mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-03 20:27:35 +03:00
get ACK and STOP_WAITING frames in the packet packer
This commit is contained in:
parent
c476eaf019
commit
7034481d9e
7 changed files with 728 additions and 709 deletions
59
mock_ack_frame_source_test.go
Normal file
59
mock_ack_frame_source_test.go
Normal file
|
@ -0,0 +1,59 @@
|
|||
// Code generated by MockGen. DO NOT EDIT.
|
||||
// Source: github.com/lucas-clemente/quic-go (interfaces: AckFrameSource)
|
||||
|
||||
// Package quic is a generated GoMock package.
|
||||
package quic
|
||||
|
||||
import (
|
||||
reflect "reflect"
|
||||
|
||||
gomock "github.com/golang/mock/gomock"
|
||||
wire "github.com/lucas-clemente/quic-go/internal/wire"
|
||||
)
|
||||
|
||||
// MockAckFrameSource is a mock of AckFrameSource interface
|
||||
type MockAckFrameSource struct {
|
||||
ctrl *gomock.Controller
|
||||
recorder *MockAckFrameSourceMockRecorder
|
||||
}
|
||||
|
||||
// MockAckFrameSourceMockRecorder is the mock recorder for MockAckFrameSource
|
||||
type MockAckFrameSourceMockRecorder struct {
|
||||
mock *MockAckFrameSource
|
||||
}
|
||||
|
||||
// NewMockAckFrameSource creates a new mock instance
|
||||
func NewMockAckFrameSource(ctrl *gomock.Controller) *MockAckFrameSource {
|
||||
mock := &MockAckFrameSource{ctrl: ctrl}
|
||||
mock.recorder = &MockAckFrameSourceMockRecorder{mock}
|
||||
return mock
|
||||
}
|
||||
|
||||
// EXPECT returns an object that allows the caller to indicate expected use
|
||||
func (m *MockAckFrameSource) EXPECT() *MockAckFrameSourceMockRecorder {
|
||||
return m.recorder
|
||||
}
|
||||
|
||||
// GetAckFrame mocks base method
|
||||
func (m *MockAckFrameSource) GetAckFrame() *wire.AckFrame {
|
||||
ret := m.ctrl.Call(m, "GetAckFrame")
|
||||
ret0, _ := ret[0].(*wire.AckFrame)
|
||||
return ret0
|
||||
}
|
||||
|
||||
// GetAckFrame indicates an expected call of GetAckFrame
|
||||
func (mr *MockAckFrameSourceMockRecorder) GetAckFrame() *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetAckFrame", reflect.TypeOf((*MockAckFrameSource)(nil).GetAckFrame))
|
||||
}
|
||||
|
||||
// GetStopWaitingFrame mocks base method
|
||||
func (m *MockAckFrameSource) GetStopWaitingFrame(arg0 bool) *wire.StopWaitingFrame {
|
||||
ret := m.ctrl.Call(m, "GetStopWaitingFrame", arg0)
|
||||
ret0, _ := ret[0].(*wire.StopWaitingFrame)
|
||||
return ret0
|
||||
}
|
||||
|
||||
// GetStopWaitingFrame indicates an expected call of GetStopWaitingFrame
|
||||
func (mr *MockAckFrameSourceMockRecorder) GetStopWaitingFrame(arg0 interface{}) *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetStopWaitingFrame", reflect.TypeOf((*MockAckFrameSource)(nil).GetStopWaitingFrame), arg0)
|
||||
}
|
129
mock_packer_test.go
Normal file
129
mock_packer_test.go
Normal file
|
@ -0,0 +1,129 @@
|
|||
// Code generated by MockGen. DO NOT EDIT.
|
||||
// Source: github.com/lucas-clemente/quic-go (interfaces: Packer)
|
||||
|
||||
// Package quic is a generated GoMock package.
|
||||
package quic
|
||||
|
||||
import (
|
||||
reflect "reflect"
|
||||
|
||||
gomock "github.com/golang/mock/gomock"
|
||||
ackhandler "github.com/lucas-clemente/quic-go/internal/ackhandler"
|
||||
protocol "github.com/lucas-clemente/quic-go/internal/protocol"
|
||||
wire "github.com/lucas-clemente/quic-go/internal/wire"
|
||||
)
|
||||
|
||||
// MockPacker is a mock of Packer interface
|
||||
type MockPacker struct {
|
||||
ctrl *gomock.Controller
|
||||
recorder *MockPackerMockRecorder
|
||||
}
|
||||
|
||||
// MockPackerMockRecorder is the mock recorder for MockPacker
|
||||
type MockPackerMockRecorder struct {
|
||||
mock *MockPacker
|
||||
}
|
||||
|
||||
// NewMockPacker creates a new mock instance
|
||||
func NewMockPacker(ctrl *gomock.Controller) *MockPacker {
|
||||
mock := &MockPacker{ctrl: ctrl}
|
||||
mock.recorder = &MockPackerMockRecorder{mock}
|
||||
return mock
|
||||
}
|
||||
|
||||
// EXPECT returns an object that allows the caller to indicate expected use
|
||||
func (m *MockPacker) EXPECT() *MockPackerMockRecorder {
|
||||
return m.recorder
|
||||
}
|
||||
|
||||
// ChangeDestConnectionID mocks base method
|
||||
func (m *MockPacker) ChangeDestConnectionID(arg0 protocol.ConnectionID) {
|
||||
m.ctrl.Call(m, "ChangeDestConnectionID", arg0)
|
||||
}
|
||||
|
||||
// ChangeDestConnectionID indicates an expected call of ChangeDestConnectionID
|
||||
func (mr *MockPackerMockRecorder) ChangeDestConnectionID(arg0 interface{}) *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ChangeDestConnectionID", reflect.TypeOf((*MockPacker)(nil).ChangeDestConnectionID), arg0)
|
||||
}
|
||||
|
||||
// MaybePackAckPacket mocks base method
|
||||
func (m *MockPacker) MaybePackAckPacket() (*packedPacket, error) {
|
||||
ret := m.ctrl.Call(m, "MaybePackAckPacket")
|
||||
ret0, _ := ret[0].(*packedPacket)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// MaybePackAckPacket indicates an expected call of MaybePackAckPacket
|
||||
func (mr *MockPackerMockRecorder) MaybePackAckPacket() *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "MaybePackAckPacket", reflect.TypeOf((*MockPacker)(nil).MaybePackAckPacket))
|
||||
}
|
||||
|
||||
// PackConnectionClose mocks base method
|
||||
func (m *MockPacker) PackConnectionClose(arg0 *wire.ConnectionCloseFrame) (*packedPacket, error) {
|
||||
ret := m.ctrl.Call(m, "PackConnectionClose", arg0)
|
||||
ret0, _ := ret[0].(*packedPacket)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// PackConnectionClose indicates an expected call of PackConnectionClose
|
||||
func (mr *MockPackerMockRecorder) PackConnectionClose(arg0 interface{}) *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PackConnectionClose", reflect.TypeOf((*MockPacker)(nil).PackConnectionClose), arg0)
|
||||
}
|
||||
|
||||
// PackPacket mocks base method
|
||||
func (m *MockPacker) PackPacket() (*packedPacket, error) {
|
||||
ret := m.ctrl.Call(m, "PackPacket")
|
||||
ret0, _ := ret[0].(*packedPacket)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// PackPacket indicates an expected call of PackPacket
|
||||
func (mr *MockPackerMockRecorder) PackPacket() *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PackPacket", reflect.TypeOf((*MockPacker)(nil).PackPacket))
|
||||
}
|
||||
|
||||
// PackRetransmission mocks base method
|
||||
func (m *MockPacker) PackRetransmission(arg0 *ackhandler.Packet) ([]*packedPacket, error) {
|
||||
ret := m.ctrl.Call(m, "PackRetransmission", arg0)
|
||||
ret0, _ := ret[0].([]*packedPacket)
|
||||
ret1, _ := ret[1].(error)
|
||||
return ret0, ret1
|
||||
}
|
||||
|
||||
// PackRetransmission indicates an expected call of PackRetransmission
|
||||
func (mr *MockPackerMockRecorder) PackRetransmission(arg0 interface{}) *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PackRetransmission", reflect.TypeOf((*MockPacker)(nil).PackRetransmission), arg0)
|
||||
}
|
||||
|
||||
// QueueControlFrame mocks base method
|
||||
func (m *MockPacker) QueueControlFrame(arg0 wire.Frame) {
|
||||
m.ctrl.Call(m, "QueueControlFrame", arg0)
|
||||
}
|
||||
|
||||
// QueueControlFrame indicates an expected call of QueueControlFrame
|
||||
func (mr *MockPackerMockRecorder) QueueControlFrame(arg0 interface{}) *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "QueueControlFrame", reflect.TypeOf((*MockPacker)(nil).QueueControlFrame), arg0)
|
||||
}
|
||||
|
||||
// SetMaxPacketSize mocks base method
|
||||
func (m *MockPacker) SetMaxPacketSize(arg0 protocol.ByteCount) {
|
||||
m.ctrl.Call(m, "SetMaxPacketSize", arg0)
|
||||
}
|
||||
|
||||
// SetMaxPacketSize indicates an expected call of SetMaxPacketSize
|
||||
func (mr *MockPackerMockRecorder) SetMaxPacketSize(arg0 interface{}) *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetMaxPacketSize", reflect.TypeOf((*MockPacker)(nil).SetMaxPacketSize), arg0)
|
||||
}
|
||||
|
||||
// SetOmitConnectionID mocks base method
|
||||
func (m *MockPacker) SetOmitConnectionID() {
|
||||
m.ctrl.Call(m, "SetOmitConnectionID")
|
||||
}
|
||||
|
||||
// SetOmitConnectionID indicates an expected call of SetOmitConnectionID
|
||||
func (mr *MockPackerMockRecorder) SetOmitConnectionID() *gomock.Call {
|
||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SetOmitConnectionID", reflect.TypeOf((*MockPacker)(nil).SetOmitConnectionID))
|
||||
}
|
|
@ -6,9 +6,11 @@ package quic
|
|||
//go:generate sh -c "./mockgen_private.sh quic mock_stream_sender_test.go github.com/lucas-clemente/quic-go streamSender"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_stream_getter_test.go github.com/lucas-clemente/quic-go streamGetter"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_stream_frame_source_test.go github.com/lucas-clemente/quic-go streamFrameSource"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_ack_frame_source_test.go github.com/lucas-clemente/quic-go ackFrameSource"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_crypto_stream_test.go github.com/lucas-clemente/quic-go cryptoStream"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_stream_manager_test.go github.com/lucas-clemente/quic-go streamManager"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_unpacker_test.go github.com/lucas-clemente/quic-go unpacker"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_packer_test.go github.com/lucas-clemente/quic-go packer"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_quic_aead_test.go github.com/lucas-clemente/quic-go quicAEAD"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_gquic_aead_test.go github.com/lucas-clemente/quic-go gQUICAEAD"
|
||||
//go:generate sh -c "./mockgen_private.sh quic mock_session_runner_test.go github.com/lucas-clemente/quic-go sessionRunner"
|
||||
|
|
149
packet_packer.go
149
packet_packer.go
|
@ -15,6 +15,19 @@ import (
|
|||
"github.com/lucas-clemente/quic-go/internal/wire"
|
||||
)
|
||||
|
||||
type packer interface {
|
||||
QueueControlFrame(frame wire.Frame)
|
||||
|
||||
PackPacket() (*packedPacket, error)
|
||||
MaybePackAckPacket() (*packedPacket, error)
|
||||
PackRetransmission(packet *ackhandler.Packet) ([]*packedPacket, error)
|
||||
PackConnectionClose(*wire.ConnectionCloseFrame) (*packedPacket, error)
|
||||
|
||||
SetOmitConnectionID()
|
||||
ChangeDestConnectionID(protocol.ConnectionID)
|
||||
SetMaxPacketSize(protocol.ByteCount)
|
||||
}
|
||||
|
||||
type packedPacket struct {
|
||||
header *wire.Header
|
||||
raw []byte
|
||||
|
@ -62,6 +75,19 @@ type streamFrameSource interface {
|
|||
AppendStreamFrames([]wire.Frame, protocol.ByteCount) []wire.Frame
|
||||
}
|
||||
|
||||
// sentAndReceivedPacketManager is only needed until STOP_WAITING is removed
|
||||
type sentAndReceivedPacketManager struct {
|
||||
ackhandler.SentPacketHandler
|
||||
ackhandler.ReceivedPacketHandler
|
||||
}
|
||||
|
||||
var _ ackFrameSource = &sentAndReceivedPacketManager{}
|
||||
|
||||
type ackFrameSource interface {
|
||||
GetAckFrame() *wire.AckFrame
|
||||
GetStopWaitingFrame(bool) *wire.StopWaitingFrame
|
||||
}
|
||||
|
||||
type packetPacker struct {
|
||||
destConnID protocol.ConnectionID
|
||||
srcConnID protocol.ConnectionID
|
||||
|
@ -76,18 +102,19 @@ type packetPacker struct {
|
|||
packetNumberGenerator *packetNumberGenerator
|
||||
getPacketNumberLen func(protocol.PacketNumber) protocol.PacketNumberLen
|
||||
streams streamFrameSource
|
||||
acks ackFrameSource
|
||||
|
||||
controlFrameMutex sync.Mutex
|
||||
controlFrames []wire.Frame
|
||||
|
||||
stopWaiting *wire.StopWaitingFrame
|
||||
ackFrame *wire.AckFrame
|
||||
omitConnectionID bool
|
||||
maxPacketSize protocol.ByteCount
|
||||
hasSentPacket bool // has the packetPacker already sent a packet
|
||||
numNonRetransmittableAcks int
|
||||
}
|
||||
|
||||
var _ packer = &packetPacker{}
|
||||
|
||||
func newPacketPacker(
|
||||
destConnID protocol.ConnectionID,
|
||||
srcConnID protocol.ConnectionID,
|
||||
|
@ -98,6 +125,7 @@ func newPacketPacker(
|
|||
divNonce []byte,
|
||||
cryptoSetup sealingManager,
|
||||
streamFramer streamFrameSource,
|
||||
acks ackFrameSource,
|
||||
perspective protocol.Perspective,
|
||||
version protocol.VersionNumber,
|
||||
) *packetPacker {
|
||||
|
@ -110,6 +138,7 @@ func newPacketPacker(
|
|||
perspective: perspective,
|
||||
version: version,
|
||||
streams: streamFramer,
|
||||
acks: acks,
|
||||
getPacketNumberLen: getPacketNumberLen,
|
||||
packetNumberGenerator: newPacketNumberGenerator(initialPacketNumber, protocol.SkipPacketAveragePeriodLength),
|
||||
maxPacketSize: getMaxPacketSize(remoteAddr),
|
||||
|
@ -130,20 +159,22 @@ func (p *packetPacker) PackConnectionClose(ccf *wire.ConnectionCloseFrame) (*pac
|
|||
}, err
|
||||
}
|
||||
|
||||
func (p *packetPacker) PackAckPacket() (*packedPacket, error) {
|
||||
if p.ackFrame == nil {
|
||||
return nil, errors.New("packet packer BUG: no ack frame queued")
|
||||
func (p *packetPacker) MaybePackAckPacket() (*packedPacket, error) {
|
||||
ack := p.acks.GetAckFrame()
|
||||
if ack == nil {
|
||||
return nil, nil
|
||||
}
|
||||
encLevel, sealer := p.cryptoSetup.GetSealer()
|
||||
header := p.getHeader(encLevel)
|
||||
frames := []wire.Frame{p.ackFrame}
|
||||
if p.stopWaiting != nil { // a STOP_WAITING will only be queued when using gQUIC
|
||||
p.stopWaiting.PacketNumber = header.PacketNumber
|
||||
p.stopWaiting.PacketNumberLen = header.PacketNumberLen
|
||||
frames = append(frames, p.stopWaiting)
|
||||
p.stopWaiting = nil
|
||||
frames := []wire.Frame{ack}
|
||||
// add a STOP_WAITING frame, when using gQUIC
|
||||
if p.version.UsesStopWaitingFrames() {
|
||||
if swf := p.acks.GetStopWaitingFrame(false); swf != nil {
|
||||
swf.PacketNumber = header.PacketNumber
|
||||
swf.PacketNumberLen = header.PacketNumberLen
|
||||
frames = append(frames, swf)
|
||||
}
|
||||
}
|
||||
p.ackFrame = nil
|
||||
raw, err := p.writeAndSealPacket(header, frames, sealer)
|
||||
return &packedPacket{
|
||||
header: header,
|
||||
|
@ -175,6 +206,11 @@ func (p *packetPacker) PackRetransmission(packet *ackhandler.Packet) ([]*packedP
|
|||
|
||||
var packets []*packedPacket
|
||||
encLevel, sealer := p.cryptoSetup.GetSealer()
|
||||
var swf *wire.StopWaitingFrame
|
||||
// for gQUIC: add a STOP_WAITING for *every* retransmission
|
||||
if p.version.UsesStopWaitingFrames() {
|
||||
swf = p.acks.GetStopWaitingFrame(true)
|
||||
}
|
||||
for len(controlFrames) > 0 || len(streamFrames) > 0 {
|
||||
var frames []wire.Frame
|
||||
var length protocol.ByteCount
|
||||
|
@ -186,19 +222,15 @@ func (p *packetPacker) PackRetransmission(packet *ackhandler.Packet) ([]*packedP
|
|||
}
|
||||
maxSize := p.maxPacketSize - protocol.ByteCount(sealer.Overhead()) - headerLength
|
||||
|
||||
// for gQUIC: add a STOP_WAITING for *every* retransmission
|
||||
if p.version.UsesStopWaitingFrames() {
|
||||
if p.stopWaiting == nil {
|
||||
return nil, errors.New("PacketPacker BUG: Handshake retransmissions must contain a STOP_WAITING frame")
|
||||
}
|
||||
// create a new StopWaitingFrame, since we might need to send more than one packet as a retransmission
|
||||
swf := &wire.StopWaitingFrame{
|
||||
LeastUnacked: p.stopWaiting.LeastUnacked,
|
||||
// create a new STOP_WAIITNG Frame, since we might need to send more than one packet as a retransmission
|
||||
stopWaitingFrame := &wire.StopWaitingFrame{
|
||||
LeastUnacked: swf.LeastUnacked,
|
||||
PacketNumber: header.PacketNumber,
|
||||
PacketNumberLen: header.PacketNumberLen,
|
||||
}
|
||||
length += swf.Length(p.version)
|
||||
frames = append(frames, swf)
|
||||
length += stopWaitingFrame.Length(p.version)
|
||||
frames = append(frames, stopWaitingFrame)
|
||||
}
|
||||
|
||||
for len(controlFrames) > 0 {
|
||||
|
@ -253,7 +285,6 @@ func (p *packetPacker) PackRetransmission(packet *ackhandler.Packet) ([]*packedP
|
|||
encryptionLevel: encLevel,
|
||||
})
|
||||
}
|
||||
p.stopWaiting = nil
|
||||
return packets, nil
|
||||
}
|
||||
|
||||
|
@ -271,13 +302,9 @@ func (p *packetPacker) packHandshakeRetransmission(packet *ackhandler.Packet) (*
|
|||
header.Type = packet.PacketType
|
||||
var frames []wire.Frame
|
||||
if p.version.UsesStopWaitingFrames() { // for gQUIC: pack a STOP_WAITING first
|
||||
if p.stopWaiting == nil {
|
||||
return nil, errors.New("PacketPacker BUG: Handshake retransmissions must contain a STOP_WAITING frame")
|
||||
}
|
||||
swf := p.stopWaiting
|
||||
swf := p.acks.GetStopWaitingFrame(true)
|
||||
swf.PacketNumber = header.PacketNumber
|
||||
swf.PacketNumberLen = header.PacketNumberLen
|
||||
p.stopWaiting = nil
|
||||
frames = append([]wire.Frame{swf}, packet.Frames...)
|
||||
} else {
|
||||
frames = packet.Frames
|
||||
|
@ -310,13 +337,9 @@ func (p *packetPacker) PackPacket() (*packedPacket, error) {
|
|||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if p.stopWaiting != nil {
|
||||
p.stopWaiting.PacketNumber = header.PacketNumber
|
||||
p.stopWaiting.PacketNumberLen = header.PacketNumberLen
|
||||
}
|
||||
|
||||
maxSize := p.maxPacketSize - protocol.ByteCount(sealer.Overhead()) - headerLength
|
||||
frames, err := p.composeNextPacket(maxSize, p.canSendData(encLevel))
|
||||
frames, err := p.composeNextPacket(header, maxSize, p.canSendData(encLevel))
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
@ -325,25 +348,17 @@ func (p *packetPacker) PackPacket() (*packedPacket, error) {
|
|||
if len(frames) == 0 {
|
||||
return nil, nil
|
||||
}
|
||||
// Don't send out packets that only contain a StopWaitingFrame
|
||||
if len(frames) == 1 && p.stopWaiting != nil {
|
||||
return nil, nil
|
||||
}
|
||||
if p.ackFrame != nil {
|
||||
// check if this packet only contains an ACK (and maybe a STOP_WAITING)
|
||||
if len(frames) == 1 || (p.stopWaiting != nil && len(frames) == 2) {
|
||||
if p.numNonRetransmittableAcks >= protocol.MaxNonRetransmittableAcks {
|
||||
frames = append(frames, &wire.PingFrame{})
|
||||
p.numNonRetransmittableAcks = 0
|
||||
} else {
|
||||
p.numNonRetransmittableAcks++
|
||||
}
|
||||
} else {
|
||||
// check if this packet only contains an ACK (and maybe a STOP_WAITING)
|
||||
if !ackhandler.HasRetransmittableFrames(frames) {
|
||||
if p.numNonRetransmittableAcks >= protocol.MaxNonRetransmittableAcks {
|
||||
frames = append(frames, &wire.PingFrame{})
|
||||
p.numNonRetransmittableAcks = 0
|
||||
} else {
|
||||
p.numNonRetransmittableAcks++
|
||||
}
|
||||
} else {
|
||||
p.numNonRetransmittableAcks = 0
|
||||
}
|
||||
p.stopWaiting = nil
|
||||
p.ackFrame = nil
|
||||
|
||||
raw, err := p.writeAndSealPacket(header, frames, sealer)
|
||||
if err != nil {
|
||||
|
@ -381,6 +396,7 @@ func (p *packetPacker) packCryptoPacket() (*packedPacket, error) {
|
|||
}
|
||||
|
||||
func (p *packetPacker) composeNextPacket(
|
||||
header *wire.Header, // only needed to fill in the STOP_WAITING frame
|
||||
maxFrameSize protocol.ByteCount,
|
||||
canSendStreamFrames bool,
|
||||
) ([]wire.Frame, error) {
|
||||
|
@ -388,13 +404,19 @@ func (p *packetPacker) composeNextPacket(
|
|||
var frames []wire.Frame
|
||||
|
||||
// STOP_WAITING and ACK will always fit
|
||||
if p.ackFrame != nil { // ACKs need to go first, so that the sentPacketHandler will recognize them
|
||||
frames = append(frames, p.ackFrame)
|
||||
length += p.ackFrame.Length(p.version)
|
||||
}
|
||||
if p.stopWaiting != nil { // a STOP_WAITING will only be queued when using gQUIC
|
||||
frames = append(frames, p.stopWaiting)
|
||||
length += p.stopWaiting.Length(p.version)
|
||||
// ACKs need to go first, so that the sentPacketHandler will recognize them
|
||||
if ack := p.acks.GetAckFrame(); ack != nil {
|
||||
frames = append(frames, ack)
|
||||
length += ack.Length(p.version)
|
||||
// add a STOP_WAITING, for gQUIC
|
||||
if p.version.UsesStopWaitingFrames() {
|
||||
if swf := p.acks.GetStopWaitingFrame(false); swf != nil {
|
||||
swf.PacketNumber = header.PacketNumber
|
||||
swf.PacketNumberLen = header.PacketNumberLen
|
||||
frames = append(frames, swf)
|
||||
length += swf.Length(p.version)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
p.controlFrameMutex.Lock()
|
||||
|
@ -410,10 +432,6 @@ func (p *packetPacker) composeNextPacket(
|
|||
}
|
||||
p.controlFrameMutex.Unlock()
|
||||
|
||||
if length > maxFrameSize {
|
||||
return nil, fmt.Errorf("Packet Packer BUG: packet payload (%d) too large (%d)", length, maxFrameSize)
|
||||
}
|
||||
|
||||
if !canSendStreamFrames {
|
||||
return frames, nil
|
||||
}
|
||||
|
@ -440,16 +458,9 @@ func (p *packetPacker) composeNextPacket(
|
|||
}
|
||||
|
||||
func (p *packetPacker) QueueControlFrame(frame wire.Frame) {
|
||||
switch f := frame.(type) {
|
||||
case *wire.StopWaitingFrame:
|
||||
p.stopWaiting = f
|
||||
case *wire.AckFrame:
|
||||
p.ackFrame = f
|
||||
default:
|
||||
p.controlFrameMutex.Lock()
|
||||
p.controlFrames = append(p.controlFrames, f)
|
||||
p.controlFrameMutex.Unlock()
|
||||
}
|
||||
p.controlFrameMutex.Lock()
|
||||
p.controlFrames = append(p.controlFrames, frame)
|
||||
p.controlFrameMutex.Unlock()
|
||||
}
|
||||
|
||||
func (p *packetPacker) getHeader(encLevel protocol.EncryptionLevel) *wire.Header {
|
||||
|
|
|
@ -60,6 +60,7 @@ var _ = Describe("Packet packer", func() {
|
|||
publicHeaderLen protocol.ByteCount
|
||||
maxFrameSize protocol.ByteCount
|
||||
mockStreamFramer *MockStreamFrameSource
|
||||
mockAckFramer *MockAckFrameSource
|
||||
divNonce []byte
|
||||
token []byte
|
||||
)
|
||||
|
@ -84,6 +85,7 @@ var _ = Describe("Packet packer", func() {
|
|||
mockSender := NewMockStreamSender(mockCtrl)
|
||||
mockSender.EXPECT().onHasStreamData(gomock.Any()).AnyTimes()
|
||||
mockStreamFramer = NewMockStreamFrameSource(mockCtrl)
|
||||
mockAckFramer = NewMockAckFrameSource(mockCtrl)
|
||||
divNonce = bytes.Repeat([]byte{'e'}, 32)
|
||||
token = []byte("initial token")
|
||||
|
||||
|
@ -97,6 +99,7 @@ var _ = Describe("Packet packer", func() {
|
|||
divNonce,
|
||||
&mockCryptoSetup{encLevelSeal: protocol.EncryptionForwardSecure},
|
||||
mockStreamFramer,
|
||||
mockAckFramer,
|
||||
protocol.PerspectiveServer,
|
||||
version,
|
||||
)
|
||||
|
@ -125,6 +128,7 @@ var _ = Describe("Packet packer", func() {
|
|||
})
|
||||
|
||||
It("returns nil when no packet is queued", func() {
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockStreamFramer.EXPECT().AppendStreamFrames(nil, gomock.Any())
|
||||
p, err := packer.PackPacket()
|
||||
|
@ -134,6 +138,7 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("packs single packets", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
f := &wire.StreamFrame{
|
||||
StreamID: 5,
|
||||
Data: []byte{0xDE, 0xCA, 0xFB, 0xAD},
|
||||
|
@ -150,6 +155,7 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("stores the encryption level a packet was sealed with", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
expectAppendStreamFrames(&wire.StreamFrame{
|
||||
StreamID: 5,
|
||||
Data: []byte("foobar"),
|
||||
|
@ -356,6 +362,7 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("packs only control frames", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
expectAppendStreamFrames()
|
||||
packer.QueueControlFrame(&wire.RstStreamFrame{})
|
||||
packer.QueueControlFrame(&wire.MaxDataFrame{})
|
||||
|
@ -368,6 +375,7 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("increases the packet number", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData().Times(2)
|
||||
mockAckFramer.EXPECT().GetAckFrame().Times(2)
|
||||
expectAppendStreamFrames()
|
||||
expectAppendStreamFrames()
|
||||
packer.QueueControlFrame(&wire.RstStreamFrame{})
|
||||
|
@ -381,49 +389,33 @@ var _ = Describe("Packet packer", func() {
|
|||
Expect(p2.header.PacketNumber).To(BeNumerically(">", p1.header.PacketNumber))
|
||||
})
|
||||
|
||||
It("packs a STOP_WAITING frame first", func() {
|
||||
It("packs ACKs and STOP_WAITING frames first", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
ack := &wire.AckFrame{AckRanges: []wire.AckRange{{Largest: 100}}}
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 10}
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(ack)
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false).Return(swf)
|
||||
expectAppendStreamFrames()
|
||||
packer.packetNumberGenerator.next = 15
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 10}
|
||||
packer.QueueControlFrame(&wire.RstStreamFrame{})
|
||||
packer.QueueControlFrame(swf)
|
||||
cf := &wire.RstStreamFrame{}
|
||||
packer.QueueControlFrame(cf)
|
||||
p, err := packer.PackPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p).ToNot(BeNil())
|
||||
Expect(p.frames).To(HaveLen(2))
|
||||
Expect(p.frames[0]).To(Equal(swf))
|
||||
Expect(p.frames).To(Equal([]wire.Frame{ack, swf, cf}))
|
||||
})
|
||||
|
||||
It("sets the LeastUnackedDelta length of a STOP_WAITING frame", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 0x1337 - 0x100}
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(&wire.AckFrame{AckRanges: []wire.AckRange{{Largest: 100}}})
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false).Return(swf)
|
||||
expectAppendStreamFrames()
|
||||
packer.packetNumberGenerator.next = 0x1337
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 0x1337 - 0x100}
|
||||
packer.QueueControlFrame(&wire.RstStreamFrame{})
|
||||
packer.QueueControlFrame(swf)
|
||||
p, err := packer.PackPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p.frames[0].(*wire.StopWaitingFrame).PacketNumberLen).To(Equal(protocol.PacketNumberLen2))
|
||||
})
|
||||
|
||||
It("does not pack a packet containing only a STOP_WAITING frame", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
expectAppendStreamFrames()
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 10}
|
||||
packer.QueueControlFrame(swf)
|
||||
p, err := packer.PackPacket()
|
||||
Expect(p).To(BeNil())
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
})
|
||||
|
||||
It("packs a packet if it has queued control frames, but no new control frames", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
expectAppendStreamFrames()
|
||||
packer.controlFrames = []wire.Frame{&wire.BlockedFrame{}}
|
||||
p, err := packer.PackPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p).ToNot(BeNil())
|
||||
Expect(p.frames).To(HaveLen(2))
|
||||
Expect(p.frames[1].(*wire.StopWaitingFrame).PacketNumberLen).To(Equal(protocol.PacketNumberLen2))
|
||||
})
|
||||
|
||||
It("refuses to send a packet that doesn't contain crypto stream data, if it has never sent a packet before", func() {
|
||||
|
@ -435,7 +427,8 @@ var _ = Describe("Packet packer", func() {
|
|||
Expect(p).To(BeNil())
|
||||
})
|
||||
|
||||
It("packs many control frames into 1 packets", func() {
|
||||
It("packs many control frames into one packets", func() {
|
||||
mockAckFramer.EXPECT().GetAckFrame().Times(2)
|
||||
f := &wire.AckFrame{AckRanges: []wire.AckRange{{Largest: 1, Smallest: 1}}}
|
||||
b := &bytes.Buffer{}
|
||||
err := f.Write(b, packer.version)
|
||||
|
@ -446,15 +439,16 @@ var _ = Describe("Packet packer", func() {
|
|||
controlFrames = append(controlFrames, f)
|
||||
}
|
||||
packer.controlFrames = controlFrames
|
||||
payloadFrames, err := packer.composeNextPacket(maxFrameSize, false)
|
||||
payloadFrames, err := packer.composeNextPacket(nil, maxFrameSize, false)
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(payloadFrames).To(HaveLen(maxFramesPerPacket))
|
||||
payloadFrames, err = packer.composeNextPacket(maxFrameSize, false)
|
||||
payloadFrames, err = packer.composeNextPacket(nil, maxFrameSize, false)
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(payloadFrames).To(BeEmpty())
|
||||
})
|
||||
|
||||
It("packs a lot of control frames into 2 packets if they don't fit into one", func() {
|
||||
mockAckFramer.EXPECT().GetAckFrame().Times(2)
|
||||
blockedFrame := &wire.BlockedFrame{}
|
||||
maxFramesPerPacket := int(maxFrameSize) / int(blockedFrame.Length(packer.version))
|
||||
var controlFrames []wire.Frame
|
||||
|
@ -462,15 +456,16 @@ var _ = Describe("Packet packer", func() {
|
|||
controlFrames = append(controlFrames, blockedFrame)
|
||||
}
|
||||
packer.controlFrames = controlFrames
|
||||
payloadFrames, err := packer.composeNextPacket(maxFrameSize, false)
|
||||
payloadFrames, err := packer.composeNextPacket(nil, maxFrameSize, false)
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(payloadFrames).To(HaveLen(maxFramesPerPacket))
|
||||
payloadFrames, err = packer.composeNextPacket(maxFrameSize, false)
|
||||
payloadFrames, err = packer.composeNextPacket(nil, maxFrameSize, false)
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(payloadFrames).To(HaveLen(10))
|
||||
})
|
||||
|
||||
It("only increases the packet number when there is an actual packet to send", func() {
|
||||
mockAckFramer.EXPECT().GetAckFrame().Times(2)
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData().Times(2)
|
||||
expectAppendStreamFrames()
|
||||
packer.packetNumberGenerator.nextToSkip = 1000
|
||||
|
@ -493,7 +488,8 @@ var _ = Describe("Packet packer", func() {
|
|||
sendMaxNumNonRetransmittableAcks := func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData().Times(protocol.MaxNonRetransmittableAcks)
|
||||
for i := 0; i < protocol.MaxNonRetransmittableAcks; i++ {
|
||||
packer.QueueControlFrame(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 1}}})
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 1}}})
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false)
|
||||
expectAppendStreamFrames()
|
||||
p, err := packer.PackPacket()
|
||||
Expect(p).ToNot(BeNil())
|
||||
|
@ -504,15 +500,18 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("adds a PING frame when it's supposed to send a retransmittable packet", func() {
|
||||
sendMaxNumNonRetransmittableAcks()
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData().Times(2)
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 1}}})
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false)
|
||||
expectAppendStreamFrames()
|
||||
packer.QueueControlFrame(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 1}}})
|
||||
p, err := packer.PackPacket()
|
||||
Expect(p).ToNot(BeNil())
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p.frames).To(ContainElement(&wire.PingFrame{}))
|
||||
// make sure the next packet doesn't contain another PING
|
||||
packer.QueueControlFrame(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 2, Largest: 2}}})
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 1}}})
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false)
|
||||
expectAppendStreamFrames()
|
||||
p, err = packer.PackPacket()
|
||||
Expect(p).ToNot(BeNil())
|
||||
|
@ -522,13 +521,18 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("waits until there's something to send before adding a PING frame", func() {
|
||||
sendMaxNumNonRetransmittableAcks()
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData().Times(2)
|
||||
// nothing to send
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
expectAppendStreamFrames()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
p, err := packer.PackPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p).To(BeNil())
|
||||
// now add some frame to send
|
||||
expectAppendStreamFrames()
|
||||
packer.QueueControlFrame(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 1}}})
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 1}}})
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false)
|
||||
p, err = packer.PackPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p.frames).To(HaveLen(2))
|
||||
|
@ -538,20 +542,20 @@ var _ = Describe("Packet packer", func() {
|
|||
It("doesn't send a PING if it already sent another retransmittable frame", func() {
|
||||
sendMaxNumNonRetransmittableAcks()
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
expectAppendStreamFrames()
|
||||
packer.QueueControlFrame(&wire.MaxDataFrame{})
|
||||
packer.QueueControlFrame(&wire.StopWaitingFrame{})
|
||||
p, err := packer.PackPacket()
|
||||
Expect(p).ToNot(BeNil())
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p.frames).To(HaveLen(2))
|
||||
Expect(p.frames).ToNot(ContainElement(&wire.PingFrame{}))
|
||||
})
|
||||
})
|
||||
|
||||
Context("STREAM frame handling", func() {
|
||||
It("does not split a STREAM frame with maximum size, for gQUIC frames", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData().Times(2)
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
mockStreamFramer.EXPECT().AppendStreamFrames(gomock.Any(), gomock.Any()).DoAndReturn(func(_ []wire.Frame, maxSize protocol.ByteCount) ([]wire.Frame, protocol.ByteCount) {
|
||||
f := &wire.StreamFrame{
|
||||
Offset: 1,
|
||||
|
@ -567,6 +571,9 @@ var _ = Describe("Packet packer", func() {
|
|||
Expect(p.frames).To(HaveLen(1))
|
||||
Expect(p.raw).To(HaveLen(int(maxPacketSize)))
|
||||
Expect(p.frames[0].(*wire.StreamFrame).DataLenPresent).To(BeFalse())
|
||||
// make sure there's nothing else to send
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
p, err = packer.PackPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p).To(BeNil())
|
||||
|
@ -574,7 +581,8 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("does not split a STREAM frame with maximum size, for IETF draft style frame", func() {
|
||||
packer.version = versionIETFFrames
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData().Times(2)
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockStreamFramer.EXPECT().AppendStreamFrames(gomock.Any(), gomock.Any()).DoAndReturn(func(_ []wire.Frame, maxSize protocol.ByteCount) ([]wire.Frame, protocol.ByteCount) {
|
||||
f := &wire.StreamFrame{
|
||||
Offset: 1,
|
||||
|
@ -590,6 +598,9 @@ var _ = Describe("Packet packer", func() {
|
|||
Expect(p.frames).To(HaveLen(1))
|
||||
Expect(p.raw).To(HaveLen(int(maxPacketSize)))
|
||||
Expect(p.frames[0].(*wire.StreamFrame).DataLenPresent).To(BeFalse())
|
||||
// make sure there's nothing else to send
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
p, err = packer.PackPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p).To(BeNil())
|
||||
|
@ -612,21 +623,23 @@ var _ = Describe("Packet packer", func() {
|
|||
DataLenPresent: true,
|
||||
}
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
expectAppendStreamFrames(f1, f2, f3)
|
||||
p, err := packer.PackPacket()
|
||||
Expect(p).ToNot(BeNil())
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p.frames).To(HaveLen(3))
|
||||
Expect(p.frames[0].(*wire.StreamFrame).Data).To(Equal([]byte("frame 1")))
|
||||
Expect(p.frames[1].(*wire.StreamFrame).Data).To(Equal([]byte("frame 2")))
|
||||
Expect(p.frames[2].(*wire.StreamFrame).Data).To(Equal([]byte("frame 3")))
|
||||
Expect(p.frames[0].(*wire.StreamFrame).DataLenPresent).To(BeTrue())
|
||||
Expect(p.frames[1].(*wire.StreamFrame).Data).To(Equal([]byte("frame 2")))
|
||||
Expect(p.frames[1].(*wire.StreamFrame).DataLenPresent).To(BeTrue())
|
||||
Expect(p.frames[2].(*wire.StreamFrame).Data).To(Equal([]byte("frame 3")))
|
||||
Expect(p.frames[2].(*wire.StreamFrame).DataLenPresent).To(BeFalse())
|
||||
})
|
||||
|
||||
It("refuses to send unencrypted stream data on a data stream", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
// don't expect a call to mockStreamFramer.PopStreamFrames
|
||||
packer.cryptoSetup.(*mockCryptoSetup).encLevelSeal = protocol.EncryptionUnencrypted
|
||||
p, err := packer.PackPacket()
|
||||
|
@ -636,6 +649,7 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("sends non forward-secure data as the client", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
f := &wire.StreamFrame{
|
||||
StreamID: 5,
|
||||
Data: []byte("foobar"),
|
||||
|
@ -651,6 +665,7 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("does not send non forward-secure data as the server", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
// don't expect a call to mockStreamFramer.PopStreamFrames
|
||||
packer.cryptoSetup.(*mockCryptoSetup).encLevelSeal = protocol.EncryptionSecure
|
||||
p, err := packer.PackPacket()
|
||||
|
@ -709,10 +724,11 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("does not pack STREAM frames if not allowed", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
ack := &wire.AckFrame{AckRanges: []wire.AckRange{{Largest: 10, Smallest: 1}}}
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(ack)
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false)
|
||||
// don't expect a call to mockStreamFramer.PopStreamFrames
|
||||
packer.cryptoSetup.(*mockCryptoSetup).encLevelSeal = protocol.EncryptionUnencrypted
|
||||
ack := &wire.AckFrame{AckRanges: []wire.AckRange{{Largest: 10, Smallest: 1}}}
|
||||
packer.QueueControlFrame(ack)
|
||||
p, err := packer.PackPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p.frames).To(Equal([]wire.Frame{ack}))
|
||||
|
@ -721,37 +737,25 @@ var _ = Describe("Packet packer", func() {
|
|||
|
||||
It("packs a single ACK", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
expectAppendStreamFrames()
|
||||
ack := &wire.AckFrame{AckRanges: []wire.AckRange{{Largest: 42, Smallest: 1}}}
|
||||
packer.QueueControlFrame(ack)
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(ack)
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false)
|
||||
expectAppendStreamFrames()
|
||||
p, err := packer.PackPacket()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
Expect(p).ToNot(BeNil())
|
||||
Expect(p.frames[0]).To(Equal(ack))
|
||||
})
|
||||
|
||||
It("does not return nil if we only have a single ACK but request it to be sent", func() {
|
||||
mockStreamFramer.EXPECT().HasCryptoStreamData()
|
||||
expectAppendStreamFrames()
|
||||
ack := &wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 1}}}
|
||||
packer.QueueControlFrame(ack)
|
||||
p, err := packer.PackPacket()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
Expect(p).ToNot(BeNil())
|
||||
})
|
||||
|
||||
Context("retransmitting of handshake packets", func() {
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 1}
|
||||
sf := &wire.StreamFrame{
|
||||
StreamID: 1,
|
||||
Data: []byte("foobar"),
|
||||
}
|
||||
|
||||
BeforeEach(func() {
|
||||
packer.QueueControlFrame(swf)
|
||||
})
|
||||
|
||||
It("packs a retransmission for a packet sent with no encryption", func() {
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 1}
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(true).Return(swf)
|
||||
packet := &ackhandler.Packet{
|
||||
PacketType: protocol.PacketTypeHandshake,
|
||||
EncryptionLevel: protocol.EncryptionUnencrypted,
|
||||
|
@ -778,7 +782,9 @@ var _ = Describe("Packet packer", func() {
|
|||
Expect(p[0].encryptionLevel).To(Equal(protocol.EncryptionUnencrypted))
|
||||
})
|
||||
|
||||
It("packs a retransmission for a packet sent with initial encryption", func() {
|
||||
It("packs a retransmission for a packet sent with secure encryption", func() {
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 1}
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(true).Return(swf)
|
||||
packet := &ackhandler.Packet{
|
||||
EncryptionLevel: protocol.EncryptionSecure,
|
||||
Frames: []wire.Frame{sf},
|
||||
|
@ -788,25 +794,16 @@ var _ = Describe("Packet packer", func() {
|
|||
Expect(p).To(HaveLen(1))
|
||||
Expect(p[0].frames).To(Equal([]wire.Frame{swf, sf}))
|
||||
Expect(p[0].encryptionLevel).To(Equal(protocol.EncryptionSecure))
|
||||
// a packet sent by the server with initial encryption contains the SHLO
|
||||
// a packet sent by the server with secure encryption contains the SHLO
|
||||
// it needs to have a diversification nonce
|
||||
Expect(p[0].raw).To(ContainSubstring(string(divNonce)))
|
||||
})
|
||||
|
||||
It("includes the diversification nonce on packets sent with initial encryption", func() {
|
||||
packet := &ackhandler.Packet{
|
||||
EncryptionLevel: protocol.EncryptionSecure,
|
||||
Frames: []wire.Frame{sf},
|
||||
}
|
||||
p, err := packer.PackRetransmission(packet)
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p).To(HaveLen(1))
|
||||
Expect(p[0].encryptionLevel).To(Equal(protocol.EncryptionSecure))
|
||||
})
|
||||
|
||||
// this should never happen, since non forward-secure packets are limited to a size smaller than MaxPacketSize, such that it is always possible to retransmit them without splitting the StreamFrame
|
||||
// (note that the retransmitted packet needs to have enough space for the StopWaitingFrame)
|
||||
It("refuses to send a packet larger than MaxPacketSize", func() {
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 1}
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(true).Return(swf)
|
||||
packet := &ackhandler.Packet{
|
||||
EncryptionLevel: protocol.EncryptionSecure,
|
||||
Frames: []wire.Frame{
|
||||
|
@ -873,23 +870,13 @@ var _ = Describe("Packet packer", func() {
|
|||
Expect(p[0].header.Type).To(Equal(protocol.PacketTypeInitial))
|
||||
Expect(p[0].header.Token).To(Equal(token))
|
||||
})
|
||||
|
||||
It("refuses to retransmit packets without a STOP_WAITING Frame", func() {
|
||||
packer.stopWaiting = nil
|
||||
_, err := packer.PackRetransmission(&ackhandler.Packet{
|
||||
EncryptionLevel: protocol.EncryptionSecure,
|
||||
})
|
||||
Expect(err).To(MatchError("PacketPacker BUG: Handshake retransmissions must contain a STOP_WAITING frame"))
|
||||
})
|
||||
})
|
||||
|
||||
Context("retransmission of forward-secure packets", func() {
|
||||
BeforeEach(func() {
|
||||
packer.packetNumberGenerator.next = 15
|
||||
packer.stopWaiting = &wire.StopWaitingFrame{LeastUnacked: 7}
|
||||
})
|
||||
|
||||
It("retransmits a small packet", func() {
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 7}
|
||||
packer.packetNumberGenerator.next = 10
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(true).Return(swf)
|
||||
frames := []wire.Frame{
|
||||
&wire.MaxDataFrame{ByteOffset: 0x1234},
|
||||
&wire.StreamFrame{StreamID: 42, Data: []byte("foobar")},
|
||||
|
@ -910,15 +897,6 @@ var _ = Describe("Packet packer", func() {
|
|||
Expect(p.frames[1:]).To(Equal(frames))
|
||||
})
|
||||
|
||||
It("refuses to retransmit packets without a STOP_WAITING Frame", func() {
|
||||
packer.stopWaiting = nil
|
||||
_, err := packer.PackRetransmission(&ackhandler.Packet{
|
||||
EncryptionLevel: protocol.EncryptionForwardSecure,
|
||||
Frames: []wire.Frame{&wire.MaxDataFrame{ByteOffset: 0x1234}},
|
||||
})
|
||||
Expect(err).To(MatchError("PacketPacker BUG: Handshake retransmissions must contain a STOP_WAITING frame"))
|
||||
})
|
||||
|
||||
It("packs two packets for retransmission if the original packet contained many control frames", func() {
|
||||
var frames []wire.Frame
|
||||
var totalLen protocol.ByteCount
|
||||
|
@ -928,6 +906,9 @@ var _ = Describe("Packet packer", func() {
|
|||
frames = append(frames, f)
|
||||
totalLen += f.Length(packer.version)
|
||||
}
|
||||
packer.packetNumberGenerator.next = 10
|
||||
swf := &wire.StopWaitingFrame{LeastUnacked: 7}
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(true).Return(swf)
|
||||
packets, err := packer.PackRetransmission(&ackhandler.Packet{
|
||||
EncryptionLevel: protocol.EncryptionForwardSecure,
|
||||
Frames: frames,
|
||||
|
@ -945,6 +926,8 @@ var _ = Describe("Packet packer", func() {
|
|||
})
|
||||
|
||||
It("splits a STREAM frame that doesn't fit", func() {
|
||||
swf := &wire.StopWaitingFrame{}
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(true).Return(swf)
|
||||
packets, err := packer.PackRetransmission(&ackhandler.Packet{
|
||||
EncryptionLevel: protocol.EncryptionForwardSecure,
|
||||
Frames: []wire.Frame{&wire.StreamFrame{
|
||||
|
@ -972,6 +955,8 @@ var _ = Describe("Packet packer", func() {
|
|||
})
|
||||
|
||||
It("packs two packets for retransmission if the original packet contained many STREAM frames", func() {
|
||||
swf := &wire.StopWaitingFrame{}
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(true).Return(swf)
|
||||
var frames []wire.Frame
|
||||
var totalLen protocol.ByteCount
|
||||
// pack a bunch of control frames, such that the packet is way bigger than a single packet
|
||||
|
@ -1001,6 +986,8 @@ var _ = Describe("Packet packer", func() {
|
|||
})
|
||||
|
||||
It("correctly sets the DataLenPresent on STREAM frames", func() {
|
||||
swf := &wire.StopWaitingFrame{}
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(true).Return(swf)
|
||||
frames := []wire.Frame{
|
||||
&wire.StreamFrame{StreamID: 4, Data: []byte("foobar"), DataLenPresent: true},
|
||||
&wire.StreamFrame{StreamID: 5, Data: []byte("barfoo")},
|
||||
|
@ -1025,29 +1012,36 @@ var _ = Describe("Packet packer", func() {
|
|||
})
|
||||
|
||||
Context("packing ACK packets", func() {
|
||||
It("packs ACK packets", func() {
|
||||
packer.QueueControlFrame(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 10}}})
|
||||
p, err := packer.PackAckPacket()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
Expect(p.frames).To(HaveLen(1))
|
||||
Expect(p.frames[0]).To(BeAssignableToTypeOf(&wire.AckFrame{}))
|
||||
ack := p.frames[0].(*wire.AckFrame)
|
||||
Expect(ack.LargestAcked()).To(Equal(protocol.PacketNumber(10)))
|
||||
It("doesn't pack a packet if there's no ACK to send", func() {
|
||||
mockAckFramer.EXPECT().GetAckFrame()
|
||||
p, err := packer.MaybePackAckPacket()
|
||||
Expect(err).ToNot(HaveOccurred())
|
||||
Expect(p).To(BeNil())
|
||||
})
|
||||
|
||||
It("packs ACK packets with STOP_WAITING frames", func() {
|
||||
packer.QueueControlFrame(&wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 10}}})
|
||||
packer.QueueControlFrame(&wire.StopWaitingFrame{})
|
||||
p, err := packer.PackAckPacket()
|
||||
It("packs ACK packets", func() {
|
||||
ack := &wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 10}}}
|
||||
swf := &wire.StopWaitingFrame{}
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(ack)
|
||||
mockAckFramer.EXPECT().GetStopWaitingFrame(false).Return(swf)
|
||||
p, err := packer.MaybePackAckPacket()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
Expect(p.frames).To(HaveLen(2))
|
||||
Expect(p.frames[0]).To(BeAssignableToTypeOf(&wire.AckFrame{}))
|
||||
Expect(p.frames[1]).To(Equal(&wire.StopWaitingFrame{PacketNumber: 1, PacketNumberLen: 2}))
|
||||
Expect(p.frames).To(Equal([]wire.Frame{ack, swf}))
|
||||
})
|
||||
|
||||
It("doesn't add a STOP_WAITING frame for IETF QUIC", func() {
|
||||
packer.version = versionIETFFrames
|
||||
ack := &wire.AckFrame{AckRanges: []wire.AckRange{{Smallest: 1, Largest: 10}}}
|
||||
mockAckFramer.EXPECT().GetAckFrame().Return(ack)
|
||||
p, err := packer.MaybePackAckPacket()
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
Expect(p.frames).To(Equal([]wire.Frame{ack}))
|
||||
})
|
||||
})
|
||||
|
||||
Context("max packet size", func() {
|
||||
It("sets the maximum packet size", func() {
|
||||
mockAckFramer.EXPECT().GetAckFrame().Times(2)
|
||||
for i := 0; i < 10*int(maxPacketSize); i++ {
|
||||
packer.QueueControlFrame(&wire.PingFrame{})
|
||||
}
|
||||
|
@ -1066,6 +1060,7 @@ var _ = Describe("Packet packer", func() {
|
|||
})
|
||||
|
||||
It("doesn't increase the max packet size", func() {
|
||||
mockAckFramer.EXPECT().GetAckFrame().Times(2)
|
||||
for i := 0; i < 10*int(maxPacketSize); i++ {
|
||||
packer.QueueControlFrame(&wire.PingFrame{})
|
||||
}
|
||||
|
|
39
session.go
39
session.go
|
@ -97,7 +97,7 @@ type session struct {
|
|||
connFlowController flowcontrol.ConnectionFlowController
|
||||
|
||||
unpacker unpacker
|
||||
packer *packetPacker
|
||||
packer packer
|
||||
|
||||
cryptoStreamHandler cryptoStreamHandler
|
||||
|
||||
|
@ -216,6 +216,7 @@ func newSession(
|
|||
divNonce,
|
||||
cs,
|
||||
s.streamFramer,
|
||||
sentAndReceivedPacketManager{s.sentPacketHandler, s.receivedPacketHandler},
|
||||
s.perspective,
|
||||
s.version,
|
||||
)
|
||||
|
@ -289,6 +290,7 @@ var newClientSession = func(
|
|||
nil, // no diversification nonce
|
||||
cs,
|
||||
s.streamFramer,
|
||||
sentAndReceivedPacketManager{s.sentPacketHandler, s.receivedPacketHandler},
|
||||
s.perspective,
|
||||
s.version,
|
||||
)
|
||||
|
@ -344,6 +346,7 @@ func newTLSServerSession(
|
|||
nil, // no diversification nonce
|
||||
cs,
|
||||
s.streamFramer,
|
||||
sentAndReceivedPacketManager{s.sentPacketHandler, s.receivedPacketHandler},
|
||||
s.perspective,
|
||||
s.version,
|
||||
)
|
||||
|
@ -408,6 +411,7 @@ var newTLSClientSession = func(
|
|||
nil, // no diversification nonce
|
||||
cs,
|
||||
s.streamFramer,
|
||||
sentAndReceivedPacketManager{s.sentPacketHandler, s.receivedPacketHandler},
|
||||
s.perspective,
|
||||
s.version,
|
||||
)
|
||||
|
@ -417,6 +421,7 @@ var newTLSClientSession = func(
|
|||
func (s *session) preSetup() {
|
||||
s.rttStats = &congestion.RTTStats{}
|
||||
s.sentPacketHandler = ackhandler.NewSentPacketHandler(s.rttStats, s.logger, s.version)
|
||||
s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.rttStats, s.logger, s.version)
|
||||
s.connFlowController = flowcontrol.NewConnectionFlowController(
|
||||
protocol.ReceiveConnectionFlowControlWindow,
|
||||
protocol.ByteCount(s.config.MaxReceiveConnectionFlowControlWindow),
|
||||
|
@ -439,7 +444,6 @@ func (s *session) postSetup() error {
|
|||
s.lastNetworkActivityTime = now
|
||||
s.sessionCreationTime = now
|
||||
|
||||
s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.rttStats, s.logger, s.version)
|
||||
s.windowUpdateQueue = newWindowUpdateQueue(s.streamsMap, s.connFlowController, s.packer.QueueControlFrame)
|
||||
return nil
|
||||
}
|
||||
|
@ -988,21 +992,13 @@ sendLoop:
|
|||
}
|
||||
|
||||
func (s *session) maybeSendAckOnlyPacket() error {
|
||||
ack := s.receivedPacketHandler.GetAckFrame()
|
||||
if ack == nil {
|
||||
return nil
|
||||
}
|
||||
s.packer.QueueControlFrame(ack)
|
||||
|
||||
if s.version.UsesStopWaitingFrames() { // for gQUIC, maybe add a STOP_WAITING
|
||||
if swf := s.sentPacketHandler.GetStopWaitingFrame(false); swf != nil {
|
||||
s.packer.QueueControlFrame(swf)
|
||||
}
|
||||
}
|
||||
packet, err := s.packer.PackAckPacket()
|
||||
packet, err := s.packer.MaybePackAckPacket()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if packet == nil {
|
||||
return nil
|
||||
}
|
||||
s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
|
||||
return s.sendPackedPacket(packet)
|
||||
}
|
||||
|
@ -1033,9 +1029,6 @@ func (s *session) maybeSendRetransmission() (bool, error) {
|
|||
s.logger.Debugf("Dequeueing retransmission for packet 0x%x", retransmitPacket.PacketNumber)
|
||||
}
|
||||
|
||||
if s.version.UsesStopWaitingFrames() {
|
||||
s.packer.QueueControlFrame(s.sentPacketHandler.GetStopWaitingFrame(true))
|
||||
}
|
||||
packets, err := s.packer.PackRetransmission(retransmitPacket)
|
||||
if err != nil {
|
||||
return false, err
|
||||
|
@ -1060,9 +1053,6 @@ func (s *session) sendProbePacket() error {
|
|||
}
|
||||
s.logger.Debugf("Sending a retransmission for %#x as a probe packet.", p.PacketNumber)
|
||||
|
||||
if s.version.UsesStopWaitingFrames() {
|
||||
s.packer.QueueControlFrame(s.sentPacketHandler.GetStopWaitingFrame(true))
|
||||
}
|
||||
packets, err := s.packer.PackRetransmission(p)
|
||||
if err != nil {
|
||||
return err
|
||||
|
@ -1086,15 +1076,6 @@ func (s *session) sendPacket() (bool, error) {
|
|||
}
|
||||
s.windowUpdateQueue.QueueAll()
|
||||
|
||||
if ack := s.receivedPacketHandler.GetAckFrame(); ack != nil {
|
||||
s.packer.QueueControlFrame(ack)
|
||||
if s.version.UsesStopWaitingFrames() {
|
||||
if swf := s.sentPacketHandler.GetStopWaitingFrame(false); swf != nil {
|
||||
s.packer.QueueControlFrame(swf)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
packet, err := s.packer.PackPacket()
|
||||
if err != nil || packet == nil {
|
||||
return false, err
|
||||
|
|
834
session_test.go
834
session_test.go
File diff suppressed because it is too large
Load diff
Loading…
Add table
Add a link
Reference in a new issue