mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-03 20:27:35 +03:00
move TLS message header parsing logic to the crypto stream
This commit is contained in:
parent
d1f49ad2d0
commit
19e5feef57
8 changed files with 117 additions and 91 deletions
|
@ -1,7 +1,6 @@
|
|||
package quic
|
||||
|
||||
import (
|
||||
"github.com/golang/mock/gomock"
|
||||
"github.com/lucas-clemente/quic-go/internal/protocol"
|
||||
"github.com/lucas-clemente/quic-go/internal/wire"
|
||||
|
||||
|
@ -22,34 +21,35 @@ var _ = Describe("Crypto Stream Manager", func() {
|
|||
csm = newCryptoStreamManager(cs, initialStream, handshakeStream)
|
||||
})
|
||||
|
||||
It("handles in in-order crypto frame", func() {
|
||||
f := &wire.CryptoFrame{Data: []byte("foobar")}
|
||||
cs.EXPECT().HandleData([]byte("foobar"), protocol.EncryptionInitial)
|
||||
Expect(csm.HandleCryptoFrame(f, protocol.EncryptionInitial)).To(Succeed())
|
||||
It("passes messages to the right stream", func() {
|
||||
initialMsg := createHandshakeMessage(10)
|
||||
handshakeMsg := createHandshakeMessage(20)
|
||||
|
||||
// only pass in a part of the message, to make sure they get assembled in the right crypto stream
|
||||
Expect(csm.HandleCryptoFrame(&wire.CryptoFrame{
|
||||
Data: initialMsg[:5],
|
||||
}, protocol.EncryptionInitial)).To(Succeed())
|
||||
Expect(csm.HandleCryptoFrame(&wire.CryptoFrame{
|
||||
Data: handshakeMsg[:5],
|
||||
}, protocol.EncryptionHandshake)).To(Succeed())
|
||||
|
||||
// now pass in the rest of the initial message
|
||||
cs.EXPECT().HandleMessage(initialMsg, protocol.EncryptionInitial)
|
||||
Expect(csm.HandleCryptoFrame(&wire.CryptoFrame{
|
||||
Data: initialMsg[5:],
|
||||
Offset: 5,
|
||||
}, protocol.EncryptionInitial)).To(Succeed())
|
||||
|
||||
// now pass in the rest of the handshake message
|
||||
cs.EXPECT().HandleMessage(handshakeMsg, protocol.EncryptionHandshake)
|
||||
Expect(csm.HandleCryptoFrame(&wire.CryptoFrame{
|
||||
Data: handshakeMsg[5:],
|
||||
Offset: 5,
|
||||
}, protocol.EncryptionHandshake)).To(Succeed())
|
||||
})
|
||||
|
||||
It("errors for unknown encryption levels", func() {
|
||||
err := csm.HandleCryptoFrame(&wire.CryptoFrame{}, protocol.Encryption1RTT)
|
||||
Expect(err).To(MatchError("received CRYPTO frame with unexpected encryption level: 1-RTT"))
|
||||
})
|
||||
|
||||
It("handles out-of-order crypto frames", func() {
|
||||
f1 := &wire.CryptoFrame{Data: []byte("foo")}
|
||||
f2 := &wire.CryptoFrame{
|
||||
Offset: 3,
|
||||
Data: []byte("bar"),
|
||||
}
|
||||
gomock.InOrder(
|
||||
cs.EXPECT().HandleData([]byte("foo"), protocol.EncryptionInitial),
|
||||
cs.EXPECT().HandleData([]byte("bar"), protocol.EncryptionInitial),
|
||||
)
|
||||
Expect(csm.HandleCryptoFrame(f1, protocol.EncryptionInitial)).To(Succeed())
|
||||
Expect(csm.HandleCryptoFrame(f2, protocol.EncryptionInitial)).To(Succeed())
|
||||
})
|
||||
|
||||
It("handles handshake data", func() {
|
||||
f := &wire.CryptoFrame{Data: []byte("foobar")}
|
||||
cs.EXPECT().HandleData([]byte("foobar"), protocol.EncryptionHandshake)
|
||||
Expect(csm.HandleCryptoFrame(f, protocol.EncryptionHandshake)).To(Succeed())
|
||||
})
|
||||
})
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue