package quic import ( "bytes" "testing" "github.com/gaukas/clienthellod" ) func TestQUICFramesMarshalWithCryptoData(t *testing.T) { resultQUICPayload, err := testQUICFrames.MarshalWithCryptoData(testCryptoFrameBytes) if err != nil { t.Fatalf("Failed to marshal QUIC frames: %v", err) } if len(resultQUICPayload) != len(truthQUICPayload) { t.Fatalf("QUIC payload length mismatch: got %d, want %d. \n%x", len(resultQUICPayload), len(truthQUICPayload), resultQUICPayload) } // verify that the crypto frames would actually assemble the original crypto data r := bytes.NewReader(resultQUICPayload) qchframes, err := clienthellod.ReadAllFrames(r) if err != nil { t.Fatalf("Failed to read QUIC frames: %v", err) } reassembledCryptoData, err := clienthellod.ReassembleCRYPTOFrames(qchframes) if err != nil { t.Fatalf("Failed to reassemble crypto data: %v", err) } if !bytes.Equal(reassembledCryptoData, testCryptoFrameBytes) { t.Fatalf("Reassembled crypto data mismatch: \n%x", reassembledCryptoData) } } var ( testCryptoFrameBytes = []byte{ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, } // 64 bytes testQUICFrames = QUICFrames{ // first 64 bytes: 01 + 63 bytes of padding &QUICFramePing{}, &QUICFramePadding{Length: 63}, // second 64 bytes: last 32 bytes of crypto frame + 29 bytes of padding &QUICFrameCrypto{ Offset: 32, Length: 0, }, &QUICFramePadding{Length: 29}, // third 64 bytes: first 16 bytes of crypto frame + 45 bytes of padding &QUICFrameCrypto{ Offset: 0, Length: 16, }, &QUICFramePadding{Length: 45}, // fourth 64 bytes: second 16 bytes of crypto frame + 45 bytes of padding &QUICFrameCrypto{ Offset: 16, Length: 16, }, &QUICFramePadding{Length: 45}, } truthQUICPayload = []byte{ 0x01, // ping 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // 63 bytes of padding 0x06, 0x20, 0x20, // 3 bytes header 0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, // 32 bytes of crypto frame 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // 29 bytes of padding 0x06, 0x00, 0x10, // 3 bytes header 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, // 16 bytes of crypto frame 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // 45 bytes of padding 0x06, 0x10, 0x10, // 3 bytes header 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, // 16 bytes of crypto frame 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // 45 bytes of padding } )