session.go 39 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270
  1. package gquic
  2. import (
  3. "context"
  4. "crypto/rand"
  5. "crypto/tls"
  6. "errors"
  7. "fmt"
  8. "net"
  9. "sync"
  10. "time"
  11. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/quic/gquic-go/internal/ackhandler"
  12. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/quic/gquic-go/internal/congestion"
  13. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/quic/gquic-go/internal/flowcontrol"
  14. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/quic/gquic-go/internal/handshake"
  15. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/quic/gquic-go/internal/protocol"
  16. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/quic/gquic-go/internal/utils"
  17. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/quic/gquic-go/internal/wire"
  18. "github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/quic/gquic-go/qerr"
  19. "github.com/bifurcation/mint"
  20. )
  21. type unpacker interface {
  22. Unpack(headerBinary []byte, hdr *wire.Header, data []byte) (*unpackedPacket, error)
  23. }
  24. type streamGetter interface {
  25. GetOrOpenReceiveStream(protocol.StreamID) (receiveStreamI, error)
  26. GetOrOpenSendStream(protocol.StreamID) (sendStreamI, error)
  27. }
  28. type streamManager interface {
  29. GetOrOpenSendStream(protocol.StreamID) (sendStreamI, error)
  30. GetOrOpenReceiveStream(protocol.StreamID) (receiveStreamI, error)
  31. OpenStream() (Stream, error)
  32. OpenUniStream() (SendStream, error)
  33. OpenStreamSync() (Stream, error)
  34. OpenUniStreamSync() (SendStream, error)
  35. AcceptStream() (Stream, error)
  36. AcceptUniStream() (ReceiveStream, error)
  37. DeleteStream(protocol.StreamID) error
  38. UpdateLimits(*handshake.TransportParameters)
  39. HandleMaxStreamIDFrame(*wire.MaxStreamIDFrame) error
  40. CloseWithError(error)
  41. }
  42. type cryptoStreamHandler interface {
  43. HandleCryptoStream() error
  44. ConnectionState() handshake.ConnectionState
  45. }
  46. type divNonceSetter interface {
  47. SetDiversificationNonce([]byte) error
  48. }
  49. type receivedPacket struct {
  50. remoteAddr net.Addr
  51. header *wire.Header
  52. data []byte
  53. rcvTime time.Time
  54. }
  55. var (
  56. newCryptoSetup = handshake.NewCryptoSetup
  57. newCryptoSetupClient = handshake.NewCryptoSetupClient
  58. )
  59. type closeError struct {
  60. err error
  61. remote bool
  62. sendClose bool
  63. }
  64. // A Session is a QUIC session
  65. type session struct {
  66. sessionRunner sessionRunner
  67. destConnID protocol.ConnectionID
  68. srcConnID protocol.ConnectionID
  69. perspective protocol.Perspective
  70. version protocol.VersionNumber
  71. config *Config
  72. conn connection
  73. streamsMap streamManager
  74. cryptoStream cryptoStream
  75. rttStats *congestion.RTTStats
  76. sentPacketHandler ackhandler.SentPacketHandler
  77. receivedPacketHandler ackhandler.ReceivedPacketHandler
  78. framer *framer
  79. windowUpdateQueue *windowUpdateQueue
  80. connFlowController flowcontrol.ConnectionFlowController
  81. unpacker unpacker
  82. packer packer
  83. cryptoStreamHandler cryptoStreamHandler
  84. receivedPackets chan *receivedPacket
  85. sendingScheduled chan struct{}
  86. // closeChan is used to notify the run loop that it should terminate.
  87. closeChan chan closeError
  88. closeOnce sync.Once
  89. ctx context.Context
  90. ctxCancel context.CancelFunc
  91. // when we receive too many undecryptable packets during the handshake, we send a Public reset
  92. // but only after a time of protocol.PublicResetTimeout has passed
  93. undecryptablePackets []*receivedPacket
  94. receivedTooManyUndecrytablePacketsTime time.Time
  95. // this channel is passed to the CryptoSetup and receives the transport parameters, as soon as the peer sends them
  96. paramsChan <-chan handshake.TransportParameters
  97. // the handshakeEvent channel is passed to the CryptoSetup.
  98. // It receives when it makes sense to try decrypting undecryptable packets.
  99. handshakeEvent <-chan struct{}
  100. handshakeComplete bool
  101. receivedFirstPacket bool // since packet numbers start at 0, we can't use largestRcvdPacketNumber != 0 for this
  102. receivedFirstForwardSecurePacket bool
  103. lastRcvdPacketNumber protocol.PacketNumber
  104. // Used to calculate the next packet number from the truncated wire
  105. // representation, and sent back in public reset packets
  106. largestRcvdPacketNumber protocol.PacketNumber
  107. sessionCreationTime time.Time
  108. lastNetworkActivityTime time.Time
  109. // pacingDeadline is the time when the next packet should be sent
  110. pacingDeadline time.Time
  111. peerParams *handshake.TransportParameters
  112. timer *utils.Timer
  113. // keepAlivePingSent stores whether a Ping frame was sent to the peer or not
  114. // it is reset as soon as we receive a packet from the peer
  115. keepAlivePingSent bool
  116. logger utils.Logger
  117. }
  118. var _ Session = &session{}
  119. var _ streamSender = &session{}
  120. // newSession makes a new session
  121. func newSession(
  122. conn connection,
  123. sessionRunner sessionRunner,
  124. v protocol.VersionNumber,
  125. destConnID protocol.ConnectionID,
  126. srcConnID protocol.ConnectionID,
  127. scfg *handshake.ServerConfig,
  128. tlsConf *tls.Config,
  129. config *Config,
  130. logger utils.Logger,
  131. ) (quicSession, error) {
  132. logger.Debugf("Creating new session. Destination Connection ID: %s, Source Connection ID: %s", destConnID, srcConnID)
  133. paramsChan := make(chan handshake.TransportParameters)
  134. handshakeEvent := make(chan struct{}, 1)
  135. s := &session{
  136. conn: conn,
  137. sessionRunner: sessionRunner,
  138. srcConnID: srcConnID,
  139. destConnID: destConnID,
  140. perspective: protocol.PerspectiveServer,
  141. version: v,
  142. config: config,
  143. handshakeEvent: handshakeEvent,
  144. paramsChan: paramsChan,
  145. logger: logger,
  146. }
  147. s.preSetup()
  148. transportParams := &handshake.TransportParameters{
  149. StreamFlowControlWindow: protocol.ReceiveStreamFlowControlWindow,
  150. ConnectionFlowControlWindow: protocol.ReceiveConnectionFlowControlWindow,
  151. MaxStreams: uint32(s.config.MaxIncomingStreams),
  152. IdleTimeout: s.config.IdleTimeout,
  153. }
  154. divNonce := make([]byte, 32)
  155. if _, err := rand.Read(divNonce); err != nil {
  156. return nil, err
  157. }
  158. cs, err := newCryptoSetup(
  159. s.cryptoStream,
  160. srcConnID,
  161. s.conn.RemoteAddr(),
  162. s.version,
  163. divNonce,
  164. scfg,
  165. transportParams,
  166. s.config.Versions,
  167. s.config.AcceptCookie,
  168. paramsChan,
  169. handshakeEvent,
  170. s.logger,
  171. )
  172. if err != nil {
  173. return nil, err
  174. }
  175. s.cryptoStreamHandler = cs
  176. s.unpacker = newPacketUnpackerGQUIC(cs, s.version)
  177. s.streamsMap = newStreamsMapLegacy(s.newStream, s.config.MaxIncomingStreams, s.perspective)
  178. s.framer = newFramer(s.cryptoStream, s.streamsMap, s.version)
  179. s.packer = newPacketPackerLegacy(
  180. destConnID,
  181. srcConnID,
  182. s.sentPacketHandler.GetPacketNumberLen,
  183. s.RemoteAddr(),
  184. divNonce,
  185. s.cryptoStream,
  186. cs,
  187. s.framer,
  188. sentAndReceivedPacketManager{s.sentPacketHandler, s.receivedPacketHandler},
  189. s.perspective,
  190. s.version,
  191. )
  192. return s, s.postSetup()
  193. }
  194. // declare this as a variable, so that we can it mock it in the tests
  195. var newClientSession = func(
  196. conn connection,
  197. sessionRunner sessionRunner,
  198. v protocol.VersionNumber,
  199. destConnID protocol.ConnectionID,
  200. srcConnID protocol.ConnectionID,
  201. tlsConf *tls.Config,
  202. config *Config,
  203. initialVersion protocol.VersionNumber,
  204. negotiatedVersions []protocol.VersionNumber, // needed for validation of the GQUIC version negotiation
  205. logger utils.Logger,
  206. ) (quicSession, error) {
  207. logger.Debugf("Creating new session. Destination Connection ID: %s, Source Connection ID: %s", destConnID, srcConnID)
  208. paramsChan := make(chan handshake.TransportParameters)
  209. handshakeEvent := make(chan struct{}, 1)
  210. s := &session{
  211. conn: conn,
  212. sessionRunner: sessionRunner,
  213. srcConnID: srcConnID,
  214. destConnID: destConnID,
  215. perspective: protocol.PerspectiveClient,
  216. version: v,
  217. config: config,
  218. handshakeEvent: handshakeEvent,
  219. paramsChan: paramsChan,
  220. logger: logger,
  221. }
  222. s.preSetup()
  223. transportParams := &handshake.TransportParameters{
  224. StreamFlowControlWindow: protocol.ReceiveStreamFlowControlWindow,
  225. ConnectionFlowControlWindow: protocol.ReceiveConnectionFlowControlWindow,
  226. MaxStreams: uint32(s.config.MaxIncomingStreams),
  227. IdleTimeout: s.config.IdleTimeout,
  228. OmitConnectionID: s.config.RequestConnectionIDOmission,
  229. }
  230. cs, err := newCryptoSetupClient(
  231. s.cryptoStream,
  232. destConnID,
  233. s.version,
  234. tlsConf,
  235. transportParams,
  236. paramsChan,
  237. handshakeEvent,
  238. initialVersion,
  239. negotiatedVersions,
  240. s.logger,
  241. )
  242. if err != nil {
  243. return nil, err
  244. }
  245. s.cryptoStreamHandler = cs
  246. s.unpacker = newPacketUnpackerGQUIC(cs, s.version)
  247. s.streamsMap = newStreamsMapLegacy(s.newStream, s.config.MaxIncomingStreams, s.perspective)
  248. s.framer = newFramer(s.cryptoStream, s.streamsMap, s.version)
  249. s.packer = newPacketPackerLegacy(
  250. destConnID,
  251. srcConnID,
  252. s.sentPacketHandler.GetPacketNumberLen,
  253. s.RemoteAddr(),
  254. nil, // no diversification nonce
  255. s.cryptoStream,
  256. cs,
  257. s.framer,
  258. sentAndReceivedPacketManager{s.sentPacketHandler, s.receivedPacketHandler},
  259. s.perspective,
  260. s.version,
  261. )
  262. return s, s.postSetup()
  263. }
  264. func newTLSServerSession(
  265. conn connection,
  266. runner sessionRunner,
  267. origConnID protocol.ConnectionID,
  268. destConnID protocol.ConnectionID,
  269. srcConnID protocol.ConnectionID,
  270. initialPacketNumber protocol.PacketNumber,
  271. config *Config,
  272. mintConf *mint.Config,
  273. paramsChan <-chan handshake.TransportParameters,
  274. logger utils.Logger,
  275. v protocol.VersionNumber,
  276. ) (quicSession, error) {
  277. handshakeEvent := make(chan struct{}, 1)
  278. s := &session{
  279. conn: conn,
  280. sessionRunner: runner,
  281. config: config,
  282. srcConnID: srcConnID,
  283. destConnID: destConnID,
  284. perspective: protocol.PerspectiveServer,
  285. version: v,
  286. handshakeEvent: handshakeEvent,
  287. paramsChan: paramsChan,
  288. logger: logger,
  289. }
  290. s.preSetup()
  291. cs, err := handshake.NewCryptoSetupTLSServer(
  292. s.cryptoStream,
  293. origConnID,
  294. mintConf,
  295. handshakeEvent,
  296. v,
  297. )
  298. if err != nil {
  299. return nil, err
  300. }
  301. s.cryptoStreamHandler = cs
  302. s.streamsMap = newStreamsMap(s, s.newFlowController, s.config.MaxIncomingStreams, s.config.MaxIncomingUniStreams, s.perspective, s.version)
  303. s.framer = newFramer(s.cryptoStream, s.streamsMap, s.version)
  304. s.packer = newPacketPacker(
  305. s.destConnID,
  306. s.srcConnID,
  307. initialPacketNumber,
  308. s.sentPacketHandler.GetPacketNumberLen,
  309. s.RemoteAddr(),
  310. nil, // no token
  311. s.cryptoStream,
  312. cs,
  313. s.framer,
  314. sentAndReceivedPacketManager{s.sentPacketHandler, s.receivedPacketHandler},
  315. s.perspective,
  316. s.version,
  317. )
  318. if err := s.postSetup(); err != nil {
  319. return nil, err
  320. }
  321. s.unpacker = newPacketUnpacker(cs, s.version)
  322. return s, nil
  323. }
  324. // declare this as a variable, such that we can it mock it in the tests
  325. var newTLSClientSession = func(
  326. conn connection,
  327. runner sessionRunner,
  328. token []byte,
  329. destConnID protocol.ConnectionID,
  330. srcConnID protocol.ConnectionID,
  331. conf *Config,
  332. mintConf *mint.Config,
  333. paramsChan <-chan handshake.TransportParameters,
  334. initialPacketNumber protocol.PacketNumber,
  335. logger utils.Logger,
  336. v protocol.VersionNumber,
  337. ) (quicSession, error) {
  338. handshakeEvent := make(chan struct{}, 1)
  339. s := &session{
  340. conn: conn,
  341. sessionRunner: runner,
  342. config: conf,
  343. srcConnID: srcConnID,
  344. destConnID: destConnID,
  345. perspective: protocol.PerspectiveClient,
  346. version: v,
  347. handshakeEvent: handshakeEvent,
  348. paramsChan: paramsChan,
  349. logger: logger,
  350. }
  351. s.preSetup()
  352. cs, err := handshake.NewCryptoSetupTLSClient(
  353. s.cryptoStream,
  354. s.destConnID,
  355. mintConf,
  356. handshakeEvent,
  357. v,
  358. )
  359. if err != nil {
  360. return nil, err
  361. }
  362. s.cryptoStreamHandler = cs
  363. s.unpacker = newPacketUnpacker(cs, s.version)
  364. s.streamsMap = newStreamsMap(s, s.newFlowController, s.config.MaxIncomingStreams, s.config.MaxIncomingUniStreams, s.perspective, s.version)
  365. s.framer = newFramer(s.cryptoStream, s.streamsMap, s.version)
  366. s.packer = newPacketPacker(
  367. s.destConnID,
  368. s.srcConnID,
  369. initialPacketNumber,
  370. s.sentPacketHandler.GetPacketNumberLen,
  371. s.RemoteAddr(),
  372. token,
  373. s.cryptoStream,
  374. cs,
  375. s.framer,
  376. sentAndReceivedPacketManager{s.sentPacketHandler, s.receivedPacketHandler},
  377. s.perspective,
  378. s.version,
  379. )
  380. return s, s.postSetup()
  381. }
  382. func (s *session) preSetup() {
  383. s.rttStats = &congestion.RTTStats{}
  384. s.sentPacketHandler = ackhandler.NewSentPacketHandler(s.rttStats, s.logger, s.version)
  385. s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.rttStats, s.logger, s.version)
  386. s.connFlowController = flowcontrol.NewConnectionFlowController(
  387. protocol.ReceiveConnectionFlowControlWindow,
  388. protocol.ByteCount(s.config.MaxReceiveConnectionFlowControlWindow),
  389. s.onHasConnectionWindowUpdate,
  390. s.rttStats,
  391. s.logger,
  392. )
  393. s.cryptoStream = s.newCryptoStream()
  394. }
  395. func (s *session) postSetup() error {
  396. s.receivedPackets = make(chan *receivedPacket, protocol.MaxSessionUnprocessedPackets)
  397. s.closeChan = make(chan closeError, 1)
  398. s.sendingScheduled = make(chan struct{}, 1)
  399. s.undecryptablePackets = make([]*receivedPacket, 0, protocol.MaxUndecryptablePackets)
  400. s.ctx, s.ctxCancel = context.WithCancel(context.Background())
  401. s.timer = utils.NewTimer()
  402. now := time.Now()
  403. s.lastNetworkActivityTime = now
  404. s.sessionCreationTime = now
  405. s.windowUpdateQueue = newWindowUpdateQueue(s.streamsMap, s.connFlowController, s.framer.QueueControlFrame)
  406. return nil
  407. }
  408. // run the session main loop
  409. func (s *session) run() error {
  410. defer s.ctxCancel()
  411. go func() {
  412. if err := s.cryptoStreamHandler.HandleCryptoStream(); err != nil {
  413. s.closeLocal(err)
  414. }
  415. }()
  416. var closeErr closeError
  417. runLoop:
  418. for {
  419. // Close immediately if requested
  420. select {
  421. case closeErr = <-s.closeChan:
  422. break runLoop
  423. case _, ok := <-s.handshakeEvent:
  424. // when the handshake is completed, the channel will be closed
  425. s.handleHandshakeEvent(!ok)
  426. default:
  427. }
  428. s.maybeResetTimer()
  429. select {
  430. case closeErr = <-s.closeChan:
  431. break runLoop
  432. case <-s.timer.Chan():
  433. s.timer.SetRead()
  434. // We do all the interesting stuff after the switch statement, so
  435. // nothing to see here.
  436. case <-s.sendingScheduled:
  437. // We do all the interesting stuff after the switch statement, so
  438. // nothing to see here.
  439. case p := <-s.receivedPackets:
  440. err := s.handlePacketImpl(p)
  441. if err != nil {
  442. if qErr, ok := err.(*qerr.QuicError); ok && qErr.ErrorCode == qerr.DecryptionFailure {
  443. s.tryQueueingUndecryptablePacket(p)
  444. continue
  445. }
  446. s.closeLocal(err)
  447. continue
  448. }
  449. // This is a bit unclean, but works properly, since the packet always
  450. // begins with the public header and we never copy it.
  451. putPacketBuffer(&p.header.Raw)
  452. case p := <-s.paramsChan:
  453. s.processTransportParameters(&p)
  454. continue
  455. case _, ok := <-s.handshakeEvent:
  456. // when the handshake is completed, the channel will be closed
  457. s.handleHandshakeEvent(!ok)
  458. }
  459. now := time.Now()
  460. if timeout := s.sentPacketHandler.GetAlarmTimeout(); !timeout.IsZero() && timeout.Before(now) {
  461. // This could cause packets to be retransmitted.
  462. // Check it before trying to send packets.
