mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-06 13:47:35 +03:00
send connection parameters in CHLO
This commit is contained in:
parent
1ad3a85f5c
commit
f72fbc57a9
9 changed files with 150 additions and 35 deletions
|
@ -20,7 +20,10 @@ type mockConnectionParametersManager struct {
|
||||||
func (m *mockConnectionParametersManager) SetFromMap(map[handshake.Tag][]byte) error {
|
func (m *mockConnectionParametersManager) SetFromMap(map[handshake.Tag][]byte) error {
|
||||||
panic("not implemented")
|
panic("not implemented")
|
||||||
}
|
}
|
||||||
func (m *mockConnectionParametersManager) GetSHLOMap() map[handshake.Tag][]byte {
|
func (m *mockConnectionParametersManager) GetSHLOMap() (map[handshake.Tag][]byte, error) {
|
||||||
|
panic("not implemented")
|
||||||
|
}
|
||||||
|
func (m *mockConnectionParametersManager) GetCHLOMap() (map[handshake.Tag][]byte, error) {
|
||||||
panic("not implemented")
|
panic("not implemented")
|
||||||
}
|
}
|
||||||
func (m *mockConnectionParametersManager) GetSendStreamFlowControlWindow() protocol.ByteCount {
|
func (m *mockConnectionParametersManager) GetSendStreamFlowControlWindow() protocol.ByteCount {
|
||||||
|
|
|
@ -14,7 +14,8 @@ import (
|
||||||
// ConnectionParametersManager negotiates and stores the connection parameters
|
// ConnectionParametersManager negotiates and stores the connection parameters
|
||||||
type ConnectionParametersManager interface {
|
type ConnectionParametersManager interface {
|
||||||
SetFromMap(map[Tag][]byte) error
|
SetFromMap(map[Tag][]byte) error
|
||||||
GetSHLOMap() map[Tag][]byte
|
GetSHLOMap() (map[Tag][]byte, error)
|
||||||
|
GetCHLOMap() (map[Tag][]byte, error)
|
||||||
|
|
||||||
GetSendStreamFlowControlWindow() protocol.ByteCount
|
GetSendStreamFlowControlWindow() protocol.ByteCount
|
||||||
GetSendConnectionFlowControlWindow() protocol.ByteCount
|
GetSendConnectionFlowControlWindow() protocol.ByteCount
|
||||||
|
@ -29,7 +30,8 @@ type ConnectionParametersManager interface {
|
||||||
type connectionParametersManager struct {
|
type connectionParametersManager struct {
|
||||||
mutex sync.RWMutex
|
mutex sync.RWMutex
|
||||||
|
|
||||||
version protocol.VersionNumber
|
version protocol.VersionNumber
|
||||||
|
perspective protocol.Perspective
|
||||||
|
|
||||||
flowControlNegotiated bool
|
flowControlNegotiated bool
|
||||||
hasReceivedMaxIncomingDynamicStreams bool
|
hasReceivedMaxIncomingDynamicStreams bool
|
||||||
|
@ -55,8 +57,9 @@ var (
|
||||||
)
|
)
|
||||||
|
|
||||||
// NewConnectionParamatersManager creates a new connection parameters manager
|
// NewConnectionParamatersManager creates a new connection parameters manager
|
||||||
func NewConnectionParamatersManager(v protocol.VersionNumber) ConnectionParametersManager {
|
func NewConnectionParamatersManager(pers protocol.Perspective, v protocol.VersionNumber) ConnectionParametersManager {
|
||||||
return &connectionParametersManager{
|
return &connectionParametersManager{
|
||||||
|
perspective: pers,
|
||||||
version: v,
|
version: v,
|
||||||
idleConnectionStateLifetime: protocol.DefaultIdleTimeout,
|
idleConnectionStateLifetime: protocol.DefaultIdleTimeout,
|
||||||
sendStreamFlowControlWindow: protocol.InitialStreamFlowControlWindow, // can only be changed by the client
|
sendStreamFlowControlWindow: protocol.InitialStreamFlowControlWindow, // can only be changed by the client
|
||||||
|
@ -142,8 +145,13 @@ func (h *connectionParametersManager) negotiateIdleConnectionStateLifetime(clien
|
||||||
return utils.MinDuration(clientValue, protocol.MaxIdleTimeout)
|
return utils.MinDuration(clientValue, protocol.MaxIdleTimeout)
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetSHLOMap gets all values (except crypto values) needed for the SHLO
|
// GetSHLOMap gets all parameters needed for the SHLO
|
||||||
func (h *connectionParametersManager) GetSHLOMap() map[Tag][]byte {
|
// if the client sent us parameters earlier, these are the negotiated values
|
||||||
|
func (h *connectionParametersManager) GetSHLOMap() (map[Tag][]byte, error) {
|
||||||
|
if h.perspective != protocol.PerspectiveServer {
|
||||||
|
return nil, errors.New("ConnectionParametersManager BUG: GetSHLOMap should only be called for a server")
|
||||||
|
}
|
||||||
|
|
||||||
sfcw := bytes.NewBuffer([]byte{})
|
sfcw := bytes.NewBuffer([]byte{})
|
||||||
utils.WriteUint32(sfcw, uint32(h.GetReceiveStreamFlowControlWindow()))
|
utils.WriteUint32(sfcw, uint32(h.GetReceiveStreamFlowControlWindow()))
|
||||||
cfcw := bytes.NewBuffer([]byte{})
|
cfcw := bytes.NewBuffer([]byte{})
|
||||||
|
@ -166,7 +174,39 @@ func (h *connectionParametersManager) GetSHLOMap() map[Tag][]byte {
|
||||||
tags[TagMIDS] = mids.Bytes()
|
tags[TagMIDS] = mids.Bytes()
|
||||||
}
|
}
|
||||||
|
|
||||||
return tags
|
return tags, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetCHLOMap gets all parameters needed for the CHLO
|
||||||
|
// these are the values the client is suggesting to the server. The negotiation is done by the server
|
||||||
|
func (h *connectionParametersManager) GetCHLOMap() (map[Tag][]byte, error) {
|
||||||
|
if h.perspective != protocol.PerspectiveClient {
|
||||||
|
return nil, errors.New("ConnectionParametersManager BUG: GetCHLOMap should only be called for a client")
|
||||||
|
}
|
||||||
|
|
||||||
|
sfcw := bytes.NewBuffer([]byte{})
|
||||||
|
utils.WriteUint32(sfcw, uint32(protocol.InitialStreamFlowControlWindow))
|
||||||
|
cfcw := bytes.NewBuffer([]byte{})
|
||||||
|
utils.WriteUint32(cfcw, uint32(protocol.InitialConnectionFlowControlWindow))
|
||||||
|
mspc := bytes.NewBuffer([]byte{})
|
||||||
|
utils.WriteUint32(mspc, protocol.MaxStreamsPerConnection)
|
||||||
|
icsl := bytes.NewBuffer([]byte{})
|
||||||
|
utils.WriteUint32(icsl, uint32(protocol.DefaultIdleTimeout/time.Second))
|
||||||
|
|
||||||
|
tags := map[Tag][]byte{
|
||||||
|
TagICSL: icsl.Bytes(),
|
||||||
|
TagMSPC: mspc.Bytes(),
|
||||||
|
TagCFCW: cfcw.Bytes(),
|
||||||
|
TagSFCW: sfcw.Bytes(),
|
||||||
|
}
|
||||||
|
|
||||||
|
if h.version > protocol.Version34 {
|
||||||
|
mids := bytes.NewBuffer([]byte{})
|
||||||
|
utils.WriteUint32(mids, protocol.MaxIncomingDynamicStreamsPerConnection)
|
||||||
|
tags[TagMIDS] = mids.Bytes()
|
||||||
|
}
|
||||||
|
|
||||||
|
return tags, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// GetSendStreamFlowControlWindow gets the size of the stream-level flow control window for sending data
|
// GetSendStreamFlowControlWindow gets the size of the stream-level flow control window for sending data
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
package handshake
|
package handshake
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"encoding/binary"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/lucas-clemente/quic-go/protocol"
|
"github.com/lucas-clemente/quic-go/protocol"
|
||||||
|
@ -11,12 +12,13 @@ import (
|
||||||
var _ = Describe("ConnectionsParameterManager", func() {
|
var _ = Describe("ConnectionsParameterManager", func() {
|
||||||
var cpm *connectionParametersManager
|
var cpm *connectionParametersManager
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
cpm = NewConnectionParamatersManager(protocol.Version36).(*connectionParametersManager)
|
cpm = NewConnectionParamatersManager(protocol.PerspectiveServer, protocol.Version36).(*connectionParametersManager)
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("SHLO", func() {
|
Context("SHLO", func() {
|
||||||
It("returns all parameters necessary for the SHLO", func() {
|
It("returns all parameters necessary for the SHLO", func() {
|
||||||
entryMap := cpm.GetSHLOMap()
|
entryMap, err := cpm.GetSHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(entryMap).To(HaveKey(TagICSL))
|
Expect(entryMap).To(HaveKey(TagICSL))
|
||||||
Expect(entryMap).To(HaveKey(TagMSPC))
|
Expect(entryMap).To(HaveKey(TagMSPC))
|
||||||
Expect(entryMap).To(HaveKey(TagMIDS))
|
Expect(entryMap).To(HaveKey(TagMIDS))
|
||||||
|
@ -24,27 +26,31 @@ var _ = Describe("ConnectionsParameterManager", func() {
|
||||||
|
|
||||||
It("doesn't add the MaximumIncomingDynamicStreams tag for QUIC 34", func() {
|
It("doesn't add the MaximumIncomingDynamicStreams tag for QUIC 34", func() {
|
||||||
cpm.version = protocol.Version34
|
cpm.version = protocol.Version34
|
||||||
entryMap := cpm.GetSHLOMap()
|
entryMap, err := cpm.GetSHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(entryMap).ToNot(HaveKey(TagMIDS))
|
Expect(entryMap).ToNot(HaveKey(TagMIDS))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("sets the stream-level flow control windows in SHLO", func() {
|
It("sets the stream-level flow control windows in SHLO", func() {
|
||||||
cpm.receiveStreamFlowControlWindow = 0xDEADBEEF
|
cpm.receiveStreamFlowControlWindow = 0xDEADBEEF
|
||||||
entryMap := cpm.GetSHLOMap()
|
entryMap, err := cpm.GetSHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(entryMap).To(HaveKey(TagSFCW))
|
Expect(entryMap).To(HaveKey(TagSFCW))
|
||||||
Expect(entryMap[TagSFCW]).To(Equal([]byte{0xEF, 0xBE, 0xAD, 0xDE}))
|
Expect(entryMap[TagSFCW]).To(Equal([]byte{0xEF, 0xBE, 0xAD, 0xDE}))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("sets the connection-level flow control windows in SHLO", func() {
|
It("sets the connection-level flow control windows in SHLO", func() {
|
||||||
cpm.receiveConnectionFlowControlWindow = 0xDECAFBAD
|
cpm.receiveConnectionFlowControlWindow = 0xDECAFBAD
|
||||||
entryMap := cpm.GetSHLOMap()
|
entryMap, err := cpm.GetSHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(entryMap).To(HaveKey(TagCFCW))
|
Expect(entryMap).To(HaveKey(TagCFCW))
|
||||||
Expect(entryMap[TagCFCW]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE}))
|
Expect(entryMap[TagCFCW]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE}))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("sets the connection-level flow control windows in SHLO", func() {
|
It("sets the connection-level flow control windows in SHLO", func() {
|
||||||
cpm.idleConnectionStateLifetime = 0xDECAFBAD * time.Second
|
cpm.idleConnectionStateLifetime = 0xDECAFBAD * time.Second
|
||||||
entryMap := cpm.GetSHLOMap()
|
entryMap, err := cpm.GetSHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(entryMap).To(HaveKey(TagICSL))
|
Expect(entryMap).To(HaveKey(TagICSL))
|
||||||
Expect(entryMap[TagICSL]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE}))
|
Expect(entryMap[TagICSL]).To(Equal([]byte{0xAD, 0xFB, 0xCA, 0xDE}))
|
||||||
})
|
})
|
||||||
|
@ -54,16 +60,58 @@ var _ = Describe("ConnectionsParameterManager", func() {
|
||||||
Expect(val).To(BeNumerically("<", protocol.MaxStreamsPerConnection))
|
Expect(val).To(BeNumerically("<", protocol.MaxStreamsPerConnection))
|
||||||
err := cpm.SetFromMap(map[Tag][]byte{TagMSPC: []byte{byte(val), 0, 0, 0}})
|
err := cpm.SetFromMap(map[Tag][]byte{TagMSPC: []byte{byte(val), 0, 0, 0}})
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
entryMap := cpm.GetSHLOMap()
|
entryMap, err := cpm.GetSHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(entryMap[TagMSPC]).To(Equal([]byte{byte(val), 0, 0, 0}))
|
Expect(entryMap[TagMSPC]).To(Equal([]byte{byte(val), 0, 0, 0}))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("always sends its own value for the maximum incoming dynamic streams in the SHLO", func() {
|
It("always sends its own value for the maximum incoming dynamic streams in the SHLO", func() {
|
||||||
err := cpm.SetFromMap(map[Tag][]byte{TagMIDS: []byte{5, 0, 0, 0}})
|
err := cpm.SetFromMap(map[Tag][]byte{TagMIDS: []byte{5, 0, 0, 0}})
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
entryMap := cpm.GetSHLOMap()
|
entryMap, err := cpm.GetSHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
Expect(entryMap[TagMIDS]).To(Equal([]byte{byte(protocol.MaxIncomingDynamicStreamsPerConnection), 0, 0, 0}))
|
Expect(entryMap[TagMIDS]).To(Equal([]byte{byte(protocol.MaxIncomingDynamicStreamsPerConnection), 0, 0, 0}))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
It("errors if called from a client", func() {
|
||||||
|
cpm.perspective = protocol.PerspectiveClient
|
||||||
|
_, err := cpm.GetSHLOMap()
|
||||||
|
Expect(err).To(HaveOccurred())
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
|
Context("CHLO", func() {
|
||||||
|
BeforeEach(func() {
|
||||||
|
cpm.perspective = protocol.PerspectiveClient
|
||||||
|
})
|
||||||
|
|
||||||
|
It("has the right values", func() {
|
||||||
|
entryMap, err := cpm.GetCHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
Expect(entryMap).To(HaveKey(TagICSL))
|
||||||
|
Expect(binary.LittleEndian.Uint32(entryMap[TagICSL])).To(Equal(uint32(protocol.DefaultIdleTimeout / time.Second)))
|
||||||
|
Expect(entryMap).To(HaveKey(TagMSPC))
|
||||||
|
Expect(binary.LittleEndian.Uint32(entryMap[TagMSPC])).To(Equal(uint32(protocol.MaxStreamsPerConnection)))
|
||||||
|
Expect(entryMap).To(HaveKey(TagMIDS))
|
||||||
|
Expect(binary.LittleEndian.Uint32(entryMap[TagMIDS])).To(Equal(uint32(protocol.MaxIncomingDynamicStreamsPerConnection)))
|
||||||
|
Expect(entryMap).To(HaveKey(TagSFCW))
|
||||||
|
Expect(binary.LittleEndian.Uint32(entryMap[TagSFCW])).To(Equal(uint32(protocol.InitialStreamFlowControlWindow)))
|
||||||
|
Expect(entryMap).To(HaveKey(TagCFCW))
|
||||||
|
Expect(binary.LittleEndian.Uint32(entryMap[TagCFCW])).To(Equal(uint32(protocol.InitialConnectionFlowControlWindow)))
|
||||||
|
})
|
||||||
|
|
||||||
|
It("doesn't add the MIDS tag for QUIC 34", func() {
|
||||||
|
cpm.version = protocol.Version34
|
||||||
|
entryMap, err := cpm.GetCHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
Expect(entryMap).ToNot(HaveKey(TagMIDS))
|
||||||
|
})
|
||||||
|
|
||||||
|
It("errors if called from a server", func() {
|
||||||
|
cpm.perspective = protocol.PerspectiveServer
|
||||||
|
_, err := cpm.GetCHLOMap()
|
||||||
|
Expect(err).To(HaveOccurred())
|
||||||
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("Truncated connection IDs", func() {
|
Context("Truncated connection IDs", func() {
|
||||||
|
|
|
@ -40,6 +40,8 @@ type cryptoSetupClient struct {
|
||||||
receivedSecurePacket bool
|
receivedSecurePacket bool
|
||||||
secureAEAD crypto.AEAD
|
secureAEAD crypto.AEAD
|
||||||
forwardSecureAEAD crypto.AEAD
|
forwardSecureAEAD crypto.AEAD
|
||||||
|
|
||||||
|
connectionParameters ConnectionParametersManager
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ crypto.AEAD = &cryptoSetupClient{}
|
var _ crypto.AEAD = &cryptoSetupClient{}
|
||||||
|
@ -57,15 +59,16 @@ func NewCryptoSetupClient(
|
||||||
connID protocol.ConnectionID,
|
connID protocol.ConnectionID,
|
||||||
version protocol.VersionNumber,
|
version protocol.VersionNumber,
|
||||||
cryptoStream utils.Stream,
|
cryptoStream utils.Stream,
|
||||||
|
connectionParameters ConnectionParametersManager,
|
||||||
) (CryptoSetup, error) {
|
) (CryptoSetup, error) {
|
||||||
return &cryptoSetupClient{
|
return &cryptoSetupClient{
|
||||||
hostname: hostname,
|
hostname: hostname,
|
||||||
connID: connID,
|
connID: connID,
|
||||||
version: version,
|
version: version,
|
||||||
cryptoStream: cryptoStream,
|
cryptoStream: cryptoStream,
|
||||||
certManager: crypto.NewCertManager(),
|
certManager: crypto.NewCertManager(),
|
||||||
|
connectionParameters: connectionParameters,
|
||||||
keyDerivation: crypto.DeriveKeysAESGCM,
|
keyDerivation: crypto.DeriveKeysAESGCM,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -310,7 +313,10 @@ func (h *cryptoSetupClient) sendCHLO() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *cryptoSetupClient) getTags() (map[Tag][]byte, error) {
|
func (h *cryptoSetupClient) getTags() (map[Tag][]byte, error) {
|
||||||
tags := make(map[Tag][]byte)
|
tags, err := h.connectionParameters.GetCHLOMap()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
tags[TagSNI] = []byte(h.hostname)
|
tags[TagSNI] = []byte(h.hostname)
|
||||||
tags[TagPDMD] = []byte("X509")
|
tags[TagPDMD] = []byte("X509")
|
||||||
|
|
||||||
|
|
|
@ -120,7 +120,8 @@ var _ = Describe("Crypto setup", func() {
|
||||||
|
|
||||||
stream = &mockStream{}
|
stream = &mockStream{}
|
||||||
certManager = &mockCertManager{}
|
certManager = &mockCertManager{}
|
||||||
csInt, err := NewCryptoSetupClient("hostname", 0, protocol.Version36, stream)
|
version := protocol.Version36
|
||||||
|
csInt, err := NewCryptoSetupClient("hostname", 0, version, stream, NewConnectionParamatersManager(protocol.PerspectiveClient, version))
|
||||||
Expect(err).ToNot(HaveOccurred())
|
Expect(err).ToNot(HaveOccurred())
|
||||||
cs = csInt.(*cryptoSetupClient)
|
cs = csInt.(*cryptoSetupClient)
|
||||||
cs.certManager = certManager
|
cs.certManager = certManager
|
||||||
|
@ -420,6 +421,17 @@ var _ = Describe("Crypto setup", func() {
|
||||||
Expect(tags[TagCCS]).To(Equal(certManager.commonCertificateHashes))
|
Expect(tags[TagCCS]).To(Equal(certManager.commonCertificateHashes))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
It("adds the tags returned from the connectionParametersManager to the CHLO", func() {
|
||||||
|
cpmTags, err := cs.connectionParameters.GetCHLOMap()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
Expect(cpmTags).ToNot(BeEmpty())
|
||||||
|
tags, err := cs.getTags()
|
||||||
|
Expect(err).ToNot(HaveOccurred())
|
||||||
|
for t := range cpmTags {
|
||||||
|
Expect(tags).To(HaveKey(t))
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
It("doesn't send a CCS if there are no common certificate sets available", func() {
|
It("doesn't send a CCS if there are no common certificate sets available", func() {
|
||||||
certManager.commonCertificateHashes = nil
|
certManager.commonCertificateHashes = nil
|
||||||
tags, err := cs.getTags()
|
tags, err := cs.getTags()
|
||||||
|
|
|
@ -340,7 +340,10 @@ func (h *cryptoSetupServer) handleCHLO(sni string, data []byte, cryptoData map[T
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
replyMap := h.connectionParameters.GetSHLOMap()
|
replyMap, err := h.connectionParameters.GetSHLOMap()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
// add crypto parameters
|
// add crypto parameters
|
||||||
replyMap[TagPUBS] = ephermalKex.PublicKey()
|
replyMap[TagPUBS] = ephermalKex.PublicKey()
|
||||||
replyMap[TagSNO] = serverNonce
|
replyMap[TagSNO] = serverNonce
|
||||||
|
|
|
@ -171,7 +171,7 @@ var _ = Describe("Crypto setup", func() {
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
scfg.stkSource = &mockStkSource{}
|
scfg.stkSource = &mockStkSource{}
|
||||||
v := protocol.SupportedVersions[len(protocol.SupportedVersions)-1]
|
v := protocol.SupportedVersions[len(protocol.SupportedVersions)-1]
|
||||||
cpm = NewConnectionParamatersManager(protocol.VersionWhatever)
|
cpm = NewConnectionParamatersManager(protocol.PerspectiveServer, protocol.VersionWhatever)
|
||||||
csInt, err := NewCryptoSetup(protocol.ConnectionID(42), ip, v, scfg, stream, cpm, aeadChanged)
|
csInt, err := NewCryptoSetup(protocol.ConnectionID(42), ip, v, scfg, stream, cpm, aeadChanged)
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
cs = csInt.(*cryptoSetupServer)
|
cs = csInt.(*cryptoSetupServer)
|
||||||
|
|
16
session.go
16
session.go
|
@ -102,8 +102,9 @@ func newSession(conn connection, v protocol.VersionNumber, connectionID protocol
|
||||||
perspective: protocol.PerspectiveServer,
|
perspective: protocol.PerspectiveServer,
|
||||||
version: v,
|
version: v,
|
||||||
|
|
||||||
streamCallback: streamCallback,
|
streamCallback: streamCallback,
|
||||||
closeCallback: closeCallback,
|
closeCallback: closeCallback,
|
||||||
|
connectionParameters: handshake.NewConnectionParamatersManager(protocol.PerspectiveServer, v),
|
||||||
}
|
}
|
||||||
|
|
||||||
session.setup()
|
session.setup()
|
||||||
|
@ -127,8 +128,9 @@ func newClientSession(conn *net.UDPConn, addr *net.UDPAddr, hostname string, v p
|
||||||
perspective: protocol.PerspectiveClient,
|
perspective: protocol.PerspectiveClient,
|
||||||
version: v,
|
version: v,
|
||||||
|
|
||||||
streamCallback: streamCallback,
|
streamCallback: streamCallback,
|
||||||
closeCallback: closeCallback,
|
closeCallback: closeCallback,
|
||||||
|
connectionParameters: handshake.NewConnectionParamatersManager(protocol.PerspectiveClient, v),
|
||||||
}
|
}
|
||||||
|
|
||||||
session.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(session.ackAlarmChanged)
|
session.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(session.ackAlarmChanged)
|
||||||
|
@ -136,7 +138,7 @@ func newClientSession(conn *net.UDPConn, addr *net.UDPAddr, hostname string, v p
|
||||||
|
|
||||||
cryptoStream, _ := session.GetOrOpenStream(1)
|
cryptoStream, _ := session.GetOrOpenStream(1)
|
||||||
var err error
|
var err error
|
||||||
session.cryptoSetup, err = handshake.NewCryptoSetupClient(hostname, connectionID, v, cryptoStream)
|
session.cryptoSetup, err = handshake.NewCryptoSetupClient(hostname, connectionID, v, cryptoStream, session.connectionParameters)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -150,15 +152,13 @@ func newClientSession(conn *net.UDPConn, addr *net.UDPAddr, hostname string, v p
|
||||||
// setup is called from newSession and newClientSession and initializes values that are independent of the perspective
|
// setup is called from newSession and newClientSession and initializes values that are independent of the perspective
|
||||||
func (s *Session) setup() {
|
func (s *Session) setup() {
|
||||||
s.rttStats = &congestion.RTTStats{}
|
s.rttStats = &congestion.RTTStats{}
|
||||||
connectionParameters := handshake.NewConnectionParamatersManager(s.version)
|
flowControlManager := flowcontrol.NewFlowControlManager(s.connectionParameters, s.rttStats)
|
||||||
flowControlManager := flowcontrol.NewFlowControlManager(connectionParameters, s.rttStats)
|
|
||||||
|
|
||||||
var sentPacketHandler ackhandler.SentPacketHandler
|
var sentPacketHandler ackhandler.SentPacketHandler
|
||||||
sentPacketHandler = ackhandler.NewSentPacketHandler(s.rttStats)
|
sentPacketHandler = ackhandler.NewSentPacketHandler(s.rttStats)
|
||||||
|
|
||||||
now := time.Now()
|
now := time.Now()
|
||||||
|
|
||||||
s.connectionParameters = connectionParameters
|
|
||||||
s.sentPacketHandler = sentPacketHandler
|
s.sentPacketHandler = sentPacketHandler
|
||||||
s.flowControlManager = flowControlManager
|
s.flowControlManager = flowControlManager
|
||||||
s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.ackAlarmChanged)
|
s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.ackAlarmChanged)
|
||||||
|
|
|
@ -21,7 +21,10 @@ type mockConnectionParametersManager struct {
|
||||||
func (m *mockConnectionParametersManager) SetFromMap(map[handshake.Tag][]byte) error {
|
func (m *mockConnectionParametersManager) SetFromMap(map[handshake.Tag][]byte) error {
|
||||||
panic("not implemented")
|
panic("not implemented")
|
||||||
}
|
}
|
||||||
func (m *mockConnectionParametersManager) GetSHLOMap() map[handshake.Tag][]byte {
|
func (m *mockConnectionParametersManager) GetSHLOMap() (map[handshake.Tag][]byte, error) {
|
||||||
|
panic("not implemented")
|
||||||
|
}
|
||||||
|
func (m *mockConnectionParametersManager) GetCHLOMap() (map[handshake.Tag][]byte, error) {
|
||||||
panic("not implemented")
|
panic("not implemented")
|
||||||
}
|
}
|
||||||
func (m *mockConnectionParametersManager) GetSendStreamFlowControlWindow() protocol.ByteCount {
|
func (m *mockConnectionParametersManager) GetSendStreamFlowControlWindow() protocol.ByteCount {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue