mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 20:57:36 +03:00
rename connection ID truncation to connection ID omission
This commit is contained in:
parent
8d273d30af
commit
9cb7480050
21 changed files with 111 additions and 112 deletions
|
@ -5,7 +5,7 @@
|
||||||
- Add support for QUIC 38 and 39, drop support for QUIC 35 and 36
|
- Add support for QUIC 38 and 39, drop support for QUIC 35 and 36
|
||||||
- Added `quic.Config` options for maximal flow control windows
|
- Added `quic.Config` options for maximal flow control windows
|
||||||
- Add a `quic.Config` option for QUIC versions
|
- Add a `quic.Config` option for QUIC versions
|
||||||
- Add a `quic.Config` option to request truncation of the connection ID from a server
|
- Add a `quic.Config` option to request omission of the connection ID from a server
|
||||||
- Add a `quic.Config` option to configure the source address validation
|
- Add a `quic.Config` option to configure the source address validation
|
||||||
- Add a `quic.Config` option to configure the handshake timeout
|
- Add a `quic.Config` option to configure the handshake timeout
|
||||||
- Add a `quic.Config` option to configure the idle timeout
|
- Add a `quic.Config` option to configure the idle timeout
|
||||||
|
|
|
@ -172,7 +172,7 @@ func populateClientConfig(config *Config) *Config {
|
||||||
Versions: versions,
|
Versions: versions,
|
||||||
HandshakeTimeout: handshakeTimeout,
|
HandshakeTimeout: handshakeTimeout,
|
||||||
IdleTimeout: idleTimeout,
|
IdleTimeout: idleTimeout,
|
||||||
RequestConnectionIDTruncation: config.RequestConnectionIDTruncation,
|
RequestConnectionIDOmission: config.RequestConnectionIDOmission,
|
||||||
MaxReceiveStreamFlowControlWindow: maxReceiveStreamFlowControlWindow,
|
MaxReceiveStreamFlowControlWindow: maxReceiveStreamFlowControlWindow,
|
||||||
MaxReceiveConnectionFlowControlWindow: maxReceiveConnectionFlowControlWindow,
|
MaxReceiveConnectionFlowControlWindow: maxReceiveConnectionFlowControlWindow,
|
||||||
KeepAlive: config.KeepAlive,
|
KeepAlive: config.KeepAlive,
|
||||||
|
@ -256,11 +256,11 @@ func (c *client) handlePacket(remoteAddr net.Addr, packet []byte) {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
// reject packets with truncated connection id if we didn't request truncation
|
// reject packets with truncated connection id if we didn't request truncation
|
||||||
if hdr.TruncateConnectionID && !c.config.RequestConnectionIDTruncation {
|
if hdr.OmitConnectionID && !c.config.RequestConnectionIDOmission {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
// reject packets with the wrong connection ID
|
// reject packets with the wrong connection ID
|
||||||
if !hdr.TruncateConnectionID && hdr.ConnectionID != c.connectionID {
|
if !hdr.OmitConnectionID && hdr.ConnectionID != c.connectionID {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
hdr.Raw = packet[:len(packet)-r.Len()]
|
hdr.Raw = packet[:len(packet)-r.Len()]
|
||||||
|
|
|
@ -253,14 +253,14 @@ var _ = Describe("Client", func() {
|
||||||
|
|
||||||
It("setups with the right values", func() {
|
It("setups with the right values", func() {
|
||||||
config := &Config{
|
config := &Config{
|
||||||
HandshakeTimeout: 1337 * time.Minute,
|
HandshakeTimeout: 1337 * time.Minute,
|
||||||
IdleTimeout: 42 * time.Hour,
|
IdleTimeout: 42 * time.Hour,
|
||||||
RequestConnectionIDTruncation: true,
|
RequestConnectionIDOmission: true,
|
||||||
}
|
}
|
||||||
c := populateClientConfig(config)
|
c := populateClientConfig(config)
|
||||||
Expect(c.HandshakeTimeout).To(Equal(1337 * time.Minute))
|
Expect(c.HandshakeTimeout).To(Equal(1337 * time.Minute))
|
||||||
Expect(c.IdleTimeout).To(Equal(42 * time.Hour))
|
Expect(c.IdleTimeout).To(Equal(42 * time.Hour))
|
||||||
Expect(c.RequestConnectionIDTruncation).To(BeTrue())
|
Expect(c.RequestConnectionIDOmission).To(BeTrue())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("fills in default values if options are not set in the Config", func() {
|
It("fills in default values if options are not set in the Config", func() {
|
||||||
|
@ -268,7 +268,7 @@ var _ = Describe("Client", func() {
|
||||||
Expect(c.Versions).To(Equal(protocol.SupportedVersions))
|
Expect(c.Versions).To(Equal(protocol.SupportedVersions))
|
||||||
Expect(c.HandshakeTimeout).To(Equal(protocol.DefaultHandshakeTimeout))
|
Expect(c.HandshakeTimeout).To(Equal(protocol.DefaultHandshakeTimeout))
|
||||||
Expect(c.IdleTimeout).To(Equal(protocol.DefaultIdleTimeout))
|
Expect(c.IdleTimeout).To(Equal(protocol.DefaultIdleTimeout))
|
||||||
Expect(c.RequestConnectionIDTruncation).To(BeFalse())
|
Expect(c.RequestConnectionIDOmission).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("errors when receiving an error from the connection", func(done Done) {
|
It("errors when receiving an error from the connection", func(done Done) {
|
||||||
|
@ -438,12 +438,12 @@ var _ = Describe("Client", func() {
|
||||||
})
|
})
|
||||||
|
|
||||||
It("ignores packets without connection id, if it didn't request connection id trunctation", func() {
|
It("ignores packets without connection id, if it didn't request connection id trunctation", func() {
|
||||||
cl.config.RequestConnectionIDTruncation = false
|
cl.config.RequestConnectionIDOmission = false
|
||||||
buf := &bytes.Buffer{}
|
buf := &bytes.Buffer{}
|
||||||
(&wire.PublicHeader{
|
(&wire.PublicHeader{
|
||||||
TruncateConnectionID: true,
|
OmitConnectionID: true,
|
||||||
PacketNumber: 1,
|
PacketNumber: 1,
|
||||||
PacketNumberLen: 1,
|
PacketNumberLen: 1,
|
||||||
}).Write(buf, protocol.VersionWhatever, protocol.PerspectiveServer)
|
}).Write(buf, protocol.VersionWhatever, protocol.PerspectiveServer)
|
||||||
cl.handlePacket(addr, buf.Bytes())
|
cl.handlePacket(addr, buf.Bytes())
|
||||||
Expect(sess.packetCount).To(BeZero())
|
Expect(sess.packetCount).To(BeZero())
|
||||||
|
|
|
@ -51,8 +51,8 @@ type client struct {
|
||||||
var _ http.RoundTripper = &client{}
|
var _ http.RoundTripper = &client{}
|
||||||
|
|
||||||
var defaultQuicConfig = &quic.Config{
|
var defaultQuicConfig = &quic.Config{
|
||||||
RequestConnectionIDTruncation: true,
|
RequestConnectionIDOmission: true,
|
||||||
KeepAlive: true,
|
KeepAlive: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
// newClient creates a new client
|
// newClient creates a new client
|
||||||
|
|
|
@ -21,10 +21,10 @@ var _ = Describe("QUIC Proxy", func() {
|
||||||
makePacket := func(p protocol.PacketNumber, payload []byte) []byte {
|
makePacket := func(p protocol.PacketNumber, payload []byte) []byte {
|
||||||
b := &bytes.Buffer{}
|
b := &bytes.Buffer{}
|
||||||
hdr := wire.PublicHeader{
|
hdr := wire.PublicHeader{
|
||||||
PacketNumber: p,
|
PacketNumber: p,
|
||||||
PacketNumberLen: protocol.PacketNumberLen6,
|
PacketNumberLen: protocol.PacketNumberLen6,
|
||||||
ConnectionID: 1337,
|
ConnectionID: 1337,
|
||||||
TruncateConnectionID: false,
|
OmitConnectionID: false,
|
||||||
}
|
}
|
||||||
hdr.Write(b, protocol.VersionWhatever, protocol.PerspectiveServer)
|
hdr.Write(b, protocol.VersionWhatever, protocol.PerspectiveServer)
|
||||||
raw := b.Bytes()
|
raw := b.Bytes()
|
||||||
|
|
|
@ -89,10 +89,10 @@ type Config struct {
|
||||||
// If not set, it uses all versions available.
|
// If not set, it uses all versions available.
|
||||||
// Warning: This API should not be considered stable and will change soon.
|
// Warning: This API should not be considered stable and will change soon.
|
||||||
Versions []VersionNumber
|
Versions []VersionNumber
|
||||||
// Ask the server to truncate the connection ID sent in the Public Header.
|
// Ask the server to omit the connection ID sent in the Public Header.
|
||||||
// This saves 8 bytes in the Public Header in every packet. However, if the IP address of the server changes, the connection cannot be migrated.
|
// This saves 8 bytes in the Public Header in every packet. However, if the IP address of the server changes, the connection cannot be migrated.
|
||||||
// Currently only valid for the client.
|
// Currently only valid for the client.
|
||||||
RequestConnectionIDTruncation bool
|
RequestConnectionIDOmission bool
|
||||||
// HandshakeTimeout is the maximum duration that the cryptographic handshake may take.
|
// HandshakeTimeout is the maximum duration that the cryptographic handshake may take.
|
||||||
// If the timeout is exceeded, the connection is closed.
|
// If the timeout is exceeded, the connection is closed.
|
||||||
// If this value is zero, the timeout is set to 10 seconds.
|
// If this value is zero, the timeout is set to 10 seconds.