  463. if err := s.sentPacketHandler.OnAlarm(); err != nil {
  464. s.closeLocal(err)
  465. }
  466. }
  467. var pacingDeadline time.Time
  468. if s.pacingDeadline.IsZero() { // the timer didn't have a pacing deadline set
  469. pacingDeadline = s.sentPacketHandler.TimeUntilSend()
  470. }
  471. if s.config.KeepAlive && !s.keepAlivePingSent && s.handshakeComplete && time.Since(s.lastNetworkActivityTime) >= s.peerParams.IdleTimeout/2 {
  472. // send a PING frame since there is no activity in the session
  473. s.logger.Debugf("Sending a keep-alive ping to keep the connection alive.")
  474. s.framer.QueueControlFrame(&wire.PingFrame{})
  475. s.keepAlivePingSent = true
  476. } else if !pacingDeadline.IsZero() && now.Before(pacingDeadline) {
  477. // If we get to this point before the pacing deadline, we should wait until that deadline.
  478. // This can happen when scheduleSending is called, or a packet is received.
  479. // Set the timer and restart the run loop.
  480. s.pacingDeadline = pacingDeadline
  481. continue
  482. }
  483. if !s.receivedTooManyUndecrytablePacketsTime.IsZero() && s.receivedTooManyUndecrytablePacketsTime.Add(protocol.PublicResetTimeout).Before(now) && len(s.undecryptablePackets) != 0 {
  484. s.closeLocal(qerr.Error(qerr.DecryptionFailure, "too many undecryptable packets received"))
  485. continue
  486. }
  487. if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
  488. s.closeLocal(qerr.Error(qerr.HandshakeTimeout, "Crypto handshake did not complete in time."))
  489. continue
  490. }
  491. if s.handshakeComplete && now.Sub(s.lastNetworkActivityTime) >= s.config.IdleTimeout {
  492. s.closeLocal(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
  493. continue
  494. }
  495. if err := s.sendPackets(); err != nil {
  496. s.closeLocal(err)
  497. }
  498. }
  499. // [Psiphon]
  500. // Stop timer to immediately release resources
  501. s.timer.Reset(time.Time{})
  502. if err := s.handleCloseError(closeErr); err != nil {
  503. s.logger.Infof("Handling close error failed: %s", err)
  504. }
  505. s.logger.Infof("Connection %s closed.", s.srcConnID)
  506. s.sessionRunner.removeConnectionID(s.srcConnID)
  507. return closeErr.err
  508. }
  509. func (s *session) Context() context.Context {
  510. return s.ctx
  511. }
  512. func (s *session) ConnectionState() ConnectionState {
  513. return s.cryptoStreamHandler.ConnectionState()
  514. }
  515. func (s *session) maybeResetTimer() {
  516. var deadline time.Time
  517. if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
  518. deadline = s.lastNetworkActivityTime.Add(s.peerParams.IdleTimeout / 2)
  519. } else {
  520. deadline = s.lastNetworkActivityTime.Add(s.config.IdleTimeout)
  521. }
  522. if ackAlarm := s.receivedPacketHandler.GetAlarmTimeout(); !ackAlarm.IsZero() {
  523. deadline = utils.MinTime(deadline, ackAlarm)
  524. }
  525. if lossTime := s.sentPacketHandler.GetAlarmTimeout(); !lossTime.IsZero() {
  526. deadline = utils.MinTime(deadline, lossTime)
  527. }
  528. if !s.handshakeComplete {
  529. handshakeDeadline := s.sessionCreationTime.Add(s.config.HandshakeTimeout)
  530. deadline = utils.MinTime(deadline, handshakeDeadline)
  531. }
  532. if !s.receivedTooManyUndecrytablePacketsTime.IsZero() {
  533. deadline = utils.MinTime(deadline, s.receivedTooManyUndecrytablePacketsTime.Add(protocol.PublicResetTimeout))
  534. }
  535. if !s.pacingDeadline.IsZero() {
  536. deadline = utils.MinTime(deadline, s.pacingDeadline)
  537. }
  538. s.timer.Reset(deadline)
  539. }
  540. func (s *session) handleHandshakeEvent(completed bool) {
  541. if !completed {
  542. s.tryDecryptingQueuedPackets()
  543. return
  544. }
  545. s.handshakeComplete = true
  546. s.handshakeEvent = nil // prevent this case from ever being selected again
  547. s.sessionRunner.onHandshakeComplete(s)
  548. // In gQUIC, the server completes the handshake first (after sending the SHLO).
  549. // In TLS 1.3, the client completes the handshake first (after sending the CFIN).
  550. // We need to make sure they learn about the peer completing the handshake,
  551. // in order to stop retransmitting handshake packets.
  552. // They will stop retransmitting handshake packets when receiving the first forward-secure packet.
  553. // We need to make sure that a retransmittable forward-secure packet is sent,
  554. // independent from the application protocol.
  555. if (!s.version.UsesTLS() && s.perspective == protocol.PerspectiveClient) ||
  556. (s.version.UsesTLS() && s.perspective == protocol.PerspectiveServer) {
  557. s.queueControlFrame(&wire.PingFrame{})
  558. s.sentPacketHandler.SetHandshakeComplete()
  559. }
  560. }
  561. func (s *session) handlePacketImpl(p *receivedPacket) error {
  562. hdr := p.header
  563. // The server can change the source connection ID with the first Handshake packet.
  564. // After this, all packets with a different source connection have to be ignored.
  565. if s.receivedFirstPacket && hdr.IsLongHeader && !hdr.SrcConnectionID.Equal(s.destConnID) {
  566. s.logger.Debugf("Dropping packet with unexpected source connection ID: %s (expected %s)", p.header.SrcConnectionID, s.destConnID)
  567. return nil
  568. }
  569. if s.perspective == protocol.PerspectiveClient {
  570. if divNonce := p.header.DiversificationNonce; len(divNonce) > 0 {
  571. if err := s.cryptoStreamHandler.(divNonceSetter).SetDiversificationNonce(divNonce); err != nil {
  572. return err
  573. }
  574. }
  575. }
  576. if p.rcvTime.IsZero() {
  577. // To simplify testing
  578. p.rcvTime = time.Now()
  579. }
  580. // Calculate packet number
  581. hdr.PacketNumber = protocol.InferPacketNumber(
  582. hdr.PacketNumberLen,
  583. s.largestRcvdPacketNumber,
  584. hdr.PacketNumber,
  585. s.version,
  586. )
  587. packet, err := s.unpacker.Unpack(hdr.Raw, hdr, p.data)
  588. if s.logger.Debug() {
  589. if err != nil {
  590. s.logger.Debugf("<- Reading packet 0x%x (%d bytes) for connection %s", hdr.PacketNumber, len(p.data)+len(hdr.Raw), hdr.DestConnectionID)
  591. } else {
  592. s.logger.Debugf("<- Reading packet 0x%x (%d bytes) for connection %s, %s", hdr.PacketNumber, len(p.data)+len(hdr.Raw), hdr.DestConnectionID, packet.encryptionLevel)
  593. }
  594. hdr.Log(s.logger)
  595. }
  596. // if the decryption failed, this might be a packet sent by an attacker
  597. if err != nil {
  598. return err
  599. }
  600. // The server can change the source connection ID with the first Handshake packet.
  601. if s.perspective == protocol.PerspectiveClient && !s.receivedFirstPacket && hdr.IsLongHeader && !hdr.SrcConnectionID.Equal(s.destConnID) {
  602. s.logger.Debugf("Received first packet. Switching destination connection ID to: %s", hdr.SrcConnectionID)
  603. s.destConnID = hdr.SrcConnectionID
  604. s.packer.ChangeDestConnectionID(s.destConnID)
  605. }
  606. s.receivedFirstPacket = true
  607. s.lastNetworkActivityTime = p.rcvTime
  608. s.keepAlivePingSent = false
  609. // In gQUIC, the server completes the handshake first (after sending the SHLO).
  610. // In TLS 1.3, the client completes the handshake first (after sending the CFIN).
  611. // We know that the peer completed the handshake as soon as we receive a forward-secure packet.
  612. if (!s.version.UsesTLS() && s.perspective == protocol.PerspectiveServer) ||
  613. (s.version.UsesTLS() && s.perspective == protocol.PerspectiveClient) {
  614. if !s.receivedFirstForwardSecurePacket && packet.encryptionLevel == protocol.EncryptionForwardSecure {
  615. s.receivedFirstForwardSecurePacket = true
  616. s.sentPacketHandler.SetHandshakeComplete()
  617. }
  618. }
  619. s.lastRcvdPacketNumber = hdr.PacketNumber
  620. // Only do this after decrypting, so we are sure the packet is not attacker-controlled
  621. s.largestRcvdPacketNumber = utils.MaxPacketNumber(s.largestRcvdPacketNumber, hdr.PacketNumber)
  622. // If this is a Retry packet, there's no need to send an ACK.
  623. // The session will be closed and recreated as soon as the crypto setup processed the HRR.
  624. if hdr.Type != protocol.PacketTypeRetry {
  625. isRetransmittable := ackhandler.HasRetransmittableFrames(packet.frames)
  626. if err := s.receivedPacketHandler.ReceivedPacket(hdr.PacketNumber, p.rcvTime, isRetransmittable); err != nil {
  627. return err
  628. }
  629. }
  630. return s.handleFrames(packet.frames, packet.encryptionLevel)
  631. }
  632. func (s *session) handleFrames(fs []wire.Frame, encLevel protocol.EncryptionLevel) error {
  633. for _, ff := range fs {
  634. var err error
  635. wire.LogFrame(s.logger, ff, false)
  636. switch frame := ff.(type) {
  637. case *wire.StreamFrame:
  638. err = s.handleStreamFrame(frame, encLevel)
  639. case *wire.AckFrame:
  640. err = s.handleAckFrame(frame, encLevel)
  641. case *wire.ConnectionCloseFrame:
  642. s.closeRemote(qerr.Error(frame.ErrorCode, frame.ReasonPhrase))
  643. case *wire.GoawayFrame:
  644. err = errors.New("unimplemented: handling GOAWAY frames")
  645. case *wire.StopWaitingFrame: // ignore STOP_WAITINGs
  646. case *wire.RstStreamFrame:
  647. err = s.handleRstStreamFrame(frame)
  648. case *wire.MaxDataFrame:
  649. s.handleMaxDataFrame(frame)
  650. case *wire.MaxStreamDataFrame:
  651. err = s.handleMaxStreamDataFrame(frame)
  652. case *wire.MaxStreamIDFrame:
  653. err = s.handleMaxStreamIDFrame(frame)
  654. case *wire.BlockedFrame:
  655. case *wire.StreamBlockedFrame:
  656. case *wire.StreamIDBlockedFrame:
  657. case *wire.StopSendingFrame:
  658. err = s.handleStopSendingFrame(frame)
  659. case *wire.PingFrame:
  660. case *wire.PathChallengeFrame:
  661. s.handlePathChallengeFrame(frame)
  662. case *wire.PathResponseFrame:
  663. // since we don't send PATH_CHALLENGEs, we don't expect PATH_RESPONSEs
  664. err = errors.New("unexpected PATH_RESPONSE frame")
  665. default:
  666. return errors.New("Session BUG: unexpected frame type")
  667. }
  668. if err != nil {
  669. return err
  670. }
  671. }
  672. return nil
  673. }
  674. // handlePacket is called by the server with a new packet
  675. func (s *session) handlePacket(p *receivedPacket) {
  676. // Discard packets once the amount of queued packets is larger than
  677. // the channel size, protocol.MaxSessionUnprocessedPackets
  678. select {
  679. case s.receivedPackets <- p:
  680. default:
  681. }
  682. }
  683. func (s *session) handleStreamFrame(frame *wire.StreamFrame, encLevel protocol.EncryptionLevel) error {
  684. if frame.StreamID == s.version.CryptoStreamID() {
  685. if frame.FinBit {
  686. return errors.New("Received STREAM frame with FIN bit for the crypto stream")
  687. }
  688. return s.cryptoStream.handleStreamFrame(frame)
  689. } else if encLevel <= protocol.EncryptionUnencrypted {
  690. return qerr.Error(qerr.UnencryptedStreamData, fmt.Sprintf("received unencrypted stream data on stream %d", frame.StreamID))
  691. }
  692. str, err := s.streamsMap.GetOrOpenReceiveStream(frame.StreamID)
  693. if err != nil {
  694. return err
  695. }
  696. if str == nil {
  697. // Stream is closed and already garbage collected
  698. // ignore this StreamFrame
  699. return nil
  700. }
  701. return str.handleStreamFrame(frame)
  702. }
  703. func (s *session) handleMaxDataFrame(frame *wire.MaxDataFrame) {
  704. s.connFlowController.UpdateSendWindow(frame.ByteOffset)
  705. }
  706. func (s *session) handleMaxStreamDataFrame(frame *wire.MaxStreamDataFrame) error {
  707. if frame.StreamID == s.version.CryptoStreamID() {
  708. s.cryptoStream.handleMaxStreamDataFrame(frame)
  709. return nil
  710. }
  711. str, err := s.streamsMap.GetOrOpenSendStream(frame.StreamID)
  712. if err != nil {
  713. return err
  714. }
  715. if str == nil {
  716. // stream is closed and already garbage collected
  717. return nil
  718. }
  719. str.handleMaxStreamDataFrame(frame)
  720. return nil
  721. }
  722. func (s *session) handleMaxStreamIDFrame(frame *wire.MaxStreamIDFrame) error {
  723. return s.streamsMap.HandleMaxStreamIDFrame(frame)
  724. }
  725. func (s *session) handleRstStreamFrame(frame *wire.RstStreamFrame) error {
  726. if frame.StreamID == s.version.CryptoStreamID() {
  727. return errors.New("Received RST_STREAM frame for the crypto stream")
  728. }
  729. str, err := s.streamsMap.GetOrOpenReceiveStream(frame.StreamID)
  730. if err != nil {
  731. return err
  732. }
  733. if str == nil {
  734. // stream is closed and already garbage collected
  735. return nil
  736. }
  737. return str.handleRstStreamFrame(frame)
  738. }
  739. func (s *session) handleStopSendingFrame(frame *wire.StopSendingFrame) error {
  740. if frame.StreamID == s.version.CryptoStreamID() {
  741. return errors.New("Received a STOP_SENDING frame for the crypto stream")
  742. }
  743. str, err := s.streamsMap.GetOrOpenSendStream(frame.StreamID)
  744. if err != nil {
  745. return err
  746. }
  747. if str == nil {
  748. // stream is closed and already garbage collected
  749. return nil
  750. }
  751. str.handleStopSendingFrame(frame)
  752. return nil
  753. }
  754. func (s *session) handlePathChallengeFrame(frame *wire.PathChallengeFrame) {
  755. s.queueControlFrame(&wire.PathResponseFrame{Data: frame.Data})
  756. }
  757. func (s *session) handleAckFrame(frame *wire.AckFrame, encLevel protocol.EncryptionLevel) error {
  758. if err := s.sentPacketHandler.ReceivedAck(frame, s.lastRcvdPacketNumber, encLevel, s.lastNetworkActivityTime); err != nil {
  759. return err
  760. }
  761. s.receivedPacketHandler.IgnoreBelow(s.sentPacketHandler.GetLowestPacketNotConfirmedAcked())
  762. return nil
  763. }
  764. // closeLocal closes the session and send a CONNECTION_CLOSE containing the error
  765. func (s *session) closeLocal(e error) {
  766. s.closeOnce.Do(func() {
  767. s.closeChan <- closeError{err: e, sendClose: true, remote: false}
  768. })
  769. }
  770. // destroy closes the session without sending the error on the wire
  771. func (s *session) destroy(e error) {
  772. s.closeOnce.Do(func() {
  773. s.closeChan <- closeError{err: e, sendClose: false, remote: false}
  774. })
  775. }
  776. func (s *session) closeRemote(e error) {
  777. s.closeOnce.Do(func() {
  778. s.closeChan <- closeError{err: e, remote: true}
  779. })
  780. }
  781. // Close the connection. It sends a qerr.PeerGoingAway.
  782. // It waits until the run loop has stopped before returning
  783. func (s *session) Close() error {
  784. s.closeLocal(nil)
  785. <-s.ctx.Done()
  786. return nil
  787. }
  788. func (s *session) CloseWithError(code protocol.ApplicationErrorCode, e error) error {
  789. s.closeLocal(qerr.Error(qerr.ErrorCode(code), e.Error()))
  790. <-s.ctx.Done()
  791. return nil
  792. }
  793. func (s *session) handleCloseError(closeErr closeError) error {
  794. if closeErr.err == nil {
  795. closeErr.err = qerr.PeerGoingAway
  796. }
  797. var quicErr *qerr.QuicError
  798. var ok bool
  799. if quicErr, ok = closeErr.err.(*qerr.QuicError); !ok {
  800. quicErr = qerr.ToQuicError(closeErr.err)
  801. }
  802. // Don't log 'normal' reasons
  803. if quicErr.ErrorCode == qerr.PeerGoingAway || quicErr.ErrorCode == qerr.NetworkIdleTimeout {
  804. s.logger.Infof("Closing connection %s.", s.srcConnID)
  805. } else {
  806. s.logger.Errorf("Closing session with error: %s", closeErr.err.Error())
  807. }
  808. s.cryptoStream.closeForShutdown(quicErr)
  809. s.streamsMap.CloseWithError(quicErr)
  810. if !closeErr.sendClose {
  811. return nil
  812. }
  813. // If this is a remote close we're done here
  814. if closeErr.remote {
  815. return nil
  816. }
  817. if quicErr.ErrorCode == qerr.DecryptionFailure ||
  818. quicErr == handshake.ErrNSTPExperiment {
  819. return s.sendPublicReset(s.lastRcvdPacketNumber)
  820. }
  821. return s.sendConnectionClose(quicErr)
  822. }
  823. func (s *session) processTransportParameters(params *handshake.TransportParameters) {
  824. s.peerParams = params
  825. s.streamsMap.UpdateLimits(params)
  826. s.packer.HandleTransportParameters(params)
  827. s.connFlowController.UpdateSendWindow(params.ConnectionFlowControlWindow)
  828. // the crypto stream is the only open stream at this moment
  829. // so we don't need to update stream flow control windows
  830. }
  831. func (s *session) sendPackets() error {
  832. s.pacingDeadline = time.Time{}
  833. sendMode := s.sentPacketHandler.SendMode()
  834. if sendMode == ackhandler.SendNone { // shortcut: return immediately if there's nothing to send
  835. return nil
  836. }
  837. numPackets := s.sentPacketHandler.ShouldSendNumPackets()
  838. var numPacketsSent int
  839. sendLoop:
  840. for {
  841. switch sendMode {
  842. case ackhandler.SendNone:
  843. break sendLoop
  844. case ackhandler.SendAck:
  845. // If we already sent packets, and the send mode switches to SendAck,
  846. // we've just become congestion limited.
  847. // There's no need to try to send an ACK at this moment.
  848. if numPacketsSent > 0 {
  849. return nil
  850. }
  851. // We can at most send a single ACK only packet.
  852. // There will only be a new ACK after receiving new packets.
  853. // SendAck is only returned when we're congestion limited, so we don't need to set the pacingt timer.
  854. return s.maybeSendAckOnlyPacket()
  855. case ackhandler.SendTLP, ackhandler.SendRTO:
  856. if err := s.sendProbePacket(); err != nil {
  857. return err
  858. }
  859. numPacketsSent++
  860. case ackhandler.SendRetransmission:
  861. sentPacket, err := s.maybeSendRetransmission()
  862. if err != nil {
  863. return err
  864. }
  865. if sentPacket {
  866. numPacketsSent++
  867. // This can happen if a retransmission queued, but it wasn't necessary to send it.
  868. // e.g. when an Initial is queued, but we already received a packet from the server.
  869. }
  870. case ackhandler.SendAny:
  871. sentPacket, err := s.sendPacket()
  872. if err != nil {
  873. return err
  874. }
  875. if !sentPacket {
  876. break sendLoop
  877. }
  878. numPacketsSent++
  879. default:
  880. return fmt.Errorf("BUG: invalid send mode %d", sendMode)
  881. }
  882. if numPacketsSent >= numPackets {
  883. break
  884. }
  885. sendMode = s.sentPacketHandler.SendMode()
  886. }
  887. // Only start the pacing timer if we sent as many packets as we were allowed.
  888. // There will probably be more to send when calling sendPacket again.
  889. if numPacketsSent == numPackets {
  890. s.pacingDeadline = s.sentPacketHandler.TimeUntilSend()
  891. }
  892. return nil
  893. }
  894. func (s *session) maybeSendAckOnlyPacket() error {
  895. packet, err := s.packer.MaybePackAckPacket()
  896. if err != nil {
  897. return err
  898. }
  899. if packet == nil {
  900. return nil
  901. }
  902. s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
  903. return s.sendPackedPacket(packet)
  904. }
  905. // maybeSendRetransmission sends retransmissions for at most one packet.
  906. // It takes care that Initials aren't retransmitted, if a packet from the server was already received.
  907. func (s *session) maybeSendRetransmission() (bool, error) {
  908. var retransmitPacket *ackhandler.Packet
  909. for {
  910. retransmitPacket = s.sentPacketHandler.DequeuePacketForRetransmission()
  911. if retransmitPacket == nil {
  912. return false, nil
  913. }
  914. // Don't retransmit Initial packets if we already received a response.
  915. // An Initial might have been retransmitted multiple times before we receive a response.
  916. // As soon as we receive one response, we don't need to send any more Initials.
  917. if s.receivedFirstPacket && retransmitPacket.PacketType == protocol.PacketTypeInitial {
  918. s.logger.Debugf("Skipping retransmission of packet %d. Already received a response to an Initial.", retransmitPacket.PacketNumber)
  919. continue
  920. }
  921. break
  922. }
  923. if retransmitPacket.EncryptionLevel != protocol.EncryptionForwardSecure {
  924. s.logger.Debugf("Dequeueing handshake retransmission for packet 0x%x", retransmitPacket.PacketNumber)
  925. } else {
  926. s.logger.Debugf("Dequeueing retransmission for packet 0x%x", retransmitPacket.PacketNumber)
  927. }
  928. packets, err := s.packer.PackRetransmission(retransmitPacket)
  929. if err != nil {
  930. return false, err
  931. }
  932. ackhandlerPackets := make([]*ackhandler.Packet, len(packets))
  933. for i, packet := range packets {
  934. ackhandlerPackets[i] = packet.ToAckHandlerPacket()
  935. }
  936. s.sentPacketHandler.SentPacketsAsRetransmission(ackhandlerPackets, retransmitPacket.PacketNumber)
  937. for _, packet := range packets {
  938. if err := s.sendPackedPacket(packet); err != nil {
  939. return false, err
  940. }
  941. }
  942. return true, nil
  943. }
  944. func (s *session) sendProbePacket() error {
  945. p, err := s.sentPacketHandler.DequeueProbePacket()
  946. if err != nil {
  947. return err
  948. }
  949. s.logger.Debugf("Sending a retransmission for %#x as a probe packet.", p.PacketNumber)
  950. packets, err := s.packer.PackRetransmission(p)
  951. if err != nil {
  952. return err
  953. }
  954. ackhandlerPackets := make([]*ackhandler.Packet, len(packets))
  955. for i, packet := range packets {
  956. ackhandlerPackets[i] = packet.ToAckHandlerPacket()
  957. }
  958. s.sentPacketHandler.SentPacketsAsRetransmission(ackhandlerPackets, p.PacketNumber)
  959. for _, packet := range packets {
  960. if err := s.sendPackedPacket(packet); err != nil {
  961. return err
  962. }
  963. }
  964. return nil
  965. }
  966. func (s *session) sendPacket() (bool, error) {
  967. if isBlocked, offset := s.connFlowController.IsNewlyBlocked(); isBlocked {
  968. s.framer.QueueControlFrame(&wire.BlockedFrame{Offset: offset})
  969. }
  970. s.windowUpdateQueue.QueueAll()
  971. packet, err := s.packer.PackPacket()
  972. if err != nil || packet == nil {
  973. return false, err
  974. }
  975. s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
  976. if err := s.sendPackedPacket(packet); err != nil {
  977. return false, err
  978. }
  979. return true, nil
  980. }
  981. func (s *session) sendPackedPacket(packet *packedPacket) error {
  982. defer putPacketBuffer(&packet.raw)
  983. s.logPacket(packet)
  984. return s.conn.Write(packet.raw)
  985. }
  986. func (s *session) sendConnectionClose(quicErr *qerr.QuicError) error {
  987. packet, err := s.packer.PackConnectionClose(&wire.ConnectionCloseFrame{
  988. ErrorCode: quicErr.ErrorCode,
  989. ReasonPhrase: quicErr.ErrorMessage,
  990. })
  991. if err != nil {
  992. return err
  993. }
  994. s.logPacket(packet)
  995. return s.conn.Write(packet.raw)
  996. }
  997. func (s *session) logPacket(packet *packedPacket) {
  998. if !s.logger.Debug() {
  999. // We don't need to allocate the slices for calling the format functions
  1000. return
  1001. }
  1002. s.logger.Debugf("-> Sending packet 0x%x (%d bytes) for connection %s, %s", packet.header.PacketNumber, len(packet.raw), s.srcConnID, packet.encryptionLevel)
  1003. packet.header.Log(s.logger)
  1004. for _, frame := range packet.frames {
  1005. wire.LogFrame(s.logger, frame, true)
  1006. }
  1007. }
  1008. // GetOrOpenStream either returns an existing stream, a newly opened stream, or nil if a stream with the provided ID is already closed.
  1009. // It is *only* needed for gQUIC's H2.
  1010. // It will be removed as soon as gQUIC moves towards the IETF H2/QUIC stream mapping.
  1011. func (s *session) GetOrOpenStream(id protocol.StreamID) (Stream, error) {
  1012. str, err := s.streamsMap.GetOrOpenSendStream(id)
  1013. if str != nil {
  1014. if bstr, ok := str.(Stream); ok {
  1015. return bstr, err
  1016. }
  1017. return nil, fmt.Errorf("Stream %d is not a bidirectional stream", id)
  1018. }
  1019. // make sure to return an actual nil value here, not an Stream with value nil
  1020. return nil, err
  1021. }
  1022. // AcceptStream returns the next stream openend by the peer
  1023. func (s *session) AcceptStream() (Stream, error) {
  1024. return s.streamsMap.AcceptStream()
  1025. }
  1026. func (s *session) AcceptUniStream() (ReceiveStream, error) {
  1027. return s.streamsMap.AcceptUniStream()
  1028. }
  1029. // OpenStream opens a stream
  1030. func (s *session) OpenStream() (Stream, error) {
  1031. return s.streamsMap.OpenStream()
  1032. }
  1033. func (s *session) OpenStreamSync() (Stream, error) {
  1034. return s.streamsMap.OpenStreamSync()
  1035. }
  1036. func (s *session) OpenUniStream() (SendStream, error) {
  1037. return s.streamsMap.OpenUniStream()
  1038. }
  1039. func (s *session) OpenUniStreamSync() (SendStream, error) {
  1040. return s.streamsMap.OpenUniStreamSync()
  1041. }
  1042. func (s *session) newStream(id protocol.StreamID) streamI {
  1043. flowController := s.newFlowController(id)
  1044. return newStream(id, s, flowController, s.version)
  1045. }
  1046. func (s *session) newFlowController(id protocol.StreamID) flowcontrol.StreamFlowController {
  1047. var initialSendWindow protocol.ByteCount
  1048. if s.peerParams != nil {
  1049. initialSendWindow = s.peerParams.StreamFlowControlWindow
  1050. }
  1051. return flowcontrol.NewStreamFlowController(
  1052. id,
  1053. s.version.StreamContributesToConnectionFlowControl(id),
  1054. s.connFlowController,
  1055. protocol.ReceiveStreamFlowControlWindow,
  1056. protocol.ByteCount(s.config.MaxReceiveStreamFlowControlWindow),
  1057. initialSendWindow,
  1058. s.onHasStreamWindowUpdate,
  1059. s.rttStats,
  1060. s.logger,
  1061. )
  1062. }
  1063. func (s *session) newCryptoStream() cryptoStream {
  1064. id := s.version.CryptoStreamID()
  1065. flowController := flowcontrol.NewStreamFlowController(
  1066. id,
  1067. s.version.StreamContributesToConnectionFlowControl(id),
  1068. s.connFlowController,
  1069. protocol.ReceiveStreamFlowControlWindow,
  1070. protocol.ByteCount(s.config.MaxReceiveStreamFlowControlWindow),
  1071. 0,
  1072. s.onHasStreamWindowUpdate,
  1073. s.rttStats,
  1074. s.logger,
  1075. )
  1076. return newCryptoStream(s, flowController, s.version)
  1077. }
  1078. func (s *session) sendPublicReset(rejectedPacketNumber protocol.PacketNumber) error {
  1079. s.logger.Infof("Sending PUBLIC_RESET for connection %s, packet number %d", s.destConnID, rejectedPacketNumber)
  1080. return s.conn.Write(wire.WritePublicReset(s.destConnID, rejectedPacketNumber, 0))
  1081. }
  1082. // scheduleSending signals that we have data for sending
  1083. func (s *session) scheduleSending() {
  1084. select {
  1085. case s.sendingScheduled <- struct{}{}:
  1086. default:
  1087. }
  1088. }
  1089. func (s *session) tryQueueingUndecryptablePacket(p *receivedPacket) {
  1090. if s.handshakeComplete {
  1091. s.logger.Debugf("Received undecryptable packet from %s after the handshake: %#v, %d bytes data", p.remoteAddr.String(), p.header, len(p.data))
  1092. return
  1093. }
  1094. if len(s.undecryptablePackets)+1 > protocol.MaxUndecryptablePackets {
  1095. // if this is the first time the undecryptablePackets runs full, start the timer to send a Public Reset
  1096. if s.receivedTooManyUndecrytablePacketsTime.IsZero() {
  1097. s.receivedTooManyUndecrytablePacketsTime = time.Now()
  1098. s.maybeResetTimer()
  1099. }
  1100. s.logger.Infof("Dropping undecrytable packet 0x%x (undecryptable packet queue full)", p.header.PacketNumber)
  1101. return
  1102. }
  1103. s.logger.Infof("Queueing packet 0x%x for later decryption", p.header.PacketNumber)
  1104. s.undecryptablePackets = append(s.undecryptablePackets, p)
  1105. }
  1106. func (s *session) tryDecryptingQueuedPackets() {
  1107. for _, p := range s.undecryptablePackets {
  1108. s.handlePacket(p)
  1109. }
  1110. s.undecryptablePackets = s.undecryptablePackets[:0]
  1111. }
  1112. func (s *session) queueControlFrame(f wire.Frame) {
  1113. s.framer.QueueControlFrame(f)
  1114. s.scheduleSending()
  1115. }
  1116. func (s *session) onHasStreamWindowUpdate(id protocol.StreamID) {
  1117. s.windowUpdateQueue.AddStream(id)
  1118. s.scheduleSending()
  1119. }
  1120. func (s *session) onHasConnectionWindowUpdate() {
  1121. s.windowUpdateQueue.AddConnection()
  1122. s.scheduleSending()
  1123. }
  1124. func (s *session) onHasStreamData(id protocol.StreamID) {
  1125. if id != s.version.CryptoStreamID() {
  1126. s.framer.AddActiveStream(id)
  1127. }
  1128. s.scheduleSending()
  1129. }
  1130. func (s *session) onStreamCompleted(id protocol.StreamID) {
  1131. if err := s.streamsMap.DeleteStream(id); err != nil {
  1132. s.closeLocal(err)
  1133. }
  1134. }
  1135. func (s *session) LocalAddr() net.Addr {
  1136. return s.conn.LocalAddr()
  1137. }
  1138. func (s *session) RemoteAddr() net.Addr {
  1139. return s.conn.RemoteAddr()
  1140. }
  1141. func (s *session) GetVersion() protocol.VersionNumber {
  1142. return s.version
  1143. }