protocol-quic 0.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- checksums.yaml.gz.sig +0 -0
- data/ext/ngtcp2/AUTHORS +44 -0
- data/ext/ngtcp2/CMakeLists.txt +431 -0
- data/ext/ngtcp2/CMakeOptions.txt +17 -0
- data/ext/ngtcp2/COPYING +22 -0
- data/ext/ngtcp2/ChangeLog +0 -0
- data/ext/ngtcp2/Makefile.am +60 -0
- data/ext/ngtcp2/NEWS +0 -0
- data/ext/ngtcp2/README +1 -0
- data/ext/ngtcp2/README.rst +258 -0
- data/ext/ngtcp2/ci/build_boringssl.sh +10 -0
- data/ext/ngtcp2/ci/build_nghttp3.sh +9 -0
- data/ext/ngtcp2/ci/build_openssl1.sh +8 -0
- data/ext/ngtcp2/ci/build_openssl1_cross.sh +9 -0
- data/ext/ngtcp2/ci/build_openssl3.sh +8 -0
- data/ext/ngtcp2/ci/build_picotls.sh +26 -0
- data/ext/ngtcp2/ci/build_wolfssl.sh +9 -0
- data/ext/ngtcp2/ci/gen-certificate.sh +8 -0
- data/ext/ngtcp2/cmake/ExtractValidFlags.cmake +31 -0
- data/ext/ngtcp2/cmake/FindCUnit.cmake +40 -0
- data/ext/ngtcp2/cmake/FindJemalloc.cmake +40 -0
- data/ext/ngtcp2/cmake/FindLibev.cmake +38 -0
- data/ext/ngtcp2/cmake/FindLibnghttp3.cmake +41 -0
- data/ext/ngtcp2/cmake/Findwolfssl.cmake +41 -0
- data/ext/ngtcp2/cmake/Version.cmake +11 -0
- data/ext/ngtcp2/cmakeconfig.h.in +36 -0
- data/ext/ngtcp2/configure.ac +755 -0
- data/ext/ngtcp2/crypto/CMakeLists.txt +56 -0
- data/ext/ngtcp2/crypto/Makefile.am +49 -0
- data/ext/ngtcp2/crypto/boringssl/CMakeLists.txt +64 -0
- data/ext/ngtcp2/crypto/boringssl/Makefile.am +39 -0
- data/ext/ngtcp2/crypto/boringssl/boringssl.c +630 -0
- data/ext/ngtcp2/crypto/boringssl/libngtcp2_crypto_boringssl.pc.in +33 -0
- data/ext/ngtcp2/crypto/gnutls/CMakeLists.txt +86 -0
- data/ext/ngtcp2/crypto/gnutls/Makefile.am +43 -0
- data/ext/ngtcp2/crypto/gnutls/gnutls.c +644 -0
- data/ext/ngtcp2/crypto/gnutls/libngtcp2_crypto_gnutls.pc.in +33 -0
- data/ext/ngtcp2/crypto/includes/CMakeLists.txt +56 -0
- data/ext/ngtcp2/crypto/includes/Makefile.am +45 -0
- data/ext/ngtcp2/crypto/includes/ngtcp2/ngtcp2_crypto.h +893 -0
- data/ext/ngtcp2/crypto/includes/ngtcp2/ngtcp2_crypto_boringssl.h +104 -0
- data/ext/ngtcp2/crypto/includes/ngtcp2/ngtcp2_crypto_gnutls.h +107 -0
- data/ext/ngtcp2/crypto/includes/ngtcp2/ngtcp2_crypto_openssl.h +132 -0
- data/ext/ngtcp2/crypto/includes/ngtcp2/ngtcp2_crypto_picotls.h +246 -0
- data/ext/ngtcp2/crypto/includes/ngtcp2/ngtcp2_crypto_wolfssl.h +106 -0
- data/ext/ngtcp2/crypto/openssl/CMakeLists.txt +86 -0
- data/ext/ngtcp2/crypto/openssl/Makefile.am +43 -0
- data/ext/ngtcp2/crypto/openssl/libngtcp2_crypto_openssl.pc.in +33 -0
- data/ext/ngtcp2/crypto/openssl/openssl.c +807 -0
- data/ext/ngtcp2/crypto/picotls/CMakeLists.txt +65 -0
- data/ext/ngtcp2/crypto/picotls/Makefile.am +39 -0
- data/ext/ngtcp2/crypto/picotls/libngtcp2_crypto_picotls.pc.in +33 -0
- data/ext/ngtcp2/crypto/picotls/picotls.c +707 -0
- data/ext/ngtcp2/crypto/shared.c +1431 -0
- data/ext/ngtcp2/crypto/shared.h +350 -0
- data/ext/ngtcp2/crypto/wolfssl/CMakeLists.txt +84 -0
- data/ext/ngtcp2/crypto/wolfssl/Makefile.am +43 -0
- data/ext/ngtcp2/crypto/wolfssl/libngtcp2_crypto_wolfssl.pc.in +33 -0
- data/ext/ngtcp2/crypto/wolfssl/wolfssl.c +534 -0
- data/ext/ngtcp2/doc/Makefile.am +65 -0
- data/ext/ngtcp2/doc/make.bat +35 -0
- data/ext/ngtcp2/doc/mkapiref.py +356 -0
- data/ext/ngtcp2/doc/source/conf.py.in +94 -0
- data/ext/ngtcp2/doc/source/index.rst +22 -0
- data/ext/ngtcp2/doc/source/programmers-guide.rst +476 -0
- data/ext/ngtcp2/docker/Dockerfile +39 -0
- data/ext/ngtcp2/examples/CMakeLists.txt +361 -0
- data/ext/ngtcp2/examples/Makefile.am +228 -0
- data/ext/ngtcp2/examples/client.cc +3049 -0
- data/ext/ngtcp2/examples/client.h +192 -0
- data/ext/ngtcp2/examples/client_base.cc +202 -0
- data/ext/ngtcp2/examples/client_base.h +213 -0
- data/ext/ngtcp2/examples/debug.cc +298 -0
- data/ext/ngtcp2/examples/debug.h +124 -0
- data/ext/ngtcp2/examples/examplestest.cc +84 -0
- data/ext/ngtcp2/examples/gtlssimpleclient.c +720 -0
- data/ext/ngtcp2/examples/h09client.cc +2601 -0
- data/ext/ngtcp2/examples/h09client.h +196 -0
- data/ext/ngtcp2/examples/h09server.cc +3024 -0
- data/ext/ngtcp2/examples/h09server.h +237 -0
- data/ext/ngtcp2/examples/http.cc +138 -0
- data/ext/ngtcp2/examples/http.h +44 -0
- data/ext/ngtcp2/examples/network.h +80 -0
- data/ext/ngtcp2/examples/server.cc +3731 -0
- data/ext/ngtcp2/examples/server.h +256 -0
- data/ext/ngtcp2/examples/server_base.cc +58 -0
- data/ext/ngtcp2/examples/server_base.h +195 -0
- data/ext/ngtcp2/examples/shared.cc +385 -0
- data/ext/ngtcp2/examples/shared.h +96 -0
- data/ext/ngtcp2/examples/simpleclient.c +683 -0
- data/ext/ngtcp2/examples/template.h +71 -0
- data/ext/ngtcp2/examples/tests/README.rst +60 -0
- data/ext/ngtcp2/examples/tests/__init__.py +0 -0
- data/ext/ngtcp2/examples/tests/config.ini.in +32 -0
- data/ext/ngtcp2/examples/tests/conftest.py +28 -0
- data/ext/ngtcp2/examples/tests/ngtcp2test/__init__.py +6 -0
- data/ext/ngtcp2/examples/tests/ngtcp2test/certs.py +476 -0
- data/ext/ngtcp2/examples/tests/ngtcp2test/client.py +187 -0
- data/ext/ngtcp2/examples/tests/ngtcp2test/env.py +191 -0
- data/ext/ngtcp2/examples/tests/ngtcp2test/log.py +101 -0
- data/ext/ngtcp2/examples/tests/ngtcp2test/server.py +137 -0
- data/ext/ngtcp2/examples/tests/ngtcp2test/tls.py +983 -0
- data/ext/ngtcp2/examples/tests/test_01_handshake.py +30 -0
- data/ext/ngtcp2/examples/tests/test_02_resume.py +46 -0
- data/ext/ngtcp2/examples/tests/test_03_earlydata.py +56 -0
- data/ext/ngtcp2/examples/tests/test_04_clientcert.py +57 -0
- data/ext/ngtcp2/examples/tests/test_05_ciphers.py +46 -0
- data/ext/ngtcp2/examples/tls_client_context.h +52 -0
- data/ext/ngtcp2/examples/tls_client_context_boringssl.cc +126 -0
- data/ext/ngtcp2/examples/tls_client_context_boringssl.h +49 -0
- data/ext/ngtcp2/examples/tls_client_context_gnutls.cc +74 -0
- data/ext/ngtcp2/examples/tls_client_context_gnutls.h +50 -0
- data/ext/ngtcp2/examples/tls_client_context_openssl.cc +137 -0
- data/ext/ngtcp2/examples/tls_client_context_openssl.h +49 -0
- data/ext/ngtcp2/examples/tls_client_context_picotls.cc +158 -0
- data/ext/ngtcp2/examples/tls_client_context_picotls.h +53 -0
- data/ext/ngtcp2/examples/tls_client_context_wolfssl.cc +177 -0
- data/ext/ngtcp2/examples/tls_client_context_wolfssl.h +51 -0
- data/ext/ngtcp2/examples/tls_client_session.h +52 -0
- data/ext/ngtcp2/examples/tls_client_session_boringssl.cc +110 -0
- data/ext/ngtcp2/examples/tls_client_session_boringssl.h +52 -0
- data/ext/ngtcp2/examples/tls_client_session_gnutls.cc +190 -0
- data/ext/ngtcp2/examples/tls_client_session_gnutls.h +52 -0
- data/ext/ngtcp2/examples/tls_client_session_openssl.cc +113 -0
- data/ext/ngtcp2/examples/tls_client_session_openssl.h +52 -0
- data/ext/ngtcp2/examples/tls_client_session_picotls.cc +147 -0
- data/ext/ngtcp2/examples/tls_client_session_picotls.h +52 -0
- data/ext/ngtcp2/examples/tls_client_session_wolfssl.cc +160 -0
- data/ext/ngtcp2/examples/tls_client_session_wolfssl.h +52 -0
- data/ext/ngtcp2/examples/tls_server_context.h +52 -0
- data/ext/ngtcp2/examples/tls_server_context_boringssl.cc +257 -0
- data/ext/ngtcp2/examples/tls_server_context_boringssl.h +54 -0
- data/ext/ngtcp2/examples/tls_server_context_gnutls.cc +99 -0
- data/ext/ngtcp2/examples/tls_server_context_gnutls.h +59 -0
- data/ext/ngtcp2/examples/tls_server_context_openssl.cc +338 -0
- data/ext/ngtcp2/examples/tls_server_context_openssl.h +54 -0
- data/ext/ngtcp2/examples/tls_server_context_picotls.cc +321 -0
- data/ext/ngtcp2/examples/tls_server_context_picotls.h +58 -0
- data/ext/ngtcp2/examples/tls_server_context_wolfssl.cc +284 -0
- data/ext/ngtcp2/examples/tls_server_context_wolfssl.h +55 -0
- data/ext/ngtcp2/examples/tls_server_session.h +52 -0
- data/ext/ngtcp2/examples/tls_server_session_boringssl.cc +84 -0
- data/ext/ngtcp2/examples/tls_server_session_boringssl.h +47 -0
- data/ext/ngtcp2/examples/tls_server_session_gnutls.cc +155 -0
- data/ext/ngtcp2/examples/tls_server_session_gnutls.h +46 -0
- data/ext/ngtcp2/examples/tls_server_session_openssl.cc +54 -0
- data/ext/ngtcp2/examples/tls_server_session_openssl.h +47 -0
- data/ext/ngtcp2/examples/tls_server_session_picotls.cc +70 -0
- data/ext/ngtcp2/examples/tls_server_session_picotls.h +47 -0
- data/ext/ngtcp2/examples/tls_server_session_wolfssl.cc +55 -0
- data/ext/ngtcp2/examples/tls_server_session_wolfssl.h +47 -0
- data/ext/ngtcp2/examples/tls_session_base_gnutls.cc +87 -0
- data/ext/ngtcp2/examples/tls_session_base_gnutls.h +51 -0
- data/ext/ngtcp2/examples/tls_session_base_openssl.cc +54 -0
- data/ext/ngtcp2/examples/tls_session_base_openssl.h +52 -0
- data/ext/ngtcp2/examples/tls_session_base_picotls.cc +56 -0
- data/ext/ngtcp2/examples/tls_session_base_picotls.h +54 -0
- data/ext/ngtcp2/examples/tls_session_base_wolfssl.cc +54 -0
- data/ext/ngtcp2/examples/tls_session_base_wolfssl.h +54 -0
- data/ext/ngtcp2/examples/tls_shared_picotls.cc +59 -0
- data/ext/ngtcp2/examples/tls_shared_picotls.h +36 -0
- data/ext/ngtcp2/examples/util.cc +646 -0
- data/ext/ngtcp2/examples/util.h +361 -0
- data/ext/ngtcp2/examples/util_gnutls.cc +136 -0
- data/ext/ngtcp2/examples/util_openssl.cc +131 -0
- data/ext/ngtcp2/examples/util_test.cc +237 -0
- data/ext/ngtcp2/examples/util_test.h +45 -0
- data/ext/ngtcp2/examples/util_wolfssl.cc +130 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/ack +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/ack_ecn +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/connection_close +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/crypto +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/data_blocked +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/datagram +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/datagram_len +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/max_data +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/max_stream_data +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/max_streams +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/new_connection_id +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/new_token +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/path_challenge +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/path_response +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/reset_stream +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/retire_connection_id +1 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/stop_sending +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/stream +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/stream_data_blocked +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/stream_len +0 -0
- data/ext/ngtcp2/fuzz/corpus/decode_frame/streams_blocked +0 -0
- data/ext/ngtcp2/fuzz/corpus/ksl/random +0 -0
- data/ext/ngtcp2/fuzz/decode_frame.cc +25 -0
- data/ext/ngtcp2/fuzz/ksl.cc +77 -0
- data/ext/ngtcp2/interop/Dockerfile +39 -0
- data/ext/ngtcp2/interop/run_endpoint.sh +93 -0
- data/ext/ngtcp2/lib/CMakeLists.txt +110 -0
- data/ext/ngtcp2/lib/Makefile.am +122 -0
- data/ext/ngtcp2/lib/includes/CMakeLists.txt +4 -0
- data/ext/ngtcp2/lib/includes/Makefile.am +25 -0
- data/ext/ngtcp2/lib/includes/ngtcp2/ngtcp2.h +5843 -0
- data/ext/ngtcp2/lib/includes/ngtcp2/version.h.in +51 -0
- data/ext/ngtcp2/lib/libngtcp2.pc.in +33 -0
- data/ext/ngtcp2/lib/ngtcp2_acktr.c +335 -0
- data/ext/ngtcp2/lib/ngtcp2_acktr.h +221 -0
- data/ext/ngtcp2/lib/ngtcp2_addr.c +117 -0
- data/ext/ngtcp2/lib/ngtcp2_addr.h +69 -0
- data/ext/ngtcp2/lib/ngtcp2_balloc.c +90 -0
- data/ext/ngtcp2/lib/ngtcp2_balloc.h +91 -0
- data/ext/ngtcp2/lib/ngtcp2_bbr.c +693 -0
- data/ext/ngtcp2/lib/ngtcp2_bbr.h +157 -0
- data/ext/ngtcp2/lib/ngtcp2_bbr2.c +1490 -0
- data/ext/ngtcp2/lib/ngtcp2_bbr2.h +149 -0
- data/ext/ngtcp2/lib/ngtcp2_buf.c +56 -0
- data/ext/ngtcp2/lib/ngtcp2_buf.h +108 -0
- data/ext/ngtcp2/lib/ngtcp2_cc.c +616 -0
- data/ext/ngtcp2/lib/ngtcp2_cc.h +422 -0
- data/ext/ngtcp2/lib/ngtcp2_cid.c +147 -0
- data/ext/ngtcp2/lib/ngtcp2_cid.h +175 -0
- data/ext/ngtcp2/lib/ngtcp2_conn.c +13731 -0
- data/ext/ngtcp2/lib/ngtcp2_conn.h +1119 -0
- data/ext/ngtcp2/lib/ngtcp2_conn_stat.h +131 -0
- data/ext/ngtcp2/lib/ngtcp2_conv.c +291 -0
- data/ext/ngtcp2/lib/ngtcp2_conv.h +208 -0
- data/ext/ngtcp2/lib/ngtcp2_crypto.c +895 -0
- data/ext/ngtcp2/lib/ngtcp2_crypto.h +148 -0
- data/ext/ngtcp2/lib/ngtcp2_err.c +154 -0
- data/ext/ngtcp2/lib/ngtcp2_err.h +34 -0
- data/ext/ngtcp2/lib/ngtcp2_gaptr.c +167 -0
- data/ext/ngtcp2/lib/ngtcp2_gaptr.h +98 -0
- data/ext/ngtcp2/lib/ngtcp2_idtr.c +79 -0
- data/ext/ngtcp2/lib/ngtcp2_idtr.h +89 -0
- data/ext/ngtcp2/lib/ngtcp2_ksl.c +819 -0
- data/ext/ngtcp2/lib/ngtcp2_ksl.h +345 -0
- data/ext/ngtcp2/lib/ngtcp2_log.c +822 -0
- data/ext/ngtcp2/lib/ngtcp2_log.h +123 -0
- data/ext/ngtcp2/lib/ngtcp2_macro.h +58 -0
- data/ext/ngtcp2/lib/ngtcp2_map.c +336 -0
- data/ext/ngtcp2/lib/ngtcp2_map.h +136 -0
- data/ext/ngtcp2/lib/ngtcp2_mem.c +113 -0
- data/ext/ngtcp2/lib/ngtcp2_mem.h +72 -0
- data/ext/ngtcp2/lib/ngtcp2_net.h +136 -0
- data/ext/ngtcp2/lib/ngtcp2_objalloc.c +40 -0
- data/ext/ngtcp2/lib/ngtcp2_objalloc.h +140 -0
- data/ext/ngtcp2/lib/ngtcp2_opl.c +46 -0
- data/ext/ngtcp2/lib/ngtcp2_opl.h +65 -0
- data/ext/ngtcp2/lib/ngtcp2_path.c +77 -0
- data/ext/ngtcp2/lib/ngtcp2_path.h +49 -0
- data/ext/ngtcp2/lib/ngtcp2_pkt.c +2527 -0
- data/ext/ngtcp2/lib/ngtcp2_pkt.h +1235 -0
- data/ext/ngtcp2/lib/ngtcp2_pmtud.c +160 -0
- data/ext/ngtcp2/lib/ngtcp2_pmtud.h +123 -0
- data/ext/ngtcp2/lib/ngtcp2_ppe.c +230 -0
- data/ext/ngtcp2/lib/ngtcp2_ppe.h +153 -0
- data/ext/ngtcp2/lib/ngtcp2_pq.c +164 -0
- data/ext/ngtcp2/lib/ngtcp2_pq.h +126 -0
- data/ext/ngtcp2/lib/ngtcp2_pv.c +172 -0
- data/ext/ngtcp2/lib/ngtcp2_pv.h +194 -0
- data/ext/ngtcp2/lib/ngtcp2_qlog.c +1219 -0
- data/ext/ngtcp2/lib/ngtcp2_qlog.h +161 -0
- data/ext/ngtcp2/lib/ngtcp2_range.c +61 -0
- data/ext/ngtcp2/lib/ngtcp2_range.h +80 -0
- data/ext/ngtcp2/lib/ngtcp2_rcvry.h +40 -0
- data/ext/ngtcp2/lib/ngtcp2_ringbuf.c +121 -0
- data/ext/ngtcp2/lib/ngtcp2_ringbuf.h +132 -0
- data/ext/ngtcp2/lib/ngtcp2_rob.c +319 -0
- data/ext/ngtcp2/lib/ngtcp2_rob.h +197 -0
- data/ext/ngtcp2/lib/ngtcp2_rst.c +138 -0
- data/ext/ngtcp2/lib/ngtcp2_rst.h +86 -0
- data/ext/ngtcp2/lib/ngtcp2_rtb.c +1676 -0
- data/ext/ngtcp2/lib/ngtcp2_rtb.h +468 -0
- data/ext/ngtcp2/lib/ngtcp2_str.c +233 -0
- data/ext/ngtcp2/lib/ngtcp2_str.h +94 -0
- data/ext/ngtcp2/lib/ngtcp2_strm.c +698 -0
- data/ext/ngtcp2/lib/ngtcp2_strm.h +310 -0
- data/ext/ngtcp2/lib/ngtcp2_unreachable.c +71 -0
- data/ext/ngtcp2/lib/ngtcp2_unreachable.h +46 -0
- data/ext/ngtcp2/lib/ngtcp2_vec.c +243 -0
- data/ext/ngtcp2/lib/ngtcp2_vec.h +120 -0
- data/ext/ngtcp2/lib/ngtcp2_version.c +39 -0
- data/ext/ngtcp2/lib/ngtcp2_window_filter.c +99 -0
- data/ext/ngtcp2/lib/ngtcp2_window_filter.h +65 -0
- data/ext/ngtcp2/m4/ax_check_compile_flag.m4 +74 -0
- data/ext/ngtcp2/m4/ax_cxx_compile_stdcxx.m4 +1009 -0
- data/ext/ngtcp2/tests/CMakeLists.txt +68 -0
- data/ext/ngtcp2/tests/Makefile.am +94 -0
- data/ext/ngtcp2/tests/main.c +358 -0
- data/ext/ngtcp2/tests/ngtcp2_acktr_test.c +367 -0
- data/ext/ngtcp2/tests/ngtcp2_acktr_test.h +37 -0
- data/ext/ngtcp2/tests/ngtcp2_conn_test.c +9821 -0
- data/ext/ngtcp2/tests/ngtcp2_conn_test.h +104 -0
- data/ext/ngtcp2/tests/ngtcp2_conv_test.c +430 -0
- data/ext/ngtcp2/tests/ngtcp2_conv_test.h +46 -0
- data/ext/ngtcp2/tests/ngtcp2_crypto_test.c +667 -0
- data/ext/ngtcp2/tests/ngtcp2_crypto_test.h +35 -0
- data/ext/ngtcp2/tests/ngtcp2_gaptr_test.c +127 -0
- data/ext/ngtcp2/tests/ngtcp2_gaptr_test.h +36 -0
- data/ext/ngtcp2/tests/ngtcp2_idtr_test.c +79 -0
- data/ext/ngtcp2/tests/ngtcp2_idtr_test.h +34 -0
- data/ext/ngtcp2/tests/ngtcp2_ksl_test.c +502 -0
- data/ext/ngtcp2/tests/ngtcp2_ksl_test.h +39 -0
- data/ext/ngtcp2/tests/ngtcp2_map_test.c +206 -0
- data/ext/ngtcp2/tests/ngtcp2_map_test.h +38 -0
- data/ext/ngtcp2/tests/ngtcp2_pkt_test.c +1645 -0
- data/ext/ngtcp2/tests/ngtcp2_pkt_test.h +68 -0
- data/ext/ngtcp2/tests/ngtcp2_pmtud_test.c +153 -0
- data/ext/ngtcp2/tests/ngtcp2_pmtud_test.h +34 -0
- data/ext/ngtcp2/tests/ngtcp2_pv_test.c +129 -0
- data/ext/ngtcp2/tests/ngtcp2_pv_test.h +35 -0
- data/ext/ngtcp2/tests/ngtcp2_range_test.c +105 -0
- data/ext/ngtcp2/tests/ngtcp2_range_test.h +36 -0
- data/ext/ngtcp2/tests/ngtcp2_ringbuf_test.c +91 -0
- data/ext/ngtcp2/tests/ngtcp2_ringbuf_test.h +35 -0
- data/ext/ngtcp2/tests/ngtcp2_rob_test.c +552 -0
- data/ext/ngtcp2/tests/ngtcp2_rob_test.h +37 -0
- data/ext/ngtcp2/tests/ngtcp2_rtb_test.c +470 -0
- data/ext/ngtcp2/tests/ngtcp2_rtb_test.h +38 -0
- data/ext/ngtcp2/tests/ngtcp2_str_test.c +96 -0
- data/ext/ngtcp2/tests/ngtcp2_str_test.h +36 -0
- data/ext/ngtcp2/tests/ngtcp2_strm_test.c +575 -0
- data/ext/ngtcp2/tests/ngtcp2_strm_test.h +36 -0
- data/ext/ngtcp2/tests/ngtcp2_test_helper.c +404 -0
- data/ext/ngtcp2/tests/ngtcp2_test_helper.h +191 -0
- data/ext/ngtcp2/tests/ngtcp2_vec_test.c +426 -0
- data/ext/ngtcp2/tests/ngtcp2_vec_test.h +36 -0
- data/ext/ngtcp2/third-party/CMakeLists.txt +34 -0
- data/ext/ngtcp2/third-party/Makefile.am +31 -0
- data/ext/ngtcp2/third-party/http-parser/AUTHORS +68 -0
- data/ext/ngtcp2/third-party/http-parser/LICENSE-MIT +23 -0
- data/ext/ngtcp2/third-party/http-parser/Makefile +157 -0
- data/ext/ngtcp2/third-party/http-parser/README.md +246 -0
- data/ext/ngtcp2/third-party/http-parser/bench.c +111 -0
- data/ext/ngtcp2/third-party/http-parser/contrib/parsertrace.c +160 -0
- data/ext/ngtcp2/third-party/http-parser/contrib/url_parser.c +47 -0
- data/ext/ngtcp2/third-party/http-parser/http_parser.c +2419 -0
- data/ext/ngtcp2/third-party/http-parser/http_parser.gyp +111 -0
- data/ext/ngtcp2/third-party/http-parser/http_parser.h +431 -0
- data/ext/ngtcp2/third-party/http-parser/test.c +4411 -0
- data/lib/protocol/quic/version.rb +10 -0
- data/lib/protocol/quic.rb +9 -0
- data/license.md +21 -0
- data.tar.gz.sig +1 -0
- metadata +424 -0
- metadata.gz.sig +1 -0
|
@@ -0,0 +1,2601 @@
|
|
|
1
|
+
/*
|
|
2
|
+
* ngtcp2
|
|
3
|
+
*
|
|
4
|
+
* Copyright (c) 2017 ngtcp2 contributors
|
|
5
|
+
*
|
|
6
|
+
* Permission is hereby granted, free of charge, to any person obtaining
|
|
7
|
+
* a copy of this software and associated documentation files (the
|
|
8
|
+
* "Software"), to deal in the Software without restriction, including
|
|
9
|
+
* without limitation the rights to use, copy, modify, merge, publish,
|
|
10
|
+
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
11
|
+
* permit persons to whom the Software is furnished to do so, subject to
|
|
12
|
+
* the following conditions:
|
|
13
|
+
*
|
|
14
|
+
* The above copyright notice and this permission notice shall be
|
|
15
|
+
* included in all copies or substantial portions of the Software.
|
|
16
|
+
*
|
|
17
|
+
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
18
|
+
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
19
|
+
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
20
|
+
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
21
|
+
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
22
|
+
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
23
|
+
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
24
|
+
*/
|
|
25
|
+
#include <cstdlib>
|
|
26
|
+
#include <cassert>
|
|
27
|
+
#include <cerrno>
|
|
28
|
+
#include <iostream>
|
|
29
|
+
#include <algorithm>
|
|
30
|
+
#include <memory>
|
|
31
|
+
#include <fstream>
|
|
32
|
+
#include <iomanip>
|
|
33
|
+
|
|
34
|
+
#include <unistd.h>
|
|
35
|
+
#include <getopt.h>
|
|
36
|
+
#include <sys/types.h>
|
|
37
|
+
#include <sys/stat.h>
|
|
38
|
+
#include <fcntl.h>
|
|
39
|
+
#include <sys/socket.h>
|
|
40
|
+
#include <netdb.h>
|
|
41
|
+
#include <sys/mman.h>
|
|
42
|
+
|
|
43
|
+
#include <http-parser/http_parser.h>
|
|
44
|
+
|
|
45
|
+
#include "h09client.h"
|
|
46
|
+
#include "network.h"
|
|
47
|
+
#include "debug.h"
|
|
48
|
+
#include "util.h"
|
|
49
|
+
#include "shared.h"
|
|
50
|
+
|
|
51
|
+
using namespace ngtcp2;
|
|
52
|
+
using namespace std::literals;
|
|
53
|
+
|
|
54
|
+
namespace {
|
|
55
|
+
auto randgen = util::make_mt19937();
|
|
56
|
+
} // namespace
|
|
57
|
+
|
|
58
|
+
namespace {
|
|
59
|
+
constexpr size_t max_preferred_versionslen = 4;
|
|
60
|
+
} // namespace
|
|
61
|
+
|
|
62
|
+
Config config{};
|
|
63
|
+
|
|
64
|
+
Stream::Stream(const Request &req, int64_t stream_id)
|
|
65
|
+
: req(req), stream_id(stream_id), fd(-1) {
|
|
66
|
+
nghttp3_buf_init(&reqbuf);
|
|
67
|
+
}
|
|
68
|
+
|
|
69
|
+
Stream::~Stream() {
|
|
70
|
+
if (fd != -1) {
|
|
71
|
+
close(fd);
|
|
72
|
+
}
|
|
73
|
+
}
|
|
74
|
+
|
|
75
|
+
int Stream::open_file(const std::string_view &path) {
|
|
76
|
+
assert(fd == -1);
|
|
77
|
+
|
|
78
|
+
std::string_view filename;
|
|
79
|
+
|
|
80
|
+
auto it = std::find(std::rbegin(path), std::rend(path), '/').base();
|
|
81
|
+
if (it == std::end(path)) {
|
|
82
|
+
filename = "index.html"sv;
|
|
83
|
+
} else {
|
|
84
|
+
filename = std::string_view{it, static_cast<size_t>(std::end(path) - it)};
|
|
85
|
+
if (filename == ".."sv || filename == "."sv) {
|
|
86
|
+
std::cerr << "Invalid file name: " << filename << std::endl;
|
|
87
|
+
return -1;
|
|
88
|
+
}
|
|
89
|
+
}
|
|
90
|
+
|
|
91
|
+
auto fname = std::string{config.download};
|
|
92
|
+
fname += '/';
|
|
93
|
+
fname += filename;
|
|
94
|
+
|
|
95
|
+
fd = open(fname.c_str(), O_WRONLY | O_CREAT | O_TRUNC,
|
|
96
|
+
S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH);
|
|
97
|
+
if (fd == -1) {
|
|
98
|
+
std::cerr << "open: Could not open file " << fname << ": "
|
|
99
|
+
<< strerror(errno) << std::endl;
|
|
100
|
+
return -1;
|
|
101
|
+
}
|
|
102
|
+
|
|
103
|
+
return 0;
|
|
104
|
+
}
|
|
105
|
+
|
|
106
|
+
namespace {
|
|
107
|
+
void writecb(struct ev_loop *loop, ev_io *w, int revents) {
|
|
108
|
+
auto c = static_cast<Client *>(w->data);
|
|
109
|
+
|
|
110
|
+
c->on_write();
|
|
111
|
+
}
|
|
112
|
+
} // namespace
|
|
113
|
+
|
|
114
|
+
namespace {
|
|
115
|
+
void readcb(struct ev_loop *loop, ev_io *w, int revents) {
|
|
116
|
+
auto ep = static_cast<Endpoint *>(w->data);
|
|
117
|
+
auto c = ep->client;
|
|
118
|
+
|
|
119
|
+
if (c->on_read(*ep) != 0) {
|
|
120
|
+
return;
|
|
121
|
+
}
|
|
122
|
+
|
|
123
|
+
c->on_write();
|
|
124
|
+
}
|
|
125
|
+
} // namespace
|
|
126
|
+
|
|
127
|
+
namespace {
|
|
128
|
+
void timeoutcb(struct ev_loop *loop, ev_timer *w, int revents) {
|
|
129
|
+
int rv;
|
|
130
|
+
auto c = static_cast<Client *>(w->data);
|
|
131
|
+
|
|
132
|
+
rv = c->handle_expiry();
|
|
133
|
+
if (rv != 0) {
|
|
134
|
+
return;
|
|
135
|
+
}
|
|
136
|
+
|
|
137
|
+
c->on_write();
|
|
138
|
+
}
|
|
139
|
+
} // namespace
|
|
140
|
+
|
|
141
|
+
namespace {
|
|
142
|
+
void change_local_addrcb(struct ev_loop *loop, ev_timer *w, int revents) {
|
|
143
|
+
auto c = static_cast<Client *>(w->data);
|
|
144
|
+
|
|
145
|
+
c->change_local_addr();
|
|
146
|
+
}
|
|
147
|
+
} // namespace
|
|
148
|
+
|
|
149
|
+
namespace {
|
|
150
|
+
void key_updatecb(struct ev_loop *loop, ev_timer *w, int revents) {
|
|
151
|
+
auto c = static_cast<Client *>(w->data);
|
|
152
|
+
|
|
153
|
+
if (c->initiate_key_update() != 0) {
|
|
154
|
+
c->disconnect();
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
} // namespace
|
|
158
|
+
|
|
159
|
+
namespace {
|
|
160
|
+
void delay_streamcb(struct ev_loop *loop, ev_timer *w, int revents) {
|
|
161
|
+
auto c = static_cast<Client *>(w->data);
|
|
162
|
+
|
|
163
|
+
ev_timer_stop(loop, w);
|
|
164
|
+
c->on_extend_max_streams();
|
|
165
|
+
c->on_write();
|
|
166
|
+
}
|
|
167
|
+
} // namespace
|
|
168
|
+
|
|
169
|
+
namespace {
|
|
170
|
+
void siginthandler(struct ev_loop *loop, ev_signal *w, int revents) {
|
|
171
|
+
ev_break(loop, EVBREAK_ALL);
|
|
172
|
+
}
|
|
173
|
+
} // namespace
|
|
174
|
+
|
|
175
|
+
Client::Client(struct ev_loop *loop, uint32_t client_chosen_version,
|
|
176
|
+
uint32_t original_version)
|
|
177
|
+
: remote_addr_{},
|
|
178
|
+
loop_(loop),
|
|
179
|
+
addr_(nullptr),
|
|
180
|
+
port_(nullptr),
|
|
181
|
+
nstreams_done_(0),
|
|
182
|
+
nstreams_closed_(0),
|
|
183
|
+
nkey_update_(0),
|
|
184
|
+
client_chosen_version_(client_chosen_version),
|
|
185
|
+
original_version_(original_version),
|
|
186
|
+
early_data_(false),
|
|
187
|
+
should_exit_(false),
|
|
188
|
+
should_exit_on_handshake_confirmed_(false),
|
|
189
|
+
handshake_confirmed_(false),
|
|
190
|
+
tx_{} {
|
|
191
|
+
ev_io_init(&wev_, writecb, 0, EV_WRITE);
|
|
192
|
+
wev_.data = this;
|
|
193
|
+
ev_timer_init(&timer_, timeoutcb, 0., 0.);
|
|
194
|
+
timer_.data = this;
|
|
195
|
+
ev_timer_init(&change_local_addr_timer_, change_local_addrcb,
|
|
196
|
+
static_cast<double>(config.change_local_addr) / NGTCP2_SECONDS,
|
|
197
|
+
0.);
|
|
198
|
+
change_local_addr_timer_.data = this;
|
|
199
|
+
ev_timer_init(&key_update_timer_, key_updatecb,
|
|
200
|
+
static_cast<double>(config.key_update) / NGTCP2_SECONDS, 0.);
|
|
201
|
+
key_update_timer_.data = this;
|
|
202
|
+
ev_timer_init(&delay_stream_timer_, delay_streamcb,
|
|
203
|
+
static_cast<double>(config.delay_stream) / NGTCP2_SECONDS, 0.);
|
|
204
|
+
delay_stream_timer_.data = this;
|
|
205
|
+
ev_signal_init(&sigintev_, siginthandler, SIGINT);
|
|
206
|
+
}
|
|
207
|
+
|
|
208
|
+
Client::~Client() { disconnect(); }
|
|
209
|
+
|
|
210
|
+
void Client::disconnect() {
|
|
211
|
+
tx_.send_blocked = false;
|
|
212
|
+
|
|
213
|
+
handle_error();
|
|
214
|
+
|
|
215
|
+
config.tx_loss_prob = 0;
|
|
216
|
+
|
|
217
|
+
ev_timer_stop(loop_, &delay_stream_timer_);
|
|
218
|
+
ev_timer_stop(loop_, &key_update_timer_);
|
|
219
|
+
ev_timer_stop(loop_, &change_local_addr_timer_);
|
|
220
|
+
ev_timer_stop(loop_, &timer_);
|
|
221
|
+
|
|
222
|
+
ev_io_stop(loop_, &wev_);
|
|
223
|
+
|
|
224
|
+
for (auto &ep : endpoints_) {
|
|
225
|
+
ev_io_stop(loop_, &ep.rev);
|
|
226
|
+
close(ep.fd);
|
|
227
|
+
}
|
|
228
|
+
|
|
229
|
+
endpoints_.clear();
|
|
230
|
+
|
|
231
|
+
ev_signal_stop(loop_, &sigintev_);
|
|
232
|
+
}
|
|
233
|
+
|
|
234
|
+
namespace {
|
|
235
|
+
int recv_crypto_data(ngtcp2_conn *conn, ngtcp2_crypto_level crypto_level,
|
|
236
|
+
uint64_t offset, const uint8_t *data, size_t datalen,
|
|
237
|
+
void *user_data) {
|
|
238
|
+
if (!config.quiet && !config.no_quic_dump) {
|
|
239
|
+
debug::print_crypto_data(crypto_level, data, datalen);
|
|
240
|
+
}
|
|
241
|
+
|
|
242
|
+
return ngtcp2_crypto_recv_crypto_data_cb(conn, crypto_level, offset, data,
|
|
243
|
+
datalen, user_data);
|
|
244
|
+
}
|
|
245
|
+
} // namespace
|
|
246
|
+
|
|
247
|
+
namespace {
|
|
248
|
+
int recv_stream_data(ngtcp2_conn *conn, uint32_t flags, int64_t stream_id,
|
|
249
|
+
uint64_t offset, const uint8_t *data, size_t datalen,
|
|
250
|
+
void *user_data, void *stream_user_data) {
|
|
251
|
+
if (!config.quiet && !config.no_quic_dump) {
|
|
252
|
+
debug::print_stream_data(stream_id, data, datalen);
|
|
253
|
+
}
|
|
254
|
+
|
|
255
|
+
auto c = static_cast<Client *>(user_data);
|
|
256
|
+
|
|
257
|
+
if (c->recv_stream_data(flags, stream_id, data, datalen) != 0) {
|
|
258
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
259
|
+
}
|
|
260
|
+
|
|
261
|
+
return 0;
|
|
262
|
+
}
|
|
263
|
+
} // namespace
|
|
264
|
+
|
|
265
|
+
namespace {
|
|
266
|
+
int acked_stream_data_offset(ngtcp2_conn *conn, int64_t stream_id,
|
|
267
|
+
uint64_t offset, uint64_t datalen, void *user_data,
|
|
268
|
+
void *stream_user_data) {
|
|
269
|
+
auto c = static_cast<Client *>(user_data);
|
|
270
|
+
if (c->acked_stream_data_offset(stream_id, offset, datalen) != 0) {
|
|
271
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
272
|
+
}
|
|
273
|
+
return 0;
|
|
274
|
+
}
|
|
275
|
+
} // namespace
|
|
276
|
+
|
|
277
|
+
namespace {
|
|
278
|
+
int handshake_completed(ngtcp2_conn *conn, void *user_data) {
|
|
279
|
+
auto c = static_cast<Client *>(user_data);
|
|
280
|
+
|
|
281
|
+
if (!config.quiet) {
|
|
282
|
+
debug::handshake_completed(conn, user_data);
|
|
283
|
+
}
|
|
284
|
+
|
|
285
|
+
if (c->handshake_completed() != 0) {
|
|
286
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
287
|
+
}
|
|
288
|
+
|
|
289
|
+
return 0;
|
|
290
|
+
}
|
|
291
|
+
} // namespace
|
|
292
|
+
|
|
293
|
+
int Client::handshake_completed() {
|
|
294
|
+
if (early_data_ && !tls_session_.get_early_data_accepted()) {
|
|
295
|
+
if (!config.quiet) {
|
|
296
|
+
std::cerr << "Early data was rejected by server" << std::endl;
|
|
297
|
+
}
|
|
298
|
+
|
|
299
|
+
// Some TLS backends only report early data rejection after
|
|
300
|
+
// handshake completion (e.g., OpenSSL). For TLS backends which
|
|
301
|
+
// report it early (e.g., BoringSSL and PicoTLS), the following
|
|
302
|
+
// functions are noop.
|
|
303
|
+
if (auto rv = ngtcp2_conn_early_data_rejected(conn_); rv != 0) {
|
|
304
|
+
std::cerr << "ngtcp2_conn_early_data_rejected: " << ngtcp2_strerror(rv)
|
|
305
|
+
<< std::endl;
|
|
306
|
+
return -1;
|
|
307
|
+
}
|
|
308
|
+
}
|
|
309
|
+
|
|
310
|
+
if (!config.quiet) {
|
|
311
|
+
std::cerr << "Negotiated cipher suite is " << tls_session_.get_cipher_name()
|
|
312
|
+
<< std::endl;
|
|
313
|
+
std::cerr << "Negotiated ALPN is " << tls_session_.get_selected_alpn()
|
|
314
|
+
<< std::endl;
|
|
315
|
+
}
|
|
316
|
+
|
|
317
|
+
if (config.tp_file) {
|
|
318
|
+
auto params = ngtcp2_conn_get_remote_transport_params(conn_);
|
|
319
|
+
|
|
320
|
+
if (write_transport_params(config.tp_file, params) != 0) {
|
|
321
|
+
std::cerr << "Could not write transport parameters in " << config.tp_file
|
|
322
|
+
<< std::endl;
|
|
323
|
+
}
|
|
324
|
+
}
|
|
325
|
+
|
|
326
|
+
return 0;
|
|
327
|
+
}
|
|
328
|
+
|
|
329
|
+
namespace {
|
|
330
|
+
int handshake_confirmed(ngtcp2_conn *conn, void *user_data) {
|
|
331
|
+
auto c = static_cast<Client *>(user_data);
|
|
332
|
+
|
|
333
|
+
if (!config.quiet) {
|
|
334
|
+
debug::handshake_confirmed(conn, user_data);
|
|
335
|
+
}
|
|
336
|
+
|
|
337
|
+
if (c->handshake_confirmed() != 0) {
|
|
338
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
339
|
+
}
|
|
340
|
+
|
|
341
|
+
return 0;
|
|
342
|
+
}
|
|
343
|
+
} // namespace
|
|
344
|
+
|
|
345
|
+
int Client::handshake_confirmed() {
|
|
346
|
+
handshake_confirmed_ = true;
|
|
347
|
+
|
|
348
|
+
if (config.change_local_addr) {
|
|
349
|
+
start_change_local_addr_timer();
|
|
350
|
+
}
|
|
351
|
+
if (config.key_update) {
|
|
352
|
+
start_key_update_timer();
|
|
353
|
+
}
|
|
354
|
+
if (config.delay_stream) {
|
|
355
|
+
start_delay_stream_timer();
|
|
356
|
+
}
|
|
357
|
+
|
|
358
|
+
if (should_exit_on_handshake_confirmed_) {
|
|
359
|
+
should_exit_ = true;
|
|
360
|
+
}
|
|
361
|
+
|
|
362
|
+
return 0;
|
|
363
|
+
}
|
|
364
|
+
|
|
365
|
+
namespace {
|
|
366
|
+
int recv_version_negotiation(ngtcp2_conn *conn, const ngtcp2_pkt_hd *hd,
|
|
367
|
+
const uint32_t *sv, size_t nsv, void *user_data) {
|
|
368
|
+
auto c = static_cast<Client *>(user_data);
|
|
369
|
+
|
|
370
|
+
c->recv_version_negotiation(sv, nsv);
|
|
371
|
+
|
|
372
|
+
return 0;
|
|
373
|
+
}
|
|
374
|
+
} // namespace
|
|
375
|
+
|
|
376
|
+
void Client::recv_version_negotiation(const uint32_t *sv, size_t nsv) {
|
|
377
|
+
offered_versions_.resize(nsv);
|
|
378
|
+
std::copy_n(sv, nsv, std::begin(offered_versions_));
|
|
379
|
+
}
|
|
380
|
+
|
|
381
|
+
namespace {
|
|
382
|
+
int stream_close(ngtcp2_conn *conn, uint32_t flags, int64_t stream_id,
|
|
383
|
+
uint64_t app_error_code, void *user_data,
|
|
384
|
+
void *stream_user_data) {
|
|
385
|
+
auto c = static_cast<Client *>(user_data);
|
|
386
|
+
|
|
387
|
+
if (c->on_stream_close(stream_id, app_error_code) != 0) {
|
|
388
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
389
|
+
}
|
|
390
|
+
|
|
391
|
+
return 0;
|
|
392
|
+
}
|
|
393
|
+
} // namespace
|
|
394
|
+
|
|
395
|
+
namespace {
|
|
396
|
+
int extend_max_streams_bidi(ngtcp2_conn *conn, uint64_t max_streams,
|
|
397
|
+
void *user_data) {
|
|
398
|
+
auto c = static_cast<Client *>(user_data);
|
|
399
|
+
|
|
400
|
+
if (c->on_extend_max_streams() != 0) {
|
|
401
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
402
|
+
}
|
|
403
|
+
|
|
404
|
+
return 0;
|
|
405
|
+
}
|
|
406
|
+
} // namespace
|
|
407
|
+
|
|
408
|
+
namespace {
|
|
409
|
+
void rand(uint8_t *dest, size_t destlen, const ngtcp2_rand_ctx *rand_ctx) {
|
|
410
|
+
auto dis = std::uniform_int_distribution<uint8_t>();
|
|
411
|
+
std::generate(dest, dest + destlen, [&dis]() { return dis(randgen); });
|
|
412
|
+
}
|
|
413
|
+
} // namespace
|
|
414
|
+
|
|
415
|
+
namespace {
|
|
416
|
+
int get_new_connection_id(ngtcp2_conn *conn, ngtcp2_cid *cid, uint8_t *token,
|
|
417
|
+
size_t cidlen, void *user_data) {
|
|
418
|
+
if (util::generate_secure_random(cid->data, cidlen) != 0) {
|
|
419
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
420
|
+
}
|
|
421
|
+
|
|
422
|
+
cid->datalen = cidlen;
|
|
423
|
+
if (ngtcp2_crypto_generate_stateless_reset_token(
|
|
424
|
+
token, config.static_secret.data(), config.static_secret.size(),
|
|
425
|
+
cid) != 0) {
|
|
426
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
427
|
+
}
|
|
428
|
+
|
|
429
|
+
return 0;
|
|
430
|
+
}
|
|
431
|
+
} // namespace
|
|
432
|
+
|
|
433
|
+
namespace {
|
|
434
|
+
int do_hp_mask(uint8_t *dest, const ngtcp2_crypto_cipher *hp,
|
|
435
|
+
const ngtcp2_crypto_cipher_ctx *hp_ctx, const uint8_t *sample) {
|
|
436
|
+
if (ngtcp2_crypto_hp_mask(dest, hp, hp_ctx, sample) != 0) {
|
|
437
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
438
|
+
}
|
|
439
|
+
|
|
440
|
+
if (!config.quiet && config.show_secret) {
|
|
441
|
+
debug::print_hp_mask(dest, NGTCP2_HP_MASKLEN, sample, NGTCP2_HP_SAMPLELEN);
|
|
442
|
+
}
|
|
443
|
+
|
|
444
|
+
return 0;
|
|
445
|
+
}
|
|
446
|
+
} // namespace
|
|
447
|
+
|
|
448
|
+
namespace {
|
|
449
|
+
int update_key(ngtcp2_conn *conn, uint8_t *rx_secret, uint8_t *tx_secret,
|
|
450
|
+
ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_iv,
|
|
451
|
+
ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_iv,
|
|
452
|
+
const uint8_t *current_rx_secret,
|
|
453
|
+
const uint8_t *current_tx_secret, size_t secretlen,
|
|
454
|
+
void *user_data) {
|
|
455
|
+
auto c = static_cast<Client *>(user_data);
|
|
456
|
+
|
|
457
|
+
if (c->update_key(rx_secret, tx_secret, rx_aead_ctx, rx_iv, tx_aead_ctx,
|
|
458
|
+
tx_iv, current_rx_secret, current_tx_secret,
|
|
459
|
+
secretlen) != 0) {
|
|
460
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
461
|
+
}
|
|
462
|
+
|
|
463
|
+
return 0;
|
|
464
|
+
}
|
|
465
|
+
} // namespace
|
|
466
|
+
|
|
467
|
+
namespace {
|
|
468
|
+
int path_validation(ngtcp2_conn *conn, uint32_t flags, const ngtcp2_path *path,
|
|
469
|
+
ngtcp2_path_validation_result res, void *user_data) {
|
|
470
|
+
if (!config.quiet) {
|
|
471
|
+
debug::path_validation(path, res);
|
|
472
|
+
}
|
|
473
|
+
|
|
474
|
+
if (flags & NGTCP2_PATH_VALIDATION_FLAG_PREFERRED_ADDR) {
|
|
475
|
+
auto c = static_cast<Client *>(user_data);
|
|
476
|
+
|
|
477
|
+
c->set_remote_addr(path->remote);
|
|
478
|
+
}
|
|
479
|
+
|
|
480
|
+
return 0;
|
|
481
|
+
}
|
|
482
|
+
} // namespace
|
|
483
|
+
|
|
484
|
+
void Client::set_remote_addr(const ngtcp2_addr &remote_addr) {
|
|
485
|
+
memcpy(&remote_addr_.su, remote_addr.addr, remote_addr.addrlen);
|
|
486
|
+
remote_addr_.len = remote_addr.addrlen;
|
|
487
|
+
}
|
|
488
|
+
|
|
489
|
+
namespace {
|
|
490
|
+
int select_preferred_address(ngtcp2_conn *conn, ngtcp2_path *dest,
|
|
491
|
+
const ngtcp2_preferred_addr *paddr,
|
|
492
|
+
void *user_data) {
|
|
493
|
+
auto c = static_cast<Client *>(user_data);
|
|
494
|
+
Address remote_addr;
|
|
495
|
+
|
|
496
|
+
if (config.no_preferred_addr) {
|
|
497
|
+
return 0;
|
|
498
|
+
}
|
|
499
|
+
|
|
500
|
+
if (c->select_preferred_address(remote_addr, paddr) != 0) {
|
|
501
|
+
return 0;
|
|
502
|
+
}
|
|
503
|
+
|
|
504
|
+
auto ep = c->endpoint_for(remote_addr);
|
|
505
|
+
if (!ep) {
|
|
506
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
507
|
+
}
|
|
508
|
+
|
|
509
|
+
ngtcp2_addr_copy_byte(&dest->local, &(*ep)->addr.su.sa, (*ep)->addr.len);
|
|
510
|
+
ngtcp2_addr_copy_byte(&dest->remote, &remote_addr.su.sa, remote_addr.len);
|
|
511
|
+
dest->user_data = *ep;
|
|
512
|
+
|
|
513
|
+
return 0;
|
|
514
|
+
}
|
|
515
|
+
} // namespace
|
|
516
|
+
|
|
517
|
+
namespace {
|
|
518
|
+
int extend_max_stream_data(ngtcp2_conn *conn, int64_t stream_id,
|
|
519
|
+
uint64_t max_data, void *user_data,
|
|
520
|
+
void *stream_user_data) {
|
|
521
|
+
auto c = static_cast<Client *>(user_data);
|
|
522
|
+
if (c->extend_max_stream_data(stream_id, max_data) != 0) {
|
|
523
|
+
return NGTCP2_ERR_CALLBACK_FAILURE;
|
|
524
|
+
}
|
|
525
|
+
return 0;
|
|
526
|
+
}
|
|
527
|
+
} // namespace
|
|
528
|
+
|
|
529
|
+
int Client::extend_max_stream_data(int64_t stream_id, uint64_t max_data) {
|
|
530
|
+
auto it = streams_.find(stream_id);
|
|
531
|
+
assert(it != std::end(streams_));
|
|
532
|
+
auto &stream = (*it).second;
|
|
533
|
+
|
|
534
|
+
if (nghttp3_buf_len(&stream->reqbuf)) {
|
|
535
|
+
sendq_.emplace(stream.get());
|
|
536
|
+
}
|
|
537
|
+
|
|
538
|
+
return 0;
|
|
539
|
+
}
|
|
540
|
+
|
|
541
|
+
namespace {
|
|
542
|
+
int recv_new_token(ngtcp2_conn *conn, const uint8_t *token, size_t tokenlen,
|
|
543
|
+
void *user_data) {
|
|
544
|
+
if (config.token_file.empty()) {
|
|
545
|
+
return 0;
|
|
546
|
+
}
|
|
547
|
+
|
|
548
|
+
auto f = BIO_new_file(config.token_file.data(), "w");
|
|
549
|
+
if (f == nullptr) {
|
|
550
|
+
std::cerr << "Could not write token in " << config.token_file << std::endl;
|
|
551
|
+
return 0;
|
|
552
|
+
}
|
|
553
|
+
|
|
554
|
+
PEM_write_bio(f, "QUIC TOKEN", "", token, tokenlen);
|
|
555
|
+
BIO_free(f);
|
|
556
|
+
|
|
557
|
+
return 0;
|
|
558
|
+
}
|
|
559
|
+
} // namespace
|
|
560
|
+
|
|
561
|
+
namespace {
|
|
562
|
+
int early_data_rejected(ngtcp2_conn *conn, void *user_data) {
|
|
563
|
+
auto c = static_cast<Client *>(user_data);
|
|
564
|
+
|
|
565
|
+
c->early_data_rejected();
|
|
566
|
+
|
|
567
|
+
return 0;
|
|
568
|
+
}
|
|
569
|
+
} // namespace
|
|
570
|
+
|
|
571
|
+
void Client::early_data_rejected() {
|
|
572
|
+
nstreams_done_ = 0;
|
|
573
|
+
streams_.clear();
|
|
574
|
+
}
|
|
575
|
+
|
|
576
|
+
int Client::init(int fd, const Address &local_addr, const Address &remote_addr,
|
|
577
|
+
const char *addr, const char *port,
|
|
578
|
+
TLSClientContext &tls_ctx) {
|
|
579
|
+
endpoints_.reserve(4);
|
|
580
|
+
|
|
581
|
+
endpoints_.emplace_back();
|
|
582
|
+
auto &ep = endpoints_.back();
|
|
583
|
+
ep.addr = local_addr;
|
|
584
|
+
ep.client = this;
|
|
585
|
+
ep.fd = fd;
|
|
586
|
+
ev_io_init(&ep.rev, readcb, fd, EV_READ);
|
|
587
|
+
ep.rev.data = &ep;
|
|
588
|
+
|
|
589
|
+
remote_addr_ = remote_addr;
|
|
590
|
+
addr_ = addr;
|
|
591
|
+
port_ = port;
|
|
592
|
+
|
|
593
|
+
auto callbacks = ngtcp2_callbacks{
|
|
594
|
+
ngtcp2_crypto_client_initial_cb,
|
|
595
|
+
nullptr, // recv_client_initial
|
|
596
|
+
::recv_crypto_data,
|
|
597
|
+
::handshake_completed,
|
|
598
|
+
::recv_version_negotiation,
|
|
599
|
+
ngtcp2_crypto_encrypt_cb,
|
|
600
|
+
ngtcp2_crypto_decrypt_cb,
|
|
601
|
+
do_hp_mask,
|
|
602
|
+
::recv_stream_data,
|
|
603
|
+
::acked_stream_data_offset,
|
|
604
|
+
nullptr, // stream_open
|
|
605
|
+
stream_close,
|
|
606
|
+
nullptr, // recv_stateless_reset
|
|
607
|
+
ngtcp2_crypto_recv_retry_cb,
|
|
608
|
+
extend_max_streams_bidi,
|
|
609
|
+
nullptr, // extend_max_streams_uni
|
|
610
|
+
rand,
|
|
611
|
+
get_new_connection_id,
|
|
612
|
+
nullptr, // remove_connection_id
|
|
613
|
+
::update_key,
|
|
614
|
+
path_validation,
|
|
615
|
+
::select_preferred_address,
|
|
616
|
+
nullptr, // stream_reset
|
|
617
|
+
nullptr, // extend_max_remote_streams_bidi,
|
|
618
|
+
nullptr, // extend_max_remote_streams_uni,
|
|
619
|
+
::extend_max_stream_data,
|
|
620
|
+
nullptr, // dcid_status
|
|
621
|
+
::handshake_confirmed,
|
|
622
|
+
::recv_new_token,
|
|
623
|
+
ngtcp2_crypto_delete_crypto_aead_ctx_cb,
|
|
624
|
+
ngtcp2_crypto_delete_crypto_cipher_ctx_cb,
|
|
625
|
+
nullptr, // recv_datagram
|
|
626
|
+
nullptr, // ack_datagram
|
|
627
|
+
nullptr, // lost_datagram
|
|
628
|
+
ngtcp2_crypto_get_path_challenge_data_cb,
|
|
629
|
+
nullptr, // stream_stop_sending
|
|
630
|
+
ngtcp2_crypto_version_negotiation_cb,
|
|
631
|
+
nullptr, // recv_rx_key
|
|
632
|
+
nullptr, // recv_tx_key
|
|
633
|
+
::early_data_rejected,
|
|
634
|
+
};
|
|
635
|
+
|
|
636
|
+
ngtcp2_cid scid, dcid;
|
|
637
|
+
scid.datalen = 17;
|
|
638
|
+
if (util::generate_secure_random(scid.data, scid.datalen) != 0) {
|
|
639
|
+
std::cerr << "Could not generate source connection ID" << std::endl;
|
|
640
|
+
return -1;
|
|
641
|
+
}
|
|
642
|
+
if (config.dcid.datalen == 0) {
|
|
643
|
+
dcid.datalen = 18;
|
|
644
|
+
if (util::generate_secure_random(dcid.data, dcid.datalen) != 0) {
|
|
645
|
+
std::cerr << "Could not generate destination connection ID" << std::endl;
|
|
646
|
+
return -1;
|
|
647
|
+
}
|
|
648
|
+
} else {
|
|
649
|
+
dcid = config.dcid;
|
|
650
|
+
}
|
|
651
|
+
|
|
652
|
+
ngtcp2_settings settings;
|
|
653
|
+
ngtcp2_settings_default(&settings);
|
|
654
|
+
settings.log_printf = config.quiet ? nullptr : debug::log_printf;
|
|
655
|
+
if (!config.qlog_file.empty() || !config.qlog_dir.empty()) {
|
|
656
|
+
std::string path;
|
|
657
|
+
if (!config.qlog_file.empty()) {
|
|
658
|
+
path = config.qlog_file;
|
|
659
|
+
} else {
|
|
660
|
+
path = std::string{config.qlog_dir};
|
|
661
|
+
path += '/';
|
|
662
|
+
path += util::format_hex(scid.data, scid.datalen);
|
|
663
|
+
path += ".sqlog";
|
|
664
|
+
}
|
|
665
|
+
qlog_ = fopen(path.c_str(), "w");
|
|
666
|
+
if (qlog_ == nullptr) {
|
|
667
|
+
std::cerr << "Could not open qlog file " << std::quoted(path) << ": "
|
|
668
|
+
<< strerror(errno) << std::endl;
|
|
669
|
+
return -1;
|
|
670
|
+
}
|
|
671
|
+
settings.qlog.write = qlog_write_cb;
|
|
672
|
+
}
|
|
673
|
+
|
|
674
|
+
settings.cc_algo = config.cc_algo;
|
|
675
|
+
settings.initial_ts = util::timestamp(loop_);
|
|
676
|
+
settings.initial_rtt = config.initial_rtt;
|
|
677
|
+
settings.max_window = config.max_window;
|
|
678
|
+
settings.max_stream_window = config.max_stream_window;
|
|
679
|
+
if (config.max_udp_payload_size) {
|
|
680
|
+
settings.max_tx_udp_payload_size = config.max_udp_payload_size;
|
|
681
|
+
settings.no_tx_udp_payload_size_shaping = 1;
|
|
682
|
+
}
|
|
683
|
+
settings.handshake_timeout = config.handshake_timeout;
|
|
684
|
+
settings.no_pmtud = config.no_pmtud;
|
|
685
|
+
settings.ack_thresh = config.ack_thresh;
|
|
686
|
+
|
|
687
|
+
std::string token;
|
|
688
|
+
|
|
689
|
+
if (!config.token_file.empty()) {
|
|
690
|
+
std::cerr << "Reading token file " << config.token_file << std::endl;
|
|
691
|
+
|
|
692
|
+
auto t = util::read_token(config.token_file);
|
|
693
|
+
if (t) {
|
|
694
|
+
token = std::move(*t);
|
|
695
|
+
settings.token = reinterpret_cast<const uint8_t *>(token.data());
|
|
696
|
+
settings.tokenlen = token.size();
|
|
697
|
+
}
|
|
698
|
+
}
|
|
699
|
+
|
|
700
|
+
if (!config.available_versions.empty()) {
|
|
701
|
+
settings.available_versions = config.available_versions.data();
|
|
702
|
+
settings.available_versionslen = config.available_versions.size();
|
|
703
|
+
}
|
|
704
|
+
|
|
705
|
+
if (!config.preferred_versions.empty()) {
|
|
706
|
+
settings.preferred_versions = config.preferred_versions.data();
|
|
707
|
+
settings.preferred_versionslen = config.preferred_versions.size();
|
|
708
|
+
}
|
|
709
|
+
|
|
710
|
+
settings.original_version = original_version_;
|
|
711
|
+
|
|
712
|
+
ngtcp2_transport_params params;
|
|
713
|
+
ngtcp2_transport_params_default(¶ms);
|
|
714
|
+
params.initial_max_stream_data_bidi_local = config.max_stream_data_bidi_local;
|
|
715
|
+
params.initial_max_stream_data_bidi_remote =
|
|
716
|
+
config.max_stream_data_bidi_remote;
|
|
717
|
+
params.initial_max_stream_data_uni = config.max_stream_data_uni;
|
|
718
|
+
params.initial_max_data = config.max_data;
|
|
719
|
+
params.initial_max_streams_bidi = config.max_streams_bidi;
|
|
720
|
+
params.initial_max_streams_uni = 0;
|
|
721
|
+
params.max_idle_timeout = config.timeout;
|
|
722
|
+
params.active_connection_id_limit = 7;
|
|
723
|
+
|
|
724
|
+
auto path = ngtcp2_path{
|
|
725
|
+
{
|
|
726
|
+
const_cast<sockaddr *>(&ep.addr.su.sa),
|
|
727
|
+
ep.addr.len,
|
|
728
|
+
},
|
|
729
|
+
{
|
|
730
|
+
const_cast<sockaddr *>(&remote_addr.su.sa),
|
|
731
|
+
remote_addr.len,
|
|
732
|
+
},
|
|
733
|
+
&ep,
|
|
734
|
+
};
|
|
735
|
+
auto rv = ngtcp2_conn_client_new(&conn_, &dcid, &scid, &path,
|
|
736
|
+
client_chosen_version_, &callbacks,
|
|
737
|
+
&settings, ¶ms, nullptr, this);
|
|
738
|
+
|
|
739
|
+
if (rv != 0) {
|
|
740
|
+
std::cerr << "ngtcp2_conn_client_new: " << ngtcp2_strerror(rv) << std::endl;
|
|
741
|
+
return -1;
|
|
742
|
+
}
|
|
743
|
+
|
|
744
|
+
if (tls_session_.init(early_data_, tls_ctx, addr_, this,
|
|
745
|
+
client_chosen_version_, AppProtocol::HQ) != 0) {
|
|
746
|
+
return -1;
|
|
747
|
+
}
|
|
748
|
+
|
|
749
|
+
ngtcp2_conn_set_tls_native_handle(conn_, tls_session_.get_native_handle());
|
|
750
|
+
|
|
751
|
+
if (early_data_ && config.tp_file) {
|
|
752
|
+
ngtcp2_transport_params params;
|
|
753
|
+
if (read_transport_params(config.tp_file, ¶ms) != 0) {
|
|
754
|
+
std::cerr << "Could not read transport parameters from " << config.tp_file
|
|
755
|
+
<< std::endl;
|
|
756
|
+
early_data_ = false;
|
|
757
|
+
} else {
|
|
758
|
+
ngtcp2_conn_set_early_remote_transport_params(conn_, ¶ms);
|
|
759
|
+
if (make_stream_early() != 0) {
|
|
760
|
+
return -1;
|
|
761
|
+
}
|
|
762
|
+
}
|
|
763
|
+
}
|
|
764
|
+
|
|
765
|
+
ev_io_start(loop_, &ep.rev);
|
|
766
|
+
|
|
767
|
+
ev_signal_start(loop_, &sigintev_);
|
|
768
|
+
|
|
769
|
+
return 0;
|
|
770
|
+
}
|
|
771
|
+
|
|
772
|
+
int Client::feed_data(const Endpoint &ep, const sockaddr *sa, socklen_t salen,
|
|
773
|
+
const ngtcp2_pkt_info *pi, uint8_t *data,
|
|
774
|
+
size_t datalen) {
|
|
775
|
+
auto path = ngtcp2_path{
|
|
776
|
+
{
|
|
777
|
+
const_cast<sockaddr *>(&ep.addr.su.sa),
|
|
778
|
+
ep.addr.len,
|
|
779
|
+
},
|
|
780
|
+
{
|
|
781
|
+
const_cast<sockaddr *>(sa),
|
|
782
|
+
salen,
|
|
783
|
+
},
|
|
784
|
+
const_cast<Endpoint *>(&ep),
|
|
785
|
+
};
|
|
786
|
+
if (auto rv = ngtcp2_conn_read_pkt(conn_, &path, pi, data, datalen,
|
|
787
|
+
util::timestamp(loop_));
|
|
788
|
+
rv != 0) {
|
|
789
|
+
std::cerr << "ngtcp2_conn_read_pkt: " << ngtcp2_strerror(rv) << std::endl;
|
|
790
|
+
if (!last_error_.error_code) {
|
|
791
|
+
if (rv == NGTCP2_ERR_CRYPTO) {
|
|
792
|
+
ngtcp2_connection_close_error_set_transport_error_tls_alert(
|
|
793
|
+
&last_error_, ngtcp2_conn_get_tls_alert(conn_), nullptr, 0);
|
|
794
|
+
} else {
|
|
795
|
+
ngtcp2_connection_close_error_set_transport_error_liberr(
|
|
796
|
+
&last_error_, rv, nullptr, 0);
|
|
797
|
+
}
|
|
798
|
+
}
|
|
799
|
+
disconnect();
|
|
800
|
+
return -1;
|
|
801
|
+
}
|
|
802
|
+
return 0;
|
|
803
|
+
}
|
|
804
|
+
|
|
805
|
+
int Client::on_read(const Endpoint &ep) {
|
|
806
|
+
std::array<uint8_t, 64_k> buf;
|
|
807
|
+
sockaddr_union su;
|
|
808
|
+
size_t pktcnt = 0;
|
|
809
|
+
ngtcp2_pkt_info pi;
|
|
810
|
+
|
|
811
|
+
iovec msg_iov;
|
|
812
|
+
msg_iov.iov_base = buf.data();
|
|
813
|
+
msg_iov.iov_len = buf.size();
|
|
814
|
+
|
|
815
|
+
msghdr msg{};
|
|
816
|
+
msg.msg_name = &su;
|
|
817
|
+
msg.msg_iov = &msg_iov;
|
|
818
|
+
msg.msg_iovlen = 1;
|
|
819
|
+
|
|
820
|
+
uint8_t msg_ctrl[CMSG_SPACE(sizeof(uint8_t))];
|
|
821
|
+
msg.msg_control = msg_ctrl;
|
|
822
|
+
|
|
823
|
+
for (;;) {
|
|
824
|
+
msg.msg_namelen = sizeof(su);
|
|
825
|
+
msg.msg_controllen = sizeof(msg_ctrl);
|
|
826
|
+
|
|
827
|
+
auto nread = recvmsg(ep.fd, &msg, 0);
|
|
828
|
+
|
|
829
|
+
if (nread == -1) {
|
|
830
|
+
if (errno != EAGAIN && errno != EWOULDBLOCK) {
|
|
831
|
+
std::cerr << "recvmsg: " << strerror(errno) << std::endl;
|
|
832
|
+
}
|
|
833
|
+
break;
|
|
834
|
+
}
|
|
835
|
+
|
|
836
|
+
pi.ecn = msghdr_get_ecn(&msg, su.storage.ss_family);
|
|
837
|
+
|
|
838
|
+
if (!config.quiet) {
|
|
839
|
+
std::cerr << "Received packet: local="
|
|
840
|
+
<< util::straddr(&ep.addr.su.sa, ep.addr.len)
|
|
841
|
+
<< " remote=" << util::straddr(&su.sa, msg.msg_namelen)
|
|
842
|
+
<< " ecn=0x" << std::hex << pi.ecn << std::dec << " " << nread
|
|
843
|
+
<< " bytes" << std::endl;
|
|
844
|
+
}
|
|
845
|
+
|
|
846
|
+
if (debug::packet_lost(config.rx_loss_prob)) {
|
|
847
|
+
if (!config.quiet) {
|
|
848
|
+
std::cerr << "** Simulated incoming packet loss **" << std::endl;
|
|
849
|
+
}
|
|
850
|
+
break;
|
|
851
|
+
}
|
|
852
|
+
|
|
853
|
+
if (feed_data(ep, &su.sa, msg.msg_namelen, &pi, buf.data(), nread) != 0) {
|
|
854
|
+
return -1;
|
|
855
|
+
}
|
|
856
|
+
|
|
857
|
+
if (++pktcnt >= 10) {
|
|
858
|
+
break;
|
|
859
|
+
}
|
|
860
|
+
}
|
|
861
|
+
|
|
862
|
+
if (should_exit_) {
|
|
863
|
+
disconnect();
|
|
864
|
+
return -1;
|
|
865
|
+
}
|
|
866
|
+
|
|
867
|
+
update_timer();
|
|
868
|
+
|
|
869
|
+
return 0;
|
|
870
|
+
}
|
|
871
|
+
|
|
872
|
+
int Client::handle_expiry() {
|
|
873
|
+
auto now = util::timestamp(loop_);
|
|
874
|
+
if (auto rv = ngtcp2_conn_handle_expiry(conn_, now); rv != 0) {
|
|
875
|
+
std::cerr << "ngtcp2_conn_handle_expiry: " << ngtcp2_strerror(rv)
|
|
876
|
+
<< std::endl;
|
|
877
|
+
ngtcp2_connection_close_error_set_transport_error_liberr(&last_error_, rv,
|
|
878
|
+
nullptr, 0);
|
|
879
|
+
disconnect();
|
|
880
|
+
return -1;
|
|
881
|
+
}
|
|
882
|
+
|
|
883
|
+
return 0;
|
|
884
|
+
}
|
|
885
|
+
|
|
886
|
+
int Client::on_write() {
|
|
887
|
+
if (tx_.send_blocked) {
|
|
888
|
+
if (auto rv = send_blocked_packet(); rv != 0) {
|
|
889
|
+
return rv;
|
|
890
|
+
}
|
|
891
|
+
|
|
892
|
+
if (tx_.send_blocked) {
|
|
893
|
+
return 0;
|
|
894
|
+
}
|
|
895
|
+
|
|
896
|
+
ev_io_stop(loop_, &wev_);
|
|
897
|
+
}
|
|
898
|
+
|
|
899
|
+
if (auto rv = write_streams(); rv != 0) {
|
|
900
|
+
return rv;
|
|
901
|
+
}
|
|
902
|
+
|
|
903
|
+
if (should_exit_) {
|
|
904
|
+
disconnect();
|
|
905
|
+
return -1;
|
|
906
|
+
}
|
|
907
|
+
|
|
908
|
+
update_timer();
|
|
909
|
+
return 0;
|
|
910
|
+
}
|
|
911
|
+
|
|
912
|
+
int Client::write_streams() {
|
|
913
|
+
ngtcp2_vec vec;
|
|
914
|
+
ngtcp2_path_storage ps;
|
|
915
|
+
size_t pktcnt = 0;
|
|
916
|
+
auto max_udp_payload_size = ngtcp2_conn_get_max_tx_udp_payload_size(conn_);
|
|
917
|
+
auto max_pktcnt = ngtcp2_conn_get_send_quantum(conn_) / max_udp_payload_size;
|
|
918
|
+
auto ts = util::timestamp(loop_);
|
|
919
|
+
|
|
920
|
+
ngtcp2_path_storage_zero(&ps);
|
|
921
|
+
|
|
922
|
+
for (;;) {
|
|
923
|
+
int64_t stream_id = -1;
|
|
924
|
+
size_t vcnt = 0;
|
|
925
|
+
uint32_t flags = NGTCP2_WRITE_STREAM_FLAG_MORE;
|
|
926
|
+
Stream *stream = nullptr;
|
|
927
|
+
|
|
928
|
+
if (!sendq_.empty() && ngtcp2_conn_get_max_data_left(conn_)) {
|
|
929
|
+
stream = *std::begin(sendq_);
|
|
930
|
+
|
|
931
|
+
stream_id = stream->stream_id;
|
|
932
|
+
vec.base = stream->reqbuf.pos;
|
|
933
|
+
vec.len = nghttp3_buf_len(&stream->reqbuf);
|
|
934
|
+
vcnt = 1;
|
|
935
|
+
flags |= NGTCP2_WRITE_STREAM_FLAG_FIN;
|
|
936
|
+
}
|
|
937
|
+
|
|
938
|
+
ngtcp2_ssize ndatalen;
|
|
939
|
+
ngtcp2_pkt_info pi;
|
|
940
|
+
|
|
941
|
+
auto nwrite = ngtcp2_conn_writev_stream(
|
|
942
|
+
conn_, &ps.path, &pi, tx_.data.data(), max_udp_payload_size, &ndatalen,
|
|
943
|
+
flags, stream_id, &vec, vcnt, ts);
|
|
944
|
+
if (nwrite < 0) {
|
|
945
|
+
switch (nwrite) {
|
|
946
|
+
case NGTCP2_ERR_STREAM_DATA_BLOCKED:
|
|
947
|
+
case NGTCP2_ERR_STREAM_SHUT_WR:
|
|
948
|
+
assert(ndatalen == -1);
|
|
949
|
+
sendq_.erase(std::begin(sendq_));
|
|
950
|
+
continue;
|
|
951
|
+
case NGTCP2_ERR_WRITE_MORE:
|
|
952
|
+
assert(ndatalen >= 0);
|
|
953
|
+
stream->reqbuf.pos += ndatalen;
|
|
954
|
+
if (nghttp3_buf_len(&stream->reqbuf) == 0) {
|
|
955
|
+
sendq_.erase(std::begin(sendq_));
|
|
956
|
+
}
|
|
957
|
+
continue;
|
|
958
|
+
}
|
|
959
|
+
|
|
960
|
+
assert(ndatalen == -1);
|
|
961
|
+
|
|
962
|
+
std::cerr << "ngtcp2_conn_write_stream: " << ngtcp2_strerror(nwrite)
|
|
963
|
+
<< std::endl;
|
|
964
|
+
ngtcp2_connection_close_error_set_transport_error_liberr(
|
|
965
|
+
&last_error_, nwrite, nullptr, 0);
|
|
966
|
+
disconnect();
|
|
967
|
+
return -1;
|
|
968
|
+
} else if (ndatalen >= 0) {
|
|
969
|
+
stream->reqbuf.pos += ndatalen;
|
|
970
|
+
if (nghttp3_buf_len(&stream->reqbuf) == 0) {
|
|
971
|
+
sendq_.erase(std::begin(sendq_));
|
|
972
|
+
}
|
|
973
|
+
}
|
|
974
|
+
|
|
975
|
+
if (nwrite == 0) {
|
|
976
|
+
// We are congestion limited.
|
|
977
|
+
ngtcp2_conn_update_pkt_tx_time(conn_, ts);
|
|
978
|
+
return 0;
|
|
979
|
+
}
|
|
980
|
+
|
|
981
|
+
auto &ep = *static_cast<Endpoint *>(ps.path.user_data);
|
|
982
|
+
|
|
983
|
+
if (auto rv =
|
|
984
|
+
send_packet(ep, ps.path.remote, pi.ecn, tx_.data.data(), nwrite);
|
|
985
|
+
rv != NETWORK_ERR_OK) {
|
|
986
|
+
if (rv != NETWORK_ERR_SEND_BLOCKED) {
|
|
987
|
+
ngtcp2_connection_close_error_set_transport_error_liberr(
|
|
988
|
+
&last_error_, NGTCP2_ERR_INTERNAL, nullptr, 0);
|
|
989
|
+
disconnect();
|
|
990
|
+
|
|
991
|
+
return rv;
|
|
992
|
+
}
|
|
993
|
+
|
|
994
|
+
ngtcp2_conn_update_pkt_tx_time(conn_, ts);
|
|
995
|
+
on_send_blocked(ep, ps.path.remote, pi.ecn, nwrite);
|
|
996
|
+
|
|
997
|
+
return 0;
|
|
998
|
+
}
|
|
999
|
+
|
|
1000
|
+
if (++pktcnt == max_pktcnt) {
|
|
1001
|
+
ngtcp2_conn_update_pkt_tx_time(conn_, ts);
|
|
1002
|
+
return 0;
|
|
1003
|
+
}
|
|
1004
|
+
}
|
|
1005
|
+
}
|
|
1006
|
+
|
|
1007
|
+
void Client::update_timer() {
|
|
1008
|
+
auto expiry = ngtcp2_conn_get_expiry(conn_);
|
|
1009
|
+
auto now = util::timestamp(loop_);
|
|
1010
|
+
|
|
1011
|
+
if (expiry <= now) {
|
|
1012
|
+
if (!config.quiet) {
|
|
1013
|
+
auto t = static_cast<ev_tstamp>(now - expiry) / NGTCP2_SECONDS;
|
|
1014
|
+
std::cerr << "Timer has already expired: " << std::fixed << t << "s"
|
|
1015
|
+
<< std::defaultfloat << std::endl;
|
|
1016
|
+
}
|
|
1017
|
+
|
|
1018
|
+
ev_feed_event(loop_, &timer_, EV_TIMER);
|
|
1019
|
+
|
|
1020
|
+
return;
|
|
1021
|
+
}
|
|
1022
|
+
|
|
1023
|
+
auto t = static_cast<ev_tstamp>(expiry - now) / NGTCP2_SECONDS;
|
|
1024
|
+
if (!config.quiet) {
|
|
1025
|
+
std::cerr << "Set timer=" << std::fixed << t << "s" << std::defaultfloat
|
|
1026
|
+
<< std::endl;
|
|
1027
|
+
}
|
|
1028
|
+
timer_.repeat = t;
|
|
1029
|
+
ev_timer_again(loop_, &timer_);
|
|
1030
|
+
}
|
|
1031
|
+
|
|
1032
|
+
#ifdef HAVE_LINUX_RTNETLINK_H
|
|
1033
|
+
namespace {
|
|
1034
|
+
int bind_addr(Address &local_addr, int fd, const in_addr_union *iau,
|
|
1035
|
+
int family) {
|
|
1036
|
+
addrinfo hints{};
|
|
1037
|
+
addrinfo *res, *rp;
|
|
1038
|
+
|
|
1039
|
+
hints.ai_family = family;
|
|
1040
|
+
hints.ai_socktype = SOCK_DGRAM;
|
|
1041
|
+
hints.ai_flags = AI_PASSIVE;
|
|
1042
|
+
|
|
1043
|
+
char *node;
|
|
1044
|
+
std::array<char, NI_MAXHOST> nodebuf;
|
|
1045
|
+
|
|
1046
|
+
if (iau) {
|
|
1047
|
+
if (inet_ntop(family, iau, nodebuf.data(), nodebuf.size()) == nullptr) {
|
|
1048
|
+
std::cerr << "inet_ntop: " << strerror(errno) << std::endl;
|
|
1049
|
+
return -1;
|
|
1050
|
+
}
|
|
1051
|
+
|
|
1052
|
+
node = nodebuf.data();
|
|
1053
|
+
} else {
|
|
1054
|
+
node = nullptr;
|
|
1055
|
+
}
|
|
1056
|
+
|
|
1057
|
+
if (auto rv = getaddrinfo(node, "0", &hints, &res); rv != 0) {
|
|
1058
|
+
std::cerr << "getaddrinfo: " << gai_strerror(rv) << std::endl;
|
|
1059
|
+
return -1;
|
|
1060
|
+
}
|
|
1061
|
+
|
|
1062
|
+
auto res_d = defer(freeaddrinfo, res);
|
|
1063
|
+
|
|
1064
|
+
for (rp = res; rp; rp = rp->ai_next) {
|
|
1065
|
+
if (bind(fd, rp->ai_addr, rp->ai_addrlen) != -1) {
|
|
1066
|
+
break;
|
|
1067
|
+
}
|
|
1068
|
+
}
|
|
1069
|
+
|
|
1070
|
+
if (!rp) {
|
|
1071
|
+
std::cerr << "Could not bind" << std::endl;
|
|
1072
|
+
return -1;
|
|
1073
|
+
}
|
|
1074
|
+
|
|
1075
|
+
socklen_t len = sizeof(local_addr.su.storage);
|
|
1076
|
+
if (getsockname(fd, &local_addr.su.sa, &len) == -1) {
|
|
1077
|
+
std::cerr << "getsockname: " << strerror(errno) << std::endl;
|
|
1078
|
+
return -1;
|
|
1079
|
+
}
|
|
1080
|
+
local_addr.len = len;
|
|
1081
|
+
local_addr.ifindex = 0;
|
|
1082
|
+
|
|
1083
|
+
return 0;
|
|
1084
|
+
}
|
|
1085
|
+
} // namespace
|
|
1086
|
+
#endif // HAVE_LINUX_RTNETLINK_H
|
|
1087
|
+
|
|
1088
|
+
#ifndef HAVE_LINUX_RTNETLINK_H
|
|
1089
|
+
namespace {
|
|
1090
|
+
int connect_sock(Address &local_addr, int fd, const Address &remote_addr) {
|
|
1091
|
+
if (connect(fd, &remote_addr.su.sa, remote_addr.len) != 0) {
|
|
1092
|
+
std::cerr << "connect: " << strerror(errno) << std::endl;
|
|
1093
|
+
return -1;
|
|
1094
|
+
}
|
|
1095
|
+
|
|
1096
|
+
socklen_t len = sizeof(local_addr.su.storage);
|
|
1097
|
+
if (getsockname(fd, &local_addr.su.sa, &len) == -1) {
|
|
1098
|
+
std::cerr << "getsockname: " << strerror(errno) << std::endl;
|
|
1099
|
+
return -1;
|
|
1100
|
+
}
|
|
1101
|
+
local_addr.len = len;
|
|
1102
|
+
local_addr.ifindex = 0;
|
|
1103
|
+
|
|
1104
|
+
return 0;
|
|
1105
|
+
}
|
|
1106
|
+
} // namespace
|
|
1107
|
+
#endif // !HAVE_LINUX_RTNETLINK_H
|
|
1108
|
+
|
|
1109
|
+
namespace {
|
|
1110
|
+
int udp_sock(int family) {
|
|
1111
|
+
auto fd = util::create_nonblock_socket(family, SOCK_DGRAM, IPPROTO_UDP);
|
|
1112
|
+
if (fd == -1) {
|
|
1113
|
+
return -1;
|
|
1114
|
+
}
|
|
1115
|
+
|
|
1116
|
+
fd_set_recv_ecn(fd, family);
|
|
1117
|
+
fd_set_ip_mtu_discover(fd, family);
|
|
1118
|
+
fd_set_ip_dontfrag(fd, family);
|
|
1119
|
+
|
|
1120
|
+
return fd;
|
|
1121
|
+
}
|
|
1122
|
+
} // namespace
|
|
1123
|
+
|
|
1124
|
+
namespace {
|
|
1125
|
+
int create_sock(Address &remote_addr, const char *addr, const char *port) {
|
|
1126
|
+
addrinfo hints{};
|
|
1127
|
+
addrinfo *res, *rp;
|
|
1128
|
+
|
|
1129
|
+
hints.ai_family = AF_UNSPEC;
|
|
1130
|
+
hints.ai_socktype = SOCK_DGRAM;
|
|
1131
|
+
|
|
1132
|
+
if (auto rv = getaddrinfo(addr, port, &hints, &res); rv != 0) {
|
|
1133
|
+
std::cerr << "getaddrinfo: " << gai_strerror(rv) << std::endl;
|
|
1134
|
+
return -1;
|
|
1135
|
+
}
|
|
1136
|
+
|
|
1137
|
+
auto res_d = defer(freeaddrinfo, res);
|
|
1138
|
+
|
|
1139
|
+
int fd = -1;
|
|
1140
|
+
|
|
1141
|
+
for (rp = res; rp; rp = rp->ai_next) {
|
|
1142
|
+
fd = udp_sock(rp->ai_family);
|
|
1143
|
+
if (fd == -1) {
|
|
1144
|
+
continue;
|
|
1145
|
+
}
|
|
1146
|
+
|
|
1147
|
+
break;
|
|
1148
|
+
}
|
|
1149
|
+
|
|
1150
|
+
if (!rp) {
|
|
1151
|
+
std::cerr << "Could not create socket" << std::endl;
|
|
1152
|
+
return -1;
|
|
1153
|
+
}
|
|
1154
|
+
|
|
1155
|
+
remote_addr.len = rp->ai_addrlen;
|
|
1156
|
+
memcpy(&remote_addr.su, rp->ai_addr, rp->ai_addrlen);
|
|
1157
|
+
|
|
1158
|
+
return fd;
|
|
1159
|
+
}
|
|
1160
|
+
} // namespace
|
|
1161
|
+
|
|
1162
|
+
std::optional<Endpoint *> Client::endpoint_for(const Address &remote_addr) {
|
|
1163
|
+
#ifdef HAVE_LINUX_RTNETLINK_H
|
|
1164
|
+
in_addr_union iau;
|
|
1165
|
+
|
|
1166
|
+
if (get_local_addr(iau, remote_addr) != 0) {
|
|
1167
|
+
std::cerr << "Could not get local address for a selected preferred address"
|
|
1168
|
+
<< std::endl;
|
|
1169
|
+
return nullptr;
|
|
1170
|
+
}
|
|
1171
|
+
|
|
1172
|
+
auto current_path = ngtcp2_conn_get_path(conn_);
|
|
1173
|
+
auto current_ep = static_cast<Endpoint *>(current_path->user_data);
|
|
1174
|
+
if (addreq(¤t_ep->addr.su.sa, iau)) {
|
|
1175
|
+
return current_ep;
|
|
1176
|
+
}
|
|
1177
|
+
#endif // HAVE_LINUX_RTNETLINK_H
|
|
1178
|
+
|
|
1179
|
+
auto fd = udp_sock(remote_addr.su.sa.sa_family);
|
|
1180
|
+
if (fd == -1) {
|
|
1181
|
+
return nullptr;
|
|
1182
|
+
}
|
|
1183
|
+
|
|
1184
|
+
Address local_addr;
|
|
1185
|
+
|
|
1186
|
+
#ifdef HAVE_LINUX_RTNETLINK_H
|
|
1187
|
+
if (bind_addr(local_addr, fd, &iau, remote_addr.su.sa.sa_family) != 0) {
|
|
1188
|
+
close(fd);
|
|
1189
|
+
return nullptr;
|
|
1190
|
+
}
|
|
1191
|
+
#else // !HAVE_LINUX_RTNETLINK_H
|
|
1192
|
+
if (connect_sock(local_addr, fd, remote_addr) != 0) {
|
|
1193
|
+
close(fd);
|
|
1194
|
+
return nullptr;
|
|
1195
|
+
}
|
|
1196
|
+
#endif // !HAVE_LINUX_RTNETLINK_H
|
|
1197
|
+
|
|
1198
|
+
endpoints_.emplace_back();
|
|
1199
|
+
auto &ep = endpoints_.back();
|
|
1200
|
+
ep.addr = local_addr;
|
|
1201
|
+
ep.client = this;
|
|
1202
|
+
ep.fd = fd;
|
|
1203
|
+
ev_io_init(&ep.rev, readcb, fd, EV_READ);
|
|
1204
|
+
ep.rev.data = &ep;
|
|
1205
|
+
|
|
1206
|
+
ev_io_start(loop_, &ep.rev);
|
|
1207
|
+
|
|
1208
|
+
return &ep;
|
|
1209
|
+
}
|
|
1210
|
+
|
|
1211
|
+
void Client::start_change_local_addr_timer() {
|
|
1212
|
+
ev_timer_start(loop_, &change_local_addr_timer_);
|
|
1213
|
+
}
|
|
1214
|
+
|
|
1215
|
+
int Client::change_local_addr() {
|
|
1216
|
+
Address local_addr;
|
|
1217
|
+
|
|
1218
|
+
if (!config.quiet) {
|
|
1219
|
+
std::cerr << "Changing local address" << std::endl;
|
|
1220
|
+
}
|
|
1221
|
+
|
|
1222
|
+
auto nfd = udp_sock(remote_addr_.su.sa.sa_family);
|
|
1223
|
+
if (nfd == -1) {
|
|
1224
|
+
return -1;
|
|
1225
|
+
}
|
|
1226
|
+
|
|
1227
|
+
#ifdef HAVE_LINUX_RTNETLINK_H
|
|
1228
|
+
in_addr_union iau;
|
|
1229
|
+
|
|
1230
|
+
if (get_local_addr(iau, remote_addr_) != 0) {
|
|
1231
|
+
std::cerr << "Could not get local address" << std::endl;
|
|
1232
|
+
close(nfd);
|
|
1233
|
+
return -1;
|
|
1234
|
+
}
|
|
1235
|
+
|
|
1236
|
+
if (bind_addr(local_addr, nfd, &iau, remote_addr_.su.sa.sa_family) != 0) {
|
|
1237
|
+
close(nfd);
|
|
1238
|
+
return -1;
|
|
1239
|
+
}
|
|
1240
|
+
#else // !HAVE_LINUX_RTNETLINK_H
|
|
1241
|
+
if (connect_sock(local_addr, nfd, remote_addr_) != 0) {
|
|
1242
|
+
close(nfd);
|
|
1243
|
+
return -1;
|
|
1244
|
+
}
|
|
1245
|
+
#endif // !HAVE_LINUX_RTNETLINK_H
|
|
1246
|
+
|
|
1247
|
+
if (!config.quiet) {
|
|
1248
|
+
std::cerr << "Local address is now "
|
|
1249
|
+
<< util::straddr(&local_addr.su.sa, local_addr.len) << std::endl;
|
|
1250
|
+
}
|
|
1251
|
+
|
|
1252
|
+
endpoints_.emplace_back();
|
|
1253
|
+
auto &ep = endpoints_.back();
|
|
1254
|
+
ep.addr = local_addr;
|
|
1255
|
+
ep.client = this;
|
|
1256
|
+
ep.fd = nfd;
|
|
1257
|
+
ev_io_init(&ep.rev, readcb, nfd, EV_READ);
|
|
1258
|
+
ep.rev.data = &ep;
|
|
1259
|
+
|
|
1260
|
+
ngtcp2_addr addr;
|
|
1261
|
+
ngtcp2_addr_init(&addr, &local_addr.su.sa, local_addr.len);
|
|
1262
|
+
|
|
1263
|
+
if (config.nat_rebinding) {
|
|
1264
|
+
ngtcp2_conn_set_local_addr(conn_, &addr);
|
|
1265
|
+
ngtcp2_conn_set_path_user_data(conn_, &ep);
|
|
1266
|
+
} else {
|
|
1267
|
+
auto path = ngtcp2_path{
|
|
1268
|
+
addr,
|
|
1269
|
+
{
|
|
1270
|
+
const_cast<sockaddr *>(&remote_addr_.su.sa),
|
|
1271
|
+
remote_addr_.len,
|
|
1272
|
+
},
|
|
1273
|
+
&ep,
|
|
1274
|
+
};
|
|
1275
|
+
if (auto rv = ngtcp2_conn_initiate_immediate_migration(
|
|
1276
|
+
conn_, &path, util::timestamp(loop_));
|
|
1277
|
+
rv != 0) {
|
|
1278
|
+
std::cerr << "ngtcp2_conn_initiate_immediate_migration: "
|
|
1279
|
+
<< ngtcp2_strerror(rv) << std::endl;
|
|
1280
|
+
}
|
|
1281
|
+
}
|
|
1282
|
+
|
|
1283
|
+
ev_io_start(loop_, &ep.rev);
|
|
1284
|
+
|
|
1285
|
+
return 0;
|
|
1286
|
+
}
|
|
1287
|
+
|
|
1288
|
+
void Client::start_key_update_timer() {
|
|
1289
|
+
ev_timer_start(loop_, &key_update_timer_);
|
|
1290
|
+
}
|
|
1291
|
+
|
|
1292
|
+
int Client::update_key(uint8_t *rx_secret, uint8_t *tx_secret,
|
|
1293
|
+
ngtcp2_crypto_aead_ctx *rx_aead_ctx, uint8_t *rx_iv,
|
|
1294
|
+
ngtcp2_crypto_aead_ctx *tx_aead_ctx, uint8_t *tx_iv,
|
|
1295
|
+
const uint8_t *current_rx_secret,
|
|
1296
|
+
const uint8_t *current_tx_secret, size_t secretlen) {
|
|
1297
|
+
if (!config.quiet) {
|
|
1298
|
+
std::cerr << "Updating traffic key" << std::endl;
|
|
1299
|
+
}
|
|
1300
|
+
|
|
1301
|
+
auto crypto_ctx = ngtcp2_conn_get_crypto_ctx(conn_);
|
|
1302
|
+
auto aead = &crypto_ctx->aead;
|
|
1303
|
+
auto keylen = ngtcp2_crypto_aead_keylen(aead);
|
|
1304
|
+
auto ivlen = ngtcp2_crypto_packet_protection_ivlen(aead);
|
|
1305
|
+
|
|
1306
|
+
++nkey_update_;
|
|
1307
|
+
|
|
1308
|
+
std::array<uint8_t, 64> rx_key, tx_key;
|
|
1309
|
+
|
|
1310
|
+
if (ngtcp2_crypto_update_key(conn_, rx_secret, tx_secret, rx_aead_ctx,
|
|
1311
|
+
rx_key.data(), rx_iv, tx_aead_ctx, tx_key.data(),
|
|
1312
|
+
tx_iv, current_rx_secret, current_tx_secret,
|
|
1313
|
+
secretlen) != 0) {
|
|
1314
|
+
return -1;
|
|
1315
|
+
}
|
|
1316
|
+
|
|
1317
|
+
if (!config.quiet && config.show_secret) {
|
|
1318
|
+
std::cerr << "application_traffic rx secret " << nkey_update_ << std::endl;
|
|
1319
|
+
debug::print_secrets(rx_secret, secretlen, rx_key.data(), keylen, rx_iv,
|
|
1320
|
+
ivlen);
|
|
1321
|
+
std::cerr << "application_traffic tx secret " << nkey_update_ << std::endl;
|
|
1322
|
+
debug::print_secrets(tx_secret, secretlen, tx_key.data(), keylen, tx_iv,
|
|
1323
|
+
ivlen);
|
|
1324
|
+
}
|
|
1325
|
+
|
|
1326
|
+
return 0;
|
|
1327
|
+
}
|
|
1328
|
+
|
|
1329
|
+
int Client::initiate_key_update() {
|
|
1330
|
+
if (!config.quiet) {
|
|
1331
|
+
std::cerr << "Initiate key update" << std::endl;
|
|
1332
|
+
}
|
|
1333
|
+
|
|
1334
|
+
if (auto rv = ngtcp2_conn_initiate_key_update(conn_, util::timestamp(loop_));
|
|
1335
|
+
rv != 0) {
|
|
1336
|
+
std::cerr << "ngtcp2_conn_initiate_key_update: " << ngtcp2_strerror(rv)
|
|
1337
|
+
<< std::endl;
|
|
1338
|
+
return -1;
|
|
1339
|
+
}
|
|
1340
|
+
|
|
1341
|
+
return 0;
|
|
1342
|
+
}
|
|
1343
|
+
|
|
1344
|
+
void Client::start_delay_stream_timer() {
|
|
1345
|
+
ev_timer_start(loop_, &delay_stream_timer_);
|
|
1346
|
+
}
|
|
1347
|
+
|
|
1348
|
+
int Client::send_packet(const Endpoint &ep, const ngtcp2_addr &remote_addr,
|
|
1349
|
+
unsigned int ecn, const uint8_t *data, size_t datalen) {
|
|
1350
|
+
if (debug::packet_lost(config.tx_loss_prob)) {
|
|
1351
|
+
if (!config.quiet) {
|
|
1352
|
+
std::cerr << "** Simulated outgoing packet loss **" << std::endl;
|
|
1353
|
+
}
|
|
1354
|
+
return NETWORK_ERR_OK;
|
|
1355
|
+
}
|
|
1356
|
+
|
|
1357
|
+
iovec msg_iov;
|
|
1358
|
+
msg_iov.iov_base = const_cast<uint8_t *>(data);
|
|
1359
|
+
msg_iov.iov_len = datalen;
|
|
1360
|
+
|
|
1361
|
+
msghdr msg{};
|
|
1362
|
+
#ifdef HAVE_LINUX_RTNETLINK_H
|
|
1363
|
+
msg.msg_name = const_cast<sockaddr *>(remote_addr.addr);
|
|
1364
|
+
msg.msg_namelen = remote_addr.addrlen;
|
|
1365
|
+
#endif // HAVE_LINUX_RTNETLINK_H
|
|
1366
|
+
msg.msg_iov = &msg_iov;
|
|
1367
|
+
msg.msg_iovlen = 1;
|
|
1368
|
+
|
|
1369
|
+
fd_set_ecn(ep.fd, remote_addr.addr->sa_family, ecn);
|
|
1370
|
+
|
|
1371
|
+
ssize_t nwrite = 0;
|
|
1372
|
+
|
|
1373
|
+
do {
|
|
1374
|
+
nwrite = sendmsg(ep.fd, &msg, 0);
|
|
1375
|
+
} while (nwrite == -1 && errno == EINTR);
|
|
1376
|
+
|
|
1377
|
+
if (nwrite == -1) {
|
|
1378
|
+
if (errno == EAGAIN || errno == EWOULDBLOCK) {
|
|
1379
|
+
return NETWORK_ERR_SEND_BLOCKED;
|
|
1380
|
+
}
|
|
1381
|
+
std::cerr << "sendmsg: " << strerror(errno) << std::endl;
|
|
1382
|
+
if (errno == EMSGSIZE) {
|
|
1383
|
+
return 0;
|
|
1384
|
+
}
|
|
1385
|
+
return NETWORK_ERR_FATAL;
|
|
1386
|
+
}
|
|
1387
|
+
|
|
1388
|
+
assert(static_cast<size_t>(nwrite) == datalen);
|
|
1389
|
+
|
|
1390
|
+
if (!config.quiet) {
|
|
1391
|
+
std::cerr << "Sent packet: local="
|
|
1392
|
+
<< util::straddr(&ep.addr.su.sa, ep.addr.len) << " remote="
|
|
1393
|
+
<< util::straddr(remote_addr.addr, remote_addr.addrlen)
|
|
1394
|
+
<< " ecn=0x" << std::hex << ecn << std::dec << " " << nwrite
|
|
1395
|
+
<< " bytes" << std::endl;
|
|
1396
|
+
}
|
|
1397
|
+
|
|
1398
|
+
return NETWORK_ERR_OK;
|
|
1399
|
+
}
|
|
1400
|
+
|
|
1401
|
+
void Client::on_send_blocked(const Endpoint &ep, const ngtcp2_addr &remote_addr,
|
|
1402
|
+
unsigned int ecn, size_t datalen) {
|
|
1403
|
+
assert(!tx_.send_blocked);
|
|
1404
|
+
|
|
1405
|
+
tx_.send_blocked = true;
|
|
1406
|
+
|
|
1407
|
+
memcpy(&tx_.blocked.remote_addr.su, remote_addr.addr, remote_addr.addrlen);
|
|
1408
|
+
tx_.blocked.remote_addr.len = remote_addr.addrlen;
|
|
1409
|
+
tx_.blocked.ecn = ecn;
|
|
1410
|
+
tx_.blocked.datalen = datalen;
|
|
1411
|
+
tx_.blocked.endpoint = &ep;
|
|
1412
|
+
|
|
1413
|
+
start_wev_endpoint(ep);
|
|
1414
|
+
}
|
|
1415
|
+
|
|
1416
|
+
void Client::start_wev_endpoint(const Endpoint &ep) {
|
|
1417
|
+
// We do not close ep.fd, so we can expect that each Endpoint has
|
|
1418
|
+
// unique fd.
|
|
1419
|
+
if (ep.fd != wev_.fd) {
|
|
1420
|
+
if (ev_is_active(&wev_)) {
|
|
1421
|
+
ev_io_stop(loop_, &wev_);
|
|
1422
|
+
}
|
|
1423
|
+
|
|
1424
|
+
ev_io_set(&wev_, ep.fd, EV_WRITE);
|
|
1425
|
+
}
|
|
1426
|
+
|
|
1427
|
+
ev_io_start(loop_, &wev_);
|
|
1428
|
+
}
|
|
1429
|
+
|
|
1430
|
+
int Client::send_blocked_packet() {
|
|
1431
|
+
assert(tx_.send_blocked);
|
|
1432
|
+
|
|
1433
|
+
ngtcp2_addr remote_addr{
|
|
1434
|
+
.addr = &tx_.blocked.remote_addr.su.sa,
|
|
1435
|
+
.addrlen = tx_.blocked.remote_addr.len,
|
|
1436
|
+
};
|
|
1437
|
+
|
|
1438
|
+
auto rv = send_packet(*tx_.blocked.endpoint, remote_addr, tx_.blocked.ecn,
|
|
1439
|
+
tx_.data.data(), tx_.blocked.datalen);
|
|
1440
|
+
if (rv != 0) {
|
|
1441
|
+
if (rv == NETWORK_ERR_SEND_BLOCKED) {
|
|
1442
|
+
assert(wev_.fd == tx_.blocked.endpoint->fd);
|
|
1443
|
+
|
|
1444
|
+
return 0;
|
|
1445
|
+
}
|
|
1446
|
+
|
|
1447
|
+
ngtcp2_connection_close_error_set_transport_error_liberr(
|
|
1448
|
+
&last_error_, NGTCP2_ERR_INTERNAL, nullptr, 0);
|
|
1449
|
+
disconnect();
|
|
1450
|
+
|
|
1451
|
+
return rv;
|
|
1452
|
+
}
|
|
1453
|
+
|
|
1454
|
+
tx_.send_blocked = false;
|
|
1455
|
+
|
|
1456
|
+
return 0;
|
|
1457
|
+
}
|
|
1458
|
+
|
|
1459
|
+
int Client::handle_error() {
|
|
1460
|
+
if (!conn_ || ngtcp2_conn_is_in_closing_period(conn_) ||
|
|
1461
|
+
ngtcp2_conn_is_in_draining_period(conn_)) {
|
|
1462
|
+
return 0;
|
|
1463
|
+
}
|
|
1464
|
+
|
|
1465
|
+
std::array<uint8_t, NGTCP2_MAX_UDP_PAYLOAD_SIZE> buf;
|
|
1466
|
+
|
|
1467
|
+
ngtcp2_path_storage ps;
|
|
1468
|
+
|
|
1469
|
+
ngtcp2_path_storage_zero(&ps);
|
|
1470
|
+
|
|
1471
|
+
ngtcp2_pkt_info pi;
|
|
1472
|
+
|
|
1473
|
+
auto nwrite = ngtcp2_conn_write_connection_close(
|
|
1474
|
+
conn_, &ps.path, &pi, buf.data(), buf.size(), &last_error_,
|
|
1475
|
+
util::timestamp(loop_));
|
|
1476
|
+
if (nwrite < 0) {
|
|
1477
|
+
std::cerr << "ngtcp2_conn_write_connection_close: "
|
|
1478
|
+
<< ngtcp2_strerror(nwrite) << std::endl;
|
|
1479
|
+
return -1;
|
|
1480
|
+
}
|
|
1481
|
+
|
|
1482
|
+
if (nwrite == 0) {
|
|
1483
|
+
return 0;
|
|
1484
|
+
}
|
|
1485
|
+
|
|
1486
|
+
return send_packet(*static_cast<Endpoint *>(ps.path.user_data),
|
|
1487
|
+
ps.path.remote, pi.ecn, buf.data(), nwrite);
|
|
1488
|
+
}
|
|
1489
|
+
|
|
1490
|
+
int Client::on_stream_close(int64_t stream_id, uint64_t app_error_code) {
|
|
1491
|
+
auto it = streams_.find(stream_id);
|
|
1492
|
+
assert(it != std::end(streams_));
|
|
1493
|
+
auto &stream = (*it).second;
|
|
1494
|
+
|
|
1495
|
+
sendq_.erase(stream.get());
|
|
1496
|
+
|
|
1497
|
+
++nstreams_closed_;
|
|
1498
|
+
|
|
1499
|
+
if (config.exit_on_first_stream_close ||
|
|
1500
|
+
(config.exit_on_all_streams_close && config.nstreams == nstreams_done_ &&
|
|
1501
|
+
nstreams_closed_ == nstreams_done_)) {
|
|
1502
|
+
if (handshake_confirmed_) {
|
|
1503
|
+
should_exit_ = true;
|
|
1504
|
+
} else {
|
|
1505
|
+
should_exit_on_handshake_confirmed_ = true;
|
|
1506
|
+
}
|
|
1507
|
+
}
|
|
1508
|
+
|
|
1509
|
+
if (!ngtcp2_is_bidi_stream(stream_id)) {
|
|
1510
|
+
assert(!ngtcp2_conn_is_local_stream(conn_, stream_id));
|
|
1511
|
+
ngtcp2_conn_extend_max_streams_uni(conn_, 1);
|
|
1512
|
+
}
|
|
1513
|
+
|
|
1514
|
+
if (!config.quiet) {
|
|
1515
|
+
std::cerr << "HTTP stream " << stream_id << " closed with error code "
|
|
1516
|
+
<< app_error_code << std::endl;
|
|
1517
|
+
}
|
|
1518
|
+
streams_.erase(it);
|
|
1519
|
+
|
|
1520
|
+
return 0;
|
|
1521
|
+
}
|
|
1522
|
+
|
|
1523
|
+
int Client::make_stream_early() { return on_extend_max_streams(); }
|
|
1524
|
+
|
|
1525
|
+
int Client::on_extend_max_streams() {
|
|
1526
|
+
int64_t stream_id;
|
|
1527
|
+
|
|
1528
|
+
if ((config.delay_stream && !handshake_confirmed_) ||
|
|
1529
|
+
ev_is_active(&delay_stream_timer_)) {
|
|
1530
|
+
return 0;
|
|
1531
|
+
}
|
|
1532
|
+
|
|
1533
|
+
for (; nstreams_done_ < config.nstreams; ++nstreams_done_) {
|
|
1534
|
+
if (auto rv = ngtcp2_conn_open_bidi_stream(conn_, &stream_id, nullptr);
|
|
1535
|
+
rv != 0) {
|
|
1536
|
+
assert(NGTCP2_ERR_STREAM_ID_BLOCKED == rv);
|
|
1537
|
+
break;
|
|
1538
|
+
}
|
|
1539
|
+
|
|
1540
|
+
auto stream = std::make_unique<Stream>(
|
|
1541
|
+
config.requests[nstreams_done_ % config.requests.size()], stream_id);
|
|
1542
|
+
|
|
1543
|
+
if (submit_http_request(stream.get()) != 0) {
|
|
1544
|
+
break;
|
|
1545
|
+
}
|
|
1546
|
+
|
|
1547
|
+
if (!config.download.empty()) {
|
|
1548
|
+
stream->open_file(stream->req.path);
|
|
1549
|
+
}
|
|
1550
|
+
streams_.emplace(stream_id, std::move(stream));
|
|
1551
|
+
}
|
|
1552
|
+
return 0;
|
|
1553
|
+
}
|
|
1554
|
+
|
|
1555
|
+
int Client::submit_http_request(Stream *stream) {
|
|
1556
|
+
const auto &req = stream->req;
|
|
1557
|
+
|
|
1558
|
+
stream->rawreqbuf = config.http_method;
|
|
1559
|
+
stream->rawreqbuf += ' ';
|
|
1560
|
+
stream->rawreqbuf += req.path;
|
|
1561
|
+
stream->rawreqbuf += "\r\n";
|
|
1562
|
+
|
|
1563
|
+
nghttp3_buf_init(&stream->reqbuf);
|
|
1564
|
+
stream->reqbuf.begin = reinterpret_cast<uint8_t *>(stream->rawreqbuf.data());
|
|
1565
|
+
stream->reqbuf.pos = stream->reqbuf.begin;
|
|
1566
|
+
stream->reqbuf.end = stream->reqbuf.last =
|
|
1567
|
+
stream->reqbuf.begin + stream->rawreqbuf.size();
|
|
1568
|
+
|
|
1569
|
+
if (!config.quiet) {
|
|
1570
|
+
auto nva = std::array<nghttp3_nv, 2>{
|
|
1571
|
+
util::make_nv_nn(":method", config.http_method),
|
|
1572
|
+
util::make_nv_nn(":path", req.path),
|
|
1573
|
+
};
|
|
1574
|
+
debug::print_http_request_headers(stream->stream_id, nva.data(),
|
|
1575
|
+
nva.size());
|
|
1576
|
+
}
|
|
1577
|
+
|
|
1578
|
+
sendq_.emplace(stream);
|
|
1579
|
+
|
|
1580
|
+
return 0;
|
|
1581
|
+
}
|
|
1582
|
+
|
|
1583
|
+
int Client::recv_stream_data(uint32_t flags, int64_t stream_id,
|
|
1584
|
+
const uint8_t *data, size_t datalen) {
|
|
1585
|
+
auto it = streams_.find(stream_id);
|
|
1586
|
+
assert(it != std::end(streams_));
|
|
1587
|
+
auto &stream = (*it).second;
|
|
1588
|
+
|
|
1589
|
+
ngtcp2_conn_extend_max_stream_offset(conn_, stream_id, datalen);
|
|
1590
|
+
ngtcp2_conn_extend_max_offset(conn_, datalen);
|
|
1591
|
+
|
|
1592
|
+
if (stream->fd == -1) {
|
|
1593
|
+
return 0;
|
|
1594
|
+
}
|
|
1595
|
+
|
|
1596
|
+
ssize_t nwrite;
|
|
1597
|
+
do {
|
|
1598
|
+
nwrite = write(stream->fd, data, datalen);
|
|
1599
|
+
} while (nwrite == -1 && errno == EINTR);
|
|
1600
|
+
|
|
1601
|
+
return 0;
|
|
1602
|
+
}
|
|
1603
|
+
|
|
1604
|
+
int Client::acked_stream_data_offset(int64_t stream_id, uint64_t offset,
|
|
1605
|
+
uint64_t datalen) {
|
|
1606
|
+
auto it = streams_.find(stream_id);
|
|
1607
|
+
assert(it != std::end(streams_));
|
|
1608
|
+
auto &stream = (*it).second;
|
|
1609
|
+
(void)stream;
|
|
1610
|
+
assert(static_cast<uint64_t>(stream->reqbuf.end - stream->reqbuf.begin) >=
|
|
1611
|
+
offset + datalen);
|
|
1612
|
+
return 0;
|
|
1613
|
+
}
|
|
1614
|
+
|
|
1615
|
+
int Client::select_preferred_address(Address &selected_addr,
|
|
1616
|
+
const ngtcp2_preferred_addr *paddr) {
|
|
1617
|
+
auto path = ngtcp2_conn_get_path(conn_);
|
|
1618
|
+
|
|
1619
|
+
switch (path->local.addr->sa_family) {
|
|
1620
|
+
case AF_INET:
|
|
1621
|
+
if (!paddr->ipv4_present) {
|
|
1622
|
+
return -1;
|
|
1623
|
+
}
|
|
1624
|
+
selected_addr.su.in = paddr->ipv4;
|
|
1625
|
+
selected_addr.len = sizeof(paddr->ipv4);
|
|
1626
|
+
break;
|
|
1627
|
+
case AF_INET6:
|
|
1628
|
+
if (!paddr->ipv6_present) {
|
|
1629
|
+
return -1;
|
|
1630
|
+
}
|
|
1631
|
+
selected_addr.su.in6 = paddr->ipv6;
|
|
1632
|
+
selected_addr.len = sizeof(paddr->ipv6);
|
|
1633
|
+
break;
|
|
1634
|
+
default:
|
|
1635
|
+
return -1;
|
|
1636
|
+
}
|
|
1637
|
+
|
|
1638
|
+
char host[NI_MAXHOST], service[NI_MAXSERV];
|
|
1639
|
+
if (auto rv = getnameinfo(&selected_addr.su.sa, selected_addr.len, host,
|
|
1640
|
+
sizeof(host), service, sizeof(service),
|
|
1641
|
+
NI_NUMERICHOST | NI_NUMERICSERV);
|
|
1642
|
+
rv != 0) {
|
|
1643
|
+
std::cerr << "getnameinfo: " << gai_strerror(rv) << std::endl;
|
|
1644
|
+
return -1;
|
|
1645
|
+
}
|
|
1646
|
+
|
|
1647
|
+
if (!config.quiet) {
|
|
1648
|
+
std::cerr << "selected server preferred_address is [" << host
|
|
1649
|
+
<< "]:" << service << std::endl;
|
|
1650
|
+
}
|
|
1651
|
+
|
|
1652
|
+
return 0;
|
|
1653
|
+
}
|
|
1654
|
+
|
|
1655
|
+
const std::vector<uint32_t> &Client::get_offered_versions() const {
|
|
1656
|
+
return offered_versions_;
|
|
1657
|
+
}
|
|
1658
|
+
|
|
1659
|
+
namespace {
|
|
1660
|
+
int run(Client &c, const char *addr, const char *port,
|
|
1661
|
+
TLSClientContext &tls_ctx) {
|
|
1662
|
+
Address remote_addr, local_addr;
|
|
1663
|
+
|
|
1664
|
+
auto fd = create_sock(remote_addr, addr, port);
|
|
1665
|
+
if (fd == -1) {
|
|
1666
|
+
return -1;
|
|
1667
|
+
}
|
|
1668
|
+
|
|
1669
|
+
#ifdef HAVE_LINUX_RTNETLINK_H
|
|
1670
|
+
in_addr_union iau;
|
|
1671
|
+
|
|
1672
|
+
if (get_local_addr(iau, remote_addr) != 0) {
|
|
1673
|
+
std::cerr << "Could not get local address" << std::endl;
|
|
1674
|
+
close(fd);
|
|
1675
|
+
return -1;
|
|
1676
|
+
}
|
|
1677
|
+
|
|
1678
|
+
if (bind_addr(local_addr, fd, &iau, remote_addr.su.sa.sa_family) != 0) {
|
|
1679
|
+
close(fd);
|
|
1680
|
+
return -1;
|
|
1681
|
+
}
|
|
1682
|
+
#else // !HAVE_LINUX_RTNETLINK_H
|
|
1683
|
+
if (connect_sock(local_addr, fd, remote_addr) != 0) {
|
|
1684
|
+
close(fd);
|
|
1685
|
+
return -1;
|
|
1686
|
+
}
|
|
1687
|
+
#endif // !HAVE_LINUX_RTNETLINK_H
|
|
1688
|
+
|
|
1689
|
+
if (c.init(fd, local_addr, remote_addr, addr, port, tls_ctx) != 0) {
|
|
1690
|
+
return -1;
|
|
1691
|
+
}
|
|
1692
|
+
|
|
1693
|
+
// TODO Do we need this ?
|
|
1694
|
+
if (auto rv = c.on_write(); rv != 0) {
|
|
1695
|
+
return rv;
|
|
1696
|
+
}
|
|
1697
|
+
|
|
1698
|
+
ev_run(EV_DEFAULT, 0);
|
|
1699
|
+
|
|
1700
|
+
return 0;
|
|
1701
|
+
}
|
|
1702
|
+
} // namespace
|
|
1703
|
+
|
|
1704
|
+
namespace {
|
|
1705
|
+
std::string_view get_string(const char *uri, const http_parser_url &u,
|
|
1706
|
+
http_parser_url_fields f) {
|
|
1707
|
+
auto p = &u.field_data[f];
|
|
1708
|
+
return {uri + p->off, p->len};
|
|
1709
|
+
}
|
|
1710
|
+
} // namespace
|
|
1711
|
+
|
|
1712
|
+
namespace {
|
|
1713
|
+
int parse_uri(Request &req, const char *uri) {
|
|
1714
|
+
http_parser_url u;
|
|
1715
|
+
|
|
1716
|
+
http_parser_url_init(&u);
|
|
1717
|
+
if (http_parser_parse_url(uri, strlen(uri), /* is_connect = */ 0, &u) != 0) {
|
|
1718
|
+
return -1;
|
|
1719
|
+
}
|
|
1720
|
+
|
|
1721
|
+
if (!(u.field_set & (1 << UF_SCHEMA)) || !(u.field_set & (1 << UF_HOST))) {
|
|
1722
|
+
return -1;
|
|
1723
|
+
}
|
|
1724
|
+
|
|
1725
|
+
req.scheme = get_string(uri, u, UF_SCHEMA);
|
|
1726
|
+
|
|
1727
|
+
req.authority = get_string(uri, u, UF_HOST);
|
|
1728
|
+
if (util::numeric_host(req.authority.c_str(), AF_INET6)) {
|
|
1729
|
+
req.authority = '[' + req.authority + ']';
|
|
1730
|
+
}
|
|
1731
|
+
if (u.field_set & (1 << UF_PORT)) {
|
|
1732
|
+
req.authority += ':';
|
|
1733
|
+
req.authority += get_string(uri, u, UF_PORT);
|
|
1734
|
+
}
|
|
1735
|
+
|
|
1736
|
+
if (u.field_set & (1 << UF_PATH)) {
|
|
1737
|
+
req.path = get_string(uri, u, UF_PATH);
|
|
1738
|
+
} else {
|
|
1739
|
+
req.path = "/";
|
|
1740
|
+
}
|
|
1741
|
+
|
|
1742
|
+
if (u.field_set & (1 << UF_QUERY)) {
|
|
1743
|
+
req.path += '?';
|
|
1744
|
+
req.path += get_string(uri, u, UF_QUERY);
|
|
1745
|
+
}
|
|
1746
|
+
|
|
1747
|
+
return 0;
|
|
1748
|
+
}
|
|
1749
|
+
} // namespace
|
|
1750
|
+
|
|
1751
|
+
namespace {
|
|
1752
|
+
int parse_requests(char **argv, size_t argvlen) {
|
|
1753
|
+
for (size_t i = 0; i < argvlen; ++i) {
|
|
1754
|
+
auto uri = argv[i];
|
|
1755
|
+
Request req;
|
|
1756
|
+
if (parse_uri(req, uri) != 0) {
|
|
1757
|
+
std::cerr << "Could not parse URI: " << uri << std::endl;
|
|
1758
|
+
return -1;
|
|
1759
|
+
}
|
|
1760
|
+
config.requests.emplace_back(std::move(req));
|
|
1761
|
+
}
|
|
1762
|
+
return 0;
|
|
1763
|
+
}
|
|
1764
|
+
} // namespace
|
|
1765
|
+
|
|
1766
|
+
std::ofstream keylog_file;
|
|
1767
|
+
|
|
1768
|
+
namespace {
|
|
1769
|
+
void print_usage() {
|
|
1770
|
+
std::cerr << "Usage: h09client [OPTIONS] <HOST> <PORT> [<URI>...]"
|
|
1771
|
+
<< std::endl;
|
|
1772
|
+
}
|
|
1773
|
+
} // namespace
|
|
1774
|
+
|
|
1775
|
+
namespace {
|
|
1776
|
+
void config_set_default(Config &config) {
|
|
1777
|
+
config = Config{};
|
|
1778
|
+
config.tx_loss_prob = 0.;
|
|
1779
|
+
config.rx_loss_prob = 0.;
|
|
1780
|
+
config.fd = -1;
|
|
1781
|
+
config.ciphers = util::crypto_default_ciphers();
|
|
1782
|
+
config.groups = util::crypto_default_groups();
|
|
1783
|
+
config.nstreams = 0;
|
|
1784
|
+
config.data = nullptr;
|
|
1785
|
+
config.datalen = 0;
|
|
1786
|
+
config.version = NGTCP2_PROTO_VER_V1;
|
|
1787
|
+
config.timeout = 30 * NGTCP2_SECONDS;
|
|
1788
|
+
config.http_method = "GET"sv;
|
|
1789
|
+
config.max_data = 15_m;
|
|
1790
|
+
config.max_stream_data_bidi_local = 6_m;
|
|
1791
|
+
config.max_stream_data_bidi_remote = 6_m;
|
|
1792
|
+
config.max_stream_data_uni = 6_m;
|
|
1793
|
+
config.max_window = 24_m;
|
|
1794
|
+
config.max_stream_window = 16_m;
|
|
1795
|
+
config.max_streams_uni = 100;
|
|
1796
|
+
config.cc_algo = NGTCP2_CC_ALGO_CUBIC;
|
|
1797
|
+
config.initial_rtt = NGTCP2_DEFAULT_INITIAL_RTT;
|
|
1798
|
+
config.handshake_timeout = UINT64_MAX;
|
|
1799
|
+
config.ack_thresh = 2;
|
|
1800
|
+
}
|
|
1801
|
+
} // namespace
|
|
1802
|
+
|
|
1803
|
+
namespace {
|
|
1804
|
+
void print_help() {
|
|
1805
|
+
print_usage();
|
|
1806
|
+
|
|
1807
|
+
config_set_default(config);
|
|
1808
|
+
|
|
1809
|
+
std::cout << R"(
|
|
1810
|
+
<HOST> Remote server host (DNS name or IP address). In case of
|
|
1811
|
+
DNS name, it will be sent in TLS SNI extension.
|
|
1812
|
+
<PORT> Remote server port
|
|
1813
|
+
<URI> Remote URI
|
|
1814
|
+
Options:
|
|
1815
|
+
-t, --tx-loss=<P>
|
|
1816
|
+
The probability of losing outgoing packets. <P> must be
|
|
1817
|
+
[0.0, 1.0], inclusive. 0.0 means no packet loss. 1.0
|
|
1818
|
+
means 100% packet loss.
|
|
1819
|
+
-r, --rx-loss=<P>
|
|
1820
|
+
The probability of losing incoming packets. <P> must be
|
|
1821
|
+
[0.0, 1.0], inclusive. 0.0 means no packet loss. 1.0
|
|
1822
|
+
means 100% packet loss.
|
|
1823
|
+
-d, --data=<PATH>
|
|
1824
|
+
Read data from <PATH>, and send them as STREAM data.
|
|
1825
|
+
-n, --nstreams=<N>
|
|
1826
|
+
The number of requests. <URI>s are used in the order of
|
|
1827
|
+
appearance in the command-line. If the number of <URI>
|
|
1828
|
+
list is less than <N>, <URI> list is wrapped. It
|
|
1829
|
+
defaults to 0 which means the number of <URI> specified.
|
|
1830
|
+
-v, --version=<HEX>
|
|
1831
|
+
Specify QUIC version to use in hex string. If the given
|
|
1832
|
+
version is not supported by libngtcp2, client will use
|
|
1833
|
+
QUIC v1 long packet types. Instead of specifying hex
|
|
1834
|
+
string, there are special aliases available: "v1"
|
|
1835
|
+
indicates QUIC v1, and "v2" indicates QUIC v2.
|
|
1836
|
+
Default: )"
|
|
1837
|
+
<< std::hex << "0x" << config.version << std::dec << R"(
|
|
1838
|
+
--preferred-versions=<HEX>[[,<HEX>]...]
|
|
1839
|
+
Specify QUIC versions in hex string in the order of
|
|
1840
|
+
preference. Client chooses one of those versions if
|
|
1841
|
+
client received Version Negotiation packet from server.
|
|
1842
|
+
These versions must be supported by libngtcp2. Instead
|
|
1843
|
+
of specifying hex string, there are special aliases
|
|
1844
|
+
available: "v1" indicates QUIC v1, and "v2" indicates
|
|
1845
|
+
QUIC v2.
|
|
1846
|
+
--available-versions=<HEX>[[,<HEX>]...]
|
|
1847
|
+
Specify QUIC versions in hex string that are sent in
|
|
1848
|
+
available_versions field of version_information
|
|
1849
|
+
transport parameter. This list can include a version
|
|
1850
|
+
which is not supported by libngtcp2. Instead of
|
|
1851
|
+
specifying hex string, there are special aliases
|
|
1852
|
+
available: "v1" indicates QUIC v1, and "v2" indicates
|
|
1853
|
+
QUIC v2.
|
|
1854
|
+
-q, --quiet Suppress debug output.
|
|
1855
|
+
-s, --show-secret
|
|
1856
|
+
Print out secrets unless --quiet is used.
|
|
1857
|
+
--timeout=<DURATION>
|
|
1858
|
+
Specify idle timeout.
|
|
1859
|
+
Default: )"
|
|
1860
|
+
<< util::format_duration(config.timeout) << R"(
|
|
1861
|
+
--ciphers=<CIPHERS>
|
|
1862
|
+
Specify the cipher suite list to enable.
|
|
1863
|
+
Default: )"
|
|
1864
|
+
<< config.ciphers << R"(
|
|
1865
|
+
--groups=<GROUPS>
|
|
1866
|
+
Specify the supported groups.
|
|
1867
|
+
Default: )"
|
|
1868
|
+
<< config.groups << R"(
|
|
1869
|
+
--session-file=<PATH>
|
|
1870
|
+
Read/write TLS session from/to <PATH>. To resume a
|
|
1871
|
+
session, the previous session must be supplied with this
|
|
1872
|
+
option.
|
|
1873
|
+
--tp-file=<PATH>
|
|
1874
|
+
Read/write QUIC transport parameters from/to <PATH>. To
|
|
1875
|
+
send 0-RTT data, the transport parameters received from
|
|
1876
|
+
the previous session must be supplied with this option.
|
|
1877
|
+
--dcid=<DCID>
|
|
1878
|
+
Specify initial DCID. <DCID> is hex string. When
|
|
1879
|
+
decoded as binary, it should be at least 8 bytes and at
|
|
1880
|
+
most 18 bytes long.
|
|
1881
|
+
--change-local-addr=<DURATION>
|
|
1882
|
+
Client changes local address when <DURATION> elapse
|
|
1883
|
+
after handshake completes.
|
|
1884
|
+
--nat-rebinding
|
|
1885
|
+
When used with --change-local-addr, simulate NAT
|
|
1886
|
+
rebinding. In other words, client changes local
|
|
1887
|
+
address, but it does not start path validation.
|
|
1888
|
+
--key-update=<DURATION>
|
|
1889
|
+
Client initiates key update when <DURATION> elapse after
|
|
1890
|
+
handshake completes.
|
|
1891
|
+
-m, --http-method=<METHOD>
|
|
1892
|
+
Specify HTTP method. Default: )"
|
|
1893
|
+
<< config.http_method << R"(
|
|
1894
|
+
--delay-stream=<DURATION>
|
|
1895
|
+
Delay sending STREAM data in 1-RTT for <DURATION> after
|
|
1896
|
+
handshake completes.
|
|
1897
|
+
--no-preferred-addr
|
|
1898
|
+
Do not try to use preferred address offered by server.
|
|
1899
|
+
--key=<PATH>
|
|
1900
|
+
The path to client private key PEM file.
|
|
1901
|
+
--cert=<PATH>
|
|
1902
|
+
The path to client certificate PEM file.
|
|
1903
|
+
--download=<PATH>
|
|
1904
|
+
The path to the directory to save a downloaded content.
|
|
1905
|
+
It is undefined if 2 concurrent requests write to the
|
|
1906
|
+
same file. If a request path does not contain a path
|
|
1907
|
+
component usable as a file name, it defaults to
|
|
1908
|
+
"index.html".
|
|
1909
|
+
--no-quic-dump
|
|
1910
|
+
Disables printing QUIC STREAM and CRYPTO frame data out.
|
|
1911
|
+
--no-http-dump
|
|
1912
|
+
Disables printing HTTP response body out.
|
|
1913
|
+
--qlog-file=<PATH>
|
|
1914
|
+
The path to write qlog. This option and --qlog-dir are
|
|
1915
|
+
mutually exclusive.
|
|
1916
|
+
--qlog-dir=<PATH>
|
|
1917
|
+
Path to the directory where qlog file is stored. The
|
|
1918
|
+
file name of each qlog is the Source Connection ID of
|
|
1919
|
+
client. This option and --qlog-file are mutually
|
|
1920
|
+
exclusive.
|
|
1921
|
+
--max-data=<SIZE>
|
|
1922
|
+
The initial connection-level flow control window.
|
|
1923
|
+
Default: )"
|
|
1924
|
+
<< util::format_uint_iec(config.max_data) << R"(
|
|
1925
|
+
--max-stream-data-bidi-local=<SIZE>
|
|
1926
|
+
The initial stream-level flow control window for a
|
|
1927
|
+
bidirectional stream that the local endpoint initiates.
|
|
1928
|
+
Default: )"
|
|
1929
|
+
<< util::format_uint_iec(config.max_stream_data_bidi_local) << R"(
|
|
1930
|
+
--max-stream-data-bidi-remote=<SIZE>
|
|
1931
|
+
The initial stream-level flow control window for a
|
|
1932
|
+
bidirectional stream that the remote endpoint initiates.
|
|
1933
|
+
Default: )"
|
|
1934
|
+
<< util::format_uint_iec(config.max_stream_data_bidi_remote) << R"(
|
|
1935
|
+
--max-stream-data-uni=<SIZE>
|
|
1936
|
+
The initial stream-level flow control window for a
|
|
1937
|
+
unidirectional stream.
|
|
1938
|
+
Default: )"
|
|
1939
|
+
<< util::format_uint_iec(config.max_stream_data_uni) << R"(
|
|
1940
|
+
--max-streams-bidi=<N>
|
|
1941
|
+
The number of the concurrent bidirectional streams.
|
|
1942
|
+
Default: )"
|
|
1943
|
+
<< config.max_streams_bidi << R"(
|
|
1944
|
+
--max-streams-uni=<N>
|
|
1945
|
+
The number of the concurrent unidirectional streams.
|
|
1946
|
+
Default: )"
|
|
1947
|
+
<< config.max_streams_uni << R"(
|
|
1948
|
+
--exit-on-first-stream-close
|
|
1949
|
+
Exit when a first HTTP stream is closed.
|
|
1950
|
+
--exit-on-all-streams-close
|
|
1951
|
+
Exit when all HTTP streams are closed.
|
|
1952
|
+
--disable-early-data
|
|
1953
|
+
Disable early data.
|
|
1954
|
+
--cc=(cubic|reno|bbr|bbr2)
|
|
1955
|
+
The name of congestion controller algorithm.
|
|
1956
|
+
Default: )"
|
|
1957
|
+
<< util::strccalgo(config.cc_algo) << R"(
|
|
1958
|
+
--token-file=<PATH>
|
|
1959
|
+
Read/write token from/to <PATH>. Token is obtained from
|
|
1960
|
+
NEW_TOKEN frame from server.
|
|
1961
|
+
--sni=<DNSNAME>
|
|
1962
|
+
Send <DNSNAME> in TLS SNI, overriding the DNS name
|
|
1963
|
+
specified in <HOST>.
|
|
1964
|
+
--initial-rtt=<DURATION>
|
|
1965
|
+
Set an initial RTT.
|
|
1966
|
+
Default: )"
|
|
1967
|
+
<< util::format_duration(config.initial_rtt) << R"(
|
|
1968
|
+
--max-window=<SIZE>
|
|
1969
|
+
Maximum connection-level flow control window size. The
|
|
1970
|
+
window auto-tuning is enabled if nonzero value is given,
|
|
1971
|
+
and window size is scaled up to this value.
|
|
1972
|
+
Default: )"
|
|
1973
|
+
<< util::format_uint_iec(config.max_window) << R"(
|
|
1974
|
+
--max-stream-window=<SIZE>
|
|
1975
|
+
Maximum stream-level flow control window size. The
|
|
1976
|
+
window auto-tuning is enabled if nonzero value is given,
|
|
1977
|
+
and window size is scaled up to this value.
|
|
1978
|
+
Default: )"
|
|
1979
|
+
<< util::format_uint_iec(config.max_stream_window) << R"(
|
|
1980
|
+
--max-udp-payload-size=<SIZE>
|
|
1981
|
+
Override maximum UDP payload size that client transmits.
|
|
1982
|
+
--handshake-timeout=<DURATION>
|
|
1983
|
+
Set the QUIC handshake timeout. It defaults to no
|
|
1984
|
+
timeout.
|
|
1985
|
+
--no-pmtud Disables Path MTU Discovery.
|
|
1986
|
+
--ack-thresh=<N>
|
|
1987
|
+
The minimum number of the received ACK eliciting packets
|
|
1988
|
+
that triggers immediate acknowledgement.
|
|
1989
|
+
Default: )"
|
|
1990
|
+
<< config.ack_thresh << R"(
|
|
1991
|
+
-h, --help Display this help and exit.
|
|
1992
|
+
|
|
1993
|
+
---
|
|
1994
|
+
|
|
1995
|
+
The <SIZE> argument is an integer and an optional unit (e.g., 10K is
|
|
1996
|
+
10 * 1024). Units are K, M and G (powers of 1024).
|
|
1997
|
+
|
|
1998
|
+
The <DURATION> argument is an integer and an optional unit (e.g., 1s
|
|
1999
|
+
is 1 second and 500ms is 500 milliseconds). Units are h, m, s, ms,
|
|
2000
|
+
us, or ns (hours, minutes, seconds, milliseconds, microseconds, and
|
|
2001
|
+
nanoseconds respectively). If a unit is omitted, a second is used
|
|
2002
|
+
as unit.
|
|
2003
|
+
|
|
2004
|
+
The <HEX> argument is an hex string which must start with "0x"
|
|
2005
|
+
(e.g., 0x00000001).)"
|
|
2006
|
+
<< std::endl;
|
|
2007
|
+
}
|
|
2008
|
+
} // namespace
|
|
2009
|
+
|
|
2010
|
+
int main(int argc, char **argv) {
|
|
2011
|
+
config_set_default(config);
|
|
2012
|
+
char *data_path = nullptr;
|
|
2013
|
+
const char *private_key_file = nullptr;
|
|
2014
|
+
const char *cert_file = nullptr;
|
|
2015
|
+
|
|
2016
|
+
for (;;) {
|
|
2017
|
+
static int flag = 0;
|
|
2018
|
+
constexpr static option long_opts[] = {
|
|
2019
|
+
{"help", no_argument, nullptr, 'h'},
|
|
2020
|
+
{"tx-loss", required_argument, nullptr, 't'},
|
|
2021
|
+
{"rx-loss", required_argument, nullptr, 'r'},
|
|
2022
|
+
{"data", required_argument, nullptr, 'd'},
|
|
2023
|
+
{"http-method", required_argument, nullptr, 'm'},
|
|
2024
|
+
{"nstreams", required_argument, nullptr, 'n'},
|
|
2025
|
+
{"version", required_argument, nullptr, 'v'},
|
|
2026
|
+
{"quiet", no_argument, nullptr, 'q'},
|
|
2027
|
+
{"show-secret", no_argument, nullptr, 's'},
|
|
2028
|
+
{"ciphers", required_argument, &flag, 1},
|
|
2029
|
+
{"groups", required_argument, &flag, 2},
|
|
2030
|
+
{"timeout", required_argument, &flag, 3},
|
|
2031
|
+
{"session-file", required_argument, &flag, 4},
|
|
2032
|
+
{"tp-file", required_argument, &flag, 5},
|
|
2033
|
+
{"dcid", required_argument, &flag, 6},
|
|
2034
|
+
{"change-local-addr", required_argument, &flag, 7},
|
|
2035
|
+
{"key-update", required_argument, &flag, 8},
|
|
2036
|
+
{"nat-rebinding", no_argument, &flag, 9},
|
|
2037
|
+
{"delay-stream", required_argument, &flag, 10},
|
|
2038
|
+
{"no-preferred-addr", no_argument, &flag, 11},
|
|
2039
|
+
{"key", required_argument, &flag, 12},
|
|
2040
|
+
{"cert", required_argument, &flag, 13},
|
|
2041
|
+
{"download", required_argument, &flag, 14},
|
|
2042
|
+
{"no-quic-dump", no_argument, &flag, 15},
|
|
2043
|
+
{"no-http-dump", no_argument, &flag, 16},
|
|
2044
|
+
{"qlog-file", required_argument, &flag, 17},
|
|
2045
|
+
{"max-data", required_argument, &flag, 18},
|
|
2046
|
+
{"max-stream-data-bidi-local", required_argument, &flag, 19},
|
|
2047
|
+
{"max-stream-data-bidi-remote", required_argument, &flag, 20},
|
|
2048
|
+
{"max-stream-data-uni", required_argument, &flag, 21},
|
|
2049
|
+
{"max-streams-bidi", required_argument, &flag, 22},
|
|
2050
|
+
{"max-streams-uni", required_argument, &flag, 23},
|
|
2051
|
+
{"exit-on-first-stream-close", no_argument, &flag, 24},
|
|
2052
|
+
{"disable-early-data", no_argument, &flag, 25},
|
|
2053
|
+
{"qlog-dir", required_argument, &flag, 26},
|
|
2054
|
+
{"cc", required_argument, &flag, 27},
|
|
2055
|
+
{"exit-on-all-streams-close", no_argument, &flag, 28},
|
|
2056
|
+
{"token-file", required_argument, &flag, 29},
|
|
2057
|
+
{"sni", required_argument, &flag, 30},
|
|
2058
|
+
{"initial-rtt", required_argument, &flag, 31},
|
|
2059
|
+
{"max-window", required_argument, &flag, 32},
|
|
2060
|
+
{"max-stream-window", required_argument, &flag, 33},
|
|
2061
|
+
{"max-udp-payload-size", required_argument, &flag, 35},
|
|
2062
|
+
{"handshake-timeout", required_argument, &flag, 36},
|
|
2063
|
+
{"available-versions", required_argument, &flag, 37},
|
|
2064
|
+
{"no-pmtud", no_argument, &flag, 38},
|
|
2065
|
+
{"preferred-versions", required_argument, &flag, 39},
|
|
2066
|
+
{"ack-thresh", required_argument, &flag, 40},
|
|
2067
|
+
{nullptr, 0, nullptr, 0},
|
|
2068
|
+
};
|
|
2069
|
+
|
|
2070
|
+
auto optidx = 0;
|
|
2071
|
+
auto c = getopt_long(argc, argv, "d:him:n:qr:st:v:", long_opts, &optidx);
|
|
2072
|
+
if (c == -1) {
|
|
2073
|
+
break;
|
|
2074
|
+
}
|
|
2075
|
+
switch (c) {
|
|
2076
|
+
case 'd':
|
|
2077
|
+
// --data
|
|
2078
|
+
data_path = optarg;
|
|
2079
|
+
break;
|
|
2080
|
+
case 'h':
|
|
2081
|
+
// --help
|
|
2082
|
+
print_help();
|
|
2083
|
+
exit(EXIT_SUCCESS);
|
|
2084
|
+
case 'm':
|
|
2085
|
+
// --http-method
|
|
2086
|
+
config.http_method = optarg;
|
|
2087
|
+
break;
|
|
2088
|
+
case 'n':
|
|
2089
|
+
// --streams
|
|
2090
|
+
if (auto n = util::parse_uint(optarg); !n) {
|
|
2091
|
+
std::cerr << "streams: invalid argument" << std::endl;
|
|
2092
|
+
exit(EXIT_FAILURE);
|
|
2093
|
+
} else if (*n > NGTCP2_MAX_VARINT) {
|
|
2094
|
+
std::cerr << "streams: must not exceed " << NGTCP2_MAX_VARINT
|
|
2095
|
+
<< std::endl;
|
|
2096
|
+
exit(EXIT_FAILURE);
|
|
2097
|
+
} else {
|
|
2098
|
+
config.nstreams = *n;
|
|
2099
|
+
}
|
|
2100
|
+
break;
|
|
2101
|
+
case 'q':
|
|
2102
|
+
// --quiet
|
|
2103
|
+
config.quiet = true;
|
|
2104
|
+
break;
|
|
2105
|
+
case 'r':
|
|
2106
|
+
// --rx-loss
|
|
2107
|
+
config.rx_loss_prob = strtod(optarg, nullptr);
|
|
2108
|
+
break;
|
|
2109
|
+
case 's':
|
|
2110
|
+
// --show-secret
|
|
2111
|
+
config.show_secret = true;
|
|
2112
|
+
break;
|
|
2113
|
+
case 't':
|
|
2114
|
+
// --tx-loss
|
|
2115
|
+
config.tx_loss_prob = strtod(optarg, nullptr);
|
|
2116
|
+
break;
|
|
2117
|
+
case 'v': {
|
|
2118
|
+
// --version
|
|
2119
|
+
if (optarg == "v1"sv) {
|
|
2120
|
+
config.version = NGTCP2_PROTO_VER_V1;
|
|
2121
|
+
break;
|
|
2122
|
+
}
|
|
2123
|
+
if (optarg == "v2"sv) {
|
|
2124
|
+
config.version = NGTCP2_PROTO_VER_V2;
|
|
2125
|
+
break;
|
|
2126
|
+
}
|
|
2127
|
+
auto rv = util::parse_version(optarg);
|
|
2128
|
+
if (!rv) {
|
|
2129
|
+
std::cerr << "version: invalid version " << std::quoted(optarg)
|
|
2130
|
+
<< std::endl;
|
|
2131
|
+
exit(EXIT_FAILURE);
|
|
2132
|
+
}
|
|
2133
|
+
config.version = *rv;
|
|
2134
|
+
break;
|
|
2135
|
+
}
|
|
2136
|
+
case '?':
|
|
2137
|
+
print_usage();
|
|
2138
|
+
exit(EXIT_FAILURE);
|
|
2139
|
+
case 0:
|
|
2140
|
+
switch (flag) {
|
|
2141
|
+
case 1:
|
|
2142
|
+
// --ciphers
|
|
2143
|
+
config.ciphers = optarg;
|
|
2144
|
+
break;
|
|
2145
|
+
case 2:
|
|
2146
|
+
// --groups
|
|
2147
|
+
config.groups = optarg;
|
|
2148
|
+
break;
|
|
2149
|
+
case 3:
|
|
2150
|
+
// --timeout
|
|
2151
|
+
if (auto t = util::parse_duration(optarg); !t) {
|
|
2152
|
+
std::cerr << "timeout: invalid argument" << std::endl;
|
|
2153
|
+
exit(EXIT_FAILURE);
|
|
2154
|
+
} else {
|
|
2155
|
+
config.timeout = *t;
|
|
2156
|
+
}
|
|
2157
|
+
break;
|
|
2158
|
+
case 4:
|
|
2159
|
+
// --session-file
|
|
2160
|
+
config.session_file = optarg;
|
|
2161
|
+
break;
|
|
2162
|
+
case 5:
|
|
2163
|
+
// --tp-file
|
|
2164
|
+
config.tp_file = optarg;
|
|
2165
|
+
break;
|
|
2166
|
+
case 6: {
|
|
2167
|
+
// --dcid
|
|
2168
|
+
auto dcidlen2 = strlen(optarg);
|
|
2169
|
+
if (dcidlen2 % 2 || dcidlen2 / 2 < 8 || dcidlen2 / 2 > 18) {
|
|
2170
|
+
std::cerr << "dcid: wrong length" << std::endl;
|
|
2171
|
+
exit(EXIT_FAILURE);
|
|
2172
|
+
}
|
|
2173
|
+
auto dcid = util::decode_hex(optarg);
|
|
2174
|
+
ngtcp2_cid_init(&config.dcid,
|
|
2175
|
+
reinterpret_cast<const uint8_t *>(dcid.c_str()),
|
|
2176
|
+
dcid.size());
|
|
2177
|
+
break;
|
|
2178
|
+
}
|
|
2179
|
+
case 7:
|
|
2180
|
+
// --change-local-addr
|
|
2181
|
+
if (auto t = util::parse_duration(optarg); !t) {
|
|
2182
|
+
std::cerr << "change-local-addr: invalid argument" << std::endl;
|
|
2183
|
+
exit(EXIT_FAILURE);
|
|
2184
|
+
} else {
|
|
2185
|
+
config.change_local_addr = *t;
|
|
2186
|
+
}
|
|
2187
|
+
break;
|
|
2188
|
+
case 8:
|
|
2189
|
+
// --key-update
|
|
2190
|
+
if (auto t = util::parse_duration(optarg); !t) {
|
|
2191
|
+
std::cerr << "key-update: invalid argument" << std::endl;
|
|
2192
|
+
exit(EXIT_FAILURE);
|
|
2193
|
+
} else {
|
|
2194
|
+
config.key_update = *t;
|
|
2195
|
+
}
|
|
2196
|
+
break;
|
|
2197
|
+
case 9:
|
|
2198
|
+
// --nat-rebinding
|
|
2199
|
+
config.nat_rebinding = true;
|
|
2200
|
+
break;
|
|
2201
|
+
case 10:
|
|
2202
|
+
// --delay-stream
|
|
2203
|
+
if (auto t = util::parse_duration(optarg); !t) {
|
|
2204
|
+
std::cerr << "delay-stream: invalid argument" << std::endl;
|
|
2205
|
+
exit(EXIT_FAILURE);
|
|
2206
|
+
} else {
|
|
2207
|
+
config.delay_stream = *t;
|
|
2208
|
+
}
|
|
2209
|
+
break;
|
|
2210
|
+
case 11:
|
|
2211
|
+
// --no-preferred-addr
|
|
2212
|
+
config.no_preferred_addr = true;
|
|
2213
|
+
break;
|
|
2214
|
+
case 12:
|
|
2215
|
+
// --key
|
|
2216
|
+
private_key_file = optarg;
|
|
2217
|
+
break;
|
|
2218
|
+
case 13:
|
|
2219
|
+
// --cert
|
|
2220
|
+
cert_file = optarg;
|
|
2221
|
+
break;
|
|
2222
|
+
case 14:
|
|
2223
|
+
// --download
|
|
2224
|
+
config.download = optarg;
|
|
2225
|
+
break;
|
|
2226
|
+
case 15:
|
|
2227
|
+
// --no-quic-dump
|
|
2228
|
+
config.no_quic_dump = true;
|
|
2229
|
+
break;
|
|
2230
|
+
case 16:
|
|
2231
|
+
// --no-http-dump
|
|
2232
|
+
config.no_http_dump = true;
|
|
2233
|
+
break;
|
|
2234
|
+
case 17:
|
|
2235
|
+
// --qlog-file
|
|
2236
|
+
config.qlog_file = optarg;
|
|
2237
|
+
break;
|
|
2238
|
+
case 18:
|
|
2239
|
+
// --max-data
|
|
2240
|
+
if (auto n = util::parse_uint_iec(optarg); !n) {
|
|
2241
|
+
std::cerr << "max-data: invalid argument" << std::endl;
|
|
2242
|
+
exit(EXIT_FAILURE);
|
|
2243
|
+
} else {
|
|
2244
|
+
config.max_data = *n;
|
|
2245
|
+
}
|
|
2246
|
+
break;
|
|
2247
|
+
case 19:
|
|
2248
|
+
// --max-stream-data-bidi-local
|
|
2249
|
+
if (auto n = util::parse_uint_iec(optarg); !n) {
|
|
2250
|
+
std::cerr << "max-stream-data-bidi-local: invalid argument"
|
|
2251
|
+
<< std::endl;
|
|
2252
|
+
exit(EXIT_FAILURE);
|
|
2253
|
+
} else {
|
|
2254
|
+
config.max_stream_data_bidi_local = *n;
|
|
2255
|
+
}
|
|
2256
|
+
break;
|
|
2257
|
+
case 20:
|
|
2258
|
+
// --max-stream-data-bidi-remote
|
|
2259
|
+
if (auto n = util::parse_uint_iec(optarg); !n) {
|
|
2260
|
+
std::cerr << "max-stream-data-bidi-remote: invalid argument"
|
|
2261
|
+
<< std::endl;
|
|
2262
|
+
exit(EXIT_FAILURE);
|
|
2263
|
+
} else {
|
|
2264
|
+
config.max_stream_data_bidi_remote = *n;
|
|
2265
|
+
}
|
|
2266
|
+
break;
|
|
2267
|
+
case 21:
|
|
2268
|
+
// --max-stream-data-uni
|
|
2269
|
+
if (auto n = util::parse_uint_iec(optarg); !n) {
|
|
2270
|
+
std::cerr << "max-stream-data-uni: invalid argument" << std::endl;
|
|
2271
|
+
exit(EXIT_FAILURE);
|
|
2272
|
+
} else {
|
|
2273
|
+
config.max_stream_data_uni = *n;
|
|
2274
|
+
}
|
|
2275
|
+
break;
|
|
2276
|
+
case 22:
|
|
2277
|
+
// --max-streams-bidi
|
|
2278
|
+
if (auto n = util::parse_uint(optarg); !n) {
|
|
2279
|
+
std::cerr << "max-streams-bidi: invalid argument" << std::endl;
|
|
2280
|
+
exit(EXIT_FAILURE);
|
|
2281
|
+
} else {
|
|
2282
|
+
config.max_streams_bidi = *n;
|
|
2283
|
+
}
|
|
2284
|
+
break;
|
|
2285
|
+
case 23:
|
|
2286
|
+
// --max-streams-uni
|
|
2287
|
+
if (auto n = util::parse_uint(optarg); !n) {
|
|
2288
|
+
std::cerr << "max-streams-uni: invalid argument" << std::endl;
|
|
2289
|
+
exit(EXIT_FAILURE);
|
|
2290
|
+
} else {
|
|
2291
|
+
config.max_streams_uni = *n;
|
|
2292
|
+
}
|
|
2293
|
+
break;
|
|
2294
|
+
case 24:
|
|
2295
|
+
// --exit-on-first-stream-close
|
|
2296
|
+
config.exit_on_first_stream_close = true;
|
|
2297
|
+
break;
|
|
2298
|
+
case 25:
|
|
2299
|
+
// --disable-early-data
|
|
2300
|
+
config.disable_early_data = true;
|
|
2301
|
+
break;
|
|
2302
|
+
case 26:
|
|
2303
|
+
// --qlog-dir
|
|
2304
|
+
config.qlog_dir = optarg;
|
|
2305
|
+
break;
|
|
2306
|
+
case 27:
|
|
2307
|
+
// --cc
|
|
2308
|
+
if (strcmp("cubic", optarg) == 0) {
|
|
2309
|
+
config.cc_algo = NGTCP2_CC_ALGO_CUBIC;
|
|
2310
|
+
break;
|
|
2311
|
+
}
|
|
2312
|
+
if (strcmp("reno", optarg) == 0) {
|
|
2313
|
+
config.cc_algo = NGTCP2_CC_ALGO_RENO;
|
|
2314
|
+
break;
|
|
2315
|
+
}
|
|
2316
|
+
if (strcmp("bbr", optarg) == 0) {
|
|
2317
|
+
config.cc_algo = NGTCP2_CC_ALGO_BBR;
|
|
2318
|
+
break;
|
|
2319
|
+
}
|
|
2320
|
+
if (strcmp("bbr2", optarg) == 0) {
|
|
2321
|
+
config.cc_algo = NGTCP2_CC_ALGO_BBR2;
|
|
2322
|
+
break;
|
|
2323
|
+
}
|
|
2324
|
+
std::cerr << "cc: specify cubic, reno, bbr, or bbr2" << std::endl;
|
|
2325
|
+
exit(EXIT_FAILURE);
|
|
2326
|
+
case 28:
|
|
2327
|
+
// --exit-on-all-streams-close
|
|
2328
|
+
config.exit_on_all_streams_close = true;
|
|
2329
|
+
break;
|
|
2330
|
+
case 29:
|
|
2331
|
+
// --token-file
|
|
2332
|
+
config.token_file = optarg;
|
|
2333
|
+
break;
|
|
2334
|
+
case 30:
|
|
2335
|
+
// --sni
|
|
2336
|
+
config.sni = optarg;
|
|
2337
|
+
break;
|
|
2338
|
+
case 31:
|
|
2339
|
+
// --initial-rtt
|
|
2340
|
+
if (auto t = util::parse_duration(optarg); !t) {
|
|
2341
|
+
std::cerr << "initial-rtt: invalid argument" << std::endl;
|
|
2342
|
+
exit(EXIT_FAILURE);
|
|
2343
|
+
} else {
|
|
2344
|
+
config.initial_rtt = *t;
|
|
2345
|
+
}
|
|
2346
|
+
break;
|
|
2347
|
+
case 32:
|
|
2348
|
+
// --max-window
|
|
2349
|
+
if (auto n = util::parse_uint_iec(optarg); !n) {
|
|
2350
|
+
std::cerr << "max-window: invalid argument" << std::endl;
|
|
2351
|
+
exit(EXIT_FAILURE);
|
|
2352
|
+
} else {
|
|
2353
|
+
config.max_window = *n;
|
|
2354
|
+
}
|
|
2355
|
+
break;
|
|
2356
|
+
case 33:
|
|
2357
|
+
// --max-stream-window
|
|
2358
|
+
if (auto n = util::parse_uint_iec(optarg); !n) {
|
|
2359
|
+
std::cerr << "max-stream-window: invalid argument" << std::endl;
|
|
2360
|
+
exit(EXIT_FAILURE);
|
|
2361
|
+
} else {
|
|
2362
|
+
config.max_stream_window = *n;
|
|
2363
|
+
}
|
|
2364
|
+
break;
|
|
2365
|
+
case 35:
|
|
2366
|
+
// --max-udp-payload-size
|
|
2367
|
+
if (auto n = util::parse_uint_iec(optarg); !n) {
|
|
2368
|
+
std::cerr << "max-udp-payload-size: invalid argument" << std::endl;
|
|
2369
|
+
exit(EXIT_FAILURE);
|
|
2370
|
+
} else if (*n > 64_k) {
|
|
2371
|
+
std::cerr << "max-udp-payload-size: must not exceed 65536"
|
|
2372
|
+
<< std::endl;
|
|
2373
|
+
exit(EXIT_FAILURE);
|
|
2374
|
+
} else if (*n == 0) {
|
|
2375
|
+
std::cerr << "max-udp-payload-size: must not be 0" << std::endl;
|
|
2376
|
+
} else {
|
|
2377
|
+
config.max_udp_payload_size = *n;
|
|
2378
|
+
}
|
|
2379
|
+
break;
|
|
2380
|
+
case 36:
|
|
2381
|
+
// --handshake-timeout
|
|
2382
|
+
if (auto t = util::parse_duration(optarg); !t) {
|
|
2383
|
+
std::cerr << "handshake-timeout: invalid argument" << std::endl;
|
|
2384
|
+
exit(EXIT_FAILURE);
|
|
2385
|
+
} else {
|
|
2386
|
+
config.handshake_timeout = *t;
|
|
2387
|
+
}
|
|
2388
|
+
break;
|
|
2389
|
+
case 37: {
|
|
2390
|
+
// --available-versions
|
|
2391
|
+
if (strlen(optarg) == 0) {
|
|
2392
|
+
config.available_versions.resize(0);
|
|
2393
|
+
break;
|
|
2394
|
+
}
|
|
2395
|
+
auto l = util::split_str(optarg);
|
|
2396
|
+
config.available_versions.resize(l.size());
|
|
2397
|
+
auto it = std::begin(config.available_versions);
|
|
2398
|
+
for (const auto &k : l) {
|
|
2399
|
+
if (k == "v1"sv) {
|
|
2400
|
+
*it++ = NGTCP2_PROTO_VER_V1;
|
|
2401
|
+
continue;
|
|
2402
|
+
}
|
|
2403
|
+
if (k == "v2"sv) {
|
|
2404
|
+
*it++ = NGTCP2_PROTO_VER_V2;
|
|
2405
|
+
continue;
|
|
2406
|
+
}
|
|
2407
|
+
auto rv = util::parse_version(k);
|
|
2408
|
+
if (!rv) {
|
|
2409
|
+
std::cerr << "available-versions: invalid version "
|
|
2410
|
+
<< std::quoted(k) << std::endl;
|
|
2411
|
+
exit(EXIT_FAILURE);
|
|
2412
|
+
}
|
|
2413
|
+
*it++ = *rv;
|
|
2414
|
+
}
|
|
2415
|
+
break;
|
|
2416
|
+
}
|
|
2417
|
+
case 38:
|
|
2418
|
+
// --no-pmtud
|
|
2419
|
+
config.no_pmtud = true;
|
|
2420
|
+
break;
|
|
2421
|
+
case 39: {
|
|
2422
|
+
// --preferred-versions
|
|
2423
|
+
auto l = util::split_str(optarg);
|
|
2424
|
+
if (l.size() > max_preferred_versionslen) {
|
|
2425
|
+
std::cerr << "preferred-versions: too many versions > "
|
|
2426
|
+
<< max_preferred_versionslen << std::endl;
|
|
2427
|
+
}
|
|
2428
|
+
config.preferred_versions.resize(l.size());
|
|
2429
|
+
auto it = std::begin(config.preferred_versions);
|
|
2430
|
+
for (const auto &k : l) {
|
|
2431
|
+
if (k == "v1"sv) {
|
|
2432
|
+
*it++ = NGTCP2_PROTO_VER_V1;
|
|
2433
|
+
continue;
|
|
2434
|
+
}
|
|
2435
|
+
if (k == "v2"sv) {
|
|
2436
|
+
*it++ = NGTCP2_PROTO_VER_V2;
|
|
2437
|
+
continue;
|
|
2438
|
+
}
|
|
2439
|
+
auto rv = util::parse_version(k);
|
|
2440
|
+
if (!rv) {
|
|
2441
|
+
std::cerr << "preferred-versions: invalid version "
|
|
2442
|
+
<< std::quoted(k) << std::endl;
|
|
2443
|
+
exit(EXIT_FAILURE);
|
|
2444
|
+
}
|
|
2445
|
+
if (!ngtcp2_is_supported_version(*rv)) {
|
|
2446
|
+
std::cerr << "preferred-versions: unsupported version "
|
|
2447
|
+
<< std::quoted(k) << std::endl;
|
|
2448
|
+
exit(EXIT_FAILURE);
|
|
2449
|
+
}
|
|
2450
|
+
*it++ = *rv;
|
|
2451
|
+
}
|
|
2452
|
+
break;
|
|
2453
|
+
}
|
|
2454
|
+
case 40:
|
|
2455
|
+
// --ack-thresh
|
|
2456
|
+
if (auto n = util::parse_uint(optarg); !n) {
|
|
2457
|
+
std::cerr << "ack-thresh: invalid argument" << std::endl;
|
|
2458
|
+
exit(EXIT_FAILURE);
|
|
2459
|
+
} else if (*n > 100) {
|
|
2460
|
+
std::cerr << "ack-thresh: must not exceed 100" << std::endl;
|
|
2461
|
+
exit(EXIT_FAILURE);
|
|
2462
|
+
} else {
|
|
2463
|
+
config.ack_thresh = *n;
|
|
2464
|
+
}
|
|
2465
|
+
break;
|
|
2466
|
+
}
|
|
2467
|
+
break;
|
|
2468
|
+
default:
|
|
2469
|
+
break;
|
|
2470
|
+
};
|
|
2471
|
+
}
|
|
2472
|
+
|
|
2473
|
+
if (argc - optind < 2) {
|
|
2474
|
+
std::cerr << "Too few arguments" << std::endl;
|
|
2475
|
+
print_usage();
|
|
2476
|
+
exit(EXIT_FAILURE);
|
|
2477
|
+
}
|
|
2478
|
+
|
|
2479
|
+
if (!config.qlog_file.empty() && !config.qlog_dir.empty()) {
|
|
2480
|
+
std::cerr << "qlog-file and qlog-dir are mutually exclusive" << std::endl;
|
|
2481
|
+
exit(EXIT_FAILURE);
|
|
2482
|
+
}
|
|
2483
|
+
|
|
2484
|
+
if (config.exit_on_first_stream_close && config.exit_on_all_streams_close) {
|
|
2485
|
+
std::cerr << "exit-on-first-stream-close and exit-on-all-streams-close are "
|
|
2486
|
+
"mutually exclusive"
|
|
2487
|
+
<< std::endl;
|
|
2488
|
+
exit(EXIT_FAILURE);
|
|
2489
|
+
}
|
|
2490
|
+
|
|
2491
|
+
if (data_path) {
|
|
2492
|
+
auto fd = open(data_path, O_RDONLY);
|
|
2493
|
+
if (fd == -1) {
|
|
2494
|
+
std::cerr << "data: Could not open file " << data_path << ": "
|
|
2495
|
+
<< strerror(errno) << std::endl;
|
|
2496
|
+
exit(EXIT_FAILURE);
|
|
2497
|
+
}
|
|
2498
|
+
struct stat st;
|
|
2499
|
+
if (fstat(fd, &st) != 0) {
|
|
2500
|
+
std::cerr << "data: Could not stat file " << data_path << ": "
|
|
2501
|
+
<< strerror(errno) << std::endl;
|
|
2502
|
+
exit(EXIT_FAILURE);
|
|
2503
|
+
}
|
|
2504
|
+
config.fd = fd;
|
|
2505
|
+
config.datalen = st.st_size;
|
|
2506
|
+
auto addr = mmap(nullptr, config.datalen, PROT_READ, MAP_SHARED, fd, 0);
|
|
2507
|
+
if (addr == MAP_FAILED) {
|
|
2508
|
+
std::cerr << "data: Could not mmap file " << data_path << ": "
|
|
2509
|
+
<< strerror(errno) << std::endl;
|
|
2510
|
+
exit(EXIT_FAILURE);
|
|
2511
|
+
}
|
|
2512
|
+
config.data = static_cast<uint8_t *>(addr);
|
|
2513
|
+
}
|
|
2514
|
+
|
|
2515
|
+
auto addr = argv[optind++];
|
|
2516
|
+
auto port = argv[optind++];
|
|
2517
|
+
|
|
2518
|
+
if (parse_requests(&argv[optind], argc - optind) != 0) {
|
|
2519
|
+
exit(EXIT_FAILURE);
|
|
2520
|
+
}
|
|
2521
|
+
|
|
2522
|
+
if (!ngtcp2_is_reserved_version(config.version)) {
|
|
2523
|
+
if (!config.preferred_versions.empty() &&
|
|
2524
|
+
std::find(std::begin(config.preferred_versions),
|
|
2525
|
+
std::end(config.preferred_versions),
|
|
2526
|
+
config.version) == std::end(config.preferred_versions)) {
|
|
2527
|
+
std::cerr << "preferred-version: must include version " << std::hex
|
|
2528
|
+
<< "0x" << config.version << std::dec << std::endl;
|
|
2529
|
+
exit(EXIT_FAILURE);
|
|
2530
|
+
}
|
|
2531
|
+
|
|
2532
|
+
if (!config.available_versions.empty() &&
|
|
2533
|
+
std::find(std::begin(config.available_versions),
|
|
2534
|
+
std::end(config.available_versions),
|
|
2535
|
+
config.version) == std::end(config.available_versions)) {
|
|
2536
|
+
std::cerr << "available-versions: must include version " << std::hex
|
|
2537
|
+
<< "0x" << config.version << std::dec << std::endl;
|
|
2538
|
+
exit(EXIT_FAILURE);
|
|
2539
|
+
}
|
|
2540
|
+
}
|
|
2541
|
+
|
|
2542
|
+
if (config.nstreams == 0) {
|
|
2543
|
+
config.nstreams = config.requests.size();
|
|
2544
|
+
}
|
|
2545
|
+
|
|
2546
|
+
TLSClientContext tls_ctx;
|
|
2547
|
+
if (tls_ctx.init(private_key_file, cert_file) != 0) {
|
|
2548
|
+
exit(EXIT_FAILURE);
|
|
2549
|
+
}
|
|
2550
|
+
|
|
2551
|
+
auto ev_loop_d = defer(ev_loop_destroy, EV_DEFAULT);
|
|
2552
|
+
|
|
2553
|
+
auto keylog_filename = getenv("SSLKEYLOGFILE");
|
|
2554
|
+
if (keylog_filename) {
|
|
2555
|
+
keylog_file.open(keylog_filename, std::ios_base::app);
|
|
2556
|
+
if (keylog_file) {
|
|
2557
|
+
tls_ctx.enable_keylog();
|
|
2558
|
+
}
|
|
2559
|
+
}
|
|
2560
|
+
|
|
2561
|
+
if (util::generate_secret(config.static_secret.data(),
|
|
2562
|
+
config.static_secret.size()) != 0) {
|
|
2563
|
+
std::cerr << "Unable to generate static secret" << std::endl;
|
|
2564
|
+
exit(EXIT_FAILURE);
|
|
2565
|
+
}
|
|
2566
|
+
|
|
2567
|
+
auto client_chosen_version = config.version;
|
|
2568
|
+
|
|
2569
|
+
for (;;) {
|
|
2570
|
+
Client c(EV_DEFAULT, client_chosen_version, config.version);
|
|
2571
|
+
|
|
2572
|
+
if (run(c, addr, port, tls_ctx) != 0) {
|
|
2573
|
+
exit(EXIT_FAILURE);
|
|
2574
|
+
}
|
|
2575
|
+
|
|
2576
|
+
if (config.preferred_versions.empty()) {
|
|
2577
|
+
break;
|
|
2578
|
+
}
|
|
2579
|
+
|
|
2580
|
+
auto &offered_versions = c.get_offered_versions();
|
|
2581
|
+
if (offered_versions.empty()) {
|
|
2582
|
+
break;
|
|
2583
|
+
}
|
|
2584
|
+
|
|
2585
|
+
client_chosen_version = ngtcp2_select_version(
|
|
2586
|
+
config.preferred_versions.data(), config.preferred_versions.size(),
|
|
2587
|
+
offered_versions.data(), offered_versions.size());
|
|
2588
|
+
|
|
2589
|
+
if (client_chosen_version == 0) {
|
|
2590
|
+
std::cerr << "Unable to select a version" << std::endl;
|
|
2591
|
+
exit(EXIT_FAILURE);
|
|
2592
|
+
}
|
|
2593
|
+
|
|
2594
|
+
if (!config.quiet) {
|
|
2595
|
+
std::cerr << "Client selected version " << std::hex << "0x"
|
|
2596
|
+
<< client_chosen_version << std::dec << std::endl;
|
|
2597
|
+
}
|
|
2598
|
+
}
|
|
2599
|
+
|
|
2600
|
+
return EXIT_SUCCESS;
|
|
2601
|
+
}
|