|
||||||
|
|
|
@ -51,8 +51,8 @@ type cryptoSetupClient struct {
|
||||||
forwardSecureAEAD crypto.AEAD
|
forwardSecureAEAD crypto.AEAD
|
||||||
aeadChanged chan<- protocol.EncryptionLevel
|
aeadChanged chan<- protocol.EncryptionLevel
|
||||||
|
|
||||||
requestConnIDTruncation bool
|
requestConnIDOmission bool
|
||||||
params *paramsNegotiatorGQUIC
|
params *paramsNegotiatorGQUIC
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ CryptoSetup = &cryptoSetupClient{}
|
var _ CryptoSetup = &cryptoSetupClient{}
|
||||||
|
@ -75,18 +75,18 @@ func NewCryptoSetupClient(
|
||||||
) (CryptoSetup, ParamsNegotiator, error) {
|
) (CryptoSetup, ParamsNegotiator, error) {
|
||||||
pn := newParamsNegotiatorGQUIC(protocol.PerspectiveClient, version, params)
|
pn := newParamsNegotiatorGQUIC(protocol.PerspectiveClient, version, params)
|
||||||
return &cryptoSetupClient{
|
return &cryptoSetupClient{
|
||||||
hostname: hostname,
|
hostname: hostname,
|
||||||
connID: connID,
|
connID: connID,
|
||||||
version: version,
|
version: version,
|
||||||
certManager: crypto.NewCertManager(tlsConfig),
|
certManager: crypto.NewCertManager(tlsConfig),
|
||||||
params: pn,
|
params: pn,
|
||||||
requestConnIDTruncation: params.RequestConnectionIDTruncation,
|
requestConnIDOmission: params.RequestConnectionIDOmission,
|
||||||
keyDerivation: crypto.DeriveQuicCryptoAESKeys,
|
keyDerivation: crypto.DeriveQuicCryptoAESKeys,
|
||||||
keyExchange: getEphermalKEX,
|
keyExchange: getEphermalKEX,
|
||||||
nullAEAD: crypto.NewNullAEAD(protocol.PerspectiveClient, version),
|
nullAEAD: crypto.NewNullAEAD(protocol.PerspectiveClient, version),
|
||||||
aeadChanged: aeadChanged,
|
aeadChanged: aeadChanged,
|
||||||
negotiatedVersions: negotiatedVersions,
|
negotiatedVersions: negotiatedVersions,
|
||||||
divNonceChan: make(chan []byte),
|
divNonceChan: make(chan []byte),
|
||||||
}, pn, nil
|
}, pn, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -421,7 +421,7 @@ func (h *cryptoSetupClient) getTags() (map[Tag][]byte, error) {
|
||||||
binary.LittleEndian.PutUint32(versionTag, protocol.VersionNumberToTag(h.version))
|
binary.LittleEndian.PutUint32(versionTag, protocol.VersionNumberToTag(h.version))
|
||||||
tags[TagVER] = versionTag
|
tags[TagVER] = versionTag
|
||||||
|
|
||||||
if h.requestConnIDTruncation {
|
if h.requestConnIDOmission {
|
||||||
tags[TagTCID] = []byte{0, 0, 0, 0}
|
tags[TagTCID] = []byte{0, 0, 0, 0}
|
||||||
}
|
}
|
||||||
if len(h.stk) > 0 {
|
if len(h.stk) > 0 {
|
||||||
|
|
|
@ -491,8 +491,8 @@ var _ = Describe("Client Crypto Setup", func() {
|
||||||
Expect(tags).ToNot(HaveKey(TagTCID))
|
Expect(tags).ToNot(HaveKey(TagTCID))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("requests to truncate the connection ID", func() {
|
It("requests to omit the connection ID", func() {
|
||||||
cs.requestConnIDTruncation = true
|
cs.requestConnIDOmission = true
|
||||||
tags, err := cs.getTags()
|
tags, err := cs.getTags()
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(tags).To(HaveKeyWithValue(TagTCID, []byte{0, 0, 0, 0}))
|
Expect(tags).To(HaveKeyWithValue(TagTCID, []byte{0, 0, 0, 0}))
|
||||||
|
|
|
@ -28,7 +28,7 @@ type CryptoSetup interface {
|
||||||
|
|
||||||
// TransportParameters are parameters sent to the peer during the handshake
|
// TransportParameters are parameters sent to the peer during the handshake
|
||||||
type TransportParameters struct {
|
type TransportParameters struct {
|
||||||
RequestConnectionIDTruncation bool
|
RequestConnectionIDOmission bool
|
||||||
MaxReceiveStreamFlowControlWindow protocol.ByteCount
|
MaxReceiveStreamFlowControlWindow protocol.ByteCount
|
||||||
MaxReceiveConnectionFlowControlWindow protocol.ByteCount
|
MaxReceiveConnectionFlowControlWindow protocol.ByteCount
|
||||||
IdleTimeout time.Duration
|
IdleTimeout time.Duration
|
||||||
|
|
|
@ -68,7 +68,7 @@ func (h *paramsNegotiator) SetFromTransportParameters(params []transportParamete
|
||||||
if len(p.Value) != 0 {
|
if len(p.Value) != 0 {
|
||||||
return fmt.Errorf("wrong length for omit_connection_id: %d (expected empty)", len(p.Value))
|
return fmt.Errorf("wrong length for omit_connection_id: %d (expected empty)", len(p.Value))
|
||||||
}
|
}
|
||||||
h.truncateConnectionID = true
|
h.omitConnectionID = true
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -96,14 +96,14 @@ func (h *paramsNegotiator) GetTransportParameters() []transportParameter {
|
||||||
}
|
}
|
||||||
h.mutex.RLock()
|
h.mutex.RLock()
|
||||||
defer h.mutex.RUnlock()
|
defer h.mutex.RUnlock()
|
||||||
if h.truncateConnectionID {
|
if h.omitConnectionID {
|
||||||
params = append(params, transportParameter{omitConnectionIDParameterID, []byte{}})
|
params = append(params, transportParameter{omitConnectionIDParameterID, []byte{}})
|
||||||
}
|
}
|
||||||
return params
|
return params
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *paramsNegotiator) TruncateConnectionID() bool {
|
func (h *paramsNegotiator) OmitConnectionID() bool {
|
||||||
h.mutex.RLock()
|
h.mutex.RLock()
|
||||||
defer h.mutex.RUnlock()
|
defer h.mutex.RUnlock()
|
||||||
return h.truncateConnectionID
|
return h.omitConnectionID
|
||||||
}
|
}
|
||||||
|
|
|
@ -20,9 +20,8 @@ type ParamsNegotiator interface {
|
||||||
GetMaxOutgoingStreams() uint32
|
GetMaxOutgoingStreams() uint32
|
||||||
GetMaxIncomingStreams() uint32
|
GetMaxIncomingStreams() uint32
|
||||||
GetIdleConnectionStateLifetime() time.Duration
|
GetIdleConnectionStateLifetime() time.Duration
|
||||||
// determines if the client requests truncated ConnectionIDs.
|
// determines if the client requests omission of connection IDs.
|
||||||
// It always returns false for the server.
