forked from quic-go/quic-go
* create a new type for crypto stream used for Initial data This currently the exact same implementation as the other streams, thus no functional change is expected. * handshake: implement a function to find the SNI and the ECH extension * move the SNI parsing logic to the quic package * implement splitting logic * generalize cutting logic * introduce QUIC_GO_DISABLE_CLIENTHELLO_SCRAMBLING * improve testing
74 lines
2.2 KiB
Go
74 lines
2.2 KiB
Go
package quic
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/quic-go/quic-go/internal/protocol"
|
|
"github.com/quic-go/quic-go/internal/wire"
|
|
)
|
|
|
|
type cryptoStreamManager struct {
|
|
initialStream *initialCryptoStream
|
|
handshakeStream *cryptoStream
|
|
oneRTTStream *cryptoStream
|
|
}
|
|
|
|
func newCryptoStreamManager(
|
|
initialStream *initialCryptoStream,
|
|
handshakeStream *cryptoStream,
|
|
oneRTTStream *cryptoStream,
|
|
) *cryptoStreamManager {
|
|
return &cryptoStreamManager{
|
|
initialStream: initialStream,
|
|
handshakeStream: handshakeStream,
|
|
oneRTTStream: oneRTTStream,
|
|
}
|
|
}
|
|
|
|
func (m *cryptoStreamManager) HandleCryptoFrame(frame *wire.CryptoFrame, encLevel protocol.EncryptionLevel) error {
|
|
//nolint:exhaustive // CRYPTO frames cannot be sent in 0-RTT packets.
|
|
switch encLevel {
|
|
case protocol.EncryptionInitial:
|
|
return m.initialStream.HandleCryptoFrame(frame)
|
|
case protocol.EncryptionHandshake:
|
|
return m.handshakeStream.HandleCryptoFrame(frame)
|
|
case protocol.Encryption1RTT:
|
|
return m.oneRTTStream.HandleCryptoFrame(frame)
|
|
default:
|
|
return fmt.Errorf("received CRYPTO frame with unexpected encryption level: %s", encLevel)
|
|
}
|
|
}
|
|
|
|
func (m *cryptoStreamManager) GetCryptoData(encLevel protocol.EncryptionLevel) []byte {
|
|
//nolint:exhaustive // CRYPTO frames cannot be sent in 0-RTT packets.
|
|
switch encLevel {
|
|
case protocol.EncryptionInitial:
|
|
return m.initialStream.GetCryptoData()
|
|
case protocol.EncryptionHandshake:
|
|
return m.handshakeStream.GetCryptoData()
|
|
case protocol.Encryption1RTT:
|
|
return m.oneRTTStream.GetCryptoData()
|
|
default:
|
|
panic(fmt.Sprintf("received CRYPTO frame with unexpected encryption level: %s", encLevel))
|
|
}
|
|
}
|
|
|
|
func (m *cryptoStreamManager) GetPostHandshakeData(maxSize protocol.ByteCount) *wire.CryptoFrame {
|
|
if !m.oneRTTStream.HasData() {
|
|
return nil
|
|
}
|
|
return m.oneRTTStream.PopCryptoFrame(maxSize)
|
|
}
|
|
|
|
func (m *cryptoStreamManager) Drop(encLevel protocol.EncryptionLevel) error {
|
|
//nolint:exhaustive // 1-RTT keys should never get dropped.
|
|
switch encLevel {
|
|
case protocol.EncryptionInitial:
|
|
return m.initialStream.Finish()
|
|
case protocol.EncryptionHandshake:
|
|
return m.handshakeStream.Finish()
|
|
default:
|
|
panic(fmt.Sprintf("dropped unexpected encryption level: %s", encLevel))
|
|
}
|
|
}
|