mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 12:47:36 +03:00
197 lines
7.4 KiB
Go
197 lines
7.4 KiB
Go
package handshake
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/binary"
|
|
"errors"
|
|
"fmt"
|
|
"time"
|
|
|
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
|
"github.com/lucas-clemente/quic-go/internal/utils"
|
|
"github.com/lucas-clemente/quic-go/qerr"
|
|
)
|
|
|
|
// errMalformedTag is returned when the tag value cannot be read
|
|
var errMalformedTag = qerr.Error(qerr.InvalidCryptoMessageParameter, "malformed Tag value")
|
|
|
|
// TransportParameters are parameters sent to the peer during the handshake
|
|
type TransportParameters struct {
|
|
StreamFlowControlWindow protocol.ByteCount
|
|
ConnectionFlowControlWindow protocol.ByteCount
|
|
|
|
MaxPacketSize protocol.ByteCount
|
|
|
|
MaxUniStreams uint16 // only used for IETF QUIC
|
|
MaxBidiStreams uint16 // only used for IETF QUIC
|
|
MaxStreams uint32 // only used for gQUIC
|
|
|
|
OmitConnectionID bool // only used for gQUIC
|
|
IdleTimeout time.Duration
|
|
DisableMigration bool // only used for IETF QUIC
|
|
StatelessResetToken []byte // only used for IETF QUIC
|
|
}
|
|
|
|
// readHelloMap reads the transport parameters from the tags sent in a gQUIC handshake message
|
|
func readHelloMap(tags map[Tag][]byte) (*TransportParameters, error) {
|
|
params := &TransportParameters{}
|
|
if value, ok := tags[TagTCID]; ok {
|
|
v, err := utils.LittleEndian.ReadUint32(bytes.NewBuffer(value))
|
|
if err != nil {
|
|
return nil, errMalformedTag
|
|
}
|
|
params.OmitConnectionID = (v == 0)
|
|
}
|
|
if value, ok := tags[TagMIDS]; ok {
|
|
v, err := utils.LittleEndian.ReadUint32(bytes.NewBuffer(value))
|
|
if err != nil {
|
|
return nil, errMalformedTag
|
|
}
|
|
params.MaxStreams = v
|
|
}
|
|
if value, ok := tags[TagICSL]; ok {
|
|
v, err := utils.LittleEndian.ReadUint32(bytes.NewBuffer(value))
|
|
if err != nil {
|
|
return nil, errMalformedTag
|
|
}
|
|
params.IdleTimeout = utils.MaxDuration(protocol.MinRemoteIdleTimeout, time.Duration(v)*time.Second)
|
|
}
|
|
if value, ok := tags[TagSFCW]; ok {
|
|
v, err := utils.LittleEndian.ReadUint32(bytes.NewBuffer(value))
|
|
if err != nil {
|
|
return nil, errMalformedTag
|
|
}
|
|
params.StreamFlowControlWindow = protocol.ByteCount(v)
|
|
}
|
|
if value, ok := tags[TagCFCW]; ok {
|
|
v, err := utils.LittleEndian.ReadUint32(bytes.NewBuffer(value))
|
|
if err != nil {
|
|
return nil, errMalformedTag
|
|
}
|
|
params.ConnectionFlowControlWindow = protocol.ByteCount(v)
|
|
}
|
|
return params, nil
|
|
}
|
|
|
|
// GetHelloMap gets all parameters needed for the Hello message in the gQUIC handshake.
|
|
func (p *TransportParameters) getHelloMap() map[Tag][]byte {
|
|
sfcw := bytes.NewBuffer([]byte{})
|
|
utils.LittleEndian.WriteUint32(sfcw, uint32(p.StreamFlowControlWindow))
|
|
cfcw := bytes.NewBuffer([]byte{})
|
|
utils.LittleEndian.WriteUint32(cfcw, uint32(p.ConnectionFlowControlWindow))
|
|
mids := bytes.NewBuffer([]byte{})
|
|
utils.LittleEndian.WriteUint32(mids, p.MaxStreams)
|
|
icsl := bytes.NewBuffer([]byte{})
|
|
utils.LittleEndian.WriteUint32(icsl, uint32(p.IdleTimeout/time.Second))
|
|
|
|
tags := map[Tag][]byte{
|
|
TagICSL: icsl.Bytes(),
|
|
TagMIDS: mids.Bytes(),
|
|
TagCFCW: cfcw.Bytes(),
|
|
TagSFCW: sfcw.Bytes(),
|
|
}
|
|
if p.OmitConnectionID {
|
|
tags[TagTCID] = []byte{0, 0, 0, 0}
|
|
}
|
|
return tags
|
|
}
|
|
|
|
// readTransportParameters reads the transport parameters sent in the QUIC TLS extension
|
|
func readTransportParameters(paramsList []transportParameter) (*TransportParameters, error) {
|
|
params := &TransportParameters{}
|
|
|
|
var foundIdleTimeout bool
|
|
|
|
for _, p := range paramsList {
|
|
switch p.Parameter {
|
|
case initialMaxStreamDataParameterID:
|
|
if len(p.Value) != 4 {
|
|
return nil, fmt.Errorf("wrong length for initial_max_stream_data: %d (expected 4)", len(p.Value))
|
|
}
|
|
params.StreamFlowControlWindow = protocol.ByteCount(binary.BigEndian.Uint32(p.Value))
|
|
case initialMaxDataParameterID:
|
|
if len(p.Value) != 4 {
|
|
return nil, fmt.Errorf("wrong length for initial_max_data: %d (expected 4)", len(p.Value))
|
|
}
|
|
params.ConnectionFlowControlWindow = protocol.ByteCount(binary.BigEndian.Uint32(p.Value))
|
|
case initialMaxBidiStreamsParameterID:
|
|
if len(p.Value) != 2 {
|
|
return nil, fmt.Errorf("wrong length for initial_max_stream_id_bidi: %d (expected 2)", len(p.Value))
|
|
}
|
|
params.MaxBidiStreams = binary.BigEndian.Uint16(p.Value)
|
|
case initialMaxUniStreamsParameterID:
|
|
if len(p.Value) != 2 {
|
|
return nil, fmt.Errorf("wrong length for initial_max_stream_id_uni: %d (expected 2)", len(p.Value))
|
|
}
|
|
params.MaxUniStreams = binary.BigEndian.Uint16(p.Value)
|
|
case idleTimeoutParameterID:
|
|
foundIdleTimeout = true
|
|
if len(p.Value) != 2 {
|
|
return nil, fmt.Errorf("wrong length for idle_timeout: %d (expected 2)", len(p.Value))
|
|
}
|
|
params.IdleTimeout = utils.MaxDuration(protocol.MinRemoteIdleTimeout, time.Duration(binary.BigEndian.Uint16(p.Value))*time.Second)
|
|
case maxPacketSizeParameterID:
|
|
if len(p.Value) != 2 {
|
|
return nil, fmt.Errorf("wrong length for max_packet_size: %d (expected 2)", len(p.Value))
|
|
}
|
|
maxPacketSize := protocol.ByteCount(binary.BigEndian.Uint16(p.Value))
|
|
if maxPacketSize < 1200 {
|
|
return nil, fmt.Errorf("invalid value for max_packet_size: %d (minimum 1200)", maxPacketSize)
|
|
}
|
|
params.MaxPacketSize = maxPacketSize
|
|
case disableMigrationParameterID:
|
|
if len(p.Value) != 0 {
|
|
return nil, fmt.Errorf("wrong length for disable_migration: %d (expected empty)", len(p.Value))
|
|
}
|
|
params.DisableMigration = true
|
|
case statelessResetTokenParameterID:
|
|
if len(p.Value) != 16 {
|
|
return nil, fmt.Errorf("wrong length for stateless_reset_token: %d (expected 16)", len(p.Value))
|
|
}
|
|
params.StatelessResetToken = p.Value
|
|
}
|
|
}
|
|
|
|
if !foundIdleTimeout {
|
|
return nil, errors.New("missing parameter")
|
|
}
|
|
return params, nil
|
|
}
|
|
|
|
// GetTransportParameters gets the parameters needed for the TLS handshake.
|
|
// It doesn't send the initial_max_stream_id_uni parameter, so the peer isn't allowed to open any unidirectional streams.
|
|
func (p *TransportParameters) getTransportParameters() []transportParameter {
|
|
initialMaxStreamData := make([]byte, 4)
|
|
binary.BigEndian.PutUint32(initialMaxStreamData, uint32(p.StreamFlowControlWindow))
|
|
initialMaxData := make([]byte, 4)
|
|
binary.BigEndian.PutUint32(initialMaxData, uint32(p.ConnectionFlowControlWindow))
|
|
initialMaxBidiStreamID := make([]byte, 2)
|
|
binary.BigEndian.PutUint16(initialMaxBidiStreamID, p.MaxBidiStreams)
|
|
initialMaxUniStreamID := make([]byte, 2)
|
|
binary.BigEndian.PutUint16(initialMaxUniStreamID, p.MaxUniStreams)
|
|
idleTimeout := make([]byte, 2)
|
|
binary.BigEndian.PutUint16(idleTimeout, uint16(p.IdleTimeout/time.Second))
|
|
maxPacketSize := make([]byte, 2)
|
|
binary.BigEndian.PutUint16(maxPacketSize, uint16(protocol.MaxReceivePacketSize))
|
|
params := []transportParameter{
|
|
{initialMaxStreamDataParameterID, initialMaxStreamData},
|
|
{initialMaxDataParameterID, initialMaxData},
|
|
{initialMaxBidiStreamsParameterID, initialMaxBidiStreamID},
|
|
{initialMaxUniStreamsParameterID, initialMaxUniStreamID},
|
|
{idleTimeoutParameterID, idleTimeout},
|
|
{maxPacketSizeParameterID, maxPacketSize},
|
|
}
|
|
if p.DisableMigration {
|
|
params = append(params, transportParameter{disableMigrationParameterID, nil})
|
|
}
|
|
if len(p.StatelessResetToken) > 0 {
|
|
params = append(params, transportParameter{statelessResetTokenParameterID, p.StatelessResetToken})
|
|
}
|
|
return params
|
|
}
|
|
|
|
// String returns a string representation, intended for logging.
|
|
// It should only used for IETF QUIC.
|
|
func (p *TransportParameters) String() string {
|
|
return fmt.Sprintf("&handshake.TransportParameters{StreamFlowControlWindow: %#x, ConnectionFlowControlWindow: %#x, MaxBidiStreams: %d, MaxUniStreams: %d, IdleTimeout: %s}", p.StreamFlowControlWindow, p.ConnectionFlowControlWindow, p.MaxBidiStreams, p.MaxUniStreams, p.IdleTimeout)
|
|
}
|