|
OmitConnectionID() bool
|
||||||
TruncateConnectionID() bool
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// For the server:
|
// For the server:
|
||||||
|
@ -39,8 +38,8 @@ type paramsNegotiatorBase struct {
|
||||||
|
|
||||||
flowControlNegotiated bool
|
flowControlNegotiated bool
|
||||||
|
|
||||||
truncateConnectionID bool
|
omitConnectionID bool
|
||||||
requestConnectionIDTruncation bool
|
requestConnectionIDOmission bool
|
||||||
|
|
||||||
maxStreamsPerConnection uint32
|
maxStreamsPerConnection uint32
|
||||||
maxIncomingDynamicStreamsPerConnection uint32
|
maxIncomingDynamicStreamsPerConnection uint32
|
||||||
|
@ -60,7 +59,7 @@ func (h *paramsNegotiatorBase) init(params *TransportParameters) {
|
||||||
h.receiveConnectionFlowControlWindow = protocol.ReceiveConnectionFlowControlWindow
|
h.receiveConnectionFlowControlWindow = protocol.ReceiveConnectionFlowControlWindow
|
||||||
h.maxReceiveStreamFlowControlWindow = params.MaxReceiveStreamFlowControlWindow
|
h.maxReceiveStreamFlowControlWindow = params.MaxReceiveStreamFlowControlWindow
|
||||||
h.maxReceiveConnectionFlowControlWindow = params.MaxReceiveConnectionFlowControlWindow
|
h.maxReceiveConnectionFlowControlWindow = params.MaxReceiveConnectionFlowControlWindow
|
||||||
h.requestConnectionIDTruncation = params.RequestConnectionIDTruncation
|
h.requestConnectionIDOmission = params.RequestConnectionIDOmission
|
||||||
|
|
||||||
h.idleConnectionStateLifetime = params.IdleTimeout
|
h.idleConnectionStateLifetime = params.IdleTimeout
|
||||||
if h.perspective == protocol.PerspectiveServer {
|
if h.perspective == protocol.PerspectiveServer {
|
||||||
|
|
|
@ -40,7 +40,7 @@ func (h *paramsNegotiatorGQUIC) SetFromMap(params map[Tag][]byte) error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errMalformedTag
|
return errMalformedTag
|
||||||
}
|
}
|
||||||
h.truncateConnectionID = (clientValue == 0)
|
h.omitConnectionID = (clientValue == 0)
|
||||||
}
|
}
|
||||||
if value, ok := params[TagMSPC]; ok {
|
if value, ok := params[TagMSPC]; ok {
|
||||||
clientValue, err := utils.LittleEndian.ReadUint32(bytes.NewBuffer(value))
|
clientValue, err := utils.LittleEndian.ReadUint32(bytes.NewBuffer(value))
|
||||||
|
@ -115,12 +115,12 @@ func (h *paramsNegotiatorGQUIC) GetHelloMap() (map[Tag][]byte, error) {
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *paramsNegotiatorGQUIC) TruncateConnectionID() bool {
|
func (h *paramsNegotiatorGQUIC) OmitConnectionID() bool {
|
||||||
if h.perspective == protocol.PerspectiveClient {
|
if h.perspective == protocol.PerspectiveClient {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
h.mutex.RLock()
|
h.mutex.RLock()
|
||||||
defer h.mutex.RUnlock()
|
defer h.mutex.RUnlock()
|
||||||
return h.truncateConnectionID
|
return h.omitConnectionID
|
||||||
}
|
}
|
||||||
|
|
|
@ -119,21 +119,21 @@ var _ = Describe("Params Negotiator (for gQUIC)", func() {
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("Truncated connection IDs", func() {
|
Context("Omitted connection IDs", func() {
|
||||||
It("does not send truncated connection IDs if the TCID tag is missing", func() {
|
It("does not send omitted connection IDs if the TCID tag is missing", func() {
|
||||||
Expect(pn.TruncateConnectionID()).To(BeFalse())
|
Expect(pn.OmitConnectionID()).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("reads the tag for truncated connection IDs", func() {
|
It("reads the tag for omitted connection IDs", func() {
|
||||||
values := map[Tag][]byte{TagTCID: {0, 0, 0, 0}}
|
values := map[Tag][]byte{TagTCID: {0, 0, 0, 0}}
|
||||||
pn.SetFromMap(values)
|
pn.SetFromMap(values)
|
||||||
Expect(pn.TruncateConnectionID()).To(BeTrue())
|
Expect(pn.OmitConnectionID()).To(BeTrue())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("ignores the TCID tag, as a client", func() {
|
It("ignores the TCID tag, as a client", func() {
|
||||||
values := map[Tag][]byte{TagTCID: {0, 0, 0, 0}}
|
values := map[Tag][]byte{TagTCID: {0, 0, 0, 0}}
|
||||||
pnClient.SetFromMap(values)
|
pnClient.SetFromMap(values)
|
||||||
Expect(pnClient.TruncateConnectionID()).To(BeFalse())
|
Expect(pnClient.OmitConnectionID()).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("errors when given an invalid value", func() {
|
It("errors when given an invalid value", func() {
|
||||||
|
|
|
@ -59,7 +59,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
|
||||||
})
|
})
|
||||||
|
|
||||||
It("request ommision of the connection ID", func() {
|
It("request ommision of the connection ID", func() {
|
||||||
pn.truncateConnectionID = true
|
pn.omitConnectionID = true
|
||||||
values := paramsListToMap(pn.GetTransportParameters())
|
values := paramsListToMap(pn.GetTransportParameters())
|
||||||
Expect(values).To(HaveKeyWithValue(omitConnectionIDParameterID, []byte{}))
|
Expect(values).To(HaveKeyWithValue(omitConnectionIDParameterID, []byte{}))
|
||||||
})
|
})
|
||||||
|
@ -72,7 +72,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
|
||||||
Expect(pn.GetSendStreamFlowControlWindow()).To(Equal(protocol.ByteCount(0x11223344)))
|
Expect(pn.GetSendStreamFlowControlWindow()).To(Equal(protocol.ByteCount(0x11223344)))
|
||||||
Expect(pn.GetSendConnectionFlowControlWindow()).To(Equal(protocol.ByteCount(0x22334455)))
|
Expect(pn.GetSendConnectionFlowControlWindow()).To(Equal(protocol.ByteCount(0x22334455)))
|
||||||
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(0x1337 * time.Second))
|
Expect(pn.GetIdleConnectionStateLifetime()).To(Equal(0x1337 * time.Second))
|
||||||
Expect(pn.TruncateConnectionID()).To(BeFalse())
|
Expect(pn.OmitConnectionID()).To(BeFalse())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("negotiates a smaller idle timeout, if the peer suggest a higher value than configured", func() {
|
It("negotiates a smaller idle timeout, if the peer suggest a higher value than configured", func() {
|
||||||
|
@ -86,7 +86,7 @@ var _ = Describe("Params Negotiator (for TLS)", func() {
|
||||||
params[omitConnectionIDParameterID] = []byte{}
|
params[omitConnectionIDParameterID] = []byte{}
|
||||||
err := pn.SetFromTransportParameters(paramsMapToList(params))
|
err := pn.SetFromTransportParameters(paramsMapToList(params))
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(pn.TruncateConnectionID()).To(BeTrue())
|
Expect(pn.OmitConnectionID()).To(BeTrue())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("rejects the parameters if the initial_max_stream_data is missing", func() {
|
It("rejects the parameters if the initial_max_stream_data is missing", func() {
|
||||||
|
|
|
@ -142,14 +142,14 @@ func (_mr *MockParamsNegotiatorMockRecorder) GetIdleConnectionStateLifetime() *g
|
||||||
return _mr.mock.ctrl.RecordCallWithMethodType(_mr.mock, "GetIdleConnectionStateLifetime", reflect.TypeOf((*MockParamsNegotiator)(nil).GetIdleConnectionStateLifetime))
|
return _mr.mock.ctrl.RecordCallWithMethodType(_mr.mock, "GetIdleConnectionStateLifetime", reflect.TypeOf((*MockParamsNegotiator)(nil).GetIdleConnectionStateLifetime))
|
||||||
}
|
}
|
||||||
|
|
||||||
// TruncateConnectionID mocks base method
|
// OmitConnectionID mocks base method
|
||||||
func (_m *MockParamsNegotiator) TruncateConnectionID() bool {
|
func (_m *MockParamsNegotiator) OmitConnectionID() bool {
|
||||||
ret := _m.ctrl.Call(_m, "TruncateConnectionID")
|
ret := _m.ctrl.Call(_m, "OmitConnectionID")
|
||||||
ret0, _ := ret[0].(bool)
|
ret0, _ := ret[0].(bool)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// TruncateConnectionID indicates an expected call of TruncateConnectionID
|
// OmitConnectionID indicates an expected call of OmitConnectionID
|
||||||
func (_mr *MockParamsNegotiatorMockRecorder) TruncateConnectionID() *gomock.Call {
|
func (_mr *MockParamsNegotiatorMockRecorder) OmitConnectionID() *gomock.Call {
|
||||||
return _mr.mock.ctrl.RecordCallWithMethodType(_mr.mock, "TruncateConnectionID", reflect.TypeOf((*MockParamsNegotiator)(nil).TruncateConnectionID))
|
return _mr.mock.ctrl.RecordCallWithMethodType(_mr.mock, "OmitConnectionID", reflect.TypeOf((*MockParamsNegotiator)(nil).OmitConnectionID))
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,7 +15,7 @@ var (
|
||||||
// This can happen when the server is restarted. The client will send a packet without a version number.
|
// This can happen when the server is restarted. The client will send a packet without a version number.
|
||||||
ErrPacketWithUnknownVersion = errors.New("PublicHeader: Received a packet without version number, that we don't know the version for")
|
ErrPacketWithUnknownVersion = errors.New("PublicHeader: Received a packet without version number, that we don't know the version for")
|
||||||
errResetAndVersionFlagSet = errors.New("PublicHeader: Reset Flag and Version Flag should not be set at the same time")
|
errResetAndVersionFlagSet = errors.New("PublicHeader: Reset Flag and Version Flag should not be set at the same time")
|
||||||
errReceivedTruncatedConnectionID = qerr.Error(qerr.InvalidPacketHeader, "receiving packets with truncated ConnectionID is not supported")
|
errReceivedOmittedConnectionID = qerr.Error(qerr.InvalidPacketHeader, "receiving packets with omitted ConnectionID is not supported")
|
||||||
errInvalidConnectionID = qerr.Error(qerr.InvalidPacketHeader, "connection ID cannot be 0")
|
errInvalidConnectionID = qerr.Error(qerr.InvalidPacketHeader, "connection ID cannot be 0")
|
||||||
errGetLengthNotForVersionNegotiation = errors.New("PublicHeader: GetLength cannot be called for VersionNegotiation packets")
|
errGetLengthNotForVersionNegotiation = errors.New("PublicHeader: GetLength cannot be called for VersionNegotiation packets")
|
||||||
)
|
)
|
||||||
|
@ -26,7 +26,7 @@ type PublicHeader struct {
|
||||||
ConnectionID protocol.ConnectionID
|
ConnectionID protocol.ConnectionID
|
||||||
VersionFlag bool
|
VersionFlag bool
|
||||||
ResetFlag bool
|
ResetFlag bool
|
||||||
TruncateConnectionID bool
|
OmitConnectionID bool
|
||||||
PacketNumberLen protocol.PacketNumberLen
|
PacketNumberLen protocol.PacketNumberLen
|
||||||
PacketNumber protocol.PacketNumber
|
PacketNumber protocol.PacketNumber
|
||||||
VersionNumber protocol.VersionNumber // VersionNumber sent by the client
|
VersionNumber protocol.VersionNumber // VersionNumber sent by the client
|
||||||
|
@ -48,7 +48,7 @@ func (h *PublicHeader) Write(b *bytes.Buffer, version protocol.VersionNumber, pe
|
||||||
if h.ResetFlag {
|
if h.ResetFlag {
|
||||||
publicFlagByte |= 0x02
|
publicFlagByte |= 0x02
|
||||||
}
|
}
|
||||||
if !h.TruncateConnectionID {
|
if !h.OmitConnectionID {
|
||||||
publicFlagByte |= 0x08
|
publicFlagByte |= 0x08
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -75,7 +75,7 @@ func (h *PublicHeader) Write(b *bytes.Buffer, version protocol.VersionNumber, pe
|
||||||
|
|
||||||
b.WriteByte(publicFlagByte)
|
b.WriteByte(publicFlagByte)
|
||||||
|
|
||||||
if !h.TruncateConnectionID {
|
if !h.OmitConnectionID {
|
||||||
// always read the connection ID in little endian
|
// always read the connection ID in little endian
|
||||||
utils.LittleEndian.WriteUint64(b, uint64(h.ConnectionID))
|
utils.LittleEndian.WriteUint64(b, uint64(h.ConnectionID))
|
||||||
}
|
}
|
||||||
|
@ -120,11 +120,11 @@ func PeekConnectionID(b *bytes.Reader, packetSentBy protocol.Perspective) (proto
|
||||||
// unread the public flag byte
|
// unread the public flag byte
|
||||||
defer b.UnreadByte()
|
defer b.UnreadByte()
|
||||||
|
|
||||||
truncateConnectionID := publicFlagByte&0x08 == 0
|
omitConnectionID := publicFlagByte&0x08 == 0
|
||||||
if truncateConnectionID && packetSentBy == protocol.PerspectiveClient {
|
if omitConnectionID && packetSentBy == protocol.PerspectiveClient {
|
||||||
return 0, errReceivedTruncatedConnectionID
|
return 0, errReceivedOmittedConnectionID
|
||||||
}
|
}
|
||||||
if !truncateConnectionID {
|
if !omitConnectionID {
|
||||||
connID, err := utils.LittleEndian.ReadUint64(b)
|
connID, err := utils.LittleEndian.ReadUint64(b)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, err
|
return 0, err
|
||||||
|
@ -161,9 +161,9 @@ func ParsePublicHeader(b *bytes.Reader, packetSentBy protocol.Perspective, versi
|
||||||
// return nil, errors.New("diversification nonces should only be sent by servers")
|
// return nil, errors.New("diversification nonces should only be sent by servers")
|
||||||
// }
|
// }
|
||||||
|
|
||||||
header.TruncateConnectionID = publicFlagByte&0x08 == 0
|
header.OmitConnectionID = publicFlagByte&0x08 == 0
|
||||||
if header.TruncateConnectionID && packetSentBy == protocol.PerspectiveClient {
|
if header.OmitConnectionID && packetSentBy == protocol.PerspectiveClient {
|
||||||
return nil, errReceivedTruncatedConnectionID
|
return nil, errReceivedOmittedConnectionID
|
||||||
}
|
}
|
||||||
|
|
||||||
if header.hasPacketNumber(packetSentBy) {
|
if header.hasPacketNumber(packetSentBy) {
|
||||||
|
@ -180,7 +180,7 @@ func ParsePublicHeader(b *bytes.Reader, packetSentBy protocol.Perspective, versi
|
||||||
}
|
}
|
||||||
|
|
||||||
// Connection ID
|
// Connection ID
|
||||||
if !header.TruncateConnectionID {
|
if !header.OmitConnectionID {
|
||||||
var connID uint64
|
var connID uint64
|
||||||
// always write the connection ID in little endian
|
// always write the connection ID in little endian
|
||||||
connID, err = utils.LittleEndian.ReadUint64(b)
|
connID, err = utils.LittleEndian.ReadUint64(b)
|
||||||
|
@ -266,7 +266,7 @@ func (h *PublicHeader) GetLength(pers protocol.Perspective) (protocol.ByteCount,
|
||||||
length += protocol.ByteCount(h.PacketNumberLen)
|
length += protocol.ByteCount(h.PacketNumberLen)
|
||||||
}
|
}
|
||||||
|
|
||||||
if !h.TruncateConnectionID {
|
if !h.OmitConnectionID {
|
||||||
length += 8 // 8 bytes for the connection ID
|
length += 8 // 8 bytes for the connection ID
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -13,10 +13,10 @@ import (
|
||||||
|
|
||||||
var _ = Describe("Public Header", func() {
|
var _ = Describe("Public Header", func() {
|
||||||
Context("parsing the connection ID", func() {
|
Context("parsing the connection ID", func() {
|
||||||
It("does not accept truncated connection ID as a server", func() {
|
It("does not accept an omitted connection ID as a server", func() {
|
||||||
b := bytes.NewReader([]byte{0x00, 0x01})
|
b := bytes.NewReader([]byte{0x00, 0x01})
|
||||||
_, err := PeekConnectionID(b, protocol.PerspectiveClient)
|
_, err := PeekConnectionID(b, protocol.PerspectiveClient)
|
||||||
Expect(err).To(MatchError(errReceivedTruncatedConnectionID))
|
Expect(err).To(MatchError(errReceivedOmittedConnectionID))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("gets the connection ID", func() {
|
It("gets the connection ID", func() {
|
||||||
|
@ -40,7 +40,7 @@ var _ = Describe("Public Header", func() {
|
||||||
Expect(err).To(HaveOccurred())
|
Expect(err).To(HaveOccurred())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("accepts a truncated connection ID as a client", func() {
|
It("accepts an ommitted connection ID as a client", func() {
|
||||||
b := bytes.NewReader([]byte{0x00, 0x01})
|
b := bytes.NewReader([]byte{0x00, 0x01})
|
||||||
len := b.Len()
|
len := b.Len()
|
||||||
connID, err := PeekConnectionID(b, protocol.PerspectiveServer)
|
connID, err := PeekConnectionID(b, protocol.PerspectiveServer)
|
||||||
|
@ -64,17 +64,17 @@ var _ = Describe("Public Header", func() {
|
||||||
Expect(b.Len()).To(BeZero())
|
Expect(b.Len()).To(BeZero())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("does not accept truncated connection ID as a server", func() {
|
It("does not accept an omittedd connection ID as a server", func() {
|
||||||
b := bytes.NewReader([]byte{0x00, 0x01})
|
b := bytes.NewReader([]byte{0x00, 0x01})
|
||||||
_, err := ParsePublicHeader(b, protocol.PerspectiveClient, protocol.VersionWhatever)
|
_, err := ParsePublicHeader(b, protocol.PerspectiveClient, protocol.VersionWhatever)
|
||||||
Expect(err).To(MatchError(errReceivedTruncatedConnectionID))
|
Expect(err).To(MatchError(errReceivedOmittedConnectionID))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("accepts a truncated connection ID as a client", func() {
|
It("accepts aan d connection ID as a client", func() {
|
||||||
b := bytes.NewReader([]byte{0x00, 0x01})
|
b := bytes.NewReader([]byte{0x00, 0x01})
|
||||||
hdr, err := ParsePublicHeader(b, protocol.PerspectiveServer, protocol.VersionWhatever)
|
hdr, err := ParsePublicHeader(b, protocol.PerspectiveServer, protocol.VersionWhatever)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(hdr.TruncateConnectionID).To(BeTrue())
|
Expect(hdr.OmitConnectionID).To(BeTrue())
|
||||||
Expect(hdr.ConnectionID).To(BeZero())
|
Expect(hdr.ConnectionID).To(BeZero())
|
||||||
Expect(b.Len()).To(BeZero())
|
Expect(b.Len()).To(BeZero())
|
||||||
})
|
})
|
||||||
|
@ -303,13 +303,13 @@ var _ = Describe("Public Header", func() {
|
||||||
Expect(err).To(MatchError("PublicHeader: PacketNumberLen not set"))
|
Expect(err).To(MatchError("PublicHeader: PacketNumberLen not set"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("truncates the connection ID", func() {
|
It("omits the connection ID", func() {
|
||||||
b := &bytes.Buffer{}
|
b := &bytes.Buffer{}
|
||||||
hdr := PublicHeader{
|
hdr := PublicHeader{
|
||||||
ConnectionID: 0x4cfa9f9b668619f6,
|
ConnectionID: 0x4cfa9f9b668619f6,
|
||||||
TruncateConnectionID: true,
|
OmitConnectionID: true,
|
||||||
PacketNumberLen: protocol.PacketNumberLen6,
|
PacketNumberLen: protocol.PacketNumberLen6,
|
||||||
PacketNumber: 1,
|
PacketNumber: 1,
|
||||||
}
|
}
|
||||||
err := hdr.Write(b, protocol.VersionWhatever, protocol.PerspectiveServer)
|
err := hdr.Write(b, protocol.VersionWhatever, protocol.PerspectiveServer)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
@ -450,24 +450,24 @@ var _ = Describe("Public Header", func() {
|
||||||
|
|
||||||
It("gets the lengths of a packet sent by the client with the VersionFlag set", func() {
|
It("gets the lengths of a packet sent by the client with the VersionFlag set", func() {
|
||||||
hdr := PublicHeader{
|
hdr := PublicHeader{
|
||||||
ConnectionID: 0x4cfa9f9b668619f6,
|
ConnectionID: 0x4cfa9f9b668619f6,
|
||||||
TruncateConnectionID: true,
|
OmitConnectionID: true,
|
||||||
PacketNumber: 0xDECAFBAD,
|
PacketNumber: 0xDECAFBAD,
|
||||||
PacketNumberLen: protocol.PacketNumberLen6,
|
PacketNumberLen: protocol.PacketNumberLen6,
|
||||||
VersionFlag: true,
|
VersionFlag: true,
|
||||||
VersionNumber: versionLittleEndian,
|
VersionNumber: versionLittleEndian,
|
||||||
}
|
}
|
||||||
length, err := hdr.GetLength(protocol.PerspectiveClient)
|
length, err := hdr.GetLength(protocol.PerspectiveClient)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(length).To(Equal(protocol.ByteCount(1 + 4 + 6))) // 1 byte public flag, 4 version number, and packet number
|
Expect(length).To(Equal(protocol.ByteCount(1 + 4 + 6))) // 1 byte public flag, 4 version number, and packet number
|
||||||
})
|
})
|
||||||
|
|
||||||
It("gets the length of a packet with longest packet number length and truncated connectionID", func() {
|
It("gets the length of a packet with longest packet number length and omitted connectionID", func() {
|
||||||
hdr := PublicHeader{
|
hdr := PublicHeader{
|
||||||
ConnectionID: 0x4cfa9f9b668619f6,
|
ConnectionID: 0x4cfa9f9b668619f6,
|
||||||
TruncateConnectionID: true,
|
OmitConnectionID: true,
|
||||||
PacketNumber: 0xDECAFBAD,
|
PacketNumber: 0xDECAFBAD,
|
||||||
PacketNumberLen: protocol.PacketNumberLen6,
|
PacketNumberLen: protocol.PacketNumberLen6,
|
||||||
}
|
}
|
||||||
length, err := hdr.GetLength(protocol.PerspectiveServer)
|
length, err := hdr.GetLength(protocol.PerspectiveServer)
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
|
|
@ -268,10 +268,10 @@ func (p *packetPacker) getPublicHeader(encLevel protocol.EncryptionLevel) *wire.
