mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 20:57:36 +03:00
new: support variable length quic frame padding (#10)
Add variable length QUIC frame padding support. Refactor how QUIC frames are defined in a QUIC Spec. Update documentation and examples. Added Chrome and Firefox parrots. Close #3.
This commit is contained in:
parent
5e966a9bec
commit
9d3fe2aa07
8 changed files with 1154 additions and 478 deletions
|
@ -1,118 +0,0 @@
|
|||
package quic
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"testing"
|
||||
|
||||
"github.com/gaukas/clienthellod"
|
||||
)
|
||||
|
||||
func TestQUICFramesMarshalWithCryptoData(t *testing.T) {
|
||||
resultQUICPayload, err := testQUICFrames.MarshalWithCryptoData(testCryptoFrameBytes)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to marshal QUIC frames: %v", err)
|
||||
}
|
||||
|
||||
if len(resultQUICPayload) != len(truthQUICPayload) {
|
||||
t.Fatalf("QUIC payload length mismatch: got %d, want %d. \n%x", len(resultQUICPayload), len(truthQUICPayload), resultQUICPayload)
|
||||
}
|
||||
|
||||
// verify that the crypto frames would actually assemble the original crypto data
|
||||
r := bytes.NewReader(resultQUICPayload)
|
||||
qchframes, err := clienthellod.ReadAllFrames(r)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to read QUIC frames: %v", err)
|
||||
}
|
||||
|
||||
reassembledCryptoData, err := clienthellod.ReassembleCRYPTOFrames(qchframes)
|
||||
if err != nil {
|
||||
t.Fatalf("Failed to reassemble crypto data: %v", err)
|
||||
}
|
||||
if !bytes.Equal(reassembledCryptoData, testCryptoFrameBytes) {
|
||||
t.Fatalf("Reassembled crypto data mismatch: \n%x", reassembledCryptoData)
|
||||
}
|
||||
}
|
||||
|
||||
var (
|
||||
testCryptoFrameBytes = []byte{
|
||||
0x00, 0x01, 0x02, 0x03,
|
||||
0x04, 0x05, 0x06, 0x07,
|
||||
0x08, 0x09, 0x0a, 0x0b,
|
||||
0x0c, 0x0d, 0x0e, 0x0f,
|
||||
0x10, 0x11, 0x12, 0x13,
|
||||
0x14, 0x15, 0x16, 0x17,
|
||||
0x18, 0x19, 0x1a, 0x1b,
|
||||
0x1c, 0x1d, 0x1e, 0x1f,
|
||||
0x20, 0x21, 0x22, 0x23,
|
||||
0x24, 0x25, 0x26, 0x27,
|
||||
0x28, 0x29, 0x2a, 0x2b,
|
||||
0x2c, 0x2d, 0x2e, 0x2f,
|
||||
0x30, 0x31, 0x32, 0x33,
|
||||
0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x3a, 0x3b,
|
||||
0x3c, 0x3d, 0x3e, 0x3f,
|
||||
} // 64 bytes
|
||||
|
||||
testQUICFrames = QUICFrames{
|
||||
// first 64 bytes: 01 + 63 bytes of padding
|
||||
&QUICFramePing{},
|
||||
&QUICFramePadding{Length: 63},
|
||||
// second 64 bytes: last 32 bytes of crypto frame + 29 bytes of padding
|
||||
&QUICFrameCrypto{
|
||||
Offset: 32,
|
||||
Length: 0,
|
||||
},
|
||||
&QUICFramePadding{Length: 29},
|
||||
// third 64 bytes: first 16 bytes of crypto frame + 45 bytes of padding
|
||||
&QUICFrameCrypto{
|
||||
Offset: 0,
|
||||
Length: 16,
|
||||
},
|
||||
&QUICFramePadding{Length: 45},
|
||||
// fourth 64 bytes: second 16 bytes of crypto frame + 45 bytes of padding
|
||||
&QUICFrameCrypto{
|
||||
Offset: 16,
|
||||
Length: 16,
|
||||
},
|
||||
&QUICFramePadding{Length: 45},
|
||||
}
|
||||
|
||||
truthQUICPayload = []byte{
|
||||
0x01, // ping
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // 63 bytes of padding
|
||||
0x06, 0x20, 0x20, // 3 bytes header
|
||||
0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27,
|
||||
0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f,
|
||||
0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37,
|
||||
0x38, 0x39, 0x3a, 0x3b, 0x3c, 0x3d, 0x3e, 0x3f, // 32 bytes of crypto frame
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, // 29 bytes of padding
|
||||
0x06, 0x00, 0x10, // 3 bytes header
|
||||
0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
|
||||
0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, // 16 bytes of crypto frame
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, // 45 bytes of padding
|
||||
0x06, 0x10, 0x10, // 3 bytes header
|
||||
0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17,
|
||||
0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, // 16 bytes of crypto frame
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||
0x00, 0x00, 0x00, 0x00, 0x00, // 45 bytes of padding
|
||||
}
|
||||
)
|
Loading…
Add table
Add a link
Reference in a new issue