Commit graph

554 commits

Author SHA1 Message Date
Marten Seemann
a5fc72047e simplify pruning of old ACK ranges 2020-02-21 15:46:58 +07:00
Marten Seemann
d20c1bfaed remove unused parameter from SentPacketHandler.ReceivedAck 2020-02-21 10:05:17 +07:00
Marten Seemann
29b784e782 rename packet packing functions in the packet packer 2020-02-20 16:42:58 +07:00
Marten Seemann
5aad7cae5d send coalesced packets 2020-02-20 16:42:56 +07:00
Marten Seemann
d642bf9098 simplify content storage in packed packets
It's not necessary to store both the packetBuffer and the slice
containing the raw data in the packet.
2020-02-20 16:25:54 +07:00
Marten Seemann
a4b4d52063 refactor packing of packets before and after the handshake is confirmed 2020-02-20 16:19:08 +07:00
Marten Seemann
f034e8ba19 set the LocalAddr that is used in the tls.ClientHelloInfo.Conn 2020-02-16 14:10:30 +07:00
Marten Seemann
b031615db5 export a qlog when the session's run loop stops 2020-02-12 10:42:37 +07:00
Marten Seemann
8cde4ab638 refactor how session tickets are sent
Previously, RunHandshake() would send the session tickets. Now, the
session initiates the sending of the session ticket. This simplifies the
setup a bit, and it will make it possible to include the RTT estimate in
the session ticket without accessing the RTTStats concurrently.
2020-02-10 17:42:09 +07:00
Marten Seemann
634169b061 don't return a stateless reset token when adding a new connection ID
Both server and client didn't make use of the token. It was only used by
the connIDGenerator.
2020-02-03 17:31:47 +01:00
Luke Tucker
6407f5bf68 Fix keepalive ping (#2316)
The firstAckElicitingPacketAfterIdleSendTime condition was inverted
in a recent PR, maybe just a typo.  This was causing only one ping
to be sent during periods of no activity.  The ack from the first
keepalive ping causes firstAckElicitingPacketAfterIdleSentTime
to be set to zero.  If there is no further activity, it will remain
zero and prevent further keepalive pings.
2020-01-27 11:13:54 +07:00
Marten Seemann
a93e544c94 remove Session.Close()
Session.Close() sends a transport-level error code. Applications should
not be able to call this function, but use CloseWithError() instead.
2020-01-26 17:41:53 +07:00
Marten Seemann
62d3a4166a
Merge pull request #2293 from lucas-clemente/mock-connection
use a mock connection in tests
2020-01-17 17:20:07 +07:00
Marten Seemann
5a566f2176
Merge pull request #2226 from lucas-clemente/retry-integrity
implement the retry integrity tag
2020-01-17 17:19:15 +07:00
Marten Seemann
13b2c7403d use a mock connection in the send queue tests 2020-01-17 16:51:39 +07:00
Marten Seemann
15301a7f6e use a mock connection in the session tests 2020-01-17 16:51:39 +07:00
Marten Seemann
7c9d387a69 fix session unit test that tests nothing to send 2020-01-17 16:51:39 +07:00
Marten Seemann
2c67c117f6
Merge pull request #2292 from lucas-clemente/fix-0rtt-drop-test
fix session unit test checking that the client drops 0-RTT packets
2020-01-17 16:51:01 +07:00
Marten Seemann
7b10453af8 implement the Retry integrity tag 2020-01-17 13:42:57 +07:00
Marten Seemann
eeba3951ae only enable 0-RTT when using ListenEarly and DialEarly 2020-01-17 11:22:12 +07:00
Marten Seemann
d62b4848b9 fix session unit test checking that the client drops 0-RTT packets 2020-01-11 18:11:24 +07:00
Marten Seemann
079279b9cf fix mismatching expectation of the keep alive timer
session.maybeResetTimer() and session.run() were using slightly
different definitions of when a keep-alive PING should be sent. Under
certain conditions, this would make us repeatedly set a timer for the
keep-alive, but on timer expiration no keep-alive would be sent.
2020-01-08 11:09:45 +07:00
Marten Seemann
9b0a4a8813 move unmarshaling of the transport parameters to the crypto setup 2020-01-01 18:04:01 +04:00
Marten Seemann
5acdc55c61
Merge pull request #2252 from lucas-clemente/enforce-cid-limit
enfore the active_connection_id_limit
2019-12-18 10:12:14 +04:00
Marten Seemann
355156ac4e
Merge pull request #2225 from lucas-clemente/handshake-done
implement the HANDSHAKE_DONE mechanism
2019-12-18 10:07:43 +04:00
Marten Seemann
27549c5665 use the minimum of the two peers' max_idle_timeouts 2019-12-11 14:04:33 +04:00
Marten Seemann
8dcca046e3 don't set the idle timeout timer before the handshake completes 2019-12-11 13:50:13 +04:00
Marten Seemann
12922bdec9 drop Handshake keys when receiving HANDSHAKE_DONE (as a client) 2019-12-06 10:29:48 +07:00
Marten Seemann
f7fd5d2848 drop Handshake keys as soon as the handshake completes (as a server) 2019-12-06 10:29:48 +07:00
Marten Seemann
08ec2f69fc send a HANDSHAKE_DONE frame after handshake completion (as a server) 2019-12-06 10:29:48 +07:00
Marten Seemann
3f6030fdb3 count the connection ID used during the handshake towards the limit 2019-12-03 18:25:15 +07:00
Marten Seemann
8a3bdaa19f
Merge pull request #2251 from lucas-clemente/spa
retire the connection ID sent in the preferred_address transport parameter
2019-11-30 20:30:08 +07:00
Marten Seemann
e65df402dd only create a single session when two Initials arrive at the same time 2019-11-30 20:01:51 +07:00
Marten Seemann
ee6beff7cf immediately retire the connection ID sent in the preferred_address 2019-11-30 19:56:06 +07:00
Marten Seemann
5a834851a8 route retransmissions of the client's Initial to the right session 2019-11-26 17:01:21 +07:00
Marten Seemann
e2f41304f8 don't drop handshake packets after switching to a new connection ID 2019-11-25 19:04:02 +07:00
Marten Seemann
d77e400f00 don't send application-level errors before completion of the handshake 2019-11-23 11:30:20 +07:00
Marten Seemann
f3e3def599 don't send application data probe packets before the handshake completes 2019-11-12 14:12:24 +07:00
Marten Seemann
9c3b553e47 change PTO to be per packet number space 2019-11-12 11:29:51 +07:00
Marten Seemann
3db60534cf use a sentinel error when a sealer is not yet available 2019-11-12 11:27:30 +07:00
Marten Seemann
bd94f21ab0 send keep alive PINGs at least every 20 seconds 2019-11-10 11:06:38 +07:00
Marten Seemann
312fb638be send the frame type in CONNECTION_CLOSE frames 2019-11-09 11:39:35 +07:00
Marten Seemann
6a9a591a10 use application-specific CONNECTION_CLOSE for normal termination 2019-11-08 14:22:50 +07:00
Marten Seemann
a472ac4731 use application-specific CONNECTION_CLOSE for application errors 2019-11-08 13:52:15 +07:00
Marten Seemann
04105625ae issue new connection IDs 2019-11-05 11:00:07 +07:00
Marten Seemann
35ea8213c5 move initialization of the client's transport parameters to the session 2019-11-05 11:00:06 +07:00
Marten Seemann
b64535e656 move initialization of the server's transport parameters to the session 2019-11-05 10:59:21 +07:00
Marten Seemann
90643f5756 move initialization of the client's transport parameters to the session 2019-11-05 10:59:21 +07:00
Marten Seemann
9a81603b4a remove remote closed session from the packet handler map 2019-11-05 10:59:21 +07:00
Marten Seemann
772ffd3d20 use the connection ID manager to save the destination connection ID 2019-11-05 10:59:21 +07:00