|
||||||
pnum := p.packetNumberGenerator.Peek()
|
pnum := p.packetNumberGenerator.Peek()
|
||||||
packetNumberLen := protocol.GetPacketNumberLengthForPublicHeader(pnum, p.leastUnacked)
|
packetNumberLen := protocol.GetPacketNumberLengthForPublicHeader(pnum, p.leastUnacked)
|
||||||
publicHeader := &wire.PublicHeader{
|
publicHeader := &wire.PublicHeader{
|
||||||
ConnectionID: p.connectionID,
|
ConnectionID: p.connectionID,
|
||||||
PacketNumber: pnum,
|
PacketNumber: pnum,
|
||||||
PacketNumberLen: packetNumberLen,
|
PacketNumberLen: packetNumberLen,
|
||||||
TruncateConnectionID: p.connParams.TruncateConnectionID(),
|
OmitConnectionID: p.connParams.OmitConnectionID(),
|
||||||
}
|
}
|
||||||
|
|
||||||
if p.perspective == protocol.PerspectiveServer && encLevel == protocol.EncryptionSecure {
|
if p.perspective == protocol.PerspectiveServer && encLevel == protocol.EncryptionSecure {
|
||||||
|
|
|
@ -62,7 +62,7 @@ var _ = Describe("Packet packer", func() {
|
||||||
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
|
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
|
||||||
mockPn.EXPECT().TruncateConnectionID().Return(false).AnyTimes()
|
mockPn.EXPECT().OmitConnectionID().Return(false).AnyTimes()
|
||||||
|
|
||||||
cryptoStream = &stream{}
|
cryptoStream = &stream{}
|
||||||
|
|
||||||
|
|
|
@ -225,7 +225,7 @@ func (s *session) setup(
|
||||||
aeadChanged,
|
aeadChanged,
|
||||||
)
|
)
|
||||||
} else {
|
} else {
|
||||||
transportParams.RequestConnectionIDTruncation = s.config.RequestConnectionIDTruncation
|
transportParams.RequestConnectionIDOmission = s.config.RequestConnectionIDOmission
|
||||||
s.cryptoSetup, s.connParams, err = newCryptoSetupClient(
|
s.cryptoSetup, s.connParams, err = newCryptoSetupClient(
|
||||||
hostname,
|
hostname,
|
||||||
s.connectionID,
|
s.connectionID,
|
||||||
|
|
|
@ -170,7 +170,7 @@ func (m *mockParamsNegotiator) GetMaxIncomingStreams() uint32 { return 100 }
|
||||||
func (m *mockParamsNegotiator) GetIdleConnectionStateLifetime() time.Duration {
|
func (m *mockParamsNegotiator) GetIdleConnectionStateLifetime() time.Duration {
|
||||||
return time.Hour
|
return time.Hour
|
||||||
}
|
}
|
||||||
func (m *mockParamsNegotiator) TruncateConnectionID() bool { return false }
|
func (m *mockParamsNegotiator) OmitConnectionID() bool { return false }
|
||||||
|
|
||||||
var _ = Describe("Session", func() {
|
var _ = Describe("Session", func() {
|
||||||
var (
|
var (
|
||||||
|
@ -1559,7 +1559,7 @@ var _ = Describe("Session", func() {
|
||||||
sess.lastNetworkActivityTime = time.Now().Add(-time.Minute)
|
sess.lastNetworkActivityTime = time.Now().Add(-time.Minute)
|
||||||
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
|
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
|
||||||
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(9999 * time.Second).AnyTimes()
|
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(9999 * time.Second).AnyTimes()
|
||||||
mockPn.EXPECT().TruncateConnectionID().Return(false).AnyTimes()
|
mockPn.EXPECT().OmitConnectionID().Return(false).AnyTimes()
|
||||||
sess.connParams = mockPn
|
sess.connParams = mockPn
|
||||||
sess.packer.connParams = mockPn
|
sess.packer.connParams = mockPn
|
||||||
// the handshake timeout is irrelevant here, since it depends on the time the session was created,
|
// the handshake timeout is irrelevant here, since it depends on the time the session was created,
|
||||||
|
@ -1576,7 +1576,7 @@ var _ = Describe("Session", func() {
|
||||||
close(aeadChanged)
|
close(aeadChanged)
|
||||||
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
|
mockPn := mocks.NewMockParamsNegotiator(mockCtrl)
|
||||||
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(0 * time.Second)
|
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(0 * time.Second)
|
||||||
mockPn.EXPECT().TruncateConnectionID().Return(false).AnyTimes()
|
mockPn.EXPECT().OmitConnectionID().Return(false).AnyTimes()
|
||||||
sess.connParams = mockPn
|
sess.connParams = mockPn
|
||||||
sess.packer.connParams = mockPn
|
sess.packer.connParams = mockPn
|
||||||
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(0 * time.Second).AnyTimes()
|
mockPn.EXPECT().GetIdleConnectionStateLifetime().Return(0 * time.Second).AnyTimes()
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue