure should cause the network transaction to resend the request, and the // other argument should be NULL. void PreconnectErrorResendRequestTest(const MockWrite* write_failure, const MockRead* read_failure, bool use_spdy); SimpleGetHelperResult SimpleGetHelperForData( base::span<StaticSocketDataProvider*> providers) { SimpleGetHelperResult out; HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); for (auto* provider : providers) { session_deps_.socket_factory->AddSocketDataProvider(provider); } TestCompletionCallback callback; EXPECT_TRUE(log.bound().IsCapturing()); int rv = trans.Start(&request, callback.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); out.rv = callback.WaitForResult(); out.total_received_bytes = trans.GetTotalReceivedBytes(); out.total_sent_bytes = trans.GetTotalSentBytes(); // Even in the failure cases that use this function, connections are always // successfully established before the error. EXPECT_TRUE(trans.GetLoadTimingInfo(&out.load_timing_info)); TestLoadTimingNotReused(out.load_timing_info, CONNECT_TIMING_HAS_DNS_TIMES); if (out.rv != OK) return out; const HttpResponseInfo* response = trans.GetResponseInfo(); // Can't use ASSERT_* inside helper functions like this, so // return an error. if (!response || !response->headers) { out.rv = ERR_UNEXPECTED; return out; } out.status_line = response->headers->GetStatusLine(); EXPECT_EQ("127.0.0.1", response->remote_endpoint.ToStringWithoutPort()); EXPECT_EQ(80, response->remote_endpoint.port()); bool got_endpoint = trans.GetRemoteEndpoint(&out.remote_endpoint_after_start); EXPECT_EQ(got_endpoint, out.remote_endpoint_after_start.address().size() > 0); rv = ReadTransaction(&trans, &out.response_data); EXPECT_THAT(rv, IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_REQUEST_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_RESPONSE_HEADERS, NetLogEventPhase::NONE); std::string line; EXPECT_TRUE(entries[pos].GetStringValue("line", &line)); EXPECT_EQ("GET / HTTP/1.1\r\n", line); HttpRequestHeaders request_headers; EXPECT_TRUE(trans.GetFullRequestHeaders(&request_headers)); std::string value; EXPECT_TRUE(request_headers.GetHeader("Host", &value)); EXPECT_EQ("www.example.org", value); EXPECT_TRUE(request_headers.GetHeader("Connection", &value)); EXPECT_EQ("keep-alive", value); std::string response_headers; EXPECT_TRUE(GetHeaders(entries[pos].params.get(), &response_headers)); EXPECT_EQ("['Host: www.example.org','Connection: keep-alive']", response_headers); out.total_received_bytes = trans.GetTotalReceivedBytes(); // The total number of sent bytes should not have changed. EXPECT_EQ(out.total_sent_bytes, trans.GetTotalSentBytes()); trans.GetConnectionAttempts(&out.connection_attempts); return out; } SimpleGetHelperResult SimpleGetHelper(base::span<const MockRead> data_reads) { MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; StaticSocketDataProvider reads(data_reads, data_writes); StaticSocketDataProvider* data[] = {&reads}; SimpleGetHelperResult out = SimpleGetHelperForData(data); EXPECT_EQ(CountWriteBytes(data_writes), out.total_sent_bytes); return out; } void AddSSLSocketData() { ssl_.next_proto = kProtoHTTP2; ssl_.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); ASSERT_TRUE(ssl_.ssl_info.cert); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_); } void ConnectStatusHelperWithExpectedStatus(const MockRead& status, int expected_status); void ConnectStatusHelper(const MockRead& status); void CheckErrorIsPassedBack(int error, IoMode mode); const CommonConnectJobParams dummy_connect_job_params_; // These clocks are defined here, even though they're only used in the // Reporting tests below, since they need to be destroyed after // |session_deps_|. base::SimpleTestClock clock_; base::SimpleTestTickClock tick_clock_; SpdyTestUtil spdy_util_; SpdySessionDependencies session_deps_; SSLSocketDataProvider ssl_; // Original socket limits. Some tests set these. Safest to always restore // them once each test has been run. int old_max_group_sockets_; int old_max_pool_sockets_; }; namespace { class BeforeHeadersSentHandler { public: BeforeHeadersSentHandler() : observed_before_headers_sent_with_proxy_(false), observed_before_headers_sent_(false) {} void OnBeforeHeadersSent(const ProxyInfo& proxy_info, HttpRequestHeaders* request_headers) { observed_before_headers_sent_ = true; if (!proxy_info.is_http() && !proxy_info.is_https() && !proxy_info.is_quic()) { return; } observed_before_headers_sent_with_proxy_ = true; observed_proxy_server_uri_ = proxy_info.proxy_server().ToURI(); } bool observed_before_headers_sent_with_proxy() const { return observed_before_headers_sent_with_proxy_; } bool observed_before_headers_sent() const { return observed_before_headers_sent_; } std::string observed_proxy_server_uri() const { return observed_proxy_server_uri_; } private: bool observed_before_headers_sent_with_proxy_; bool observed_before_headers_sent_; std::string observed_proxy_server_uri_; DISALLOW_COPY_AND_ASSIGN(BeforeHeadersSentHandler); }; // Fill |str| with a long header list that consumes >= |size| bytes. void FillLargeHeadersString(std::string* str, int size) { const char row[] = "SomeHeaderName: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\r\n"; const int sizeof_row = strlen(row); const int num_rows = static_cast<int>( ceil(static_cast<float>(size) / sizeof_row)); const int sizeof_data = num_rows * sizeof_row; DCHECK(sizeof_data >= size); str->reserve(sizeof_data); for (int i = 0; i < num_rows; ++i) str->append(row, sizeof_row); } #if defined(NTLM_PORTABLE) uint64_t MockGetMSTime() { // Tue, 23 May 2017 20:13:07 +0000 return 131400439870000000; } // Alternative functions that eliminate randomness and dependency on the local // host name so that the generated NTLM messages are reproducible. void MockGenerateRandom(uint8_t* output, size_t n) { // This is set to 0xaa because the client challenge for testing in // [MS-NLMP] Section 4.2.1 is 8 bytes of 0xaa. memset(output, 0xaa, n); } std::string MockGetHostName() { return ntlm::test::kHostnameAscii; } #endif // defined(NTLM_PORTABLE) class CaptureGroupIdTransportSocketPool : public TransportClientSocketPool { public: explicit CaptureGroupIdTransportSocketPool( const CommonConnectJobParams* common_connect_job_params) : TransportClientSocketPool(0, 0, base::TimeDelta(), ProxyServer::Direct(), false /* is_for_websockets */, common_connect_job_params, nullptr /* ssl_config_service */) {} const ClientSocketPool::GroupId& last_group_id_received() const { return last_group_id_; } bool socket_requested() const { return socket_requested_; } int RequestSocket( const ClientSocketPool::GroupId& group_id, scoped_refptr<ClientSocketPool::SocketParams> socket_params, const base::Optional<NetworkTrafficAnnotationTag>& proxy_annotation_tag, RequestPriority priority, const SocketTag& socket_tag, ClientSocketPool::RespectLimits respect_limits, ClientSocketHandle* handle, CompletionOnceCallback callback, const ClientSocketPool::ProxyAuthCallback& proxy_auth_callback, const NetLogWithSource& net_log) override { last_group_id_ = group_id; socket_requested_ = true; return ERR_IO_PENDING; } void CancelRequest(const ClientSocketPool::GroupId& group_id, ClientSocketHandle* handle, bool cancel_connect_job) override {} void ReleaseSocket(const ClientSocketPool::GroupId& group_id, std::unique_ptr<StreamSocket> socket, int64_t generation) override {} void CloseIdleSockets() override {} void CloseIdleSocketsInGroup( const ClientSocketPool::GroupId& group_id) override {} int IdleSocketCount() const override { return 0; } size_t IdleSocketCountInGroup( const ClientSocketPool::GroupId& group_id) const override { return 0; } LoadState GetLoadState(const ClientSocketPool::GroupId& group_id, const ClientSocketHandle* handle) const override { return LOAD_STATE_IDLE; } private: ClientSocketPool::GroupId last_group_id_; bool socket_requested_ = false; }; //----------------------------------------------------------------------------- // Helper functions for validating that AuthChallengeInfo's are correctly // configured for common cases. bool CheckBasicServerAuth( const base::Optional<AuthChallengeInfo>& auth_challenge) { if (!auth_challenge) return false; EXPECT_FALSE(auth_challenge->is_proxy); EXPECT_EQ("http://www.example.org", auth_challenge->challenger.Serialize()); EXPECT_EQ("MyRealm1", auth_challenge->realm); EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme); return true; } bool CheckBasicProxyAuth( const base::Optional<AuthChallengeInfo>& auth_challenge) { if (!auth_challenge) return false; EXPECT_TRUE(auth_challenge->is_proxy); EXPECT_EQ("http://myproxy:70", auth_challenge->challenger.Serialize()); EXPECT_EQ("MyRealm1", auth_challenge->realm); EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme); return true; } bool CheckBasicSecureProxyAuth( const base::Optional<AuthChallengeInfo>& auth_challenge) { if (!auth_challenge) return false; EXPECT_TRUE(auth_challenge->is_proxy); EXPECT_EQ("https://myproxy:70", auth_challenge->challenger.Serialize()); EXPECT_EQ("MyRealm1", auth_challenge->realm); EXPECT_EQ(kBasicAuthScheme, auth_challenge->scheme); return true; } bool CheckDigestServerAuth( const base::Optional<AuthChallengeInfo>& auth_challenge) { if (!auth_challenge) return false; EXPECT_FALSE(auth_challenge->is_proxy); EXPECT_EQ("http://www.example.org", auth_challenge->challenger.Serialize()); EXPECT_EQ("digestive", auth_challenge->realm); EXPECT_EQ(kDigestAuthScheme, auth_challenge->scheme); return true; } #if defined(NTLM_PORTABLE) bool CheckNTLMServerAuth( const base::Optional<AuthChallengeInfo>& auth_challenge) { if (!auth_challenge) return false; EXPECT_FALSE(auth_challenge->is_proxy); EXPECT_EQ("https://server", auth_challenge->challenger.Serialize()); EXPECT_EQ(std::string(), auth_challenge->realm); EXPECT_EQ(kNtlmAuthScheme, auth_challenge->scheme); return true; } bool CheckNTLMProxyAuth( const base::Optional<AuthChallengeInfo>& auth_challenge) { if (!auth_challenge) return false; EXPECT_TRUE(auth_challenge->is_proxy); EXPECT_EQ("http://server", auth_challenge->challenger.Serialize()); EXPECT_EQ(std::string(), auth_challenge->realm); EXPECT_EQ(kNtlmAuthScheme, auth_challenge->scheme); return true; } #endif // defined(NTLM_PORTABLE) } // namespace TEST_F(HttpNetworkTransactionTest, Basic) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); } TEST_F(HttpNetworkTransactionTest, SimpleGET) { MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.0 200 OK", out.status_line); EXPECT_EQ("hello world", out.response_data); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, out.total_received_bytes); EXPECT_EQ(0u, out.connection_attempts.size()); EXPECT_FALSE(out.remote_endpoint_after_start.address().empty()); } // Response with no status line. TEST_F(HttpNetworkTransactionTest, SimpleGETNoHeaders) { MockRead data_reads[] = { MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/0.9 200 OK", out.status_line); EXPECT_EQ("hello world", out.response_data); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, out.total_received_bytes); } // Response with no status line, and a weird port. Should fail by default. TEST_F(HttpNetworkTransactionTest, SimpleGETNoHeadersWeirdPort) { MockRead data_reads[] = { MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpRequestInfo request; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); request.method = "GET"; request.url = GURL("http://www.example.com:2000/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsError(ERR_INVALID_HTTP_RESPONSE)); } // Tests that request info can be destroyed after the headers phase is complete. TEST_F(HttpNetworkTransactionTest, SimpleGETNoReadDestroyRequestInfo) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Connection: keep-alive\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, 0), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; { auto request = std::make_unique<HttpRequestInfo>(); request->method = "GET"; request->url = GURL("http://www.example.org/"); request->traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); int rv = trans->Start(request.get(), callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); } // Let request info be destroyed. trans.reset(); } // Response with no status line, and a weird port. Option to allow weird ports // enabled. TEST_F(HttpNetworkTransactionTest, SimpleGETNoHeadersWeirdPortAllowed) { MockRead data_reads[] = { MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.http_09_on_non_default_ports_enabled = true; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpRequestInfo request; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); request.method = "GET"; request.url = GURL("http://www.example.com:2000/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* info = trans->GetResponseInfo(); ASSERT_TRUE(info->headers); EXPECT_EQ("HTTP/0.9 200 OK", info->headers->GetStatusLine()); // Don't bother to read the body - that's verified elsewhere, important thing // is that the option to allow HTTP/0.9 on non-default ports is respected. } // Allow up to 4 bytes of junk to precede status line. TEST_F(HttpNetworkTransactionTest, StatusLineJunk3Bytes) { MockRead data_reads[] = { MockRead("xxxHTTP/1.0 404 Not Found\nServer: blah\n\nDATA"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.0 404 Not Found", out.status_line); EXPECT_EQ("DATA", out.response_data); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, out.total_received_bytes); } // Allow up to 4 bytes of junk to precede status line. TEST_F(HttpNetworkTransactionTest, StatusLineJunk4Bytes) { MockRead data_reads[] = { MockRead("\n\nQJHTTP/1.0 404 Not Found\nServer: blah\n\nDATA"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.0 404 Not Found", out.status_line); EXPECT_EQ("DATA", out.response_data); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, out.total_received_bytes); } // Beyond 4 bytes of slop and it should fail to find a status line. TEST_F(HttpNetworkTransactionTest, StatusLineJunk5Bytes) { MockRead data_reads[] = { MockRead("xxxxxHTTP/1.1 404 Not Found\nServer: blah"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/0.9 200 OK", out.status_line); EXPECT_EQ("xxxxxHTTP/1.1 404 Not Found\nServer: blah", out.response_data); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, out.total_received_bytes); } // Same as StatusLineJunk4Bytes, except the read chunks are smaller. TEST_F(HttpNetworkTransactionTest, StatusLineJunk4Bytes_Slow) { MockRead data_reads[] = { MockRead("\n"), MockRead("\n"), MockRead("Q"), MockRead("J"), MockRead("HTTP/1.0 404 Not Found\nServer: blah\n\nDATA"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.0 404 Not Found", out.status_line); EXPECT_EQ("DATA", out.response_data); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, out.total_received_bytes); } // Close the connection before enough bytes to have a status line. TEST_F(HttpNetworkTransactionTest, StatusLinePartial) { MockRead data_reads[] = { MockRead("HTT"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/0.9 200 OK", out.status_line); EXPECT_EQ("HTT", out.response_data); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, out.total_received_bytes); } // Simulate a 204 response, lacking a Content-Length header, sent over a // persistent connection. The response should still terminate since a 204 // cannot have a response body. TEST_F(HttpNetworkTransactionTest, StopsReading204) { char junk[] = "junk"; MockRead data_reads[] = { MockRead("HTTP/1.1 204 No Content\r\n\r\n"), MockRead(junk), // Should not be read!! MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.1 204 No Content", out.status_line); EXPECT_EQ("", out.response_data); int64_t reads_size = CountReadBytes(data_reads); int64_t response_size = reads_size - strlen(junk); EXPECT_EQ(response_size, out.total_received_bytes); } // A simple request using chunked encoding with some extra data after. TEST_F(HttpNetworkTransactionTest, ChunkedEncoding) { std::string final_chunk = "0\r\n\r\n"; std::string extra_data = "HTTP/1.1 200 OK\r\n"; std::string last_read = final_chunk + extra_data; MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\nTransfer-Encoding: chunked\r\n\r\n"), MockRead("5\r\nHello\r\n"), MockRead("1\r\n"), MockRead(" \r\n"), MockRead("5\r\nworld\r\n"), MockRead(last_read.data()), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.1 200 OK", out.status_line); EXPECT_EQ("Hello world", out.response_data); int64_t reads_size = CountReadBytes(data_reads); int64_t response_size = reads_size - extra_data.size(); EXPECT_EQ(response_size, out.total_received_bytes); } // Next tests deal with http://crbug.com/56344. TEST_F(HttpNetworkTransactionTest, MultipleContentLengthHeadersNoTransferEncoding) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 10\r\n"), MockRead("Content-Length: 5\r\n\r\n"), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsError(ERR_RESPONSE_HEADERS_MULTIPLE_CONTENT_LENGTH)); } TEST_F(HttpNetworkTransactionTest, DuplicateContentLengthHeadersNoTransferEncoding) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 5\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("Hello"), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.1 200 OK", out.status_line); EXPECT_EQ("Hello", out.response_data); } TEST_F(HttpNetworkTransactionTest, ComplexContentLengthHeadersNoTransferEncoding) { // More than 2 dupes. { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 5\r\n"), MockRead("Content-Length: 5\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("Hello"), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.1 200 OK", out.status_line); EXPECT_EQ("Hello", out.response_data); } // HTTP/1.0 { MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 5\r\n"), MockRead("Content-Length: 5\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("Hello"), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.0 200 OK", out.status_line); EXPECT_EQ("Hello", out.response_data); } // 2 dupes and one mismatched. { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 10\r\n"), MockRead("Content-Length: 10\r\n"), MockRead("Content-Length: 5\r\n\r\n"), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsError(ERR_RESPONSE_HEADERS_MULTIPLE_CONTENT_LENGTH)); } } TEST_F(HttpNetworkTransactionTest, MultipleContentLengthHeadersTransferEncoding) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 666\r\n"), MockRead("Content-Length: 1337\r\n"), MockRead("Transfer-Encoding: chunked\r\n\r\n"), MockRead("5\r\nHello\r\n"), MockRead("1\r\n"), MockRead(" \r\n"), MockRead("5\r\nworld\r\n"), MockRead("0\r\n\r\nHTTP/1.1 200 OK\r\n"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.1 200 OK", out.status_line); EXPECT_EQ("Hello world", out.response_data); } // Next tests deal with http://crbug.com/98895. // Checks that a single Content-Disposition header results in no error. TEST_F(HttpNetworkTransactionTest, SingleContentDispositionHeader) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Disposition: attachment;filename=\"salutations.txt\"r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("Hello"), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.1 200 OK", out.status_line); EXPECT_EQ("Hello", out.response_data); } // Checks that two identical Content-Disposition headers result in no error. TEST_F(HttpNetworkTransactionTest, TwoIdenticalContentDispositionHeaders) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Disposition: attachment;filename=\"greetings.txt\"r\n"), MockRead("Content-Disposition: attachment;filename=\"greetings.txt\"r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("Hello"), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsOk()); EXPECT_EQ("HTTP/1.1 200 OK", out.status_line); EXPECT_EQ("Hello", out.response_data); } // Checks that two distinct Content-Disposition headers result in an error. TEST_F(HttpNetworkTransactionTest, TwoDistinctContentDispositionHeaders) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Disposition: attachment;filename=\"greetings.txt\"r\n"), MockRead("Content-Disposition: attachment;filename=\"hi.txt\"r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("Hello"), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsError(ERR_RESPONSE_HEADERS_MULTIPLE_CONTENT_DISPOSITION)); } // Checks that two identical Location headers result in no error. // Also tests Location header behavior. TEST_F(HttpNetworkTransactionTest, TwoIdenticalLocationHeaders) { MockRead data_reads[] = { MockRead("HTTP/1.1 302 Redirect\r\n"), MockRead("Location: http://good.com/\r\n"), MockRead("Location: http://good.com/\r\n"), MockRead("Content-Length: 0\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://redirect.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 302 Redirect", response->headers->GetStatusLine()); std::string url; EXPECT_TRUE(response->headers->IsRedirect(&url)); EXPECT_EQ("http://good.com/", url); EXPECT_TRUE(response->proxy_server.is_direct()); } // Checks that two distinct Location headers result in an error. TEST_F(HttpNetworkTransactionTest, TwoDistinctLocationHeaders) { MockRead data_reads[] = { MockRead("HTTP/1.1 302 Redirect\r\n"), MockRead("Location: http://good.com/\r\n"), MockRead("Location: http://evil.com/\r\n"), MockRead("Content-Length: 0\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsError(ERR_RESPONSE_HEADERS_MULTIPLE_LOCATION)); } // Do a request using the HEAD method. Verify that we don't try to read the // message body (since HEAD has none). TEST_F(HttpNetworkTransactionTest, Head) { HttpRequestInfo request; request.method = "HEAD"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); BeforeHeadersSentHandler headers_handler; trans.SetBeforeHeadersSentCallback( base::Bind(&BeforeHeadersSentHandler::OnBeforeHeadersSent, base::Unretained(&headers_handler))); MockWrite data_writes1[] = { MockWrite("HEAD / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 404 Not Found\r\n"), MockRead("Server: Blah\r\n"), MockRead("Content-Length: 1234\r\n\r\n"), // No response body because the test stops reading here. MockRead(SYNCHRONOUS, ERR_UNEXPECTED), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); // Check that the headers got parsed. EXPECT_TRUE(response->headers); EXPECT_EQ(1234, response->headers->GetContentLength()); EXPECT_EQ("HTTP/1.1 404 Not Found", response->headers->GetStatusLine()); EXPECT_TRUE(response->proxy_server.is_direct()); EXPECT_TRUE(headers_handler.observed_before_headers_sent()); EXPECT_FALSE(headers_handler.observed_before_headers_sent_with_proxy()); std::string server_header; size_t iter = 0; bool has_server_header = response->headers->EnumerateHeader( &iter, "Server", &server_header); EXPECT_TRUE(has_server_header); EXPECT_EQ("Blah", server_header); // Reading should give EOF right away, since there is no message body // (despite non-zero content-length). std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("", response_data); } TEST_F(HttpNetworkTransactionTest, ReuseConnection) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead("hello"), MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead("world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); const char* const kExpectedResponseData[] = { "hello", "world" }; for (int i = 0; i < 2; ++i) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_TRUE(response->proxy_server.is_direct()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ(kExpectedResponseData[i], response_data); } } TEST_F(HttpNetworkTransactionTest, Ignores100) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Check the upload progress returned before initialization is correct. UploadProgress progress = request.upload_data_stream->GetUploadProgress(); EXPECT_EQ(0u, progress.size()); EXPECT_EQ(0u, progress.position()); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead("HTTP/1.0 100 Continue\r\n\r\n"), MockRead("HTTP/1.0 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); } // This test is almost the same as Ignores100 above, but the response contains // a 102 instead of a 100. Also, instead of HTTP/1.0 the response is // HTTP/1.1 and the two status headers are read in one read. TEST_F(HttpNetworkTransactionTest, Ignores1xx) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead("HTTP/1.1 102 Unspecified status code\r\n\r\n" "HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); } TEST_F(HttpNetworkTransactionTest, LoadTimingMeasuresTimeToFirstByteForHttp) { static const base::TimeDelta kDelayAfterFirstByte = base::TimeDelta::FromMilliseconds(10); HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::vector<MockWrite> data_writes = { MockWrite(ASYNC, 0, "GET / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n\r\n"), }; std::vector<MockRead> data_reads = { // Write one byte of the status line, followed by a pause. MockRead(ASYNC, 1, "H"), MockRead(ASYNC, ERR_IO_PENDING, 2), MockRead(ASYNC, 3, "TTP/1.1 200 OK\r\n\r\n"), MockRead(ASYNC, 4, "hello world"), MockRead(SYNCHRONOUS, OK, 5), }; SequencedSocketData data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); data.RunUntilPaused(); ASSERT_TRUE(data.IsPaused()); FastForwardBy(kDelayAfterFirstByte); data.Resume(); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); EXPECT_FALSE(load_timing_info.receive_headers_start.is_null()); EXPECT_FALSE(load_timing_info.connect_timing.connect_end.is_null()); // Ensure we didn't include the delay in the TTFB time. EXPECT_EQ(load_timing_info.receive_headers_start, load_timing_info.connect_timing.connect_end); // Ensure that the mock clock advanced at all. EXPECT_EQ(base::TimeTicks::Now() - load_timing_info.receive_headers_start, kDelayAfterFirstByte); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); } // Tests that the time-to-first-byte reported in a transaction's load timing // info uses the first response, even if 1XX/informational. void HttpNetworkTransactionTest::Check100ResponseTiming(bool use_spdy) { static const base::TimeDelta kDelayAfter100Response = base::TimeDelta::FromMilliseconds(10); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::vector<MockWrite> data_writes; std::vector<MockRead> data_reads; spdy::SpdySerializedFrame spdy_req( spdy_util_.ConstructSpdyGet(request.url.spec().c_str(), 1, LOWEST)); spdy::SpdyHeaderBlock spdy_resp1_headers; spdy_resp1_headers[spdy::kHttp2StatusHeader] = "100"; spdy::SpdySerializedFrame spdy_resp1( spdy_util_.ConstructSpdyReply(1, spdy_resp1_headers.Clone())); spdy::SpdySerializedFrame spdy_resp2( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame spdy_data( spdy_util_.ConstructSpdyDataFrame(1, "hello world", true)); if (use_spdy) { ssl.next_proto = kProtoHTTP2; data_writes = {CreateMockWrite(spdy_req, 0)}; data_reads = { CreateMockRead(spdy_resp1, 1), MockRead(ASYNC, ERR_IO_PENDING, 2), CreateMockRead(spdy_resp2, 3), CreateMockRead(spdy_data, 4), MockRead(SYNCHRONOUS, OK, 5), }; } else { data_writes = { MockWrite(ASYNC, 0, "GET / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n\r\n"), }; data_reads = { MockRead(ASYNC, 1, "HTTP/1.1 100 Continue\r\n\r\n"), MockRead(ASYNC, ERR_IO_PENDING, 2), MockRead(ASYNC, 3, "HTTP/1.1 200 OK\r\n\r\n"), MockRead(ASYNC, 4, "hello world"), MockRead(SYNCHRONOUS, OK, 5), }; } SequencedSocketData data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); data.RunUntilPaused(); // We should now have parsed the 100 response and hit ERR_IO_PENDING. Insert // the delay before parsing the 200 response. ASSERT_TRUE(data.IsPaused()); FastForwardBy(kDelayAfter100Response); data.Resume(); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); EXPECT_FALSE(load_timing_info.receive_headers_start.is_null()); EXPECT_FALSE(load_timing_info.connect_timing.connect_end.is_null()); // Ensure we didn't include the delay in the TTFB time. EXPECT_EQ(load_timing_info.receive_headers_start, load_timing_info.connect_timing.connect_end); // Ensure that the mock clock advanced at all. EXPECT_EQ(base::TimeTicks::Now() - load_timing_info.receive_headers_start, kDelayAfter100Response); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); } TEST_F(HttpNetworkTransactionTest, MeasuresTimeToFirst100ResponseForHttp) { Check100ResponseTiming(false /* use_spdy */); } TEST_F(HttpNetworkTransactionTest, MeasuresTimeToFirst100ResponseForSpdy) { Check100ResponseTiming(true /* use_spdy */); } TEST_F(HttpNetworkTransactionTest, Incomplete100ThenEOF) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead(SYNCHRONOUS, "HTTP/1.0 100 Continue\r\n"), MockRead(ASYNC, 0), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("", response_data); } TEST_F(HttpNetworkTransactionTest, EmptyResponse) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead(ASYNC, 0), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_EMPTY_RESPONSE)); } void HttpNetworkTransactionTest::KeepAliveConnectionResendRequestTest( const MockWrite* write_failure, const MockRead* read_failure) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Written data for successfully sending both requests. MockWrite data1_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n\r\n") }; // Read results for the first request. MockRead data1_reads[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead("hello"), MockRead(ASYNC, OK), }; if (write_failure) { ASSERT_FALSE(read_failure); data1_writes[1] = *write_failure; } else { ASSERT_TRUE(read_failure); data1_reads[2] = *read_failure; } StaticSocketDataProvider data1(data1_reads, data1_writes); session_deps_.socket_factory->AddSocketDataProvider(&data1); MockRead data2_reads[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead("world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider data2(data2_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data2); const char* const kExpectedResponseData[] = { "hello", "world" }; uint32_t first_socket_log_id = NetLogSource::kInvalidId; for (int i = 0; i < 2; ++i) { TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_DNS_TIMES); if (i == 0) { first_socket_log_id = load_timing_info.socket_log_id; } else { // The second request should be using a new socket. EXPECT_NE(first_socket_log_id, load_timing_info.socket_log_id); } const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_TRUE(response->proxy_server.is_direct()); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ(kExpectedResponseData[i], response_data); } } void HttpNetworkTransactionTest::PreconnectErrorResendRequestTest( const MockWrite* write_failure, const MockRead* read_failure, bool use_spdy) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); SSLSocketDataProvider ssl1(ASYNC, OK); SSLSocketDataProvider ssl2(ASYNC, OK); if (use_spdy) { ssl1.next_proto = kProtoHTTP2; ssl2.next_proto = kProtoHTTP2; } session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); // SPDY versions of the request and response. spdy::SpdySerializedFrame spdy_request(spdy_util_.ConstructSpdyGet( request.url.spec().c_str(), 1, DEFAULT_PRIORITY)); spdy::SpdySerializedFrame spdy_response( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame spdy_data( spdy_util_.ConstructSpdyDataFrame(1, "hello", true)); // HTTP/1.1 versions of the request and response. const char kHttpRequest[] = "GET / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n\r\n"; const char kHttpResponse[] = "HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"; const char kHttpData[] = "hello"; std::vector<MockRead> data1_reads; std::vector<MockWrite> data1_writes; if (write_failure) { ASSERT_FALSE(read_failure); data1_writes.push_back(*write_failure); data1_reads.push_back(MockRead(ASYNC, OK)); } else { ASSERT_TRUE(read_failure); if (use_spdy) { data1_writes.push_back(CreateMockWrite(spdy_request)); } else { data1_writes.push_back(MockWrite(kHttpRequest)); } data1_reads.push_back(*read_failure); } StaticSocketDataProvider data1(data1_reads, data1_writes); session_deps_.socket_factory->AddSocketDataProvider(&data1); std::vector<MockRead> data2_reads; std::vector<MockWrite> data2_writes; if (use_spdy) { data2_writes.push_back(CreateMockWrite(spdy_request, 0, ASYNC)); data2_reads.push_back(CreateMockRead(spdy_response, 1, ASYNC)); data2_reads.push_back(CreateMockRead(spdy_data, 2, ASYNC)); data2_reads.push_back(MockRead(ASYNC, OK, 3)); } else { data2_writes.push_back( MockWrite(ASYNC, kHttpRequest, strlen(kHttpRequest), 0)); data2_reads.push_back( MockRead(ASYNC, kHttpResponse, strlen(kHttpResponse), 1)); data2_reads.push_back(MockRead(ASYNC, kHttpData, strlen(kHttpData), 2)); data2_reads.push_back(MockRead(ASYNC, OK, 3)); } SequencedSocketData data2(data2_reads, data2_writes); session_deps_.socket_factory->AddSocketDataProvider(&data2); // Preconnect a socket. session->http_stream_factory()->PreconnectStreams(1, request); // Wait for the preconnect to complete. // TODO(davidben): Some way to wait for an idle socket count might be handy. base::RunLoop().RunUntilIdle(); EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); // Make the request. TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused( load_timing_info, CONNECT_TIMING_HAS_DNS_TIMES|CONNECT_TIMING_HAS_SSL_TIMES); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); if (response->was_fetched_via_spdy) { EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); } else { EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); } std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ(kHttpData, response_data); } // Test that we do not retry indefinitely when a server sends an error like // ERR_SPDY_PING_FAILED, ERR_SPDY_SERVER_REFUSED_STREAM, // ERR_QUIC_HANDSHAKE_FAILED or ERR_QUIC_PROTOCOL_ERROR. TEST_F(HttpNetworkTransactionTest, FiniteRetriesOnIOError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Check whether we give up after the third try. // Construct an HTTP2 request and a "Go away" response. spdy::SpdySerializedFrame spdy_request(spdy_util_.ConstructSpdyGet( request.url.spec().c_str(), 1, DEFAULT_PRIORITY)); spdy::SpdySerializedFrame spdy_response_go_away( spdy_util_.ConstructSpdyGoAway(0)); MockRead data_read1[] = {CreateMockRead(spdy_response_go_away)}; MockWrite data_write[] = {CreateMockWrite(spdy_request, 0)}; // Three go away responses. StaticSocketDataProvider data1(data_read1, data_write); StaticSocketDataProvider data2(data_read1, data_write); StaticSocketDataProvider data3(data_read1, data_write); session_deps_.socket_factory->AddSocketDataProvider(&data1); AddSSLSocketData(); session_deps_.socket_factory->AddSocketDataProvider(&data2); AddSSLSocketData(); session_deps_.socket_factory->AddSocketDataProvider(&data3); AddSSLSocketData(); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_SPDY_SERVER_REFUSED_STREAM)); } TEST_F(HttpNetworkTransactionTest, RetryTwiceOnIOError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Check whether we try atleast thrice before giving up. // Construct an HTTP2 request and a "Go away" response. spdy::SpdySerializedFrame spdy_request(spdy_util_.ConstructSpdyGet( request.url.spec().c_str(), 1, DEFAULT_PRIORITY)); spdy::SpdySerializedFrame spdy_response_go_away( spdy_util_.ConstructSpdyGoAway(0)); MockRead data_read1[] = {CreateMockRead(spdy_response_go_away)}; MockWrite data_write[] = {CreateMockWrite(spdy_request, 0)}; // Construct a non error HTTP2 response. spdy::SpdySerializedFrame spdy_response_no_error( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame spdy_data( spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead data_read2[] = {CreateMockRead(spdy_response_no_error, 1), CreateMockRead(spdy_data, 2)}; // Two error responses. StaticSocketDataProvider data1(data_read1, data_write); StaticSocketDataProvider data2(data_read1, data_write); // Followed by a success response. SequencedSocketData data3(data_read2, data_write); session_deps_.socket_factory->AddSocketDataProvider(&data1); AddSSLSocketData(); session_deps_.socket_factory->AddSocketDataProvider(&data2); AddSSLSocketData(); session_deps_.socket_factory->AddSocketDataProvider(&data3); AddSSLSocketData(); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, KeepAliveConnectionNotConnectedOnWrite) { MockWrite write_failure(ASYNC, ERR_SOCKET_NOT_CONNECTED); KeepAliveConnectionResendRequestTest(&write_failure, nullptr); } TEST_F(HttpNetworkTransactionTest, KeepAliveConnectionReset) { MockRead read_failure(ASYNC, ERR_CONNECTION_RESET); KeepAliveConnectionResendRequestTest(nullptr, &read_failure); } TEST_F(HttpNetworkTransactionTest, KeepAliveConnectionEOF) { MockRead read_failure(SYNCHRONOUS, OK); // EOF KeepAliveConnectionResendRequestTest(nullptr, &read_failure); } // Make sure that on a 408 response (Request Timeout), the request is retried, // if the socket was a reused keep alive socket. TEST_F(HttpNetworkTransactionTest, KeepAlive408) { MockRead read_failure(SYNCHRONOUS, "HTTP/1.1 408 Request Timeout\r\n" "Connection: Keep-Alive\r\n" "Content-Length: 6\r\n\r\n" "Pickle"); KeepAliveConnectionResendRequestTest(nullptr, &read_failure); } TEST_F(HttpNetworkTransactionTest, PreconnectErrorNotConnectedOnWrite) { MockWrite write_failure(ASYNC, ERR_SOCKET_NOT_CONNECTED); PreconnectErrorResendRequestTest(&write_failure, nullptr, false); } TEST_F(HttpNetworkTransactionTest, PreconnectErrorReset) { MockRead read_failure(ASYNC, ERR_CONNECTION_RESET); PreconnectErrorResendRequestTest(nullptr, &read_failure, false); } TEST_F(HttpNetworkTransactionTest, PreconnectErrorEOF) { MockRead read_failure(SYNCHRONOUS, OK); // EOF PreconnectErrorResendRequestTest(nullptr, &read_failure, false); } TEST_F(HttpNetworkTransactionTest, PreconnectErrorAsyncEOF) { MockRead read_failure(ASYNC, OK); // EOF PreconnectErrorResendRequestTest(nullptr, &read_failure, false); } // Make sure that on a 408 response (Request Timeout), the request is retried, // if the socket was a preconnected (UNUSED_IDLE) socket. TEST_F(HttpNetworkTransactionTest, RetryOnIdle408) { MockRead read_failure(SYNCHRONOUS, "HTTP/1.1 408 Request Timeout\r\n" "Connection: Keep-Alive\r\n" "Content-Length: 6\r\n\r\n" "Pickle"); KeepAliveConnectionResendRequestTest(nullptr, &read_failure); PreconnectErrorResendRequestTest(nullptr, &read_failure, false); } TEST_F(HttpNetworkTransactionTest, SpdyPreconnectErrorNotConnectedOnWrite) { MockWrite write_failure(ASYNC, ERR_SOCKET_NOT_CONNECTED); PreconnectErrorResendRequestTest(&write_failure, nullptr, true); } TEST_F(HttpNetworkTransactionTest, SpdyPreconnectErrorReset) { MockRead read_failure(ASYNC, ERR_CONNECTION_RESET); PreconnectErrorResendRequestTest(nullptr, &read_failure, true); } TEST_F(HttpNetworkTransactionTest, SpdyPreconnectErrorEOF) { MockRead read_failure(SYNCHRONOUS, OK); // EOF PreconnectErrorResendRequestTest(nullptr, &read_failure, true); } TEST_F(HttpNetworkTransactionTest, SpdyPreconnectErrorAsyncEOF) { MockRead read_failure(ASYNC, OK); // EOF PreconnectErrorResendRequestTest(nullptr, &read_failure, true); } TEST_F(HttpNetworkTransactionTest, NonKeepAliveConnectionReset) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead(ASYNC, ERR_CONNECTION_RESET), MockRead("HTTP/1.0 200 OK\r\n\r\n"), // Should not be used MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); IPEndPoint endpoint; EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint)); EXPECT_LT(0u, endpoint.address().size()); } // What do various browsers do when the server closes a non-keepalive // connection without sending any response header or body? // // IE7: error page // Safari 3.1.2 (Windows): error page // Firefox 3.0.1: blank page // Opera 9.52: after five attempts, blank page // Us with WinHTTP: error page (ERR_INVALID_RESPONSE) // Us: error page (EMPTY_RESPONSE) TEST_F(HttpNetworkTransactionTest, NonKeepAliveConnectionEOF) { MockRead data_reads[] = { MockRead(SYNCHRONOUS, OK), // EOF MockRead("HTTP/1.0 200 OK\r\n\r\n"), // Should not be used MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; SimpleGetHelperResult out = SimpleGetHelper(data_reads); EXPECT_THAT(out.rv, IsError(ERR_EMPTY_RESPONSE)); } // Next 2 cases (KeepAliveEarlyClose and KeepAliveEarlyClose2) are regression // tests. There was a bug causing HttpNetworkTransaction to hang in the // destructor in such situations. // See http://crbug.com/154712 and http://crbug.com/156609. TEST_F(HttpNetworkTransactionTest, KeepAliveEarlyClose) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Connection: keep-alive\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead("hello"), MockRead(SYNCHRONOUS, 0), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); scoped_refptr<IOBufferWithSize> io_buf = base::MakeRefCounted<IOBufferWithSize>(100); rv = trans->Read(io_buf.get(), io_buf->size(), callback.callback()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); EXPECT_EQ(5, rv); rv = trans->Read(io_buf.get(), io_buf->size(), callback.callback()); EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH)); trans.reset(); base::RunLoop().RunUntilIdle(); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); } TEST_F(HttpNetworkTransactionTest, KeepAliveEarlyClose2) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Connection: keep-alive\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, 0), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); scoped_refptr<IOBufferWithSize> io_buf( base::MakeRefCounted<IOBufferWithSize>(100)); rv = trans->Read(io_buf.get(), io_buf->size(), callback.callback()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH)); trans.reset(); base::RunLoop().RunUntilIdle(); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); } // Test that we correctly reuse a keep-alive connection after not explicitly // reading the body. TEST_F(HttpNetworkTransactionTest, KeepAliveAfterUnreadBody) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); const char* request_data = "GET / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n\r\n"; MockWrite data_writes[] = { MockWrite(ASYNC, 0, request_data), MockWrite(ASYNC, 2, request_data), MockWrite(ASYNC, 4, request_data), MockWrite(ASYNC, 6, request_data), MockWrite(ASYNC, 8, request_data), MockWrite(ASYNC, 10, request_data), MockWrite(ASYNC, 12, request_data), MockWrite(ASYNC, 14, request_data), MockWrite(ASYNC, 17, request_data), MockWrite(ASYNC, 20, request_data), }; // Note that because all these reads happen in the same // StaticSocketDataProvider, it shows that the same socket is being reused for // all transactions. MockRead data_reads[] = { MockRead(ASYNC, 1, "HTTP/1.1 204 No Content\r\n\r\n"), MockRead(ASYNC, 3, "HTTP/1.1 205 Reset Content\r\n\r\n"), MockRead(ASYNC, 5, "HTTP/1.1 304 Not Modified\r\n\r\n"), MockRead(ASYNC, 7, "HTTP/1.1 302 Found\r\n" "Content-Length: 0\r\n\r\n"), MockRead(ASYNC, 9, "HTTP/1.1 302 Found\r\n" "Content-Length: 5\r\n\r\n" "hello"), MockRead(ASYNC, 11, "HTTP/1.1 301 Moved Permanently\r\n" "Content-Length: 0\r\n\r\n"), MockRead(ASYNC, 13, "HTTP/1.1 301 Moved Permanently\r\n" "Content-Length: 5\r\n\r\n" "hello"), // In the next two rounds, IsConnectedAndIdle returns false, due to // the set_busy_before_sync_reads(true) call, while the // HttpNetworkTransaction is being shut down, but the socket is still // reuseable. See http://crbug.com/544255. MockRead(ASYNC, 15, "HTTP/1.1 200 Hunky-Dory\r\n" "Content-Length: 5\r\n\r\n"), MockRead(SYNCHRONOUS, 16, "hello"), MockRead(ASYNC, 18, "HTTP/1.1 200 Hunky-Dory\r\n" "Content-Length: 5\r\n\r\n" "he"), MockRead(SYNCHRONOUS, 19, "llo"), // The body of the final request is actually read. MockRead(ASYNC, 21, "HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead(ASYNC, 22, "hello"), }; SequencedSocketData data(data_reads, data_writes); data.set_busy_before_sync_reads(true); session_deps_.socket_factory->AddSocketDataProvider(&data); const int kNumUnreadBodies = base::size(data_writes) - 1; std::string response_lines[kNumUnreadBodies]; uint32_t first_socket_log_id = NetLogSource::kInvalidId; for (size_t i = 0; i < kNumUnreadBodies; ++i) { TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); if (i == 0) { TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_DNS_TIMES); first_socket_log_id = load_timing_info.socket_log_id; } else { TestLoadTimingReused(load_timing_info); EXPECT_EQ(first_socket_log_id, load_timing_info.socket_log_id); } const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); response_lines[i] = response->headers->GetStatusLine(); // Delete the transaction without reading the response bodies. Then spin // the message loop, so the response bodies are drained. trans.reset(); base::RunLoop().RunUntilIdle(); } const char* const kStatusLines[] = { "HTTP/1.1 204 No Content", "HTTP/1.1 205 Reset Content", "HTTP/1.1 304 Not Modified", "HTTP/1.1 302 Found", "HTTP/1.1 302 Found", "HTTP/1.1 301 Moved Permanently", "HTTP/1.1 301 Moved Permanently", "HTTP/1.1 200 Hunky-Dory", "HTTP/1.1 200 Hunky-Dory", }; static_assert(kNumUnreadBodies == base::size(kStatusLines), "forgot to update kStatusLines"); for (int i = 0; i < kNumUnreadBodies; ++i) EXPECT_EQ(kStatusLines[i], response_lines[i]); TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello", response_data); } // Sockets that receive extra data after a response is complete should not be // reused. TEST_F(HttpNetworkTransactionTest, KeepAliveWithUnusedData1) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes1[] = { MockWrite("HEAD / HTTP/1.1\r\n" "Host: www.borked.com\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\n" "Connection: keep-alive\r\n" "Content-Length: 22\r\n\r\n" "This server is borked."), }; MockWrite data_writes2[] = { MockWrite("GET /foo HTTP/1.1\r\n" "Host: www.borked.com\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 200 OK\r\n" "Content-Length: 3\r\n\r\n" "foo"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "HEAD"; request1.url = GURL("http://www.borked.com/"); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response1 = trans1->GetResponseInfo(); ASSERT_TRUE(response1); ASSERT_TRUE(response1->headers); EXPECT_EQ(200, response1->headers->response_code()); EXPECT_TRUE(response1->headers->IsKeepAlive()); std::string response_data1; EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk()); EXPECT_EQ("", response_data1); // Deleting the transaction attempts to release the socket back into the // socket pool. trans1.reset(); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("http://www.borked.com/foo"); request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans2->Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response2 = trans2->GetResponseInfo(); ASSERT_TRUE(response2); ASSERT_TRUE(response2->headers); EXPECT_EQ(200, response2->headers->response_code()); std::string response_data2; EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk()); EXPECT_EQ("foo", response_data2); } TEST_F(HttpNetworkTransactionTest, KeepAliveWithUnusedData2) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.borked.com\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\n" "Connection: keep-alive\r\n" "Content-Length: 22\r\n\r\n" "This server is borked." "Bonus data!"), }; MockWrite data_writes2[] = { MockWrite("GET /foo HTTP/1.1\r\n" "Host: www.borked.com\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 200 OK\r\n" "Content-Length: 3\r\n\r\n" "foo"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("http://www.borked.com/"); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response1 = trans1->GetResponseInfo(); ASSERT_TRUE(response1); ASSERT_TRUE(response1->headers); EXPECT_EQ(200, response1->headers->response_code()); EXPECT_TRUE(response1->headers->IsKeepAlive()); std::string response_data1; EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk()); EXPECT_EQ("This server is borked.", response_data1); // Deleting the transaction attempts to release the socket back into the // socket pool. trans1.reset(); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("http://www.borked.com/foo"); request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans2->Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response2 = trans2->GetResponseInfo(); ASSERT_TRUE(response2); ASSERT_TRUE(response2->headers); EXPECT_EQ(200, response2->headers->response_code()); std::string response_data2; EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk()); EXPECT_EQ("foo", response_data2); } TEST_F(HttpNetworkTransactionTest, KeepAliveWithUnusedData3) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.borked.com\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\n" "Connection: keep-alive\r\n" "Transfer-Encoding: chunked\r\n\r\n"), MockRead("16\r\nThis server is borked.\r\n"), MockRead("0\r\n\r\nBonus data!"), }; MockWrite data_writes2[] = { MockWrite("GET /foo HTTP/1.1\r\n" "Host: www.borked.com\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 200 OK\r\n" "Content-Length: 3\r\n\r\n" "foo"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("http://www.borked.com/"); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response1 = trans1->GetResponseInfo(); ASSERT_TRUE(response1); ASSERT_TRUE(response1->headers); EXPECT_EQ(200, response1->headers->response_code()); EXPECT_TRUE(response1->headers->IsKeepAlive()); std::string response_data1; EXPECT_THAT(ReadTransaction(trans1.get(), &response_data1), IsOk()); EXPECT_EQ("This server is borked.", response_data1); // Deleting the transaction attempts to release the socket back into the // socket pool. trans1.reset(); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("http://www.borked.com/foo"); request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans2->Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response2 = trans2->GetResponseInfo(); ASSERT_TRUE(response2); ASSERT_TRUE(response2->headers); EXPECT_EQ(200, response2->headers->response_code()); std::string response_data2; EXPECT_THAT(ReadTransaction(trans2.get(), &response_data2), IsOk()); EXPECT_EQ("foo", response_data2); } // This is a little different from the others - it tests the case that the // HttpStreamParser doesn't know if there's extra data on a socket or not when // the HttpNetworkTransaction is torn down, because the response body hasn't // been read from yet, but the request goes through the HttpResponseBodyDrainer. TEST_F(HttpNetworkTransactionTest, KeepAliveWithUnusedData4) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.borked.com\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\n" "Connection: keep-alive\r\n" "Transfer-Encoding: chunked\r\n\r\n"), MockRead("16\r\nThis server is borked.\r\n"), MockRead("0\r\n\r\nBonus data!"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("http://www.borked.com/"); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response1 = trans->GetResponseInfo(); ASSERT_TRUE(response1); ASSERT_TRUE(response1->headers); EXPECT_EQ(200, response1->headers->response_code()); EXPECT_TRUE(response1->headers->IsKeepAlive()); // Deleting the transaction creates an HttpResponseBodyDrainer to read the // response body. trans.reset(); // Let the HttpResponseBodyDrainer drain the socket. It should determine the // socket can't be reused, rather than returning it to the socket pool. base::RunLoop().RunUntilIdle(); // There should be no idle sockets in the pool. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); } // Test the request-challenge-retry sequence for basic auth. // (basic auth is the easiest to mock, because it has no randomness). TEST_F(HttpNetworkTransactionTest, BasicAuth) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog log; session_deps_.net_log = &log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), // Give a couple authenticate options (only the middle one is actually // supported). MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), // Large content-length -- won't matter, as connection will be reset. MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite data_writes2[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info1; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info1)); TestLoadTimingNotReused(load_timing_info1, CONNECT_TIMING_HAS_DNS_TIMES); int64_t writes_size1 = CountWriteBytes(data_writes1); EXPECT_EQ(writes_size1, trans.GetTotalSentBytes()); int64_t reads_size1 = CountReadBytes(data_reads1); EXPECT_EQ(reads_size1, trans.GetTotalReceivedBytes()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info2)); TestLoadTimingNotReused(load_timing_info2, CONNECT_TIMING_HAS_DNS_TIMES); // The load timing after restart should have a new socket ID, and times after // those of the first load timing. EXPECT_LE(load_timing_info1.receive_headers_end, load_timing_info2.connect_timing.connect_start); EXPECT_NE(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id); int64_t writes_size2 = CountWriteBytes(data_writes2); EXPECT_EQ(writes_size1 + writes_size2, trans.GetTotalSentBytes()); int64_t reads_size2 = CountReadBytes(data_reads2); EXPECT_EQ(reads_size1 + reads_size2, trans.GetTotalReceivedBytes()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); } // Test the request-challenge-retry sequence for basic auth. // (basic auth is the easiest to mock, because it has no randomness). TEST_F(HttpNetworkTransactionTest, BasicAuthWithAddressChange) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog log; MockHostResolver* resolver = new MockHostResolver(); session_deps_.net_log = &log; session_deps_.host_resolver.reset(resolver); std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); resolver->rules()->ClearRules(); resolver->rules()->AddRule("www.example.org", "127.0.0.1"); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), // Give a couple authenticate options (only the middle one is actually // supported). MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), // Large content-length -- won't matter, as connection will be reset. MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite data_writes2[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; EXPECT_EQ(OK, callback1.GetResult(trans.Start(&request, callback1.callback(), NetLogWithSource()))); LoadTimingInfo load_timing_info1; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info1)); TestLoadTimingNotReused(load_timing_info1, CONNECT_TIMING_HAS_DNS_TIMES); int64_t writes_size1 = CountWriteBytes(data_writes1); EXPECT_EQ(writes_size1, trans.GetTotalSentBytes()); int64_t reads_size1 = CountReadBytes(data_reads1); EXPECT_EQ(reads_size1, trans.GetTotalReceivedBytes()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); IPEndPoint endpoint; EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint)); ASSERT_FALSE(endpoint.address().empty()); EXPECT_EQ("127.0.0.1:80", endpoint.ToString()); resolver->rules()->ClearRules(); resolver->rules()->AddRule("www.example.org", "127.0.0.2"); TestCompletionCallback callback2; EXPECT_EQ(OK, callback2.GetResult(trans.RestartWithAuth( AuthCredentials(kFoo, kBar), callback2.callback()))); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info2)); TestLoadTimingNotReused(load_timing_info2, CONNECT_TIMING_HAS_DNS_TIMES); // The load timing after restart should have a new socket ID, and times after // those of the first load timing. EXPECT_LE(load_timing_info1.receive_headers_end, load_timing_info2.connect_timing.connect_start); EXPECT_NE(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id); int64_t writes_size2 = CountWriteBytes(data_writes2); EXPECT_EQ(writes_size1 + writes_size2, trans.GetTotalSentBytes()); int64_t reads_size2 = CountReadBytes(data_reads2); EXPECT_EQ(reads_size1 + reads_size2, trans.GetTotalReceivedBytes()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint)); ASSERT_FALSE(endpoint.address().empty()); EXPECT_EQ("127.0.0.2:80", endpoint.ToString()); } // Test that, if the server requests auth indefinitely, HttpNetworkTransaction // will eventually give up. TEST_F(HttpNetworkTransactionTest, BasicAuthForever) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog log; session_deps_.net_log = &log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), // Give a couple authenticate options (only the middle one is actually // supported). MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), // Large content-length -- won't matter, as connection will be reset. MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite data_writes_restart[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = callback.GetResult( trans.Start(&request, callback.callback(), NetLogWithSource())); std::vector<std::unique_ptr<StaticSocketDataProvider>> data_restarts; for (int i = 0; i < 32; i++) { // Check the previous response was a 401. EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); data_restarts.push_back(std::make_unique<StaticSocketDataProvider>( data_reads, data_writes_restart)); session_deps_.socket_factory->AddSocketDataProvider( data_restarts.back().get()); rv = callback.GetResult(trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback())); } // After too many tries, the transaction should have given up. EXPECT_THAT(rv, IsError(ERR_TOO_MANY_RETRIES)); } TEST_F(HttpNetworkTransactionTest, DoNotSendAuth) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), // Large content-length -- won't matter, as connection will be reset. MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_EQ(0, rv); int64_t writes_size = CountWriteBytes(data_writes); EXPECT_EQ(writes_size, trans.GetTotalSentBytes()); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, trans.GetTotalReceivedBytes()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); } // Test the request-challenge-retry sequence for basic auth, over a keep-alive // connection. TEST_F(HttpNetworkTransactionTest, BasicAuthKeepAlive) { // On the second pass, the body read of the auth challenge is synchronous, so // IsConnectedAndIdle returns false. The socket should still be drained and // reused. See http://crbug.com/544255. for (int i = 0; i < 2; ++i) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog log; session_deps_.net_log = &log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes[] = { MockWrite(ASYNC, 0, "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite(ASYNC, 6, "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; MockRead data_reads[] = { MockRead(ASYNC, 1, "HTTP/1.1 401 Unauthorized\r\n"), MockRead(ASYNC, 2, "WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead(ASYNC, 3, "Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead(ASYNC, 4, "Content-Length: 14\r\n\r\n"), MockRead(i == 0 ? ASYNC : SYNCHRONOUS, 5, "Unauthorized\r\n"), // Lastly, the server responds with the actual content. MockRead(ASYNC, 7, "HTTP/1.1 200 OK\r\n"), MockRead(ASYNC, 8, "Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead(ASYNC, 9, "Content-Length: 5\r\n\r\n"), MockRead(ASYNC, 10, "Hello"), }; SequencedSocketData data(data_reads, data_writes); data.set_busy_before_sync_reads(true); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); ASSERT_THAT(callback1.GetResult(rv), IsOk()); LoadTimingInfo load_timing_info1; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info1)); TestLoadTimingNotReused(load_timing_info1, CONNECT_TIMING_HAS_DNS_TIMES); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); ASSERT_THAT(callback2.GetResult(rv), IsOk()); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info2)); TestLoadTimingReused(load_timing_info2); // The load timing after restart should have the same socket ID, and times // those of the first load timing. EXPECT_LE(load_timing_info1.receive_headers_end, load_timing_info2.send_start); EXPECT_EQ(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(5, response->headers->GetContentLength()); std::string response_data; EXPECT_THAT(ReadTransaction(&trans, &response_data), IsOk()); int64_t writes_size = CountWriteBytes(data_writes); EXPECT_EQ(writes_size, trans.GetTotalSentBytes()); int64_t reads_size = CountReadBytes(data_reads); EXPECT_EQ(reads_size, trans.GetTotalReceivedBytes()); } } // Test the request-challenge-retry sequence for basic auth, over a keep-alive // connection and with no response body to drain. TEST_F(HttpNetworkTransactionTest, BasicAuthKeepAliveNoBody) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 0\r\n\r\n"), // No response body. // Lastly, the server responds with the actual content. MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("hello"), }; // An incorrect reconnect would cause this to be read. MockRead data_reads2[] = { MockRead(SYNCHRONOUS, ERR_FAILED), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(5, response->headers->GetContentLength()); } // Test the request-challenge-retry sequence for basic auth, over a keep-alive // connection and with a large response body to drain. TEST_F(HttpNetworkTransactionTest, BasicAuthKeepAliveLargeBody) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Respond with 5 kb of response body. std::string large_body_string("Unauthorized"); large_body_string.append(5 * 1024, ' '); large_body_string.append("\r\n"); MockRead data_reads1[] = { MockRead("HTTP/1.1 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), // 5134 = 12 + 5 * 1024 + 2 MockRead("Content-Length: 5134\r\n\r\n"), MockRead(ASYNC, large_body_string.data(), large_body_string.size()), // Lastly, the server responds with the actual content. MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("hello"), }; // An incorrect reconnect would cause this to be read. MockRead data_reads2[] = { MockRead(SYNCHRONOUS, ERR_FAILED), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(5, response->headers->GetContentLength()); } // Test the request-challenge-retry sequence for basic auth, over a keep-alive // connection, but the server gets impatient and closes the connection. TEST_F(HttpNetworkTransactionTest, BasicAuthKeepAliveImpatientServer) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes1[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), // This simulates the seemingly successful write to a closed connection // if the bug is not fixed. MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 14\r\n\r\n"), // Tell MockTCPClientSocket to simulate the server closing the connection. MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), MockRead("Unauthorized\r\n"), MockRead(SYNCHRONOUS, OK), // The server closes the connection. }; // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite data_writes2[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads2[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead("hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(5, response->headers->GetContentLength()); } // Test the request-challenge-retry sequence for basic auth, over a connection // that requires a restart when setting up an SSL tunnel. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyNoKeepAliveHttp10) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); // when the no authentication data flag is set. request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a non-persistent // connection. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.0 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n\r\n"), }; // Since the first connection couldn't be reused, need to establish another // once given credentials. MockWrite data_writes2[] = { // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.0 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead(SYNCHRONOUS, "hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->headers->IsKeepAlive()); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 0) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); LoadTimingInfo load_timing_info; // CONNECT requests and responses are handled at the connect job level, so // the transaction does not yet have a connection. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info)); TestCompletionCallback callback2; rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(5, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); // The password prompt info should not be set. EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); trans.reset(); session->CloseAllConnections(); } // Test the request-challenge-retry sequence for basic auth, over a connection // that requires a restart when setting up an SSL tunnel. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyNoKeepAliveHttp11) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); // when the no authentication data flag is set. request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a non-persistent // connection. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Proxy-Connection: close\r\n\r\n"), }; MockWrite data_writes2[] = { // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead(SYNCHRONOUS, "hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->headers->IsKeepAlive()); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); LoadTimingInfo load_timing_info; // CONNECT requests and responses are handled at the connect job level, so // the transaction does not yet have a connection. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info)); TestCompletionCallback callback2; rv = trans->RestartWithAuth( AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(5, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); // The password prompt info should not be set. EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); trans.reset(); session->CloseAllConnections(); } // Test the request-challenge-retry sequence for basic auth, over a keep-alive // proxy connection with HTTP/1.0 responses, when setting up an SSL tunnel. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyKeepAliveHttp10) { // On the second pass, the body read of the auth challenge is synchronous, so // IsConnectedAndIdle returns false. The socket should still be drained and // reused. See http://crbug.com/544255. for (int i = 0; i < 2; ++i) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); // Ensure that proxy authentication is attempted even // when the no authentication data flag is set. request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed("myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite(ASYNC, 3, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJheg==\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. (Since it's HTTP/1.0, keep-alive has to be explicit.) MockRead data_reads1[] = { // No credentials. MockRead(ASYNC, 1, "HTTP/1.0 407 Proxy Authentication Required\r\n" "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n" "Proxy-Connection: keep-alive\r\n" "Content-Length: 10\r\n\r\n"), MockRead(i == 0 ? ASYNC : SYNCHRONOUS, 2, "0123456789"), // Wrong credentials (wrong password). MockRead(ASYNC, 4, "HTTP/1.0 407 Proxy Authentication Required\r\n" "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n" "Proxy-Connection: keep-alive\r\n" "Content-Length: 10\r\n\r\n"), // No response body because the test stops reading here. MockRead(SYNCHRONOUS, ERR_UNEXPECTED, 5), }; SequencedSocketData data1(data_reads1, data_writes1); data1.set_busy_before_sync_reads(true); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_EQ(10, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 0) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); TestCompletionCallback callback2; // Wrong password (should be "bar"). rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBaz), callback2.callback()); EXPECT_THAT(callback2.GetResult(rv), IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_EQ(10, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 0) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); // Flush the idle socket before the NetLog and HttpNetworkTransaction go // out of scope. session->CloseAllConnections(); } } // Test the request-challenge-retry sequence for basic auth, over a keep-alive // proxy connection with HTTP/1.1 responses, when setting up an SSL tunnel. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyKeepAliveHttp11) { // On the second pass, the body read of the auth challenge is synchronous, so // IsConnectedAndIdle returns false. The socket should still be drained and // reused. See http://crbug.com/544255. for (int i = 0; i < 2; ++i) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); // Ensure that proxy authentication is attempted even // when the no authentication data flag is set. request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed("myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite(ASYNC, 3, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJheg==\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. (Since it's HTTP/1.0, keep-alive has to be explicit.) MockRead data_reads1[] = { // No credentials. MockRead(ASYNC, 1, "HTTP/1.1 407 Proxy Authentication Required\r\n" "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n" "Content-Length: 10\r\n\r\n"), MockRead(i == 0 ? ASYNC : SYNCHRONOUS, 2, "0123456789"), // Wrong credentials (wrong password). MockRead(ASYNC, 4, "HTTP/1.1 407 Proxy Authentication Required\r\n" "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n" "Content-Length: 10\r\n\r\n"), // No response body because the test stops reading here. MockRead(SYNCHRONOUS, ERR_UNEXPECTED, 5), }; SequencedSocketData data1(data_reads1, data_writes1); data1.set_busy_before_sync_reads(true); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_EQ(10, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); EXPECT_FALSE(response->did_use_http_auth); TestCompletionCallback callback2; // Wrong password (should be "bar"). rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBaz), callback2.callback()); EXPECT_THAT(callback2.GetResult(rv), IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_EQ(10, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); EXPECT_TRUE(response->did_use_http_auth); // Flush the idle socket before the NetLog and HttpNetworkTransaction go // out of scope. session->CloseAllConnections(); } } // Test the request-challenge-retry sequence for basic auth, over a keep-alive // proxy connection with HTTP/1.1 responses, when setting up an SSL tunnel, in // the case the server sends extra data on the original socket, so it can't be // reused. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyKeepAliveExtraData) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); // when the no authentication data flag is set. request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent, but sends // extra data, so the socket cannot be reused. MockRead data_reads1[] = { // No credentials. MockRead(ASYNC, 1, "HTTP/1.1 407 Proxy Authentication Required\r\n" "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n" "Content-Length: 10\r\n\r\n"), MockRead(SYNCHRONOUS, 2, "0123456789"), MockRead(SYNCHRONOUS, 3, "I'm broken!"), }; MockWrite data_writes2[] = { // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), MockWrite(ASYNC, 2, "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead(ASYNC, 1, "HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead(ASYNC, 3, "HTTP/1.1 200 OK\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 5\r\n\r\n"), // No response body because the test stops reading here. MockRead(SYNCHRONOUS, ERR_UNEXPECTED, 4), }; SequencedSocketData data1(data_reads1, data_writes1); data1.set_busy_before_sync_reads(true); session_deps_.socket_factory->AddSocketDataProvider(&data1); SequencedSocketData data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); LoadTimingInfo load_timing_info; // CONNECT requests and responses are handled at the connect job level, so // the transaction does not yet have a connection. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info)); TestCompletionCallback callback2; rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(callback2.GetResult(rv), IsOk()); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(5, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); // The password prompt info should not be set. EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); trans.reset(); session->CloseAllConnections(); } // Test the case a proxy closes a socket while the challenge body is being // drained. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyKeepAliveHangupDuringBody) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); // Ensure that proxy authentication is attempted even // when the no authentication data flag is set. request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10\r\n\r\n"), MockRead("spam!"), // Server hands up in the middle of the body. MockRead(ASYNC, ERR_CONNECTION_CLOSED), }; MockWrite data_writes2[] = { // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead(SYNCHRONOUS, "hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); std::string body; EXPECT_THAT(ReadTransaction(&trans, &body), IsOk()); EXPECT_EQ("hello", body); } // Test that we don't read the response body when we fail to establish a tunnel, // even if the user cancels the proxy's auth attempt. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyCancelTunnel) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Since we have proxy, should try to establish tunnel. MockWrite data_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407. MockRead data_reads[] = { MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10\r\n\r\n"), MockRead("0123456789"), MockRead(SYNCHRONOUS, ERR_UNEXPECTED), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); // Flush the idle socket before the HttpNetworkTransaction goes out of scope. session->CloseAllConnections(); } // Test that we don't pass extraneous headers from the proxy's response to the // caller when the proxy responds to CONNECT with 407. TEST_F(HttpNetworkTransactionTest, SanitizeProxyAuthHeaders) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Since we have proxy, should try to establish tunnel. MockWrite data_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407. MockRead data_reads[] = { MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("X-Foo: bar\r\n"), MockRead("Set-Cookie: foo=bar\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_UNEXPECTED), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_FALSE(response->headers->HasHeader("X-Foo")); EXPECT_FALSE(response->headers->HasHeader("Set-Cookie")); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); // Flush the idle socket before the HttpNetworkTransaction goes out of scope. session->CloseAllConnections(); } // Test when a server (non-proxy) returns a 407 (proxy-authenticate). // The request should fail with ERR_UNEXPECTED_PROXY_AUTH. TEST_F(HttpNetworkTransactionTest, UnexpectedProxyAuth) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // We are using a DIRECT connection (i.e. no proxy) for this session. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 407 Proxy Auth required\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), // Large content-length -- won't matter, as connection will be reset. MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_UNEXPECTED_PROXY_AUTH)); } // Tests when an HTTPS server (non-proxy) returns a 407 (proxy-authentication) // through a non-authenticating proxy. The request should fail with // ERR_UNEXPECTED_PROXY_AUTH. // Note that it is impossible to detect if an HTTP server returns a 407 through // a non-authenticating proxy - there is nothing to indicate whether the // response came from the proxy or the server, so it is treated as if the proxy // issued the challenge. TEST_F(HttpNetworkTransactionTest, HttpsServerRequestsProxyAuthThroughProxy) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 407 Unauthorized\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_UNEXPECTED_PROXY_AUTH)); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); } // Test a proxy auth scheme that allows default credentials and a proxy server // that uses non-persistent connections. TEST_F(HttpNetworkTransactionTest, AuthAllowsDefaultCredentialsTunnelConnectionClose) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>(); auth_handler_factory->set_do_init_from_challenge(true); auto mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_PROXY); session_deps_.http_auth_handler_factory = std::move(auth_handler_factory); // Add NetLog just so can verify load timing information gets a NetLog ID. NetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a non-persistent // connection. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Mock\r\n"), MockRead("Proxy-Connection: close\r\n\r\n"), }; // Since the first connection couldn't be reused, need to establish another // once given credentials. MockWrite data_writes2[] = { // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.0 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead(SYNCHRONOUS, "hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_FALSE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(trans->IsReadyToRestartForAuth()); EXPECT_FALSE(response->auth_challenge.has_value()); LoadTimingInfo load_timing_info; // CONNECT requests and responses are handled at the connect job level, so // the transaction does not yet have a connection. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info)); rv = trans->RestartWithAuth(AuthCredentials(), callback.callback()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(5, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); // The password prompt info should not be set. EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); trans.reset(); session->CloseAllConnections(); } // Test a proxy auth scheme that allows default credentials and a proxy server // that hangs up when credentials are initially sent. TEST_F(HttpNetworkTransactionTest, AuthAllowsDefaultCredentialsTunnelServerClosesConnection) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>(); auth_handler_factory->set_do_init_from_challenge(true); auto mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_PROXY); session_deps_.http_auth_handler_factory = std::move(auth_handler_factory); // Add NetLog just so can verify load timing information gets a NetLog ID. NetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); // Should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a non-persistent // connection. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Mock\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED), }; // Since the first connection was closed, need to establish another once given // credentials. MockWrite data_writes2[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.0 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead(SYNCHRONOUS, "hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(trans->IsReadyToRestartForAuth()); EXPECT_FALSE(response->auth_challenge.has_value()); LoadTimingInfo load_timing_info; // CONNECT requests and responses are handled at the connect job level, so // the transaction does not yet have a connection. EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info)); rv = trans->RestartWithAuth(AuthCredentials(), callback.callback()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(5, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); // The password prompt info should not be set. EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); trans.reset(); session->CloseAllConnections(); } // Test a proxy auth scheme that allows default credentials and a proxy server // that hangs up when credentials are initially sent, and hangs up again when // they are retried. TEST_F(HttpNetworkTransactionTest, AuthAllowsDefaultCredentialsTunnelServerClosesConnectionTwice) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>(); auth_handler_factory->set_do_init_from_challenge(true); auto mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_PROXY); session_deps_.http_auth_handler_factory = std::move(auth_handler_factory); // Add NetLog just so can verify load timing information gets a NetLog ID. NetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); // Should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"), }; // The proxy responds to the connect with a 407, and then hangs up after the // second request is sent. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Content-Length: 0\r\n"), MockRead("Proxy-Connection: keep-alive\r\n"), MockRead("Proxy-Authenticate: Mock\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED), }; // HttpNetworkTransaction sees a reused connection that was closed with // ERR_CONNECTION_CLOSED, realized it might have been a race, so retries the // request. MockWrite data_writes2[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy, having had more than enough of us, just hangs up. MockRead data_reads2[] = { // No credentials. MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(trans->IsReadyToRestartForAuth()); EXPECT_FALSE(response->auth_challenge.has_value()); LoadTimingInfo load_timing_info; EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info)); rv = trans->RestartWithAuth(AuthCredentials(), callback.callback()); EXPECT_THAT(callback.GetResult(rv), IsError(ERR_EMPTY_RESPONSE)); trans.reset(); session->CloseAllConnections(); } // This test exercises an odd edge case where the proxy closes the connection // after the authentication handshake is complete. Presumably this technique is // used in lieu of returning a 403 or 5xx status code when the authentication // succeeds, but the user is not authorized to connect to the destination // server. There's no standard for what a proxy should do to indicate a blocked // site. TEST_F(HttpNetworkTransactionTest, AuthAllowsDefaultCredentialsTunnelConnectionClosesBeforeBody) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>(); auth_handler_factory->set_do_init_from_challenge(true); // Create two mock AuthHandlers. This is because the transaction gets retried // after the first ERR_CONNECTION_CLOSED since it's ambiguous whether there // was a real network error. // // The handlers support both default and explicit credentials. The retry // mentioned above should be able to reuse the default identity. Thus there // should never be a need to prompt for explicit credentials. auto mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); mock_handler->set_allows_explicit_credentials(true); mock_handler->set_connection_based(true); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_PROXY); mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); mock_handler->set_allows_explicit_credentials(true); mock_handler->set_connection_based(true); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_PROXY); session_deps_.http_auth_handler_factory = std::move(auth_handler_factory); NetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); // Data for both sockets. // // Writes are for the tunnel establishment attempts and the // authentication handshake. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"), MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"), }; // The server side of the authentication handshake. Note that the response to // the final CONNECT request is ERR_CONNECTION_CLOSED. MockRead data_reads1[] = { MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Content-Length: 0\r\n"), MockRead("Proxy-Connection: keep-alive\r\n"), MockRead("Proxy-Authenticate: Mock\r\n\r\n"), MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Content-Length: 0\r\n"), MockRead("Proxy-Connection: keep-alive\r\n"), MockRead("Proxy-Authenticate: Mock foo\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); // The second socket is for the reconnection attempt. Data is identical to the // first attempt. StaticSocketDataProvider data2(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data2); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); // Two rounds per handshake. After one retry, the error is propagated up the // stack. for (int i = 0; i < 4; ++i) { EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); ASSERT_TRUE(trans->IsReadyToRestartForAuth()); rv = trans->RestartWithAuth(AuthCredentials(), callback.callback()); } // One shall be the number thou shalt retry, and the number of the retrying // shall be one. Two shalt thou not retry, neither retry thou zero, excepting // that thou then proceed to one. Three is right out. Once the number one, // being the first number, be reached, then lobbest thou thy // ERR_CONNECTION_CLOSED towards they network transaction, who shall snuff it. EXPECT_EQ(ERR_CONNECTION_CLOSED, callback.GetResult(rv)); trans.reset(); session->CloseAllConnections(); } // Test a proxy auth scheme that allows default credentials and a proxy server // that hangs up when credentials are initially sent, and sends a challenge // again they are retried. TEST_F(HttpNetworkTransactionTest, AuthAllowsDefaultCredentialsTunnelServerChallengesTwice) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>(); auth_handler_factory->set_do_init_from_challenge(true); auto mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_PROXY); // Add another handler for the second challenge. It supports default // credentials, but they shouldn't be used, since they were already tried. mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_PROXY); session_deps_.http_auth_handler_factory = std::move(auth_handler_factory); // Add NetLog just so can verify load timing information gets a NetLog ID. NetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); // Should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a non-persistent // connection. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Mock\r\n"), MockRead("Proxy-Connection: close\r\n\r\n"), }; // Since the first connection was closed, need to establish another once given // credentials. MockWrite data_writes2[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Mock\r\n"), MockRead("Proxy-Connection: close\r\n\r\n"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(trans->IsReadyToRestartForAuth()); EXPECT_FALSE(response->auth_challenge.has_value()); LoadTimingInfo load_timing_info; EXPECT_FALSE(trans->GetLoadTimingInfo(&load_timing_info)); rv = trans->RestartWithAuth(AuthCredentials(), callback.callback()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_FALSE(trans->IsReadyToRestartForAuth()); EXPECT_TRUE(response->auth_challenge.has_value()); trans.reset(); session->CloseAllConnections(); } // A more nuanced test than GenerateAuthToken test which asserts that // ERR_INVALID_AUTH_CREDENTIALS does not cause the auth scheme to be // unnecessarily invalidated, and that if the server co-operates, the // authentication handshake can continue with the same scheme but with a // different identity. TEST_F(HttpNetworkTransactionTest, NonPermanentGenerateAuthTokenError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto auth_handler_factory = std::make_unique<HttpAuthHandlerMock::Factory>(); auth_handler_factory->set_do_init_from_challenge(true); // First handler. Uses default credentials, but barfs at generate auth token. auto mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); mock_handler->set_allows_explicit_credentials(true); mock_handler->set_connection_based(true); mock_handler->SetGenerateExpectation(true, ERR_INVALID_AUTH_CREDENTIALS); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_SERVER); // Add another handler for the second challenge. It supports default // credentials, but they shouldn't be used, since they were already tried. mock_handler = std::make_unique<HttpAuthHandlerMock>(); mock_handler->set_allows_default_credentials(true); mock_handler->set_allows_explicit_credentials(true); mock_handler->set_connection_based(true); auth_handler_factory->AddMockHandler(mock_handler.release(), HttpAuth::AUTH_SERVER); session_deps_.http_auth_handler_factory = std::move(auth_handler_factory); std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 401 Authentication Required\r\n" "WWW-Authenticate: Mock\r\n" "Connection: keep-alive\r\n\r\n"), }; // Identical to data_writes1[]. The AuthHandler encounters a // ERR_INVALID_AUTH_CREDENTIALS during the GenerateAuthToken stage, so the // transaction procceds without an authorization header. MockWrite data_writes2[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 401 Authentication Required\r\n" "WWW-Authenticate: Mock\r\n" "Connection: keep-alive\r\n\r\n"), }; MockWrite data_writes3[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: auth_token\r\n\r\n"), }; MockRead data_reads3[] = { MockRead("HTTP/1.1 200 OK\r\n" "Content-Length: 5\r\n" "Content-Type: text/plain\r\n" "Connection: keep-alive\r\n\r\n" "Hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); StaticSocketDataProvider data3(data_reads3, data_writes3); session_deps_.socket_factory->AddSocketDataProvider(&data3); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); // The following three tests assert that an authentication challenge was // received and that the stack is ready to respond to the challenge using // ambient credentials. EXPECT_EQ(401, response->headers->response_code()); EXPECT_TRUE(trans->IsReadyToRestartForAuth()); EXPECT_FALSE(response->auth_challenge.has_value()); rv = trans->RestartWithAuth(AuthCredentials(), callback.callback()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); // The following three tests assert that an authentication challenge was // received and that the stack needs explicit credentials before it is ready // to respond to the challenge. EXPECT_EQ(401, response->headers->response_code()); EXPECT_FALSE(trans->IsReadyToRestartForAuth()); EXPECT_TRUE(response->auth_challenge.has_value()); rv = trans->RestartWithAuth(AuthCredentials(), callback.callback()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(200, response->headers->response_code()); trans.reset(); session->CloseAllConnections(); } // Proxy resolver that returns a proxy with the same host and port for different // schemes, based on the path of the URL being requests. class SameProxyWithDifferentSchemesProxyResolver : public ProxyResolver { public: SameProxyWithDifferentSchemesProxyResolver() {} ~SameProxyWithDifferentSchemesProxyResolver() override {} static std::string ProxyHostPortPairAsString() { return "proxy.test:10000"; } static HostPortPair ProxyHostPortPair() { return HostPortPair::FromString(ProxyHostPortPairAsString()); } // ProxyResolver implementation. int GetProxyForURL(const GURL& url, ProxyInfo* results, CompletionOnceCallback callback, std::unique_ptr<Request>* request, const NetLogWithSource& /*net_log*/) override { *results = ProxyInfo(); results->set_traffic_annotation( MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS)); if (url.path() == "/socks4") { results->UsePacString("SOCKS " + ProxyHostPortPairAsString()); return OK; } if (url.path() == "/socks5") { results->UsePacString("SOCKS5 " + ProxyHostPortPairAsString()); return OK; } if (url.path() == "/http") { results->UsePacString("PROXY " + ProxyHostPortPairAsString()); return OK; } if (url.path() == "/https") { results->UsePacString("HTTPS " + ProxyHostPortPairAsString()); return OK; } if (url.path() == "/https_trusted") { results->UseProxyServer(ProxyServer(ProxyServer::SCHEME_HTTPS, ProxyHostPortPair(), true /* is_trusted_proxy */)); return OK; } NOTREACHED(); return ERR_NOT_IMPLEMENTED; } private: DISALLOW_COPY_AND_ASSIGN(SameProxyWithDifferentSchemesProxyResolver); }; class SameProxyWithDifferentSchemesProxyResolverFactory : public ProxyResolverFactory { public: SameProxyWithDifferentSchemesProxyResolverFactory() : ProxyResolverFactory(false) {} int CreateProxyResolver(const scoped_refptr<PacFileData>& pac_script, std::unique_ptr<ProxyResolver>* resolver, CompletionOnceCallback callback, std::unique_ptr<Request>* request) override { *resolver = std::make_unique<SameProxyWithDifferentSchemesProxyResolver>(); return OK; } private: DISALLOW_COPY_AND_ASSIGN(SameProxyWithDifferentSchemesProxyResolverFactory); }; // Check that when different proxy schemes are all applied to a proxy at the // same address, the connections are not grouped together. i.e., a request to // foo.com using proxy.com as an HTTPS proxy won't use the same socket as a // request to foo.com using proxy.com as an HTTP proxy. TEST_F(HttpNetworkTransactionTest, SameDestinationForDifferentProxyTypes) { session_deps_.proxy_resolution_service = std::make_unique<ProxyResolutionService>( std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation( ProxyConfig::CreateAutoDetect(), TRAFFIC_ANNOTATION_FOR_TESTS)), std::make_unique<SameProxyWithDifferentSchemesProxyResolverFactory>(), nullptr); std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); MockWrite socks_writes[] = { MockWrite(SYNCHRONOUS, kSOCKS4OkRequestLocalHostPort80, kSOCKS4OkRequestLocalHostPort80Length), MockWrite(SYNCHRONOUS, "GET /socks4 HTTP/1.1\r\n" "Host: test\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead socks_reads[] = { MockRead(SYNCHRONOUS, kSOCKS4OkReply, kSOCKS4OkReplyLength), MockRead("HTTP/1.0 200 OK\r\n" "Connection: keep-alive\r\n" "Content-Length: 15\r\n\r\n" "SOCKS4 Response"), }; StaticSocketDataProvider socks_data(socks_reads, socks_writes); session_deps_.socket_factory->AddSocketDataProvider(&socks_data); const char kSOCKS5Request[] = { 0x05, // Version 0x01, // Command (CONNECT) 0x00, // Reserved 0x03, // Address type (DOMAINNAME) 0x04, // Length of domain (4) 't', 'e', 's', 't', // Domain string 0x00, 0x50, // 16-bit port (80) }; MockWrite socks5_writes[] = { MockWrite(ASYNC, kSOCKS5GreetRequest, kSOCKS5GreetRequestLength), MockWrite(ASYNC, kSOCKS5Request, base::size(kSOCKS5Request)), MockWrite(SYNCHRONOUS, "GET /socks5 HTTP/1.1\r\n" "Host: test\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead socks5_reads[] = { MockRead(ASYNC, kSOCKS5GreetResponse, kSOCKS5GreetResponseLength), MockRead(ASYNC, kSOCKS5OkResponse, kSOCKS5OkResponseLength), MockRead("HTTP/1.0 200 OK\r\n" "Connection: keep-alive\r\n" "Content-Length: 15\r\n\r\n" "SOCKS5 Response"), }; StaticSocketDataProvider socks5_data(socks5_reads, socks5_writes); session_deps_.socket_factory->AddSocketDataProvider(&socks5_data); MockWrite http_writes[] = { MockWrite(SYNCHRONOUS, "GET http://test/http HTTP/1.1\r\n" "Host: test\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead http_reads[] = { MockRead("HTTP/1.1 200 OK\r\n" "Proxy-Connection: keep-alive\r\n" "Content-Length: 13\r\n\r\n" "HTTP Response"), }; StaticSocketDataProvider http_data(http_reads, http_writes); session_deps_.socket_factory->AddSocketDataProvider(&http_data); MockWrite https_writes[] = { MockWrite(SYNCHRONOUS, "GET http://test/https HTTP/1.1\r\n" "Host: test\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead https_reads[] = { MockRead("HTTP/1.1 200 OK\r\n" "Proxy-Connection: keep-alive\r\n" "Content-Length: 14\r\n\r\n" "HTTPS Response"), }; StaticSocketDataProvider https_data(https_reads, https_writes); session_deps_.socket_factory->AddSocketDataProvider(&https_data); SSLSocketDataProvider ssl(SYNCHRONOUS, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); MockWrite https_trusted_writes[] = { MockWrite(SYNCHRONOUS, "GET http://test/https_trusted HTTP/1.1\r\n" "Host: test\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead https_trusted_reads[] = { MockRead("HTTP/1.1 200 OK\r\n" "Proxy-Connection: keep-alive\r\n" "Content-Length: 22\r\n\r\n" "HTTPS Trusted Response"), }; StaticSocketDataProvider trusted_https_data(https_trusted_reads, https_trusted_writes); session_deps_.socket_factory->AddSocketDataProvider(&trusted_https_data); SSLSocketDataProvider ssl2(SYNCHRONOUS, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); struct TestCase { GURL url; std::string expected_response; // How many idle sockets there should be in the SOCKS 4/5 proxy socket pools // after the test. int expected_idle_socks4_sockets; int expected_idle_socks5_sockets; // How many idle sockets there should be in the HTTP/HTTPS proxy socket // pools after the test. int expected_idle_http_sockets; int expected_idle_https_sockets; // How many idle sockets there should be in the HTTPS proxy socket pool with // the ProxyServer's |is_trusted_proxy| bit set after the test. int expected_idle_trusted_https_sockets; } const kTestCases[] = { {GURL("http://test/socks4"), "SOCKS4 Response", 1, 0, 0, 0, 0}, {GURL("http://test/socks5"), "SOCKS5 Response", 1, 1, 0, 0, 0}, {GURL("http://test/http"), "HTTP Response", 1, 1, 1, 0, 0}, {GURL("http://test/https"), "HTTPS Response", 1, 1, 1, 1, 0}, {GURL("http://test/https_trusted"), "HTTPS Trusted Response", 1, 1, 1, 1, 1}, }; for (const auto& test_case : kTestCases) { HttpRequestInfo request; request.method = "GET"; request.url = test_case.url; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkTransaction> trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(200, response->headers->response_code()); std::string response_data; EXPECT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ(test_case.expected_response, response_data); // Return the socket to the socket pool, so can make sure it's not used for // the next requests. trans.reset(); base::RunLoop().RunUntilIdle(); // Check the number of idle sockets in the pool, to make sure that used // sockets are indeed being returned to the socket pool. If each request // doesn't return an idle socket to the pool, the test would incorrectly // pass. EXPECT_EQ(test_case.expected_idle_socks4_sockets, session ->GetSocketPool( HttpNetworkSession::NORMAL_SOCKET_POOL, ProxyServer(ProxyServer::SCHEME_SOCKS4, SameProxyWithDifferentSchemesProxyResolver:: ProxyHostPortPair())) ->IdleSocketCount()); EXPECT_EQ(test_case.expected_idle_socks5_sockets, session ->GetSocketPool( HttpNetworkSession::NORMAL_SOCKET_POOL, ProxyServer(ProxyServer::SCHEME_SOCKS5, SameProxyWithDifferentSchemesProxyResolver:: ProxyHostPortPair())) ->IdleSocketCount()); EXPECT_EQ(test_case.expected_idle_http_sockets, session ->GetSocketPool( HttpNetworkSession::NORMAL_SOCKET_POOL, ProxyServer(ProxyServer::SCHEME_HTTP, SameProxyWithDifferentSchemesProxyResolver:: ProxyHostPortPair())) ->IdleSocketCount()); EXPECT_EQ(test_case.expected_idle_https_sockets, session ->GetSocketPool( HttpNetworkSession::NORMAL_SOCKET_POOL, ProxyServer(ProxyServer::SCHEME_HTTPS, SameProxyWithDifferentSchemesProxyResolver:: ProxyHostPortPair())) ->IdleSocketCount()); EXPECT_EQ(test_case.expected_idle_trusted_https_sockets, session ->GetSocketPool( HttpNetworkSession::NORMAL_SOCKET_POOL, ProxyServer(ProxyServer::SCHEME_HTTPS, SameProxyWithDifferentSchemesProxyResolver:: ProxyHostPortPair(), true /* is_trusted_proxy */)) ->IdleSocketCount()); } } // Test the load timing for HTTPS requests with an HTTP proxy. TEST_F(HttpNetworkTransactionTest, HttpProxyLoadTimingNoPacTwoRequests) { HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/1"); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://www.example.org/2"); request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET /1 HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), MockWrite("GET /2 HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads1[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 2\r\n\r\n"), MockRead(SYNCHRONOUS, "22"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans1->Start(&request1, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response1 = trans1->GetResponseInfo(); ASSERT_TRUE(response1); EXPECT_TRUE(response1->proxy_server.is_http()); ASSERT_TRUE(response1->headers); EXPECT_EQ(1, response1->headers->GetContentLength()); LoadTimingInfo load_timing_info1; EXPECT_TRUE(trans1->GetLoadTimingInfo(&load_timing_info1)); TestLoadTimingNotReused(load_timing_info1, CONNECT_TIMING_HAS_SSL_TIMES); trans1.reset(); TestCompletionCallback callback2; auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans2->Start(&request2, callback2.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response2 = trans2->GetResponseInfo(); ASSERT_TRUE(response2); EXPECT_TRUE(response2->proxy_server.is_http()); ASSERT_TRUE(response2->headers); EXPECT_EQ(2, response2->headers->GetContentLength()); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans2->GetLoadTimingInfo(&load_timing_info2)); TestLoadTimingReused(load_timing_info2); EXPECT_EQ(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id); trans2.reset(); session->CloseAllConnections(); } // Test the load timing for HTTPS requests with an HTTP proxy and a PAC script. TEST_F(HttpNetworkTransactionTest, HttpProxyLoadTimingWithPacTwoRequests) { HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/1"); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://www.example.org/2"); request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET /1 HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), MockWrite("GET /2 HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads1[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 2\r\n\r\n"), MockRead(SYNCHRONOUS, "22"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans1->Start(&request1, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response1 = trans1->GetResponseInfo(); ASSERT_TRUE(response1); ASSERT_TRUE(response1->headers); EXPECT_EQ(1, response1->headers->GetContentLength()); LoadTimingInfo load_timing_info1; EXPECT_TRUE(trans1->GetLoadTimingInfo(&load_timing_info1)); TestLoadTimingNotReusedWithPac(load_timing_info1, CONNECT_TIMING_HAS_SSL_TIMES); trans1.reset(); TestCompletionCallback callback2; auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans2->Start(&request2, callback2.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response2 = trans2->GetResponseInfo(); ASSERT_TRUE(response2); ASSERT_TRUE(response2->headers); EXPECT_EQ(2, response2->headers->GetContentLength()); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans2->GetLoadTimingInfo(&load_timing_info2)); TestLoadTimingReusedWithPac(load_timing_info2); EXPECT_EQ(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id); trans2.reset(); session->CloseAllConnections(); } // Test a simple get through an HTTPS Proxy. TEST_F(HttpNetworkTransactionTest, HttpsProxyGet) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should use full url MockWrite data_writes1[] = { MockWrite( "GET http://www.example.org/ HTTP/1.1\r\n" "Host: www.example.org\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->proxy_server.is_https()); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(100, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); // The password prompt info should not be set. EXPECT_FALSE(response->auth_challenge.has_value()); } // Test a SPDY get through an HTTPS Proxy. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyGet) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // fetch http://www.example.org/ via SPDY spdy::SpdySerializedFrame req( spdy_util_.ConstructSpdyGet("http://www.example.org/", 1, LOWEST)); MockWrite spdy_writes[] = {CreateMockWrite(req, 0)}; spdy::SpdySerializedFrame resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->proxy_server.is_https()); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ(kUploadData, response_data); } // Verifies that a session which races and wins against the owning transaction // (completing prior to host resolution), doesn't fail the transaction. // Regression test for crbug.com/334413. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyGetWithSessionRace) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure SPDY proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Fetch http://www.example.org/ through the SPDY proxy. spdy::SpdySerializedFrame req( spdy_util_.ConstructSpdyGet("http://www.example.org/", 1, LOWEST)); MockWrite spdy_writes[] = {CreateMockWrite(req, 0)}; spdy::SpdySerializedFrame resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Stall the hostname resolution begun by the transaction. session_deps_.host_resolver->set_ondemand_mode(true); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Race a session to the proxy, which completes first. session_deps_.host_resolver->set_ondemand_mode(false); SpdySessionKey key(HostPortPair("proxy", 70), ProxyServer::Direct(), PRIVACY_MODE_DISABLED, SpdySessionKey::IsProxySession::kTrue, SocketTag()); base::WeakPtr<SpdySession> spdy_session = CreateSpdySession(session.get(), key, log.bound()); // Unstall the resolution begun by the transaction. session_deps_.host_resolver->set_ondemand_mode(true); session_deps_.host_resolver->ResolveAllPending(); EXPECT_FALSE(callback1.have_result()); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ(kUploadData, response_data); } // Test a SPDY get through an HTTPS Proxy. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyGetWithProxyAuth) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // The first request will be a bare GET, the second request will be a // GET with a Proxy-Authorization header. spdy_util_.set_default_url(request.url); spdy::SpdySerializedFrame req_get( spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); spdy_util_.UpdateWithStreamDestruction(1); const char* const kExtraAuthorizationHeaders[] = { "proxy-authorization", "Basic Zm9vOmJhcg==" }; spdy::SpdySerializedFrame req_get_authorization(spdy_util_.ConstructSpdyGet( kExtraAuthorizationHeaders, base::size(kExtraAuthorizationHeaders) / 2, 3, LOWEST)); MockWrite spdy_writes[] = { CreateMockWrite(req_get, 0), CreateMockWrite(req_get_authorization, 3), }; // The first response is a 407 proxy authentication challenge, and the second // response will be a 200 response since the second request includes a valid // Authorization header. const char* const kExtraAuthenticationHeaders[] = { "proxy-authenticate", "Basic realm=\"MyRealm1\"" }; spdy::SpdySerializedFrame resp_authentication( spdy_util_.ConstructSpdyReplyError( "407", kExtraAuthenticationHeaders, base::size(kExtraAuthenticationHeaders) / 2, 1)); spdy::SpdySerializedFrame body_authentication( spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame resp_data( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); spdy::SpdySerializedFrame body_data( spdy_util_.ConstructSpdyDataFrame(3, true)); MockRead spdy_reads[] = { CreateMockRead(resp_authentication, 1), CreateMockRead(body_authentication, 2, SYNCHRONOUS), CreateMockRead(resp_data, 4), CreateMockRead(body_data, 5), MockRead(ASYNC, 0, 6), }; SequencedSocketData data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* const response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* const response_restart = trans.GetResponseInfo(); ASSERT_TRUE(response_restart); ASSERT_TRUE(response_restart->headers); EXPECT_EQ(200, response_restart->headers->response_code()); // The password prompt info should not be set. EXPECT_FALSE(response_restart->auth_challenge.has_value()); } // Test a SPDY CONNECT through an HTTPS Proxy to an HTTPS (non-SPDY) Server. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyConnectHttps) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // CONNECT to www.example.org:443 via SPDY spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); // fetch https://www.example.org/ via HTTP const char get[] = "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get( spdy_util_.ConstructSpdyDataFrame(1, get, false)); spdy::SpdySerializedFrame conn_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); const char resp[] = "HTTP/1.1 200 OK\r\n" "Content-Length: 10\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get_resp( spdy_util_.ConstructSpdyDataFrame(1, resp, false)); spdy::SpdySerializedFrame wrapped_body( spdy_util_.ConstructSpdyDataFrame(1, "1234567890", false)); spdy::SpdySerializedFrame window_update( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp.size())); MockWrite spdy_writes[] = { CreateMockWrite(connect, 0), CreateMockWrite(wrapped_get, 2), CreateMockWrite(window_update, 6), }; MockRead spdy_reads[] = { CreateMockRead(conn_resp, 1, ASYNC), CreateMockRead(wrapped_get_resp, 3, ASYNC), CreateMockRead(wrapped_body, 4, ASYNC), CreateMockRead(wrapped_body, 5, ASYNC), MockRead(ASYNC, 0, 7), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); ASSERT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("1234567890", response_data); } // Test a SPDY CONNECT through an HTTPS Proxy to a SPDY server. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyConnectSpdy) { SpdyTestUtil spdy_util_wrapped; HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // CONNECT to www.example.org:443 via SPDY spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); // fetch https://www.example.org/ via SPDY const char kMyUrl[] = "https://www.example.org/"; spdy::SpdySerializedFrame get( spdy_util_wrapped.ConstructSpdyGet(kMyUrl, 1, LOWEST)); spdy::SpdySerializedFrame wrapped_get( spdy_util_.ConstructWrappedSpdyFrame(get, 1)); spdy::SpdySerializedFrame conn_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame get_resp( spdy_util_wrapped.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame wrapped_get_resp( spdy_util_.ConstructWrappedSpdyFrame(get_resp, 1)); spdy::SpdySerializedFrame body( spdy_util_wrapped.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame wrapped_body( spdy_util_.ConstructWrappedSpdyFrame(body, 1)); spdy::SpdySerializedFrame window_update_get_resp( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp.size())); spdy::SpdySerializedFrame window_update_body( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_body.size())); MockWrite spdy_writes[] = { CreateMockWrite(connect, 0), CreateMockWrite(wrapped_get, 2), CreateMockWrite(window_update_get_resp, 6), CreateMockWrite(window_update_body, 7), }; MockRead spdy_reads[] = { CreateMockRead(conn_resp, 1, ASYNC), MockRead(ASYNC, ERR_IO_PENDING, 3), CreateMockRead(wrapped_get_resp, 4, ASYNC), CreateMockRead(wrapped_body, 5, ASYNC), MockRead(ASYNC, 0, 8), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); SSLSocketDataProvider ssl2(ASYNC, OK); ssl2.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Allow the SpdyProxyClientSocket's write callback to complete. base::RunLoop().RunUntilIdle(); // Now allow the read of the response to complete. spdy_data.Resume(); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ(kUploadData, response_data); } // Test a SPDY CONNECT failure through an HTTPS Proxy. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyConnectFailure) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // CONNECT to www.example.org:443 via SPDY spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); spdy::SpdySerializedFrame get( spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL)); MockWrite spdy_writes[] = { CreateMockWrite(connect, 0), CreateMockWrite(get, 2), }; spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyReplyError(1)); spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { CreateMockRead(resp, 1, ASYNC), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); SSLSocketDataProvider ssl2(ASYNC, OK); ssl2.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); // TODO(juliatuttle): Anything else to check here? } // Test the case where a proxied H2 session doesn't exist when an auth challenge // is observed, but does exist by the time auth credentials are provided. // Proxy-Connection: Close is used so that there's a second DNS lookup, which is // what causes the existing H2 session to be noticed and reused. TEST_F(HttpNetworkTransactionTest, ProxiedH2SessionAppearsDuringAuth) { ProxyConfig proxy_config; proxy_config.set_auto_detect(true); proxy_config.set_pac_url(GURL("http://fooproxyurl")); CapturingProxyResolver capturing_proxy_resolver; capturing_proxy_resolver.set_proxy_server( ProxyServer(ProxyServer::SCHEME_HTTP, HostPortPair("myproxy", 70))); session_deps_.proxy_resolution_service = std::make_unique<ProxyResolutionService>( std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation( proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)), std::make_unique<CapturingProxyResolverFactory>( &capturing_proxy_resolver), nullptr); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); const char kMyUrl[] = "https://www.example.org/"; spdy::SpdySerializedFrame get(spdy_util_.ConstructSpdyGet(kMyUrl, 1, LOWEST)); spdy::SpdySerializedFrame get_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body(spdy_util_.ConstructSpdyDataFrame(1, true)); spdy_util_.UpdateWithStreamDestruction(1); spdy::SpdySerializedFrame get2( spdy_util_.ConstructSpdyGet(kMyUrl, 3, LOWEST)); spdy::SpdySerializedFrame get_resp2( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true)); MockWrite auth_challenge_writes[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead auth_challenge_reads[] = { MockRead(ASYNC, 1, "HTTP/1.1 407 Authentication Required\r\n" "Content-Length: 0\r\n" "Proxy-Connection: close\r\n" "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n\r\n"), }; MockWrite spdy_writes[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), CreateMockWrite(get, 2), CreateMockWrite(get2, 5), }; MockRead spdy_reads[] = { MockRead(ASYNC, 1, "HTTP/1.1 200 OK\r\n\r\n"), CreateMockRead(get_resp, 3, ASYNC), CreateMockRead(body, 4, ASYNC), CreateMockRead(get_resp2, 6, ASYNC), CreateMockRead(body2, 7, ASYNC), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 8), }; SequencedSocketData auth_challenge1(auth_challenge_reads, auth_challenge_writes); session_deps_.socket_factory->AddSocketDataProvider(&auth_challenge1); SequencedSocketData auth_challenge2(auth_challenge_reads, auth_challenge_writes); session_deps_.socket_factory->AddSocketDataProvider(&auth_challenge2); SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; std::string response_data; // Run first request until an auth challenge is observed. HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL(kMyUrl); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(LOWEST, session.get()); int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); // Run second request until an auth challenge is observed. HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL(kMyUrl); request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(LOWEST, session.get()); rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans2.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); // Now provide credentials for the first request, and wait for it to complete. rv = trans1.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback()); rv = callback.GetResult(rv); EXPECT_THAT(rv, IsOk()); response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); EXPECT_EQ(kUploadData, response_data); // Now provide credentials for the second request. It should notice the // existing session, and reuse it. rv = trans2.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans2.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); EXPECT_EQ(kUploadData, response_data); } // Test load timing in the case of two HTTPS (non-SPDY) requests through a SPDY // HTTPS Proxy to different servers. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyConnectHttpsLoadTimingTwoRequestsTwoServers) { // Configure against https proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session( SpdySessionDependencies::SpdyCreateSession(&session_deps_)); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://mail.example.org/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // CONNECT to www.example.org:443 via SPDY. spdy::SpdySerializedFrame connect1(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); spdy::SpdySerializedFrame conn_resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); // Fetch https://www.example.org/ via HTTP. const char get1[] = "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get1( spdy_util_.ConstructSpdyDataFrame(1, get1, false)); const char resp1[] = "HTTP/1.1 200 OK\r\n" "Content-Length: 1\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get_resp1( spdy_util_.ConstructSpdyDataFrame(1, resp1, false)); spdy::SpdySerializedFrame wrapped_body1( spdy_util_.ConstructSpdyDataFrame(1, "1", false)); spdy::SpdySerializedFrame window_update( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp1.size())); // CONNECT to mail.example.org:443 via SPDY. spdy::SpdyHeaderBlock connect2_block; connect2_block[spdy::kHttp2MethodHeader] = "CONNECT"; connect2_block[spdy::kHttp2AuthorityHeader] = "mail.example.org:443"; spdy::SpdySerializedFrame connect2(spdy_util_.ConstructSpdyHeaders( 3, std::move(connect2_block), HttpProxyConnectJob::kH2QuicTunnelPriority, false)); spdy::SpdySerializedFrame conn_resp2( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); // Fetch https://mail.example.org/ via HTTP. const char get2[] = "GET / HTTP/1.1\r\n" "Host: mail.example.org\r\n" "Connection: keep-alive\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get2( spdy_util_.ConstructSpdyDataFrame(3, get2, false)); const char resp2[] = "HTTP/1.1 200 OK\r\n" "Content-Length: 2\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get_resp2( spdy_util_.ConstructSpdyDataFrame(3, resp2, false)); spdy::SpdySerializedFrame wrapped_body2( spdy_util_.ConstructSpdyDataFrame(3, "22", false)); MockWrite spdy_writes[] = { CreateMockWrite(connect1, 0), CreateMockWrite(wrapped_get1, 2), CreateMockWrite(connect2, 5), CreateMockWrite(wrapped_get2, 7), }; MockRead spdy_reads[] = { CreateMockRead(conn_resp1, 1, ASYNC), CreateMockRead(wrapped_get_resp1, 3, ASYNC), CreateMockRead(wrapped_body1, 4, ASYNC), CreateMockRead(conn_resp2, 6, ASYNC), CreateMockRead(wrapped_get_resp2, 8, ASYNC), CreateMockRead(wrapped_body2, 9, ASYNC), MockRead(ASYNC, 0, 10), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); SSLSocketDataProvider ssl3(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3); TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(256); rv = trans.Read(buf.get(), 256, callback.callback()); EXPECT_EQ(1, callback.GetResult(rv)); HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans2.GetLoadTimingInfo(&load_timing_info2)); // Even though the SPDY connection is reused, a new tunnelled connection has // to be created, so the socket's load timing looks like a fresh connection. TestLoadTimingNotReused(load_timing_info2, CONNECT_TIMING_HAS_SSL_TIMES); // The requests should have different IDs, since they each are using their own // separate stream. EXPECT_NE(load_timing_info.socket_log_id, load_timing_info2.socket_log_id); rv = trans2.Read(buf.get(), 256, callback.callback()); EXPECT_EQ(2, callback.GetResult(rv)); } // Test load timing in the case of two HTTPS (non-SPDY) requests through a SPDY // HTTPS Proxy to the same server. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyConnectHttpsLoadTimingTwoRequestsSameServer) { // Configure against https proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session( SpdySessionDependencies::SpdyCreateSession(&session_deps_)); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://www.example.org/2"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // CONNECT to www.example.org:443 via SPDY. spdy::SpdySerializedFrame connect1(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); spdy::SpdySerializedFrame conn_resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); // Fetch https://www.example.org/ via HTTP. const char get1[] = "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get1( spdy_util_.ConstructSpdyDataFrame(1, get1, false)); const char resp1[] = "HTTP/1.1 200 OK\r\n" "Content-Length: 1\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get_resp1( spdy_util_.ConstructSpdyDataFrame(1, resp1, false)); spdy::SpdySerializedFrame wrapped_body1( spdy_util_.ConstructSpdyDataFrame(1, "1", false)); spdy::SpdySerializedFrame window_update( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp1.size())); // Fetch https://www.example.org/2 via HTTP. const char get2[] = "GET /2 HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get2( spdy_util_.ConstructSpdyDataFrame(1, get2, false)); const char resp2[] = "HTTP/1.1 200 OK\r\n" "Content-Length: 2\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get_resp2( spdy_util_.ConstructSpdyDataFrame(1, resp2, false)); spdy::SpdySerializedFrame wrapped_body2( spdy_util_.ConstructSpdyDataFrame(1, "22", false)); MockWrite spdy_writes[] = { CreateMockWrite(connect1, 0), CreateMockWrite(wrapped_get1, 2), CreateMockWrite(wrapped_get2, 5), }; MockRead spdy_reads[] = { CreateMockRead(conn_resp1, 1, ASYNC), CreateMockRead(wrapped_get_resp1, 3, ASYNC), CreateMockRead(wrapped_body1, 4, SYNCHRONOUS), CreateMockRead(wrapped_get_resp2, 6, ASYNC), CreateMockRead(wrapped_body2, 7, SYNCHRONOUS), MockRead(ASYNC, 0, 8), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(256); EXPECT_EQ(1, trans->Read(buf.get(), 256, callback.callback())); trans.reset(); auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans2->Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans2->GetLoadTimingInfo(&load_timing_info2)); TestLoadTimingReused(load_timing_info2); // The requests should have the same ID. EXPECT_EQ(load_timing_info.socket_log_id, load_timing_info2.socket_log_id); EXPECT_EQ(2, trans2->Read(buf.get(), 256, callback.callback())); } // Test load timing in the case of of two HTTP requests through a SPDY HTTPS // Proxy to different servers. TEST_F(HttpNetworkTransactionTest, HttpsProxySpdyLoadTimingTwoHttpRequests) { // Configure against https proxy server "proxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session( SpdySessionDependencies::SpdyCreateSession(&session_deps_)); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("http://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("http://mail.example.org/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // http://www.example.org/ spdy::SpdyHeaderBlock headers( spdy_util_.ConstructGetHeaderBlockForProxy("http://www.example.org/")); spdy::SpdySerializedFrame get1( spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true)); spdy::SpdySerializedFrame get_resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body1( spdy_util_.ConstructSpdyDataFrame(1, "1", true)); spdy_util_.UpdateWithStreamDestruction(1); // http://mail.example.org/ spdy::SpdyHeaderBlock headers2( spdy_util_.ConstructGetHeaderBlockForProxy("http://mail.example.org/")); spdy::SpdySerializedFrame get2( spdy_util_.ConstructSpdyHeaders(3, std::move(headers2), LOWEST, true)); spdy::SpdySerializedFrame get_resp2( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); spdy::SpdySerializedFrame body2( spdy_util_.ConstructSpdyDataFrame(3, "22", true)); MockWrite spdy_writes[] = { CreateMockWrite(get1, 0), CreateMockWrite(get2, 3), }; MockRead spdy_reads[] = { CreateMockRead(get_resp1, 1, ASYNC), CreateMockRead(body1, 2, ASYNC), CreateMockRead(get_resp2, 4, ASYNC), CreateMockRead(body2, 5, ASYNC), MockRead(ASYNC, 0, 6), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); std::string response_data; scoped_refptr<IOBuffer> buf = base::MakeRefCounted<IOBuffer>(256); rv = trans->Read(buf.get(), 256, callback.callback()); EXPECT_EQ(1, callback.GetResult(rv)); // Delete the first request, so the second one can reuse the socket. trans.reset(); HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans2.GetLoadTimingInfo(&load_timing_info2)); TestLoadTimingReused(load_timing_info2); // The requests should have the same ID. EXPECT_EQ(load_timing_info.socket_log_id, load_timing_info2.socket_log_id); rv = trans2.Read(buf.get(), 256, callback.callback()); EXPECT_EQ(2, callback.GetResult(rv)); } // Test that an HTTP/2 CONNECT through an HTTPS Proxy to a HTTP/2 server and a // direct (non-proxied) request to the proxy server are not pooled, as that // would break socket pool isolation. TEST_F(HttpNetworkTransactionTest, SpdyProxyIsolation1) { ProxyConfig proxy_config; proxy_config.set_auto_detect(true); proxy_config.set_pac_url(GURL("http://fooproxyurl")); CapturingProxyResolver capturing_proxy_resolver; session_deps_.proxy_resolution_service = std::make_unique<ProxyResolutionService>( std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation( proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)), std::make_unique<CapturingProxyResolverFactory>( &capturing_proxy_resolver), nullptr); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); SpdyTestUtil spdy_util1; // CONNECT to www.example.org:443 via HTTP/2. spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); // fetch https://www.example.org/ via HTTP/2. const char kMyUrl[] = "https://www.example.org/"; spdy::SpdySerializedFrame get(spdy_util1.ConstructSpdyGet(kMyUrl, 1, LOWEST)); spdy::SpdySerializedFrame wrapped_get( spdy_util_.ConstructWrappedSpdyFrame(get, 1)); spdy::SpdySerializedFrame conn_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame get_resp( spdy_util1.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame wrapped_get_resp( spdy_util_.ConstructWrappedSpdyFrame(get_resp, 1)); spdy::SpdySerializedFrame body(spdy_util1.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame wrapped_body( spdy_util_.ConstructWrappedSpdyFrame(body, 1)); spdy::SpdySerializedFrame window_update_get_resp( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp.size())); spdy::SpdySerializedFrame window_update_body( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_body.size())); MockWrite spdy_writes1[] = { CreateMockWrite(connect, 0), CreateMockWrite(wrapped_get, 2), CreateMockWrite(window_update_get_resp, 6), CreateMockWrite(window_update_body, 7), }; MockRead spdy_reads1[] = { CreateMockRead(conn_resp, 1, ASYNC), MockRead(ASYNC, ERR_IO_PENDING, 3), CreateMockRead(wrapped_get_resp, 4, ASYNC), CreateMockRead(wrapped_body, 5, ASYNC), MockRead(ASYNC, 0, 8), }; SequencedSocketData spdy_data1(spdy_reads1, spdy_writes1); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data1); // Fetch https://proxy:70/ via HTTP/2. Needs a new SpdyTestUtil, since it uses // a new pipe. SpdyTestUtil spdy_util2; spdy::SpdySerializedFrame req( spdy_util2.ConstructSpdyGet("https://proxy:70/", 1, LOWEST)); MockWrite spdy_writes2[] = {CreateMockWrite(req, 0)}; spdy::SpdySerializedFrame resp( spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util2.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads2[] = { CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data2(spdy_reads2, spdy_writes2); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data2); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); SSLSocketDataProvider ssl2(ASYNC, OK); ssl2.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); SSLSocketDataProvider ssl3(ASYNC, OK); ssl3.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3); TestCompletionCallback callback; std::string response_data; // Make a request using proxy:70 as a HTTP/2 proxy. capturing_proxy_resolver.set_proxy_server( ProxyServer(ProxyServer::SCHEME_HTTPS, HostPortPair("proxy", 70))); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(LOWEST, session.get()); int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Allow the SpdyProxyClientSocket's write callback to complete. base::RunLoop().RunUntilIdle(); // Now allow the read of the response to complete. spdy_data1.Resume(); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); EXPECT_EQ(kUploadData, response_data); RunUntilIdle(); // Make a direct HTTP/2 request to proxy:70. capturing_proxy_resolver.set_proxy_server(ProxyServer::Direct()); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://proxy:70/"); request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(LOWEST, session.get()); EXPECT_THAT(callback.GetResult(trans2.Start(&request2, callback.callback(), NetLogWithSource())), IsOk()); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); } // Same as above, but reverse request order, since the code to check for an // existing session is different for tunnels and direct connections. TEST_F(HttpNetworkTransactionTest, SpdyProxyIsolation2) { // Configure against https proxy server "myproxy:80". ProxyConfig proxy_config; proxy_config.set_auto_detect(true); proxy_config.set_pac_url(GURL("http://fooproxyurl")); CapturingProxyResolver capturing_proxy_resolver; session_deps_.proxy_resolution_service = std::make_unique<ProxyResolutionService>( std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation( proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)), std::make_unique<CapturingProxyResolverFactory>( &capturing_proxy_resolver), nullptr); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Fetch https://proxy:70/ via HTTP/2. SpdyTestUtil spdy_util1; spdy::SpdySerializedFrame req( spdy_util1.ConstructSpdyGet("https://proxy:70/", 1, LOWEST)); MockWrite spdy_writes1[] = {CreateMockWrite(req, 0)}; spdy::SpdySerializedFrame resp( spdy_util1.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util1.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads1[] = { CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data1(spdy_reads1, spdy_writes1); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data1); SpdyTestUtil spdy_util2; // CONNECT to www.example.org:443 via HTTP/2. spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); // fetch https://www.example.org/ via HTTP/2. const char kMyUrl[] = "https://www.example.org/"; spdy::SpdySerializedFrame get(spdy_util2.ConstructSpdyGet(kMyUrl, 1, LOWEST)); spdy::SpdySerializedFrame wrapped_get( spdy_util_.ConstructWrappedSpdyFrame(get, 1)); spdy::SpdySerializedFrame conn_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame get_resp( spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame wrapped_get_resp( spdy_util_.ConstructWrappedSpdyFrame(get_resp, 1)); spdy::SpdySerializedFrame body(spdy_util2.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame wrapped_body( spdy_util_.ConstructWrappedSpdyFrame(body, 1)); spdy::SpdySerializedFrame window_update_get_resp( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_get_resp.size())); spdy::SpdySerializedFrame window_update_body( spdy_util_.ConstructSpdyWindowUpdate(1, wrapped_body.size())); MockWrite spdy_writes2[] = { CreateMockWrite(connect, 0), CreateMockWrite(wrapped_get, 2), CreateMockWrite(window_update_get_resp, 6), CreateMockWrite(window_update_body, 7), }; MockRead spdy_reads2[] = { CreateMockRead(conn_resp, 1, ASYNC), MockRead(ASYNC, ERR_IO_PENDING, 3), CreateMockRead(wrapped_get_resp, 4, ASYNC), CreateMockRead(wrapped_body, 5, ASYNC), MockRead(ASYNC, 0, 8), }; SequencedSocketData spdy_data2(spdy_reads2, spdy_writes2); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data2); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); SSLSocketDataProvider ssl2(ASYNC, OK); ssl2.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); SSLSocketDataProvider ssl3(ASYNC, OK); ssl3.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3); TestCompletionCallback callback; std::string response_data; // Make a direct HTTP/2 request to proxy:70. capturing_proxy_resolver.set_proxy_server(ProxyServer::Direct()); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://proxy:70/"); request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(LOWEST, session.get()); EXPECT_THAT(callback.GetResult(trans1.Start(&request1, callback.callback(), NetLogWithSource())), IsOk()); ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); RunUntilIdle(); // Make a request using proxy:70 as a HTTP/2 proxy. capturing_proxy_resolver.set_proxy_server( ProxyServer(ProxyServer::SCHEME_HTTPS, HostPortPair("proxy", 70))); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://www.example.org/"); request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(LOWEST, session.get()); int rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Allow the SpdyProxyClientSocket's write callback to complete. base::RunLoop().RunUntilIdle(); // Now allow the read of the response to complete. spdy_data2.Resume(); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response2 = trans2.GetResponseInfo(); ASSERT_TRUE(response2); ASSERT_TRUE(response2->headers); EXPECT_EQ("HTTP/1.1 200", response2->headers->GetStatusLine()); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); EXPECT_EQ(kUploadData, response_data); } // Test the challenge-response-retry sequence through an HTTPS Proxy TEST_F(HttpNetworkTransactionTest, HttpsProxyAuthRetry) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); // when the no authentication data flag is set. request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should use full url MockWrite data_writes1[] = { MockWrite("GET http://www.example.org/ HTTP/1.1\r\n" "Host: www.example.org\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("GET http://www.example.org/ HTTP/1.1\r\n" "Host: www.example.org\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // The proxy responds to the GET with a 407, using a persistent // connection. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Proxy-Connection: keep-alive\r\n"), MockRead("Content-Length: 0\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge)); EXPECT_FALSE(response->did_use_http_auth); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); load_timing_info = LoadTimingInfo(); EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); // Retrying with HTTP AUTH is considered to be reusing a socket. TestLoadTimingReused(load_timing_info); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(100, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(response->did_use_http_auth); // The password prompt info should not be set. EXPECT_FALSE(response->auth_challenge.has_value()); } void HttpNetworkTransactionTest::ConnectStatusHelperWithExpectedStatus( const MockRead& status, int expected_status) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. MockWrite data_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { status, MockRead("Content-Length: 10\r\n\r\n"), // No response body because the test stops reading here. MockRead(SYNCHRONOUS, ERR_UNEXPECTED), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_EQ(expected_status, rv); } void HttpNetworkTransactionTest::ConnectStatusHelper( const MockRead& status) { ConnectStatusHelperWithExpectedStatus( status, ERR_TUNNEL_CONNECTION_FAILED); } TEST_F(HttpNetworkTransactionTest, ConnectStatus100) { ConnectStatusHelper(MockRead("HTTP/1.1 100 Continue\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus101) { ConnectStatusHelper(MockRead("HTTP/1.1 101 Switching Protocols\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus201) { ConnectStatusHelper(MockRead("HTTP/1.1 201 Created\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus202) { ConnectStatusHelper(MockRead("HTTP/1.1 202 Accepted\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus203) { ConnectStatusHelper( MockRead("HTTP/1.1 203 Non-Authoritative Information\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus204) { ConnectStatusHelper(MockRead("HTTP/1.1 204 No Content\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus205) { ConnectStatusHelper(MockRead("HTTP/1.1 205 Reset Content\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus206) { ConnectStatusHelper(MockRead("HTTP/1.1 206 Partial Content\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus300) { ConnectStatusHelper(MockRead("HTTP/1.1 300 Multiple Choices\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus301) { ConnectStatusHelper(MockRead("HTTP/1.1 301 Moved Permanently\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus302) { ConnectStatusHelper(MockRead("HTTP/1.1 302 Found\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus303) { ConnectStatusHelper(MockRead("HTTP/1.1 303 See Other\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus304) { ConnectStatusHelper(MockRead("HTTP/1.1 304 Not Modified\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus305) { ConnectStatusHelper(MockRead("HTTP/1.1 305 Use Proxy\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus306) { ConnectStatusHelper(MockRead("HTTP/1.1 306\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus307) { ConnectStatusHelper(MockRead("HTTP/1.1 307 Temporary Redirect\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus308) { ConnectStatusHelper(MockRead("HTTP/1.1 308 Permanent Redirect\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus400) { ConnectStatusHelper(MockRead("HTTP/1.1 400 Bad Request\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus401) { ConnectStatusHelper(MockRead("HTTP/1.1 401 Unauthorized\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus402) { ConnectStatusHelper(MockRead("HTTP/1.1 402 Payment Required\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus403) { ConnectStatusHelper(MockRead("HTTP/1.1 403 Forbidden\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus404) { ConnectStatusHelper(MockRead("HTTP/1.1 404 Not Found\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus405) { ConnectStatusHelper(MockRead("HTTP/1.1 405 Method Not Allowed\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus406) { ConnectStatusHelper(MockRead("HTTP/1.1 406 Not Acceptable\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus407) { ConnectStatusHelperWithExpectedStatus( MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), ERR_PROXY_AUTH_UNSUPPORTED); } TEST_F(HttpNetworkTransactionTest, ConnectStatus408) { ConnectStatusHelper(MockRead("HTTP/1.1 408 Request Timeout\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus409) { ConnectStatusHelper(MockRead("HTTP/1.1 409 Conflict\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus410) { ConnectStatusHelper(MockRead("HTTP/1.1 410 Gone\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus411) { ConnectStatusHelper(MockRead("HTTP/1.1 411 Length Required\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus412) { ConnectStatusHelper(MockRead("HTTP/1.1 412 Precondition Failed\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus413) { ConnectStatusHelper(MockRead("HTTP/1.1 413 Request Entity Too Large\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus414) { ConnectStatusHelper(MockRead("HTTP/1.1 414 Request-URI Too Long\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus415) { ConnectStatusHelper(MockRead("HTTP/1.1 415 Unsupported Media Type\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus416) { ConnectStatusHelper( MockRead("HTTP/1.1 416 Requested Range Not Satisfiable\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus417) { ConnectStatusHelper(MockRead("HTTP/1.1 417 Expectation Failed\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus500) { ConnectStatusHelper(MockRead("HTTP/1.1 500 Internal Server Error\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus501) { ConnectStatusHelper(MockRead("HTTP/1.1 501 Not Implemented\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus502) { ConnectStatusHelper(MockRead("HTTP/1.1 502 Bad Gateway\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus503) { ConnectStatusHelper(MockRead("HTTP/1.1 503 Service Unavailable\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus504) { ConnectStatusHelper(MockRead("HTTP/1.1 504 Gateway Timeout\r\n")); } TEST_F(HttpNetworkTransactionTest, ConnectStatus505) { ConnectStatusHelper(MockRead("HTTP/1.1 505 HTTP Version Not Supported\r\n")); } // Test the flow when both the proxy server AND origin server require // authentication. Again, this uses basic auth for both since that is // the simplest to mock. TEST_F(HttpNetworkTransactionTest, BasicAuthProxyThenServer) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET http://www.example.org/ HTTP/1.1\r\n" "Host: www.example.org\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 407 Unauthorized\r\n"), // Give a couple authenticate options (only the middle one is actually // supported). MockRead("Proxy-Authenticate: Basic invalid\r\n"), // Malformed. MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Proxy-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), // Large content-length -- won't matter, as connection will be reset. MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After calling trans.RestartWithAuth() the first time, this is the // request we should be issuing -- the final header line contains the // proxy's credentials. MockWrite data_writes2[] = { MockWrite( "GET http://www.example.org/ HTTP/1.1\r\n" "Host: www.example.org\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Now the proxy server lets the request pass through to origin server. // The origin server responds with a 401. MockRead data_reads2[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), // Note: We are using the same realm-name as the proxy server. This is // completely valid, as realms are unique across hosts. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 2000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), // Won't be reached. }; // After calling trans.RestartWithAuth() the second time, we should send // the credentials for both the proxy and origin server. MockWrite data_writes3[] = { MockWrite( "GET http://www.example.org/ HTTP/1.1\r\n" "Host: www.example.org\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n" "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"), }; // Lastly we get the desired content. MockRead data_reads3[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); StaticSocketDataProvider data3(data_reads3, data_writes3); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); session_deps_.socket_factory->AddSocketDataProvider(&data3); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicProxyAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback3; rv = trans.RestartWithAuth(AuthCredentials(kFoo2, kBar2), callback3.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback3.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); } // For the NTLM implementation using SSPI, we skip the NTLM tests since we // can't hook into its internals to cause it to generate predictable NTLM // authorization headers. #if defined(NTLM_PORTABLE) // The NTLM authentication unit tests are based on known test data from the // [MS-NLMP] Specification [1]. These tests are primarily of the authentication // flow rather than the implementation of the NTLM protocol. See net/ntlm // for the implementation and testing of the protocol. // // [1] https://msdn.microsoft.com/en-us/library/cc236621.aspx // Enter the correct password and authenticate successfully. TEST_F(HttpNetworkTransactionTest, NTLMAuthV2) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://server/kids/login.aspx"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Ensure load is not disrupted by flags which suppress behaviour specific // to other auth schemes. request.load_flags = LOAD_DO_NOT_USE_EMBEDDED_IDENTITY; HttpAuthHandlerNTLM::ScopedProcSetter proc_setter( MockGetMSTime, MockGenerateRandom, MockGetHostName); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Generate the NTLM messages based on known test data. std::string negotiate_msg; std::string challenge_msg; std::string authenticate_msg; base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg), base::size(ntlm::test::kExpectedNegotiateMsg)), &negotiate_msg); base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2), base::size(ntlm::test::kChallengeMsgFromSpecV2)), &challenge_msg); base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>( ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2), base::size( ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)), &authenticate_msg); MockWrite data_writes1[] = { MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 401 Access Denied\r\n"), // Negotiate and NTLM are often requested together. However, we only want // to test NTLM. Since Negotiate is preferred over NTLM, we have to skip // the header that requests Negotiate for this test. MockRead("WWW-Authenticate: NTLM\r\n"), MockRead("Connection: close\r\n"), MockRead("Content-Length: 42\r\n"), MockRead("Content-Type: text/html\r\n\r\n"), // Missing content -- won't matter, as connection will be reset. }; MockWrite data_writes2[] = { // After restarting with a null identity, this is the // request we should be issuing -- the final header line contains a Type // 1 message. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n" "Authorization: NTLM "), MockWrite(negotiate_msg.c_str()), MockWrite("\r\n\r\n"), // After calling trans.RestartWithAuth(), we should send a Type 3 message // (using correct credentials). The second request continues on the // same connection. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n" "Authorization: NTLM "), MockWrite(authenticate_msg.c_str()), MockWrite("\r\n\r\n"), }; MockRead data_reads2[] = { // The origin server responds with a Type 2 message. MockRead("HTTP/1.1 401 Access Denied\r\n"), MockRead("WWW-Authenticate: NTLM "), MockRead(challenge_msg.c_str()), MockRead("\r\n"), MockRead("Content-Length: 42\r\n"), MockRead("Content-Type: text/html\r\n\r\n"), MockRead("You are not authorized to view this page\r\n"), // Lastly we get the desired content. MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=utf-8\r\n"), MockRead("Content-Length: 14\r\n\r\n"), MockRead("Please Login\r\n"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl1(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth( AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); TestCompletionCallback callback3; rv = trans.RestartWithAuth(AuthCredentials(), callback3.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback3.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(14, response->headers->GetContentLength()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("Please Login\r\n", response_data); EXPECT_TRUE(data1.AllReadDataConsumed()); EXPECT_TRUE(data1.AllWriteDataConsumed()); EXPECT_TRUE(data2.AllReadDataConsumed()); EXPECT_TRUE(data2.AllWriteDataConsumed()); } // Enter a wrong password, and then the correct one. TEST_F(HttpNetworkTransactionTest, NTLMAuthV2WrongThenRightPassword) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://server/kids/login.aspx"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpAuthHandlerNTLM::ScopedProcSetter proc_setter( MockGetMSTime, MockGenerateRandom, MockGetHostName); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Generate the NTLM messages based on known test data. std::string negotiate_msg; std::string challenge_msg; std::string authenticate_msg; base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg), base::size(ntlm::test::kExpectedNegotiateMsg)), &negotiate_msg); base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2), base::size(ntlm::test::kChallengeMsgFromSpecV2)), &challenge_msg); base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>( ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2), base::size( ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)), &authenticate_msg); // The authenticate message when |kWrongPassword| is sent. std::string wrong_password_authenticate_msg( "TlRMTVNTUAADAAAAGAAYAFgAAACKAIoAcAAAAAwADAD6AAAACAAIAAYBAAAQABAADgEAAAAA" "AABYAAAAA4IIAAAAAAAAAAAAAPknEYqtJQtusopDRSfYzAAAAAAAAAAAAAAAAAAAAAAAAAAA" "AAAAAOtVz38osnFdRRggUQHUJ3EBAQAAAAAAAIALyP0A1NIBqqqqqqqqqqoAAAAAAgAMAEQA" "bwBtAGEAaQBuAAEADABTAGUAcgB2AGUAcgAGAAQAAgAAAAoAEAAAAAAAAAAAAAAAAAAAAAAA" "CQAWAEgAVABUAFAALwBzAGUAcgB2AGUAcgAAAAAAAAAAAEQAbwBtAGEAaQBuAFUAcwBlAHIA" "QwBPAE0AUABVAFQARQBSAA=="); // Sanity check that it's the same length as the correct authenticate message // and that it's different. ASSERT_EQ(authenticate_msg.length(), wrong_password_authenticate_msg.length()); ASSERT_NE(authenticate_msg, wrong_password_authenticate_msg); MockWrite data_writes1[] = { MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 401 Access Denied\r\n"), // Negotiate and NTLM are often requested together. However, we only want // to test NTLM. Since Negotiate is preferred over NTLM, we have to skip // the header that requests Negotiate for this test. MockRead("WWW-Authenticate: NTLM\r\n"), MockRead("Connection: close\r\n"), MockRead("Content-Length: 42\r\n"), MockRead("Content-Type: text/html\r\n\r\n"), // Missing content -- won't matter, as connection will be reset. }; MockWrite data_writes2[] = { // After restarting with a null identity, this is the // request we should be issuing -- the final header line contains a Type // 1 message. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n" "Authorization: NTLM "), MockWrite(negotiate_msg.c_str()), MockWrite("\r\n\r\n"), // After calling trans.RestartWithAuth(), we should send a Type 3 message // (using incorrect credentials). The second request continues on the // same connection. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n" "Authorization: NTLM "), MockWrite(wrong_password_authenticate_msg.c_str()), MockWrite("\r\n\r\n"), }; MockRead data_reads2[] = { // The origin server responds with a Type 2 message. MockRead("HTTP/1.1 401 Access Denied\r\n"), MockRead("WWW-Authenticate: NTLM "), MockRead(challenge_msg.c_str()), MockRead("\r\n"), MockRead("Content-Length: 42\r\n"), MockRead("Content-Type: text/html\r\n\r\n"), MockRead("You are not authorized to view this page\r\n"), // Wrong password. MockRead("HTTP/1.1 401 Access Denied\r\n"), MockRead("WWW-Authenticate: NTLM\r\n"), MockRead("Connection: close\r\n"), MockRead("Content-Length: 42\r\n"), MockRead("Content-Type: text/html\r\n\r\n"), // Missing content -- won't matter, as connection will be reset. }; MockWrite data_writes3[] = { // After restarting with a null identity, this is the // request we should be issuing -- the final header line contains a Type // 1 message. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n" "Authorization: NTLM "), MockWrite(negotiate_msg.c_str()), MockWrite("\r\n\r\n"), // After calling trans.RestartWithAuth(), we should send a Type 3 message // (the credentials for the origin server). The second request continues // on the same connection. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n" "Authorization: NTLM "), MockWrite(authenticate_msg.c_str()), MockWrite("\r\n\r\n"), }; MockRead data_reads3[] = { // The origin server responds with a Type 2 message. MockRead("HTTP/1.1 401 Access Denied\r\n"), MockRead("WWW-Authenticate: NTLM "), MockRead(challenge_msg.c_str()), MockRead("\r\n"), MockRead("Content-Length: 42\r\n"), MockRead("Content-Type: text/html\r\n\r\n"), MockRead("You are not authorized to view this page\r\n"), // Lastly we get the desired content. MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=utf-8\r\n"), MockRead("Content-Length: 14\r\n\r\n"), MockRead("Please Login\r\n"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); StaticSocketDataProvider data3(data_reads3, data_writes3); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); session_deps_.socket_factory->AddSocketDataProvider(&data3); SSLSocketDataProvider ssl1(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); SSLSocketDataProvider ssl3(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl3); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge)); TestCompletionCallback callback2; // Enter the wrong password. rv = trans.RestartWithAuth( AuthCredentials(ntlm::test::kDomainUserCombined, kWrongPassword), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); TestCompletionCallback callback3; rv = trans.RestartWithAuth(AuthCredentials(), callback3.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback3.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge)); TestCompletionCallback callback4; // Now enter the right password. rv = trans.RestartWithAuth( AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword), callback4.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback4.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); TestCompletionCallback callback5; // One more roundtrip rv = trans.RestartWithAuth(AuthCredentials(), callback5.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback5.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(14, response->headers->GetContentLength()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("Please Login\r\n", response_data); EXPECT_TRUE(data1.AllReadDataConsumed()); EXPECT_TRUE(data1.AllWriteDataConsumed()); EXPECT_TRUE(data2.AllReadDataConsumed()); EXPECT_TRUE(data2.AllWriteDataConsumed()); EXPECT_TRUE(data3.AllReadDataConsumed()); EXPECT_TRUE(data3.AllWriteDataConsumed()); } // Server requests NTLM authentication, which is not supported over HTTP/2. // Subsequent request with authorization header should be sent over HTTP/1.1. TEST_F(HttpNetworkTransactionTest, NTLMOverHttp2) { HttpAuthHandlerNTLM::ScopedProcSetter proc_setter( MockGetMSTime, MockGenerateRandom, MockGetHostName); const char* kUrl = "https://server/kids/login.aspx"; HttpRequestInfo request; request.method = "GET"; request.url = GURL(kUrl); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // First request without credentials. spdy::SpdyHeaderBlock request_headers0( spdy_util_.ConstructGetHeaderBlock(kUrl)); spdy::SpdySerializedFrame request0(spdy_util_.ConstructSpdyHeaders( 1, std::move(request_headers0), LOWEST, true)); spdy::SpdyHeaderBlock response_headers0; response_headers0[spdy::kHttp2StatusHeader] = "401"; response_headers0["www-authenticate"] = "NTLM"; spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyResponseHeaders( 1, std::move(response_headers0), true)); // Stream 1 is closed. spdy_util_.UpdateWithStreamDestruction(1); // Generate the NTLM messages based on known test data. std::string negotiate_msg; std::string challenge_msg; std::string authenticate_msg; base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg), base::size(ntlm::test::kExpectedNegotiateMsg)), &negotiate_msg); base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2), base::size(ntlm::test::kChallengeMsgFromSpecV2)), &challenge_msg); base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>( ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2), base::size( ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)), &authenticate_msg); // Retry with authorization header. spdy::SpdyHeaderBlock request_headers1( spdy_util_.ConstructGetHeaderBlock(kUrl)); request_headers1["authorization"] = std::string("NTLM ") + negotiate_msg; spdy::SpdySerializedFrame request1(spdy_util_.ConstructSpdyHeaders( 3, std::move(request_headers1), LOWEST, true)); spdy::SpdySerializedFrame rst( spdy_util_.ConstructSpdyRstStream(3, spdy::ERROR_CODE_HTTP_1_1_REQUIRED)); MockWrite writes0[] = {CreateMockWrite(request0, 0)}; MockRead reads0[] = {CreateMockRead(resp, 1), MockRead(ASYNC, 0, 2)}; // Retry yet again using HTTP/1.1. MockWrite writes1[] = { // After restarting with a null identity, this is the // request we should be issuing -- the final header line contains a Type // 1 message. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n" "Authorization: NTLM "), MockWrite(negotiate_msg.c_str()), MockWrite("\r\n\r\n"), // After calling trans.RestartWithAuth(), we should send a Type 3 message // (the credentials for the origin server). The second request continues // on the same connection. MockWrite("GET /kids/login.aspx HTTP/1.1\r\n" "Host: server\r\n" "Connection: keep-alive\r\n" "Authorization: NTLM "), MockWrite(authenticate_msg.c_str()), MockWrite("\r\n\r\n"), }; MockRead reads1[] = { // The origin server responds with a Type 2 message. MockRead("HTTP/1.1 401 Access Denied\r\n"), MockRead("WWW-Authenticate: NTLM "), MockRead(challenge_msg.c_str()), MockRead("\r\n"), MockRead("Content-Length: 42\r\n"), MockRead("Content-Type: text/html\r\n\r\n"), MockRead("You are not authorized to view this page\r\n"), // Lastly we get the desired content. MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=utf-8\r\n"), MockRead("Content-Length: 14\r\n\r\n"), MockRead("Please Login\r\n"), }; SequencedSocketData data0(reads0, writes0); StaticSocketDataProvider data1(reads1, writes1); session_deps_.socket_factory->AddSocketDataProvider(&data0); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl0(ASYNC, OK); ssl0.next_proto = kProtoHTTP2; SSLSocketDataProvider ssl1(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl0); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckNTLMServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth( AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); TestCompletionCallback callback3; rv = trans.RestartWithAuth(AuthCredentials(), callback3.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback3.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(14, response->headers->GetContentLength()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("Please Login\r\n", response_data); EXPECT_TRUE(data0.AllReadDataConsumed()); EXPECT_TRUE(data0.AllWriteDataConsumed()); EXPECT_TRUE(data1.AllReadDataConsumed()); EXPECT_TRUE(data1.AllWriteDataConsumed()); } // Test that, if we have an NTLM proxy and the origin resets the connection, we // do no retry forever checking for TLS version interference. This is a // regression test for https://crbug.com/823387. The version interference probe // has since been removed, but retain the regression test so we can update it if // we add future TLS retries. TEST_F(HttpNetworkTransactionTest, NTLMProxyTLSHandshakeReset) { // The NTLM test data expects the proxy to be named 'server'. The origin is // https://origin/. session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY server", TRAFFIC_ANNOTATION_FOR_TESTS); SSLConfig config; session_deps_.ssl_config_service = std::make_unique<TestSSLConfigService>(config); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://origin/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Ensure load is not disrupted by flags which suppress behaviour specific // to other auth schemes. request.load_flags = LOAD_DO_NOT_USE_EMBEDDED_IDENTITY; HttpAuthHandlerNTLM::ScopedProcSetter proc_setter( MockGetMSTime, MockGenerateRandom, MockGetHostName); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Generate the NTLM messages based on known test data. std::string negotiate_msg; std::string challenge_msg; std::string authenticate_msg; base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>(ntlm::test::kExpectedNegotiateMsg), base::size(ntlm::test::kExpectedNegotiateMsg)), &negotiate_msg); base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>(ntlm::test::kChallengeMsgFromSpecV2), base::size(ntlm::test::kChallengeMsgFromSpecV2)), &challenge_msg); base::Base64Encode( base::StringPiece( reinterpret_cast<const char*>( ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2), base::size( ntlm::test::kExpectedAuthenticateMsgEmptyChannelBindingsV2)), &authenticate_msg); MockWrite data_writes[] = { // The initial CONNECT request. MockWrite("CONNECT origin:443 HTTP/1.1\r\n" "Host: origin:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), // After restarting with an identity. MockWrite("CONNECT origin:443 HTTP/1.1\r\n" "Host: origin:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: NTLM "), MockWrite(negotiate_msg.c_str()), // End headers. MockWrite("\r\n\r\n"), // The second restart. MockWrite("CONNECT origin:443 HTTP/1.1\r\n" "Host: origin:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: NTLM "), MockWrite(authenticate_msg.c_str()), // End headers. MockWrite("\r\n\r\n"), }; MockRead data_reads[] = { // The initial NTLM response. MockRead("HTTP/1.1 407 Access Denied\r\n" "Content-Length: 0\r\n" "Proxy-Authenticate: NTLM\r\n\r\n"), // The NTLM challenge message. MockRead("HTTP/1.1 407 Access Denied\r\n" "Content-Length: 0\r\n" "Proxy-Authenticate: NTLM "), MockRead(challenge_msg.c_str()), // End headers. MockRead("\r\n\r\n"), // Finally the tunnel is established. MockRead("HTTP/1.1 200 Connected\r\n\r\n"), }; StaticSocketDataProvider data(data_reads, data_writes); SSLSocketDataProvider data_ssl(ASYNC, ERR_CONNECTION_RESET); session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&data_ssl); // Start the transaction. The proxy responds with an NTLM authentication // request. TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = callback.GetResult( trans.Start(&request, callback.callback(), NetLogWithSource())); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckNTLMProxyAuth(response->auth_challenge)); // Configure credentials and restart. The proxy responds with the challenge // message. rv = callback.GetResult(trans.RestartWithAuth( AuthCredentials(ntlm::test::kDomainUserCombined, ntlm::test::kPassword), callback.callback())); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); // Restart once more. The tunnel will be established and then the SSL // handshake will reset. rv = callback.GetResult( trans.RestartWithAuth(AuthCredentials(), callback.callback())); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); } #endif // NTLM_PORTABLE // Test reading a server response which has only headers, and no body. // After some maximum number of bytes is consumed, the transaction should // fail with ERR_RESPONSE_HEADERS_TOO_BIG. TEST_F(HttpNetworkTransactionTest, LargeHeadersNoBody) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Respond with 300 kb of headers (we should fail after 256 kb). std::string large_headers_string; FillLargeHeadersString(&large_headers_string, 300 * 1024); MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead(ASYNC, large_headers_string.data(), large_headers_string.size()), MockRead("\r\nBODY"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_RESPONSE_HEADERS_TOO_BIG)); } // Make sure that we don't try to reuse a TCPClientSocket when failing to // establish tunnel. // http://code.google.com/p/chromium/issues/detail?id=3772 TEST_F(HttpNetworkTransactionTest, DontRecycleTransportSocketForSSLTunnel) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 404, using a persistent // connection. Usually a proxy would return 501 (not implemented), // or 200 (tunnel established). MockRead data_reads1[] = { MockRead("HTTP/1.1 404 Not Found\r\n"), MockRead("Content-Length: 10\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_UNEXPECTED), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback1; int rv = trans->Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the TCPClientSocket was not added back to // the pool. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); trans.reset(); base::RunLoop().RunUntilIdle(); // Make sure that the socket didn't get recycled after calling the destructor. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); } // Make sure that we recycle a socket after reading all of the response body. TEST_F(HttpNetworkTransactionTest, RecycleSocket) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { // A part of the response body is received with the response headers. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 11\r\n\r\nhel"), // The rest of the response body is received in two parts. MockRead("lo"), MockRead(" world"), MockRead("junk"), // Should not be read!! MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); std::string status_line = response->headers->GetStatusLine(); EXPECT_EQ("HTTP/1.1 200 OK", status_line); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the socket was added back to the pool. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); } // Make sure that we recycle a SSL socket after reading all of the response // body. TEST_F(HttpNetworkTransactionTest, RecycleSSLSocket) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 11\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the socket was added back to the pool. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); } // Grab a SSL socket, use it, and put it back into the pool. Then, reuse it // from the pool and make sure that we recover okay. TEST_F(HttpNetworkTransactionTest, RecycleDeadSSLSocket) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 11\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, ERR_CONNECTION_CLOSED)}; SSLSocketDataProvider ssl(ASYNC, OK); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); StaticSocketDataProvider data(data_reads, data_writes); StaticSocketDataProvider data2(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); std::string response_data; rv = ReadTransaction(trans.get(), &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the socket was added back to the pool. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); // Now start the second transaction, which should reuse the previous socket. trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); rv = ReadTransaction(trans.get(), &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the socket was added back to the pool. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); } // Grab a socket, use it, and put it back into the pool. Then, make // low memory notification and ensure the socket pool is flushed. TEST_F(HttpNetworkTransactionTest, FlushSocketPoolOnLowMemoryNotifications) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.load_flags = 0; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { // A part of the response body is received with the response headers. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 11\r\n\r\nhel"), // The rest of the response body is received in two parts. MockRead("lo"), MockRead(" world"), MockRead("junk"), // Should not be read!! MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); std::string status_line = response->headers->GetStatusLine(); EXPECT_EQ("HTTP/1.1 200 OK", status_line); // Make memory critical notification and ensure the transaction still has been // operating right. base::MemoryPressureListener::NotifyMemoryPressure( base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL); base::RunLoop().RunUntilIdle(); // Socket should not be flushed as long as it is not idle. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the socket was added back to the pool. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); // Idle sockets should be flushed now. base::MemoryPressureListener::NotifyMemoryPressure( base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL); base::RunLoop().RunUntilIdle(); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); } // Disable idle socket closing on memory pressure. // Grab a socket, use it, and put it back into the pool. Then, make // low memory notification and ensure the socket pool is NOT flushed. TEST_F(HttpNetworkTransactionTest, NoFlushSocketPoolOnLowMemoryNotifications) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.load_flags = 0; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Disable idle socket closing on memory pressure. session_deps_.disable_idle_sockets_close_on_memory_pressure = true; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { // A part of the response body is received with the response headers. MockRead("HTTP/1.1 200 OK\r\nContent-Length: 11\r\n\r\nhel"), // The rest of the response body is received in two parts. MockRead("lo"), MockRead(" world"), MockRead("junk"), // Should not be read!! MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); std::string status_line = response->headers->GetStatusLine(); EXPECT_EQ("HTTP/1.1 200 OK", status_line); // Make memory critical notification and ensure the transaction still has been // operating right. base::MemoryPressureListener::NotifyMemoryPressure( base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL); base::RunLoop().RunUntilIdle(); // Socket should not be flushed as long as it is not idle. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the socket was added back to the pool. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); // Idle sockets should NOT be flushed on moderate memory pressure. base::MemoryPressureListener::NotifyMemoryPressure( base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_MODERATE); base::RunLoop().RunUntilIdle(); EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); // Idle sockets should NOT be flushed on critical memory pressure. base::MemoryPressureListener::NotifyMemoryPressure( base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL); base::RunLoop().RunUntilIdle(); EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); } // Grab an SSL socket, use it, and put it back into the pool. Then, make // low memory notification and ensure the socket pool is flushed. TEST_F(HttpNetworkTransactionTest, FlushSSLSocketPoolOnLowMemoryNotifications) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.load_flags = 0; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 11\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, ERR_CONNECTION_CLOSED)}; SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); // Make memory critical notification and ensure the transaction still has been // operating right. base::MemoryPressureListener::NotifyMemoryPressure( base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL); base::RunLoop().RunUntilIdle(); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the socket was added back to the pool. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); // Make memory notification once again and ensure idle socket is closed. base::MemoryPressureListener::NotifyMemoryPressure( base::MemoryPressureListener::MEMORY_PRESSURE_LEVEL_CRITICAL); base::RunLoop().RunUntilIdle(); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); } // Make sure that we recycle a socket after a zero-length response. // http://crbug.com/9880 TEST_F(HttpNetworkTransactionTest, RecycleSocketAfterZeroContentLength) { HttpRequestInfo request; request.method = "GET"; request.url = GURL( "http://www.example.org/csi?v=3&s=web&action=&" "tran=undefined&ei=mAXcSeegAo-SMurloeUN&" "e=17259,18167,19592,19773,19981,20133,20173,20233&" "rt=prt.2642,ol.2649,xjs.2951"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockRead data_reads[] = { MockRead("HTTP/1.1 204 No Content\r\n" "Content-Length: 0\r\n" "Content-Type: text/html\r\n\r\n"), MockRead("junk"), // Should not be read!! MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); // Transaction must be created after the MockReads, so it's destroyed before // them. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); std::string status_line = response->headers->GetStatusLine(); EXPECT_EQ("HTTP/1.1 204 No Content", status_line); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("", response_data); // Empty the current queue. This is necessary because idle sockets are // added to the connection pool asynchronously with a PostTask. base::RunLoop().RunUntilIdle(); // We now check to make sure the socket was added back to the pool. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); } TEST_F(HttpNetworkTransactionTest, ResendRequestOnWriteBodyError) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request[2]; // Transaction 1: a GET request that succeeds. The socket is recycled // after use. request[0].method = "GET"; request[0].url = GURL("http://www.google.com/"); request[0].load_flags = 0; request[0].traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Transaction 2: a POST request. Reuses the socket kept alive from // transaction 1. The first attempts fails when writing the POST data. // This causes the transaction to retry with a new socket. The second // attempt succeeds. request[1].method = "POST"; request[1].url = GURL("http://www.google.com/login.cgi"); request[1].upload_data_stream = &upload_data_stream; request[1].load_flags = 0; request[1].traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // The first socket is used for transaction 1 and the first attempt of // transaction 2. // The response of transaction 1. MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 11\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; // The mock write results of transaction 1 and the first attempt of // transaction 2. MockWrite data_writes1[] = { MockWrite(SYNCHRONOUS, 64), // GET MockWrite(SYNCHRONOUS, 93), // POST MockWrite(SYNCHRONOUS, ERR_CONNECTION_ABORTED), // POST data }; StaticSocketDataProvider data1(data_reads1, data_writes1); // The second socket is used for the second attempt of transaction 2. // The response of transaction 2. MockRead data_reads2[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 7\r\n\r\n"), MockRead("welcome"), MockRead(SYNCHRONOUS, OK), }; // The mock write results of the second attempt of transaction 2. MockWrite data_writes2[] = { MockWrite(SYNCHRONOUS, 93), // POST MockWrite(SYNCHRONOUS, 3), // POST data }; StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); const char* const kExpectedResponseData[] = { "hello world", "welcome" }; for (int i = 0; i < 2; ++i) { HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request[i], callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ(kExpectedResponseData[i], response_data); } } // Test the request-challenge-retry sequence for basic auth when there is // an identity in the URL. The request should be sent as normal, but when // it fails the identity from the URL is used to answer the challenge. TEST_F(HttpNetworkTransactionTest, AuthIdentityInURL) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://foo:b@r@www.example.org/"); request.load_flags = LOAD_NORMAL; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // The password contains an escaped character -- for this test to pass it // will need to be unescaped by HttpNetworkTransaction. EXPECT_EQ("b%40r", request.url.password()); MockWrite data_writes1[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After the challenge above, the transaction will be restarted using the // identity from the url (foo, b@r) to answer the challenge. MockWrite data_writes2[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJAcg==\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); // There is no challenge info, since the identity in URL worked. EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); // Empty the current queue. base::RunLoop().RunUntilIdle(); } // Test the request-challenge-retry sequence for basic auth when there is an // incorrect identity in the URL. The identity from the URL should be used only // once. TEST_F(HttpNetworkTransactionTest, WrongAuthIdentityInURL) { HttpRequestInfo request; request.method = "GET"; // Note: the URL has a username:password in it. The password "baz" is // wrong (should be "bar"). request.url = GURL("http://foo:baz@www.example.org/"); request.load_flags = LOAD_NORMAL; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After the challenge above, the transaction will be restarted using the // identity from the url (foo, baz) to answer the challenge. MockWrite data_writes2[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJheg==\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After the challenge above, the transaction will be restarted using the // identity supplied by the user (foo, bar) to answer the challenge. MockWrite data_writes3[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; MockRead data_reads3[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); StaticSocketDataProvider data3(data_reads3, data_writes3); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); session_deps_.socket_factory->AddSocketDataProvider(&data3); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback3; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback3.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback3.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); // There is no challenge info, since the identity worked. EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); // Empty the current queue. base::RunLoop().RunUntilIdle(); } // Test the request-challenge-retry sequence for basic auth when there is a // correct identity in the URL, but its use is being suppressed. The identity // from the URL should never be used. TEST_F(HttpNetworkTransactionTest, AuthIdentityInURLSuppressed) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://foo:bar@www.example.org/"); request.load_flags = LOAD_DO_NOT_USE_EMBEDDED_IDENTITY; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After the challenge above, the transaction will be restarted using the // identity supplied by the user, not the one in the URL, to answer the // challenge. MockWrite data_writes3[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; MockRead data_reads3[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data3(data_reads3, data_writes3); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data3); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback3; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback3.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback3.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); // There is no challenge info, since the identity worked. EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); // Empty the current queue. base::RunLoop().RunUntilIdle(); } // Test that previously tried username/passwords for a realm get re-used. TEST_F(HttpNetworkTransactionTest, BasicAuthCacheAndPreauth) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Transaction 1: authenticate (foo, bar) on MyRealm1 { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/x/y/z"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET /x/y/z HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // Resend with authorization (username=foo, password=bar) MockWrite data_writes2[] = { MockWrite( "GET /x/y/z HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Sever accepts the authorization. MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); } // ------------------------------------------------------------------------ // Transaction 2: authenticate (foo2, bar2) on MyRealm2 { HttpRequestInfo request; request.method = "GET"; // Note that Transaction 1 was at /x/y/z, so this is in the same // protection space as MyRealm1. request.url = GURL("http://www.example.org/x/y/a/b"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET /x/y/a/b HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" // Send preemptive authorization for MyRealm1 "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // The server didn't like the preemptive authorization, and // challenges us for a different realm (MyRealm2). MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm2\"\r\n"), MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // Resend with authorization for MyRealm2 (username=foo2, password=bar2) MockWrite data_writes2[] = { MockWrite( "GET /x/y/a/b HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vMjpiYXIy\r\n\r\n"), }; // Sever accepts the authorization. MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->auth_challenge); EXPECT_FALSE(response->auth_challenge->is_proxy); EXPECT_EQ("http://www.example.org", response->auth_challenge->challenger.Serialize()); EXPECT_EQ("MyRealm2", response->auth_challenge->realm); EXPECT_EQ(kBasicAuthScheme, response->auth_challenge->scheme); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo2, kBar2), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); } // ------------------------------------------------------------------------ // Transaction 3: Resend a request in MyRealm's protection space -- // succeed with preemptive authorization. { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/x/y/z2"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET /x/y/z2 HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" // The authorization for MyRealm1 gets sent preemptively // (since the url is in the same protection space) "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Sever accepts the preemptive authorization MockRead data_reads1[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); } // ------------------------------------------------------------------------ // Transaction 4: request another URL in MyRealm (however the // url is not known to belong to the protection space, so no pre-auth). { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/x/1"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET /x/1 HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // Resend with authorization from MyRealm's cache. MockWrite data_writes2[] = { MockWrite( "GET /x/1 HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Sever accepts the authorization. MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); } // ------------------------------------------------------------------------ // Transaction 5: request a URL in MyRealm, but the server rejects the // cached identity. Should invalidate and re-prompt. { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/p/q/t"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET /p/q/t HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // Resend with authorization from cache for MyRealm. MockWrite data_writes2[] = { MockWrite( "GET /p/q/t HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Sever rejects the authorization. MockRead data_reads2[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // At this point we should prompt for new credentials for MyRealm. // Restart with username=foo3, password=foo4. MockWrite data_writes3[] = { MockWrite( "GET /p/q/t HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vMzpiYXIz\r\n\r\n"), }; // Sever accepts the authorization. MockRead data_reads3[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); StaticSocketDataProvider data3(data_reads3, data_writes3); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); session_deps_.socket_factory->AddSocketDataProvider(&data3); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(trans.IsReadyToRestartForAuth()); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback3; rv = trans.RestartWithAuth(AuthCredentials(kFoo3, kBar3), callback3.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback3.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); } } // Tests that nonce count increments when multiple auth attempts // are started with the same nonce. TEST_F(HttpNetworkTransactionTest, DigestPreAuthNonceCount) { HttpAuthHandlerDigest::Factory* digest_factory = new HttpAuthHandlerDigest::Factory(); HttpAuthHandlerDigest::FixedNonceGenerator* nonce_generator = new HttpAuthHandlerDigest::FixedNonceGenerator("0123456789abcdef"); digest_factory->set_nonce_generator(nonce_generator); session_deps_.http_auth_handler_factory.reset(digest_factory); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Transaction 1: authenticate (foo, bar) on MyRealm1 { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/x/y/z"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET /x/y/z HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Digest realm=\"digestive\", nonce=\"OU812\", " "algorithm=MD5, qop=\"auth\"\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; // Resend with authorization (username=foo, password=bar) MockWrite data_writes2[] = { MockWrite( "GET /x/y/z HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Digest username=\"foo\", realm=\"digestive\", " "nonce=\"OU812\", uri=\"/x/y/z\", algorithm=MD5, " "response=\"03ffbcd30add722589c1de345d7a927f\", qop=auth, " "nc=00000001, cnonce=\"0123456789abcdef\"\r\n\r\n"), }; // Sever accepts the authorization. MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckDigestServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); } // ------------------------------------------------------------------------ // Transaction 2: Request another resource in digestive's protection space. // This will preemptively add an Authorization header which should have an // "nc" value of 2 (as compared to 1 in the first use. { HttpRequestInfo request; request.method = "GET"; // Note that Transaction 1 was at /x/y/z, so this is in the same // protection space as digest. request.url = GURL("http://www.example.org/x/y/a/b"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes1[] = { MockWrite( "GET /x/y/a/b HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Digest username=\"foo\", realm=\"digestive\", " "nonce=\"OU812\", uri=\"/x/y/a/b\", algorithm=MD5, " "response=\"d6f9a2c07d1c5df7b89379dca1269b35\", qop=auth, " "nc=00000002, cnonce=\"0123456789abcdef\"\r\n\r\n"), }; // Sever accepts the authorization. MockRead data_reads1[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); } } // Test the ResetStateForRestart() private method. TEST_F(HttpNetworkTransactionTest, ResetStateForRestart) { // Create a transaction (the dependencies aren't important). std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Setup some state (which we expect ResetStateForRestart() will clear). trans.read_buf_ = base::MakeRefCounted<IOBuffer>(15); trans.read_buf_len_ = 15; trans.request_headers_.SetHeader("Authorization", "NTLM"); // Setup state in response_ HttpResponseInfo* response = &trans.response_; response->auth_challenge = base::nullopt; response->ssl_info.cert_status = static_cast<CertStatus>(-1); // Nonsensical. response->response_time = base::Time::Now(); response->was_cached = true; // (Wouldn't ever actually be true...) { // Setup state for response_.vary_data HttpRequestInfo request; std::string temp("HTTP/1.1 200 OK\nVary: foo, bar\n\n"); std::replace(temp.begin(), temp.end(), '\n', '\0'); scoped_refptr<HttpResponseHeaders> headers(new HttpResponseHeaders(temp)); request.extra_headers.SetHeader("Foo", "1"); request.extra_headers.SetHeader("bar", "23"); EXPECT_TRUE(response->vary_data.Init(request, *headers.get())); } // Cause the above state to be reset. trans.ResetStateForRestart(); // Verify that the state that needed to be reset, has been reset. EXPECT_FALSE(trans.read_buf_); EXPECT_EQ(0, trans.read_buf_len_); EXPECT_TRUE(trans.request_headers_.IsEmpty()); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_FALSE(response->headers); EXPECT_FALSE(response->was_cached); EXPECT_EQ(0U, response->ssl_info.cert_status); EXPECT_FALSE(response->vary_data.is_valid()); } // Test HTTPS connections to a site with a bad certificate TEST_F(HttpNetworkTransactionTest, HTTPSBadCertificate) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider ssl_bad_certificate; StaticSocketDataProvider data(data_reads, data_writes); SSLSocketDataProvider ssl_bad(ASYNC, ERR_CERT_AUTHORITY_INVALID); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSocketDataProvider(&ssl_bad_certificate); session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_bad); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CERT_AUTHORITY_INVALID)); rv = trans.RestartIgnoringLastError(callback.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_EQ(100, response->headers->GetContentLength()); } // Test HTTPS connections to a site with a bad certificate, going through a // proxy TEST_F(HttpNetworkTransactionTest, HTTPSBadCertificateViaProxy) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite proxy_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead proxy_reads[] = { MockRead("HTTP/1.0 200 Connected\r\n\r\n"), MockRead(SYNCHRONOUS, OK) }; MockWrite data_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 Connected\r\n\r\n"), MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider ssl_bad_certificate(proxy_reads, proxy_writes); StaticSocketDataProvider data(data_reads, data_writes); SSLSocketDataProvider ssl_bad(ASYNC, ERR_CERT_AUTHORITY_INVALID); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSocketDataProvider(&ssl_bad_certificate); session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_bad); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; for (int i = 0; i < 2; i++) { session_deps_.socket_factory->ResetNextMockIndexes(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CERT_AUTHORITY_INVALID)); rv = trans.RestartIgnoringLastError(callback.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_EQ(100, response->headers->GetContentLength()); } } // Test HTTPS connections to a site, going through an HTTPS proxy TEST_F(HttpNetworkTransactionTest, HTTPSViaHttpsProxy) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 Connected\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy SSLSocketDataProvider tunnel_ssl(ASYNC, OK); // SSL through the tunnel session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl); session_deps_.socket_factory->AddSSLSocketDataProvider(&tunnel_ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->proxy_server.is_https()); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(100, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); } // Test that an HTTPS Proxy cannot redirect a CONNECT request for main frames. TEST_F(HttpNetworkTransactionTest, RedirectOfHttpsConnectViaHttpsProxy) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; const base::TimeDelta kTimeIncrement = base::TimeDelta::FromSeconds(4); session_deps_.host_resolver->set_ondemand_mode(true); HttpRequestInfo request; request.load_flags = LOAD_MAIN_FRAME_DEPRECATED; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { // Pause on first read. MockRead(ASYNC, ERR_IO_PENDING, 1), MockRead(ASYNC, 2, "HTTP/1.1 302 Redirect\r\n"), MockRead(ASYNC, 3, "Location: http://login.example.com/\r\n"), MockRead(ASYNC, 4, "Content-Length: 0\r\n\r\n"), }; SequencedSocketData data(MockConnect(ASYNC, OK), data_reads, data_writes); SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_TRUE(session_deps_.host_resolver->has_pending_requests()); // Host resolution takes |kTimeIncrement|. FastForwardBy(kTimeIncrement); // Resolving the current request with |ResolveNow| will cause the pending // request to instantly complete, and the async connect will start as well. session_deps_.host_resolver->ResolveOnlyRequestNow(); // Connecting takes |kTimeIncrement|. FastForwardBy(kTimeIncrement); data.RunUntilPaused(); // The server takes |kTimeIncrement| to respond. FastForwardBy(kTimeIncrement); data.Resume(); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); } // Test that an HTTPS Proxy cannot redirect a CONNECT request for subresources. TEST_F(HttpNetworkTransactionTest, RedirectOfHttpsConnectSubresourceViaHttpsProxy) { base::HistogramTester histograms; session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead(ASYNC, 1, "HTTP/1.1 302 Redirect\r\n"), MockRead(ASYNC, 2, "Location: http://login.example.com/\r\n"), MockRead(ASYNC, 3, "Content-Length: 0\r\n\r\n"), }; SequencedSocketData data(MockConnect(ASYNC, OK), data_reads, data_writes); SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); } // Test that an HTTPS Proxy which was auto-detected cannot redirect a CONNECT // request for main frames. TEST_F(HttpNetworkTransactionTest, RedirectOfHttpsConnectViaAutoDetectedHttpsProxy) { base::HistogramTester histograms; session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromAutoDetectedPacResult( "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; HttpRequestInfo request; request.load_flags = LOAD_MAIN_FRAME_DEPRECATED; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead(ASYNC, 1, "HTTP/1.1 302 Redirect\r\n"), MockRead(ASYNC, 2, "Location: http://login.example.com/\r\n"), MockRead(ASYNC, 3, "Content-Length: 0\r\n\r\n"), }; SequencedSocketData data(MockConnect(ASYNC, OK), data_reads, data_writes); SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); } // Tests that an HTTPS (SPDY) Proxy's cannot redirect a CONNECT request for main // frames. TEST_F(HttpNetworkTransactionTest, RedirectOfHttpsConnectViaSpdyProxy) { base::HistogramTester histograms; session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; const base::TimeDelta kTimeIncrement = base::TimeDelta::FromSeconds(4); session_deps_.host_resolver->set_ondemand_mode(true); HttpRequestInfo request; request.method = "GET"; request.load_flags = LOAD_MAIN_FRAME_DEPRECATED; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); spdy::SpdySerializedFrame conn(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); spdy::SpdySerializedFrame goaway( spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL)); MockWrite data_writes[] = { CreateMockWrite(conn, 0, SYNCHRONOUS), CreateMockWrite(goaway, 3, SYNCHRONOUS), }; static const char* const kExtraHeaders[] = { "location", "http://login.example.com/", }; spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyReplyError( "302", kExtraHeaders, base::size(kExtraHeaders) / 2, 1)); MockRead data_reads[] = { // Pause on first read. MockRead(ASYNC, ERR_IO_PENDING, 1), CreateMockRead(resp, 2), MockRead(ASYNC, 0, 4), // EOF }; SequencedSocketData data(MockConnect(ASYNC, OK), data_reads, data_writes); SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy proxy_ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_TRUE(session_deps_.host_resolver->has_pending_requests()); // Host resolution takes |kTimeIncrement|. FastForwardBy(kTimeIncrement); // Resolving the current request with |ResolveNow| will cause the pending // request to instantly complete, and the async connect will start as well. session_deps_.host_resolver->ResolveOnlyRequestNow(); // Connecting takes |kTimeIncrement|. FastForwardBy(kTimeIncrement); data.RunUntilPaused(); FastForwardBy(kTimeIncrement); data.Resume(); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); } // Test that an HTTPS proxy's response to a CONNECT request is filtered. TEST_F(HttpNetworkTransactionTest, ErrorResponseToHttpsConnectViaHttpsProxy) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 404 Not Found\r\n"), MockRead("Content-Length: 23\r\n\r\n"), MockRead("The host does not exist"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); // TODO(juliatuttle): Anything else to check here? } // Test that a SPDY proxy's response to a CONNECT request is filtered. TEST_F(HttpNetworkTransactionTest, ErrorResponseToHttpsConnectViaSpdyProxy) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); spdy::SpdySerializedFrame conn(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); spdy::SpdySerializedFrame rst( spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL)); MockWrite data_writes[] = { CreateMockWrite(conn, 0), CreateMockWrite(rst, 3), }; static const char* const kExtraHeaders[] = { "location", "http://login.example.com/", }; spdy::SpdySerializedFrame resp(spdy_util_.ConstructSpdyReplyError( "404", kExtraHeaders, base::size(kExtraHeaders) / 2, 1)); spdy::SpdySerializedFrame body( spdy_util_.ConstructSpdyDataFrame(1, "The host does not exist", true)); MockRead data_reads[] = { CreateMockRead(resp, 1), CreateMockRead(body, 2), MockRead(ASYNC, 0, 4), // EOF }; SequencedSocketData data(data_reads, data_writes); SSLSocketDataProvider proxy_ssl(ASYNC, OK); // SSL to the proxy proxy_ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy_ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); // TODO(juliatuttle): Anything else to check here? } // Test the request-challenge-retry sequence for basic auth, through // a SPDY proxy over a single SPDY session. TEST_F(HttpNetworkTransactionTest, BasicAuthSpdyProxy) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); // when the no authentication data flag is set. request.load_flags = LOAD_DO_NOT_SEND_AUTH_DATA; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "HTTPS myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. spdy::SpdySerializedFrame req(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); spdy::SpdySerializedFrame rst( spdy_util_.ConstructSpdyRstStream(1, spdy::ERROR_CODE_CANCEL)); spdy_util_.UpdateWithStreamDestruction(1); // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. const char* const kAuthCredentials[] = { "proxy-authorization", "Basic Zm9vOmJhcg==", }; spdy::SpdySerializedFrame connect2(spdy_util_.ConstructSpdyConnect( kAuthCredentials, base::size(kAuthCredentials) / 2, 3, HttpProxyConnectJob::kH2QuicTunnelPriority, HostPortPair("www.example.org", 443))); // fetch https://www.example.org/ via HTTP const char get[] = "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get( spdy_util_.ConstructSpdyDataFrame(3, get, false)); MockWrite spdy_writes[] = { CreateMockWrite(req, 0, ASYNC), CreateMockWrite(rst, 2, ASYNC), CreateMockWrite(connect2, 3), CreateMockWrite(wrapped_get, 5), }; // The proxy responds to the connect with a 407, using a persistent // connection. const char kAuthStatus[] = "407"; const char* const kAuthChallenge[] = { "proxy-authenticate", "Basic realm=\"MyRealm1\"", }; spdy::SpdySerializedFrame conn_auth_resp(spdy_util_.ConstructSpdyReplyError( kAuthStatus, kAuthChallenge, base::size(kAuthChallenge) / 2, 1)); spdy::SpdySerializedFrame conn_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); const char resp[] = "HTTP/1.1 200 OK\r\n" "Content-Length: 5\r\n\r\n"; spdy::SpdySerializedFrame wrapped_get_resp( spdy_util_.ConstructSpdyDataFrame(3, resp, false)); spdy::SpdySerializedFrame wrapped_body( spdy_util_.ConstructSpdyDataFrame(3, "hello", false)); MockRead spdy_reads[] = { CreateMockRead(conn_auth_resp, 1, ASYNC), CreateMockRead(conn_resp, 4, ASYNC), CreateMockRead(wrapped_get_resp, 6, ASYNC), CreateMockRead(wrapped_body, 7, ASYNC), MockRead(ASYNC, OK, 8), // EOF. May or may not be read. }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); // Negotiate SPDY to the proxy SSLSocketDataProvider proxy(ASYNC, OK); proxy.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy); // Vanilla SSL to the server SSLSocketDataProvider server(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&server); TestCompletionCallback callback1; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(response->auth_challenge.has_value()); EXPECT_TRUE(CheckBasicSecureProxyAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(5, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); // The password prompt info should not be set. EXPECT_FALSE(response->auth_challenge.has_value()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); trans.reset(); session->CloseAllConnections(); } // Test that an explicitly trusted SPDY proxy can push a resource from an // origin that is different from that of its associated resource. TEST_F(HttpNetworkTransactionTest, CrossOriginSPDYProxyPush) { // Configure the proxy delegate to allow cross-origin SPDY pushes. auto proxy_delegate = std::make_unique<TestProxyDelegate>(); proxy_delegate->set_trusted_spdy_proxy(net::ProxyServer::FromURI( "https://myproxy:443", net::ProxyServer::SCHEME_HTTP)); HttpRequestInfo request; HttpRequestInfo push_request; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); request.method = "GET"; request.url = GURL("http://www.example.org/"); push_request.method = "GET"; push_request.url = GURL("http://www.another-origin.com/foo.dat"); push_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "myproxy:443". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "HTTPS myproxy:443", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); session_deps_.proxy_resolution_service->SetProxyDelegate( proxy_delegate.get()); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); spdy::SpdySerializedFrame stream1_syn( spdy_util_.ConstructSpdyGet("http://www.example.org/", 1, LOWEST)); spdy::SpdySerializedFrame stream2_priority( spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); MockWrite spdy_writes[] = { CreateMockWrite(stream1_syn, 0, ASYNC), CreateMockWrite(stream2_priority, 3, ASYNC), }; spdy::SpdySerializedFrame stream2_syn(spdy_util_.ConstructSpdyPush( nullptr, 0, 2, 1, "http://www.another-origin.com/foo.dat")); spdy::SpdySerializedFrame stream1_reply( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame stream1_body( spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame stream2_body( spdy_util_.ConstructSpdyDataFrame(2, "pushed", true)); MockRead spdy_reads[] = { CreateMockRead(stream2_syn, 1, ASYNC), CreateMockRead(stream1_reply, 2, ASYNC), CreateMockRead(stream1_body, 4, ASYNC), CreateMockRead(stream2_body, 5, ASYNC), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6), // Force a hang }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); // Negotiate SPDY to the proxy SSLSocketDataProvider proxy(ASYNC, OK); proxy.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); auto push_trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = push_trans->Start(&push_request, callback.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* push_response = push_trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); std::string response_data; rv = ReadTransaction(trans.get(), &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello!", response_data); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); // Verify the pushed stream. EXPECT_TRUE(push_response->headers); EXPECT_EQ(200, push_response->headers->response_code()); rv = ReadTransaction(push_trans.get(), &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("pushed", response_data); LoadTimingInfo push_load_timing_info; EXPECT_TRUE(push_trans->GetLoadTimingInfo(&push_load_timing_info)); TestLoadTimingReusedWithPac(push_load_timing_info); // The transactions should share a socket ID, despite being for different // origins. EXPECT_EQ(load_timing_info.socket_log_id, push_load_timing_info.socket_log_id); trans.reset(); push_trans.reset(); session->CloseAllConnections(); } // Test that an explicitly trusted SPDY proxy cannot push HTTPS content. TEST_F(HttpNetworkTransactionTest, CrossOriginProxyPushCorrectness) { // Configure the proxy delegate to allow cross-origin SPDY pushes. auto proxy_delegate = std::make_unique<TestProxyDelegate>(); proxy_delegate->set_trusted_spdy_proxy(net::ProxyServer::FromURI( "https://myproxy:443", net::ProxyServer::SCHEME_HTTP)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://myproxy:443", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); // Enable cross-origin push. session_deps_.proxy_resolution_service->SetProxyDelegate( proxy_delegate.get()); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); spdy::SpdySerializedFrame stream1_syn( spdy_util_.ConstructSpdyGet("http://www.example.org/", 1, LOWEST)); spdy::SpdySerializedFrame push_rst( spdy_util_.ConstructSpdyRstStream(2, spdy::ERROR_CODE_REFUSED_STREAM)); MockWrite spdy_writes[] = { CreateMockWrite(stream1_syn, 0, ASYNC), CreateMockWrite(push_rst, 3), }; spdy::SpdySerializedFrame stream1_reply( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame stream1_body( spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame stream2_syn(spdy_util_.ConstructSpdyPush( nullptr, 0, 2, 1, "https://www.another-origin.com/foo.dat")); MockRead spdy_reads[] = { CreateMockRead(stream1_reply, 1, ASYNC), CreateMockRead(stream2_syn, 2, ASYNC), CreateMockRead(stream1_body, 4, ASYNC), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 5), // Force a hang }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); // Negotiate SPDY to the proxy SSLSocketDataProvider proxy(ASYNC, OK); proxy.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); std::string response_data; rv = ReadTransaction(trans.get(), &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello!", response_data); trans.reset(); session->CloseAllConnections(); } // Test that an explicitly trusted SPDY proxy can push same-origin HTTPS // resources. TEST_F(HttpNetworkTransactionTest, SameOriginProxyPushCorrectness) { // Configure the proxy delegate to allow cross-origin SPDY pushes. auto proxy_delegate = std::make_unique<TestProxyDelegate>(); proxy_delegate->set_trusted_spdy_proxy( net::ProxyServer::FromURI("myproxy:70", net::ProxyServer::SCHEME_HTTP)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against https proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); // Enable cross-origin push. session_deps_.proxy_resolution_service->SetProxyDelegate( proxy_delegate.get()); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); spdy::SpdySerializedFrame stream1_syn( spdy_util_.ConstructSpdyGet("http://www.example.org/", 1, LOWEST)); spdy::SpdySerializedFrame stream2_priority( spdy_util_.ConstructSpdyPriority(2, 1, IDLE, true)); MockWrite spdy_writes[] = { CreateMockWrite(stream1_syn, 0, ASYNC), CreateMockWrite(stream2_priority, 3, ASYNC), }; spdy::SpdySerializedFrame stream1_reply( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame stream2_syn(spdy_util_.ConstructSpdyPush( nullptr, 0, 2, 1, "http://www.example.org/foo.dat")); spdy::SpdySerializedFrame stream1_body( spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame stream2_reply( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame stream2_body( spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { CreateMockRead(stream1_reply, 1, ASYNC), CreateMockRead(stream2_syn, 2, ASYNC), CreateMockRead(stream1_body, 4, ASYNC), CreateMockRead(stream2_body, 5, ASYNC), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 6), // Force a hang }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); // Negotiate SPDY to the proxy SSLSocketDataProvider proxy(ASYNC, OK); proxy.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&proxy); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); std::string response_data; rv = ReadTransaction(trans.get(), &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello!", response_data); trans.reset(); session->CloseAllConnections(); } // Test HTTPS connections to a site with a bad certificate, going through an // HTTPS proxy TEST_F(HttpNetworkTransactionTest, HTTPSBadCertificateViaHttpsProxy) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Attempt to fetch the URL from a server with a bad cert MockWrite bad_cert_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead bad_cert_reads[] = { MockRead("HTTP/1.0 200 Connected\r\n\r\n"), MockRead(SYNCHRONOUS, OK) }; // Attempt to fetch the URL with a good cert MockWrite good_data_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead good_cert_reads[] = { MockRead("HTTP/1.0 200 Connected\r\n\r\n"), MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider ssl_bad_certificate(bad_cert_reads, bad_cert_writes); StaticSocketDataProvider data(good_cert_reads, good_data_writes); SSLSocketDataProvider ssl_bad(ASYNC, ERR_CERT_AUTHORITY_INVALID); SSLSocketDataProvider ssl(ASYNC, OK); // SSL to the proxy, then CONNECT request, then SSL with bad certificate session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); session_deps_.socket_factory->AddSocketDataProvider(&ssl_bad_certificate); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_bad); // SSL to the proxy, then CONNECT request, then valid SSL certificate session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CERT_AUTHORITY_INVALID)); rv = trans.RestartIgnoringLastError(callback.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_EQ(100, response->headers->GetContentLength()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_UserAgent) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.extra_headers.SetHeader(HttpRequestHeaders::kUserAgent, "Chromium Ultra Awesome X Edition"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "User-Agent: Chromium Ultra Awesome X Edition\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_UserAgentOverTunnel) { // Test user agent values, used both for the request header of the original // request, and the value returned by the HttpUserAgentSettings. nullptr means // no request header / no HttpUserAgentSettings object. const char* kTestUserAgents[] = {nullptr, "", "Foopy"}; for (const char* setting_user_agent : kTestUserAgents) { if (!setting_user_agent) { session_deps_.http_user_agent_settings.reset(); } else { session_deps_.http_user_agent_settings = std::make_unique<StaticHttpUserAgentSettings>( std::string() /* accept-language */, setting_user_agent); } session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed("myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); for (const char* request_user_agent : kTestUserAgents) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); if (request_user_agent) { request.extra_headers.SetHeader(HttpRequestHeaders::kUserAgent, request_user_agent); } request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); std::string expected_request; if (!setting_user_agent || strlen(setting_user_agent) == 0) { expected_request = "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"; } else { expected_request = base::StringPrintf( "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "User-Agent: %s\r\n\r\n", setting_user_agent); } MockWrite data_writes[] = { MockWrite(expected_request.c_str()), }; MockRead data_reads[] = { // Return an error, so the transaction stops here (this test isn't // interested in the rest). MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Proxy-Connection: close\r\n\r\n"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } } } TEST_F(HttpNetworkTransactionTest, BuildRequest_Referer) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.extra_headers.SetHeader(HttpRequestHeaders::kReferer, "http://the.previous.site.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Referer: http://the.previous.site.com/\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_PostContentLengthZero) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "POST / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Content-Length: 0\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_PutContentLengthZero) { HttpRequestInfo request; request.method = "PUT"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "PUT / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Content-Length: 0\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_HeadContentLengthZero) { HttpRequestInfo request; request.method = "HEAD"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite("HEAD / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_CacheControlNoCache) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.load_flags = LOAD_BYPASS_CACHE; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Pragma: no-cache\r\n" "Cache-Control: no-cache\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_CacheControlValidateCache) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.load_flags = LOAD_VALIDATE_CACHE; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Cache-Control: max-age=0\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_ExtraHeaders) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.extra_headers.SetHeader("FooHeader", "Bar"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "FooHeader: Bar\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, BuildRequest_ExtraHeadersStripped) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.extra_headers.SetHeader("referer", "www.foo.com"); request.extra_headers.SetHeader("hEllo", "Kitty"); request.extra_headers.SetHeader("FoO", "bar"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "referer: www.foo.com\r\n" "hEllo: Kitty\r\n" "FoO: bar\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } TEST_F(HttpNetworkTransactionTest, SOCKS4_HTTP_GET) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "SOCKS myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); char write_buffer[] = { 0x04, 0x01, 0x00, 0x50, 127, 0, 0, 1, 0 }; char read_buffer[] = { 0x00, 0x5A, 0x00, 0x00, 0, 0, 0, 0 }; MockWrite data_writes[] = { MockWrite(ASYNC, write_buffer, base::size(write_buffer)), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n")}; MockRead data_reads[] = { MockRead(ASYNC, read_buffer, base::size(read_buffer)), MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"), MockRead("Payload"), MockRead(SYNCHRONOUS, OK)}; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_EQ(ProxyServer::SCHEME_SOCKS4, response->proxy_server.scheme()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); std::string response_text; rv = ReadTransaction(&trans, &response_text); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("Payload", response_text); } TEST_F(HttpNetworkTransactionTest, SOCKS4_SSL_GET) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "SOCKS myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); unsigned char write_buffer[] = { 0x04, 0x01, 0x01, 0xBB, 127, 0, 0, 1, 0 }; unsigned char read_buffer[] = { 0x00, 0x5A, 0x00, 0x00, 0, 0, 0, 0 }; MockWrite data_writes[] = { MockWrite(ASYNC, reinterpret_cast<char*>(write_buffer), base::size(write_buffer)), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n")}; MockRead data_reads[] = { MockRead(ASYNC, reinterpret_cast<char*>(read_buffer), base::size(read_buffer)), MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"), MockRead("Payload"), MockRead(SYNCHRONOUS, OK)}; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_EQ(ProxyServer::SCHEME_SOCKS4, response->proxy_server.scheme()); std::string response_text; rv = ReadTransaction(&trans, &response_text); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("Payload", response_text); } TEST_F(HttpNetworkTransactionTest, SOCKS4_HTTP_GET_no_PAC) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "socks4://myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); char write_buffer[] = { 0x04, 0x01, 0x00, 0x50, 127, 0, 0, 1, 0 }; char read_buffer[] = { 0x00, 0x5A, 0x00, 0x00, 0, 0, 0, 0 }; MockWrite data_writes[] = { MockWrite(ASYNC, write_buffer, base::size(write_buffer)), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n")}; MockRead data_reads[] = { MockRead(ASYNC, read_buffer, base::size(read_buffer)), MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"), MockRead("Payload"), MockRead(SYNCHRONOUS, OK)}; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReused(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); std::string response_text; rv = ReadTransaction(&trans, &response_text); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("Payload", response_text); } TEST_F(HttpNetworkTransactionTest, SOCKS5_HTTP_GET) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "SOCKS5 myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); const char kSOCKS5GreetRequest[] = { 0x05, 0x01, 0x00 }; const char kSOCKS5GreetResponse[] = { 0x05, 0x00 }; const char kSOCKS5OkRequest[] = { 0x05, // Version 0x01, // Command (CONNECT) 0x00, // Reserved. 0x03, // Address type (DOMAINNAME). 0x0F, // Length of domain (15) 'w', 'w', 'w', '.', 'e', 'x', 'a', 'm', 'p', 'l', 'e', // Domain string '.', 'o', 'r', 'g', 0x00, 0x50, // 16-bit port (80) }; const char kSOCKS5OkResponse[] = { 0x05, 0x00, 0x00, 0x01, 127, 0, 0, 1, 0x00, 0x50 }; MockWrite data_writes[] = { MockWrite(ASYNC, kSOCKS5GreetRequest, base::size(kSOCKS5GreetRequest)), MockWrite(ASYNC, kSOCKS5OkRequest, base::size(kSOCKS5OkRequest)), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n")}; MockRead data_reads[] = { MockRead(ASYNC, kSOCKS5GreetResponse, base::size(kSOCKS5GreetResponse)), MockRead(ASYNC, kSOCKS5OkResponse, base::size(kSOCKS5OkResponse)), MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"), MockRead("Payload"), MockRead(SYNCHRONOUS, OK)}; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_EQ(ProxyServer::SCHEME_SOCKS5, response->proxy_server.scheme()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); std::string response_text; rv = ReadTransaction(&trans, &response_text); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("Payload", response_text); } TEST_F(HttpNetworkTransactionTest, SOCKS5_SSL_GET) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "SOCKS5 myproxy:1080", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog net_log; session_deps_.net_log = &net_log; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); const char kSOCKS5GreetRequest[] = { 0x05, 0x01, 0x00 }; const char kSOCKS5GreetResponse[] = { 0x05, 0x00 }; const unsigned char kSOCKS5OkRequest[] = { 0x05, // Version 0x01, // Command (CONNECT) 0x00, // Reserved. 0x03, // Address type (DOMAINNAME). 0x0F, // Length of domain (15) 'w', 'w', 'w', '.', 'e', 'x', 'a', 'm', 'p', 'l', 'e', // Domain string '.', 'o', 'r', 'g', 0x01, 0xBB, // 16-bit port (443) }; const char kSOCKS5OkResponse[] = { 0x05, 0x00, 0x00, 0x01, 0, 0, 0, 0, 0x00, 0x00 }; MockWrite data_writes[] = { MockWrite(ASYNC, kSOCKS5GreetRequest, base::size(kSOCKS5GreetRequest)), MockWrite(ASYNC, reinterpret_cast<const char*>(kSOCKS5OkRequest), base::size(kSOCKS5OkRequest)), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n")}; MockRead data_reads[] = { MockRead(ASYNC, kSOCKS5GreetResponse, base::size(kSOCKS5GreetResponse)), MockRead(ASYNC, kSOCKS5OkResponse, base::size(kSOCKS5OkResponse)), MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n\r\n"), MockRead("Payload"), MockRead(SYNCHRONOUS, OK)}; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_EQ(ProxyServer::SCHEME_SOCKS5, response->proxy_server.scheme()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); std::string response_text; rv = ReadTransaction(&trans, &response_text); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("Payload", response_text); } namespace { // Tests that for connection endpoints the group ids are correctly set. struct GroupIdTest { std::string proxy_server; std::string url; ClientSocketPool::GroupId expected_group_id; bool ssl; }; std::unique_ptr<HttpNetworkSession> SetupSessionForGroupIdTests( SpdySessionDependencies* session_deps_) { std::unique_ptr<HttpNetworkSession> session(CreateSession(session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); AlternativeService alternative_service(kProtoHTTP2, "", 444); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort("https", "host.with.alternate", 443), alternative_service, expiration); return session; } int GroupIdTransactionHelper(const std::string& url, HttpNetworkSession* session) { HttpRequestInfo request; request.method = "GET"; request.url = GURL(url); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session); TestCompletionCallback callback; // We do not complete this request, the dtor will clean the transaction up. return trans.Start(&request, callback.callback(), NetLogWithSource()); } } // namespace TEST_F(HttpNetworkTransactionTest, GroupIdForDirectConnections) { const GroupIdTest tests[] = { { "", // unused "http://www.example.org/direct", ClientSocketPool::GroupId(HostPortPair("www.example.org", 80), ClientSocketPool::SocketType::kHttp, PrivacyMode::PRIVACY_MODE_DISABLED), false, }, { "", // unused "http://[2001:1418:13:1::25]/direct", ClientSocketPool::GroupId(HostPortPair("2001:1418:13:1::25", 80), ClientSocketPool::SocketType::kHttp, PrivacyMode::PRIVACY_MODE_DISABLED), false, }, // SSL Tests { "", // unused "https://www.example.org/direct_ssl", ClientSocketPool::GroupId(HostPortPair("www.example.org", 443), ClientSocketPool::SocketType::kSsl, PrivacyMode::PRIVACY_MODE_DISABLED), true, }, { "", // unused "https://[2001:1418:13:1::25]/direct", ClientSocketPool::GroupId(HostPortPair("2001:1418:13:1::25", 443), ClientSocketPool::SocketType::kSsl, PrivacyMode::PRIVACY_MODE_DISABLED), true, }, { "", // unused "https://host.with.alternate/direct", ClientSocketPool::GroupId(HostPortPair("host.with.alternate", 443), ClientSocketPool::SocketType::kSsl, PrivacyMode::PRIVACY_MODE_DISABLED), true, }, }; for (size_t i = 0; i < base::size(tests); ++i) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed(tests[i].proxy_server, TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session( SetupSessionForGroupIdTests(&session_deps_)); HttpNetworkSessionPeer peer(session.get()); CaptureGroupIdTransportSocketPool* transport_conn_pool = new CaptureGroupIdTransportSocketPool(&dummy_connect_job_params_); auto mock_pool_manager = std::make_unique<MockClientSocketPoolManager>(); mock_pool_manager->SetSocketPool(ProxyServer::Direct(), base::WrapUnique(transport_conn_pool)); peer.SetClientSocketPoolManager(std::move(mock_pool_manager)); EXPECT_EQ(ERR_IO_PENDING, GroupIdTransactionHelper(tests[i].url, session.get())); EXPECT_EQ(tests[i].expected_group_id, transport_conn_pool->last_group_id_received()); EXPECT_TRUE(transport_conn_pool->socket_requested()); } } TEST_F(HttpNetworkTransactionTest, GroupIdForHTTPProxyConnections) { const GroupIdTest tests[] = { { "http_proxy", "http://www.example.org/http_proxy_normal", ClientSocketPool::GroupId(HostPortPair("www.example.org", 80), ClientSocketPool::SocketType::kHttp, PrivacyMode::PRIVACY_MODE_DISABLED), false, }, // SSL Tests { "http_proxy", "https://www.example.org/http_connect_ssl", ClientSocketPool::GroupId(HostPortPair("www.example.org", 443), ClientSocketPool::SocketType::kSsl, PrivacyMode::PRIVACY_MODE_DISABLED), true, }, { "http_proxy", "https://host.with.alternate/direct", ClientSocketPool::GroupId(HostPortPair("host.with.alternate", 443), ClientSocketPool::SocketType::kSsl, PrivacyMode::PRIVACY_MODE_DISABLED), true, }, { "http_proxy", "ftp://ftp.google.com/http_proxy_normal", ClientSocketPool::GroupId(HostPortPair("ftp.google.com", 21), ClientSocketPool::SocketType::kFtp, PrivacyMode::PRIVACY_MODE_DISABLED), false, }, }; for (size_t i = 0; i < base::size(tests); ++i) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed(tests[i].proxy_server, TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session( SetupSessionForGroupIdTests(&session_deps_)); HttpNetworkSessionPeer peer(session.get()); ProxyServer proxy_server(ProxyServer::SCHEME_HTTP, HostPortPair("http_proxy", 80)); CaptureGroupIdTransportSocketPool* http_proxy_pool = new CaptureGroupIdTransportSocketPool(&dummy_connect_job_params_); auto mock_pool_manager = std::make_unique<MockClientSocketPoolManager>(); mock_pool_manager->SetSocketPool(proxy_server, base::WrapUnique(http_proxy_pool)); peer.SetClientSocketPoolManager(std::move(mock_pool_manager)); EXPECT_EQ(ERR_IO_PENDING, GroupIdTransactionHelper(tests[i].url, session.get())); EXPECT_EQ(tests[i].expected_group_id, http_proxy_pool->last_group_id_received()); } } TEST_F(HttpNetworkTransactionTest, GroupIdForSOCKSConnections) { const GroupIdTest tests[] = { { "socks4://socks_proxy:1080", "http://www.example.org/socks4_direct", ClientSocketPool::GroupId(HostPortPair("www.example.org", 80), ClientSocketPool::SocketType::kHttp, PrivacyMode::PRIVACY_MODE_DISABLED), false, }, { "socks5://socks_proxy:1080", "http://www.example.org/socks5_direct", ClientSocketPool::GroupId(HostPortPair("www.example.org", 80), ClientSocketPool::SocketType::kHttp, PrivacyMode::PRIVACY_MODE_DISABLED), false, }, // SSL Tests { "socks4://socks_proxy:1080", "https://www.example.org/socks4_ssl", ClientSocketPool::GroupId(HostPortPair("www.example.org", 443), ClientSocketPool::SocketType::kSsl, PrivacyMode::PRIVACY_MODE_DISABLED), true, }, { "socks5://socks_proxy:1080", "https://www.example.org/socks5_ssl", ClientSocketPool::GroupId(HostPortPair("www.example.org", 443), ClientSocketPool::SocketType::kSsl, PrivacyMode::PRIVACY_MODE_DISABLED), true, }, { "socks4://socks_proxy:1080", "https://host.with.alternate/direct", ClientSocketPool::GroupId(HostPortPair("host.with.alternate", 443), ClientSocketPool::SocketType::kSsl, PrivacyMode::PRIVACY_MODE_DISABLED), true, }, }; for (size_t i = 0; i < base::size(tests); ++i) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed(tests[i].proxy_server, TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session( SetupSessionForGroupIdTests(&session_deps_)); HttpNetworkSessionPeer peer(session.get()); ProxyServer proxy_server( ProxyServer::FromURI(tests[i].proxy_server, ProxyServer::SCHEME_HTTP)); ASSERT_TRUE(proxy_server.is_valid()); CaptureGroupIdTransportSocketPool* socks_conn_pool = new CaptureGroupIdTransportSocketPool(&dummy_connect_job_params_); auto mock_pool_manager = std::make_unique<MockClientSocketPoolManager>(); mock_pool_manager->SetSocketPool(proxy_server, base::WrapUnique(socks_conn_pool)); peer.SetClientSocketPoolManager(std::move(mock_pool_manager)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); EXPECT_EQ(ERR_IO_PENDING, GroupIdTransactionHelper(tests[i].url, session.get())); EXPECT_EQ(tests[i].expected_group_id, socks_conn_pool->last_group_id_received()); } } TEST_F(HttpNetworkTransactionTest, ReconsiderProxyAfterFailedConnection) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70;foobar:80", TRAFFIC_ANNOTATION_FOR_TESTS); // This simulates failure resolving all hostnames; that means we will fail // connecting to both proxies (myproxy:70 and foobar:80). session_deps_.host_resolver->rules()->AddSimulatedFailure("*"); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_PROXY_CONNECTION_FAILED)); } // Make sure we can handle an error when writing the request. TEST_F(HttpNetworkTransactionTest, RequestWriteError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite write_failure[] = { MockWrite(ASYNC, ERR_CONNECTION_RESET), }; StaticSocketDataProvider data(base::span<MockRead>(), write_failure); session_deps_.socket_factory->AddSocketDataProvider(&data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); IPEndPoint endpoint; EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint)); EXPECT_LT(0u, endpoint.address().size()); } // Check that a connection closed after the start of the headers finishes ok. TEST_F(HttpNetworkTransactionTest, ConnectionClosedAfterStartOfHeaders) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.foo.com/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockRead data_reads[] = { MockRead("HTTP/1."), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("", response_data); IPEndPoint endpoint; EXPECT_TRUE(trans.GetRemoteEndpoint(&endpoint)); EXPECT_LT(0u, endpoint.address().size()); } // Make sure that a dropped connection while draining the body for auth // restart does the right thing. TEST_F(HttpNetworkTransactionTest, DrainResetOK) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes1[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 401 Unauthorized\r\n"), MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 14\r\n\r\n"), MockRead("Unauth"), MockRead(ASYNC, ERR_CONNECTION_RESET), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); // After calling trans.RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite data_writes2[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), }; // Lastly, the server responds with the actual content. MockRead data_reads2[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(CheckBasicServerAuth(response->auth_challenge)); TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(100, response->headers->GetContentLength()); } // Test HTTPS connections going through a proxy that sends extra data. TEST_F(HttpNetworkTransactionTest, HTTPSViaProxyWithExtraData) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockRead proxy_reads[] = { MockRead("HTTP/1.0 200 Connected\r\n\r\nExtra data"), MockRead(SYNCHRONOUS, OK) }; StaticSocketDataProvider data(proxy_reads, base::span<MockWrite>()); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; session_deps_.socket_factory->ResetNextMockIndexes(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); } TEST_F(HttpNetworkTransactionTest, LargeContentLengthThenClose) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\nContent-Length:6719476739\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH)); } TEST_F(HttpNetworkTransactionTest, UploadFileSmallerThanLength) { base::FilePath temp_file_path; ASSERT_TRUE(base::CreateTemporaryFile(&temp_file_path)); const uint64_t kFakeSize = 100000; // file is actually blank UploadFileElementReader::ScopedOverridingContentLengthForTests overriding_content_length(kFakeSize); std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back(std::make_unique<UploadFileElementReader>( base::ThreadTaskRunnerHandle::Get().get(), temp_file_path, 0, std::numeric_limits<uint64_t>::max(), base::Time())); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.example.org/upload"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_UPLOAD_FILE_CHANGED)); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->headers); base::DeleteFile(temp_file_path, false); } TEST_F(HttpNetworkTransactionTest, UploadUnreadableFile) { base::FilePath temp_file; ASSERT_TRUE(base::CreateTemporaryFile(&temp_file)); std::string temp_file_content("Unreadable file."); ASSERT_EQ(static_cast<int>(temp_file_content.length()), base::WriteFile(temp_file, temp_file_content.c_str(), temp_file_content.length())); ASSERT_TRUE(base::MakeFileUnreadable(temp_file)); std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back(std::make_unique<UploadFileElementReader>( base::ThreadTaskRunnerHandle::Get().get(), temp_file, 0, std::numeric_limits<uint64_t>::max(), base::Time())); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.example.org/upload"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // If we try to upload an unreadable file, the transaction should fail. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); StaticSocketDataProvider data; session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_ACCESS_DENIED)); base::DeleteFile(temp_file, false); } TEST_F(HttpNetworkTransactionTest, CancelDuringInitRequestBody) { class FakeUploadElementReader : public UploadElementReader { public: FakeUploadElementReader() = default; ~FakeUploadElementReader() override = default; CompletionOnceCallback TakeCallback() { return std::move(callback_); } // UploadElementReader overrides: int Init(CompletionOnceCallback callback) override { callback_ = std::move(callback); return ERR_IO_PENDING; } uint64_t GetContentLength() const override { return 0; } uint64_t BytesRemaining() const override { return 0; } int Read(IOBuffer* buf, int buf_length, CompletionOnceCallback callback) override { return ERR_FAILED; } private: CompletionOnceCallback callback_; }; FakeUploadElementReader* fake_reader = new FakeUploadElementReader; std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back(base::WrapUnique(fake_reader)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.example.org/upload"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); StaticSocketDataProvider data; session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); base::RunLoop().RunUntilIdle(); // Transaction is pending on request body initialization. CompletionOnceCallback init_callback = fake_reader->TakeCallback(); ASSERT_FALSE(init_callback.is_null()); // Return Init()'s result after the transaction gets destroyed. trans.reset(); std::move(init_callback).Run(OK); // Should not crash. } // Tests that changes to Auth realms are treated like auth rejections. TEST_F(HttpNetworkTransactionTest, ChangeAuthRealms) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // First transaction will request a resource and receive a Basic challenge // with realm="first_realm". MockWrite data_writes1[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 401 Unauthorized\r\n" "WWW-Authenticate: Basic realm=\"first_realm\"\r\n" "\r\n"), }; // After calling trans.RestartWithAuth(), provide an Authentication header // for first_realm. The server will reject and provide a challenge with // second_realm. MockWrite data_writes2[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zmlyc3Q6YmF6\r\n" "\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 401 Unauthorized\r\n" "WWW-Authenticate: Basic realm=\"second_realm\"\r\n" "\r\n"), }; // This again fails, and goes back to first_realm. Make sure that the // entry is removed from cache. MockWrite data_writes3[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic c2Vjb25kOmZvdQ==\r\n" "\r\n"), }; MockRead data_reads3[] = { MockRead("HTTP/1.1 401 Unauthorized\r\n" "WWW-Authenticate: Basic realm=\"first_realm\"\r\n" "\r\n"), }; // Try one last time (with the correct password) and get the resource. MockWrite data_writes4[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zmlyc3Q6YmFy\r\n" "\r\n"), }; MockRead data_reads4[] = { MockRead("HTTP/1.1 200 OK\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 5\r\n" "\r\n" "hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); StaticSocketDataProvider data3(data_reads3, data_writes3); StaticSocketDataProvider data4(data_reads4, data_writes4); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); session_deps_.socket_factory->AddSocketDataProvider(&data3); session_deps_.socket_factory->AddSocketDataProvider(&data4); TestCompletionCallback callback1; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Issue the first request with Authorize headers. There should be a // password prompt for first_realm waiting to be filled in after the // transaction completes. int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); base::Optional<AuthChallengeInfo> challenge = response->auth_challenge; ASSERT_TRUE(challenge); EXPECT_FALSE(challenge->is_proxy); EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize()); EXPECT_EQ("first_realm", challenge->realm); EXPECT_EQ(kBasicAuthScheme, challenge->scheme); // Issue the second request with an incorrect password. There should be a // password prompt for second_realm waiting to be filled in after the // transaction completes. TestCompletionCallback callback2; rv = trans.RestartWithAuth(AuthCredentials(kFirst, kBaz), callback2.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback2.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); challenge = response->auth_challenge; ASSERT_TRUE(challenge); EXPECT_FALSE(challenge->is_proxy); EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize()); EXPECT_EQ("second_realm", challenge->realm); EXPECT_EQ(kBasicAuthScheme, challenge->scheme); // Issue the third request with another incorrect password. There should be // a password prompt for first_realm waiting to be filled in. If the password // prompt is not present, it indicates that the HttpAuthCacheEntry for // first_realm was not correctly removed. TestCompletionCallback callback3; rv = trans.RestartWithAuth(AuthCredentials(kSecond, kFou), callback3.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback3.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); challenge = response->auth_challenge; ASSERT_TRUE(challenge); EXPECT_FALSE(challenge->is_proxy); EXPECT_EQ("http://www.example.org", challenge->challenger.Serialize()); EXPECT_EQ("first_realm", challenge->realm); EXPECT_EQ(kBasicAuthScheme, challenge->scheme); // Issue the fourth request with the correct password and username. TestCompletionCallback callback4; rv = trans.RestartWithAuth(AuthCredentials(kFirst, kBar), callback4.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback4.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); } // Regression test for https://crbug.com/754395. TEST_F(HttpNetworkTransactionTest, IgnoreAltSvcWithInvalidCert) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl.ssl_info.cert); ssl.ssl_info.cert_status = CERT_STATUS_COMMON_NAME_INVALID; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); url::SchemeHostPort test_server(request.url); HttpServerProperties* http_server_properties = session->http_server_properties(); EXPECT_TRUE( http_server_properties->GetAlternativeServiceInfos(test_server).empty()); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_FALSE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); EXPECT_TRUE( http_server_properties->GetAlternativeServiceInfos(test_server).empty()); } TEST_F(HttpNetworkTransactionTest, HonorAlternativeServiceHeader) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl.ssl_info.cert); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); url::SchemeHostPort test_server(request.url); HttpServerProperties* http_server_properties = session->http_server_properties(); EXPECT_TRUE( http_server_properties->GetAlternativeServiceInfos(test_server).empty()); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_FALSE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); AlternativeServiceInfoVector alternative_service_info_vector = http_server_properties->GetAlternativeServiceInfos(test_server); ASSERT_EQ(1u, alternative_service_info_vector.size()); AlternativeService alternative_service(kProtoHTTP2, "mail.example.org", 443); EXPECT_EQ(alternative_service, alternative_service_info_vector[0].alternative_service()); } // Regression test for https://crbug.com/615497. TEST_F(HttpNetworkTransactionTest, DoNotParseAlternativeServiceHeaderOnInsecureRequest) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.load_flags = 0; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); url::SchemeHostPort test_server(request.url); HttpServerProperties* http_server_properties = session->http_server_properties(); EXPECT_TRUE( http_server_properties->GetAlternativeServiceInfos(test_server).empty()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_FALSE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); EXPECT_TRUE( http_server_properties->GetAlternativeServiceInfos(test_server).empty()); } // HTTP/2 Alternative Services should be disabled by default. // TODO(bnc): Remove when https://crbug.com/615413 is fixed. TEST_F(HttpNetworkTransactionTest, DisableHTTP2AlternativeServicesWithDifferentHost) { session_deps_.enable_http2_alternative_service = false; HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.load_flags = 0; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED); StaticSocketDataProvider first_data; first_data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&first_data); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); AlternativeService alternative_service(kProtoHTTP2, "different.example.org", 444); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort(request.url), alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); // Alternative service is not used, request fails. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED)); } // Regression test for https://crbug.com/615497: // Alternative Services should be disabled for http origin. TEST_F(HttpNetworkTransactionTest, DisableAlternativeServicesForInsecureOrigin) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.load_flags = 0; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED); StaticSocketDataProvider first_data; first_data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&first_data); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); AlternativeService alternative_service(kProtoHTTP2, "", 444); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort(request.url), alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); // Alternative service is not used, request fails. EXPECT_THAT(callback.GetResult(rv), IsError(ERR_CONNECTION_REFUSED)); } TEST_F(HttpNetworkTransactionTest, ClearAlternativeServices) { // Set an alternative service for origin. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); url::SchemeHostPort test_server("https", "www.example.org", 443); AlternativeService alternative_service(kProtoQUIC, "", 80); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetQuicAlternativeService( test_server, alternative_service, expiration, session->params().quic_supported_versions); EXPECT_EQ( 1u, http_server_properties->GetAlternativeServiceInfos(test_server).size()); // Send a clear header. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Alt-Svc: clear\r\n"), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl.ssl_info.cert); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_FALSE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); EXPECT_TRUE( http_server_properties->GetAlternativeServiceInfos(test_server).empty()); } TEST_F(HttpNetworkTransactionTest, HonorMultipleAlternativeServiceHeaders) { MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Alt-Svc: h2=\"www.example.com:443\","), MockRead("h2=\":1234\"\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl.ssl_info.cert); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); url::SchemeHostPort test_server("https", "www.example.org", 443); HttpServerProperties* http_server_properties = session->http_server_properties(); EXPECT_TRUE( http_server_properties->GetAlternativeServiceInfos(test_server).empty()); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_FALSE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); AlternativeServiceInfoVector alternative_service_info_vector = http_server_properties->GetAlternativeServiceInfos(test_server); ASSERT_EQ(2u, alternative_service_info_vector.size()); AlternativeService alternative_service(kProtoHTTP2, "www.example.com", 443); EXPECT_EQ(alternative_service, alternative_service_info_vector[0].alternative_service()); AlternativeService alternative_service_2(kProtoHTTP2, "www.example.org", 1234); EXPECT_EQ(alternative_service_2, alternative_service_info_vector[1].alternative_service()); } TEST_F(HttpNetworkTransactionTest, IdentifyQuicBroken) { url::SchemeHostPort server("https", "origin.example.org", 443); HostPortPair alternative("alternative.example.org", 443); std::string origin_url = "https://origin.example.org:443"; std::string alternative_url = "https://alternative.example.org:443"; // Negotiate HTTP/1.1 with alternative.example.org. SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); // HTTP/1.1 data for request. MockWrite http_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: alternative.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead http_reads[] = { MockRead("HTTP/1.1 200 OK\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 40\r\n\r\n" "first HTTP/1.1 response from alternative"), }; StaticSocketDataProvider http_data(http_reads, http_writes); session_deps_.socket_factory->AddSocketDataProvider(&http_data); StaticSocketDataProvider data_refused; data_refused.set_connect_data(MockConnect(ASYNC, ERR_CONNECTION_REFUSED)); session_deps_.socket_factory->AddSocketDataProvider(&data_refused); // Set up a QUIC alternative service for server. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); AlternativeService alternative_service(kProtoQUIC, alternative); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetQuicAlternativeService( server, alternative_service, expiration, HttpNetworkSession::Params().quic_supported_versions); // Mark the QUIC alternative service as broken. http_server_properties->MarkAlternativeServiceBroken(alternative_service); HttpRequestInfo request; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); request.method = "GET"; request.url = GURL(origin_url); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback; NetErrorDetails details; EXPECT_FALSE(details.quic_broken); trans.Start(&request, callback.callback(), NetLogWithSource()); trans.PopulateNetErrorDetails(&details); EXPECT_TRUE(details.quic_broken); } TEST_F(HttpNetworkTransactionTest, IdentifyQuicNotBroken) { url::SchemeHostPort server("https", "origin.example.org", 443); HostPortPair alternative1("alternative1.example.org", 443); HostPortPair alternative2("alternative2.example.org", 443); std::string origin_url = "https://origin.example.org:443"; std::string alternative_url1 = "https://alternative1.example.org:443"; std::string alternative_url2 = "https://alternative2.example.org:443"; // Negotiate HTTP/1.1 with alternative1.example.org. SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); // HTTP/1.1 data for request. MockWrite http_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: alternative1.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead http_reads[] = { MockRead("HTTP/1.1 200 OK\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 40\r\n\r\n" "first HTTP/1.1 response from alternative1"), }; StaticSocketDataProvider http_data(http_reads, http_writes); session_deps_.socket_factory->AddSocketDataProvider(&http_data); StaticSocketDataProvider data_refused; data_refused.set_connect_data(MockConnect(ASYNC, ERR_CONNECTION_REFUSED)); session_deps_.socket_factory->AddSocketDataProvider(&data_refused); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); // Set up two QUIC alternative services for server. AlternativeServiceInfoVector alternative_service_info_vector; base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); AlternativeService alternative_service1(kProtoQUIC, alternative1); alternative_service_info_vector.push_back( AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( alternative_service1, expiration, session->params().quic_supported_versions)); AlternativeService alternative_service2(kProtoQUIC, alternative2); alternative_service_info_vector.push_back( AlternativeServiceInfo::CreateQuicAlternativeServiceInfo( alternative_service2, expiration, session->params().quic_supported_versions)); http_server_properties->SetAlternativeServices( server, alternative_service_info_vector); // Mark one of the QUIC alternative service as broken. http_server_properties->MarkAlternativeServiceBroken(alternative_service1); EXPECT_EQ(2u, http_server_properties->GetAlternativeServiceInfos(server).size()); HttpRequestInfo request; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); request.method = "GET"; request.url = GURL(origin_url); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback; NetErrorDetails details; EXPECT_FALSE(details.quic_broken); trans.Start(&request, callback.callback(), NetLogWithSource()); trans.PopulateNetErrorDetails(&details); EXPECT_FALSE(details.quic_broken); } TEST_F(HttpNetworkTransactionTest, MarkBrokenAlternateProtocolAndFallback) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED); StaticSocketDataProvider first_data; first_data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&first_data); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); const url::SchemeHostPort server(request.url); // Port must be < 1024, or the header will be ignored (since initial port was // port 80 (another restricted port). // Port is ignored by MockConnect anyway. const AlternativeService alternative_service(kProtoHTTP2, "www.example.org", 666); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( server, alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); const AlternativeServiceInfoVector alternative_service_info_vector = http_server_properties->GetAlternativeServiceInfos(server); ASSERT_EQ(1u, alternative_service_info_vector.size()); EXPECT_EQ(alternative_service, alternative_service_info_vector[0].alternative_service()); EXPECT_TRUE( http_server_properties->IsAlternativeServiceBroken(alternative_service)); } // Ensure that we are not allowed to redirect traffic via an alternate protocol // to an unrestricted (port >= 1024) when the original traffic was on a // restricted port (port < 1024). Ensure that we can redirect in all other // cases. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortRestrictedBlocked) { HttpRequestInfo restricted_port_request; restricted_port_request.method = "GET"; restricted_port_request.url = GURL("https://www.example.org:1023/"); restricted_port_request.load_flags = 0; restricted_port_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED); StaticSocketDataProvider first_data; first_data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&first_data); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_data); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); const int kUnrestrictedAlternatePort = 1024; AlternativeService alternative_service(kProtoHTTP2, "www.example.org", kUnrestrictedAlternatePort); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort(restricted_port_request.url), alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&restricted_port_request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Invalid change to unrestricted port should fail. EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_REFUSED)); } // Ensure that we are allowed to redirect traffic via an alternate protocol to // an unrestricted (port >= 1024) when the original traffic was on a restricted // port (port < 1024) if we set |enable_user_alternate_protocol_ports|. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortRestrictedPermitted) { session_deps_.enable_user_alternate_protocol_ports = true; HttpRequestInfo restricted_port_request; restricted_port_request.method = "GET"; restricted_port_request.url = GURL("https://www.example.org:1023/"); restricted_port_request.load_flags = 0; restricted_port_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED); StaticSocketDataProvider first_data; first_data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&first_data); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_data); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); const int kUnrestrictedAlternatePort = 1024; AlternativeService alternative_service(kProtoHTTP2, "www.example.org", kUnrestrictedAlternatePort); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort(restricted_port_request.url), alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; EXPECT_EQ(ERR_IO_PENDING, trans.Start(&restricted_port_request, callback.callback(), NetLogWithSource())); // Change to unrestricted port should succeed. EXPECT_THAT(callback.WaitForResult(), IsOk()); } // Ensure that we are not allowed to redirect traffic via an alternate protocol // to an unrestricted (port >= 1024) when the original traffic was on a // restricted port (port < 1024). Ensure that we can redirect in all other // cases. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortRestrictedAllowed) { HttpRequestInfo restricted_port_request; restricted_port_request.method = "GET"; restricted_port_request.url = GURL("https://www.example.org:1023/"); restricted_port_request.load_flags = 0; restricted_port_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED); StaticSocketDataProvider first_data; first_data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&first_data); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); const int kRestrictedAlternatePort = 80; AlternativeService alternative_service(kProtoHTTP2, "www.example.org", kRestrictedAlternatePort); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort(restricted_port_request.url), alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&restricted_port_request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Valid change to restricted port should pass. EXPECT_THAT(callback.WaitForResult(), IsOk()); } // Ensure that we are not allowed to redirect traffic via an alternate protocol // to an unrestricted (port >= 1024) when the original traffic was on a // restricted port (port < 1024). Ensure that we can redirect in all other // cases. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortUnrestrictedAllowed1) { HttpRequestInfo unrestricted_port_request; unrestricted_port_request.method = "GET"; unrestricted_port_request.url = GURL("https://www.example.org:1024/"); unrestricted_port_request.load_flags = 0; unrestricted_port_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED); StaticSocketDataProvider first_data; first_data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&first_data); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_data); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); const int kRestrictedAlternatePort = 80; AlternativeService alternative_service(kProtoHTTP2, "www.example.org", kRestrictedAlternatePort); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort(unrestricted_port_request.url), alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&unrestricted_port_request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Valid change to restricted port should pass. EXPECT_THAT(callback.WaitForResult(), IsOk()); } // Ensure that we are not allowed to redirect traffic via an alternate protocol // to an unrestricted (port >= 1024) when the original traffic was on a // restricted port (port < 1024). Ensure that we can redirect in all other // cases. TEST_F(HttpNetworkTransactionTest, AlternateProtocolPortUnrestrictedAllowed2) { HttpRequestInfo unrestricted_port_request; unrestricted_port_request.method = "GET"; unrestricted_port_request.url = GURL("https://www.example.org:1024/"); unrestricted_port_request.load_flags = 0; unrestricted_port_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockConnect mock_connect(ASYNC, ERR_CONNECTION_REFUSED); StaticSocketDataProvider first_data; first_data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&first_data); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider second_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); const int kUnrestrictedAlternatePort = 1025; AlternativeService alternative_service(kProtoHTTP2, "www.example.org", kUnrestrictedAlternatePort); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort(unrestricted_port_request.url), alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&unrestricted_port_request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Valid change to an unrestricted port should pass. EXPECT_THAT(callback.WaitForResult(), IsOk()); } // Ensure that we are not allowed to redirect traffic via an alternate protocol // to an unsafe port, and that we resume the second HttpStreamFactory::Job once // the alternate protocol request fails. TEST_F(HttpNetworkTransactionTest, AlternateProtocolUnsafeBlocked) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // The alternate protocol request will error out before we attempt to connect, // so only the standard HTTP request will try to connect. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); const int kUnsafePort = 7; AlternativeService alternative_service(kProtoHTTP2, "www.example.org", kUnsafePort); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( url::SchemeHostPort(request.url), alternative_service, expiration); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // The HTTP request should succeed. EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); } TEST_F(HttpNetworkTransactionTest, UseAlternateProtocolForNpnSpdy) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), MockRead(ASYNC, OK)}; StaticSocketDataProvider first_transaction(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&first_transaction); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); AddSSLSocketData(); spdy::SpdySerializedFrame req( spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST)); MockWrite spdy_writes[] = {CreateMockWrite(req, 0)}; spdy::SpdySerializedFrame resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING); StaticSocketDataProvider hanging_non_alternate_protocol_socket; hanging_non_alternate_protocol_socket.set_connect_data( never_finishing_connect); session_deps_.socket_factory->AddSocketDataProvider( &hanging_non_alternate_protocol_socket); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello!", response_data); } TEST_F(HttpNetworkTransactionTest, AlternateProtocolWithSpdyLateBinding) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // First transaction receives Alt-Svc header over HTTP/1.1. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), MockRead(ASYNC, OK), }; StaticSocketDataProvider http11_data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&http11_data); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl_http11.ssl_info.cert); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); // Second transaction starts an alternative and a non-alternative Job. // Both sockets hang. MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING); StaticSocketDataProvider hanging_socket1; hanging_socket1.set_connect_data(never_finishing_connect); session_deps_.socket_factory->AddSocketDataProvider(&hanging_socket1); StaticSocketDataProvider hanging_socket2; hanging_socket2.set_connect_data(never_finishing_connect); session_deps_.socket_factory->AddSocketDataProvider(&hanging_socket2); // Third transaction starts an alternative and a non-alternative job. // The non-alternative job hangs, but the alternative one succeeds. // The second transaction, still pending, binds to this socket. spdy::SpdySerializedFrame req1( spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST)); spdy::SpdySerializedFrame req2( spdy_util_.ConstructSpdyGet("https://www.example.org/", 3, LOWEST)); MockWrite spdy_writes[] = { CreateMockWrite(req1, 0), CreateMockWrite(req2, 1), }; spdy::SpdySerializedFrame resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data1(spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame resp2( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); spdy::SpdySerializedFrame data2(spdy_util_.ConstructSpdyDataFrame(3, true)); MockRead spdy_reads[] = { CreateMockRead(resp1, 2), CreateMockRead(data1, 3), CreateMockRead(resp2, 4), CreateMockRead(data2, 5), MockRead(ASYNC, 0, 6), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); AddSSLSocketData(); StaticSocketDataProvider hanging_socket3; hanging_socket3.set_connect_data(never_finishing_connect); session_deps_.socket_factory->AddSocketDataProvider(&hanging_socket3); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback1; HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get()); int rv = trans1.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback1.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); TestCompletionCallback callback2; HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); rv = trans2.Start(&request, callback2.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); TestCompletionCallback callback3; HttpNetworkTransaction trans3(DEFAULT_PRIORITY, session.get()); rv = trans3.Start(&request, callback3.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback2.WaitForResult(), IsOk()); EXPECT_THAT(callback3.WaitForResult(), IsOk()); response = trans2.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); response = trans3.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(&trans3, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); } TEST_F(HttpNetworkTransactionTest, StallAlternativeServiceForNpnSpdy) { session_deps_.host_resolver->set_synchronous_mode(true); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), MockRead(ASYNC, OK), }; StaticSocketDataProvider first_transaction(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&first_transaction); SSLSocketDataProvider ssl(ASYNC, OK); ssl.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl.ssl_info.cert); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING); StaticSocketDataProvider hanging_alternate_protocol_socket; hanging_alternate_protocol_socket.set_connect_data( never_finishing_connect); session_deps_.socket_factory->AddSocketDataProvider( &hanging_alternate_protocol_socket); // 2nd request is just a copy of the first one, over HTTP/1.1 again. StaticSocketDataProvider second_transaction(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&second_transaction); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_FALSE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); } // Test that proxy is resolved using the origin url, // regardless of the alternative server. TEST_F(HttpNetworkTransactionTest, UseOriginNotAlternativeForProxy) { // Configure proxy to bypass www.example.org, which is the origin URL. ProxyConfig proxy_config; proxy_config.proxy_rules().ParseFromString("myproxy:70"); proxy_config.proxy_rules().bypass_rules.AddRuleFromString("www.example.org"); auto proxy_config_service = std::make_unique<ProxyConfigServiceFixed>( ProxyConfigWithAnnotation(proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)); CapturingProxyResolver capturing_proxy_resolver; auto proxy_resolver_factory = std::make_unique<CapturingProxyResolverFactory>( &capturing_proxy_resolver); TestNetLog net_log; session_deps_.proxy_resolution_service = std::make_unique<ProxyResolutionService>( std::move(proxy_config_service), std::move(proxy_resolver_factory), &net_log); session_deps_.net_log = &net_log; // Configure alternative service with a hostname that is not bypassed by the // proxy. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); url::SchemeHostPort server("https", "www.example.org", 443); HostPortPair alternative("www.example.com", 443); AlternativeService alternative_service(kProtoHTTP2, alternative); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( server, alternative_service, expiration); // Non-alternative job should hang. MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING); StaticSocketDataProvider hanging_alternate_protocol_socket; hanging_alternate_protocol_socket.set_connect_data(never_finishing_connect); session_deps_.socket_factory->AddSocketDataProvider( &hanging_alternate_protocol_socket); AddSSLSocketData(); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.load_flags = 0; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); spdy::SpdySerializedFrame req( spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST)); MockWrite spdy_writes[] = {CreateMockWrite(req, 0)}; spdy::SpdySerializedFrame resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); // Origin host bypasses proxy, no resolution should have happened. ASSERT_TRUE(capturing_proxy_resolver.resolved().empty()); } TEST_F(HttpNetworkTransactionTest, UseAlternativeServiceForTunneledNpnSpdy) { ProxyConfig proxy_config; proxy_config.set_auto_detect(true); proxy_config.set_pac_url(GURL("http://fooproxyurl")); CapturingProxyResolver capturing_proxy_resolver; session_deps_.proxy_resolution_service = std::make_unique<ProxyResolutionService>( std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation( proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)), std::make_unique<CapturingProxyResolverFactory>( &capturing_proxy_resolver), nullptr); TestNetLog net_log; session_deps_.net_log = &net_log; HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, ERR_TEST_PEER_CLOSE_AFTER_NEXT_MOCK_READ), MockRead(ASYNC, OK), }; StaticSocketDataProvider first_transaction(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&first_transaction); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); AddSSLSocketData(); spdy::SpdySerializedFrame req( spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST)); MockWrite spdy_writes[] = { MockWrite(ASYNC, 0, "CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), CreateMockWrite(req, 2), }; const char kCONNECTResponse[] = "HTTP/1.1 200 Connected\r\n\r\n"; spdy::SpdySerializedFrame resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { MockRead(ASYNC, 1, kCONNECTResponse), CreateMockRead(resp, 3), CreateMockRead(data, 4), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 5), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); MockConnect never_finishing_connect(SYNCHRONOUS, ERR_IO_PENDING); StaticSocketDataProvider hanging_non_alternate_protocol_socket; hanging_non_alternate_protocol_socket.set_connect_data( never_finishing_connect); session_deps_.socket_factory->AddSocketDataProvider( &hanging_non_alternate_protocol_socket); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/0.9 200 OK", response->headers->GetStatusLine()); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello!", response_data); ASSERT_EQ(2u, capturing_proxy_resolver.resolved().size()); EXPECT_EQ("https://www.example.org/", capturing_proxy_resolver.resolved()[0].spec()); EXPECT_EQ("https://www.example.org/", capturing_proxy_resolver.resolved()[1].spec()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans->GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); } TEST_F(HttpNetworkTransactionTest, UseAlternativeServiceForNpnSpdyWithExistingSpdySession) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider first_transaction(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&first_transaction); SSLSocketDataProvider ssl_http11(ASYNC, OK); ssl_http11.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_http11); AddSSLSocketData(); spdy::SpdySerializedFrame req( spdy_util_.ConstructSpdyGet("https://www.example.org/", 1, LOWEST)); MockWrite spdy_writes[] = {CreateMockWrite(req, 0)}; spdy::SpdySerializedFrame resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); // Set up an initial SpdySession in the pool to reuse. HostPortPair host_port_pair("www.example.org", 443); SpdySessionKey key(host_port_pair, ProxyServer::Direct(), PRIVACY_MODE_DISABLED, SpdySessionKey::IsProxySession::kFalse, SocketTag()); base::WeakPtr<SpdySession> spdy_session = CreateSpdySession(session.get(), key, NetLogWithSource()); trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello!", response_data); } // GenerateAuthToken is a mighty big test. // It tests all permutation of GenerateAuthToken behavior: // - Synchronous and Asynchronous completion. // - OK or error on completion. // - Direct connection, non-authenticating proxy, and authenticating proxy. // - HTTP or HTTPS backend (to include proxy tunneling). // - Non-authenticating and authenticating backend. // // In all, there are 44 reasonable permuations (for example, if there are // problems generating an auth token for an authenticating proxy, we don't // need to test all permutations of the backend server). // // The test proceeds by going over each of the configuration cases, and // potentially running up to three rounds in each of the tests. The TestConfig // specifies both the configuration for the test as well as the expectations // for the results. TEST_F(HttpNetworkTransactionTest, GenerateAuthToken) { static const char kServer[] = "http://www.example.com"; static const char kSecureServer[] = "https://www.example.com"; static const char kProxy[] = "myproxy:70"; enum AuthTiming { AUTH_NONE, AUTH_SYNC, AUTH_ASYNC, }; const MockWrite kGet( "GET / HTTP/1.1\r\n" "Host: www.example.com\r\n" "Connection: keep-alive\r\n\r\n"); const MockWrite kGetProxy( "GET http://www.example.com/ HTTP/1.1\r\n" "Host: www.example.com\r\n" "Proxy-Connection: keep-alive\r\n\r\n"); const MockWrite kGetAuth( "GET / HTTP/1.1\r\n" "Host: www.example.com\r\n" "Connection: keep-alive\r\n" "Authorization: auth_token\r\n\r\n"); const MockWrite kGetProxyAuth( "GET http://www.example.com/ HTTP/1.1\r\n" "Host: www.example.com\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"); const MockWrite kGetAuthThroughProxy( "GET http://www.example.com/ HTTP/1.1\r\n" "Host: www.example.com\r\n" "Proxy-Connection: keep-alive\r\n" "Authorization: auth_token\r\n\r\n"); const MockWrite kGetAuthWithProxyAuth( "GET http://www.example.com/ HTTP/1.1\r\n" "Host: www.example.com\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n" "Authorization: auth_token\r\n\r\n"); const MockWrite kConnect( "CONNECT www.example.com:443 HTTP/1.1\r\n" "Host: www.example.com:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"); const MockWrite kConnectProxyAuth( "CONNECT www.example.com:443 HTTP/1.1\r\n" "Host: www.example.com:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: auth_token\r\n\r\n"); const MockRead kSuccess( "HTTP/1.1 200 OK\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 3\r\n\r\n" "Yes"); const MockRead kFailure( "Should not be called."); const MockRead kServerChallenge( "HTTP/1.1 401 Unauthorized\r\n" "WWW-Authenticate: Mock realm=server\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 14\r\n\r\n" "Unauthorized\r\n"); const MockRead kProxyChallenge( "HTTP/1.1 407 Unauthorized\r\n" "Proxy-Authenticate: Mock realm=proxy\r\n" "Proxy-Connection: close\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 14\r\n\r\n" "Unauthorized\r\n"); const MockRead kProxyConnected( "HTTP/1.1 200 Connection Established\r\n\r\n"); // NOTE(cbentzel): I wanted TestReadWriteRound to be a simple struct with // no constructors, but the C++ compiler on Windows warns about // unspecified data in compound literals. So, moved to using constructors, // and TestRound's created with the default constructor should not be used. struct TestRound { TestRound() : expected_rv(ERR_UNEXPECTED), extra_write(nullptr), extra_read(nullptr) {} TestRound(const MockWrite& write_arg, const MockRead& read_arg, int expected_rv_arg) : write(write_arg), read(read_arg), expected_rv(expected_rv_arg), extra_write(nullptr), extra_read(nullptr) {} TestRound(const MockWrite& write_arg, const MockRead& read_arg, int expected_rv_arg, const MockWrite* extra_write_arg, const MockRead* extra_read_arg) : write(write_arg), read(read_arg), expected_rv(expected_rv_arg), extra_write(extra_write_arg), extra_read(extra_read_arg) { } MockWrite write; MockRead read; int expected_rv; const MockWrite* extra_write; const MockRead* extra_read; }; static const int kNoSSL = 500; struct TestConfig { int line_number; const char* const proxy_url; AuthTiming proxy_auth_timing; int first_generate_proxy_token_rv; const char* const server_url; AuthTiming server_auth_timing; int first_generate_server_token_rv; int num_auth_rounds; int first_ssl_round; TestRound rounds[4]; } test_configs[] = { // Non-authenticating HTTP server with a direct connection. {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_NONE, OK, 1, kNoSSL, {TestRound(kGet, kSuccess, OK)}}, // Authenticating HTTP server with a direct connection. {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_SYNC, OK, 2, kNoSSL, {TestRound(kGet, kServerChallenge, OK), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, kNoSSL, {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kServerChallenge, OK), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_SYNC, ERR_UNSUPPORTED_AUTH_SCHEME, 2, kNoSSL, {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kSuccess, OK)}}, {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_SYNC, ERR_UNDOCUMENTED_SECURITY_LIBRARY_STATUS, 2, kNoSSL, {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, ERR_FAILED, kServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxy, kFailure, ERR_FAILED)}}, {__LINE__, kProxy, AUTH_ASYNC, ERR_FAILED, kServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxy, kFailure, ERR_FAILED)}}, {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_SYNC, ERR_FAILED, 2, kNoSSL, {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kFailure, ERR_FAILED)}}, {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_ASYNC, ERR_FAILED, 2, kNoSSL, {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kFailure, ERR_FAILED)}}, {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_ASYNC, OK, 2, kNoSSL, {TestRound(kGet, kServerChallenge, OK), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, nullptr, AUTH_NONE, OK, kServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, kNoSSL, {TestRound(kGet, kServerChallenge, OK), // The second round uses a HttpAuthHandlerMock that always succeeds. TestRound(kGet, kServerChallenge, OK), TestRound(kGetAuth, kSuccess, OK)}}, // Non-authenticating HTTP server through a non-authenticating proxy. {__LINE__, kProxy, AUTH_NONE, OK, kServer, AUTH_NONE, OK, 1, kNoSSL, {TestRound(kGetProxy, kSuccess, OK)}}, // Authenticating HTTP server through a non-authenticating proxy. {__LINE__, kProxy, AUTH_NONE, OK, kServer, AUTH_SYNC, OK, 2, kNoSSL, {TestRound(kGetProxy, kServerChallenge, OK), TestRound(kGetAuthThroughProxy, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_NONE, OK, kServer, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, kNoSSL, {TestRound(kGetProxy, kServerChallenge, OK), TestRound(kGetProxy, kServerChallenge, OK), TestRound(kGetAuthThroughProxy, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_NONE, OK, kServer, AUTH_ASYNC, OK, 2, kNoSSL, {TestRound(kGetProxy, kServerChallenge, OK), TestRound(kGetAuthThroughProxy, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_NONE, OK, kServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 2, kNoSSL, {TestRound(kGetProxy, kServerChallenge, OK), TestRound(kGetProxy, kSuccess, OK)}}, // Non-authenticating HTTP server through an authenticating proxy. {__LINE__, kProxy, AUTH_SYNC, OK, kServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, kServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxy, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, kServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxy, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, kServer, AUTH_NONE, OK, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kSuccess, OK)}}, // Authenticating HTTP server through an authenticating proxy. {__LINE__, kProxy, AUTH_SYNC, OK, kServer, AUTH_SYNC, OK, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, OK, kServer, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kServer, AUTH_SYNC, OK, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kServer, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, OK, kServer, AUTH_ASYNC, OK, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, kServer, AUTH_ASYNC, OK, 4, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, OK, kServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kServer, AUTH_ASYNC, OK, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetAuthWithProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetProxyAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, kServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 4, kNoSSL, {TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxy, kProxyChallenge, OK), TestRound(kGetProxyAuth, kServerChallenge, OK), TestRound(kGetProxyAuth, kSuccess, OK)}}, // Non-authenticating HTTPS server with a direct connection. {__LINE__, nullptr, AUTH_NONE, OK, kSecureServer, AUTH_NONE, OK, 1, 0, {TestRound(kGet, kSuccess, OK)}}, // Authenticating HTTPS server with a direct connection. {__LINE__, nullptr, AUTH_NONE, OK, kSecureServer, AUTH_SYNC, OK, 2, 0, {TestRound(kGet, kServerChallenge, OK), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, nullptr, AUTH_NONE, OK, kSecureServer, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, 2, 0, {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kSuccess, OK)}}, {__LINE__, nullptr, AUTH_NONE, OK, kSecureServer, AUTH_ASYNC, OK, 2, 0, {TestRound(kGet, kServerChallenge, OK), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, nullptr, AUTH_NONE, OK, kSecureServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 2, 0, {TestRound(kGet, kServerChallenge, OK), TestRound(kGet, kSuccess, OK)}}, // Non-authenticating HTTPS server with a non-authenticating proxy. {__LINE__, kProxy, AUTH_NONE, OK, kSecureServer, AUTH_NONE, OK, 1, 0, {TestRound(kConnect, kProxyConnected, OK, &kGet, &kSuccess)}}, // Authenticating HTTPS server through a non-authenticating proxy. {__LINE__, kProxy, AUTH_NONE, OK, kSecureServer, AUTH_SYNC, OK, 2, 0, {TestRound(kConnect, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_NONE, OK, kSecureServer, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, 2, 0, {TestRound(kConnect, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGet, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_NONE, OK, kSecureServer, AUTH_ASYNC, OK, 2, 0, {TestRound(kConnect, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_NONE, OK, kSecureServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 2, 0, {TestRound(kConnect, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGet, kSuccess, OK)}}, // Non-Authenticating HTTPS server through an authenticating proxy. {__LINE__, kProxy, AUTH_SYNC, OK, kSecureServer, AUTH_NONE, OK, 2, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kSuccess)}}, {__LINE__, kProxy, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, kSecureServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnect, kProxyConnected, OK, &kGet, &kSuccess)}}, {__LINE__, kProxy, AUTH_SYNC, ERR_UNSUPPORTED_AUTH_SCHEME, kSecureServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnect, kProxyConnected, OK, &kGet, &kSuccess)}}, {__LINE__, kProxy, AUTH_SYNC, ERR_UNEXPECTED, kSecureServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnect, kProxyConnected, ERR_UNEXPECTED)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kSecureServer, AUTH_NONE, OK, 2, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kSuccess)}}, {__LINE__, kProxy, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, kSecureServer, AUTH_NONE, OK, 2, kNoSSL, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnect, kProxyConnected, OK, &kGet, &kSuccess)}}, // Authenticating HTTPS server through an authenticating proxy. {__LINE__, kProxy, AUTH_SYNC, OK, kSecureServer, AUTH_SYNC, OK, 3, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, OK, kSecureServer, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGet, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kSecureServer, AUTH_SYNC, OK, 3, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kSecureServer, AUTH_SYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGet, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, OK, kSecureServer, AUTH_ASYNC, OK, 3, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_SYNC, OK, kSecureServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGet, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kSecureServer, AUTH_ASYNC, OK, 3, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGetAuth, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, OK, kSecureServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 3, 1, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGet, kSuccess, OK)}}, {__LINE__, kProxy, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, kSecureServer, AUTH_ASYNC, ERR_INVALID_AUTH_CREDENTIALS, 4, 2, {TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnect, kProxyChallenge, OK), TestRound(kConnectProxyAuth, kProxyConnected, OK, &kGet, &kServerChallenge), TestRound(kGet, kSuccess, OK)}}, }; for (const auto& test_config : test_configs) { SCOPED_TRACE(::testing::Message() << "Test config at " << test_config.line_number); HttpAuthHandlerMock::Factory* auth_factory( new HttpAuthHandlerMock::Factory()); session_deps_.http_auth_handler_factory.reset(auth_factory); SSLInfo empty_ssl_info; // Set up authentication handlers as necessary. if (test_config.proxy_auth_timing != AUTH_NONE) { for (int n = 0; n < 3; n++) { HttpAuthHandlerMock* auth_handler(new HttpAuthHandlerMock()); std::string auth_challenge = "Mock realm=proxy"; GURL origin(test_config.proxy_url); HttpAuthChallengeTokenizer tokenizer(auth_challenge.begin(), auth_challenge.end()); auth_handler->InitFromChallenge(&tokenizer, HttpAuth::AUTH_PROXY, empty_ssl_info, origin, NetLogWithSource()); auth_handler->SetGenerateExpectation( test_config.proxy_auth_timing == AUTH_ASYNC, n == 0 ? test_config.first_generate_proxy_token_rv : OK); auth_factory->AddMockHandler(auth_handler, HttpAuth::AUTH_PROXY); } } if (test_config.server_auth_timing != AUTH_NONE) { HttpAuthHandlerMock* auth_handler(new HttpAuthHandlerMock()); std::string auth_challenge = "Mock realm=server"; GURL origin(test_config.server_url); HttpAuthChallengeTokenizer tokenizer(auth_challenge.begin(), auth_challenge.end()); auth_handler->InitFromChallenge(&tokenizer, HttpAuth::AUTH_SERVER, empty_ssl_info, origin, NetLogWithSource()); auth_handler->SetGenerateExpectation( test_config.server_auth_timing == AUTH_ASYNC, test_config.first_generate_server_token_rv); auth_factory->AddMockHandler(auth_handler, HttpAuth::AUTH_SERVER); // The second handler always succeeds. It should only be used where there // are multiple auth sessions for server auth in the same network // transaction using the same auth scheme. std::unique_ptr<HttpAuthHandlerMock> second_handler = std::make_unique<HttpAuthHandlerMock>(); second_handler->InitFromChallenge(&tokenizer, HttpAuth::AUTH_SERVER, empty_ssl_info, origin, NetLogWithSource()); second_handler->SetGenerateExpectation(true, OK); auth_factory->AddMockHandler(second_handler.release(), HttpAuth::AUTH_SERVER); } if (test_config.proxy_url) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed(test_config.proxy_url, TRAFFIC_ANNOTATION_FOR_TESTS); } else { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateDirect(); } HttpRequestInfo request; request.method = "GET"; request.url = GURL(test_config.server_url); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); SSLSocketDataProvider ssl_socket_data_provider(SYNCHRONOUS, OK); std::vector<std::vector<MockRead>> mock_reads(1); std::vector<std::vector<MockWrite>> mock_writes(1); for (int round = 0; round < test_config.num_auth_rounds; ++round) { SCOPED_TRACE(round); const TestRound& read_write_round = test_config.rounds[round]; // Set up expected reads and writes. mock_reads.back().push_back(read_write_round.read); mock_writes.back().push_back(read_write_round.write); // kProxyChallenge uses Proxy-Connection: close which means that the // socket is closed and a new one will be created for the next request. if (read_write_round.read.data == kProxyChallenge.data) { mock_reads.push_back(std::vector<MockRead>()); mock_writes.push_back(std::vector<MockWrite>()); } if (read_write_round.extra_read) { mock_reads.back().push_back(*read_write_round.extra_read); } if (read_write_round.extra_write) { mock_writes.back().push_back(*read_write_round.extra_write); } // Add an SSL sequence if necessary. if (round >= test_config.first_ssl_round) session_deps_.socket_factory->AddSSLSocketDataProvider( &ssl_socket_data_provider); } std::vector<std::unique_ptr<StaticSocketDataProvider>> data_providers; for (size_t i = 0; i < mock_reads.size(); ++i) { data_providers.push_back(std::make_unique<StaticSocketDataProvider>( mock_reads[i], mock_writes[i])); session_deps_.socket_factory->AddSocketDataProvider( data_providers.back().get()); } // Transaction must be created after DataProviders, so it's destroyed before // they are as well. HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); for (int round = 0; round < test_config.num_auth_rounds; ++round) { SCOPED_TRACE(round); const TestRound& read_write_round = test_config.rounds[round]; // Start or restart the transaction. TestCompletionCallback callback; int rv; if (round == 0) { rv = trans.Start(&request, callback.callback(), NetLogWithSource()); } else { rv = trans.RestartWithAuth( AuthCredentials(kFoo, kBar), callback.callback()); } if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); // Compare results with expected data. EXPECT_THAT(rv, IsError(read_write_round.expected_rv)); const HttpResponseInfo* response = trans.GetResponseInfo(); if (read_write_round.expected_rv != OK) { EXPECT_EQ(round + 1, test_config.num_auth_rounds); continue; } if (round + 1 < test_config.num_auth_rounds) { EXPECT_TRUE(response->auth_challenge.has_value()); } else { EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_FALSE(trans.IsReadyToRestartForAuth()); } } } } TEST_F(HttpNetworkTransactionTest, MultiRoundAuth) { // Do multi-round authentication and make sure it works correctly. HttpAuthHandlerMock::Factory* auth_factory( new HttpAuthHandlerMock::Factory()); session_deps_.http_auth_handler_factory.reset(auth_factory); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateDirect(); session_deps_.host_resolver->rules()->AddRule("www.example.com", "10.0.0.1"); HttpAuthHandlerMock* auth_handler(new HttpAuthHandlerMock()); auth_handler->set_connection_based(true); std::string auth_challenge = "Mock realm=server"; GURL origin("http://www.example.com"); HttpAuthChallengeTokenizer tokenizer(auth_challenge.begin(), auth_challenge.end()); SSLInfo empty_ssl_info; auth_handler->InitFromChallenge(&tokenizer, HttpAuth::AUTH_SERVER, empty_ssl_info, origin, NetLogWithSource()); auth_factory->AddMockHandler(auth_handler, HttpAuth::AUTH_SERVER); int rv = OK; const HttpResponseInfo* response = nullptr; HttpRequestInfo request; request.method = "GET"; request.url = origin; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Use a TCP Socket Pool with only one connection per group. This is used // to validate that the TCP socket is not released to the pool between // each round of multi-round authentication. HttpNetworkSessionPeer session_peer(session.get()); CommonConnectJobParams common_connect_job_params( session->CreateCommonConnectJobParams()); TransportClientSocketPool* transport_pool = new TransportClientSocketPool( 50, // Max sockets for pool 1, // Max sockets per group base::TimeDelta::FromSeconds(10), // unused_idle_socket_timeout ProxyServer::Direct(), false, // is_for_websockets &common_connect_job_params, session_deps_.ssl_config_service.get()); auto mock_pool_manager = std::make_unique<MockClientSocketPoolManager>(); mock_pool_manager->SetSocketPool(ProxyServer::Direct(), base::WrapUnique(transport_pool)); session_peer.SetClientSocketPoolManager(std::move(mock_pool_manager)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; const MockWrite kGet( "GET / HTTP/1.1\r\n" "Host: www.example.com\r\n" "Connection: keep-alive\r\n\r\n"); const MockWrite kGetAuth( "GET / HTTP/1.1\r\n" "Host: www.example.com\r\n" "Connection: keep-alive\r\n" "Authorization: auth_token\r\n\r\n"); const MockRead kServerChallenge( "HTTP/1.1 401 Unauthorized\r\n" "WWW-Authenticate: Mock realm=server\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 14\r\n\r\n" "Unauthorized\r\n"); const MockRead kSuccess( "HTTP/1.1 200 OK\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 3\r\n\r\n" "Yes"); MockWrite writes[] = { // First round kGet, // Second round kGetAuth, // Third round kGetAuth, // Fourth round kGetAuth, // Competing request kGet, }; MockRead reads[] = { // First round kServerChallenge, // Second round kServerChallenge, // Third round kServerChallenge, // Fourth round kSuccess, // Competing response kSuccess, }; StaticSocketDataProvider data_provider(reads, writes); session_deps_.socket_factory->AddSocketDataProvider(&data_provider); const ClientSocketPool::GroupId kSocketGroup( HostPortPair("www.example.com", 80), ClientSocketPool::SocketType::kHttp, PrivacyMode::PRIVACY_MODE_DISABLED); // First round of authentication. auth_handler->SetGenerateExpectation(false, OK); rv = trans.Start(&request, callback.callback(), NetLogWithSource()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->auth_challenge.has_value()); EXPECT_EQ(0u, transport_pool->IdleSocketCountInGroup(kSocketGroup)); EXPECT_EQ(HttpAuthHandlerMock::State::WAIT_FOR_GENERATE_AUTH_TOKEN, auth_handler->state()); // In between rounds, another request comes in for the same domain. // It should not be able to grab the TCP socket that trans has already // claimed. HttpNetworkTransaction trans_compete(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback_compete; rv = trans_compete.Start(&request, callback_compete.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // callback_compete.WaitForResult at this point would stall forever, // since the HttpNetworkTransaction does not release the request back to // the pool until after authentication completes. // Second round of authentication. auth_handler->SetGenerateExpectation(false, OK); rv = trans.RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(0u, transport_pool->IdleSocketCountInGroup(kSocketGroup)); EXPECT_EQ(HttpAuthHandlerMock::State::WAIT_FOR_GENERATE_AUTH_TOKEN, auth_handler->state()); // Third round of authentication. auth_handler->SetGenerateExpectation(false, OK); rv = trans.RestartWithAuth(AuthCredentials(), callback.callback()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(0u, transport_pool->IdleSocketCountInGroup(kSocketGroup)); EXPECT_EQ(HttpAuthHandlerMock::State::WAIT_FOR_GENERATE_AUTH_TOKEN, auth_handler->state()); // Fourth round of authentication, which completes successfully. auth_handler->SetGenerateExpectation(false, OK); rv = trans.RestartWithAuth(AuthCredentials(), callback.callback()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_FALSE(response->auth_challenge.has_value()); EXPECT_EQ(0u, transport_pool->IdleSocketCountInGroup(kSocketGroup)); // In WAIT_FOR_CHALLENGE, although in reality the auth handler is done. A real // auth handler should transition to a DONE state in concert with the remote // server. But that's not something we can test here with a mock handler. EXPECT_EQ(HttpAuthHandlerMock::State::WAIT_FOR_CHALLENGE, auth_handler->state()); // Read the body since the fourth round was successful. This will also // release the socket back to the pool. scoped_refptr<IOBufferWithSize> io_buf = base::MakeRefCounted<IOBufferWithSize>(50); rv = trans.Read(io_buf.get(), io_buf->size(), callback.callback()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); EXPECT_EQ(3, rv); rv = trans.Read(io_buf.get(), io_buf->size(), callback.callback()); EXPECT_EQ(0, rv); // There are still 0 idle sockets, since the trans_compete transaction // will be handed it immediately after trans releases it to the group. EXPECT_EQ(0u, transport_pool->IdleSocketCountInGroup(kSocketGroup)); // The competing request can now finish. Wait for the headers and then // read the body. rv = callback_compete.WaitForResult(); EXPECT_THAT(rv, IsOk()); rv = trans_compete.Read(io_buf.get(), io_buf->size(), callback.callback()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); EXPECT_EQ(3, rv); rv = trans_compete.Read(io_buf.get(), io_buf->size(), callback.callback()); EXPECT_EQ(0, rv); // Finally, the socket is released to the group. EXPECT_EQ(1u, transport_pool->IdleSocketCountInGroup(kSocketGroup)); } // This tests the case that a request is issued via http instead of spdy after // npn is negotiated. TEST_F(HttpNetworkTransactionTest, NpnWithHttpOverSSL) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead(kAlternativeServiceHttpHeader), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); } // Simulate the SSL handshake completing with an NPN negotiation followed by an // immediate server closing of the socket. // Regression test for https://crbug.com/46369. TEST_F(HttpNetworkTransactionTest, SpdyPostNPNServerHangup) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); spdy::SpdySerializedFrame req( spdy_util_.ConstructSpdyGet(nullptr, 0, 1, LOWEST)); MockWrite spdy_writes[] = {CreateMockWrite(req, 1)}; MockRead spdy_reads[] = { MockRead(SYNCHRONOUS, 0, 0) // Not async - return 0 immediately. }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); TestCompletionCallback callback; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsError(ERR_CONNECTION_CLOSED)); } // A subclass of HttpAuthHandlerMock that records the request URL when // it gets it. This is needed since the auth handler may get destroyed // before we get a chance to query it. class UrlRecordingHttpAuthHandlerMock : public HttpAuthHandlerMock { public: explicit UrlRecordingHttpAuthHandlerMock(GURL* url) : url_(url) {} ~UrlRecordingHttpAuthHandlerMock() override = default; protected: int GenerateAuthTokenImpl(const AuthCredentials* credentials, const HttpRequestInfo* request, CompletionOnceCallback callback, std::string* auth_token) override { *url_ = request->url; return HttpAuthHandlerMock::GenerateAuthTokenImpl( credentials, request, std::move(callback), auth_token); } private: GURL* url_; }; // Test that if we cancel the transaction as the connection is completing, that // everything tears down correctly. TEST_F(HttpNetworkTransactionTest, SimpleCancel) { // Setup everything about the connection to complete synchronously, so that // after calling HttpNetworkTransaction::Start, the only thing we're waiting // for is the callback from the HttpStreamRequest. // Then cancel the transaction. // Verify that we don't crash. MockConnect mock_connect(SYNCHRONOUS, OK); MockRead data_reads[] = { MockRead(SYNCHRONOUS, "HTTP/1.0 200 OK\r\n\r\n"), MockRead(SYNCHRONOUS, "hello world"), MockRead(SYNCHRONOUS, OK), }; HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; BoundTestNetLog log; int rv = trans->Start(&request, callback.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); trans.reset(); // Cancel the transaction here. base::RunLoop().RunUntilIdle(); } // Test that if a transaction is cancelled after receiving the headers, the // stream is drained properly and added back to the socket pool. The main // purpose of this test is to make sure that an HttpStreamParser can be read // from after the HttpNetworkTransaction and the objects it owns have been // deleted. // See http://crbug.com/368418 TEST_F(HttpNetworkTransactionTest, CancelAfterHeaders) { MockRead data_reads[] = { MockRead(ASYNC, "HTTP/1.1 200 OK\r\n"), MockRead(ASYNC, "Content-Length: 2\r\n"), MockRead(ASYNC, "Connection: Keep-Alive\r\n\r\n"), MockRead(ASYNC, "1"), // 2 async reads are necessary to trigger a ReadResponseBody call after the // HttpNetworkTransaction has been deleted. MockRead(ASYNC, "2"), MockRead(SYNCHRONOUS, ERR_IO_PENDING), // Should never read this. }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); callback.WaitForResult(); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); // The transaction and HttpRequestInfo are deleted. } // Let the HttpResponseBodyDrainer drain the socket. base::RunLoop().RunUntilIdle(); // Socket should now be idle, waiting to be reused. EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); } // Test a basic GET request through a proxy. TEST_F(HttpNetworkTransactionTest, ProxyGet) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes1[] = { MockWrite( "GET http://www.example.org/ HTTP/1.1\r\n" "Host: www.example.org\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); BeforeHeadersSentHandler headers_handler; trans.SetBeforeHeadersSentCallback( base::Bind(&BeforeHeadersSentHandler::OnBeforeHeadersSent, base::Unretained(&headers_handler))); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(100, response->headers->GetContentLength()); EXPECT_TRUE(response->was_fetched_via_proxy); EXPECT_EQ(ProxyServer(ProxyServer::SCHEME_HTTP, HostPortPair::FromString("myproxy:70")), response->proxy_server); EXPECT_TRUE(headers_handler.observed_before_headers_sent()); EXPECT_TRUE(headers_handler.observed_before_headers_sent_with_proxy()); EXPECT_EQ("myproxy:70", headers_handler.observed_proxy_server_uri()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_CONNECT_TIMES_ONLY); } // Test a basic HTTPS GET request through a proxy. TEST_F(HttpNetworkTransactionTest, ProxyTunnelGet) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); BeforeHeadersSentHandler headers_handler; trans.SetBeforeHeadersSentCallback( base::Bind(&BeforeHeadersSentHandler::OnBeforeHeadersSent, base::Unretained(&headers_handler))); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(100, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(response->was_fetched_via_proxy); EXPECT_EQ(ProxyServer(ProxyServer::SCHEME_HTTP, HostPortPair::FromString("myproxy:70")), response->proxy_server); EXPECT_TRUE(headers_handler.observed_before_headers_sent()); EXPECT_TRUE(headers_handler.observed_before_headers_sent_with_proxy()); EXPECT_EQ("myproxy:70", headers_handler.observed_proxy_server_uri()); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); } // Test a basic HTTPS GET request through a proxy, connecting to an IPv6 // literal host. TEST_F(HttpNetworkTransactionTest, ProxyTunnelGetIPv6) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://[::2]:443/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT [::2]:443 HTTP/1.1\r\n" "Host: [::2]:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: [::2]\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers->IsKeepAlive()); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(100, response->headers->GetContentLength()); EXPECT_TRUE(HttpVersion(1, 1) == response->headers->GetHttpVersion()); EXPECT_TRUE(response->was_fetched_via_proxy); EXPECT_EQ(ProxyServer(ProxyServer::SCHEME_HTTP, HostPortPair::FromString("myproxy:70")), response->proxy_server); LoadTimingInfo load_timing_info; EXPECT_TRUE(trans.GetLoadTimingInfo(&load_timing_info)); TestLoadTimingNotReusedWithPac(load_timing_info, CONNECT_TIMING_HAS_SSL_TIMES); } // Test a basic HTTPS GET request through a proxy, but the server hangs up // while establishing the tunnel. TEST_F(HttpNetworkTransactionTest, ProxyTunnelGetHangup) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead(ASYNC, 0, 0), // EOF }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_EMPTY_RESPONSE)); TestNetLogEntry::List entries; log.GetEntries(&entries); size_t pos = ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_SEND_TUNNEL_HEADERS, NetLogEventPhase::NONE); ExpectLogContainsSomewhere( entries, pos, NetLogEventType::HTTP_TRANSACTION_READ_TUNNEL_RESPONSE_HEADERS, NetLogEventPhase::NONE); } // Test for crbug.com/55424. TEST_F(HttpNetworkTransactionTest, PreconnectWithExistingSpdySession) { spdy::SpdySerializedFrame req( spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST)); MockWrite spdy_writes[] = {CreateMockWrite(req, 0)}; spdy::SpdySerializedFrame resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame data(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy_reads[] = { CreateMockRead(resp, 1), CreateMockRead(data, 2), MockRead(ASYNC, 0, 3), }; SequencedSocketData spdy_data(spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Set up an initial SpdySession in the pool to reuse. HostPortPair host_port_pair("www.example.org", 443); SpdySessionKey key(host_port_pair, ProxyServer::Direct(), PRIVACY_MODE_DISABLED, SpdySessionKey::IsProxySession::kFalse, SocketTag()); base::WeakPtr<SpdySession> spdy_session = CreateSpdySession(session.get(), key, NetLogWithSource()); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); } // Given a net error, cause that error to be returned from the first Write() // call and verify that the HttpNetworkTransaction fails with that error. void HttpNetworkTransactionTest::CheckErrorIsPassedBack( int error, IoMode mode) { HttpRequestInfo request_info; request_info.url = GURL("https://www.example.com/"); request_info.method = "GET"; request_info.load_flags = LOAD_NORMAL; request_info.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); SSLSocketDataProvider ssl_data(mode, OK); MockWrite data_writes[] = { MockWrite(mode, error), }; StaticSocketDataProvider data(base::span<MockRead>(), data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request_info, callback.callback(), NetLogWithSource()); if (rv == ERR_IO_PENDING) rv = callback.WaitForResult(); ASSERT_EQ(error, rv); } TEST_F(HttpNetworkTransactionTest, SSLWriteCertError) { // Just check a grab bag of cert errors. static const int kErrors[] = { ERR_CERT_COMMON_NAME_INVALID, ERR_CERT_AUTHORITY_INVALID, ERR_CERT_DATE_INVALID, }; for (size_t i = 0; i < base::size(kErrors); i++) { CheckErrorIsPassedBack(kErrors[i], ASYNC); CheckErrorIsPassedBack(kErrors[i], SYNCHRONOUS); } } // Ensure that a client certificate is removed from the SSL client auth // cache when: // 1) No proxy is involved. // 2) TLS False Start is disabled. // 3) The initial TLS handshake requests a client certificate. // 4) The client supplies an invalid/unacceptable certificate. TEST_F(HttpNetworkTransactionTest, ClientAuthCertCache_Direct_NoFalseStart) { HttpRequestInfo request_info; request_info.url = GURL("https://www.example.com/"); request_info.method = "GET"; request_info.load_flags = LOAD_NORMAL; request_info.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); scoped_refptr<SSLCertRequestInfo> cert_request(new SSLCertRequestInfo()); cert_request->host_and_port = HostPortPair("www.example.com", 443); // [ssl_]data1 contains the data for the first SSL handshake. When a // CertificateRequest is received for the first time, the handshake will // be aborted to allow the caller to provide a certificate. SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED); ssl_data1.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1); StaticSocketDataProvider data1; session_deps_.socket_factory->AddSocketDataProvider(&data1); // [ssl_]data2 contains the data for the second SSL handshake. When TLS // False Start is not being used, the result of the SSL handshake will be // returned as part of the SSLClientSocket::Connect() call. This test // matches the result of a server sending a handshake_failure alert, // rather than a Finished message, because it requires a client // certificate and none was supplied. SSLSocketDataProvider ssl_data2(ASYNC, ERR_SSL_PROTOCOL_ERROR); ssl_data2.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data2); StaticSocketDataProvider data2; session_deps_.socket_factory->AddSocketDataProvider(&data2); // [ssl_]data3 contains the data for the third SSL handshake. When a // connection to a server fails during an SSL handshake, // HttpNetworkTransaction will attempt to fallback to TLSv1.2 if the previous // connection was attempted with TLSv1.3. This is transparent to the caller // of the HttpNetworkTransaction. Because this test failure is due to // requiring a client certificate, this fallback handshake should also // fail. SSLSocketDataProvider ssl_data3(ASYNC, ERR_SSL_PROTOCOL_ERROR); ssl_data3.expected_ssl_version_max = SSL_PROTOCOL_VERSION_TLS1_2; ssl_data3.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data3); StaticSocketDataProvider data3; session_deps_.socket_factory->AddSocketDataProvider(&data3); // [ssl_]data4 contains the data for the fourth SSL handshake. When a // connection to a server fails during an SSL handshake, // HttpNetworkTransaction will attempt to fallback to TLSv1 if the previous // connection was attempted with TLSv1.1. This is transparent to the caller // of the HttpNetworkTransaction. Because this test failure is due to // requiring a client certificate, this fallback handshake should also // fail. SSLSocketDataProvider ssl_data4(ASYNC, ERR_SSL_PROTOCOL_ERROR); ssl_data4.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data4); StaticSocketDataProvider data4; session_deps_.socket_factory->AddSocketDataProvider(&data4); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Begin the SSL handshake with the peer. This consumes ssl_data1. TestCompletionCallback callback; int rv = trans.Start(&request_info, callback.callback(), NetLogWithSource()); ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); // Complete the SSL handshake, which should abort due to requiring a // client certificate. rv = callback.WaitForResult(); ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED)); // Indicate that no certificate should be supplied. From the perspective // of SSLClientCertCache, NULL is just as meaningful as a real // certificate, so this is the same as supply a // legitimate-but-unacceptable certificate. rv = trans.RestartWithCertificate(nullptr, nullptr, callback.callback()); ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); // Ensure the certificate was added to the client auth cache before // allowing the connection to continue restarting. scoped_refptr<X509Certificate> client_cert; scoped_refptr<SSLPrivateKey> client_private_key; ASSERT_TRUE(session->ssl_client_auth_cache()->Lookup( HostPortPair("www.example.com", 443), &client_cert, &client_private_key)); ASSERT_FALSE(client_cert); // Restart the handshake. This will consume ssl_data2, which fails, and // then consume ssl_data3 and ssl_data4, both of which should also fail. // The result code is checked against what ssl_data4 should return. rv = callback.WaitForResult(); ASSERT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR)); // Ensure that the client certificate is removed from the cache on a // handshake failure. ASSERT_FALSE(session->ssl_client_auth_cache()->Lookup( HostPortPair("www.example.com", 443), &client_cert, &client_private_key)); } // Ensure that a client certificate is removed from the SSL client auth // cache when: // 1) No proxy is involved. // 2) TLS False Start is enabled. // 3) The initial TLS handshake requests a client certificate. // 4) The client supplies an invalid/unacceptable certificate. TEST_F(HttpNetworkTransactionTest, ClientAuthCertCache_Direct_FalseStart) { HttpRequestInfo request_info; request_info.url = GURL("https://www.example.com/"); request_info.method = "GET"; request_info.load_flags = LOAD_NORMAL; request_info.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); scoped_refptr<SSLCertRequestInfo> cert_request(new SSLCertRequestInfo()); cert_request->host_and_port = HostPortPair("www.example.com", 443); // When TLS False Start is used, SSLClientSocket::Connect() calls will // return successfully after reading up to the peer's Certificate message. // This is to allow the caller to call SSLClientSocket::Write(), which can // enqueue application data to be sent in the same packet as the // ChangeCipherSpec and Finished messages. // The actual handshake will be finished when SSLClientSocket::Read() is // called, which expects to process the peer's ChangeCipherSpec and // Finished messages. If there was an error negotiating with the peer, // such as due to the peer requiring a client certificate when none was // supplied, the alert sent by the peer won't be processed until Read() is // called. // Like the non-False Start case, when a client certificate is requested by // the peer, the handshake is aborted during the Connect() call. // [ssl_]data1 represents the initial SSL handshake with the peer. SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED); ssl_data1.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1); StaticSocketDataProvider data1; session_deps_.socket_factory->AddSocketDataProvider(&data1); // When a client certificate is supplied, Connect() will not be aborted // when the peer requests the certificate. Instead, the handshake will // artificially succeed, allowing the caller to write the HTTP request to // the socket. The handshake messages are not processed until Read() is // called, which then detects that the handshake was aborted, due to the // peer sending a handshake_failure because it requires a client // certificate. SSLSocketDataProvider ssl_data2(ASYNC, OK); ssl_data2.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data2); MockRead data2_reads[] = { MockRead(ASYNC /* async */, ERR_SSL_PROTOCOL_ERROR), }; StaticSocketDataProvider data2(data2_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data2); // As described in ClientAuthCertCache_Direct_NoFalseStart, [ssl_]data3 is // the data for the SSL handshake once the TLSv1.1 connection falls back to // TLSv1. It has the same behaviour as [ssl_]data2. SSLSocketDataProvider ssl_data3(ASYNC, OK); ssl_data3.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data3); StaticSocketDataProvider data3(data2_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data3); // [ssl_]data4 is the data for the SSL handshake once the TLSv1 connection // falls back to SSLv3. It has the same behaviour as [ssl_]data2. SSLSocketDataProvider ssl_data4(ASYNC, OK); ssl_data4.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data4); StaticSocketDataProvider data4(data2_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data4); // Need one more if TLSv1.2 is enabled. SSLSocketDataProvider ssl_data5(ASYNC, OK); ssl_data5.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data5); StaticSocketDataProvider data5(data2_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data5); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Begin the initial SSL handshake. TestCompletionCallback callback; int rv = trans.Start(&request_info, callback.callback(), NetLogWithSource()); ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); // Complete the SSL handshake, which should abort due to requiring a // client certificate. rv = callback.WaitForResult(); ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED)); // Indicate that no certificate should be supplied. From the perspective // of SSLClientCertCache, NULL is just as meaningful as a real // certificate, so this is the same as supply a // legitimate-but-unacceptable certificate. rv = trans.RestartWithCertificate(nullptr, nullptr, callback.callback()); ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); // Ensure the certificate was added to the client auth cache before // allowing the connection to continue restarting. scoped_refptr<X509Certificate> client_cert; scoped_refptr<SSLPrivateKey> client_private_key; ASSERT_TRUE(session->ssl_client_auth_cache()->Lookup( HostPortPair("www.example.com", 443), &client_cert, &client_private_key)); ASSERT_FALSE(client_cert); // Restart the handshake. This will consume ssl_data2, which fails, and // then consume ssl_data3 and ssl_data4, both of which should also fail. // The result code is checked against what ssl_data4 should return. rv = callback.WaitForResult(); ASSERT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR)); // Ensure that the client certificate is removed from the cache on a // handshake failure. ASSERT_FALSE(session->ssl_client_auth_cache()->Lookup( HostPortPair("www.example.com", 443), &client_cert, &client_private_key)); } // Ensure that a client certificate is removed from the SSL client auth // cache when: // 1) An HTTPS proxy is involved. // 3) The HTTPS proxy requests a client certificate. // 4) The client supplies an invalid/unacceptable certificate for the // proxy. TEST_F(HttpNetworkTransactionTest, ClientAuthCertCache_Proxy_Fail) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixed( "https://proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); auto cert_request = base::MakeRefCounted<SSLCertRequestInfo>(); cert_request->host_and_port = HostPortPair("proxy", 70); // Repeat the test for connecting to an HTTPS endpoint, then for connecting to // an HTTP endpoint. HttpRequestInfo requests[2]; requests[0].url = GURL("https://www.example.com/"); requests[0].method = "GET"; requests[0].load_flags = LOAD_NORMAL; requests[0].traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // HTTPS requests are tunneled. MockWrite https_writes[] = { MockWrite("CONNECT www.example.com:443 HTTP/1.1\r\n" "Host: www.example.com:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; requests[1].url = GURL("http://www.example.com/"); requests[1].method = "GET"; requests[1].load_flags = LOAD_NORMAL; requests[1].traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // HTTP requests are not. MockWrite http_writes[] = { MockWrite("GET http://www.example.com/ HTTP/1.1\r\n" "Host: www.example.com\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // When the server rejects the client certificate, it will close the // connection. In TLS 1.2, this is signaled out of Connect(). In TLS 1.3 (or // TLS 1.2 with False Start), the error is returned out of the first Read(). for (bool reject_in_connect : {true, false}) { SCOPED_TRACE(reject_in_connect); // Client certificate errors are typically signaled with // ERR_BAD_SSL_CLIENT_AUTH_CERT, but sometimes the server gives an arbitrary // protocol error. for (Error reject_error : {ERR_SSL_PROTOCOL_ERROR, ERR_BAD_SSL_CLIENT_AUTH_CERT}) { SCOPED_TRACE(reject_error); // Tunneled and non-tunneled requests are handled differently. Test both. for (const HttpRequestInfo& request : requests) { SCOPED_TRACE(request.url); session_deps_.socket_factory = std::make_unique<MockClientSocketFactory>(); // See ClientAuthCertCache_Direct_NoFalseStart for the explanation of // [ssl_]data[1-2]. [ssl_]data3 is not needed because we do not retry // for proxies. Rather than represending the endpoint // (www.example.com:443), they represent failures with the HTTPS proxy // (proxy:70). SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_CLIENT_AUTH_CERT_NEEDED); ssl_data1.cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl_data1); StaticSocketDataProvider data1; session_deps_.socket_factory->AddSocketDataProvider(&data1); base::Optional<SSLSocketDataProvider> ssl_data2; base::Optional<StaticSocketDataProvider> data2; MockRead error_in_read[] = {MockRead(ASYNC, reject_error)}; if (reject_in_connect) { ssl_data2.emplace(ASYNC, reject_error); // There are no reads or writes. data2.emplace(); } else { ssl_data2.emplace(ASYNC, OK); // We will get one Write() in before observing the error in Read(). if (request.url.SchemeIsCryptographic()) { data2.emplace(error_in_read, https_writes); } else { data2.emplace(error_in_read, http_writes); } } ssl_data2->cert_request_info = cert_request.get(); session_deps_.socket_factory->AddSSLSocketDataProvider( &ssl_data2.value()); session_deps_.socket_factory->AddSocketDataProvider(&data2.value()); std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Begin the SSL handshake with the proxy. TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); // Complete the SSL handshake, which should abort due to requiring a // client certificate. rv = callback.WaitForResult(); ASSERT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED)); // Indicate that no certificate should be supplied. From the // perspective of SSLClientCertCache, NULL is just as meaningful as a // real certificate, so this is the same as supply a // legitimate-but-unacceptable certificate. rv = trans.RestartWithCertificate(nullptr, nullptr, callback.callback()); ASSERT_THAT(rv, IsError(ERR_IO_PENDING)); // Ensure the certificate was added to the client auth cache before // allowing the connection to continue restarting. scoped_refptr<X509Certificate> client_cert; scoped_refptr<SSLPrivateKey> client_private_key; ASSERT_TRUE(session->ssl_client_auth_cache()->Lookup( HostPortPair("proxy", 70), &client_cert, &client_private_key)); ASSERT_FALSE(client_cert); // Ensure the certificate was NOT cached for the endpoint. This only // applies to HTTPS requests, but is fine to check for HTTP requests. ASSERT_FALSE(session->ssl_client_auth_cache()->Lookup( HostPortPair("www.example.com", 443), &client_cert, &client_private_key)); // Restart the handshake. This will consume ssl_data2. The result code // is checked against what ssl_data2 should return. rv = callback.WaitForResult(); ASSERT_THAT(rv, AnyOf(IsError(ERR_PROXY_CONNECTION_FAILED), IsError(reject_error))); // Now that the new handshake has failed, ensure that the client // certificate was removed from the client auth cache. ASSERT_FALSE(session->ssl_client_auth_cache()->Lookup( HostPortPair("proxy", 70), &client_cert, &client_private_key)); ASSERT_FALSE(session->ssl_client_auth_cache()->Lookup( HostPortPair("www.example.com", 443), &client_cert, &client_private_key)); } } } } TEST_F(HttpNetworkTransactionTest, UseIPConnectionPooling) { // Set up a special HttpNetworkSession with a MockCachingHostResolver. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); AddSSLSocketData(); spdy::SpdySerializedFrame host1_req( spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST)); spdy_util_.UpdateWithStreamDestruction(1); spdy::SpdySerializedFrame host2_req( spdy_util_.ConstructSpdyGet("https://mail.example.com", 3, LOWEST)); MockWrite spdy_writes[] = { CreateMockWrite(host1_req, 0), CreateMockWrite(host2_req, 3), }; spdy::SpdySerializedFrame host1_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame host1_resp_body( spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame host2_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); spdy::SpdySerializedFrame host2_resp_body( spdy_util_.ConstructSpdyDataFrame(3, true)); MockRead spdy_reads[] = { CreateMockRead(host1_resp, 1), CreateMockRead(host1_resp_body, 2), CreateMockRead(host2_resp, 4), CreateMockRead(host2_resp_body, 5), MockRead(ASYNC, 0, 6), }; IPEndPoint peer_addr(IPAddress::IPv4Localhost(), 443); MockConnect connect(ASYNC, OK, peer_addr); SequencedSocketData spdy_data(connect, spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get()); int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); // Preload mail.example.com into HostCache. rv = session_deps_.host_resolver->LoadIntoCache( HostPortPair("mail.example.com", 443), base::nullopt); EXPECT_THAT(rv, IsOk()); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://mail.example.com/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans2.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); } TEST_F(HttpNetworkTransactionTest, UseIPConnectionPoolingAfterResolution) { // Set up a special HttpNetworkSession with a MockCachingHostResolver. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); AddSSLSocketData(); spdy::SpdySerializedFrame host1_req( spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST)); spdy_util_.UpdateWithStreamDestruction(1); spdy::SpdySerializedFrame host2_req( spdy_util_.ConstructSpdyGet("https://mail.example.com", 3, LOWEST)); MockWrite spdy_writes[] = { CreateMockWrite(host1_req, 0), CreateMockWrite(host2_req, 3), }; spdy::SpdySerializedFrame host1_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame host1_resp_body( spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame host2_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); spdy::SpdySerializedFrame host2_resp_body( spdy_util_.ConstructSpdyDataFrame(3, true)); MockRead spdy_reads[] = { CreateMockRead(host1_resp, 1), CreateMockRead(host1_resp_body, 2), CreateMockRead(host2_resp, 4), CreateMockRead(host2_resp_body, 5), MockRead(ASYNC, 0, 6), }; IPEndPoint peer_addr(IPAddress::IPv4Localhost(), 443); MockConnect connect(ASYNC, OK, peer_addr); SequencedSocketData spdy_data(connect, spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get()); int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://mail.example.com/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans2.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); } // Regression test for https://crbug.com/546991. // The server might not be able to serve an IP pooled request, and might send a // 421 Misdirected Request response status to indicate this. // HttpNetworkTransaction should reset the request and retry without IP pooling. TEST_F(HttpNetworkTransactionTest, RetryWithoutConnectionPooling) { // Two hosts resolve to the same IP address. const std::string ip_addr = "1.2.3.4"; IPAddress ip; ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr)); IPEndPoint peer_addr = IPEndPoint(ip, 443); session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>(); session_deps_.host_resolver->rules()->AddRule("www.example.org", ip_addr); session_deps_.host_resolver->rules()->AddRule("mail.example.org", ip_addr); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Two requests on the first connection. spdy::SpdySerializedFrame req1( spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST)); spdy_util_.UpdateWithStreamDestruction(1); spdy::SpdySerializedFrame req2( spdy_util_.ConstructSpdyGet("https://mail.example.org", 3, LOWEST)); spdy::SpdySerializedFrame rst( spdy_util_.ConstructSpdyRstStream(3, spdy::ERROR_CODE_CANCEL)); MockWrite writes1[] = { CreateMockWrite(req1, 0), CreateMockWrite(req2, 3), CreateMockWrite(rst, 6), }; // The first one succeeds, the second gets error 421 Misdirected Request. spdy::SpdySerializedFrame resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdyHeaderBlock response_headers; response_headers[spdy::kHttp2StatusHeader] = "421"; spdy::SpdySerializedFrame resp2( spdy_util_.ConstructSpdyReply(3, std::move(response_headers))); MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2), CreateMockRead(resp2, 4), MockRead(ASYNC, 0, 5)}; MockConnect connect1(ASYNC, OK, peer_addr); SequencedSocketData data1(connect1, reads1, writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); AddSSLSocketData(); // Retry the second request on a second connection. SpdyTestUtil spdy_util2; spdy::SpdySerializedFrame req3( spdy_util2.ConstructSpdyGet("https://mail.example.org", 1, LOWEST)); MockWrite writes2[] = { CreateMockWrite(req3, 0), }; spdy::SpdySerializedFrame resp3( spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body3(spdy_util2.ConstructSpdyDataFrame(1, true)); MockRead reads2[] = {CreateMockRead(resp3, 1), CreateMockRead(body3, 2), MockRead(ASYNC, 0, 3)}; MockConnect connect2(ASYNC, OK, peer_addr); SequencedSocketData data2(connect2, reads2, writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); AddSSLSocketData(); // Preload mail.example.org into HostCache. int rv = session_deps_.host_resolver->LoadIntoCache( HostPortPair("mail.example.com", 443), base::nullopt); EXPECT_THAT(rv, IsOk()); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; rv = trans1.Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://mail.example.org/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); BoundTestNetLog log; rv = trans2.Start(&request2, callback.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); response = trans2.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); TestNetLogEntry::List entries; log.GetEntries(&entries); ExpectLogContainsSomewhere( entries, 0, NetLogEventType::HTTP_TRANSACTION_RESTART_MISDIRECTED_REQUEST, NetLogEventPhase::NONE); } // Test that HTTP 421 responses are properly returned to the caller if received // on the retry as well. HttpNetworkTransaction should not infinite loop or lose // portions of the response. TEST_F(HttpNetworkTransactionTest, ReturnHTTP421OnRetry) { // Two hosts resolve to the same IP address. const std::string ip_addr = "1.2.3.4"; IPAddress ip; ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr)); IPEndPoint peer_addr = IPEndPoint(ip, 443); session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>(); session_deps_.host_resolver->rules()->AddRule("www.example.org", ip_addr); session_deps_.host_resolver->rules()->AddRule("mail.example.org", ip_addr); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Two requests on the first connection. spdy::SpdySerializedFrame req1( spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST)); spdy_util_.UpdateWithStreamDestruction(1); spdy::SpdySerializedFrame req2( spdy_util_.ConstructSpdyGet("https://mail.example.org", 3, LOWEST)); spdy::SpdySerializedFrame rst( spdy_util_.ConstructSpdyRstStream(3, spdy::ERROR_CODE_CANCEL)); MockWrite writes1[] = { CreateMockWrite(req1, 0), CreateMockWrite(req2, 3), CreateMockWrite(rst, 6), }; // The first one succeeds, the second gets error 421 Misdirected Request. spdy::SpdySerializedFrame resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdyHeaderBlock response_headers; response_headers[spdy::kHttp2StatusHeader] = "421"; spdy::SpdySerializedFrame resp2( spdy_util_.ConstructSpdyReply(3, response_headers.Clone())); MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2), CreateMockRead(resp2, 4), MockRead(ASYNC, 0, 5)}; MockConnect connect1(ASYNC, OK, peer_addr); SequencedSocketData data1(connect1, reads1, writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); AddSSLSocketData(); // Retry the second request on a second connection. It returns 421 Misdirected // Retry again. SpdyTestUtil spdy_util2; spdy::SpdySerializedFrame req3( spdy_util2.ConstructSpdyGet("https://mail.example.org", 1, LOWEST)); MockWrite writes2[] = { CreateMockWrite(req3, 0), }; spdy::SpdySerializedFrame resp3( spdy_util2.ConstructSpdyReply(1, std::move(response_headers))); spdy::SpdySerializedFrame body3(spdy_util2.ConstructSpdyDataFrame(1, true)); MockRead reads2[] = {CreateMockRead(resp3, 1), CreateMockRead(body3, 2), MockRead(ASYNC, 0, 3)}; MockConnect connect2(ASYNC, OK, peer_addr); SequencedSocketData data2(connect2, reads2, writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); AddSSLSocketData(); // Preload mail.example.org into HostCache. int rv = session_deps_.host_resolver->LoadIntoCache( HostPortPair("mail.example.com", 443), base::nullopt); EXPECT_THAT(rv, IsOk()); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; rv = trans1.Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://mail.example.org/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); BoundTestNetLog log; rv = trans2.Start(&request2, callback.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); // After a retry, the 421 Misdirected Request is reported back up to the // caller. response = trans2.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 421", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); EXPECT_TRUE(response->ssl_info.cert); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); } TEST_F(HttpNetworkTransactionTest, UseIPConnectionPoolingWithHostCacheExpiration) { // Set up HostResolver to invalidate cached entries after 1 cached resolve. session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>(1 /* cache_invalidation_num */); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); AddSSLSocketData(); spdy::SpdySerializedFrame host1_req( spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST)); spdy_util_.UpdateWithStreamDestruction(1); spdy::SpdySerializedFrame host2_req( spdy_util_.ConstructSpdyGet("https://mail.example.com", 3, LOWEST)); MockWrite spdy_writes[] = { CreateMockWrite(host1_req, 0), CreateMockWrite(host2_req, 3), }; spdy::SpdySerializedFrame host1_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame host1_resp_body( spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame host2_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); spdy::SpdySerializedFrame host2_resp_body( spdy_util_.ConstructSpdyDataFrame(3, true)); MockRead spdy_reads[] = { CreateMockRead(host1_resp, 1), CreateMockRead(host1_resp_body, 2), CreateMockRead(host2_resp, 4), CreateMockRead(host2_resp_body, 5), MockRead(ASYNC, 0, 6), }; IPEndPoint peer_addr(IPAddress::IPv4Localhost(), 443); MockConnect connect(ASYNC, OK, peer_addr); SequencedSocketData spdy_data(connect, spdy_reads, spdy_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy_data); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get()); int rv = trans1.Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans1.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans1, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); // Preload cache entries into HostCache. rv = session_deps_.host_resolver->LoadIntoCache( HostPortPair("mail.example.com", 443), base::nullopt); EXPECT_THAT(rv, IsOk()); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://mail.example.com/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans2.GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(&trans2, &response_data), IsOk()); EXPECT_EQ("hello!", response_data); } TEST_F(HttpNetworkTransactionTest, DoNotUseSpdySessionForHttp) { const std::string https_url = "https://www.example.org:8080/"; const std::string http_url = "http://www.example.org:8080/"; // SPDY GET for HTTPS URL spdy::SpdySerializedFrame req1( spdy_util_.ConstructSpdyGet(https_url.c_str(), 1, LOWEST)); MockWrite writes1[] = { CreateMockWrite(req1, 0), }; spdy::SpdySerializedFrame resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3)}; SequencedSocketData data1(reads1, writes1); MockConnect connect_data1(ASYNC, OK); data1.set_connect_data(connect_data1); // HTTP GET for the HTTP URL MockWrite writes2[] = { MockWrite(ASYNC, 0, "GET / HTTP/1.1\r\n" "Host: www.example.org:8080\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead reads2[] = { MockRead(ASYNC, 1, "HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead(ASYNC, 2, "hello"), MockRead(ASYNC, OK, 3), }; SequencedSocketData data2(reads2, writes2); SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Start the first transaction to set up the SpdySession HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL(https_url); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(LOWEST, session.get()); TestCompletionCallback callback1; EXPECT_EQ(ERR_IO_PENDING, trans1.Start(&request1, callback1.callback(), NetLogWithSource())); base::RunLoop().RunUntilIdle(); EXPECT_THAT(callback1.WaitForResult(), IsOk()); EXPECT_TRUE(trans1.GetResponseInfo()->was_fetched_via_spdy); // Now, start the HTTP request HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL(http_url); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(MEDIUM, session.get()); TestCompletionCallback callback2; EXPECT_EQ(ERR_IO_PENDING, trans2.Start(&request2, callback2.callback(), NetLogWithSource())); base::RunLoop().RunUntilIdle(); EXPECT_THAT(callback2.WaitForResult(), IsOk()); EXPECT_FALSE(trans2.GetResponseInfo()->was_fetched_via_spdy); } // Alternative service requires HTTP/2 (or SPDY), but HTTP/1.1 is negotiated // with the alternative server. That connection should not be used. TEST_F(HttpNetworkTransactionTest, AlternativeServiceNotOnHttp11) { url::SchemeHostPort server("https", "www.example.org", 443); HostPortPair alternative("www.example.org", 444); // Negotiate HTTP/1.1 with alternative. SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); // No data should be read from the alternative, because HTTP/1.1 is // negotiated. StaticSocketDataProvider data; session_deps_.socket_factory->AddSocketDataProvider(&data); // This test documents that an alternate Job should not be used if HTTP/1.1 is // negotiated. In order to test this, a failed connection to the server is // mocked. This way the request relies on the alternate Job. StaticSocketDataProvider data_refused; data_refused.set_connect_data(MockConnect(ASYNC, ERR_CONNECTION_REFUSED)); session_deps_.socket_factory->AddSocketDataProvider(&data_refused); // Set up alternative service for server. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); AlternativeService alternative_service(kProtoHTTP2, alternative); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( server, alternative_service, expiration); HttpRequestInfo request; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); request.method = "GET"; request.url = GURL("https://www.example.org:443"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback; // HTTP/2 (or SPDY) is required for alternative service, if HTTP/1.1 is // negotiated, the alternate Job should fail with ERR_ALPN_NEGOTIATION_FAILED. int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsError(ERR_ALPN_NEGOTIATION_FAILED)); } // A request to a server with an alternative service fires two Jobs: one to the // server, and an alternate one to the alternative server. If the former // succeeds, the request should succeed, even if the latter fails because // HTTP/1.1 is negotiated which is insufficient for alternative service. TEST_F(HttpNetworkTransactionTest, FailedAlternativeServiceIsNotUserVisible) { url::SchemeHostPort server("https", "www.example.org", 443); HostPortPair alternative("www.example.org", 444); // Negotiate HTTP/1.1 with alternative. SSLSocketDataProvider alternative_ssl(ASYNC, OK); alternative_ssl.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&alternative_ssl); // No data should be read from the alternative, because HTTP/1.1 is // negotiated. StaticSocketDataProvider data; session_deps_.socket_factory->AddSocketDataProvider(&data); // Negotiate HTTP/1.1 with server. SSLSocketDataProvider origin_ssl(ASYNC, OK); origin_ssl.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&origin_ssl); MockWrite http_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), MockWrite("GET /second HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead http_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html\r\n"), MockRead("Content-Length: 6\r\n\r\n"), MockRead("foobar"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html\r\n"), MockRead("Content-Length: 7\r\n\r\n"), MockRead("another"), }; StaticSocketDataProvider http_data(http_reads, http_writes); session_deps_.socket_factory->AddSocketDataProvider(&http_data); // Set up alternative service for server. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); AlternativeService alternative_service(kProtoHTTP2, alternative); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( server, alternative_service, expiration); HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get()); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org:443"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback1; int rv = trans1.Start(&request1, callback1.callback(), NetLogWithSource()); rv = callback1.GetResult(rv); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response1 = trans1.GetResponseInfo(); ASSERT_TRUE(response1); ASSERT_TRUE(response1->headers); EXPECT_EQ("HTTP/1.1 200 OK", response1->headers->GetStatusLine()); std::string response_data1; ASSERT_THAT(ReadTransaction(&trans1, &response_data1), IsOk()); EXPECT_EQ("foobar", response_data1); // Alternative should be marked as broken, because HTTP/1.1 is not sufficient // for alternative service. EXPECT_TRUE( http_server_properties->IsAlternativeServiceBroken(alternative_service)); // Since |alternative_service| is broken, a second transaction to server // should not start an alternate Job. It should pool to existing connection // to server. HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://www.example.org:443/second"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback2; rv = trans2.Start(&request2, callback2.callback(), NetLogWithSource()); rv = callback2.GetResult(rv); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response2 = trans2.GetResponseInfo(); ASSERT_TRUE(response2); ASSERT_TRUE(response2->headers); EXPECT_EQ("HTTP/1.1 200 OK", response2->headers->GetStatusLine()); std::string response_data2; ASSERT_THAT(ReadTransaction(&trans2, &response_data2), IsOk()); EXPECT_EQ("another", response_data2); } // Alternative service requires HTTP/2 (or SPDY), but there is already a // HTTP/1.1 socket open to the alternative server. That socket should not be // used. TEST_F(HttpNetworkTransactionTest, AlternativeServiceShouldNotPoolToHttp11) { url::SchemeHostPort server("https", "origin.example.org", 443); HostPortPair alternative("alternative.example.org", 443); std::string origin_url = "https://origin.example.org:443"; std::string alternative_url = "https://alternative.example.org:443"; // Negotiate HTTP/1.1 with alternative.example.org. SSLSocketDataProvider ssl(ASYNC, OK); ssl.next_proto = kProtoHTTP11; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); // HTTP/1.1 data for |request1| and |request2|. MockWrite http_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: alternative.example.org\r\n" "Connection: keep-alive\r\n\r\n"), MockWrite( "GET / HTTP/1.1\r\n" "Host: alternative.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead http_reads[] = { MockRead( "HTTP/1.1 200 OK\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 40\r\n\r\n" "first HTTP/1.1 response from alternative"), MockRead( "HTTP/1.1 200 OK\r\n" "Content-Type: text/html; charset=iso-8859-1\r\n" "Content-Length: 41\r\n\r\n" "second HTTP/1.1 response from alternative"), }; StaticSocketDataProvider http_data(http_reads, http_writes); session_deps_.socket_factory->AddSocketDataProvider(&http_data); // This test documents that an alternate Job should not pool to an already // existing HTTP/1.1 connection. In order to test this, a failed connection // to the server is mocked. This way |request2| relies on the alternate Job. StaticSocketDataProvider data_refused; data_refused.set_connect_data(MockConnect(ASYNC, ERR_CONNECTION_REFUSED)); session_deps_.socket_factory->AddSocketDataProvider(&data_refused); // Set up alternative service for server. std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpServerProperties* http_server_properties = session->http_server_properties(); AlternativeService alternative_service(kProtoHTTP2, alternative); base::Time expiration = base::Time::Now() + base::TimeDelta::FromDays(1); http_server_properties->SetHttp2AlternativeService( server, alternative_service, expiration); // First transaction to alternative to open an HTTP/1.1 socket. HttpRequestInfo request1; HttpNetworkTransaction trans1(DEFAULT_PRIORITY, session.get()); request1.method = "GET"; request1.url = GURL(alternative_url); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback1; int rv = trans1.Start(&request1, callback1.callback(), NetLogWithSource()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); const HttpResponseInfo* response1 = trans1.GetResponseInfo(); ASSERT_TRUE(response1); ASSERT_TRUE(response1->headers); EXPECT_EQ("HTTP/1.1 200 OK", response1->headers->GetStatusLine()); EXPECT_TRUE(response1->was_alpn_negotiated); EXPECT_FALSE(response1->was_fetched_via_spdy); std::string response_data1; ASSERT_THAT(ReadTransaction(&trans1, &response_data1), IsOk()); EXPECT_EQ("first HTTP/1.1 response from alternative", response_data1); // Request for origin.example.org, which has an alternative service. This // will start two Jobs: the alternative looks for connections to pool to, // finds one which is HTTP/1.1, and should ignore it, and should not try to // open other connections to alternative server. The Job to server fails, so // this request fails. HttpRequestInfo request2; HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); request2.method = "GET"; request2.url = GURL(origin_url); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback2; rv = trans2.Start(&request2, callback2.callback(), NetLogWithSource()); EXPECT_THAT(callback2.GetResult(rv), IsError(ERR_CONNECTION_REFUSED)); // Another transaction to alternative. This is to test that the HTTP/1.1 // socket is still open and in the pool. HttpRequestInfo request3; HttpNetworkTransaction trans3(DEFAULT_PRIORITY, session.get()); request3.method = "GET"; request3.url = GURL(alternative_url); request3.load_flags = 0; request3.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback3; rv = trans3.Start(&request3, callback3.callback(), NetLogWithSource()); EXPECT_THAT(callback3.GetResult(rv), IsOk()); const HttpResponseInfo* response3 = trans3.GetResponseInfo(); ASSERT_TRUE(response3); ASSERT_TRUE(response3->headers); EXPECT_EQ("HTTP/1.1 200 OK", response3->headers->GetStatusLine()); EXPECT_TRUE(response3->was_alpn_negotiated); EXPECT_FALSE(response3->was_fetched_via_spdy); std::string response_data3; ASSERT_THAT(ReadTransaction(&trans3, &response_data3), IsOk()); EXPECT_EQ("second HTTP/1.1 response from alternative", response_data3); } TEST_F(HttpNetworkTransactionTest, DoNotUseSpdySessionForHttpOverTunnel) { const std::string https_url = "https://www.example.org:8080/"; const std::string http_url = "http://www.example.org:8080/"; // Separate SPDY util instance for naked and wrapped requests. SpdyTestUtil spdy_util_wrapped; // SPDY GET for HTTPS URL (through CONNECT tunnel) const HostPortPair host_port_pair("www.example.org", 8080); spdy::SpdySerializedFrame connect(spdy_util_.ConstructSpdyConnect( nullptr, 0, 1, HttpProxyConnectJob::kH2QuicTunnelPriority, host_port_pair)); spdy::SpdySerializedFrame req1( spdy_util_wrapped.ConstructSpdyGet(https_url.c_str(), 1, LOWEST)); spdy::SpdySerializedFrame wrapped_req1( spdy_util_.ConstructWrappedSpdyFrame(req1, 1)); // SPDY GET for HTTP URL (through the proxy, but not the tunnel). spdy::SpdyHeaderBlock req2_block; req2_block[spdy::kHttp2MethodHeader] = "GET"; req2_block[spdy::kHttp2AuthorityHeader] = "www.example.org:8080"; req2_block[spdy::kHttp2SchemeHeader] = "http"; req2_block[spdy::kHttp2PathHeader] = "/"; spdy::SpdySerializedFrame req2( spdy_util_.ConstructSpdyHeaders(3, std::move(req2_block), MEDIUM, true)); MockWrite writes1[] = { CreateMockWrite(connect, 0), CreateMockWrite(wrapped_req1, 2), CreateMockWrite(req2, 6), }; spdy::SpdySerializedFrame conn_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame resp1( spdy_util_wrapped.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body1( spdy_util_wrapped.ConstructSpdyDataFrame(1, true)); spdy::SpdySerializedFrame wrapped_resp1( spdy_util_wrapped.ConstructWrappedSpdyFrame(resp1, 1)); spdy::SpdySerializedFrame wrapped_body1( spdy_util_wrapped.ConstructWrappedSpdyFrame(body1, 1)); spdy::SpdySerializedFrame resp2( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 3)); spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(3, true)); MockRead reads1[] = { CreateMockRead(conn_resp, 1), MockRead(ASYNC, ERR_IO_PENDING, 3), CreateMockRead(wrapped_resp1, 4), CreateMockRead(wrapped_body1, 5), MockRead(ASYNC, ERR_IO_PENDING, 7), CreateMockRead(resp2, 8), CreateMockRead(body2, 9), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 10), }; SequencedSocketData data1(reads1, writes1); MockConnect connect_data1(ASYNC, OK); data1.set_connect_data(connect_data1); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "HTTPS proxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); TestNetLog log; session_deps_.net_log = &log; SSLSocketDataProvider ssl1(ASYNC, OK); // to the proxy ssl1.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); SSLSocketDataProvider ssl2(ASYNC, OK); // to the server ssl2.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); session_deps_.socket_factory->AddSocketDataProvider(&data1); std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); // Start the first transaction to set up the SpdySession HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL(https_url); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(LOWEST, session.get()); TestCompletionCallback callback1; int rv = trans1.Start(&request1, callback1.callback(), NetLogWithSource()); // This pause is a hack to avoid running into https://crbug.com/497228. data1.RunUntilPaused(); base::RunLoop().RunUntilIdle(); data1.Resume(); EXPECT_THAT(callback1.GetResult(rv), IsOk()); EXPECT_TRUE(trans1.GetResponseInfo()->was_fetched_via_spdy); LoadTimingInfo load_timing_info1; EXPECT_TRUE(trans1.GetLoadTimingInfo(&load_timing_info1)); TestLoadTimingNotReusedWithPac(load_timing_info1, CONNECT_TIMING_HAS_SSL_TIMES); // Now, start the HTTP request. HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL(http_url); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(MEDIUM, session.get()); TestCompletionCallback callback2; rv = trans2.Start(&request2, callback2.callback(), NetLogWithSource()); // This pause is a hack to avoid running into https://crbug.com/497228. data1.RunUntilPaused(); base::RunLoop().RunUntilIdle(); data1.Resume(); EXPECT_THAT(callback2.GetResult(rv), IsOk()); EXPECT_TRUE(trans2.GetResponseInfo()->was_fetched_via_spdy); LoadTimingInfo load_timing_info2; EXPECT_TRUE(trans2.GetLoadTimingInfo(&load_timing_info2)); // The established SPDY sessions is considered reused by the HTTP request. TestLoadTimingReusedWithPac(load_timing_info2); // HTTP requests over a SPDY session should have a different connection // socket_log_id than requests over a tunnel. EXPECT_NE(load_timing_info1.socket_log_id, load_timing_info2.socket_log_id); } // Test that in the case where we have a SPDY session to a SPDY proxy // that we do not pool other origins that resolve to the same IP when // the certificate does not match the new origin. // http://crbug.com/134690 TEST_F(HttpNetworkTransactionTest, DoNotUseSpdySessionIfCertDoesNotMatch) { const std::string url1 = "http://www.example.org/"; const std::string url2 = "https://news.example.org/"; const std::string ip_addr = "1.2.3.4"; // Second SpdyTestUtil instance for the second socket. SpdyTestUtil spdy_util_secure; // SPDY GET for HTTP URL (through SPDY proxy) spdy::SpdyHeaderBlock headers( spdy_util_.ConstructGetHeaderBlockForProxy("http://www.example.org/")); spdy::SpdySerializedFrame req1( spdy_util_.ConstructSpdyHeaders(1, std::move(headers), LOWEST, true)); MockWrite writes1[] = { CreateMockWrite(req1, 0), }; spdy::SpdySerializedFrame resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead reads1[] = { MockRead(ASYNC, ERR_IO_PENDING, 1), CreateMockRead(resp1, 2), CreateMockRead(body1, 3), MockRead(ASYNC, OK, 4), // EOF }; SequencedSocketData data1(reads1, writes1); IPAddress ip; ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr)); IPEndPoint peer_addr = IPEndPoint(ip, 443); MockConnect connect_data1(ASYNC, OK, peer_addr); data1.set_connect_data(connect_data1); // SPDY GET for HTTPS URL (direct) spdy::SpdySerializedFrame req2( spdy_util_secure.ConstructSpdyGet(url2.c_str(), 1, MEDIUM)); MockWrite writes2[] = { CreateMockWrite(req2, 0), }; spdy::SpdySerializedFrame resp2( spdy_util_secure.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body2( spdy_util_secure.ConstructSpdyDataFrame(1, true)); MockRead reads2[] = {CreateMockRead(resp2, 1), CreateMockRead(body2, 2), MockRead(ASYNC, OK, 3)}; SequencedSocketData data2(reads2, writes2); MockConnect connect_data2(ASYNC, OK); data2.set_connect_data(connect_data2); // Set up a proxy config that sends HTTP requests to a proxy, and // all others direct. ProxyConfig proxy_config; proxy_config.proxy_rules().ParseFromString("http=https://proxy:443"); session_deps_.proxy_resolution_service = std::make_unique<ProxyResolutionService>( std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation( proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)), nullptr, nullptr); SSLSocketDataProvider ssl1(ASYNC, OK); // to the proxy ssl1.next_proto = kProtoHTTP2; // Load a valid cert. Note, that this does not need to // be valid for proxy because the MockSSLClientSocket does // not actually verify it. But SpdySession will use this // to see if it is valid for the new origin ssl1.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); ASSERT_TRUE(ssl1.ssl_info.cert); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl2(ASYNC, OK); // to the server ssl2.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); session_deps_.socket_factory->AddSocketDataProvider(&data2); session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>(); session_deps_.host_resolver->rules()->AddRule("news.example.org", ip_addr); session_deps_.host_resolver->rules()->AddRule("proxy", ip_addr); std::unique_ptr<HttpNetworkSession> session = CreateSession(&session_deps_); // Start the first transaction to set up the SpdySession HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL(url1); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(LOWEST, session.get()); TestCompletionCallback callback1; ASSERT_EQ(ERR_IO_PENDING, trans1.Start(&request1, callback1.callback(), NetLogWithSource())); // This pause is a hack to avoid running into https://crbug.com/497228. data1.RunUntilPaused(); base::RunLoop().RunUntilIdle(); data1.Resume(); EXPECT_THAT(callback1.WaitForResult(), IsOk()); EXPECT_TRUE(trans1.GetResponseInfo()->was_fetched_via_spdy); // Now, start the HTTP request HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL(url2); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(MEDIUM, session.get()); TestCompletionCallback callback2; EXPECT_EQ(ERR_IO_PENDING, trans2.Start(&request2, callback2.callback(), NetLogWithSource())); base::RunLoop().RunUntilIdle(); ASSERT_TRUE(callback2.have_result()); EXPECT_THAT(callback2.WaitForResult(), IsOk()); EXPECT_TRUE(trans2.GetResponseInfo()->was_fetched_via_spdy); } // Test to verify that a failed socket read (due to an ERR_CONNECTION_CLOSED // error) in SPDY session, removes the socket from pool and closes the SPDY // session. Verify that new url's from the same HttpNetworkSession (and a new // SpdySession) do work. http://crbug.com/224701 TEST_F(HttpNetworkTransactionTest, ErrorSocketNotConnected) { const std::string https_url = "https://www.example.org/"; MockRead reads1[] = { MockRead(SYNCHRONOUS, ERR_CONNECTION_CLOSED, 0) }; SequencedSocketData data1(reads1, base::span<MockWrite>()); spdy::SpdySerializedFrame req2( spdy_util_.ConstructSpdyGet(https_url.c_str(), 1, MEDIUM)); MockWrite writes2[] = { CreateMockWrite(req2, 0), }; spdy::SpdySerializedFrame resp2( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body2(spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead reads2[] = { CreateMockRead(resp2, 1), CreateMockRead(body2, 2), MockRead(ASYNC, OK, 3) // EOF }; SequencedSocketData data2(reads2, writes2); SSLSocketDataProvider ssl1(ASYNC, OK); ssl1.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl2(ASYNC, OK); ssl2.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); session_deps_.socket_factory->AddSocketDataProvider(&data2); std::unique_ptr<HttpNetworkSession> session( SpdySessionDependencies::SpdyCreateSession(&session_deps_)); // Start the first transaction to set up the SpdySession and verify that // connection was closed. HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL(https_url); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans1(MEDIUM, session.get()); TestCompletionCallback callback1; EXPECT_EQ(ERR_IO_PENDING, trans1.Start(&request1, callback1.callback(), NetLogWithSource())); EXPECT_THAT(callback1.WaitForResult(), IsError(ERR_CONNECTION_CLOSED)); // Now, start the second request and make sure it succeeds. HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL(https_url); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(MEDIUM, session.get()); TestCompletionCallback callback2; EXPECT_EQ(ERR_IO_PENDING, trans2.Start(&request2, callback2.callback(), NetLogWithSource())); ASSERT_THAT(callback2.WaitForResult(), IsOk()); EXPECT_TRUE(trans2.GetResponseInfo()->was_fetched_via_spdy); } TEST_F(HttpNetworkTransactionTest, CloseIdleSpdySessionToOpenNewOne) { ClientSocketPoolManager::set_max_sockets_per_group( HttpNetworkSession::NORMAL_SOCKET_POOL, 1); ClientSocketPoolManager::set_max_sockets_per_pool( HttpNetworkSession::NORMAL_SOCKET_POOL, 1); // Use two different hosts with different IPs so they don't get pooled. session_deps_.host_resolver->rules()->AddRule("www.a.com", "10.0.0.1"); session_deps_.host_resolver->rules()->AddRule("www.b.com", "10.0.0.2"); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); SSLSocketDataProvider ssl1(ASYNC, OK); ssl1.next_proto = kProtoHTTP2; SSLSocketDataProvider ssl2(ASYNC, OK); ssl2.next_proto = kProtoHTTP2; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); spdy::SpdySerializedFrame host1_req( spdy_util_.ConstructSpdyGet("https://www.a.com", 1, DEFAULT_PRIORITY)); MockWrite spdy1_writes[] = { CreateMockWrite(host1_req, 0), }; spdy::SpdySerializedFrame host1_resp( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame host1_resp_body( spdy_util_.ConstructSpdyDataFrame(1, true)); MockRead spdy1_reads[] = { CreateMockRead(host1_resp, 1), CreateMockRead(host1_resp_body, 2), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3), }; // Use a separate test instance for the separate SpdySession that will be // created. SpdyTestUtil spdy_util_2; SequencedSocketData spdy1_data(spdy1_reads, spdy1_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy1_data); spdy::SpdySerializedFrame host2_req( spdy_util_2.ConstructSpdyGet("https://www.b.com", 1, DEFAULT_PRIORITY)); MockWrite spdy2_writes[] = { CreateMockWrite(host2_req, 0), }; spdy::SpdySerializedFrame host2_resp( spdy_util_2.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame host2_resp_body( spdy_util_2.ConstructSpdyDataFrame(1, true)); MockRead spdy2_reads[] = { CreateMockRead(host2_resp, 1), CreateMockRead(host2_resp_body, 2), MockRead(SYNCHRONOUS, ERR_IO_PENDING, 3), }; SequencedSocketData spdy2_data(spdy2_reads, spdy2_writes); session_deps_.socket_factory->AddSocketDataProvider(&spdy2_data); MockWrite http_write[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.a.com\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead http_read[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 6\r\n\r\n"), MockRead("hello!"), }; StaticSocketDataProvider http_data(http_read, http_write); session_deps_.socket_factory->AddSocketDataProvider(&http_data); HostPortPair host_port_pair_a("www.a.com", 443); SpdySessionKey spdy_session_key_a( host_port_pair_a, ProxyServer::Direct(), PRIVACY_MODE_DISABLED, SpdySessionKey::IsProxySession::kFalse, SocketTag()); EXPECT_FALSE( HasSpdySession(session->spdy_session_pool(), spdy_session_key_a)); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.a.com/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello!", response_data); trans.reset(); EXPECT_TRUE( HasSpdySession(session->spdy_session_pool(), spdy_session_key_a)); HostPortPair host_port_pair_b("www.b.com", 443); SpdySessionKey spdy_session_key_b( host_port_pair_b, ProxyServer::Direct(), PRIVACY_MODE_DISABLED, SpdySessionKey::IsProxySession::kFalse, SocketTag()); EXPECT_FALSE( HasSpdySession(session->spdy_session_pool(), spdy_session_key_b)); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://www.b.com/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans->Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello!", response_data); EXPECT_FALSE( HasSpdySession(session->spdy_session_pool(), spdy_session_key_a)); EXPECT_TRUE( HasSpdySession(session->spdy_session_pool(), spdy_session_key_b)); HostPortPair host_port_pair_a1("www.a.com", 80); SpdySessionKey spdy_session_key_a1( host_port_pair_a1, ProxyServer::Direct(), PRIVACY_MODE_DISABLED, SpdySessionKey::IsProxySession::kFalse, SocketTag()); EXPECT_FALSE( HasSpdySession(session->spdy_session_pool(), spdy_session_key_a1)); HttpRequestInfo request3; request3.method = "GET"; request3.url = GURL("http://www.a.com/"); request3.load_flags = 0; request3.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); rv = trans->Start(&request3, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsOk()); response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200 OK", response->headers->GetStatusLine()); EXPECT_FALSE(response->was_fetched_via_spdy); EXPECT_FALSE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello!", response_data); EXPECT_FALSE( HasSpdySession(session->spdy_session_pool(), spdy_session_key_a)); EXPECT_FALSE( HasSpdySession(session->spdy_session_pool(), spdy_session_key_b)); } TEST_F(HttpNetworkTransactionTest, HttpSyncConnectError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockConnect mock_connect(SYNCHRONOUS, ERR_NAME_NOT_RESOLVED); StaticSocketDataProvider data; data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_NAME_NOT_RESOLVED)); // We don't care whether this succeeds or fails, but it shouldn't crash. HttpRequestHeaders request_headers; trans.GetFullRequestHeaders(&request_headers); ConnectionAttempts attempts; trans.GetConnectionAttempts(&attempts); ASSERT_EQ(1u, attempts.size()); EXPECT_THAT(attempts[0].result, IsError(ERR_NAME_NOT_RESOLVED)); IPEndPoint endpoint; EXPECT_FALSE(trans.GetRemoteEndpoint(&endpoint)); EXPECT_TRUE(endpoint.address().empty()); } TEST_F(HttpNetworkTransactionTest, HttpAsyncConnectError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockConnect mock_connect(ASYNC, ERR_NAME_NOT_RESOLVED); StaticSocketDataProvider data; data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_NAME_NOT_RESOLVED)); // We don't care whether this succeeds or fails, but it shouldn't crash. HttpRequestHeaders request_headers; trans.GetFullRequestHeaders(&request_headers); ConnectionAttempts attempts; trans.GetConnectionAttempts(&attempts); ASSERT_EQ(1u, attempts.size()); EXPECT_THAT(attempts[0].result, IsError(ERR_NAME_NOT_RESOLVED)); IPEndPoint endpoint; EXPECT_FALSE(trans.GetRemoteEndpoint(&endpoint)); EXPECT_TRUE(endpoint.address().empty()); } TEST_F(HttpNetworkTransactionTest, HttpSyncWriteError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead(SYNCHRONOUS, ERR_UNEXPECTED), // Should not be reached. }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); HttpRequestHeaders request_headers; EXPECT_TRUE(trans.GetFullRequestHeaders(&request_headers)); EXPECT_TRUE(request_headers.HasHeader("Host")); } TEST_F(HttpNetworkTransactionTest, HttpAsyncWriteError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite(ASYNC, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead(SYNCHRONOUS, ERR_UNEXPECTED), // Should not be reached. }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); HttpRequestHeaders request_headers; EXPECT_TRUE(trans.GetFullRequestHeaders(&request_headers)); EXPECT_TRUE(request_headers.HasHeader("Host")); } TEST_F(HttpNetworkTransactionTest, HttpSyncReadError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead(SYNCHRONOUS, ERR_CONNECTION_RESET), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); HttpRequestHeaders request_headers; EXPECT_TRUE(trans.GetFullRequestHeaders(&request_headers)); EXPECT_TRUE(request_headers.HasHeader("Host")); } TEST_F(HttpNetworkTransactionTest, HttpAsyncReadError) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead(ASYNC, ERR_CONNECTION_RESET), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); HttpRequestHeaders request_headers; EXPECT_TRUE(trans.GetFullRequestHeaders(&request_headers)); EXPECT_TRUE(request_headers.HasHeader("Host")); } TEST_F(HttpNetworkTransactionTest, GetFullRequestHeadersIncludesExtraHeader) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.extra_headers.SetHeader("X-Foo", "bar"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "X-Foo: bar\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n" "Content-Length: 5\r\n\r\n" "hello"), MockRead(ASYNC, ERR_UNEXPECTED), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); HttpRequestHeaders request_headers; EXPECT_TRUE(trans.GetFullRequestHeaders(&request_headers)); std::string foo; EXPECT_TRUE(request_headers.GetHeader("X-Foo", &foo)); EXPECT_EQ("bar", foo); } // Tests that when a used socket is returned to the SSL socket pool, it's closed // if the transport socket pool is stalled on the global socket limit. TEST_F(HttpNetworkTransactionTest, CloseSSLSocketOnIdleForHttpRequest) { ClientSocketPoolManager::set_max_sockets_per_group( HttpNetworkSession::NORMAL_SOCKET_POOL, 1); ClientSocketPoolManager::set_max_sockets_per_pool( HttpNetworkSession::NORMAL_SOCKET_POOL, 1); // Set up SSL request. HttpRequestInfo ssl_request; ssl_request.method = "GET"; ssl_request.url = GURL("https://www.example.org/"); ssl_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite ssl_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead ssl_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 11\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider ssl_data(ssl_reads, ssl_writes); session_deps_.socket_factory->AddSocketDataProvider(&ssl_data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); // Set up HTTP request. HttpRequestInfo http_request; http_request.method = "GET"; http_request.url = GURL("http://www.example.org/"); http_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite http_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead http_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 7\r\n\r\n"), MockRead("falafel"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider http_data(http_reads, http_writes); session_deps_.socket_factory->AddSocketDataProvider(&http_data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Start the SSL request. TestCompletionCallback ssl_callback; HttpNetworkTransaction ssl_trans(DEFAULT_PRIORITY, session.get()); ASSERT_EQ(ERR_IO_PENDING, ssl_trans.Start(&ssl_request, ssl_callback.callback(), NetLogWithSource())); // Start the HTTP request. Pool should stall. TestCompletionCallback http_callback; HttpNetworkTransaction http_trans(DEFAULT_PRIORITY, session.get()); ASSERT_EQ(ERR_IO_PENDING, http_trans.Start(&http_request, http_callback.callback(), NetLogWithSource())); EXPECT_TRUE(IsTransportSocketPoolStalled(session.get())); // Wait for response from SSL request. ASSERT_THAT(ssl_callback.WaitForResult(), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(&ssl_trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); // The SSL socket should automatically be closed, so the HTTP request can // start. EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); ASSERT_FALSE(IsTransportSocketPoolStalled(session.get())); // The HTTP request can now complete. ASSERT_THAT(http_callback.WaitForResult(), IsOk()); ASSERT_THAT(ReadTransaction(&http_trans, &response_data), IsOk()); EXPECT_EQ("falafel", response_data); EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); } // Tests that when a SSL connection is established but there's no corresponding // request that needs it, the new socket is closed if the transport socket pool // is stalled on the global socket limit. TEST_F(HttpNetworkTransactionTest, CloseSSLSocketOnIdleForHttpRequest2) { ClientSocketPoolManager::set_max_sockets_per_group( HttpNetworkSession::NORMAL_SOCKET_POOL, 1); ClientSocketPoolManager::set_max_sockets_per_pool( HttpNetworkSession::NORMAL_SOCKET_POOL, 1); // Set up an ssl request. HttpRequestInfo ssl_request; ssl_request.method = "GET"; ssl_request.url = GURL("https://www.foopy.com/"); ssl_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // No data will be sent on the SSL socket. StaticSocketDataProvider ssl_data; session_deps_.socket_factory->AddSocketDataProvider(&ssl_data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); // Set up HTTP request. HttpRequestInfo http_request; http_request.method = "GET"; http_request.url = GURL("http://www.example.org/"); http_request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite http_writes[] = { MockWrite( "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead http_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 7\r\n\r\n"), MockRead("falafel"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider http_data(http_reads, http_writes); session_deps_.socket_factory->AddSocketDataProvider(&http_data); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Preconnect an SSL socket. A preconnect is needed because connect jobs are // cancelled when a normal transaction is cancelled. HttpStreamFactory* http_stream_factory = session->http_stream_factory(); http_stream_factory->PreconnectStreams(1, ssl_request); EXPECT_EQ(0, GetIdleSocketCountInTransportSocketPool(session.get())); // Start the HTTP request. Pool should stall. TestCompletionCallback http_callback; HttpNetworkTransaction http_trans(DEFAULT_PRIORITY, session.get()); ASSERT_EQ(ERR_IO_PENDING, http_trans.Start(&http_request, http_callback.callback(), NetLogWithSource())); EXPECT_TRUE(IsTransportSocketPoolStalled(session.get())); // The SSL connection will automatically be closed once the connection is // established, to let the HTTP request start. ASSERT_THAT(http_callback.WaitForResult(), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(&http_trans, &response_data), IsOk()); EXPECT_EQ("falafel", response_data); EXPECT_EQ(1, GetIdleSocketCountInTransportSocketPool(session.get())); } TEST_F(HttpNetworkTransactionTest, PostReadsErrorResponseAfterReset) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP/1.0 400 Not OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 400 Not OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); } // This test makes sure the retry logic doesn't trigger when reading an error // response from a server that rejected a POST with a CONNECTION_RESET. TEST_F(HttpNetworkTransactionTest, PostReadsErrorResponseAfterResetOnReusedSocket) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n\r\n"), MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP/1.1 200 Peachy\r\n" "Content-Length: 14\r\n\r\n"), MockRead("first response"), MockRead("HTTP/1.1 400 Not OK\r\n" "Content-Length: 15\r\n\r\n"), MockRead("second response"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("http://www.foo.com/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans1->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response1 = trans1->GetResponseInfo(); ASSERT_TRUE(response1); EXPECT_TRUE(response1->headers); EXPECT_EQ("HTTP/1.1 200 Peachy", response1->headers->GetStatusLine()); std::string response_data1; rv = ReadTransaction(trans1.get(), &response_data1); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("first response", response_data1); // Delete the transaction to release the socket back into the socket pool. trans1.reset(); std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request2; request2.method = "POST"; request2.url = GURL("http://www.foo.com/"); request2.upload_data_stream = &upload_data_stream; request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); HttpNetworkTransaction trans2(DEFAULT_PRIORITY, session.get()); rv = trans2.Start(&request2, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response2 = trans2.GetResponseInfo(); ASSERT_TRUE(response2); EXPECT_TRUE(response2->headers); EXPECT_EQ("HTTP/1.1 400 Not OK", response2->headers->GetStatusLine()); std::string response_data2; rv = ReadTransaction(&trans2, &response_data2); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("second response", response_data2); } TEST_F(HttpNetworkTransactionTest, PostReadsErrorResponseAfterResetPartialBodySent) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n" "fo"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP/1.0 400 Not OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 400 Not OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); } // This tests the more common case than the previous test, where headers and // body are not merged into a single request. TEST_F(HttpNetworkTransactionTest, ChunkedPostReadsErrorResponseAfterReset) { ChunkedUploadDataStream upload_data_stream(0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Transfer-Encoding: chunked\r\n\r\n"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP/1.0 400 Not OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); // Make sure the headers are sent before adding a chunk. This ensures that // they can't be merged with the body in a single send. Not currently // necessary since a chunked body is never merged with headers, but this makes // the test more future proof. base::RunLoop().RunUntilIdle(); upload_data_stream.AppendData("last chunk", 10, true); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 400 Not OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); } TEST_F(HttpNetworkTransactionTest, PostReadsErrorResponseAfterResetAnd100) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP/1.0 100 Continue\r\n\r\n"), MockRead("HTTP/1.0 400 Not OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 400 Not OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(&trans, &response_data); EXPECT_THAT(rv, IsOk()); EXPECT_EQ("hello world", response_data); } TEST_F(HttpNetworkTransactionTest, PostIgnoresNonErrorResponseAfterReset) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 Just Dandy\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); } TEST_F(HttpNetworkTransactionTest, PostIgnoresNonErrorResponseAfterResetAnd100) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP/1.0 100 Continue\r\n\r\n"), MockRead("HTTP/1.0 302 Redirect\r\n"), MockRead("Location: http://somewhere-else.com/\r\n"), MockRead("Content-Length: 0\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); } TEST_F(HttpNetworkTransactionTest, PostIgnoresHttp09ResponseAfterReset) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP 0.9 rocks!"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); } TEST_F(HttpNetworkTransactionTest, PostIgnoresPartial400HeadersAfterReset) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite(SYNCHRONOUS, ERR_CONNECTION_RESET), }; MockRead data_reads[] = { MockRead("HTTP/1.0 400 Not a Full Response\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET)); } #if BUILDFLAG(ENABLE_WEBSOCKETS) namespace { void AddWebSocketHeaders(HttpRequestHeaders* headers) { headers->SetHeader("Connection", "Upgrade"); headers->SetHeader("Upgrade", "websocket"); headers->SetHeader("Origin", "http://www.example.org"); headers->SetHeader("Sec-WebSocket-Version", "13"); } } // namespace TEST_F(HttpNetworkTransactionTest, CreateWebSocketHandshakeStream) { for (bool secure : {true, false}) { MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: Upgrade\r\n" "Upgrade: websocket\r\n" "Origin: http://www.example.org\r\n" "Sec-WebSocket-Version: 13\r\n" "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" "Sec-WebSocket-Extensions: permessage-deflate; " "client_max_window_bits\r\n\r\n")}; MockRead data_reads[] = { MockRead("HTTP/1.1 101 Switching Protocols\r\n" "Upgrade: websocket\r\n" "Connection: Upgrade\r\n" "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")}; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); if (secure) session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); HttpRequestInfo request; request.method = "GET"; request.url = GURL(secure ? "ws://www.example.org/" : "wss://www.example.org/"); AddWebSocketHeaders(&request.extra_headers); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestWebSocketHandshakeStreamCreateHelper websocket_handshake_stream_create_helper; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(LOW, session.get()); trans.SetWebSocketHandshakeStreamCreateHelper( &websocket_handshake_stream_create_helper); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); const HttpStreamRequest* stream_request = trans.stream_request_.get(); ASSERT_TRUE(stream_request); EXPECT_EQ(&websocket_handshake_stream_create_helper, stream_request->websocket_handshake_stream_create_helper()); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); EXPECT_TRUE(data.AllReadDataConsumed()); EXPECT_TRUE(data.AllWriteDataConsumed()); } } // Verify that proxy headers are not sent to the destination server when // establishing a tunnel for a secure WebSocket connection. TEST_F(HttpNetworkTransactionTest, ProxyHeadersNotSentOverWssTunnel) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("wss://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); AddWebSocketHeaders(&request.extra_headers); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since a proxy is configured, try to establish a tunnel. MockWrite data_writes[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: Upgrade\r\n" "Upgrade: websocket\r\n" "Origin: http://www.example.org\r\n" "Sec-WebSocket-Version: 13\r\n" "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" "Sec-WebSocket-Extensions: permessage-deflate; " "client_max_window_bits\r\n\r\n")}; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n" "Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n" "Content-Length: 0\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 101 Switching Protocols\r\n" "Upgrade: websocket\r\n" "Connection: Upgrade\r\n" "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")}; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); trans->SetWebSocketHandshakeStreamCreateHelper( &websocket_stream_create_helper); { TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(407, response->headers->response_code()); { TestCompletionCallback callback; int rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback.callback()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); } response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(101, response->headers->response_code()); trans.reset(); session->CloseAllConnections(); } // Verify that proxy headers are not sent to the destination server when // establishing a tunnel for an insecure WebSocket connection. // This requires the authentication info to be injected into the auth cache // due to crbug.com/395064 // TODO(ricea): Change to use a 407 response once issue 395064 is fixed. TEST_F(HttpNetworkTransactionTest, ProxyHeadersNotSentOverWsTunnel) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("ws://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); AddWebSocketHeaders(&request.extra_headers); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); MockWrite data_writes[] = { // Try to establish a tunnel for the WebSocket connection, with // credentials. Because WebSockets have a separate set of socket pools, // they cannot and will not use the same TCP/IP connection as the // preflight HTTP request. MockWrite("CONNECT www.example.org:80 HTTP/1.1\r\n" "Host: www.example.org:80\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: Upgrade\r\n" "Upgrade: websocket\r\n" "Origin: http://www.example.org\r\n" "Sec-WebSocket-Version: 13\r\n" "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==\r\n" "Sec-WebSocket-Extensions: permessage-deflate; " "client_max_window_bits\r\n\r\n")}; MockRead data_reads[] = { // HTTP CONNECT with credentials. MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), // WebSocket connection established inside tunnel. MockRead("HTTP/1.1 101 Switching Protocols\r\n" "Upgrade: websocket\r\n" "Connection: Upgrade\r\n" "Sec-WebSocket-Accept: s3pPLMBiTxaQ9kYGzzhZRbK+xOo=\r\n\r\n")}; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); session->http_auth_cache()->Add( GURL("http://myproxy:70/"), "MyRealm1", HttpAuth::AUTH_SCHEME_BASIC, "Basic realm=MyRealm1", AuthCredentials(kFoo, kBar), "/"); TestWebSocketHandshakeStreamCreateHelper websocket_stream_create_helper; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); trans->SetWebSocketHandshakeStreamCreateHelper( &websocket_stream_create_helper); TestCompletionCallback callback; int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(101, response->headers->response_code()); trans.reset(); session->CloseAllConnections(); } // WebSockets over QUIC is not supported, including over QUIC proxies. TEST_F(HttpNetworkTransactionTest, WebSocketNotSentOverQuicProxy) { for (bool secure : {true, false}) { SCOPED_TRACE(secure); session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "QUIC myproxy.org:443", TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.enable_quic = true; HttpRequestInfo request; request.url = GURL(secure ? "ws://www.example.org/" : "wss://www.example.org/"); AddWebSocketHeaders(&request.extra_headers); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestWebSocketHandshakeStreamCreateHelper websocket_handshake_stream_create_helper; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(LOW, session.get()); trans.SetWebSocketHandshakeStreamCreateHelper( &websocket_handshake_stream_create_helper); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_NO_SUPPORTED_PROXIES)); } } #endif // BUILDFLAG(ENABLE_WEBSOCKETS) TEST_F(HttpNetworkTransactionTest, TotalNetworkBytesPost) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite("foo"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; EXPECT_EQ(ERR_IO_PENDING, trans.Start(&request, callback.callback(), NetLogWithSource())); EXPECT_THAT(callback.WaitForResult(), IsOk()); std::string response_data; EXPECT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ(CountWriteBytes(data_writes), trans.GetTotalSentBytes()); EXPECT_EQ(CountReadBytes(data_reads), trans.GetTotalReceivedBytes()); } TEST_F(HttpNetworkTransactionTest, TotalNetworkBytesPost100Continue) { std::vector<std::unique_ptr<UploadElementReader>> element_readers; element_readers.push_back( std::make_unique<UploadBytesElementReader>("foo", 3)); ElementsUploadDataStream upload_data_stream(std::move(element_readers), 0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Content-Length: 3\r\n\r\n"), MockWrite("foo"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 100 Continue\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; EXPECT_EQ(ERR_IO_PENDING, trans.Start(&request, callback.callback(), NetLogWithSource())); EXPECT_THAT(callback.WaitForResult(), IsOk()); std::string response_data; EXPECT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ(CountWriteBytes(data_writes), trans.GetTotalSentBytes()); EXPECT_EQ(CountReadBytes(data_reads), trans.GetTotalReceivedBytes()); } TEST_F(HttpNetworkTransactionTest, TotalNetworkBytesChunkedPost) { ChunkedUploadDataStream upload_data_stream(0); HttpRequestInfo request; request.method = "POST"; request.url = GURL("http://www.foo.com/"); request.upload_data_stream = &upload_data_stream; request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Transfer-Encoding: chunked\r\n\r\n"), MockWrite("1\r\nf\r\n"), MockWrite("2\r\noo\r\n"), MockWrite("0\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; EXPECT_EQ(ERR_IO_PENDING, trans.Start(&request, callback.callback(), NetLogWithSource())); base::RunLoop().RunUntilIdle(); upload_data_stream.AppendData("f", 1, false); base::RunLoop().RunUntilIdle(); upload_data_stream.AppendData("oo", 2, true); EXPECT_THAT(callback.WaitForResult(), IsOk()); std::string response_data; EXPECT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ(CountWriteBytes(data_writes), trans.GetTotalSentBytes()); EXPECT_EQ(CountReadBytes(data_reads), trans.GetTotalReceivedBytes()); } void CheckContentEncodingMatching(SpdySessionDependencies* session_deps, const std::string& accept_encoding, const std::string& content_encoding, const std::string& location, bool should_match) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.foo.com/"); request.extra_headers.SetHeader(HttpRequestHeaders::kAcceptEncoding, accept_encoding); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(session_deps)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); // Send headers successfully, but get an error while sending the body. MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.foo.com\r\n" "Connection: keep-alive\r\n" "Accept-Encoding: "), MockWrite(accept_encoding.data()), MockWrite("\r\n\r\n"), }; std::string response_code = "200 OK"; std::string extra; if (!location.empty()) { response_code = "301 Redirect\r\nLocation: "; response_code.append(location); } MockRead data_reads[] = { MockRead("HTTP/1.0 "), MockRead(response_code.data()), MockRead("\r\nContent-Encoding: "), MockRead(content_encoding.data()), MockRead("\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps->socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); if (should_match) { EXPECT_THAT(rv, IsOk()); } else { EXPECT_THAT(rv, IsError(ERR_CONTENT_DECODING_FAILED)); } } TEST_F(HttpNetworkTransactionTest, MatchContentEncoding1) { CheckContentEncodingMatching(&session_deps_, "gzip,sdch", "br", "", false); } TEST_F(HttpNetworkTransactionTest, MatchContentEncoding2) { CheckContentEncodingMatching(&session_deps_, "identity;q=1, *;q=0", "", "", true); } TEST_F(HttpNetworkTransactionTest, MatchContentEncoding3) { CheckContentEncodingMatching(&session_deps_, "identity;q=1, *;q=0", "gzip", "", false); } TEST_F(HttpNetworkTransactionTest, MatchContentEncoding4) { CheckContentEncodingMatching(&session_deps_, "identity;q=1, *;q=0", "gzip", "www.foo.com/other", true); } TEST_F(HttpNetworkTransactionTest, ProxyResolutionFailsSync) { ProxyConfig proxy_config; proxy_config.set_pac_url(GURL("http://fooproxyurl")); proxy_config.set_pac_mandatory(true); MockAsyncProxyResolver resolver; session_deps_.proxy_resolution_service.reset(new ProxyResolutionService( std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation( proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)), std::make_unique<FailingProxyResolverFactory>(), nullptr)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsError(ERR_MANDATORY_PROXY_CONFIGURATION_FAILED)); } TEST_F(HttpNetworkTransactionTest, ProxyResolutionFailsAsync) { ProxyConfig proxy_config; proxy_config.set_pac_url(GURL("http://fooproxyurl")); proxy_config.set_pac_mandatory(true); MockAsyncProxyResolverFactory* proxy_resolver_factory = new MockAsyncProxyResolverFactory(false); MockAsyncProxyResolver resolver; session_deps_.proxy_resolution_service.reset(new ProxyResolutionService( std::make_unique<ProxyConfigServiceFixed>(ProxyConfigWithAnnotation( proxy_config, TRAFFIC_ANNOTATION_FOR_TESTS)), base::WrapUnique(proxy_resolver_factory), nullptr)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); proxy_resolver_factory->pending_requests()[0]->CompleteNowWithForwarder( ERR_FAILED, &resolver); EXPECT_THAT(callback.WaitForResult(), IsError(ERR_MANDATORY_PROXY_CONFIGURATION_FAILED)); } TEST_F(HttpNetworkTransactionTest, NoSupportedProxies) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "QUIC myproxy.org:443", TRAFFIC_ANNOTATION_FOR_TESTS); session_deps_.enable_quic = false; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); TestCompletionCallback callback; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); EXPECT_THAT(callback.WaitForResult(), IsError(ERR_NO_SUPPORTED_PROXIES)); } //----------------------------------------------------------------------------- // Reporting tests #if BUILDFLAG(ENABLE_REPORTING) class HttpNetworkTransactionReportingTest : public HttpNetworkTransactionTest { protected: void SetUp() override { HttpNetworkTransactionTest::SetUp(); auto test_reporting_context = std::make_unique<TestReportingContext>( &clock_, &tick_clock_, ReportingPolicy()); test_reporting_context_ = test_reporting_context.get(); session_deps_.reporting_service = ReportingService::CreateForTesting(std::move(test_reporting_context)); } TestReportingContext* reporting_context() const { return test_reporting_context_; } void clear_reporting_service() { session_deps_.reporting_service.reset(); test_reporting_context_ = nullptr; } // Makes an HTTPS request that should install a valid Reporting policy. void RequestPolicy(CertStatus cert_status = 0) { HttpRequestInfo request; request.method = "GET"; request.url = GURL(url_); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Report-To: {\"group\": \"nel\", \"max_age\": 86400, " "\"endpoints\": [{\"url\": " "\"https://www.example.org/upload/\"}]}\r\n"), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider reads(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&reads); SSLSocketDataProvider ssl(ASYNC, OK); if (request.url.SchemeIsCryptographic()) { ssl.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl.ssl_info.cert); ssl.ssl_info.cert_status = cert_status; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); } TestCompletionCallback callback; auto session = CreateSession(&session_deps_); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); } protected: std::string url_ = "https://www.example.org/"; private: TestReportingContext* test_reporting_context_; }; TEST_F(HttpNetworkTransactionReportingTest, DontProcessReportToHeaderNoService) { base::HistogramTester histograms; clear_reporting_service(); RequestPolicy(); histograms.ExpectBucketCount( ReportingHeaderParser::kHeaderOutcomeHistogram, ReportingHeaderParser::HeaderOutcome::DISCARDED_NO_REPORTING_SERVICE, 1); } TEST_F(HttpNetworkTransactionReportingTest, DontProcessReportToHeaderHttp) { base::HistogramTester histograms; url_ = "http://www.example.org/"; RequestPolicy(); histograms.ExpectBucketCount( ReportingHeaderParser::kHeaderOutcomeHistogram, ReportingHeaderParser::HeaderOutcome::DISCARDED_INVALID_SSL_INFO, 1); } TEST_F(HttpNetworkTransactionReportingTest, ProcessReportToHeaderHttps) { RequestPolicy(); ASSERT_EQ(1u, reporting_context()->cache()->GetEndpointCount()); const ReportingClient endpoint = reporting_context()->cache()->GetEndpointForTesting( url::Origin::Create(GURL("https://www.example.org/")), "nel", GURL("https://www.example.org/upload/")); EXPECT_TRUE(endpoint); } TEST_F(HttpNetworkTransactionReportingTest, DontProcessReportToHeaderInvalidHttps) { base::HistogramTester histograms; CertStatus cert_status = CERT_STATUS_COMMON_NAME_INVALID; RequestPolicy(cert_status); histograms.ExpectBucketCount( ReportingHeaderParser::kHeaderOutcomeHistogram, ReportingHeaderParser::HeaderOutcome::DISCARDED_CERT_STATUS_ERROR, 1); } #endif // BUILDFLAG(ENABLE_REPORTING) //----------------------------------------------------------------------------- // Network Error Logging tests #if BUILDFLAG(ENABLE_REPORTING) namespace { const char kUserAgent[] = "Mozilla/1.0"; const char kReferrer[] = "https://www.referrer.org/"; } // namespace class HttpNetworkTransactionNetworkErrorLoggingTest : public HttpNetworkTransactionTest { protected: void SetUp() override { HttpNetworkTransactionTest::SetUp(); auto network_error_logging_service = std::make_unique<TestNetworkErrorLoggingService>(); test_network_error_logging_service_ = network_error_logging_service.get(); session_deps_.network_error_logging_service = std::move(network_error_logging_service); extra_headers_.SetHeader("User-Agent", kUserAgent); extra_headers_.SetHeader("Referer", kReferrer); request_.method = "GET"; request_.url = GURL(url_); request_.extra_headers = extra_headers_; request_.reporting_upload_depth = reporting_upload_depth_; request_.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); } TestNetworkErrorLoggingService* network_error_logging_service() const { return test_network_error_logging_service_; } void clear_network_error_logging_service() { session_deps_.network_error_logging_service.reset(); test_network_error_logging_service_ = nullptr; } // Makes an HTTPS request that should install a valid NEL policy. void RequestPolicy(CertStatus cert_status = 0) { std::string extra_header_string = extra_headers_.ToString(); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("NEL: {\"report_to\": \"nel\", \"max_age\": 86400}\r\n"), MockRead("\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider reads(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&reads); SSLSocketDataProvider ssl(ASYNC, OK); if (request_.url.SchemeIsCryptographic()) { ssl.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl.ssl_info.cert); ssl.ssl_info.cert_status = cert_status; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); } TestCompletionCallback callback; auto session = CreateSession(&session_deps_); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(&trans, &response_data), IsOk()); EXPECT_EQ("hello world", response_data); } void CheckReport(size_t index, int status_code, int error_type, IPAddress server_ip = IPAddress::IPv4Localhost()) { ASSERT_LT(index, network_error_logging_service()->errors().size()); const NetworkErrorLoggingService::RequestDetails& error = network_error_logging_service()->errors()[index]; EXPECT_EQ(url_, error.uri); EXPECT_EQ(kReferrer, error.referrer); EXPECT_EQ(kUserAgent, error.user_agent); EXPECT_EQ(server_ip, error.server_ip); EXPECT_EQ("http/1.1", error.protocol); EXPECT_EQ("GET", error.method); EXPECT_EQ(status_code, error.status_code); EXPECT_EQ(error_type, error.type); EXPECT_EQ(0, error.reporting_upload_depth); } protected: std::string url_ = "https://www.example.org/"; CertStatus cert_status_ = 0; HttpRequestInfo request_; HttpRequestHeaders extra_headers_; int reporting_upload_depth_ = 0; private: TestNetworkErrorLoggingService* test_network_error_logging_service_; }; TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontProcessNelHeaderNoService) { base::HistogramTester histograms; clear_network_error_logging_service(); RequestPolicy(); histograms.ExpectBucketCount( NetworkErrorLoggingService::kHeaderOutcomeHistogram, NetworkErrorLoggingService::HeaderOutcome:: DISCARDED_NO_NETWORK_ERROR_LOGGING_SERVICE, 1); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontProcessNelHeaderHttp) { base::HistogramTester histograms; url_ = "http://www.example.org/"; request_.url = GURL(url_); RequestPolicy(); histograms.ExpectBucketCount( NetworkErrorLoggingService::kHeaderOutcomeHistogram, NetworkErrorLoggingService::HeaderOutcome::DISCARDED_INVALID_SSL_INFO, 1); } // Don't set NEL policies received on a proxied connection. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontProcessNelHeaderProxy) { session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); BoundTestNetLog log; session_deps_.net_log = log.bound().net_log(); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("NEL: {\"report_to\": \"nel\", \"max_age\": 86400}\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 100\r\n\r\n"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); SSLSocketDataProvider ssl(ASYNC, OK); ssl.ssl_info.cert = ImportCertFromFile(GetTestCertsDirectory(), "wildcard.pem"); ASSERT_TRUE(ssl.ssl_info.cert); ssl.ssl_info.cert_status = 0; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); int rv = trans.Start(&request, callback1.callback(), log.bound()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback1.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans.GetResponseInfo(); ASSERT_TRUE(response); EXPECT_EQ(200, response->headers->response_code()); EXPECT_TRUE(response->was_fetched_via_proxy); // No NEL header was set. EXPECT_EQ(0u, network_error_logging_service()->headers().size()); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, ProcessNelHeaderHttps) { RequestPolicy(); ASSERT_EQ(1u, network_error_logging_service()->headers().size()); const auto& header = network_error_logging_service()->headers()[0]; EXPECT_EQ(url::Origin::Create(GURL("https://www.example.org/")), header.origin); EXPECT_EQ(IPAddress::IPv4Localhost(), header.received_ip_address); EXPECT_EQ("{\"report_to\": \"nel\", \"max_age\": 86400}", header.value); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontProcessNelHeaderInvalidHttps) { base::HistogramTester histograms; CertStatus cert_status = CERT_STATUS_COMMON_NAME_INVALID; RequestPolicy(cert_status); histograms.ExpectBucketCount( NetworkErrorLoggingService::kHeaderOutcomeHistogram, NetworkErrorLoggingService::HeaderOutcome::DISCARDED_CERT_STATUS_ERROR, 1); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportSuccess) { RequestPolicy(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); CheckReport(0 /* index */, 200 /* status_code */, OK); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportErrorAfterStart) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); MockConnect mock_connect(SYNCHRONOUS, ERR_NAME_NOT_RESOLVED); StaticSocketDataProvider data; data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsError(ERR_NAME_NOT_RESOLVED)); trans.reset(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); CheckReport(0 /* index */, 0 /* status_code */, ERR_NAME_NOT_RESOLVED, IPAddress() /* server_ip */); } // Same as above except the error is ASYNC TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportErrorAfterStartAsync) { std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); MockConnect mock_connect(ASYNC, ERR_NAME_NOT_RESOLVED); StaticSocketDataProvider data; data.set_connect_data(mock_connect); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsError(ERR_NAME_NOT_RESOLVED)); trans.reset(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); CheckReport(0 /* index */, 0 /* status_code */, ERR_NAME_NOT_RESOLVED, IPAddress() /* server_ip */); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportReadBodyError) { std::string extra_header_string = extra_headers_.ToString(); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), // wrong content length MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider reads(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&reads); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); // Log start time base::TimeTicks start_time = base::TimeTicks::Now(); TestCompletionCallback callback; auto session = CreateSession(&session_deps_); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(trans.get(), &response_data); EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH)); trans.reset(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); CheckReport(0 /* index */, 200 /* status_code */, ERR_CONTENT_LENGTH_MISMATCH); const NetworkErrorLoggingService::RequestDetails& error = network_error_logging_service()->errors()[0]; EXPECT_LE(error.elapsed_time, base::TimeTicks::Now() - start_time); } // Same as above except the final read is ASYNC. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportReadBodyErrorAsync) { std::string extra_header_string = extra_headers_.ToString(); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), // wrong content length MockRead("hello world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider reads(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&reads); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); // Log start time base::TimeTicks start_time = base::TimeTicks::Now(); TestCompletionCallback callback; auto session = CreateSession(&session_deps_); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine()); std::string response_data; rv = ReadTransaction(trans.get(), &response_data); EXPECT_THAT(rv, IsError(ERR_CONTENT_LENGTH_MISMATCH)); trans.reset(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); CheckReport(0 /* index */, 200 /* status_code */, ERR_CONTENT_LENGTH_MISMATCH); const NetworkErrorLoggingService::RequestDetails& error = network_error_logging_service()->errors()[0]; EXPECT_LE(error.elapsed_time, base::TimeTicks::Now() - start_time); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportRestartWithAuth) { std::string extra_header_string = extra_headers_.ToString(); static const base::TimeDelta kSleepDuration = base::TimeDelta::FromMilliseconds(10); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), // Give a couple authenticate options (only the middle one is actually // supported). MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), // Large content-length -- won't matter, as connection will be reset. MockRead("Content-Length: 10000\r\n\r\n"), MockRead(SYNCHRONOUS, ERR_FAILED), }; // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite data_writes2[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; // Lastly, the server responds with the actual content. MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl1(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); base::TimeTicks start_time = base::TimeTicks::Now(); base::TimeTicks restart_time; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback1; int rv = trans->Start(&request_, callback1.callback(), NetLogWithSource()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); TestCompletionCallback callback2; // Wait 10 ms then restart with auth FastForwardBy(kSleepDuration); restart_time = base::TimeTicks::Now(); rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(callback2.GetResult(rv), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); trans.reset(); // One 401 report for the auth challenge, then a 200 report for the successful // retry. Note that we don't report the error draining the body, as the first // request already generated a report for the auth challenge. ASSERT_EQ(2u, network_error_logging_service()->errors().size()); // Check error report contents CheckReport(0 /* index */, 401 /* status_code */, OK); CheckReport(1 /* index */, 200 /* status_code */, OK); const NetworkErrorLoggingService::RequestDetails& error1 = network_error_logging_service()->errors()[0]; const NetworkErrorLoggingService::RequestDetails& error2 = network_error_logging_service()->errors()[1]; // Sanity-check elapsed time values EXPECT_EQ(error1.elapsed_time, restart_time - start_time - kSleepDuration); // Check that the start time is refreshed when restarting with auth. EXPECT_EQ(error2.elapsed_time, base::TimeTicks::Now() - restart_time); } // Same as above, except draining the body before restarting fails // asynchronously. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportRestartWithAuthAsync) { std::string extra_header_string = extra_headers_.ToString(); static const base::TimeDelta kSleepDuration = base::TimeDelta::FromMilliseconds(10); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; MockRead data_reads1[] = { MockRead("HTTP/1.0 401 Unauthorized\r\n"), // Give a couple authenticate options (only the middle one is actually // supported). MockRead("WWW-Authenticate: Basic invalid\r\n"), // Malformed. MockRead("WWW-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("WWW-Authenticate: UNSUPPORTED realm=\"FOO\"\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), // Large content-length -- won't matter, as connection will be reset. MockRead("Content-Length: 10000\r\n\r\n"), MockRead(ASYNC, ERR_FAILED), }; // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite data_writes2[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Authorization: Basic Zm9vOmJhcg==\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; // Lastly, the server responds with the actual content. MockRead data_reads2[] = { MockRead("HTTP/1.0 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl1(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); base::TimeTicks start_time = base::TimeTicks::Now(); base::TimeTicks restart_time; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback1; int rv = trans->Start(&request_, callback1.callback(), NetLogWithSource()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); TestCompletionCallback callback2; // Wait 10 ms then restart with auth FastForwardBy(kSleepDuration); restart_time = base::TimeTicks::Now(); rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(callback2.GetResult(rv), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); trans.reset(); // One 401 report for the auth challenge, then a 200 report for the successful // retry. Note that we don't report the error draining the body, as the first // request already generated a report for the auth challenge. ASSERT_EQ(2u, network_error_logging_service()->errors().size()); // Check error report contents CheckReport(0 /* index */, 401 /* status_code */, OK); CheckReport(1 /* index */, 200 /* status_code */, OK); const NetworkErrorLoggingService::RequestDetails& error1 = network_error_logging_service()->errors()[0]; const NetworkErrorLoggingService::RequestDetails& error2 = network_error_logging_service()->errors()[1]; // Sanity-check elapsed time values EXPECT_EQ(error1.elapsed_time, restart_time - start_time - kSleepDuration); // Check that the start time is refreshed when restarting with auth. EXPECT_EQ(error2.elapsed_time, base::TimeTicks::Now() - restart_time); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportRetryKeepAliveConnectionReset) { std::string extra_header_string = extra_headers_.ToString(); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead("hello"), // Connection is reset MockRead(ASYNC, ERR_CONNECTION_RESET), }; // Successful retry MockRead data_reads2[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead("world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl1(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback1; int rv = trans1->Start(&request_, callback1.callback(), NetLogWithSource()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(trans1.get(), &response_data), IsOk()); EXPECT_EQ("hello", response_data); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback2; rv = trans2->Start(&request_, callback2.callback(), NetLogWithSource()); EXPECT_THAT(callback2.GetResult(rv), IsOk()); ASSERT_THAT(ReadTransaction(trans2.get(), &response_data), IsOk()); EXPECT_EQ("world", response_data); trans1.reset(); trans2.reset(); // One OK report from first request, then a ERR_CONNECTION_RESET report from // the second request, then an OK report from the successful retry. ASSERT_EQ(3u, network_error_logging_service()->errors().size()); // Check error report contents CheckReport(0 /* index */, 200 /* status_code */, OK); CheckReport(1 /* index */, 0 /* status_code */, ERR_CONNECTION_RESET); CheckReport(2 /* index */, 200 /* status_code */, OK); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportRetryKeepAlive408) { std::string extra_header_string = extra_headers_.ToString(); MockWrite data_writes1[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; MockRead data_reads1[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead("hello"), // 408 Request Timeout MockRead(SYNCHRONOUS, "HTTP/1.1 408 Request Timeout\r\n" "Connection: Keep-Alive\r\n" "Content-Length: 6\r\n\r\n" "Pickle"), }; // Successful retry MockRead data_reads2[] = { MockRead("HTTP/1.1 200 OK\r\nContent-Length: 5\r\n\r\n"), MockRead("world"), MockRead(ASYNC, OK), }; StaticSocketDataProvider data1(data_reads1, data_writes1); StaticSocketDataProvider data2(data_reads2, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data1); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl1(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl1); SSLSocketDataProvider ssl2(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl2); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback1; int rv = trans1->Start(&request_, callback1.callback(), NetLogWithSource()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(trans1.get(), &response_data), IsOk()); EXPECT_EQ("hello", response_data); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback2; rv = trans2->Start(&request_, callback2.callback(), NetLogWithSource()); EXPECT_THAT(callback2.GetResult(rv), IsOk()); ASSERT_THAT(ReadTransaction(trans2.get(), &response_data), IsOk()); EXPECT_EQ("world", response_data); trans1.reset(); trans2.reset(); // One 200 report from first request, then a 408 report from // the second request, then a 200 report from the successful retry. ASSERT_EQ(3u, network_error_logging_service()->errors().size()); // Check error report contents CheckReport(0 /* index */, 200 /* status_code */, OK); CheckReport(1 /* index */, 408 /* status_code */, OK); CheckReport(2 /* index */, 200 /* status_code */, OK); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportRetry421WithoutConnectionPooling) { // Two hosts resolve to the same IP address. const std::string ip_addr = "1.2.3.4"; IPAddress ip; ASSERT_TRUE(ip.AssignFromIPLiteral(ip_addr)); IPEndPoint peer_addr = IPEndPoint(ip, 443); session_deps_.host_resolver = std::make_unique<MockCachingHostResolver>(); session_deps_.host_resolver->rules()->AddRule("www.example.org", ip_addr); session_deps_.host_resolver->rules()->AddRule("mail.example.org", ip_addr); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Two requests on the first connection. spdy::SpdySerializedFrame req1( spdy_util_.ConstructSpdyGet("https://www.example.org", 1, LOWEST)); spdy_util_.UpdateWithStreamDestruction(1); spdy::SpdySerializedFrame req2( spdy_util_.ConstructSpdyGet("https://mail.example.org", 3, LOWEST)); spdy::SpdySerializedFrame rst( spdy_util_.ConstructSpdyRstStream(3, spdy::ERROR_CODE_CANCEL)); MockWrite writes1[] = { CreateMockWrite(req1, 0), CreateMockWrite(req2, 3), CreateMockWrite(rst, 6), }; // The first one succeeds, the second gets error 421 Misdirected Request. spdy::SpdySerializedFrame resp1( spdy_util_.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body1(spdy_util_.ConstructSpdyDataFrame(1, true)); spdy::SpdyHeaderBlock response_headers; response_headers[spdy::kHttp2StatusHeader] = "421"; spdy::SpdySerializedFrame resp2( spdy_util_.ConstructSpdyReply(3, std::move(response_headers))); MockRead reads1[] = {CreateMockRead(resp1, 1), CreateMockRead(body1, 2), CreateMockRead(resp2, 4), MockRead(ASYNC, 0, 5)}; MockConnect connect1(ASYNC, OK, peer_addr); SequencedSocketData data1(connect1, reads1, writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); AddSSLSocketData(); // Retry the second request on a second connection. SpdyTestUtil spdy_util2; spdy::SpdySerializedFrame req3( spdy_util2.ConstructSpdyGet("https://mail.example.org", 1, LOWEST)); MockWrite writes2[] = { CreateMockWrite(req3, 0), }; spdy::SpdySerializedFrame resp3( spdy_util2.ConstructSpdyGetReply(nullptr, 0, 1)); spdy::SpdySerializedFrame body3(spdy_util2.ConstructSpdyDataFrame(1, true)); MockRead reads2[] = {CreateMockRead(resp3, 1), CreateMockRead(body3, 2), MockRead(ASYNC, 0, 3)}; MockConnect connect2(ASYNC, OK, peer_addr); SequencedSocketData data2(connect2, reads2, writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); AddSSLSocketData(); // Preload mail.example.org into HostCache. int rv = session_deps_.host_resolver->LoadIntoCache( HostPortPair("mail.example.com", 443), base::nullopt); EXPECT_THAT(rv, IsOk()); HttpRequestInfo request1; request1.method = "GET"; request1.url = GURL("https://www.example.org/"); request1.load_flags = 0; request1.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans1 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; rv = trans1->Start(&request1, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans1->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); std::string response_data; ASSERT_THAT(ReadTransaction(trans1.get(), &response_data), IsOk()); EXPECT_EQ("hello!", response_data); trans1.reset(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); HttpRequestInfo request2; request2.method = "GET"; request2.url = GURL("https://mail.example.org/"); request2.load_flags = 0; request2.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); auto trans2 = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); BoundTestNetLog log; rv = trans2->Start(&request2, callback.callback(), log.bound()); EXPECT_THAT(callback.GetResult(rv), IsOk()); response = trans2->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ("HTTP/1.1 200", response->headers->GetStatusLine()); EXPECT_TRUE(response->was_fetched_via_spdy); EXPECT_TRUE(response->was_alpn_negotiated); ASSERT_THAT(ReadTransaction(trans2.get(), &response_data), IsOk()); EXPECT_EQ("hello!", response_data); trans2.reset(); // One 200 report from the first request, then a 421 report from the // second request, then a 200 report from the successful retry. ASSERT_EQ(3u, network_error_logging_service()->errors().size()); // Check error report contents const NetworkErrorLoggingService::RequestDetails& error1 = network_error_logging_service()->errors()[0]; EXPECT_EQ(GURL("https://www.example.org/"), error1.uri); EXPECT_TRUE(error1.referrer.is_empty()); EXPECT_EQ("", error1.user_agent); EXPECT_EQ(ip, error1.server_ip); EXPECT_EQ("h2", error1.protocol); EXPECT_EQ("GET", error1.method); EXPECT_EQ(200, error1.status_code); EXPECT_EQ(OK, error1.type); EXPECT_EQ(0, error1.reporting_upload_depth); const NetworkErrorLoggingService::RequestDetails& error2 = network_error_logging_service()->errors()[1]; EXPECT_EQ(GURL("https://mail.example.org/"), error2.uri); EXPECT_TRUE(error2.referrer.is_empty()); EXPECT_EQ("", error2.user_agent); EXPECT_EQ(ip, error2.server_ip); EXPECT_EQ("h2", error2.protocol); EXPECT_EQ("GET", error2.method); EXPECT_EQ(421, error2.status_code); EXPECT_EQ(OK, error2.type); EXPECT_EQ(0, error2.reporting_upload_depth); const NetworkErrorLoggingService::RequestDetails& error3 = network_error_logging_service()->errors()[2]; EXPECT_EQ(GURL("https://mail.example.org/"), error3.uri); EXPECT_TRUE(error3.referrer.is_empty()); EXPECT_EQ("", error3.user_agent); EXPECT_EQ(ip, error3.server_ip); EXPECT_EQ("h2", error3.protocol); EXPECT_EQ("GET", error3.method); EXPECT_EQ(200, error3.status_code); EXPECT_EQ(OK, error3.type); EXPECT_EQ(0, error3.reporting_upload_depth); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportCancelAfterStart) { StaticSocketDataProvider data; data.set_connect_data(MockConnect(SYNCHRONOUS, ERR_IO_PENDING)); session_deps_.socket_factory->AddSocketDataProvider(&data); TestCompletionCallback callback; auto session = CreateSession(&session_deps_); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_EQ(rv, ERR_IO_PENDING); // Cancel after start. trans.reset(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); CheckReport(0 /* index */, 0 /* status_code */, ERR_ABORTED, IPAddress() /* server_ip */); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, CreateReportCancelBeforeReadingBody) { std::string extra_header_string = extra_headers_.ToString(); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n"), MockRead("Content-Length: 100\r\n\r\n"), // Body is never read. }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback; auto session = CreateSession(&session_deps_); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); EXPECT_TRUE(response->headers); EXPECT_EQ("HTTP/1.0 200 OK", response->headers->GetStatusLine()); // Cancel before reading the body. trans.reset(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); CheckReport(0 /* index */, 200 /* status_code */, ERR_ABORTED); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontCreateReportHttp) { base::HistogramTester histograms; RequestPolicy(); EXPECT_EQ(1u, network_error_logging_service()->headers().size()); EXPECT_EQ(1u, network_error_logging_service()->errors().size()); // Make HTTP request std::string extra_header_string = extra_headers_.ToString(); MockRead data_reads[] = { MockRead("HTTP/1.0 200 OK\r\n\r\n"), MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, extra_header_string.data(), extra_header_string.size()), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); // Insecure url url_ = "http://www.example.org/"; request_.url = GURL(url_); TestCompletionCallback callback; auto session = CreateSession(&session_deps_); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); // Insecure request does not generate a report histograms.ExpectBucketCount( NetworkErrorLoggingService::kRequestOutcomeHistogram, NetworkErrorLoggingService::RequestOutcome::kDiscardedInsecureOrigin, 1); EXPECT_EQ(1u, network_error_logging_service()->errors().size()); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontCreateReportHttpError) { base::HistogramTester histograms; RequestPolicy(); EXPECT_EQ(1u, network_error_logging_service()->headers().size()); EXPECT_EQ(1u, network_error_logging_service()->errors().size()); // Make HTTP request that fails MockRead data_reads[] = { MockRead("hello world"), MockRead(SYNCHRONOUS, OK), }; StaticSocketDataProvider data(data_reads, base::span<MockWrite>()); session_deps_.socket_factory->AddSocketDataProvider(&data); url_ = "http://www.originwithoutpolicy.com:2000/"; request_.url = GURL(url_); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(callback.GetResult(rv), IsError(ERR_INVALID_HTTP_RESPONSE)); // Insecure request does not generate a report, regardless of existence of a // policy for the origin. histograms.ExpectBucketCount( NetworkErrorLoggingService::kRequestOutcomeHistogram, NetworkErrorLoggingService::RequestOutcome::kDiscardedInsecureOrigin, 1); EXPECT_EQ(1u, network_error_logging_service()->errors().size()); } // Don't report on proxy auth challenges, don't report if connecting through a // proxy. TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, DontCreateReportProxy) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); // Configure against proxy server "myproxy:70". session_deps_.proxy_resolution_service = ProxyResolutionService::CreateFixedFromPacResult( "PROXY myproxy:70", TRAFFIC_ANNOTATION_FOR_TESTS); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); // Since we have proxy, should try to establish tunnel. MockWrite data_writes1[] = { MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a non-persistent // connection. MockRead data_reads1[] = { // No credentials. MockRead("HTTP/1.1 407 Proxy Authentication Required\r\n"), MockRead("Proxy-Authenticate: Basic realm=\"MyRealm1\"\r\n"), MockRead("Proxy-Connection: close\r\n\r\n"), }; MockWrite data_writes2[] = { // After calling trans->RestartWithAuth(), this is the request we should // be issuing -- the final header line contains the credentials. MockWrite("CONNECT www.example.org:443 HTTP/1.1\r\n" "Host: www.example.org:443\r\n" "Proxy-Connection: keep-alive\r\n" "Proxy-Authorization: Basic Zm9vOmJhcg==\r\n\r\n"), MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; MockRead data_reads2[] = { MockRead("HTTP/1.1 200 Connection Established\r\n\r\n"), MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Type: text/html; charset=iso-8859-1\r\n"), MockRead("Content-Length: 5\r\n\r\n"), MockRead(SYNCHRONOUS, "hello"), }; StaticSocketDataProvider data1(data_reads1, data_writes1); session_deps_.socket_factory->AddSocketDataProvider(&data1); StaticSocketDataProvider data2(data_reads2, data_writes2); session_deps_.socket_factory->AddSocketDataProvider(&data2); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); TestCompletionCallback callback1; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(callback1.GetResult(rv), IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); EXPECT_EQ(407, response->headers->response_code()); std::string response_data; rv = ReadTransaction(trans.get(), &response_data); EXPECT_THAT(rv, IsError(ERR_TUNNEL_CONNECTION_FAILED)); // No NEL report is generated for the 407. EXPECT_EQ(0u, network_error_logging_service()->errors().size()); TestCompletionCallback callback2; rv = trans->RestartWithAuth(AuthCredentials(kFoo, kBar), callback2.callback()); EXPECT_THAT(callback2.GetResult(rv), IsOk()); response = trans->GetResponseInfo(); EXPECT_EQ(200, response->headers->response_code()); ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello", response_data); trans.reset(); // No NEL report is generated because we are behind a proxy. EXPECT_EQ(0u, network_error_logging_service()->errors().size()); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, ReportContainsUploadDepth) { reporting_upload_depth_ = 7; request_.reporting_upload_depth = reporting_upload_depth_; RequestPolicy(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); const NetworkErrorLoggingService::RequestDetails& error = network_error_logging_service()->errors()[0]; EXPECT_EQ(7, error.reporting_upload_depth); } TEST_F(HttpNetworkTransactionNetworkErrorLoggingTest, ReportElapsedTime) { std::string extra_header_string = extra_headers_.ToString(); static const base::TimeDelta kSleepDuration = base::TimeDelta::FromMilliseconds(10); std::vector<MockWrite> data_writes = { MockWrite(ASYNC, 0, "GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n"), MockWrite(ASYNC, 1, extra_header_string.data()), }; std::vector<MockRead> data_reads = { // Write one byte of the status line, followed by a pause. MockRead(ASYNC, 2, "H"), MockRead(ASYNC, ERR_IO_PENDING, 3), MockRead(ASYNC, 4, "TTP/1.1 200 OK\r\n\r\n"), MockRead(ASYNC, 5, "hello world"), MockRead(SYNCHRONOUS, OK, 6), }; SequencedSocketData data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(ASYNC, OK); session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback; int rv = trans->Start(&request_, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); data.RunUntilPaused(); ASSERT_TRUE(data.IsPaused()); FastForwardBy(kSleepDuration); data.Resume(); EXPECT_THAT(callback.GetResult(rv), IsOk()); std::string response_data; ASSERT_THAT(ReadTransaction(trans.get(), &response_data), IsOk()); EXPECT_EQ("hello world", response_data); trans.reset(); ASSERT_EQ(1u, network_error_logging_service()->errors().size()); CheckReport(0 /* index */, 200 /* status_code */, OK); const NetworkErrorLoggingService::RequestDetails& error = network_error_logging_service()->errors()[0]; // Sanity-check elapsed time in error report EXPECT_EQ(kSleepDuration, error.elapsed_time); } #endif // BUILDFLAG(ENABLE_REPORTING) TEST_F(HttpNetworkTransactionTest, AlwaysFailRequestToCache) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("http://example.org/"); request.load_flags = LOAD_ONLY_FROM_CACHE; std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); HttpNetworkTransaction trans(DEFAULT_PRIORITY, session.get()); TestCompletionCallback callback1; int rv = trans.Start(&request, callback1.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_CACHE_MISS)); } TEST_F(HttpNetworkTransactionTest, ZeroRTTDoesntConfirm) { HttpRequestInfo request; request.method = "GET"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite("GET / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(SYNCHRONOUS, OK); ssl.confirm = MockConfirm(SYNCHRONOUS, OK); session_deps_.enable_early_data = true; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(1, response->headers->GetContentLength()); // Check that ConfirmHandshake wasn't called. ASSERT_FALSE(ssl.ConfirmDataConsumed()); ASSERT_TRUE(ssl.WriteBeforeConfirm()); trans.reset(); session->CloseAllConnections(); } TEST_F(HttpNetworkTransactionTest, ZeroRTTSyncConfirmSyncWrite) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite(SYNCHRONOUS, "POST / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Content-Length: 0\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(SYNCHRONOUS, OK); ssl.confirm = MockConfirm(SYNCHRONOUS, OK); session_deps_.enable_early_data = true; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(1, response->headers->GetContentLength()); // Check that the Write didn't get called before ConfirmHandshake completed. ASSERT_FALSE(ssl.WriteBeforeConfirm()); trans.reset(); session->CloseAllConnections(); } TEST_F(HttpNetworkTransactionTest, ZeroRTTSyncConfirmAsyncWrite) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite(ASYNC, "POST / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Content-Length: 0\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(SYNCHRONOUS, OK); ssl.confirm = MockConfirm(SYNCHRONOUS, OK); session_deps_.enable_early_data = true; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(1, response->headers->GetContentLength()); // Check that the Write didn't get called before ConfirmHandshake completed. ASSERT_FALSE(ssl.WriteBeforeConfirm()); trans.reset(); session->CloseAllConnections(); } TEST_F(HttpNetworkTransactionTest, ZeroRTTAsyncConfirmSyncWrite) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite(SYNCHRONOUS, "POST / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Content-Length: 0\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(SYNCHRONOUS, OK); ssl.confirm = MockConfirm(ASYNC, OK); session_deps_.enable_early_data = true; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(1, response->headers->GetContentLength()); // Check that the Write didn't get called before ConfirmHandshake completed. ASSERT_FALSE(ssl.WriteBeforeConfirm()); trans.reset(); session->CloseAllConnections(); } TEST_F(HttpNetworkTransactionTest, ZeroRTTAsyncConfirmAsyncWrite) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite(ASYNC, "POST / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Content-Length: 0\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(SYNCHRONOUS, OK); ssl.confirm = MockConfirm(ASYNC, OK); session_deps_.enable_early_data = true; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsOk()); const HttpResponseInfo* response = trans->GetResponseInfo(); ASSERT_TRUE(response); ASSERT_TRUE(response->headers); EXPECT_EQ(200, response->headers->response_code()); EXPECT_EQ(1, response->headers->GetContentLength()); // Check that the Write didn't get called before ConfirmHandshake completed. ASSERT_FALSE(ssl.WriteBeforeConfirm()); trans.reset(); session->CloseAllConnections(); } TEST_F(HttpNetworkTransactionTest, ZeroRTTConfirmErrorSync) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Content-Length: 0\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(SYNCHRONOUS, OK); ssl.confirm = MockConfirm(SYNCHRONOUS, ERR_SSL_PROTOCOL_ERROR); session_deps_.enable_early_data = true; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR)); // Check that the Write didn't get called before ConfirmHandshake completed. ASSERT_FALSE(ssl.WriteBeforeConfirm()); trans.reset(); session->CloseAllConnections(); } TEST_F(HttpNetworkTransactionTest, ZeroRTTConfirmErrorAsync) { HttpRequestInfo request; request.method = "POST"; request.url = GURL("https://www.example.org/"); request.traffic_annotation = net::MutableNetworkTrafficAnnotationTag(TRAFFIC_ANNOTATION_FOR_TESTS); MockWrite data_writes[] = { MockWrite("POST / HTTP/1.1\r\n" "Host: www.example.org\r\n" "Connection: keep-alive\r\n" "Content-Length: 0\r\n\r\n"), }; // The proxy responds to the connect with a 407, using a persistent // connection. MockRead data_reads[] = { MockRead("HTTP/1.1 200 OK\r\n"), MockRead("Content-Length: 1\r\n\r\n"), MockRead(SYNCHRONOUS, "1"), }; StaticSocketDataProvider data(data_reads, data_writes); session_deps_.socket_factory->AddSocketDataProvider(&data); SSLSocketDataProvider ssl(SYNCHRONOUS, OK); ssl.confirm = MockConfirm(ASYNC, ERR_SSL_PROTOCOL_ERROR); session_deps_.enable_early_data = true; session_deps_.socket_factory->AddSSLSocketDataProvider(&ssl); std::unique_ptr<HttpNetworkSession> session(CreateSession(&session_deps_)); TestCompletionCallback callback; auto trans = std::make_unique<HttpNetworkTransaction>(DEFAULT_PRIORITY, session.get()); int rv = trans->Start(&request, callback.callback(), NetLogWithSource()); EXPECT_THAT(rv, IsError(ERR_IO_PENDING)); rv = callback.WaitForResult(); EXPECT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR)); // Check that the Write didn't get called before ConfirmHandshake completed. ASSERT_FALSE(ssl.WriteBeforeConfirm()); trans.reset(); session->CloseAllConnections(); } } // namespace net
[ "279687673@qq.com" ]
279687673@qq.com
ff63c3bf1b21a16a9960d38399c31d9204e04840
a1fbf16243026331187b6df903ed4f69e5e8c110
/cs/engine/xrGame/steering_behaviour_base.h
b8621a3db1449253aa9f2397e6f0bece924db9ee
[ "LicenseRef-scancode-warranty-disclaimer", "BSD-2-Clause" ]
permissive
OpenXRay/xray-15
ca0031cf1893616e0c9795c670d5d9f57ca9beff
1390dfb08ed20997d7e8c95147ea8e8cb71f5e86
refs/heads/xd_dev
2023-07-17T23:42:14.693841
2021-09-01T23:25:34
2021-09-01T23:25:34
23,224,089
64
23
NOASSERTION
2019-04-03T17:50:18
2014-08-22T12:09:41
C++
UTF-8
C++
false
false
911
h
//////////////////////////////////////////////////////////////////////////// // Module : steering_behaviour_base.h // Created : 07.11.2007 // Modified : 07.11.2007 // Author : Dmitriy Iassenev // Description : steering behaviour base class //////////////////////////////////////////////////////////////////////////// #ifndef STEERING_BEHAVIOUR_BASE_H_INCLUDED #define STEERING_BEHAVIOUR_BASE_H_INCLUDED #include <boost/noncopyable.hpp> class CAI_Rat; namespace steering_behaviour { class base : private boost::noncopyable { public: base (CAI_Rat const *object); virtual ~base () {} virtual Fvector direction () = 0; public: IC void enabled (bool const &value); IC bool const &enabled () const; private: CAI_Rat const *m_object; bool m_enabled; }; } // namespace steering_behaviour #include "steering_behaviour_base_inline.h" #endif // STEERING_BEHAVIOUR_BASE_H_INCLUDED
[ "paul-kv@yandex.ru" ]
paul-kv@yandex.ru
1c0ccdbe1619c4940003cb4cebc85cabcf716928
398d62c4f6807e548d2b97cf0440bcafee635cea
/a_good_set.cpp
694511362d274fe822d47162515e7d1a7f7d1b23
[]
no_license
gujral1997/code_chef
4c3b3f0d1a4b7afefaf6920ff5215e9d9def8a0d
2f5c0d689a7a59a43921d11f37c892401a6ebe9e
refs/heads/master
2021-09-02T08:31:38.784271
2018-01-01T01:32:29
2018-01-01T01:32:29
112,578,503
0
0
null
null
null
null
UTF-8
C++
false
false
351
cpp
#include<bits/stdc++.h> using namespace std; typedef long long int lint; int main(int argc, char const *argv[]) { int t; cin>>t; while(t--) { int a,i=4,counter=2; cin>>a; if(a>=2) { cout<<1<<" "<<2<<" "; } else { cout<<1<<" "; } while(counter<a) { cout<<i<<" "; i+=3; counter++; } cout<<endl; } return 0; }
[ "mastershady007@gmail.com" ]
mastershady007@gmail.com
b764c426771a73ad17a9836eff979fb62461c13b
6b0a4f401b8bf69ddd757809240ee828e2277e69
/DummyClientFramework/DummyClientFramework/Custom.hh
61d14520254eab043d78f1bea39c93214439d639
[ "MIT" ]
permissive
GameForPeople/dummy-client-framework
84da1572c6db2646fa8e01ff60df526e039fbe03
46f75da426a68a88fa3e97f5c2f84bb5f1ad000a
refs/heads/master
2020-06-09T04:45:53.740560
2019-11-27T10:38:49
2019-11-27T10:38:49
193,372,933
2
1
null
null
null
null
UHC
C++
false
false
8,361
hh
#pragma once #pragma region [더미 클라이언트 정의] #define DUMMY_CLIENT_TEST_MODE 0 // 0 이면 디폴트 테스트 모드, 1이면 핫스팟 테스트 모드 #define DUMMY_CLIENT_SIGN_MODE 0 // 0 이면 최초 로그인 패킷, 1이면 계정 생성 요청 패킷 #if DUMMY_CLIENT_TEST_MODE == 0 #define DEFAULT_TEST_MODE #else #define HOTSPOT_TEST_MODE // 핫 스팟 테스트 모드. #endif #if DUMMY_CLIENT_SIGN_MODE == 0 #define LOGIN_MODE // 계정 로그인 모드 #else #define SIGNUP_MODE // 계정 생성 모드 #endif #define __ON 1 #define __OFF 0 #define USE_CONTROLLED_CLIENT __ON #define USE_TIMER_MANAGER __ON #define USE_LOG_MANAGER __OFF // 현재 정상적으로 동작하지 않습니다. #define USE_PERFORMANCE_MANAGER __OFF // 현재 동작하지 않습니다. #define USE_RENDERMODEL_MANAGER __OFF // 현재 동작하지 않습니다. #pragma endregion namespace NETWORK { const static std::string SERVER_IP = "127.0.0.1"; constexpr static unsigned short SERVER_PORT = 9000; constexpr static int MAX_RECV_SIZE = 1000; // 한번에 RECV가 가능한 최대 크기입니다. constexpr static int MAX_SEND_SIZE = 127; // 한번에 SEND가 가능한 최대 크기입니다. Send하는 프로토콜 - 패킷 중, sizeof(char)보다 큰 사이즈의 패킷이 존재할 경우 해당 프레임워크를 사용할 수 없습니다. constexpr static int MAX_PACKET_SIZE = 127; // Packet의 최대 크기입니다. sizeof(char)보다 큰 사이즈의 패킷이 존재할 경우 해당 프레임워크를 사용할 수 없습니다. } namespace WINDOW { constexpr static int WINDOW_WIDTH = 800; // 윈도우의 X Size 변경 시, 수정해주세요. constexpr static int WINDOW_HEIGHT = 800; // 윈도우의 Y Size 변경 시, 수정해주세요. constexpr static int MAIN_TIMER_INDEX = 1; constexpr static int MAIN_TIMER_FRAME = 1000; // WinAPI의 프레임을 변경 시, 수정해주세요. ex) 17(60FPS), 33(30FPS) } namespace FRAMEWORK { constexpr static int MAX_CLIENT = 1000; // 테스트하려는 클라이언트 수를 변경하고자 할 때, 수정해주세요. constexpr static int WORKER_THREAD_COUNT = 3; // 더미 클라이언트에 사용할 워커쓰레드 개수를 설정해주세요. constexpr static int CONNECTED_CLIENT_COUNT_IN_ONE_FRAME = 10; // Max Client까지 커넥트 하는 중일 떄, 한 틱에 커넥트 시도할 클라이언트 수. constexpr static int MAX_COUNT_MEMORY_UNIT_OF_SEND_POOL = 1000000; // Send Memory Pool의 최초 할당 메모리 유닛 개수입니다. constexpr static int ALLOCATE_COUNT_MEMORY_UNIT_OF_SEND_POOL = 100000; // Send Memory Pool의 try_pop가 실패하는 경우(메모리풀이 빔), 메모리풀에 메모리를 추가할당하는 사이즈입니다. constexpr static int PRE_ALLOCATION_TIMER_UNIT_COUNT = 100000; // Timer Unit Pool의 사이즈! constexpr static int MAX_ID_LENGTH = 10; } namespace GAME { constexpr static int ZONE_MIN_X = 0; // 테스트 하는 서버 Zone의 X 최저값 좌표입니다. constexpr static int ZONE_MIN_Y = 0; // 테스트 하는 서버 Zone의 Y 최저값 좌표입니다. constexpr static int ZONE_MAX_X = 300; // 테스트 하는 서버 Zone의 X 최대값 좌표입니다. constexpr static int ZONE_MAX_Y = 300; // 테스트 하는 서버 Zone의 Y 최대값 좌표입니다. constexpr static int ZONE_X_SIZE = ZONE_MAX_X - ZONE_MIN_X; // constexpr static int ZONE_Y_SIZE = ZONE_MAX_Y - ZONE_MIN_Y; // constexpr static int ACTOR_X_SIZE = 1500 / ZONE_X_SIZE; constexpr static int ACTOR_Y_SIZE = 1500 / ZONE_Y_SIZE; #if USE_CONTROLLED_CLIENT == __ON constexpr static int BROADCAST_X_SIZE = 10; // USE_CONTROLLED_CLIENT의 시야 X입니다. constexpr static int BROADCAST_Y_SIZE = 10; // USE_CONTROLLED_CLIENT의 시야 Y입니다. constexpr static int BROADCAST_X_RENDER_SIZE = ACTOR_X_SIZE * BROADCAST_X_SIZE / 2; constexpr static int BROADCAST_Y_RENDER_SIZE = ACTOR_Y_SIZE * BROADCAST_Y_SIZE / 2; #endif } namespace USING_DEFINE { using _PosType = unsigned short; using _ClientIndexType = unsigned int; using _PacketSizeType = unsigned char; using _PacketType = unsigned char; using _DirectionType = unsigned char; using _TimeType = unsigned long long; using _TimeDataType = long long; using _IDType = wchar_t; }using namespace USING_DEFINE; enum class TIME : _TimeType { SECOND = 1000 , MINUTE = 60000 , SKILL = 1000 , ITEM = 2500 }; enum class TIMER_TYPE : unsigned char { NONE_TYPE // 기본생성자. , AWAKE_TYPE // 로그인 true 패킷 전달시 처리하게되는 인자. , ATTACK_TYPE // 기본 공격 , SKILL_TYPE // 스킬 타입 , USE_ITEM_TYPE // 아이템 타입 , MOVE_TYPE }; namespace MEMORY { #pragma region [FIXED] struct BaseMemoryUnit { BaseMemoryUnit(const bool isRecv); ~BaseMemoryUnit(); public: OVERLAPPED overlapped; WSABUF wsaBuf; const bool isRecv; // true == recv, false == send }; struct SendMemoryUnit /*: public BaseMemoryUnit*/ { SendMemoryUnit(); ~SendMemoryUnit(); //virtual ~SendMemoryUnit() override final; public: BaseMemoryUnit memoryUnit; char dataBuf[NETWORK::MAX_SEND_SIZE]; }; struct ClientInfo /* : public BaseMemoryUnit */ { ClientInfo(const _ClientIndexType key); ~ClientInfo(); //virtual ~BaseClientInfo() override; public: // Fixed BaseMemoryUnit memoryUnit; _ClientIndexType key; SOCKET socket; bool isConnect = false; const _ClientIndexType index; char dataBuf[NETWORK::MAX_RECV_SIZE]; char loadedBuf[NETWORK::MAX_PACKET_SIZE]; _PacketSizeType loadedSize; #pragma endregion public: // Custom std::atomic<bool> isLogin = false; _PosType posX; _PosType posY; }; using _ClientType = ClientInfo; // }using namespace MEMORY; namespace PACKET_EXAMPLE { namespace TYPE { namespace SERVER_TO_CLIENT { enum { POSITION = 0, LOGIN_TRUE = 1, LOGIN_FAIL = 2, PUT_OBJECT = 3, ENUM_SIZE }; } namespace CLIENT_TO_SERVER { enum { MOVE = 0, LOGIN = 1, SIGN_UP = 2, ATTACK = 3, SKILL = 4, USE_ITEM = 5, TELEPORT = 6, ENUM_SIZE }; } } #pragma pack (push, 1) namespace DATA { struct BasePacket { const _PacketSizeType size; const _PacketType type; BasePacket(const _PacketSizeType size, const _PacketType type) noexcept; }; namespace SERVER_TO_CLIENT { struct LoginTrue : public BasePacket { const _ClientIndexType key; char paddingBuffer[40]; LoginTrue(const _ClientIndexType key) noexcept; }; struct PutObject : public BasePacket { const _ClientIndexType key; const _PosType posX; const _PosType posY; unsigned int paddingBuffer; PutObject(const _ClientIndexType key, const _PosType posX, const _PosType posY) noexcept; }; struct Position : public BasePacket { const _ClientIndexType key; const _PosType posX; const _PosType posY; Position(const _ClientIndexType key, const _PosType posX, const _PosType posY) noexcept; }; } namespace CLIENT_TO_SERVER { struct Move : public BasePacket { const _DirectionType dir; Move(const _DirectionType dir) noexcept; }; struct Login : public BasePacket { _IDType id[FRAMEWORK::MAX_ID_LENGTH]; Login(const _IDType* const pInNickname) noexcept; }; struct SignUp : public BasePacket { _IDType id[FRAMEWORK::MAX_ID_LENGTH]; int pb0; SignUp(const _IDType* const pInNickname) noexcept; }; struct Attack : public BasePacket { unsigned char attackType; //0이면 기본공격, 1이면 스킬1, 2이면 스킬2 Attack(const unsigned char InAttackType ) noexcept; }; struct Skill : public BasePacket { unsigned char skillType; //0이면 기본공격, 1이면 스킬1, 2이면 스킬2 Skill(const unsigned char InSkillType) noexcept; }; struct UseItem : public BasePacket { unsigned char itemType; //0이면 기본공격, 1이면 스킬1, 2이면 스킬2 UseItem(const unsigned char InItemType) noexcept; }; struct Teleport : public BasePacket { const _PosType posX; //0이면 기본공격, 1이면 스킬1, 2이면 스킬2 const _PosType posY; Teleport(const _PosType posX, const _PosType posY) noexcept; }; } } #pragma pack(pop) }
[ "koreagamemaker@gmail.com" ]
koreagamemaker@gmail.com
f6e10b4a7c4fcef5cc711f7a5996a0db8730328a
3a8dc7f40a3ff0dcca37f01bb8c62dacac72eab4
/AddOn-BeIDE/DontWorryAddOn.cpp
ace3f1d0608751f115ff530f57d4cb2d73c7aa55
[ "MIT" ]
permissive
nexus6-haiku/dontworry
39802b904d31baddd29905d978b3a917c232f416
9a398fe75d748dcd87563634846c1e3d870399a9
refs/heads/master
2023-03-19T13:12:10.812396
2014-08-07T14:04:19
2014-08-07T14:04:19
null
0
0
null
null
null
null
UTF-8
C++
false
false
750
cpp
// Test add-on. #include "AddOnConstantes.h" #include "AddOnTextView.h" #include "MTextAddOn.h" #include <Window.h> #include <View.h> #include <TextView.h> #if __POWERPC__ #pragma export on #endif extern "C" { __declspec(dllexport) status_t perform_edit(MTextAddOn *addon); } #if __POWERPC__ #pragma export reset #endif /* Public interface for the add-on */ long perform_edit(MTextAddOn *addon) { BWindow *editWindow = addon->Window(); AddOnTextView *l_AddOnView; // la nouvelle vue est-elle installée? // si non! ben on utilise peut etre pas l'addon if ((l_AddOnView = (dynamic_cast<AddOnTextView *>(editWindow->FindView(ADDON_VIEW_NAME)))) == NULL) return B_NO_ERROR; else l_AddOnView->AddOnCalled(addon); return B_NO_ERROR; }
[ "revol@free.fr" ]
revol@free.fr
176480111b7faa2420f156751b2079fad3c11b65
c05ee947f4a79952aa7e6de9aa83678bd39863d7
/loop_functions/basic_loop_functions.h
1f164e03b4136348d4b328e563d2395443c7125b
[]
no_license
ChrisFrendo/FYP-Simulation
a16faa7955086092714f7e4822a2ec2e9c62b4c8
4dd044059deb519055084264287a7e7b5c062ee1
refs/heads/main
2023-06-03T08:52:24.201660
2021-06-26T11:04:27
2021-06-26T11:04:27
378,622,512
0
0
null
null
null
null
UTF-8
C++
false
false
1,439
h
#ifndef BASIC_LOOP_FUNCTIONS_H #define BASIC_LOOP_FUNCTIONS_H #include <argos3/core/simulator/loop_functions.h> #include <argos3/core/simulator/entity/floor_entity.h> #include <argos3/core/utility/math/range.h> #include <argos3/core/utility/math/rng.h> using namespace argos; class CBasicLoopFunctions : public CLoopFunctions { public: CBasicLoopFunctions(); ~CBasicLoopFunctions() override = default; void Init(TConfigurationNode &t_tree) override; void Reset() override; void Destroy() override; CColor GetFloorColor(const CVector2 &c_position_on_plane) override; void PreStep() override; void PostExperiment() override; static UInt32 m_currentFoodInCache; // holds the current number of food items in the cache static UInt32 m_maxFoodInCache; // holds the maximum number of food items in the cache static UInt32 m_currentFoodInNest; // holds the current number of food items stored in the nest enum ALGORITHM { ALGO1 = 0, ALGO2, ALGO3, INVALID }; static ALGORITHM m_selectedAlgo; private: Real m_fFoodSquareRadius; CRange<Real> m_cHarvestingArenaSideX, m_cHarvestingArenaSideY; std::vector<CVector2> m_cFoodPos; CFloorEntity *m_pcFloor; CRandom::CRNG *m_pcRNG; std::string m_strOutput; std::ofstream m_cOutput; UInt32 m_totalCachedFood; // holds total number of food placed in the cache }; #endif
[ "chris.frendo.18@um.edu.mt" ]
chris.frendo.18@um.edu.mt
f9d6009cd79c831768aa8b6e55342175998332ca
cd322b63899b2f6a80798cc34b9e9e4f0fc3c41e
/Accelerometer/src/mma8451_pi.h
47c2bc10ae69ec981c0ffcfb3a58dd44a7ffea4c
[]
no_license
HUDView/HUDView
3f9827b00fcc5b9d62147815cdfc0b6b5847f8ea
ddb9601d715e707e9082aa6ebe3b7d41b38f9c6c
refs/heads/develop
2020-04-15T14:11:29.228987
2019-04-15T16:22:44
2019-04-15T16:22:44
164,745,310
1
1
null
2019-04-09T20:15:44
2019-01-08T22:40:08
C
UTF-8
C++
false
false
1,720
h
#ifndef MMA8451_PI_INCLUDED #define MMA8451_PI_INCLUDED #ifdef __cplusplus extern "C" { #endif ///Structure that represent a mma8451 sensor. Get it from the initialise function and give it the other ones typedef struct mma8451_ { ///File descriptor that point to an i2c device in /dev int file; ///Address of the sensor on the i2c bus unsigned char address; ///Current range setting unsigned char range; ///raw data as sent by the sensor unsigned char raw_data[6]; } mma8451; ///Default address of the sensor if you do nothing #define MMA8451_DEFAULT_ADDR 0x1D ///Address if you pull down the address line #define MMA8451_PULLDOWN_ADDR 0x1C ///Initialse the sensor at the given address mma8451 mma8451_initialise(int device, int i2c_addr); ///Vector of 3 float typedef struct mma8451_vector3_ { float x, y, z; } mma8451_vector3; ///write the content of register 0x01 to 0x06 to the output buffer. void mma8451_get_raw_sample(mma8451* handle, char* output); ///get the current acceleration vector mma8451_vector3 mma8451_get_acceleration_vector(mma8451* handle); void mma8451_get_acceleration(mma8451* handle, mma8451_vector3* vector); ///set the "range" (aka:the max acceleration we register) void mma8451_set_range(mma8451* handle, unsigned char range); #ifdef __cplusplus } //extern "C" #endif //Here we are on C++ linkage land #ifdef __cplusplus #include <iostream> ///operator overload ot print out the content of a mma8451_vector object if you are using C++ std::ostream& operator<< (std::ostream& out, const mma8451_vector3& vector) { out << "mma8451_vector3(" << vector.x << ", " << vector.y << ", " << vector.z << ")"; return out; } #endif #endif
[ "bdprisby@gmail.com" ]
bdprisby@gmail.com
111f35639f594f729d6fd6380107f7e0ca419837
80885baabcdaa5e8d8abae31eebee72d072c2566
/TimerCounter.cpp
cd4d427f5dca43ca5c1e2c4aa9b84ca5259c62d6
[]
no_license
xiaoguosk/safeGeoRecommend
28c97cd8a155601ed49955af3fae3cf2090848b3
d294050cbf783b13803a87ce6240a3b615c2db47
refs/heads/master
2023-01-08T00:38:53.584801
2020-11-03T06:02:34
2020-11-03T06:02:34
309,245,038
0
0
null
null
null
null
GB18030
C++
false
false
487
cpp
#include "TimerCounter.h" #include <iostream> using namespace std; TimerCounter::TimerCounter(void) { QueryPerformanceFrequency(&freq);//获取主机CPU时钟频率 } TimerCounter::~TimerCounter(void) { } void TimerCounter::Start() { QueryPerformanceCounter(&startCount);//开始计时 } void TimerCounter::Stop() { QueryPerformanceCounter(&endCount);//停止计时 dbTime = ((double)endCount.QuadPart - (double)startCount.QuadPart) / (double)freq.QuadPart;//获取时间差 }
[ "xiaoguosk@foxmail.com" ]
xiaoguosk@foxmail.com
28383a534c6cce2918c433b45905d0c5326781c6
d0dcd8492a5afd746bad488ee90c2c282998728f
/src/Communication/NetworkTransceiverNodeProcess.h
da6724b4370a1958aaffa3f4351f46f695279e1f
[]
no_license
dgitz/icarus_rover_v2
4c99bcf31b83701cfb130348acb3113721aa4c9e
1d25266f4bf9872bb5b98912d9c938e0d280756c
refs/heads/master
2021-03-09T05:55:47.352511
2020-04-05T20:07:07
2020-04-05T20:07:07
47,700,940
1
0
null
2020-04-05T20:07:08
2015-12-09T15:44:10
C++
UTF-8
C++
false
false
5,945
h
#include "../../include/Base/BaseNodeProcess.cpp" //C System Files //C++ System Files //ROS Base Functionality //ROS Messages #include <eros/systemsnapshot_state.h> //Project #include <tinyxml.h> /*! \class NetworkTransceiverNodeProcess NetworkTransceiverNodeProcess.h "NetworkTransceiverNodeProcess.h" * \brief This is a NetworkTransceiverNodeProcess class. Used for the networktransceiver_node node. * */ class NetworkTransceiverNodeProcess: public BaseNodeProcess { public: //Constants //Enumstouch enum PriorityLevel { UNDEFINED = 0, HIGH = 1, MEDIUM =2, LOW = 3 }; //Structs struct Message { uint16_t id; std::string name; uint32_t sent_counter; uint32_t recv_counter; double sent_rate; double recv_rate; double target_sendrate; uint8_t priority_level; }; struct QueueElement { uint16_t id; std::string item; }; struct RemoteDevice { std::string Name; double current_beatepoch_sec; double expected_beatepoch_sec; double offset_sec; }; ///Initialization Functions /*! \brief NodeProcess specific Initialization * */ eros::diagnostic load(std::string miscconfigfilepath); eros::diagnostic finish_initialization(); void reset() { } //Update Functions /*! \brief Implementation of the update function * */ eros::diagnostic check_remoteHeartbeats(); eros::diagnostic update(double t_dt,double t_ros_time); //Attribute Functions void set_networkconfiguration(std::string t_multicast_group,int t_send_multicast_port,int t_recv_unicast_port); std::string get_multicast_group() { return multicast_group; } int get_send_multicast_port() { return send_multicast_port; } int get_recv_unicast_port() { return recv_unicast_port; } void set_UIMode(std::string t_UIMode) { UIMode = t_UIMode; } std::string get_UIMode() { return UIMode; } std::vector<Message> get_messages() { return messages; }; bool get_remoteheartbeatresult() { return remote_heartbeat_pass; } //Update Functions /*! \brief Push to the Topic List. * Returns -1 if the topic type was not found. Returns 0 if the topic was already in the list, and 1 if the topic was added. */ int push_topiclist(std::string type,std::string name) { if(type == "eros/resource") { for(std::size_t i = 0; i < resource_topics.size();i++) { if(resource_topics.at(i) == name) { return 0; } } resource_topics.push_back(name); return 1; } else if(type == "eros/diagnostic") { for(std::size_t i = 0; i < diagnostic_topics.size();i++) { if(diagnostic_topics.at(i) == name) { return 0; } } diagnostic_topics.push_back(name); return 1; } else if(type == "eros/device") { for(std::size_t i = 0; i < device_topics.size();i++) { if(device_topics.at(i) == name) { return 0; } } device_topics.push_back(name); return 1; } else if(type == "eros/firmware") { for(std::size_t i = 0; i < firmware_topics.size();i++) { if(firmware_topics.at(i) == name) { return 0; } } firmware_topics.push_back(name); return 1; } return -1; } std::vector<std::string> get_topiclist(std::string type) { if(type == "eros/resource") { return resource_topics; } else if(type == "eros/diagnostic") { return diagnostic_topics; } else if(type == "eros/device") { return device_topics; } else if(type == "eros/firmware") { return firmware_topics; } std::vector<std::string> empty_list; return empty_list; } //Message Functions /*! \brief Process Command Message. All implementation should use at least the code in this Sample Function. * */ std::vector<eros::diagnostic> new_commandmsg(const eros::command::ConstPtr& t_msg); eros::diagnostic new_devicemsg(const eros::device::ConstPtr& device); eros::diagnostic new_remoteheartbeatmsg(double timestamp,std::string name,double current_beat,double expected_beat); eros::diagnostic new_message_sent(uint16_t id); eros::diagnostic new_message_recv(uint16_t id); //Support Functions bool push_sendqueue(uint16_t id,std::string msg); std::vector<QueueElement> get_sendqueue(uint8_t level); //Printing Functions std::string get_messageinfo(bool v); protected: private: /*! \brief Process Specific Implementation * */ int parse_miscconfigfile(TiXmlDocument doc); std::vector<eros::diagnostic> check_programvariables(); void init_messages(); Message get_messagebyid(uint16_t id) { for(std::size_t i = 0; i < messages.size(); i++) { if(messages.at(i).id == id) { return messages.at(i); } } Message empty; return empty; } bool push_sendhighqueue(uint16_t id,std::string msg) { QueueElement elem; elem.id = id; elem.item = msg; Message m = get_messagebyid(id); if(m.sent_rate <= (1.5*m.target_sendrate)) { sendqueue_highpriority.push_back(elem); } return true; } bool push_sendmediumqueue(uint16_t id,std::string msg) { QueueElement elem; elem.id = id; elem.item = msg; Message m = get_messagebyid(id); if(m.sent_rate <= (1.5*m.target_sendrate)) { sendqueue_mediumpriority.push_back(elem); } return true; } bool push_sendlowqueue(uint16_t id,std::string msg) { QueueElement elem; elem.id = id; elem.item = msg; Message m = get_messagebyid(id); if(m.sent_rate <= (1.5*m.target_sendrate)) { sendqueue_lowpriority.push_back(elem); } return true; } std::vector<Message> messages; std::vector<QueueElement> sendqueue_highpriority; std::vector<QueueElement> sendqueue_mediumpriority; std::vector<QueueElement> sendqueue_lowpriority; std::vector<RemoteDevice> remote_devices; bool remote_heartbeat_pass; std::string multicast_group; int send_multicast_port; int recv_unicast_port; std::string UIMode; std::vector<std::string> resource_topics; std::vector<std::string> diagnostic_topics; std::vector<std::string> device_topics; std::vector<std::string> firmware_topics; };
[ "davidgitz@gmail.com" ]
davidgitz@gmail.com
ac6668eb72b4d69174772d0dab5d006bc3226679
820c61849a45ed69f3e4636e2d3f0486304b5d46
/Google Codejam/Codejam Problem A. Counting Sheep/main.cpp
3e7db022000e283cb2857ccdd5157298c8f98fa1
[]
no_license
Tanmoytkd/programming-projects
1d842c994b6e2c546ab37a5378a823f9c9443c39
42c6f741d6da1e4cf787b1b4971a72ab2c2919e1
refs/heads/master
2021-08-07T18:00:43.530215
2021-06-04T11:18:27
2021-06-04T11:18:27
42,516,841
2
1
null
null
null
null
UTF-8
C++
false
false
969
cpp
#include <iostream> #include<bits/stdc++.h> using namespace std; int main() { #ifdef TKD freopen("A-large.in", "r", stdin); freopen("output.txt", "w", stdout); #endif int testcase; cin >> testcase; for(int i=1; i<=testcase; i++) { bool check[10]; for(int j=0; j<10; j++) check[j]=false; int number; cin >> number; cout << "Case #" << i << ": "; if(number == 0) cout << "INSOMNIA" << endl; else { int counter=0, n=1, num; while(counter != 10) { num=number*n; while(num) { int dig=num%10; num/=10; if(check[dig]==false) { counter++; check[dig]=true; } } if(counter==10) cout << number*n << endl; n++; } } } return 0; }
[ "tanmoykrishnadas@gmail.com" ]
tanmoykrishnadas@gmail.com
260ed226a151dc8260c8e2427f656886d8a745dc
4abd8793f2f2cb52fe02837c67e39dfef74b5715
/vedant3620/day3/550a.cpp
6813e61d7971e28451379369256066e8f2b15d5b
[]
no_license
Devang-25/100DaysOfCode
bdab847655490b4421454b4693cfcd6ddc3d4ff5
4e3d632be1ecd3b235c03ac593a4ea8ec9562e56
refs/heads/master
2021-05-25T12:50:19.956945
2020-04-06T17:49:02
2020-04-06T17:49:02
253,761,487
1
1
null
2020-12-18T18:33:29
2020-04-07T10:31:32
null
UTF-8
C++
false
false
807
cpp
#include<bits/stdc++.h> using namespace std; typedef long long ll; int main(){ string s; cin>>s; ll t=0; for(ll i=0;i<s.length()-1;i++){ if(s[i]=='A' && s[i+1]=='B'){ for(i=i+2;i<s.length()-1;i++){ if(s[i]=='B' && s[i+1]=='A'){ t=1; i=s.length(); } } } } if(t==1){ cout<<"YES"; return 0; } for(ll i=0;i<s.length()-1;i++){ if(s[i]=='B' && s[i+1]=='A'){ for(i=i+2;i<s.length()-1;i++){ if(s[i]=='A' && s[i+1]=='B'){ t=1; i=s.length(); } } } } if(t==1){ cout<<"YES"; return 0; } cout<<"NO"; return 0; }
[ "23037053+rishabhKalakoti@users.noreply.github.com" ]
23037053+rishabhKalakoti@users.noreply.github.com
8c57d57b476ddc87f31380d8c42688a15a7d7b58
73b80a1074ad8b9999e4dd78c86a6baad32bfce5
/Core/3rdParty/2DPieGraph.cpp
8e362c35cea5e8a06c9321b1449da08235b153f2
[]
no_license
abstractspoon/ToDoList_Dev
25f463dea727b71ae30ca8de749570baa451aa13
29d038a7ff54150af21094f317e4f7c7d2dd118d
refs/heads/master
2023-08-31T21:18:16.238149
2023-08-29T01:24:16
2023-08-29T01:24:16
66,343,401
87
26
null
2023-09-09T08:16:35
2016-08-23T07:19:50
C++
UTF-8
C++
false
false
22,002
cpp
// 2DPieGraph.cpp: implementation of the C2DPieGraph class. // ////////////////////////////////////////////////////////////////////// #include "stdafx.h" #include "2DPieGraph.h" #include "mathparams.h" #include <math.h> #ifdef _DEBUG #undef THIS_FILE static char THIS_FILE[]=__FILE__; #define new DEBUG_NEW #endif ////////////////////////////////////////////////////////////////////// // Construction/Destruction ////////////////////////////////////////////////////////////////////// C2DPieGraph::~C2DPieGraph() { ClearGraph(); // Delete graph legend font m_LegendFont->DeleteObject(); delete m_LegendFont; m_LegendFont = NULL; // Free graph blend DC and bitmap ::SelectObject( m_hBlendDC, m_hOldBlendBitmap ); ::DeleteDC( m_hBlendDC ); ::DeleteObject( m_hBlendBitmap ); } C2DPieGraph::C2DPieGraph(CPoint g_position, CSize g_size) { // Set graph position and size m_Position = g_position; m_Size = g_size; // Set graph segments number m_SegmentsNumber = 0; m_Segments = NULL; // Set graph legend font m_LegendFont = new CFont(); m_LegendFont->CreateFont( int(m_Size.cy*0.075), 0, 0, 0, FW_NORMAL, FALSE, FALSE, FALSE, DEFAULT_CHARSET, OUT_CHARACTER_PRECIS, CLIP_CHARACTER_PRECIS, PROOF_QUALITY, DEFAULT_PITCH | FF_DONTCARE, _T("Arial") ); // Set default graph background color m_GraphBkColor = RGB(255,255,2555); // Set default graph legend background and text color m_LegendBackgroundColor = RGB(255,255,255); m_LegendTextColor = RGB(0,0,0); } void C2DPieGraph::BuildGraph(HDC hDC) { _2DPieGraphSegments *curr = m_Segments; double angle; int endX, endY; CBrush* pBrush = NULL; HGDIOBJ hOldBrush; bool animFlag = false; m_DrawPercentCompleted = 0; // Set start angle double startAngle = 0.0; // Set start point int startX = m_Position.x + m_Size.cx; int startY = m_Position.y + m_Size.cy/2; // Draw graph segments while ( curr != NULL ) { // If animation running if ( m_Animation == TRUE ) { // If running draw animation if ( m_AnimationType == AT_PIE_DRAW ) { int seg_percent = int((double(m_DrawPercentCompleted+curr->percent)/double(m_DrawTotalPercent)) * 100.0 + 0.5); // If drawing complete graph segment if ( m_AnimationPercent > seg_percent ) { // Calculate completed animation percent m_DrawPercentCompleted += curr->percent; // Set graph segment start angle angle = startAngle; // Calculate graph segment start position if ( ( ( angle >= 0 ) && ( angle <= (PI/2) ) ) || ( ( angle >= (3*PI/2) ) && ( angle <= (2*PI) ) ) ) startX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(angle) + 0.5); else if ( ( angle >= (PI/2) ) && ( angle <= (3*PI/2) ) ) startX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(angle) + 0.5); if ( ( angle >= 0 ) && ( angle <= (PI) ) ) startY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(angle) + 0.5); else if ( ( angle >= (PI) ) && ( angle <= (2*PI) ) ) startY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(angle) + 0.5); // Set graph segment end angle angle = startAngle + (double(curr->percent)/100.0) * (2*PI); // Calculate graph segment end position if ( ( ( angle >= 0 ) && ( angle <= (PI/2) ) ) || ( ( angle >= (3*PI/2) ) && ( angle <= (2*PI) ) ) ) endX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(angle) + 0.5); else if ( ( angle >= (PI/2) ) && ( angle <= (3*PI/2) ) ) endX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(angle) + 0.5); if ( ( angle >= 0 ) && ( angle <= (PI) ) ) endY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(angle) + 0.5); else if ( ( angle >= (PI) ) && ( angle <= (2*PI) ) ) endY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(angle) + 0.5); // Set new animation start point m_AnimationStartPoint = CPoint( endX, endY ); if ( ( startX != endX ) || ( startY != endY ) ) { // Draw graph segment pBrush = new CBrush(); pBrush->CreateSolidBrush( curr->color ); hOldBrush = ::SelectObject( hDC, pBrush->GetSafeHandle() ); ::Pie( hDC, m_Position.x, m_Position.y, m_Position.x + m_Size.cx, m_Position.y + m_Size.cy, startX, startY, endX, endY ); ::SelectObject( hDC, hOldBrush ); pBrush->DeleteObject(); delete pBrush; } } // If drawing part of the graph segment else { // Calculate graph segment animation angle if ( ( ( m_DrawAnimationAngle >= 0 ) && ( m_DrawAnimationAngle <= (PI/2) ) ) || ( ( m_DrawAnimationAngle >= (3*PI/2) ) && ( m_DrawAnimationAngle <= (2*PI) ) ) ) endX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(m_DrawAnimationAngle) + 0.5); else if ( ( m_DrawAnimationAngle >= (PI/2) ) && ( m_DrawAnimationAngle <= (3*PI/2) ) ) endX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(m_DrawAnimationAngle) + 0.5); if ( ( m_DrawAnimationAngle >= 0 ) && ( m_DrawAnimationAngle <= (PI) ) ) endY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(m_DrawAnimationAngle) + 0.5); else if ( ( m_DrawAnimationAngle >= (PI) ) && ( m_DrawAnimationAngle <= (2*PI) ) ) endY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(m_DrawAnimationAngle) + 0.5); if ( ( m_AnimationStartPoint.x != endX ) || ( m_AnimationStartPoint.y != endY ) ) { // Draw graph segment pBrush = new CBrush(); pBrush->CreateSolidBrush( curr->color ); hOldBrush = ::SelectObject( hDC, pBrush->GetSafeHandle() ); ::Pie( hDC, m_Position.x, m_Position.y, m_Position.x + m_Size.cx, m_Position.y + m_Size.cy, m_AnimationStartPoint.x, m_AnimationStartPoint.y, endX, endY ); ::SelectObject( hDC, hOldBrush ); pBrush->DeleteObject(); delete pBrush; } // Exit animation loop break; } } // If running blend animation if ( m_AnimationType == AT_PIE_BLEND ) { // Check current graph segment index if ( curr->index > m_BlendSegments ) { // Create graph blend DC and bitmap m_hBlendDC = ::CreateCompatibleDC( hDC ); m_hBlendBitmap = ::CreateCompatibleBitmap( hDC, m_FullSize.cx, m_FullSize.cy ); m_hOldBlendBitmap = (HBITMAP)::SelectObject( m_hBlendDC, m_hBlendBitmap ); // Create temporary DC and bitmap HDC tempDC = ::CreateCompatibleDC( hDC ); HBITMAP tempBitmap = ::CreateCompatibleBitmap( hDC, m_FullSize.cx, m_FullSize.cy ); HBITMAP m_tempOldBitmap = (HBITMAP)::SelectObject( tempDC, tempBitmap ); // Clear graph blend and temporary DC ::BitBlt( m_hBlendDC, 0, 0, m_FullSize.cx, m_FullSize.cy, hDC, 0, 0, SRCCOPY ); ::BitBlt( tempDC, 0, 0, m_FullSize.cx, m_FullSize.cy, hDC, 0, 0, SRCCOPY ); // Set graph segment end angle angle = startAngle + (double(curr->percent)/100.0) * (2*PI); // Calculate graph segment end position if ( ( ( angle >= 0 ) && ( angle <= (PI/2) ) ) || ( ( angle >= (3*PI/2) ) && ( angle <= (2*PI) ) ) ) endX = m_Position.x + m_Size.cx/2 + int( (m_Size.cx/2) * cos( angle ) ); else if ( ( angle >= (PI/2) ) && ( angle <= (3*PI/2) ) ) endX = m_Position.x + m_Size.cx/2 + int( (m_Size.cx/2) * cos( angle ) ); if ( ( angle >= 0 ) && ( angle <= (PI) ) ) endY = m_Position.y + m_Size.cy/2 - int( (m_Size.cy/2) * sin( angle ) ); else if ( ( angle >= (PI) ) && ( angle <= (2*PI) ) ) endY = m_Position.y + m_Size.cy/2 - int( (m_Size.cy/2) * sin( angle ) ); // Draw graph segment pBrush = new CBrush(); pBrush->CreateSolidBrush( curr->color ); hOldBrush = ::SelectObject( m_hBlendDC, pBrush->GetSafeHandle() ); ::Pie( m_hBlendDC, m_Position.x, m_Position.y, m_Position.x + m_Size.cx, m_Position.y + m_Size.cy, m_AnimationStartPoint.x, m_AnimationStartPoint.y, endX, endY ); ::SelectObject( m_hBlendDC, hOldBrush ); pBrush->DeleteObject(); delete pBrush; // Do alpha blending on temporary DC BLENDFUNCTION bf; bf.BlendOp = AC_SRC_OVER; bf.BlendFlags = 0; bf.AlphaFormat = 0; bf.SourceConstantAlpha = BYTE((double(m_AnimationPercent)/100.0)*255); ::AlphaBlend( tempDC, m_Position.x, m_Position.y, m_Size.cx, m_Size.cy, m_hBlendDC, m_Position.x, m_Position.y, m_Size.cx, m_Size.cy, bf ); // Do transparent bliting on destination DC ::TransparentBlt( hDC, m_Position.x, m_Position.y, m_Size.cx, m_Size.cy, tempDC, m_Position.x, m_Position.y, m_Size.cx, m_Size.cy, ::GetPixel(tempDC,m_Position.x,m_Position.y) ); // Draw finished graph segments double angle_total = 0.0; _2DPieGraphSegments *tmp_seg = m_Segments; while ( tmp_seg->index-1 < m_BlendSegments ) { // Set graph segment start angle angle = angle_total; // Calculate graph segment start position if ( ( ( angle >= 0 ) && ( angle <= (PI/2) ) ) || ( ( angle >= (3*PI/2) ) && ( angle <= (2*PI) ) ) ) startX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(angle) + 0.5); else if ( ( angle >= (PI/2) ) && ( angle <= (3*PI/2) ) ) startX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(angle) + 0.5); if ( ( angle >= 0 ) && ( angle <= (PI) ) ) startY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(angle) + 0.5); else if ( ( angle >= (PI) ) && ( angle <= (2*PI) ) ) startY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(angle) + 0.5); // Set graph segment end angle angle = angle_total + (double(tmp_seg->percent)/100.0) * (2*PI); // Calculate graph segment end position if ( ( ( angle >= 0 ) && ( angle <= (PI/2) ) ) || ( ( angle >= (3*PI/2) ) && ( angle <= (2*PI) ) ) ) endX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(angle) + 0.5); else if ( ( angle >= (PI/2) ) && ( angle <= (3*PI/2) ) ) endX = m_Position.x + int(double(m_Size.cx)/2.0 + (double(m_Size.cx)/2.0) * cos(angle) + 0.5); if ( ( angle >= 0 ) && ( angle <= (PI) ) ) endY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(angle) + 0.5); else if ( ( angle >= (PI) ) && ( angle <= (2*PI) ) ) endY = m_Position.y + int(double(m_Size.cy)/2.0 - (double(m_Size.cy)/2.0) * sin(angle) + 0.5); // Draw graph segment pBrush = new CBrush(); pBrush->CreateSolidBrush( tmp_seg->color ); hOldBrush = ::SelectObject( hDC, pBrush->GetSafeHandle() ); ::Pie( hDC, m_Position.x, m_Position.y, m_Position.x + m_Size.cx, m_Position.y + m_Size.cy, startX, startY, endX, endY ); ::SelectObject( hDC, hOldBrush ); pBrush->DeleteObject(); delete pBrush; // Calculate start angle angle_total += (double(tmp_seg->percent)/100.0) * (2*PI); // Get next segment tmp_seg = tmp_seg->next; } // Delete graph blend DC and bitmap ::SelectObject( m_hBlendDC, m_hOldBlendBitmap ); ::DeleteDC( m_hBlendDC ); ::DeleteObject( m_hBlendBitmap ); // Delete temporary DC and bitmap ::SelectObject( tempDC, m_tempOldBitmap ); ::DeleteDC( tempDC ); ::DeleteObject( tempBitmap ); // Set next graph segment start point if ( m_AnimationPercent >= 100 ) m_AnimationStartPoint = CPoint( endX, endY ); // Exit animation loop break; } } } // If no animation running else { // Set graph segment end angle angle = startAngle + (double(curr->percent)/100.0) * (2*PI); // Calculate graph segment end position if ( ( ( angle >= 0 ) && ( angle <= (PI/2) ) ) || ( ( angle >= (3*PI/2) ) && ( angle <= (2*PI) ) ) ) endX = m_Position.x + m_Size.cx/2 + int( (m_Size.cx/2) * cos( angle ) ); else if ( ( angle >= (PI/2) ) && ( angle <= (3*PI/2) ) ) endX = m_Position.x + m_Size.cx/2 + int( (m_Size.cx/2) * cos( angle ) ); if ( ( angle >= 0 ) && ( angle <= (PI) ) ) endY = m_Position.y + m_Size.cy/2 - int( (m_Size.cy/2) * sin( angle ) ); else if ( ( angle >= (PI) ) && ( angle <= (2*PI) ) ) endY = m_Position.y + m_Size.cy/2 - int( (m_Size.cy/2) * sin( angle ) ); // Draw graph segment pBrush = new CBrush(); pBrush->CreateSolidBrush( curr->color ); hOldBrush = ::SelectObject( hDC, pBrush->GetSafeHandle() ); ::Pie( hDC, m_Position.x, m_Position.y, m_Position.x + m_Size.cx, m_Position.y + m_Size.cy, startX, startY, endX, endY ); ::SelectObject( hDC, hOldBrush ); pBrush->DeleteObject(); delete pBrush; // Set next graph segment start point startX = endX; startY = endY; } // Calculate start angle startAngle += (double(curr->percent)/100.0) * (2*PI); // Next graph segment curr = curr->next; } } void C2DPieGraph::AddSegment(int s_percent, COLORREF s_color, CString s_text) { // Get total percent int percentTotal = 0; _2DPieGraphSegments* cs = m_Segments; while ( cs != NULL ) { percentTotal += cs->percent; cs = cs->next; } // Set total percent m_DrawTotalPercent = percentTotal; // Check percent bounds if ( s_percent < 0 ) s_percent = 0; else if ( s_percent > 100 ) s_percent = 100; else if ( ( percentTotal + s_percent ) > 100 ) s_percent = 100 - percentTotal; // Check percent left if ( s_percent > 0 ) { m_DrawTotalPercent += s_percent; // Increment segments number m_SegmentsNumber++; // Create new graph segment _2DPieGraphSegments* newSegment = new _2DPieGraphSegments; newSegment->percent = s_percent; newSegment->color = s_color; newSegment->index = m_SegmentsNumber; newSegment->text = s_text; newSegment->next = NULL; // Add new segment to the graph _2DPieGraphSegments* curr = m_Segments; if ( curr == NULL ) m_Segments = newSegment; else { while ( curr->next != NULL ) curr = curr->next; curr->next = newSegment; } } } void C2DPieGraph::DeleteSegment(int s_index) { // Check index bounds if ( ( s_index < 1 ) || ( s_index > m_SegmentsNumber ) ) AfxMessageBox( _T("Index is out of bounds..."), MB_OK, NULL ); else { _2DPieGraphSegments *curr, *prev; curr = m_Segments; prev = NULL; // Delete first graph segment if ( curr->index == s_index ) { if ( m_SegmentsNumber == 1 ) { // Set segment parameters m_Segments = NULL; m_SegmentsNumber = 0; } else { // Decrement segments number m_SegmentsNumber--; } m_Segments = curr->next; delete curr; } // Delete other graph segment else { while ( curr->index < s_index ) { prev = curr; curr = curr->next; } prev->next = curr->next; delete curr; // Decrement segments number m_SegmentsNumber--; } // Get total percent int percentTotal = 0; _2DPieGraphSegments* cs = m_Segments; int ind = 1; while ( cs != NULL ) { // Reindex graph segments cs->index = ind; percentTotal += cs->percent; cs = cs->next; ind++; } // Set total percent m_DrawTotalPercent = percentTotal; } } void C2DPieGraph::ClearGraph() { _2DPieGraphSegments *curr, *prev; // Delete all graph segments curr = m_Segments; while ( curr != NULL ) { prev = curr; curr = curr->next; delete prev; } // Set graph segment parameters m_Segments = NULL; m_SegmentsNumber = 0; } void C2DPieGraph::SetGraphAnimation(BOOL g_animation, int a_type) { // Set graph animation parameters m_Animation = g_animation; m_AnimationType = a_type; m_AnimationPercent = 0; m_AnimationStartPoint = CPoint( m_Position.x + m_Size.cx, m_Position.y + m_Size.cy/2 ); // Check graph animation flag if ( m_Animation == TRUE ) { // If setting draw graph animation type if ( m_AnimationType == AT_PIE_DRAW ) { m_DrawAnimationAngle = 0.0; m_DrawPercentCompleted = 0; } // If setting blend graph animation type else if ( m_AnimationType == AT_PIE_BLEND ) { // Set total blended segments m_BlendSegments = 0; } } } BOOL C2DPieGraph::GetGraphAnimation() { return m_Animation; } int C2DPieGraph::GetGraphAnimationPercent() { return m_AnimationPercent; } void C2DPieGraph::BuildGraphLegend(HDC hDC) { _2DPieGraphSegments *curr = m_Segments; // Select legend font HGDIOBJ hOldFont = ::SelectObject( hDC, m_LegendFont->GetSafeHandle() ); // Get text size CSize ts; ::GetTextExtentPoint32( hDC, _T("ABCDEFGHIJKLMNOPQRSTUVWXYZ"), 26, &ts ); int offset = (m_Size.cy - int(m_SegmentsNumber*ts.cy))/2; CPoint start = CPoint( m_Position.x + int(m_Size.cx*1.15), m_Position.y + int(m_Size.cy*0.014) + offset ); CSize sz; CString str = ""; CRect rect; CBrush* rBrush = NULL; // Draw graph legend CBrush bgBrush( m_LegendBackgroundColor ); HBRUSH hOldBrush = (HBRUSH)::SelectObject( hDC, bgBrush.GetSafeHandle() ); ::Rectangle( hDC, m_Position.x + int(m_Size.cx*1.1), m_Position.y + offset, m_Position.x + int(m_Size.cx*1.75), m_Position.y + int((m_SegmentsNumber+0.5)*ts.cy + offset) ); ::SelectObject( hDC, hOldBrush ); bgBrush.DeleteObject(); COLORREF oldTextColor = ::SetTextColor( hDC, m_LegendTextColor ); while ( curr != NULL ) { // Draw segment color field rect = CRect( start.x, start.y + int(m_Size.cy*0.05)/2, start.x + int(m_Size.cx*0.1), start.y + int(m_Size.cy*0.075) ); rBrush = new CBrush(); rBrush->CreateSolidBrush( curr->color ); ::FillRect( hDC, rect, (HBRUSH)rBrush->GetSafeHandle() ); rBrush->DeleteObject(); delete rBrush; // Draw segment text str.Format( _T("(%d%s) %s"), curr->percent, _T("%"), curr->text ); ::SetBkMode( hDC, TRANSPARENT ); ::TextOut( hDC, start.x + rect.Width() + int(m_Size.cx*0.01), start.y, str, str.GetLength() ); ::SetBkMode( hDC, OPAQUE ); // Recalculate next text position ::GetTextExtentPoint32( hDC, curr->text, curr->text.GetLength(), &sz ); start.y += sz.cy; // Get next graph segment curr = curr->next; } ::SetTextColor( hDC, oldTextColor ); // Select old font ::SelectObject( hDC, hOldFont ); } void C2DPieGraph::UpdateAnimation() { if ( m_Animation == TRUE ) { // If running draw animation if ( m_AnimationType == AT_PIE_DRAW ) { // Set total angle double totalAngle = (double(m_DrawTotalPercent)/100.0) * (2*PI); // Check completed animation if ( ( m_DrawPercentCompleted > m_DrawTotalPercent ) || ( m_AnimationPercent > 100 ) ) { m_DrawPercentCompleted = 0; m_AnimationPercent = 0; m_AnimationStartPoint = CPoint( m_Position.x + m_Size.cx, m_Position.y + m_Size.cy/2 ); } // Increment animation percent m_AnimationPercent++; // Set animation angle m_DrawAnimationAngle = totalAngle * double(m_AnimationPercent)/100.0; } // If running blend animation else if ( m_AnimationType == AT_PIE_BLEND ) { // Check completed animation percent if ( m_AnimationPercent >= 100 ) { m_AnimationPercent = 0; // Increment completed graph segments m_BlendSegments++; // Check completed graph segments if ( m_BlendSegments >= m_SegmentsNumber ) { m_BlendSegments = 0; m_AnimationStartPoint = CPoint( m_Position.x + m_Size.cx, m_Position.y + m_Size.cy/2 ); } } // Increment animation percent m_AnimationPercent += 2; } } } void C2DPieGraph::SetGraphBkColor(COLORREF g_bkColor) { // Set graph background color m_GraphBkColor = g_bkColor; } void C2DPieGraph::UpdateSegment(int s_index, int s_percent, COLORREF s_color, CString s_text) { // Check index bounds if ( ( s_index < 1 ) || ( s_index > m_SegmentsNumber ) ) AfxMessageBox( _T("Index is out of bounds..."), MB_OK, NULL ); // Check percent else if ( s_percent <= 0 ) AfxMessageBox( _T("Percent is not valid..."), MB_OK, NULL ); else { _2DPieGraphSegments *curr = m_Segments; // Find graph segment while ( curr->index != s_index ) curr = curr->next; // Update segment data curr->percent = s_percent; curr->color = s_color; curr->text = s_text; // Get total percent int percentTotal = 0; _2DPieGraphSegments* cs = m_Segments; int ind = 1; while ( cs != NULL ) { percentTotal += cs->percent; cs = cs->next; ind++; } // Set total percent m_DrawTotalPercent = percentTotal; // Update graph animation parameters m_AnimationPercent = 0; m_AnimationStartPoint = CPoint( m_Position.x + m_Size.cx, m_Position.y + m_Size.cy/2 ); // Check graph animation flag if ( m_Animation == TRUE ) { // If setting draw graph animation type if ( m_AnimationType == AT_PIE_DRAW ) { m_DrawAnimationAngle = 0.0; m_DrawPercentCompleted = 0; } // If setting blend graph animation type else if ( m_AnimationType == AT_PIE_BLEND ) { // Set total blended segments m_BlendSegments = 0; } } } } void C2DPieGraph::SetGraphSize(CSize g_size) { // Set new graph size m_Size = g_size; // Set new graph legend font size m_LegendFont->DeleteObject(); delete m_LegendFont; m_LegendFont = new CFont(); m_LegendFont->CreateFont( int(m_Size.cy*0.08), int(m_Size.cx*0.035), 0, 0, FW_NORMAL, FALSE, FALSE, FALSE, DEFAULT_CHARSET, OUT_CHARACTER_PRECIS, CLIP_CHARACTER_PRECIS, PROOF_QUALITY, DEFAULT_PITCH | FF_DONTCARE, _T("Times New Roman") ); } void C2DPieGraph::SetGraphPosition(CPoint g_position) { // Set new graph position m_Position = g_position; } void C2DPieGraph::SetFullSize(CSize full_size) { // Set full size m_FullSize = full_size; } void C2DPieGraph::SetLegendBackgroundColor(COLORREF l_bgcolor) { // Set legend background color m_LegendBackgroundColor = l_bgcolor; } COLORREF C2DPieGraph::GetLegendBackgroundColor() { return m_LegendBackgroundColor; } void C2DPieGraph::SetLegendTextColor(COLORREF t_color) { // Set legend text color m_LegendTextColor = t_color; } COLORREF C2DPieGraph::GetLegendTextColor() { return m_LegendTextColor; }
[ "daniel.godson@gmail.com" ]
daniel.godson@gmail.com
2faa825f7a32691fa9c7082aa4574d13d8aa6175
3051bd4bc0b7f3dace598880caf3364690688bc9
/plugins/MacVST/Ditherbox/source/DitherboxProc.cpp
4115687873088b35974a8888861ed9978ed0a7f2
[ "MIT" ]
permissive
Atavic/airwindows
aa6802409eb9c7254e405874a267af700cb6ba0d
ac8d974fb5bfa349af37412aa5e1fe2aeea1a8f6
refs/heads/master
2020-03-28T08:38:49.668758
2018-09-09T01:07:53
2018-09-09T01:07:53
147,978,977
1
0
MIT
2018-09-09T00:02:49
2018-09-09T00:02:49
null
UTF-8
C++
false
false
81,998
cpp
/* ======================================== * Ditherbox - Ditherbox.h * Copyright (c) 2016 airwindows, All rights reserved * ======================================== */ #ifndef __Ditherbox_H #include "Ditherbox.h" #endif void Ditherbox::processReplacing(float **inputs, float **outputs, VstInt32 sampleFrames) { float* in1 = inputs[0]; float* in2 = inputs[1]; float* out1 = outputs[0]; float* out2 = outputs[1]; int dtype = (int)(A * 24.999)+1; // +1 for Reaper bug workaround long double overallscale = 1.0; overallscale /= 44100.0; overallscale *= getSampleRate(); long double iirAmount = 2250/44100.0; long double gaintarget = 1.42; long double gain; iirAmount /= overallscale; long double altAmount = 1.0 - iirAmount; long double outputSampleL; long double outputSampleR; long double silhouette; long double smoother; long double bridgerectifier; long double benfordize; int hotbinA; int hotbinB; long double totalA; long double totalB; long double contingentRnd; long double absSample; long double contingent; long double randyConstant = 1.61803398874989484820458683436563811772030917980576; long double omegaConstant = 0.56714329040978387299996866221035554975381578718651; long double expConstant = 0.06598803584531253707679018759684642493857704825279; long double trim = 2.302585092994045684017991; //natural logarithm of 10 bool highRes = false; bool dithering = true; if (dtype > 11){highRes = true; dtype -= 11;} if (dtype > 11){dithering = false; highRes = false;} //follow up by switching high res back off for the monitoring while (--sampleFrames >= 0) { long double inputSampleL = *in1; long double inputSampleR = *in2; if (inputSampleL<1.2e-38 && -inputSampleL<1.2e-38) { static int noisesource = 0; //this declares a variable before anything else is compiled. It won't keep assigning //it to 0 for every sample, it's as if the declaration doesn't exist in this context, //but it lets me add this denormalization fix in a single place rather than updating //it in three different locations. The variable isn't thread-safe but this is only //a random seed and we can share it with whatever. noisesource = noisesource % 1700021; noisesource++; int residue = noisesource * noisesource; residue = residue % 170003; residue *= residue; residue = residue % 17011; residue *= residue; residue = residue % 1709; residue *= residue; residue = residue % 173; residue *= residue; residue = residue % 17; double applyresidue = residue; applyresidue *= 0.00000001; applyresidue *= 0.00000001; inputSampleL = applyresidue; } if (inputSampleR<1.2e-38 && -inputSampleR<1.2e-38) { static int noisesource = 0; noisesource = noisesource % 1700021; noisesource++; int residue = noisesource * noisesource; residue = residue % 170003; residue *= residue; residue = residue % 17011; residue *= residue; residue = residue % 1709; residue *= residue; residue = residue % 173; residue *= residue; residue = residue % 17; double applyresidue = residue; applyresidue *= 0.00000001; applyresidue *= 0.00000001; inputSampleR = applyresidue; //this denormalization routine produces a white noise at -300 dB which the noise //shaping will interact with to produce a bipolar output, but the noise is actually //all positive. That should stop any variables from going denormal, and the routine //only kicks in if digital black is input. As a final touch, if you save to 24-bit //the silence will return to being digital black again. } float drySampleL = inputSampleL; float drySampleR = inputSampleR; if (dtype == 8) {inputSampleL -= noiseShapingL; inputSampleR -= noiseShapingR;} if (dithering) {inputSampleL *= 32768.0; inputSampleR *= 32768.0;} //denormalizing as way of controlling insane detail boosting if (highRes) {inputSampleL *= 256.0; inputSampleR *= 256.0;} //256 for 16/24 version switch (dtype) { case 1: inputSampleL = floor(inputSampleL); inputSampleR = floor(inputSampleR); //truncate break; case 2: inputSampleL += (rand()/(double)RAND_MAX); inputSampleL -= 0.5; inputSampleL = floor(inputSampleL); inputSampleR += (rand()/(double)RAND_MAX); inputSampleR -= 0.5; inputSampleR = floor(inputSampleR); //flat dither break; case 3: inputSampleL += (rand()/(double)RAND_MAX); inputSampleL += (rand()/(double)RAND_MAX); inputSampleL -= 1.0; inputSampleL = floor(inputSampleL); inputSampleR += (rand()/(double)RAND_MAX); inputSampleR += (rand()/(double)RAND_MAX); inputSampleR -= 1.0; inputSampleR = floor(inputSampleR); //TPDF dither break; case 4: currentDitherL = (rand()/(double)RAND_MAX); inputSampleL += currentDitherL; inputSampleL -= lastSampleL; inputSampleL = floor(inputSampleL); lastSampleL = currentDitherL; currentDitherR = (rand()/(double)RAND_MAX); inputSampleR += currentDitherR; inputSampleR -= lastSampleR; inputSampleR = floor(inputSampleR); lastSampleR = currentDitherR; //Paul dither break; case 5: nsL[9] = nsL[8]; nsL[8] = nsL[7]; nsL[7] = nsL[6]; nsL[6] = nsL[5]; nsL[5] = nsL[4]; nsL[4] = nsL[3]; nsL[3] = nsL[2]; nsL[2] = nsL[1]; nsL[1] = nsL[0]; nsL[0] = (rand()/(double)RAND_MAX); currentDitherL = (nsL[0] * 0.061); currentDitherL -= (nsL[1] * 0.11); currentDitherL += (nsL[8] * 0.126); currentDitherL -= (nsL[7] * 0.23); currentDitherL += (nsL[2] * 0.25); currentDitherL -= (nsL[3] * 0.43); currentDitherL += (nsL[6] * 0.5); currentDitherL -= nsL[5]; currentDitherL += nsL[4]; //this sounds different from doing it in order of sample position //cumulative tiny errors seem to build up even at this buss depth //considerably more pronounced at 32 bit float. //Therefore we add the most significant components LAST. //trying to keep values on like exponents of the floating point value. inputSampleL += currentDitherL; inputSampleL = floor(inputSampleL); //done with L nsR[9] = nsR[8]; nsR[8] = nsR[7]; nsR[7] = nsR[6]; nsR[6] = nsR[5]; nsR[5] = nsR[4]; nsR[4] = nsR[3]; nsR[3] = nsR[2]; nsR[2] = nsR[1]; nsR[1] = nsR[0]; nsR[0] = (rand()/(double)RAND_MAX); currentDitherR = (nsR[0] * 0.061); currentDitherR -= (nsR[1] * 0.11); currentDitherR += (nsR[8] * 0.126); currentDitherR -= (nsR[7] * 0.23); currentDitherR += (nsR[2] * 0.25); currentDitherR -= (nsR[3] * 0.43); currentDitherR += (nsR[6] * 0.5); currentDitherR -= nsR[5]; currentDitherR += nsR[4]; //this sounds different from doing it in order of sample position //cumulative tiny errors seem to build up even at this buss depth //considerably more pronounced at 32 bit float. //Therefore we add the most significant components LAST. //trying to keep values on like exponents of the floating point value. inputSampleR += currentDitherR; inputSampleR = floor(inputSampleR); //done with R //DoublePaul dither break; case 6: currentDitherL = (rand()/(double)RAND_MAX); currentDitherR = (rand()/(double)RAND_MAX); inputSampleL += currentDitherL; inputSampleR += currentDitherR; inputSampleL -= nsL[4]; inputSampleR -= nsR[4]; inputSampleL = floor(inputSampleL); inputSampleR = floor(inputSampleR); nsL[4] = nsL[3]; nsL[3] = nsL[2]; nsL[2] = nsL[1]; nsL[1] = currentDitherL; nsR[4] = nsR[3]; nsR[3] = nsR[2]; nsR[2] = nsR[1]; nsR[1] = currentDitherR; //Tape dither break; case 7: Position += 1; //Note- uses integer overflow as a 'mod' operator hotbinA = Position * Position; hotbinA = hotbinA % 170003; //% is C++ mod operator hotbinA *= hotbinA; hotbinA = hotbinA % 17011; //% is C++ mod operator hotbinA *= hotbinA; hotbinA = hotbinA % 1709; //% is C++ mod operator hotbinA *= hotbinA; hotbinA = hotbinA % 173; //% is C++ mod operator hotbinA *= hotbinA; hotbinA = hotbinA % 17; hotbinA *= 0.0635; if (flip) hotbinA = -hotbinA; inputSampleL += hotbinA; inputSampleR += hotbinA; inputSampleL = floor(inputSampleL); inputSampleR = floor(inputSampleR); //Quadratic dither break; case 8: absSample = ((rand()/(double)RAND_MAX) - 0.5); nsL[0] += absSample; nsL[0] /= 2; absSample -= nsL[0]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[1] += absSample; nsL[1] /= 2; absSample -= nsL[1]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[2] += absSample; nsL[2] /= 2; absSample -= nsL[2]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[3] += absSample; nsL[3] /= 2; absSample -= nsL[3]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[4] += absSample; nsL[4] /= 2; absSample -= nsL[4]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[5] += absSample; nsL[5] /= 2; absSample -= nsL[5]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[6] += absSample; nsL[6] /= 2; absSample -= nsL[6]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[7] += absSample; nsL[7] /= 2; absSample -= nsL[7]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[8] += absSample; nsL[8] /= 2; absSample -= nsL[8]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[9] += absSample; nsL[9] /= 2; absSample -= nsL[9]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[10] += absSample; nsL[10] /= 2; absSample -= nsL[10]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[11] += absSample; nsL[11] /= 2; absSample -= nsL[11]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[12] += absSample; nsL[12] /= 2; absSample -= nsL[12]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[13] += absSample; nsL[13] /= 2; absSample -= nsL[13]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[14] += absSample; nsL[14] /= 2; absSample -= nsL[14]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[15] += absSample; nsL[15] /= 2; absSample -= nsL[15]; //install noise and then shape it absSample += inputSampleL; if (NSOddL > 0) NSOddL -= 0.97; if (NSOddL < 0) NSOddL += 0.97; NSOddL -= (NSOddL * NSOddL * NSOddL * 0.475); NSOddL += prevL; absSample += (NSOddL*0.475); prevL = floor(absSample) - inputSampleL; inputSampleL = floor(absSample); //TenNines dither L absSample = ((rand()/(double)RAND_MAX) - 0.5); nsR[0] += absSample; nsR[0] /= 2; absSample -= nsR[0]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[1] += absSample; nsR[1] /= 2; absSample -= nsR[1]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[2] += absSample; nsR[2] /= 2; absSample -= nsR[2]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[3] += absSample; nsR[3] /= 2; absSample -= nsR[3]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[4] += absSample; nsR[4] /= 2; absSample -= nsR[4]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[5] += absSample; nsR[5] /= 2; absSample -= nsR[5]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[6] += absSample; nsR[6] /= 2; absSample -= nsR[6]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[7] += absSample; nsR[7] /= 2; absSample -= nsR[7]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[8] += absSample; nsR[8] /= 2; absSample -= nsR[8]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[9] += absSample; nsR[9] /= 2; absSample -= nsR[9]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[10] += absSample; nsR[10] /= 2; absSample -= nsR[10]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[11] += absSample; nsR[11] /= 2; absSample -= nsR[11]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[12] += absSample; nsR[12] /= 2; absSample -= nsR[12]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[13] += absSample; nsR[13] /= 2; absSample -= nsR[13]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[14] += absSample; nsR[14] /= 2; absSample -= nsR[14]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[15] += absSample; nsR[15] /= 2; absSample -= nsR[15]; //install noise and then shape it absSample += inputSampleR; if (NSOddR > 0) NSOddR -= 0.97; if (NSOddR < 0) NSOddR += 0.97; NSOddR -= (NSOddR * NSOddR * NSOddR * 0.475); NSOddR += prevR; absSample += (NSOddR*0.475); prevR = floor(absSample) - inputSampleR; inputSampleR = floor(absSample); //TenNines dither R break; case 9: if (inputSampleL > 0) inputSampleL += 0.383; if (inputSampleL < 0) inputSampleL -= 0.383; if (inputSampleR > 0) inputSampleR += 0.383; if (inputSampleR < 0) inputSampleR -= 0.383; //adjusting to permit more information drug outta the noisefloor contingentRnd = (((rand()/(double)RAND_MAX)+(rand()/(double)RAND_MAX))-1.0) * randyConstant; //produce TPDF dist, scale contingentRnd -= contingentErrL*omegaConstant; //include err absSample = fabs(inputSampleL); contingentErrL = absSample - floor(absSample); //get next err contingent = contingentErrL * 2.0; //scale of quantization levels if (contingent > 1.0) contingent = ((-contingent+2.0)*omegaConstant) + expConstant; else contingent = (contingent * omegaConstant) + expConstant; //zero is next to a quantization level, one is exactly between them if (flip) contingentRnd = (contingentRnd * (1.0-contingent)) + contingent + 0.5; else contingentRnd = (contingentRnd * (1.0-contingent)) - contingent + 0.5; inputSampleL += (contingentRnd * contingent); //Contingent Dither inputSampleL = floor(inputSampleL); contingentRnd = (((rand()/(double)RAND_MAX)+(rand()/(double)RAND_MAX))-1.0) * randyConstant; //produce TPDF dist, scale contingentRnd -= contingentErrR*omegaConstant; //include err absSample = fabs(inputSampleR); contingentErrR = absSample - floor(absSample); //get next err contingent = contingentErrR * 2.0; //scale of quantization levels if (contingent > 1.0) contingent = ((-contingent+2.0)*omegaConstant) + expConstant; else contingent = (contingent * omegaConstant) + expConstant; //zero is next to a quantization level, one is exactly between them if (flip) contingentRnd = (contingentRnd * (1.0-contingent)) + contingent + 0.5; else contingentRnd = (contingentRnd * (1.0-contingent)) - contingent + 0.5; inputSampleR += (contingentRnd * contingent); //Contingent Dither inputSampleR = floor(inputSampleR); //note: this does not dither for values exactly the same as 16 bit values- //which forces the dither to gate at 0.0. It goes to digital black, //and does a teeny parallel-compression thing when almost at digital black. break; case 10: //this one is the original Naturalize if (inputSampleL > 0) inputSampleL += (0.3333333333); if (inputSampleL < 0) inputSampleL -= (0.3333333333); inputSampleL += (rand()/(double)RAND_MAX)*0.6666666666; if (inputSampleR > 0) inputSampleR += (0.3333333333); if (inputSampleR < 0) inputSampleR -= (0.3333333333); inputSampleR += (rand()/(double)RAND_MAX)*0.6666666666; //begin L benfordize = floor(inputSampleL); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinA = floor(benfordize); //hotbin becomes the Benford bin value for this number floored totalA = 0; if ((hotbinA > 0) && (hotbinA < 10)) { bynL[hotbinA] += 1; totalA += (301-bynL[1]); totalA += (176-bynL[2]); totalA += (125-bynL[3]); totalA += (97-bynL[4]); totalA += (79-bynL[5]); totalA += (67-bynL[6]); totalA += (58-bynL[7]); totalA += (51-bynL[8]); totalA += (46-bynL[9]); bynL[hotbinA] -= 1; } else {hotbinA = 10;} //produce total number- smaller is closer to Benford real benfordize = ceil(inputSampleL); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinB = floor(benfordize); //hotbin becomes the Benford bin value for this number ceiled totalB = 0; if ((hotbinB > 0) && (hotbinB < 10)) { bynL[hotbinB] += 1; totalB += (301-bynL[1]); totalB += (176-bynL[2]); totalB += (125-bynL[3]); totalB += (97-bynL[4]); totalB += (79-bynL[5]); totalB += (67-bynL[6]); totalB += (58-bynL[7]); totalB += (51-bynL[8]); totalB += (46-bynL[9]); bynL[hotbinB] -= 1; } else {hotbinB = 10;} //produce total number- smaller is closer to Benford real if (totalA < totalB) { bynL[hotbinA] += 1; inputSampleL = floor(inputSampleL); } else { bynL[hotbinB] += 1; inputSampleL = ceil(inputSampleL); } //assign the relevant one to the delay line //and floor/ceil signal accordingly totalA = bynL[1] + bynL[2] + bynL[3] + bynL[4] + bynL[5] + bynL[6] + bynL[7] + bynL[8] + bynL[9]; totalA /= 1000; if (totalA = 0) totalA = 1; bynL[1] /= totalA; bynL[2] /= totalA; bynL[3] /= totalA; bynL[4] /= totalA; bynL[5] /= totalA; bynL[6] /= totalA; bynL[7] /= totalA; bynL[8] /= totalA; bynL[9] /= totalA; bynL[10] /= 2; //catchall for garbage data //end L //begin R benfordize = floor(inputSampleR); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinA = floor(benfordize); //hotbin becomes the Benford bin value for this number floored totalA = 0; if ((hotbinA > 0) && (hotbinA < 10)) { bynR[hotbinA] += 1; totalA += (301-bynR[1]); totalA += (176-bynR[2]); totalA += (125-bynR[3]); totalA += (97-bynR[4]); totalA += (79-bynR[5]); totalA += (67-bynR[6]); totalA += (58-bynR[7]); totalA += (51-bynR[8]); totalA += (46-bynR[9]); bynR[hotbinA] -= 1; } else {hotbinA = 10;} //produce total number- smaller is closer to Benford real benfordize = ceil(inputSampleR); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinB = floor(benfordize); //hotbin becomes the Benford bin value for this number ceiled totalB = 0; if ((hotbinB > 0) && (hotbinB < 10)) { bynR[hotbinB] += 1; totalB += (301-bynR[1]); totalB += (176-bynR[2]); totalB += (125-bynR[3]); totalB += (97-bynR[4]); totalB += (79-bynR[5]); totalB += (67-bynR[6]); totalB += (58-bynR[7]); totalB += (51-bynR[8]); totalB += (46-bynR[9]); bynR[hotbinB] -= 1; } else {hotbinB = 10;} //produce total number- smaller is closer to Benford real if (totalA < totalB) { bynR[hotbinA] += 1; inputSampleR = floor(inputSampleR); } else { bynR[hotbinB] += 1; inputSampleR = ceil(inputSampleR); } //assign the relevant one to the delay line //and floor/ceil signal accordingly totalA = bynR[1] + bynR[2] + bynR[3] + bynR[4] + bynR[5] + bynR[6] + bynR[7] + bynR[8] + bynR[9]; totalA /= 1000; if (totalA = 0) totalA = 1; bynR[1] /= totalA; bynR[2] /= totalA; bynR[3] /= totalA; bynR[4] /= totalA; bynR[5] /= totalA; bynR[6] /= totalA; bynR[7] /= totalA; bynR[8] /= totalA; bynR[9] /= totalA; bynR[10] /= 2; //catchall for garbage data //end R break; case 11: //this one is the Not Just Another Dither //begin L benfordize = floor(inputSampleL); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinA = floor(benfordize); //hotbin becomes the Benford bin value for this number floored totalA = 0; if ((hotbinA > 0) && (hotbinA < 10)) { bynL[hotbinA] += 1; totalA += (301-bynL[1]); totalA += (176-bynL[2]); totalA += (125-bynL[3]); totalA += (97-bynL[4]); totalA += (79-bynL[5]); totalA += (67-bynL[6]); totalA += (58-bynL[7]); totalA += (51-bynL[8]); totalA += (46-bynL[9]); bynL[hotbinA] -= 1; } else {hotbinA = 10;} //produce total number- smaller is closer to Benford real benfordize = ceil(inputSampleL); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinB = floor(benfordize); //hotbin becomes the Benford bin value for this number ceiled totalB = 0; if ((hotbinB > 0) && (hotbinB < 10)) { bynL[hotbinB] += 1; totalB += (301-bynL[1]); totalB += (176-bynL[2]); totalB += (125-bynL[3]); totalB += (97-bynL[4]); totalB += (79-bynL[5]); totalB += (67-bynL[6]); totalB += (58-bynL[7]); totalB += (51-bynL[8]); totalB += (46-bynL[9]); bynL[hotbinB] -= 1; } else {hotbinB = 10;} //produce total number- smaller is closer to Benford real if (totalA < totalB) { bynL[hotbinA] += 1; inputSampleL = floor(inputSampleL); } else { bynL[hotbinB] += 1; inputSampleL = ceil(inputSampleL); } //assign the relevant one to the delay line //and floor/ceil signal accordingly totalA = bynL[1] + bynL[2] + bynL[3] + bynL[4] + bynL[5] + bynL[6] + bynL[7] + bynL[8] + bynL[9]; totalA /= 1000; if (totalA = 0) totalA = 1; bynL[1] /= totalA; bynL[2] /= totalA; bynL[3] /= totalA; bynL[4] /= totalA; bynL[5] /= totalA; bynL[6] /= totalA; bynL[7] /= totalA; bynL[8] /= totalA; bynL[9] /= totalA; bynL[10] /= 2; //catchall for garbage data //end L //begin R benfordize = floor(inputSampleR); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinA = floor(benfordize); //hotbin becomes the Benford bin value for this number floored totalA = 0; if ((hotbinA > 0) && (hotbinA < 10)) { bynR[hotbinA] += 1; totalA += (301-bynR[1]); totalA += (176-bynR[2]); totalA += (125-bynR[3]); totalA += (97-bynR[4]); totalA += (79-bynR[5]); totalA += (67-bynR[6]); totalA += (58-bynR[7]); totalA += (51-bynR[8]); totalA += (46-bynR[9]); bynR[hotbinA] -= 1; } else {hotbinA = 10;} //produce total number- smaller is closer to Benford real benfordize = ceil(inputSampleR); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinB = floor(benfordize); //hotbin becomes the Benford bin value for this number ceiled totalB = 0; if ((hotbinB > 0) && (hotbinB < 10)) { bynR[hotbinB] += 1; totalB += (301-bynR[1]); totalB += (176-bynR[2]); totalB += (125-bynR[3]); totalB += (97-bynR[4]); totalB += (79-bynR[5]); totalB += (67-bynR[6]); totalB += (58-bynR[7]); totalB += (51-bynR[8]); totalB += (46-bynR[9]); bynR[hotbinB] -= 1; } else {hotbinB = 10;} //produce total number- smaller is closer to Benford real if (totalA < totalB) { bynR[hotbinA] += 1; inputSampleR = floor(inputSampleR); } else { bynR[hotbinB] += 1; inputSampleR = ceil(inputSampleR); } //assign the relevant one to the delay line //and floor/ceil signal accordingly totalA = bynR[1] + bynR[2] + bynR[3] + bynR[4] + bynR[5] + bynR[6] + bynR[7] + bynR[8] + bynR[9]; totalA /= 1000; if (totalA = 0) totalA = 1; bynR[1] /= totalA; bynR[2] /= totalA; bynR[3] /= totalA; bynR[4] /= totalA; bynR[5] /= totalA; bynR[6] /= totalA; bynR[7] /= totalA; bynR[8] /= totalA; bynR[9] /= totalA; bynR[10] /= 2; //catchall for garbage data //end R break; case 12: //slew only outputSampleL = (inputSampleL - lastSampleL)*trim; outputSampleR = (inputSampleR - lastSampleR)*trim; lastSampleL = inputSampleL; lastSampleR = inputSampleR; if (outputSampleL > 1.0) outputSampleL = 1.0; if (outputSampleR > 1.0) outputSampleR = 1.0; if (outputSampleL < -1.0) outputSampleL = -1.0; if (outputSampleR < -1.0) outputSampleR = -1.0; inputSampleL = outputSampleL; inputSampleR = outputSampleR; break; case 13: //subs only gain = gaintarget; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; iirSampleAL = (iirSampleAL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleAL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleBL = (iirSampleBL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleBL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleCL = (iirSampleCL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleCL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleDL = (iirSampleDL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleDL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleEL = (iirSampleEL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleEL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleFL = (iirSampleFL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleFL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleGL = (iirSampleGL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleGL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleHL = (iirSampleHL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleHL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleIL = (iirSampleIL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleIL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleJL = (iirSampleJL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleJL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleKL = (iirSampleKL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleKL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleLL = (iirSampleLL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleLL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleML = (iirSampleML * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleML; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleNL = (iirSampleNL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleNL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleOL = (iirSampleOL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleOL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSamplePL = (iirSamplePL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSamplePL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleQL = (iirSampleQL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleQL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleRL = (iirSampleRL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleRL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleSL = (iirSampleSL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleSL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleTL = (iirSampleTL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleTL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleUL = (iirSampleUL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleUL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleVL = (iirSampleVL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleVL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleWL = (iirSampleWL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleWL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleXL = (iirSampleXL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleXL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleYL = (iirSampleYL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleYL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleZL = (iirSampleZL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleZL; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; gain = gaintarget; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; iirSampleAR = (iirSampleAR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleAR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleBR = (iirSampleBR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleBR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleCR = (iirSampleCR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleCR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleDR = (iirSampleDR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleDR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleER = (iirSampleER * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleER; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleFR = (iirSampleFR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleFR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleGR = (iirSampleGR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleGR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleHR = (iirSampleHR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleHR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleIR = (iirSampleIR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleIR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleJR = (iirSampleJR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleJR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleKR = (iirSampleKR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleKR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleLR = (iirSampleLR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleLR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleMR = (iirSampleMR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleMR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleNR = (iirSampleNR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleNR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleOR = (iirSampleOR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleOR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSamplePR = (iirSamplePR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSamplePR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleQR = (iirSampleQR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleQR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleRR = (iirSampleRR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleRR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleSR = (iirSampleSR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleSR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleTR = (iirSampleTR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleTR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleUR = (iirSampleUR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleUR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleVR = (iirSampleVR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleVR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleWR = (iirSampleWR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleWR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleXR = (iirSampleXR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleXR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleYR = (iirSampleYR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleYR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleZR = (iirSampleZR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleZR; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; break; case 14: //silhouette //begin L bridgerectifier = fabs(inputSampleL)*1.57079633; if (bridgerectifier > 1.57079633) bridgerectifier = 1.57079633; bridgerectifier = 1.0-cos(bridgerectifier); if (inputSampleL > 0.0) inputSampleL = bridgerectifier; else inputSampleL = -bridgerectifier; silhouette = rand()/(double)RAND_MAX; silhouette -= 0.5; silhouette *= 2.0; silhouette *= fabs(inputSampleL); smoother = rand()/(double)RAND_MAX; smoother -= 0.5; smoother *= 2.0; smoother *= fabs(lastSampleL); lastSampleL = inputSampleL; silhouette += smoother; bridgerectifier = fabs(silhouette)*1.57079633; if (bridgerectifier > 1.57079633) bridgerectifier = 1.57079633; bridgerectifier = sin(bridgerectifier); if (silhouette > 0.0) silhouette = bridgerectifier; else silhouette = -bridgerectifier; inputSampleL = (silhouette + outSampleL) / 2.0; outSampleL = silhouette; //end L //begin R bridgerectifier = fabs(inputSampleR)*1.57079633; if (bridgerectifier > 1.57079633) bridgerectifier = 1.57079633; bridgerectifier = 1.0-cos(bridgerectifier); if (inputSampleR > 0.0) inputSampleR = bridgerectifier; else inputSampleR = -bridgerectifier; silhouette = rand()/(double)RAND_MAX; silhouette -= 0.5; silhouette *= 2.0; silhouette *= fabs(inputSampleR); smoother = rand()/(double)RAND_MAX; smoother -= 0.5; smoother *= 2.0; smoother *= fabs(lastSampleR); lastSampleR = inputSampleR; silhouette += smoother; bridgerectifier = fabs(silhouette)*1.57079633; if (bridgerectifier > 1.57079633) bridgerectifier = 1.57079633; bridgerectifier = sin(bridgerectifier); if (silhouette > 0.0) silhouette = bridgerectifier; else silhouette = -bridgerectifier; inputSampleR = (silhouette + outSampleR) / 2.0; outSampleR = silhouette; //end R break; } flip = !flip; //several dithers use this if (highRes) {inputSampleL /= 256.0; inputSampleR /= 256.0;} //256 for 16/24 version if (dithering) {inputSampleL /= 32768.0; inputSampleR /= 32768.0;} if (dtype == 8) { noiseShapingL += inputSampleL - drySampleL; noiseShapingR += inputSampleR - drySampleR; } *out1 = inputSampleL; *out2 = inputSampleR; *in1++; *in2++; *out1++; *out2++; } } void Ditherbox::processDoubleReplacing(double **inputs, double **outputs, VstInt32 sampleFrames) { double* in1 = inputs[0]; double* in2 = inputs[1]; double* out1 = outputs[0]; double* out2 = outputs[1]; int dtype = (int)(A * 24.999)+1; // +1 for Reaper bug workaround long double overallscale = 1.0; overallscale /= 44100.0; overallscale *= getSampleRate(); long double iirAmount = 2250/44100.0; long double gaintarget = 1.42; long double gain; iirAmount /= overallscale; long double altAmount = 1.0 - iirAmount; long double outputSampleL; long double outputSampleR; long double silhouette; long double smoother; long double bridgerectifier; long double benfordize; int hotbinA; int hotbinB; long double totalA; long double totalB; long double contingentRnd; long double absSample; long double contingent; long double randyConstant = 1.61803398874989484820458683436563811772030917980576; long double omegaConstant = 0.56714329040978387299996866221035554975381578718651; long double expConstant = 0.06598803584531253707679018759684642493857704825279; long double trim = 2.302585092994045684017991; //natural logarithm of 10 bool highRes = false; bool dithering = true; if (dtype > 11){highRes = true; dtype -= 11;} if (dtype > 11){dithering = false; highRes = false;} //follow up by switching high res back off for the monitoring while (--sampleFrames >= 0) { long double inputSampleL = *in1; long double inputSampleR = *in2; if (inputSampleL<1.2e-38 && -inputSampleL<1.2e-38) { static int noisesource = 0; //this declares a variable before anything else is compiled. It won't keep assigning //it to 0 for every sample, it's as if the declaration doesn't exist in this context, //but it lets me add this denormalization fix in a single place rather than updating //it in three different locations. The variable isn't thread-safe but this is only //a random seed and we can share it with whatever. noisesource = noisesource % 1700021; noisesource++; int residue = noisesource * noisesource; residue = residue % 170003; residue *= residue; residue = residue % 17011; residue *= residue; residue = residue % 1709; residue *= residue; residue = residue % 173; residue *= residue; residue = residue % 17; double applyresidue = residue; applyresidue *= 0.00000001; applyresidue *= 0.00000001; inputSampleL = applyresidue; } if (inputSampleR<1.2e-38 && -inputSampleR<1.2e-38) { static int noisesource = 0; noisesource = noisesource % 1700021; noisesource++; int residue = noisesource * noisesource; residue = residue % 170003; residue *= residue; residue = residue % 17011; residue *= residue; residue = residue % 1709; residue *= residue; residue = residue % 173; residue *= residue; residue = residue % 17; double applyresidue = residue; applyresidue *= 0.00000001; applyresidue *= 0.00000001; inputSampleR = applyresidue; //this denormalization routine produces a white noise at -300 dB which the noise //shaping will interact with to produce a bipolar output, but the noise is actually //all positive. That should stop any variables from going denormal, and the routine //only kicks in if digital black is input. As a final touch, if you save to 24-bit //the silence will return to being digital black again. } double drySampleL = inputSampleL; double drySampleR = inputSampleR; if (dtype == 8) {inputSampleL -= noiseShapingL; inputSampleR -= noiseShapingR;} if (dithering) {inputSampleL *= 32768.0; inputSampleR *= 32768.0;} //denormalizing as way of controlling insane detail boosting if (highRes) {inputSampleL *= 256.0; inputSampleR *= 256.0;} //256 for 16/24 version switch (dtype) { case 1: inputSampleL = floor(inputSampleL); inputSampleR = floor(inputSampleR); //truncate break; case 2: inputSampleL += (rand()/(double)RAND_MAX); inputSampleL -= 0.5; inputSampleL = floor(inputSampleL); inputSampleR += (rand()/(double)RAND_MAX); inputSampleR -= 0.5; inputSampleR = floor(inputSampleR); //flat dither break; case 3: inputSampleL += (rand()/(double)RAND_MAX); inputSampleL += (rand()/(double)RAND_MAX); inputSampleL -= 1.0; inputSampleL = floor(inputSampleL); inputSampleR += (rand()/(double)RAND_MAX); inputSampleR += (rand()/(double)RAND_MAX); inputSampleR -= 1.0; inputSampleR = floor(inputSampleR); //TPDF dither break; case 4: currentDitherL = (rand()/(double)RAND_MAX); inputSampleL += currentDitherL; inputSampleL -= lastSampleL; inputSampleL = floor(inputSampleL); lastSampleL = currentDitherL; currentDitherR = (rand()/(double)RAND_MAX); inputSampleR += currentDitherR; inputSampleR -= lastSampleR; inputSampleR = floor(inputSampleR); lastSampleR = currentDitherR; //Paul dither break; case 5: nsL[9] = nsL[8]; nsL[8] = nsL[7]; nsL[7] = nsL[6]; nsL[6] = nsL[5]; nsL[5] = nsL[4]; nsL[4] = nsL[3]; nsL[3] = nsL[2]; nsL[2] = nsL[1]; nsL[1] = nsL[0]; nsL[0] = (rand()/(double)RAND_MAX); currentDitherL = (nsL[0] * 0.061); currentDitherL -= (nsL[1] * 0.11); currentDitherL += (nsL[8] * 0.126); currentDitherL -= (nsL[7] * 0.23); currentDitherL += (nsL[2] * 0.25); currentDitherL -= (nsL[3] * 0.43); currentDitherL += (nsL[6] * 0.5); currentDitherL -= nsL[5]; currentDitherL += nsL[4]; //this sounds different from doing it in order of sample position //cumulative tiny errors seem to build up even at this buss depth //considerably more pronounced at 32 bit float. //Therefore we add the most significant components LAST. //trying to keep values on like exponents of the floating point value. inputSampleL += currentDitherL; inputSampleL = floor(inputSampleL); //done with L nsR[9] = nsR[8]; nsR[8] = nsR[7]; nsR[7] = nsR[6]; nsR[6] = nsR[5]; nsR[5] = nsR[4]; nsR[4] = nsR[3]; nsR[3] = nsR[2]; nsR[2] = nsR[1]; nsR[1] = nsR[0]; nsR[0] = (rand()/(double)RAND_MAX); currentDitherR = (nsR[0] * 0.061); currentDitherR -= (nsR[1] * 0.11); currentDitherR += (nsR[8] * 0.126); currentDitherR -= (nsR[7] * 0.23); currentDitherR += (nsR[2] * 0.25); currentDitherR -= (nsR[3] * 0.43); currentDitherR += (nsR[6] * 0.5); currentDitherR -= nsR[5]; currentDitherR += nsR[4]; //this sounds different from doing it in order of sample position //cumulative tiny errors seem to build up even at this buss depth //considerably more pronounced at 32 bit float. //Therefore we add the most significant components LAST. //trying to keep values on like exponents of the floating point value. inputSampleR += currentDitherR; inputSampleR = floor(inputSampleR); //done with R //DoublePaul dither break; case 6: currentDitherL = (rand()/(double)RAND_MAX); currentDitherR = (rand()/(double)RAND_MAX); inputSampleL += currentDitherL; inputSampleR += currentDitherR; inputSampleL -= nsL[4]; inputSampleR -= nsR[4]; inputSampleL = floor(inputSampleL); inputSampleR = floor(inputSampleR); nsL[4] = nsL[3]; nsL[3] = nsL[2]; nsL[2] = nsL[1]; nsL[1] = currentDitherL; nsR[4] = nsR[3]; nsR[3] = nsR[2]; nsR[2] = nsR[1]; nsR[1] = currentDitherR; //Tape dither break; case 7: Position += 1; //Note- uses integer overflow as a 'mod' operator hotbinA = Position * Position; hotbinA = hotbinA % 170003; //% is C++ mod operator hotbinA *= hotbinA; hotbinA = hotbinA % 17011; //% is C++ mod operator hotbinA *= hotbinA; hotbinA = hotbinA % 1709; //% is C++ mod operator hotbinA *= hotbinA; hotbinA = hotbinA % 173; //% is C++ mod operator hotbinA *= hotbinA; hotbinA = hotbinA % 17; hotbinA *= 0.0635; if (flip) hotbinA = -hotbinA; inputSampleL += hotbinA; inputSampleR += hotbinA; inputSampleL = floor(inputSampleL); inputSampleR = floor(inputSampleR); //Quadratic dither break; case 8: absSample = ((rand()/(double)RAND_MAX) - 0.5); nsL[0] += absSample; nsL[0] /= 2; absSample -= nsL[0]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[1] += absSample; nsL[1] /= 2; absSample -= nsL[1]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[2] += absSample; nsL[2] /= 2; absSample -= nsL[2]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[3] += absSample; nsL[3] /= 2; absSample -= nsL[3]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[4] += absSample; nsL[4] /= 2; absSample -= nsL[4]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[5] += absSample; nsL[5] /= 2; absSample -= nsL[5]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[6] += absSample; nsL[6] /= 2; absSample -= nsL[6]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[7] += absSample; nsL[7] /= 2; absSample -= nsL[7]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[8] += absSample; nsL[8] /= 2; absSample -= nsL[8]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[9] += absSample; nsL[9] /= 2; absSample -= nsL[9]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[10] += absSample; nsL[10] /= 2; absSample -= nsL[10]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[11] += absSample; nsL[11] /= 2; absSample -= nsL[11]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[12] += absSample; nsL[12] /= 2; absSample -= nsL[12]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[13] += absSample; nsL[13] /= 2; absSample -= nsL[13]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[14] += absSample; nsL[14] /= 2; absSample -= nsL[14]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsL[15] += absSample; nsL[15] /= 2; absSample -= nsL[15]; //install noise and then shape it absSample += inputSampleL; if (NSOddL > 0) NSOddL -= 0.97; if (NSOddL < 0) NSOddL += 0.97; NSOddL -= (NSOddL * NSOddL * NSOddL * 0.475); NSOddL += prevL; absSample += (NSOddL*0.475); prevL = floor(absSample) - inputSampleL; inputSampleL = floor(absSample); //TenNines dither L absSample = ((rand()/(double)RAND_MAX) - 0.5); nsR[0] += absSample; nsR[0] /= 2; absSample -= nsR[0]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[1] += absSample; nsR[1] /= 2; absSample -= nsR[1]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[2] += absSample; nsR[2] /= 2; absSample -= nsR[2]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[3] += absSample; nsR[3] /= 2; absSample -= nsR[3]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[4] += absSample; nsR[4] /= 2; absSample -= nsR[4]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[5] += absSample; nsR[5] /= 2; absSample -= nsR[5]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[6] += absSample; nsR[6] /= 2; absSample -= nsR[6]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[7] += absSample; nsR[7] /= 2; absSample -= nsR[7]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[8] += absSample; nsR[8] /= 2; absSample -= nsR[8]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[9] += absSample; nsR[9] /= 2; absSample -= nsR[9]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[10] += absSample; nsR[10] /= 2; absSample -= nsR[10]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[11] += absSample; nsR[11] /= 2; absSample -= nsR[11]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[12] += absSample; nsR[12] /= 2; absSample -= nsR[12]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[13] += absSample; nsR[13] /= 2; absSample -= nsR[13]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[14] += absSample; nsR[14] /= 2; absSample -= nsR[14]; absSample += ((rand()/(double)RAND_MAX) - 0.5); nsR[15] += absSample; nsR[15] /= 2; absSample -= nsR[15]; //install noise and then shape it absSample += inputSampleR; if (NSOddR > 0) NSOddR -= 0.97; if (NSOddR < 0) NSOddR += 0.97; NSOddR -= (NSOddR * NSOddR * NSOddR * 0.475); NSOddR += prevR; absSample += (NSOddR*0.475); prevR = floor(absSample) - inputSampleR; inputSampleR = floor(absSample); //TenNines dither R break; case 9: if (inputSampleL > 0) inputSampleL += 0.383; if (inputSampleL < 0) inputSampleL -= 0.383; if (inputSampleR > 0) inputSampleR += 0.383; if (inputSampleR < 0) inputSampleR -= 0.383; //adjusting to permit more information drug outta the noisefloor contingentRnd = (((rand()/(double)RAND_MAX)+(rand()/(double)RAND_MAX))-1.0) * randyConstant; //produce TPDF dist, scale contingentRnd -= contingentErrL*omegaConstant; //include err absSample = fabs(inputSampleL); contingentErrL = absSample - floor(absSample); //get next err contingent = contingentErrL * 2.0; //scale of quantization levels if (contingent > 1.0) contingent = ((-contingent+2.0)*omegaConstant) + expConstant; else contingent = (contingent * omegaConstant) + expConstant; //zero is next to a quantization level, one is exactly between them if (flip) contingentRnd = (contingentRnd * (1.0-contingent)) + contingent + 0.5; else contingentRnd = (contingentRnd * (1.0-contingent)) - contingent + 0.5; inputSampleL += (contingentRnd * contingent); //Contingent Dither inputSampleL = floor(inputSampleL); contingentRnd = (((rand()/(double)RAND_MAX)+(rand()/(double)RAND_MAX))-1.0) * randyConstant; //produce TPDF dist, scale contingentRnd -= contingentErrR*omegaConstant; //include err absSample = fabs(inputSampleR); contingentErrR = absSample - floor(absSample); //get next err contingent = contingentErrR * 2.0; //scale of quantization levels if (contingent > 1.0) contingent = ((-contingent+2.0)*omegaConstant) + expConstant; else contingent = (contingent * omegaConstant) + expConstant; //zero is next to a quantization level, one is exactly between them if (flip) contingentRnd = (contingentRnd * (1.0-contingent)) + contingent + 0.5; else contingentRnd = (contingentRnd * (1.0-contingent)) - contingent + 0.5; inputSampleR += (contingentRnd * contingent); //Contingent Dither inputSampleR = floor(inputSampleR); //note: this does not dither for values exactly the same as 16 bit values- //which forces the dither to gate at 0.0. It goes to digital black, //and does a teeny parallel-compression thing when almost at digital black. break; case 10: //this one is the original Naturalize if (inputSampleL > 0) inputSampleL += (0.3333333333); if (inputSampleL < 0) inputSampleL -= (0.3333333333); inputSampleL += (rand()/(double)RAND_MAX)*0.6666666666; if (inputSampleR > 0) inputSampleR += (0.3333333333); if (inputSampleR < 0) inputSampleR -= (0.3333333333); inputSampleR += (rand()/(double)RAND_MAX)*0.6666666666; //begin L benfordize = floor(inputSampleL); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinA = floor(benfordize); //hotbin becomes the Benford bin value for this number floored totalA = 0; if ((hotbinA > 0) && (hotbinA < 10)) { bynL[hotbinA] += 1; totalA += (301-bynL[1]); totalA += (176-bynL[2]); totalA += (125-bynL[3]); totalA += (97-bynL[4]); totalA += (79-bynL[5]); totalA += (67-bynL[6]); totalA += (58-bynL[7]); totalA += (51-bynL[8]); totalA += (46-bynL[9]); bynL[hotbinA] -= 1; } else {hotbinA = 10;} //produce total number- smaller is closer to Benford real benfordize = ceil(inputSampleL); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinB = floor(benfordize); //hotbin becomes the Benford bin value for this number ceiled totalB = 0; if ((hotbinB > 0) && (hotbinB < 10)) { bynL[hotbinB] += 1; totalB += (301-bynL[1]); totalB += (176-bynL[2]); totalB += (125-bynL[3]); totalB += (97-bynL[4]); totalB += (79-bynL[5]); totalB += (67-bynL[6]); totalB += (58-bynL[7]); totalB += (51-bynL[8]); totalB += (46-bynL[9]); bynL[hotbinB] -= 1; } else {hotbinB = 10;} //produce total number- smaller is closer to Benford real if (totalA < totalB) { bynL[hotbinA] += 1; inputSampleL = floor(inputSampleL); } else { bynL[hotbinB] += 1; inputSampleL = ceil(inputSampleL); } //assign the relevant one to the delay line //and floor/ceil signal accordingly totalA = bynL[1] + bynL[2] + bynL[3] + bynL[4] + bynL[5] + bynL[6] + bynL[7] + bynL[8] + bynL[9]; totalA /= 1000; if (totalA = 0) totalA = 1; bynL[1] /= totalA; bynL[2] /= totalA; bynL[3] /= totalA; bynL[4] /= totalA; bynL[5] /= totalA; bynL[6] /= totalA; bynL[7] /= totalA; bynL[8] /= totalA; bynL[9] /= totalA; bynL[10] /= 2; //catchall for garbage data //end L //begin R benfordize = floor(inputSampleR); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinA = floor(benfordize); //hotbin becomes the Benford bin value for this number floored totalA = 0; if ((hotbinA > 0) && (hotbinA < 10)) { bynR[hotbinA] += 1; totalA += (301-bynR[1]); totalA += (176-bynR[2]); totalA += (125-bynR[3]); totalA += (97-bynR[4]); totalA += (79-bynR[5]); totalA += (67-bynR[6]); totalA += (58-bynR[7]); totalA += (51-bynR[8]); totalA += (46-bynR[9]); bynR[hotbinA] -= 1; } else {hotbinA = 10;} //produce total number- smaller is closer to Benford real benfordize = ceil(inputSampleR); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinB = floor(benfordize); //hotbin becomes the Benford bin value for this number ceiled totalB = 0; if ((hotbinB > 0) && (hotbinB < 10)) { bynR[hotbinB] += 1; totalB += (301-bynR[1]); totalB += (176-bynR[2]); totalB += (125-bynR[3]); totalB += (97-bynR[4]); totalB += (79-bynR[5]); totalB += (67-bynR[6]); totalB += (58-bynR[7]); totalB += (51-bynR[8]); totalB += (46-bynR[9]); bynR[hotbinB] -= 1; } else {hotbinB = 10;} //produce total number- smaller is closer to Benford real if (totalA < totalB) { bynR[hotbinA] += 1; inputSampleR = floor(inputSampleR); } else { bynR[hotbinB] += 1; inputSampleR = ceil(inputSampleR); } //assign the relevant one to the delay line //and floor/ceil signal accordingly totalA = bynR[1] + bynR[2] + bynR[3] + bynR[4] + bynR[5] + bynR[6] + bynR[7] + bynR[8] + bynR[9]; totalA /= 1000; if (totalA = 0) totalA = 1; bynR[1] /= totalA; bynR[2] /= totalA; bynR[3] /= totalA; bynR[4] /= totalA; bynR[5] /= totalA; bynR[6] /= totalA; bynR[7] /= totalA; bynR[8] /= totalA; bynR[9] /= totalA; bynR[10] /= 2; //catchall for garbage data //end R break; case 11: //this one is the Not Just Another Dither //begin L benfordize = floor(inputSampleL); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinA = floor(benfordize); //hotbin becomes the Benford bin value for this number floored totalA = 0; if ((hotbinA > 0) && (hotbinA < 10)) { bynL[hotbinA] += 1; totalA += (301-bynL[1]); totalA += (176-bynL[2]); totalA += (125-bynL[3]); totalA += (97-bynL[4]); totalA += (79-bynL[5]); totalA += (67-bynL[6]); totalA += (58-bynL[7]); totalA += (51-bynL[8]); totalA += (46-bynL[9]); bynL[hotbinA] -= 1; } else {hotbinA = 10;} //produce total number- smaller is closer to Benford real benfordize = ceil(inputSampleL); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinB = floor(benfordize); //hotbin becomes the Benford bin value for this number ceiled totalB = 0; if ((hotbinB > 0) && (hotbinB < 10)) { bynL[hotbinB] += 1; totalB += (301-bynL[1]); totalB += (176-bynL[2]); totalB += (125-bynL[3]); totalB += (97-bynL[4]); totalB += (79-bynL[5]); totalB += (67-bynL[6]); totalB += (58-bynL[7]); totalB += (51-bynL[8]); totalB += (46-bynL[9]); bynL[hotbinB] -= 1; } else {hotbinB = 10;} //produce total number- smaller is closer to Benford real if (totalA < totalB) { bynL[hotbinA] += 1; inputSampleL = floor(inputSampleL); } else { bynL[hotbinB] += 1; inputSampleL = ceil(inputSampleL); } //assign the relevant one to the delay line //and floor/ceil signal accordingly totalA = bynL[1] + bynL[2] + bynL[3] + bynL[4] + bynL[5] + bynL[6] + bynL[7] + bynL[8] + bynL[9]; totalA /= 1000; if (totalA = 0) totalA = 1; bynL[1] /= totalA; bynL[2] /= totalA; bynL[3] /= totalA; bynL[4] /= totalA; bynL[5] /= totalA; bynL[6] /= totalA; bynL[7] /= totalA; bynL[8] /= totalA; bynL[9] /= totalA; bynL[10] /= 2; //catchall for garbage data //end L //begin R benfordize = floor(inputSampleR); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinA = floor(benfordize); //hotbin becomes the Benford bin value for this number floored totalA = 0; if ((hotbinA > 0) && (hotbinA < 10)) { bynR[hotbinA] += 1; totalA += (301-bynR[1]); totalA += (176-bynR[2]); totalA += (125-bynR[3]); totalA += (97-bynR[4]); totalA += (79-bynR[5]); totalA += (67-bynR[6]); totalA += (58-bynR[7]); totalA += (51-bynR[8]); totalA += (46-bynR[9]); bynR[hotbinA] -= 1; } else {hotbinA = 10;} //produce total number- smaller is closer to Benford real benfordize = ceil(inputSampleR); while (benfordize >= 1.0) {benfordize /= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} if (benfordize < 1.0) {benfordize *= 10;} hotbinB = floor(benfordize); //hotbin becomes the Benford bin value for this number ceiled totalB = 0; if ((hotbinB > 0) && (hotbinB < 10)) { bynR[hotbinB] += 1; totalB += (301-bynR[1]); totalB += (176-bynR[2]); totalB += (125-bynR[3]); totalB += (97-bynR[4]); totalB += (79-bynR[5]); totalB += (67-bynR[6]); totalB += (58-bynR[7]); totalB += (51-bynR[8]); totalB += (46-bynR[9]); bynR[hotbinB] -= 1; } else {hotbinB = 10;} //produce total number- smaller is closer to Benford real if (totalA < totalB) { bynR[hotbinA] += 1; inputSampleR = floor(inputSampleR); } else { bynR[hotbinB] += 1; inputSampleR = ceil(inputSampleR); } //assign the relevant one to the delay line //and floor/ceil signal accordingly totalA = bynR[1] + bynR[2] + bynR[3] + bynR[4] + bynR[5] + bynR[6] + bynR[7] + bynR[8] + bynR[9]; totalA /= 1000; if (totalA = 0) totalA = 1; bynR[1] /= totalA; bynR[2] /= totalA; bynR[3] /= totalA; bynR[4] /= totalA; bynR[5] /= totalA; bynR[6] /= totalA; bynR[7] /= totalA; bynR[8] /= totalA; bynR[9] /= totalA; bynR[10] /= 2; //catchall for garbage data //end R break; case 12: //slew only outputSampleL = (inputSampleL - lastSampleL)*trim; outputSampleR = (inputSampleR - lastSampleR)*trim; lastSampleL = inputSampleL; lastSampleR = inputSampleR; if (outputSampleL > 1.0) outputSampleL = 1.0; if (outputSampleR > 1.0) outputSampleR = 1.0; if (outputSampleL < -1.0) outputSampleL = -1.0; if (outputSampleR < -1.0) outputSampleR = -1.0; inputSampleL = outputSampleL; inputSampleR = outputSampleR; break; case 13: //subs only gain = gaintarget; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; iirSampleAL = (iirSampleAL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleAL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleBL = (iirSampleBL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleBL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleCL = (iirSampleCL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleCL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleDL = (iirSampleDL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleDL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleEL = (iirSampleEL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleEL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleFL = (iirSampleFL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleFL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleGL = (iirSampleGL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleGL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleHL = (iirSampleHL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleHL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleIL = (iirSampleIL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleIL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleJL = (iirSampleJL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleJL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleKL = (iirSampleKL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleKL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleLL = (iirSampleLL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleLL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleML = (iirSampleML * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleML; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleNL = (iirSampleNL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleNL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleOL = (iirSampleOL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleOL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSamplePL = (iirSamplePL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSamplePL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleQL = (iirSampleQL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleQL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleRL = (iirSampleRL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleRL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleSL = (iirSampleSL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleSL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleTL = (iirSampleTL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleTL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleUL = (iirSampleUL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleUL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleVL = (iirSampleVL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleVL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleWL = (iirSampleWL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleWL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleXL = (iirSampleXL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleXL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleYL = (iirSampleYL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleYL; inputSampleL *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; iirSampleZL = (iirSampleZL * altAmount) + (inputSampleL * iirAmount); inputSampleL = iirSampleZL; if (inputSampleL > 1.0) inputSampleL = 1.0; if (inputSampleL < -1.0) inputSampleL = -1.0; gain = gaintarget; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; iirSampleAR = (iirSampleAR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleAR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleBR = (iirSampleBR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleBR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleCR = (iirSampleCR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleCR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleDR = (iirSampleDR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleDR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleER = (iirSampleER * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleER; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleFR = (iirSampleFR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleFR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleGR = (iirSampleGR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleGR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleHR = (iirSampleHR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleHR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleIR = (iirSampleIR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleIR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleJR = (iirSampleJR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleJR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleKR = (iirSampleKR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleKR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleLR = (iirSampleLR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleLR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleMR = (iirSampleMR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleMR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleNR = (iirSampleNR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleNR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleOR = (iirSampleOR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleOR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSamplePR = (iirSamplePR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSamplePR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleQR = (iirSampleQR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleQR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleRR = (iirSampleRR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleRR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleSR = (iirSampleSR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleSR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleTR = (iirSampleTR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleTR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleUR = (iirSampleUR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleUR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleVR = (iirSampleVR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleVR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleWR = (iirSampleWR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleWR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleXR = (iirSampleXR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleXR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleYR = (iirSampleYR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleYR; inputSampleR *= gain; gain = ((gain-1)*0.75)+1; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; iirSampleZR = (iirSampleZR * altAmount) + (inputSampleR * iirAmount); inputSampleR = iirSampleZR; if (inputSampleR > 1.0) inputSampleR = 1.0; if (inputSampleR < -1.0) inputSampleR = -1.0; break; case 14: //silhouette //begin L bridgerectifier = fabs(inputSampleL)*1.57079633; if (bridgerectifier > 1.57079633) bridgerectifier = 1.57079633; bridgerectifier = 1.0-cos(bridgerectifier); if (inputSampleL > 0.0) inputSampleL = bridgerectifier; else inputSampleL = -bridgerectifier; silhouette = rand()/(double)RAND_MAX; silhouette -= 0.5; silhouette *= 2.0; silhouette *= fabs(inputSampleL); smoother = rand()/(double)RAND_MAX; smoother -= 0.5; smoother *= 2.0; smoother *= fabs(lastSampleL); lastSampleL = inputSampleL; silhouette += smoother; bridgerectifier = fabs(silhouette)*1.57079633; if (bridgerectifier > 1.57079633) bridgerectifier = 1.57079633; bridgerectifier = sin(bridgerectifier); if (silhouette > 0.0) silhouette = bridgerectifier; else silhouette = -bridgerectifier; inputSampleL = (silhouette + outSampleL) / 2.0; outSampleL = silhouette; //end L //begin R bridgerectifier = fabs(inputSampleR)*1.57079633; if (bridgerectifier > 1.57079633) bridgerectifier = 1.57079633; bridgerectifier = 1.0-cos(bridgerectifier); if (inputSampleR > 0.0) inputSampleR = bridgerectifier; else inputSampleR = -bridgerectifier; silhouette = rand()/(double)RAND_MAX; silhouette -= 0.5; silhouette *= 2.0; silhouette *= fabs(inputSampleR); smoother = rand()/(double)RAND_MAX; smoother -= 0.5; smoother *= 2.0; smoother *= fabs(lastSampleR); lastSampleR = inputSampleR; silhouette += smoother; bridgerectifier = fabs(silhouette)*1.57079633; if (bridgerectifier > 1.57079633) bridgerectifier = 1.57079633; bridgerectifier = sin(bridgerectifier); if (silhouette > 0.0) silhouette = bridgerectifier; else silhouette = -bridgerectifier; inputSampleR = (silhouette + outSampleR) / 2.0; outSampleR = silhouette; //end R break; } flip = !flip; //several dithers use this if (highRes) {inputSampleL /= 256.0; inputSampleR /= 256.0;} //256 for 16/24 version if (dithering) {inputSampleL /= 32768.0; inputSampleR /= 32768.0;} if (dtype == 8) { noiseShapingL += inputSampleL - drySampleL; noiseShapingR += inputSampleR - drySampleR; } *out1 = inputSampleL; *out2 = inputSampleR; *in1++; *in2++; *out1++; *out2++; } }
[ "jinx6568@sover.net" ]
jinx6568@sover.net
e447a7a8b5131fe9389ddc4dca3e2eea7ece3d46
10ecd7454a082e341eb60817341efa91d0c7fd0b
/SDK/BP_NPC_ReapersBones_Skeleton_InCage_parameters.h
008c2833099805b8bee93c2aceb01628c6f52014
[]
no_license
Blackstate/Sot-SDK
1dba56354524572894f09ed27d653ae5f367d95b
cd73724ce9b46e3eb5b075c468427aa5040daf45
refs/heads/main
2023-04-10T07:26:10.255489
2021-04-23T01:39:08
2021-04-23T01:39:08
null
0
0
null
null
null
null
UTF-8
C++
false
false
598
h
#pragma once // Name: SoT, Version: 2.1.0.1 #include "../SDK.h" /*!!DEFINE!!*/ /*!!HELPER_DEF!!*/ /*!!HELPER_INC!!*/ #ifdef _MSC_VER #pragma pack(push, 0x01) #endif namespace CG { //--------------------------------------------------------------------------- // Parameters //--------------------------------------------------------------------------- // Function BP_NPC_ReapersBones_Skeleton_InCage.BP_NPC_ReapersBones_Skeleton_InCage_C.UserConstructionScript struct ABP_NPC_ReapersBones_Skeleton_InCage_C_UserConstructionScript_Params { }; } #ifdef _MSC_VER #pragma pack(pop) #endif
[ "ploszjanos9844@gmail.com" ]
ploszjanos9844@gmail.com
c67320bf77a4ed2680212c3b3e5be31f252bb5e4
7210b236415bea45ae6390fd828e523090b779d6
/src/main.cpp
d3e46b18822da75d525058b0c2fcecb52c15c0e3
[]
no_license
zhaoyu775885/FCEMS
4cb0f2b8d2e80ed71352b5d7f2093f1fdb859e5a
d460672d2012cc29610531ba4618d45741ea10ec
refs/heads/master
2019-01-21T16:13:32.533915
2017-03-16T01:48:14
2017-03-16T01:48:14
85,115,778
2
0
null
null
null
null
UTF-8
C++
false
false
2,194
cpp
#include <iostream> #include "Mesh/Mesh.h" #include "BasisFunction.h" #include "BasicBEM.h" #include "PostProcess.h" #include "h2lib/cluster.h" #include "h2lib/block.h" #include "h2lib/hmatrix.h" #include "h2lib/harith.h" #include "h2lib/cluster.h" #include "h2lib/hmatrix.h" #include "FastBEM.h" #include <chrono> typedef std::chrono::high_resolution_clock Clock; #define DEBUG_ZMAT 0 #define FASTMETHOD 1 using namespace std; int main(int argc, char * argv[]) { string filenameNode("./input/feko/total_nodes.txt"); string filenameFace("./input/feko/all_surface.txt"); string filenameEdge("./input/feko/surface_edge.txt"); Mesh g_mesh(filenameNode, filenameEdge, filenameFace); g_mesh.display_mesh_info(); BasisFunc g_basisfunc(g_mesh); double freq = 3e8; char integral_equation_type('p'); #if !FASTMETHOD string filenameRCS("./output/b_rcs.csv"); BasicBem bem(g_basisfunc); bem.build_euqation(freq, integral_equation_type); #if DEBUG_ZMAT bem.write_umat("output/b_exc.txt"); bem.write_zmat("output/b_zmat.txt"); #endif bem.solve(); #else string filenameRCS("./output/f_rcs.csv"); FastBemConf config = {100, 2, 1e-4}; FastBem bem(g_basisfunc, config); auto t1 = Clock::now(); bem.build_equation(freq, integral_equation_type); auto t2 = Clock::now(); cout << "rel. error is : " << scientific << bem.get_rel_error() << endl << endl; cout << "max rank is : " << bem.get_max_rank() << endl; cout << std::chrono::duration_cast<std::chrono::milliseconds>(t2 - t1).count() / 1000.0 << " s" << endl; // OpenGLLib plot(bem.get_hmatrix()); // plot.Display(); // bem.print_zmat("./output/z.txt"); cout << "print z over" << endl; bem.direct_solve_vec(); bem.print_umat("./output/u.txt"); cout << "print u over" << endl; auto t3 = Clock::now(); cout << std::chrono::duration_cast<std::chrono::milliseconds>(t3 - t2).count() / 1000.0 << " s" << endl; #endif // FASTMETHOD PostProcess post( g_basisfunc, bem.export_data(), bem.get_nrow(), bem.get_nrhs(), freq, integral_equation_type ); post.gen_rcs(0, 360, 360); post.write_rcs(filenameRCS); return 0; }
[ "zhaoyu@Tank" ]
zhaoyu@Tank