blob: 4e93fdf9c299eda0daee8350f188259e04a0d5c4 [file] [log] [blame]
QUICHE teama6ef0a62019-03-07 20:34:33 -05001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "net/third_party/quiche/src/quic/core/quic_connection.h"
6
7#include <string.h>
8#include <sys/types.h>
9
10#include <algorithm>
11#include <iterator>
12#include <limits>
13#include <memory>
14#include <set>
vasilvv872e7a32019-03-12 16:42:44 -070015#include <string>
QUICHE teama6ef0a62019-03-07 20:34:33 -050016#include <utility>
17
QUICHE teama6ef0a62019-03-07 20:34:33 -050018#include "net/third_party/quiche/src/quic/core/crypto/crypto_protocol.h"
dschinazi244f6dc2019-05-06 15:45:16 -070019#include "net/third_party/quiche/src/quic/core/crypto/crypto_utils.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050020#include "net/third_party/quiche/src/quic/core/crypto/quic_decrypter.h"
21#include "net/third_party/quiche/src/quic/core/crypto/quic_encrypter.h"
22#include "net/third_party/quiche/src/quic/core/proto/cached_network_parameters.pb.h"
23#include "net/third_party/quiche/src/quic/core/quic_bandwidth.h"
24#include "net/third_party/quiche/src/quic/core/quic_config.h"
QUICHE teamc65d1d12019-03-19 20:58:04 -070025#include "net/third_party/quiche/src/quic/core/quic_connection_id.h"
ianswettdc1e7ab2019-05-03 16:10:44 -070026#include "net/third_party/quiche/src/quic/core/quic_error_codes.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050027#include "net/third_party/quiche/src/quic/core/quic_packet_generator.h"
28#include "net/third_party/quiche/src/quic/core/quic_pending_retransmission.h"
29#include "net/third_party/quiche/src/quic/core/quic_types.h"
30#include "net/third_party/quiche/src/quic/core/quic_utils.h"
31#include "net/third_party/quiche/src/quic/platform/api/quic_bug_tracker.h"
32#include "net/third_party/quiche/src/quic/platform/api/quic_client_stats.h"
33#include "net/third_party/quiche/src/quic/platform/api/quic_error_code_wrappers.h"
34#include "net/third_party/quiche/src/quic/platform/api/quic_exported_stats.h"
35#include "net/third_party/quiche/src/quic/platform/api/quic_flag_utils.h"
36#include "net/third_party/quiche/src/quic/platform/api/quic_flags.h"
37#include "net/third_party/quiche/src/quic/platform/api/quic_logging.h"
38#include "net/third_party/quiche/src/quic/platform/api/quic_map_util.h"
39#include "net/third_party/quiche/src/quic/platform/api/quic_str_cat.h"
QUICHE teama6ef0a62019-03-07 20:34:33 -050040#include "net/third_party/quiche/src/quic/platform/api/quic_string_utils.h"
41#include "net/third_party/quiche/src/quic/platform/api/quic_text_utils.h"
42
43namespace quic {
44
45class QuicDecrypter;
46class QuicEncrypter;
47
48namespace {
49
50// Maximum number of consecutive sent nonretransmittable packets.
51const QuicPacketCount kMaxConsecutiveNonRetransmittablePackets = 19;
52
53// Maximum number of retransmittable packets received before sending an ack.
54const QuicPacketCount kDefaultRetransmittablePacketsBeforeAck = 2;
55// Minimum number of packets received before ack decimation is enabled.
56// This intends to avoid the beginning of slow start, when CWNDs may be
57// rapidly increasing.
58const QuicPacketCount kMinReceivedBeforeAckDecimation = 100;
59// Wait for up to 10 retransmittable packets before sending an ack.
60const QuicPacketCount kMaxRetransmittablePacketsBeforeAck = 10;
61// One quarter RTT delay when doing ack decimation.
62const float kAckDecimationDelay = 0.25;
63// One eighth RTT delay when doing ack decimation.
64const float kShortAckDecimationDelay = 0.125;
65
66// The minimum release time into future in ms.
67const int kMinReleaseTimeIntoFutureMs = 1;
68
69bool Near(QuicPacketNumber a, QuicPacketNumber b) {
70 QuicPacketCount delta = (a > b) ? a - b : b - a;
71 return delta <= kMaxPacketGap;
72}
73
74// An alarm that is scheduled to send an ack if a timeout occurs.
75class AckAlarmDelegate : public QuicAlarm::Delegate {
76 public:
77 explicit AckAlarmDelegate(QuicConnection* connection)
78 : connection_(connection) {}
79 AckAlarmDelegate(const AckAlarmDelegate&) = delete;
80 AckAlarmDelegate& operator=(const AckAlarmDelegate&) = delete;
81
82 void OnAlarm() override {
83 DCHECK(connection_->ack_frame_updated());
84 QuicConnection::ScopedPacketFlusher flusher(connection_,
85 QuicConnection::SEND_ACK);
86 if (connection_->packet_generator().deprecate_ack_bundling_mode()) {
QUICHE teamcd098022019-03-22 18:49:55 -070087 if (connection_->SupportsMultiplePacketNumberSpaces()) {
88 connection_->SendAllPendingAcks();
89 } else {
90 DCHECK(!connection_->GetUpdatedAckFrame().ack_frame->packets.Empty());
91 connection_->SendAck();
92 }
QUICHE teama6ef0a62019-03-07 20:34:33 -050093 }
94 }
95
96 private:
97 QuicConnection* connection_;
98};
99
100// This alarm will be scheduled any time a data-bearing packet is sent out.
101// When the alarm goes off, the connection checks to see if the oldest packets
102// have been acked, and retransmit them if they have not.
103class RetransmissionAlarmDelegate : public QuicAlarm::Delegate {
104 public:
105 explicit RetransmissionAlarmDelegate(QuicConnection* connection)
106 : connection_(connection) {}
107 RetransmissionAlarmDelegate(const RetransmissionAlarmDelegate&) = delete;
108 RetransmissionAlarmDelegate& operator=(const RetransmissionAlarmDelegate&) =
109 delete;
110
111 void OnAlarm() override { connection_->OnRetransmissionTimeout(); }
112
113 private:
114 QuicConnection* connection_;
115};
116
117// An alarm that is scheduled when the SentPacketManager requires a delay
118// before sending packets and fires when the packet may be sent.
119class SendAlarmDelegate : public QuicAlarm::Delegate {
120 public:
121 explicit SendAlarmDelegate(QuicConnection* connection)
122 : connection_(connection) {}
123 SendAlarmDelegate(const SendAlarmDelegate&) = delete;
124 SendAlarmDelegate& operator=(const SendAlarmDelegate&) = delete;
125
126 void OnAlarm() override { connection_->WriteAndBundleAcksIfNotBlocked(); }
127
128 private:
129 QuicConnection* connection_;
130};
131
132class PathDegradingAlarmDelegate : public QuicAlarm::Delegate {
133 public:
134 explicit PathDegradingAlarmDelegate(QuicConnection* connection)
135 : connection_(connection) {}
136 PathDegradingAlarmDelegate(const PathDegradingAlarmDelegate&) = delete;
137 PathDegradingAlarmDelegate& operator=(const PathDegradingAlarmDelegate&) =
138 delete;
139
140 void OnAlarm() override { connection_->OnPathDegradingTimeout(); }
141
142 private:
143 QuicConnection* connection_;
144};
145
146class TimeoutAlarmDelegate : public QuicAlarm::Delegate {
147 public:
148 explicit TimeoutAlarmDelegate(QuicConnection* connection)
149 : connection_(connection) {}
150 TimeoutAlarmDelegate(const TimeoutAlarmDelegate&) = delete;
151 TimeoutAlarmDelegate& operator=(const TimeoutAlarmDelegate&) = delete;
152
153 void OnAlarm() override { connection_->CheckForTimeout(); }
154
155 private:
156 QuicConnection* connection_;
157};
158
159class PingAlarmDelegate : public QuicAlarm::Delegate {
160 public:
161 explicit PingAlarmDelegate(QuicConnection* connection)
162 : connection_(connection) {}
163 PingAlarmDelegate(const PingAlarmDelegate&) = delete;
164 PingAlarmDelegate& operator=(const PingAlarmDelegate&) = delete;
165
166 void OnAlarm() override { connection_->OnPingTimeout(); }
167
168 private:
169 QuicConnection* connection_;
170};
171
172class MtuDiscoveryAlarmDelegate : public QuicAlarm::Delegate {
173 public:
174 explicit MtuDiscoveryAlarmDelegate(QuicConnection* connection)
175 : connection_(connection) {}
176 MtuDiscoveryAlarmDelegate(const MtuDiscoveryAlarmDelegate&) = delete;
177 MtuDiscoveryAlarmDelegate& operator=(const MtuDiscoveryAlarmDelegate&) =
178 delete;
179
180 void OnAlarm() override { connection_->DiscoverMtu(); }
181
182 private:
183 QuicConnection* connection_;
184};
185
QUICHE teama6ef0a62019-03-07 20:34:33 -0500186class ProcessUndecryptablePacketsAlarmDelegate : public QuicAlarm::Delegate {
187 public:
188 explicit ProcessUndecryptablePacketsAlarmDelegate(QuicConnection* connection)
189 : connection_(connection) {}
190 ProcessUndecryptablePacketsAlarmDelegate(
191 const ProcessUndecryptablePacketsAlarmDelegate&) = delete;
192 ProcessUndecryptablePacketsAlarmDelegate& operator=(
193 const ProcessUndecryptablePacketsAlarmDelegate&) = delete;
194
rch2af16b12019-03-22 13:52:39 -0700195 void OnAlarm() override {
196 QuicConnection::ScopedPacketFlusher flusher(connection_,
197 QuicConnection::NO_ACK);
198 connection_->MaybeProcessUndecryptablePackets();
199 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500200
201 private:
202 QuicConnection* connection_;
203};
204
QUICHE teamc65d1d12019-03-19 20:58:04 -0700205// Whether this incoming packet is allowed to replace our connection ID.
206bool PacketCanReplaceConnectionId(const QuicPacketHeader& header,
207 Perspective perspective) {
208 return perspective == Perspective::IS_CLIENT &&
209 header.form == IETF_QUIC_LONG_HEADER_PACKET &&
210 QuicUtils::VariableLengthConnectionIdAllowedForVersion(
211 header.version.transport_version) &&
212 (header.long_packet_type == INITIAL ||
213 header.long_packet_type == RETRY);
214}
215
QUICHE teama6ef0a62019-03-07 20:34:33 -0500216} // namespace
217
218#define ENDPOINT \
219 (perspective_ == Perspective::IS_SERVER ? "Server: " : "Client: ")
220
221QuicConnection::QuicConnection(
dschinazi7b9278c2019-05-20 07:36:21 -0700222 QuicConnectionId server_connection_id,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500223 QuicSocketAddress initial_peer_address,
224 QuicConnectionHelperInterface* helper,
225 QuicAlarmFactory* alarm_factory,
226 QuicPacketWriter* writer,
227 bool owns_writer,
228 Perspective perspective,
229 const ParsedQuicVersionVector& supported_versions)
230 : framer_(supported_versions,
231 helper->GetClock()->ApproximateNow(),
232 perspective,
dschinazi7b9278c2019-05-20 07:36:21 -0700233 server_connection_id.length()),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500234 current_packet_content_(NO_FRAMES_RECEIVED),
235 is_current_packet_connectivity_probing_(false),
236 current_effective_peer_migration_type_(NO_CHANGE),
237 helper_(helper),
238 alarm_factory_(alarm_factory),
239 per_packet_options_(nullptr),
240 writer_(writer),
241 owns_writer_(owns_writer),
QUICHE team6987b4a2019-03-15 16:23:04 -0700242 encryption_level_(ENCRYPTION_INITIAL),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500243 clock_(helper->GetClock()),
244 random_generator_(helper->GetRandomGenerator()),
dschinazi7b9278c2019-05-20 07:36:21 -0700245 server_connection_id_(server_connection_id),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500246 peer_address_(initial_peer_address),
247 direct_peer_address_(initial_peer_address),
248 active_effective_peer_migration_type_(NO_CHANGE),
249 last_packet_decrypted_(false),
250 last_size_(0),
251 current_packet_data_(nullptr),
QUICHE team6987b4a2019-03-15 16:23:04 -0700252 last_decrypted_packet_level_(ENCRYPTION_INITIAL),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500253 should_last_packet_instigate_acks_(false),
254 was_last_packet_missing_(false),
255 max_undecryptable_packets_(0),
256 max_tracked_packets_(kMaxTrackedPackets),
257 pending_version_negotiation_packet_(false),
258 send_ietf_version_negotiation_packet_(false),
259 save_crypto_packets_as_termination_packets_(false),
260 idle_timeout_connection_close_behavior_(
261 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET),
262 close_connection_after_five_rtos_(false),
263 received_packet_manager_(&stats_),
QUICHE teamb23daa72019-03-21 08:37:48 -0700264 uber_received_packet_manager_(&stats_),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500265 ack_queued_(false),
266 num_retransmittable_packets_received_since_last_ack_sent_(0),
267 num_packets_received_since_last_ack_sent_(0),
268 stop_waiting_count_(0),
269 ack_mode_(GetQuicReloadableFlag(quic_enable_ack_decimation)
270 ? ACK_DECIMATION
271 : TCP_ACKING),
272 ack_decimation_delay_(kAckDecimationDelay),
273 unlimited_ack_decimation_(false),
274 fast_ack_after_quiescence_(false),
275 pending_retransmission_alarm_(false),
276 defer_send_in_response_to_packets_(false),
277 ping_timeout_(QuicTime::Delta::FromSeconds(kPingTimeoutSecs)),
278 retransmittable_on_wire_timeout_(QuicTime::Delta::Infinite()),
279 arena_(),
280 ack_alarm_(alarm_factory_->CreateAlarm(arena_.New<AckAlarmDelegate>(this),
281 &arena_)),
282 retransmission_alarm_(alarm_factory_->CreateAlarm(
283 arena_.New<RetransmissionAlarmDelegate>(this),
284 &arena_)),
285 send_alarm_(
286 alarm_factory_->CreateAlarm(arena_.New<SendAlarmDelegate>(this),
287 &arena_)),
288 timeout_alarm_(
289 alarm_factory_->CreateAlarm(arena_.New<TimeoutAlarmDelegate>(this),
290 &arena_)),
291 ping_alarm_(
292 alarm_factory_->CreateAlarm(arena_.New<PingAlarmDelegate>(this),
293 &arena_)),
294 mtu_discovery_alarm_(alarm_factory_->CreateAlarm(
295 arena_.New<MtuDiscoveryAlarmDelegate>(this),
296 &arena_)),
297 path_degrading_alarm_(alarm_factory_->CreateAlarm(
298 arena_.New<PathDegradingAlarmDelegate>(this),
299 &arena_)),
300 process_undecryptable_packets_alarm_(alarm_factory_->CreateAlarm(
301 arena_.New<ProcessUndecryptablePacketsAlarmDelegate>(this),
302 &arena_)),
303 visitor_(nullptr),
304 debug_visitor_(nullptr),
dschinazi7b9278c2019-05-20 07:36:21 -0700305 packet_generator_(server_connection_id_,
306 &framer_,
307 random_generator_,
308 this),
QUICHE teama6ef0a62019-03-07 20:34:33 -0500309 idle_network_timeout_(QuicTime::Delta::Infinite()),
310 handshake_timeout_(QuicTime::Delta::Infinite()),
311 time_of_first_packet_sent_after_receiving_(
312 GetQuicReloadableFlag(
313 quic_fix_time_of_first_packet_sent_after_receiving)
314 ? QuicTime::Zero()
315 : clock_->ApproximateNow()),
316 time_of_last_received_packet_(clock_->ApproximateNow()),
317 time_of_previous_received_packet_(QuicTime::Zero()),
318 sent_packet_manager_(
319 perspective,
320 clock_,
QUICHE team73957f12019-04-18 16:21:52 -0700321 random_generator_,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500322 &stats_,
323 GetQuicReloadableFlag(quic_default_to_bbr) ? kBBR : kCubicBytes,
324 kNack),
325 version_negotiation_state_(START_NEGOTIATION),
326 perspective_(perspective),
327 connected_(true),
328 can_truncate_connection_ids_(perspective == Perspective::IS_SERVER),
329 mtu_discovery_target_(0),
330 mtu_probe_count_(0),
331 packets_between_mtu_probes_(kPacketsBetweenMtuProbesBase),
332 next_mtu_probe_at_(kPacketsBetweenMtuProbesBase),
333 largest_received_packet_size_(0),
334 write_error_occurred_(false),
335 no_stop_waiting_frames_(transport_version() > QUIC_VERSION_43),
336 consecutive_num_packets_with_no_retransmittable_frames_(0),
337 max_consecutive_num_packets_with_no_retransmittable_frames_(
338 kMaxConsecutiveNonRetransmittablePackets),
339 min_received_before_ack_decimation_(kMinReceivedBeforeAckDecimation),
340 ack_frequency_before_ack_decimation_(
341 kDefaultRetransmittablePacketsBeforeAck),
342 fill_up_link_during_probing_(false),
343 probing_retransmission_pending_(false),
344 stateless_reset_token_received_(false),
345 received_stateless_reset_token_(0),
346 last_control_frame_id_(kInvalidControlFrameId),
347 is_path_degrading_(false),
348 processing_ack_frame_(false),
349 supports_release_time_(false),
350 release_time_into_future_(QuicTime::Delta::Zero()),
351 no_version_negotiation_(supported_versions.size() == 1),
QUICHE team692750b2019-03-17 17:57:46 -0700352 send_ack_when_on_can_write_(false),
dschinazi244f6dc2019-05-06 15:45:16 -0700353 retry_has_been_parsed_(false),
QUICHE team692750b2019-03-17 17:57:46 -0700354 validate_packet_number_post_decryption_(
QUICHE teamb23daa72019-03-21 08:37:48 -0700355 GetQuicReloadableFlag(quic_validate_packet_number_post_decryption)),
356 use_uber_received_packet_manager_(
357 received_packet_manager_.decide_when_to_send_acks() &&
QUICHE team1dfa46b2019-03-22 10:39:10 -0700358 validate_packet_number_post_decryption_ &&
QUICHE teamb23daa72019-03-21 08:37:48 -0700359 GetQuicReloadableFlag(quic_use_uber_received_packet_manager)) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500360 if (ack_mode_ == ACK_DECIMATION) {
361 QUIC_RELOADABLE_FLAG_COUNT(quic_enable_ack_decimation);
362 }
363 if (perspective_ == Perspective::IS_SERVER &&
364 supported_versions.size() == 1) {
365 QUIC_RESTART_FLAG_COUNT(quic_no_server_conn_ver_negotiation2);
366 }
367 if (packet_generator_.deprecate_ack_bundling_mode()) {
368 QUIC_RELOADABLE_FLAG_COUNT(quic_deprecate_ack_bundling_mode);
369 }
370 if (received_packet_manager_.decide_when_to_send_acks()) {
371 QUIC_RELOADABLE_FLAG_COUNT(quic_rpm_decides_when_to_send_acks);
372 }
QUICHE team692750b2019-03-17 17:57:46 -0700373 if (validate_packet_number_post_decryption_) {
374 QUIC_RELOADABLE_FLAG_COUNT(quic_validate_packet_number_post_decryption);
375 }
QUICHE teamb23daa72019-03-21 08:37:48 -0700376 if (use_uber_received_packet_manager_) {
377 QUIC_RELOADABLE_FLAG_COUNT(quic_use_uber_received_packet_manager);
378 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500379 QUIC_DLOG(INFO) << ENDPOINT
dschinazi7b9278c2019-05-20 07:36:21 -0700380 << "Created connection with server connection_id: "
381 << server_connection_id
zhongyi546cc452019-04-12 15:27:49 -0700382 << " and version: " << ParsedQuicVersionToString(version());
QUICHE teama6ef0a62019-03-07 20:34:33 -0500383
dschinazi7b9278c2019-05-20 07:36:21 -0700384 QUIC_BUG_IF(!QuicUtils::IsConnectionIdValidForVersion(server_connection_id,
QUICHE teama6ef0a62019-03-07 20:34:33 -0500385 transport_version()))
dschinazi7b9278c2019-05-20 07:36:21 -0700386 << "QuicConnection: attempted to use server connection ID "
387 << server_connection_id << " which is invalid with version "
QUICHE teama6ef0a62019-03-07 20:34:33 -0500388 << QuicVersionToString(transport_version());
389
390 framer_.set_visitor(this);
391 stats_.connection_creation_time = clock_->ApproximateNow();
392 // TODO(ianswett): Supply the NetworkChangeVisitor as a constructor argument
393 // and make it required non-null, because it's always used.
394 sent_packet_manager_.SetNetworkChangeVisitor(this);
395 if (GetQuicRestartFlag(quic_offload_pacing_to_usps2)) {
396 sent_packet_manager_.SetPacingAlarmGranularity(QuicTime::Delta::Zero());
397 release_time_into_future_ =
398 QuicTime::Delta::FromMilliseconds(kMinReleaseTimeIntoFutureMs);
399 }
400 // Allow the packet writer to potentially reduce the packet size to a value
401 // even smaller than kDefaultMaxPacketSize.
402 SetMaxPacketLength(perspective_ == Perspective::IS_SERVER
403 ? kDefaultServerMaxPacketSize
404 : kDefaultMaxPacketSize);
QUICHE teamb23daa72019-03-21 08:37:48 -0700405 if (use_uber_received_packet_manager_) {
406 uber_received_packet_manager_.set_max_ack_ranges(255);
407 } else {
408 received_packet_manager_.set_max_ack_ranges(255);
409 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500410 MaybeEnableSessionDecidesWhatToWrite();
QUICHE teamcd098022019-03-22 18:49:55 -0700411 MaybeEnableMultiplePacketNumberSpacesSupport();
QUICHE teama6ef0a62019-03-07 20:34:33 -0500412 DCHECK(!GetQuicRestartFlag(quic_no_server_conn_ver_negotiation2) ||
413 perspective_ == Perspective::IS_CLIENT ||
414 supported_versions.size() == 1);
dschinazi6ece5002019-05-22 06:35:49 -0700415 InstallInitialCrypters();
416}
417
418void QuicConnection::InstallInitialCrypters() {
419 if (version().handshake_protocol != PROTOCOL_TLS1_3) {
420 // Initial crypters are currently only supported with TLS.
421 return;
422 }
423 CrypterPair crypters;
424 CryptoUtils::CreateTlsInitialCrypters(perspective_, transport_version(),
425 server_connection_id_, &crypters);
426 SetEncrypter(ENCRYPTION_INITIAL, std::move(crypters.encrypter));
427 InstallDecrypter(ENCRYPTION_INITIAL, std::move(crypters.decrypter));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500428}
429
430QuicConnection::~QuicConnection() {
431 if (owns_writer_) {
432 delete writer_;
433 }
434 ClearQueuedPackets();
435}
436
437void QuicConnection::ClearQueuedPackets() {
438 for (auto it = queued_packets_.begin(); it != queued_packets_.end(); ++it) {
439 // Delete the buffer before calling ClearSerializedPacket, which sets
440 // encrypted_buffer to nullptr.
441 delete[] it->encrypted_buffer;
442 ClearSerializedPacket(&(*it));
443 }
444 queued_packets_.clear();
445}
446
447void QuicConnection::SetFromConfig(const QuicConfig& config) {
448 if (config.negotiated()) {
449 // Handshake complete, set handshake timeout to Infinite.
450 SetNetworkTimeouts(QuicTime::Delta::Infinite(),
451 config.IdleNetworkTimeout());
452 if (config.SilentClose()) {
453 idle_timeout_connection_close_behavior_ =
454 ConnectionCloseBehavior::SILENT_CLOSE;
455 }
456 } else {
457 SetNetworkTimeouts(config.max_time_before_crypto_handshake(),
458 config.max_idle_time_before_crypto_handshake());
459 }
460
461 sent_packet_manager_.SetFromConfig(config);
462 if (config.HasReceivedBytesForConnectionId() &&
463 can_truncate_connection_ids_) {
dschinazi7b9278c2019-05-20 07:36:21 -0700464 packet_generator_.SetServerConnectionIdLength(
QUICHE teama6ef0a62019-03-07 20:34:33 -0500465 config.ReceivedBytesForConnectionId());
466 }
467 max_undecryptable_packets_ = config.max_undecryptable_packets();
468
469 if (config.HasClientSentConnectionOption(kMTUH, perspective_)) {
470 SetMtuDiscoveryTarget(kMtuDiscoveryTargetPacketSizeHigh);
471 }
472 if (config.HasClientSentConnectionOption(kMTUL, perspective_)) {
473 SetMtuDiscoveryTarget(kMtuDiscoveryTargetPacketSizeLow);
474 }
475 if (debug_visitor_ != nullptr) {
476 debug_visitor_->OnSetFromConfig(config);
477 }
478 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -0700479 if (use_uber_received_packet_manager_) {
480 uber_received_packet_manager_.SetFromConfig(config, perspective_);
481 } else {
482 received_packet_manager_.SetFromConfig(config, perspective_);
483 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500484 } else {
485 if (GetQuicReloadableFlag(quic_enable_ack_decimation) &&
486 config.HasClientSentConnectionOption(kACD0, perspective_)) {
487 ack_mode_ = TCP_ACKING;
488 }
489 if (config.HasClientSentConnectionOption(kACKD, perspective_)) {
490 ack_mode_ = ACK_DECIMATION;
491 }
492 if (config.HasClientSentConnectionOption(kAKD2, perspective_)) {
493 ack_mode_ = ACK_DECIMATION_WITH_REORDERING;
494 }
495 if (config.HasClientSentConnectionOption(kAKD3, perspective_)) {
496 ack_mode_ = ACK_DECIMATION;
497 ack_decimation_delay_ = kShortAckDecimationDelay;
498 }
499 if (config.HasClientSentConnectionOption(kAKD4, perspective_)) {
500 ack_mode_ = ACK_DECIMATION_WITH_REORDERING;
501 ack_decimation_delay_ = kShortAckDecimationDelay;
502 }
503 if (config.HasClientSentConnectionOption(kAKDU, perspective_)) {
504 unlimited_ack_decimation_ = true;
505 }
506 if (config.HasClientSentConnectionOption(kACKQ, perspective_)) {
507 fast_ack_after_quiescence_ = true;
508 }
509 }
510 if (config.HasClientSentConnectionOption(k5RTO, perspective_)) {
511 close_connection_after_five_rtos_ = true;
512 }
513 if (config.HasClientSentConnectionOption(kNSTP, perspective_)) {
514 no_stop_waiting_frames_ = true;
515 }
516 if (config.HasReceivedStatelessResetToken()) {
517 stateless_reset_token_received_ = true;
518 received_stateless_reset_token_ = config.ReceivedStatelessResetToken();
519 }
520 if (GetQuicReloadableFlag(quic_send_timestamps) &&
521 config.HasClientSentConnectionOption(kSTMP, perspective_)) {
522 QUIC_RELOADABLE_FLAG_COUNT(quic_send_timestamps);
523 framer_.set_process_timestamps(true);
QUICHE teamb23daa72019-03-21 08:37:48 -0700524 if (use_uber_received_packet_manager_) {
525 uber_received_packet_manager_.set_save_timestamps(true);
526 } else {
527 received_packet_manager_.set_save_timestamps(true);
528 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500529 }
530
531 supports_release_time_ =
532 writer_ != nullptr && writer_->SupportsReleaseTime() &&
533 !config.HasClientSentConnectionOption(kNPCO, perspective_);
534
535 if (supports_release_time_) {
536 UpdateReleaseTimeIntoFuture();
537 }
538}
539
540void QuicConnection::OnSendConnectionState(
541 const CachedNetworkParameters& cached_network_params) {
542 if (debug_visitor_ != nullptr) {
543 debug_visitor_->OnSendConnectionState(cached_network_params);
544 }
545}
546
547void QuicConnection::OnReceiveConnectionState(
548 const CachedNetworkParameters& cached_network_params) {
549 if (debug_visitor_ != nullptr) {
550 debug_visitor_->OnReceiveConnectionState(cached_network_params);
551 }
552}
553
554void QuicConnection::ResumeConnectionState(
555 const CachedNetworkParameters& cached_network_params,
556 bool max_bandwidth_resumption) {
557 sent_packet_manager_.ResumeConnectionState(cached_network_params,
558 max_bandwidth_resumption);
559}
560
561void QuicConnection::SetMaxPacingRate(QuicBandwidth max_pacing_rate) {
562 sent_packet_manager_.SetMaxPacingRate(max_pacing_rate);
563}
564
565void QuicConnection::AdjustNetworkParameters(QuicBandwidth bandwidth,
fayangf1b99dc2019-05-14 06:29:18 -0700566 QuicTime::Delta rtt,
567 bool allow_cwnd_to_decrease) {
568 sent_packet_manager_.AdjustNetworkParameters(bandwidth, rtt,
569 allow_cwnd_to_decrease);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500570}
571
572QuicBandwidth QuicConnection::MaxPacingRate() const {
573 return sent_packet_manager_.MaxPacingRate();
574}
575
576bool QuicConnection::SelectMutualVersion(
577 const ParsedQuicVersionVector& available_versions) {
578 // Try to find the highest mutual version by iterating over supported
579 // versions, starting with the highest, and breaking out of the loop once we
580 // find a matching version in the provided available_versions vector.
581 const ParsedQuicVersionVector& supported_versions =
582 framer_.supported_versions();
583 for (size_t i = 0; i < supported_versions.size(); ++i) {
584 const ParsedQuicVersion& version = supported_versions[i];
585 if (QuicContainsValue(available_versions, version)) {
586 framer_.set_version(version);
587 return true;
588 }
589 }
590
591 return false;
592}
593
594void QuicConnection::OnError(QuicFramer* framer) {
595 // Packets that we can not or have not decrypted are dropped.
596 // TODO(rch): add stats to measure this.
597 if (!connected_ || last_packet_decrypted_ == false) {
598 return;
599 }
600 CloseConnection(framer->error(), framer->detailed_error(),
601 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
602}
603
604void QuicConnection::OnPacket() {
605 last_packet_decrypted_ = false;
606}
607
608void QuicConnection::OnPublicResetPacket(const QuicPublicResetPacket& packet) {
609 // Check that any public reset packet with a different connection ID that was
610 // routed to this QuicConnection has been redirected before control reaches
611 // here. (Check for a bug regression.)
dschinazi7b9278c2019-05-20 07:36:21 -0700612 DCHECK_EQ(server_connection_id_, packet.connection_id);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500613 DCHECK_EQ(perspective_, Perspective::IS_CLIENT);
614 if (debug_visitor_ != nullptr) {
615 debug_visitor_->OnPublicResetPacket(packet);
616 }
vasilvvc48c8712019-03-11 13:38:16 -0700617 std::string error_details = "Received public reset.";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500618 if (perspective_ == Perspective::IS_CLIENT && !packet.endpoint_id.empty()) {
619 QuicStrAppend(&error_details, " From ", packet.endpoint_id, ".");
620 }
621 QUIC_DLOG(INFO) << ENDPOINT << error_details;
622 QUIC_CODE_COUNT(quic_tear_down_local_connection_on_public_reset);
623 TearDownLocalConnectionState(QUIC_PUBLIC_RESET, error_details,
624 ConnectionCloseSource::FROM_PEER);
625}
626
627bool QuicConnection::OnProtocolVersionMismatch(
628 ParsedQuicVersion received_version,
629 PacketHeaderFormat form) {
630 QUIC_DLOG(INFO) << ENDPOINT << "Received packet with mismatched version "
631 << ParsedQuicVersionToString(received_version);
632 if (perspective_ == Perspective::IS_CLIENT) {
vasilvvc48c8712019-03-11 13:38:16 -0700633 const std::string error_details = "Protocol version mismatch.";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500634 QUIC_BUG << ENDPOINT << error_details;
635 TearDownLocalConnectionState(QUIC_INTERNAL_ERROR, error_details,
636 ConnectionCloseSource::FROM_SELF);
637 return false;
638 }
639 if (no_version_negotiation_) {
640 // Drop old packets that were sent by the client before the version was
641 // negotiated.
642 return false;
643 }
644 DCHECK_NE(version(), received_version);
645
646 if (debug_visitor_ != nullptr) {
647 debug_visitor_->OnProtocolVersionMismatch(received_version);
648 }
649
650 switch (version_negotiation_state_) {
651 case START_NEGOTIATION:
652 if (!framer_.IsSupportedVersion(received_version)) {
653 SendVersionNegotiationPacket(form != GOOGLE_QUIC_PACKET);
654 version_negotiation_state_ = NEGOTIATION_IN_PROGRESS;
655 return false;
656 }
657 break;
658
659 case NEGOTIATION_IN_PROGRESS:
660 if (!framer_.IsSupportedVersion(received_version)) {
661 SendVersionNegotiationPacket(form != GOOGLE_QUIC_PACKET);
662 return false;
663 }
664 break;
665
666 case NEGOTIATED_VERSION:
667 // Might be old packets that were sent by the client before the version
668 // was negotiated. Drop these.
669 return false;
670
671 default:
672 DCHECK(false);
673 }
674
675 // Store the new version.
676 framer_.set_version(received_version);
677 framer_.InferPacketHeaderTypeFromVersion();
678
679 version_negotiation_state_ = NEGOTIATED_VERSION;
680 visitor_->OnSuccessfulVersionNegotiation(received_version);
681 if (debug_visitor_ != nullptr) {
682 debug_visitor_->OnSuccessfulVersionNegotiation(received_version);
683 }
684 QUIC_DLOG(INFO) << ENDPOINT << "version negotiated "
685 << ParsedQuicVersionToString(received_version);
686
687 MaybeEnableSessionDecidesWhatToWrite();
688 no_stop_waiting_frames_ =
689 received_version.transport_version > QUIC_VERSION_43;
690
691 // TODO(satyamshekhar): Store the packet number of this packet and close the
692 // connection if we ever received a packet with incorrect version and whose
693 // packet number is greater.
694 return true;
695}
696
697// Handles version negotiation for client connection.
698void QuicConnection::OnVersionNegotiationPacket(
699 const QuicVersionNegotiationPacket& packet) {
700 // Check that any public reset packet with a different connection ID that was
701 // routed to this QuicConnection has been redirected before control reaches
702 // here. (Check for a bug regression.)
dschinazi7b9278c2019-05-20 07:36:21 -0700703 DCHECK_EQ(server_connection_id_, packet.connection_id);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500704 if (perspective_ == Perspective::IS_SERVER) {
vasilvvc48c8712019-03-11 13:38:16 -0700705 const std::string error_details =
dschinazi5a354c92019-05-09 12:18:53 -0700706 "Server received version negotiation packet.";
QUICHE teama6ef0a62019-03-07 20:34:33 -0500707 QUIC_BUG << error_details;
708 QUIC_CODE_COUNT(quic_tear_down_local_connection_on_version_negotiation);
709 TearDownLocalConnectionState(QUIC_INTERNAL_ERROR, error_details,
710 ConnectionCloseSource::FROM_SELF);
711 return;
712 }
713 if (debug_visitor_ != nullptr) {
714 debug_visitor_->OnVersionNegotiationPacket(packet);
715 }
716
717 if (version_negotiation_state_ != START_NEGOTIATION) {
718 // Possibly a duplicate version negotiation packet.
719 return;
720 }
721
722 if (QuicContainsValue(packet.versions, version())) {
vasilvvc48c8712019-03-11 13:38:16 -0700723 const std::string error_details =
QUICHE teama6ef0a62019-03-07 20:34:33 -0500724 "Server already supports client's version and should have accepted the "
725 "connection.";
726 QUIC_DLOG(WARNING) << error_details;
727 TearDownLocalConnectionState(QUIC_INVALID_VERSION_NEGOTIATION_PACKET,
728 error_details,
729 ConnectionCloseSource::FROM_SELF);
730 return;
731 }
732
733 server_supported_versions_ = packet.versions;
734
735 if (GetQuicReloadableFlag(quic_no_client_conn_ver_negotiation)) {
736 QUIC_RELOADABLE_FLAG_COUNT(quic_no_client_conn_ver_negotiation);
737 CloseConnection(
738 QUIC_INVALID_VERSION,
739 QuicStrCat(
740 "Client may support one of the versions in the server's list, but "
741 "it's going to close the connection anyway. Supported versions: {",
742 ParsedQuicVersionVectorToString(framer_.supported_versions()),
743 "}, peer supported versions: {",
744 ParsedQuicVersionVectorToString(packet.versions), "}"),
745 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
746 return;
747 }
748
dschinazi5a354c92019-05-09 12:18:53 -0700749 ParsedQuicVersion original_version = version();
QUICHE teama6ef0a62019-03-07 20:34:33 -0500750 if (!SelectMutualVersion(packet.versions)) {
751 CloseConnection(
752 QUIC_INVALID_VERSION,
753 QuicStrCat(
754 "No common version found. Supported versions: {",
755 ParsedQuicVersionVectorToString(framer_.supported_versions()),
756 "}, peer supported versions: {",
757 ParsedQuicVersionVectorToString(packet.versions), "}"),
758 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
759 return;
760 }
761
dschinazi5a354c92019-05-09 12:18:53 -0700762 if (original_version.handshake_protocol != version().handshake_protocol) {
763 const std::string error_details =
764 "In-connection version negotiation between mismatched handshake "
765 " protocols " +
766 ParsedQuicVersionToString(original_version) + " and " +
767 ParsedQuicVersionToString(version()) + " is currently unsupported.";
768 QUIC_DLOG(WARNING) << error_details;
769 TearDownLocalConnectionState(QUIC_INVALID_VERSION, error_details,
770 ConnectionCloseSource::FROM_SELF);
771 return;
772 }
773
QUICHE teama6ef0a62019-03-07 20:34:33 -0500774 QUIC_DLOG(INFO) << ENDPOINT << "Negotiated version: "
dschinazi5a354c92019-05-09 12:18:53 -0700775 << ParsedQuicVersionToString(version());
QUICHE teama6ef0a62019-03-07 20:34:33 -0500776 no_stop_waiting_frames_ = transport_version() > QUIC_VERSION_43;
777 version_negotiation_state_ = NEGOTIATION_IN_PROGRESS;
dschinazi5a354c92019-05-09 12:18:53 -0700778
QUICHE teama6ef0a62019-03-07 20:34:33 -0500779 RetransmitUnackedPackets(ALL_UNACKED_RETRANSMISSION);
780}
781
dschinazi244f6dc2019-05-06 15:45:16 -0700782// Handles retry for client connection.
783void QuicConnection::OnRetryPacket(QuicConnectionId original_connection_id,
784 QuicConnectionId new_connection_id,
785 QuicStringPiece retry_token) {
dschinazi6ece5002019-05-22 06:35:49 -0700786 DCHECK_EQ(Perspective::IS_CLIENT, perspective_);
dschinazi7b9278c2019-05-20 07:36:21 -0700787 if (original_connection_id != server_connection_id_) {
dschinazi244f6dc2019-05-06 15:45:16 -0700788 QUIC_DLOG(ERROR) << "Ignoring RETRY with original connection ID "
789 << original_connection_id << " not matching expected "
dschinazi7b9278c2019-05-20 07:36:21 -0700790 << server_connection_id_ << " token "
dschinazi244f6dc2019-05-06 15:45:16 -0700791 << QuicTextUtils::HexEncode(retry_token);
792 return;
793 }
794 if (retry_has_been_parsed_) {
795 QUIC_DLOG(ERROR) << "Ignoring non-first RETRY with token "
796 << QuicTextUtils::HexEncode(retry_token);
797 return;
798 }
799 retry_has_been_parsed_ = true;
800 QUIC_DLOG(INFO) << "Received RETRY, replacing connection ID "
dschinazi7b9278c2019-05-20 07:36:21 -0700801 << server_connection_id_ << " with " << new_connection_id
dschinazi244f6dc2019-05-06 15:45:16 -0700802 << ", received token "
803 << QuicTextUtils::HexEncode(retry_token);
dschinazi7b9278c2019-05-20 07:36:21 -0700804 server_connection_id_ = new_connection_id;
805 packet_generator_.SetServerConnectionId(server_connection_id_);
dschinazi244f6dc2019-05-06 15:45:16 -0700806 packet_generator_.SetRetryToken(retry_token);
807
808 // Reinstall initial crypters because the connection ID changed.
dschinazi6ece5002019-05-22 06:35:49 -0700809 InstallInitialCrypters();
dschinazi244f6dc2019-05-06 15:45:16 -0700810}
811
QUICHE teamc65d1d12019-03-19 20:58:04 -0700812bool QuicConnection::HasIncomingConnectionId(QuicConnectionId connection_id) {
813 for (QuicConnectionId const& incoming_connection_id :
814 incoming_connection_ids_) {
815 if (incoming_connection_id == connection_id) {
816 return true;
817 }
818 }
819 return false;
820}
821
822void QuicConnection::AddIncomingConnectionId(QuicConnectionId connection_id) {
823 if (HasIncomingConnectionId(connection_id)) {
824 return;
825 }
826 incoming_connection_ids_.push_back(connection_id);
827}
828
QUICHE teama6ef0a62019-03-07 20:34:33 -0500829bool QuicConnection::OnUnauthenticatedPublicHeader(
830 const QuicPacketHeader& header) {
QUICHE team2252b702019-05-14 23:55:14 -0400831 QuicConnectionId server_connection_id =
832 GetServerConnectionIdAsRecipient(header, perspective_);
833
dschinazi7b9278c2019-05-20 07:36:21 -0700834 if (server_connection_id == server_connection_id_ ||
QUICHE team2252b702019-05-14 23:55:14 -0400835 HasIncomingConnectionId(server_connection_id)) {
QUICHE teamc65d1d12019-03-19 20:58:04 -0700836 return true;
837 }
838
839 if (PacketCanReplaceConnectionId(header, perspective_)) {
840 QUIC_DLOG(INFO) << ENDPOINT << "Accepting packet with new connection ID "
dschinazi7b9278c2019-05-20 07:36:21 -0700841 << server_connection_id << " instead of "
842 << server_connection_id_;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500843 return true;
844 }
845
846 ++stats_.packets_dropped;
847 QUIC_DLOG(INFO) << ENDPOINT
848 << "Ignoring packet from unexpected ConnectionId: "
dschinazi7b9278c2019-05-20 07:36:21 -0700849 << server_connection_id << " instead of "
850 << server_connection_id_;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500851 if (debug_visitor_ != nullptr) {
QUICHE team2252b702019-05-14 23:55:14 -0400852 debug_visitor_->OnIncorrectConnectionId(server_connection_id);
QUICHE teama6ef0a62019-03-07 20:34:33 -0500853 }
854 // If this is a server, the dispatcher routes each packet to the
855 // QuicConnection responsible for the packet's connection ID. So if control
856 // arrives here and this is a server, the dispatcher must be malfunctioning.
857 DCHECK_NE(Perspective::IS_SERVER, perspective_);
858 return false;
859}
860
861bool QuicConnection::OnUnauthenticatedHeader(const QuicPacketHeader& header) {
862 if (debug_visitor_ != nullptr) {
863 debug_visitor_->OnUnauthenticatedHeader(header);
864 }
865
866 // Check that any public reset packet with a different connection ID that was
867 // routed to this QuicConnection has been redirected before control reaches
868 // here.
QUICHE team2252b702019-05-14 23:55:14 -0400869 DCHECK(GetServerConnectionIdAsRecipient(header, perspective_) ==
dschinazi7b9278c2019-05-20 07:36:21 -0700870 server_connection_id_ ||
QUICHE team2252b702019-05-14 23:55:14 -0400871 HasIncomingConnectionId(
872 GetServerConnectionIdAsRecipient(header, perspective_)) ||
QUICHE teamc65d1d12019-03-19 20:58:04 -0700873 PacketCanReplaceConnectionId(header, perspective_));
QUICHE teama6ef0a62019-03-07 20:34:33 -0500874
875 if (!packet_generator_.IsPendingPacketEmpty()) {
876 // Incoming packets may change a queued ACK frame.
vasilvvc48c8712019-03-11 13:38:16 -0700877 const std::string error_details =
QUICHE teama6ef0a62019-03-07 20:34:33 -0500878 "Pending frames must be serialized before incoming packets are "
879 "processed.";
880 QUIC_BUG << error_details << ", received header: " << header;
881 CloseConnection(QUIC_INTERNAL_ERROR, error_details,
882 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
883 return false;
884 }
885
886 // If this packet has already been seen, or the sender has told us that it
887 // will not be retransmitted, then stop processing the packet.
QUICHE teamb23daa72019-03-21 08:37:48 -0700888 if (!validate_packet_number_post_decryption_) {
889 const bool is_awaiting =
890 use_uber_received_packet_manager_
891 ? uber_received_packet_manager_.IsAwaitingPacket(
QUICHE team1dfa46b2019-03-22 10:39:10 -0700892 last_decrypted_packet_level_, header.packet_number)
QUICHE teamb23daa72019-03-21 08:37:48 -0700893 : received_packet_manager_.IsAwaitingPacket(header.packet_number);
894 if (!is_awaiting) {
895 if (framer_.IsIetfStatelessResetPacket(header)) {
896 QuicIetfStatelessResetPacket packet(
897 header, header.possible_stateless_reset_token);
898 OnAuthenticatedIetfStatelessResetPacket(packet);
899 return false;
900 }
901 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << header.packet_number
902 << " no longer being waited for. Discarding.";
903 if (debug_visitor_ != nullptr) {
904 debug_visitor_->OnDuplicatePacket(header.packet_number);
905 }
906 ++stats_.packets_dropped;
QUICHE teama6ef0a62019-03-07 20:34:33 -0500907 return false;
908 }
QUICHE teama6ef0a62019-03-07 20:34:33 -0500909 }
910
911 if (version_negotiation_state_ != NEGOTIATED_VERSION &&
912 perspective_ == Perspective::IS_SERVER) {
913 if (!header.version_flag) {
914 // Packets should have the version flag till version negotiation is
915 // done.
vasilvvc48c8712019-03-11 13:38:16 -0700916 std::string error_details =
QUICHE teama6ef0a62019-03-07 20:34:33 -0500917 QuicStrCat(ENDPOINT, "Packet ", header.packet_number.ToUint64(),
918 " without version flag before version negotiated.");
919 QUIC_DLOG(WARNING) << error_details;
920 CloseConnection(QUIC_INVALID_VERSION, error_details,
921 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
922 return false;
923 } else {
924 DCHECK_EQ(header.version, version());
925 version_negotiation_state_ = NEGOTIATED_VERSION;
926 framer_.InferPacketHeaderTypeFromVersion();
927 visitor_->OnSuccessfulVersionNegotiation(version());
928 if (debug_visitor_ != nullptr) {
929 debug_visitor_->OnSuccessfulVersionNegotiation(version());
930 }
931 }
932 DCHECK_EQ(NEGOTIATED_VERSION, version_negotiation_state_);
933 }
934
935 return true;
936}
937
938void QuicConnection::OnDecryptedPacket(EncryptionLevel level) {
939 last_decrypted_packet_level_ = level;
940 last_packet_decrypted_ = true;
941
942 // Once the server receives a forward secure packet, the handshake is
943 // confirmed.
944 if (level == ENCRYPTION_FORWARD_SECURE &&
945 perspective_ == Perspective::IS_SERVER) {
946 sent_packet_manager_.SetHandshakeConfirmed();
947 if (sent_packet_manager_.unacked_packets().use_uber_loss_algorithm()) {
948 // This may have changed the retransmission timer, so re-arm it.
949 SetRetransmissionAlarm();
950 }
951 }
952}
953
954QuicSocketAddress QuicConnection::GetEffectivePeerAddressFromCurrentPacket()
955 const {
956 // By default, the connection is not proxied, and the effective peer address
957 // is the packet's source address, i.e. the direct peer address.
958 return last_packet_source_address_;
959}
960
961bool QuicConnection::OnPacketHeader(const QuicPacketHeader& header) {
962 if (debug_visitor_ != nullptr) {
963 debug_visitor_->OnPacketHeader(header);
964 }
965
966 // Will be decremented below if we fall through to return true.
967 ++stats_.packets_dropped;
968
969 if (!ProcessValidatedPacket(header)) {
970 return false;
971 }
972
973 // Initialize the current packet content state.
974 current_packet_content_ = NO_FRAMES_RECEIVED;
975 is_current_packet_connectivity_probing_ = false;
976 current_effective_peer_migration_type_ = NO_CHANGE;
977
978 if (perspective_ == Perspective::IS_CLIENT) {
QUICHE team1f3de242019-03-20 07:24:48 -0700979 if (!GetLargestReceivedPacket().IsInitialized() ||
980 header.packet_number > GetLargestReceivedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -0500981 // Update peer_address_ and effective_peer_address_ immediately for
982 // client connections.
QUICHE team1f3de242019-03-20 07:24:48 -0700983 // TODO(fayang): only change peer addresses in application data packet
984 // number space.
QUICHE teama6ef0a62019-03-07 20:34:33 -0500985 direct_peer_address_ = last_packet_source_address_;
986 effective_peer_address_ = GetEffectivePeerAddressFromCurrentPacket();
987 }
988 } else {
989 // At server, remember the address change type of effective_peer_address
990 // in current_effective_peer_migration_type_. But this variable alone
991 // doesn't necessarily starts a migration. A migration will be started
992 // later, once the current packet is confirmed to meet the following
993 // conditions:
994 // 1) current_effective_peer_migration_type_ is not NO_CHANGE.
995 // 2) The current packet is not a connectivity probing.
996 // 3) The current packet is not reordered, i.e. its packet number is the
997 // largest of this connection so far.
998 // Once the above conditions are confirmed, a new migration will start
999 // even if there is an active migration underway.
1000 current_effective_peer_migration_type_ =
1001 QuicUtils::DetermineAddressChangeType(
1002 effective_peer_address_,
1003 GetEffectivePeerAddressFromCurrentPacket());
1004
1005 QUIC_DLOG_IF(INFO, current_effective_peer_migration_type_ != NO_CHANGE)
1006 << ENDPOINT << "Effective peer's ip:port changed from "
1007 << effective_peer_address_.ToString() << " to "
1008 << GetEffectivePeerAddressFromCurrentPacket().ToString()
1009 << ", active_effective_peer_migration_type is "
1010 << active_effective_peer_migration_type_;
1011 }
1012
1013 --stats_.packets_dropped;
1014 QUIC_DVLOG(1) << ENDPOINT << "Received packet header: " << header;
1015 last_header_ = header;
1016 // An ack will be sent if a missing retransmittable packet was received;
QUICHE teamb23daa72019-03-21 08:37:48 -07001017 if (!use_uber_received_packet_manager_) {
1018 was_last_packet_missing_ =
1019 received_packet_manager_.IsMissing(last_header_.packet_number);
1020 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001021
1022 // Record packet receipt to populate ack info before processing stream
1023 // frames, since the processing may result in sending a bundled ack.
QUICHE teamb23daa72019-03-21 08:37:48 -07001024 if (use_uber_received_packet_manager_) {
1025 uber_received_packet_manager_.RecordPacketReceived(
QUICHE team1dfa46b2019-03-22 10:39:10 -07001026 last_decrypted_packet_level_, last_header_,
1027 time_of_last_received_packet_);
QUICHE teamb23daa72019-03-21 08:37:48 -07001028 } else {
1029 received_packet_manager_.RecordPacketReceived(
1030 last_header_, time_of_last_received_packet_);
1031 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001032 DCHECK(connected_);
1033 return true;
1034}
1035
1036bool QuicConnection::OnStreamFrame(const QuicStreamFrame& frame) {
1037 DCHECK(connected_);
1038
1039 // Since a stream frame was received, this is not a connectivity probe.
1040 // A probe only contains a PING and full padding.
1041 UpdatePacketContent(NOT_PADDED_PING);
1042
1043 if (debug_visitor_ != nullptr) {
1044 debug_visitor_->OnStreamFrame(frame);
1045 }
nharper46833c32019-05-15 21:33:05 -07001046 if (!QuicUtils::IsCryptoStreamId(transport_version(), frame.stream_id) &&
QUICHE team6987b4a2019-03-15 16:23:04 -07001047 last_decrypted_packet_level_ == ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001048 if (MaybeConsiderAsMemoryCorruption(frame)) {
1049 CloseConnection(QUIC_MAYBE_CORRUPTED_MEMORY,
1050 "Received crypto frame on non crypto stream.",
1051 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1052 return false;
1053 }
1054
1055 QUIC_PEER_BUG << ENDPOINT
1056 << "Received an unencrypted data frame: closing connection"
1057 << " packet_number:" << last_header_.packet_number
QUICHE teamb23daa72019-03-21 08:37:48 -07001058 << " stream_id:" << frame.stream_id
fayang21ffb712019-05-16 08:39:26 -07001059 << " received_packets:" << ack_frame();
QUICHE teama6ef0a62019-03-07 20:34:33 -05001060 CloseConnection(QUIC_UNENCRYPTED_STREAM_DATA,
1061 "Unencrypted stream data seen.",
1062 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1063 return false;
1064 }
1065 visitor_->OnStreamFrame(frame);
1066 stats_.stream_bytes_received += frame.data_length;
1067 should_last_packet_instigate_acks_ = true;
1068 return connected_;
1069}
1070
1071bool QuicConnection::OnCryptoFrame(const QuicCryptoFrame& frame) {
1072 DCHECK(connected_);
1073
1074 // Since a CRYPTO frame was received, this is not a connectivity probe.
1075 // A probe only contains a PING and full padding.
1076 UpdatePacketContent(NOT_PADDED_PING);
1077
1078 visitor_->OnCryptoFrame(frame);
1079 should_last_packet_instigate_acks_ = true;
1080 return connected_;
1081}
1082
1083bool QuicConnection::OnAckFrameStart(QuicPacketNumber largest_acked,
1084 QuicTime::Delta ack_delay_time) {
1085 DCHECK(connected_);
1086
1087 if (processing_ack_frame_) {
1088 CloseConnection(QUIC_INVALID_ACK_DATA,
1089 "Received a new ack while processing an ack frame.",
1090 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1091 return false;
1092 }
1093
1094 // Since an ack frame was received, this is not a connectivity probe.
1095 // A probe only contains a PING and full padding.
1096 UpdatePacketContent(NOT_PADDED_PING);
1097
1098 QUIC_DVLOG(1) << ENDPOINT
1099 << "OnAckFrameStart, largest_acked: " << largest_acked;
1100
QUICHE team76e1c622019-03-19 14:36:39 -07001101 if (GetLargestReceivedPacketWithAck().IsInitialized() &&
1102 last_header_.packet_number <= GetLargestReceivedPacketWithAck()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001103 QUIC_DLOG(INFO) << ENDPOINT << "Received an old ack frame: ignoring";
1104 return true;
1105 }
1106
QUICHE team76e1c622019-03-19 14:36:39 -07001107 if (!GetLargestSentPacket().IsInitialized() ||
1108 largest_acked > GetLargestSentPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001109 QUIC_DLOG(WARNING) << ENDPOINT
1110 << "Peer's observed unsent packet:" << largest_acked
QUICHE team76e1c622019-03-19 14:36:39 -07001111 << " vs " << GetLargestSentPacket();
QUICHE teama6ef0a62019-03-07 20:34:33 -05001112 // We got an ack for data we have not sent.
1113 CloseConnection(QUIC_INVALID_ACK_DATA, "Largest observed too high.",
1114 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1115 return false;
1116 }
1117
QUICHE team76e1c622019-03-19 14:36:39 -07001118 if (!GetLargestAckedPacket().IsInitialized() ||
1119 largest_acked > GetLargestAckedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001120 visitor_->OnForwardProgressConfirmed();
QUICHE team9929cc42019-03-13 08:17:43 -07001121 } else if (!sent_packet_manager_.tolerate_reneging() &&
QUICHE team76e1c622019-03-19 14:36:39 -07001122 largest_acked < GetLargestAckedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001123 QUIC_LOG(INFO) << ENDPOINT << "Peer's largest_observed packet decreased:"
QUICHE team76e1c622019-03-19 14:36:39 -07001124 << largest_acked << " vs " << GetLargestAckedPacket()
QUICHE teama6ef0a62019-03-07 20:34:33 -05001125 << " packet_number:" << last_header_.packet_number
QUICHE team76e1c622019-03-19 14:36:39 -07001126 << " largest seen with ack:"
1127 << GetLargestReceivedPacketWithAck()
dschinazi7b9278c2019-05-20 07:36:21 -07001128 << " server_connection_id: " << server_connection_id_;
QUICHE teama6ef0a62019-03-07 20:34:33 -05001129 // A new ack has a diminished largest_observed value.
1130 // If this was an old packet, we wouldn't even have checked.
1131 CloseConnection(QUIC_INVALID_ACK_DATA, "Largest observed too low.",
1132 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1133 return false;
1134 }
1135 processing_ack_frame_ = true;
1136 sent_packet_manager_.OnAckFrameStart(largest_acked, ack_delay_time,
1137 time_of_last_received_packet_);
1138 return true;
1139}
1140
1141bool QuicConnection::OnAckRange(QuicPacketNumber start, QuicPacketNumber end) {
1142 DCHECK(connected_);
1143 QUIC_DVLOG(1) << ENDPOINT << "OnAckRange: [" << start << ", " << end << ")";
1144
QUICHE team76e1c622019-03-19 14:36:39 -07001145 if (GetLargestReceivedPacketWithAck().IsInitialized() &&
1146 last_header_.packet_number <= GetLargestReceivedPacketWithAck()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001147 QUIC_DLOG(INFO) << ENDPOINT << "Received an old ack frame: ignoring";
1148 return true;
1149 }
1150
1151 sent_packet_manager_.OnAckRange(start, end);
1152 return true;
1153}
1154
1155bool QuicConnection::OnAckTimestamp(QuicPacketNumber packet_number,
1156 QuicTime timestamp) {
1157 DCHECK(connected_);
1158 QUIC_DVLOG(1) << ENDPOINT << "OnAckTimestamp: [" << packet_number << ", "
1159 << timestamp.ToDebuggingValue() << ")";
1160
QUICHE team76e1c622019-03-19 14:36:39 -07001161 if (GetLargestReceivedPacketWithAck().IsInitialized() &&
1162 last_header_.packet_number <= GetLargestReceivedPacketWithAck()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001163 QUIC_DLOG(INFO) << ENDPOINT << "Received an old ack frame: ignoring";
1164 return true;
1165 }
1166
1167 sent_packet_manager_.OnAckTimestamp(packet_number, timestamp);
1168 return true;
1169}
1170
1171bool QuicConnection::OnAckFrameEnd(QuicPacketNumber start) {
1172 DCHECK(connected_);
1173 QUIC_DVLOG(1) << ENDPOINT << "OnAckFrameEnd, start: " << start;
1174
QUICHE team76e1c622019-03-19 14:36:39 -07001175 if (GetLargestReceivedPacketWithAck().IsInitialized() &&
1176 last_header_.packet_number <= GetLargestReceivedPacketWithAck()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001177 QUIC_DLOG(INFO) << ENDPOINT << "Received an old ack frame: ignoring";
1178 return true;
1179 }
fayang3eb82212019-04-16 12:05:46 -07001180 const AckResult ack_result = sent_packet_manager_.OnAckFrameEnd(
1181 time_of_last_received_packet_, last_decrypted_packet_level_);
1182 if (ack_result != PACKETS_NEWLY_ACKED &&
1183 ack_result != NO_PACKETS_NEWLY_ACKED) {
1184 // Error occurred (e.g., this ACK tries to ack packets in wrong packet
1185 // number space), and this would cause the connection to be closed.
1186 QUIC_DLOG(ERROR) << ENDPOINT
1187 << "Error occurred when processing an ACK frame: "
1188 << QuicUtils::AckResultToString(ack_result);
1189 return false;
1190 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001191 // Cancel the send alarm because new packets likely have been acked, which
1192 // may change the congestion window and/or pacing rate. Canceling the alarm
1193 // causes CanWrite to recalculate the next send time.
1194 if (send_alarm_->IsSet()) {
1195 send_alarm_->Cancel();
1196 }
1197 if (supports_release_time_) {
1198 // Update pace time into future because smoothed RTT is likely updated.
1199 UpdateReleaseTimeIntoFuture();
1200 }
QUICHE team76e1c622019-03-19 14:36:39 -07001201 SetLargestReceivedPacketWithAck(last_header_.packet_number);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001202 // If the incoming ack's packets set expresses missing packets: peer is still
1203 // waiting for a packet lower than a packet that we are no longer planning to
1204 // send.
1205 // If the incoming ack's packets set expresses received packets: peer is still
1206 // acking packets which we never care about.
1207 // Send an ack to raise the high water mark.
fayang03916692019-05-22 17:57:18 -07001208 bool send_stop_waiting = GetLeastUnacked() > start;
1209 if (GetQuicReloadableFlag(quic_simplify_stop_waiting) &&
1210 no_stop_waiting_frames_) {
1211 QUIC_RELOADABLE_FLAG_COUNT(quic_simplify_stop_waiting);
1212 send_stop_waiting = false;
1213 }
1214 PostProcessAfterAckFrame(send_stop_waiting,
fayang3eb82212019-04-16 12:05:46 -07001215 ack_result == PACKETS_NEWLY_ACKED);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001216 processing_ack_frame_ = false;
1217
1218 return connected_;
1219}
1220
1221bool QuicConnection::OnStopWaitingFrame(const QuicStopWaitingFrame& frame) {
1222 DCHECK(connected_);
1223
1224 // Since a stop waiting frame was received, this is not a connectivity probe.
1225 // A probe only contains a PING and full padding.
1226 UpdatePacketContent(NOT_PADDED_PING);
1227
1228 if (no_stop_waiting_frames_) {
1229 return true;
1230 }
1231 if (largest_seen_packet_with_stop_waiting_.IsInitialized() &&
1232 last_header_.packet_number <= largest_seen_packet_with_stop_waiting_) {
1233 QUIC_DLOG(INFO) << ENDPOINT
1234 << "Received an old stop waiting frame: ignoring";
1235 return true;
1236 }
1237
1238 const char* error = ValidateStopWaitingFrame(frame);
1239 if (error != nullptr) {
1240 CloseConnection(QUIC_INVALID_STOP_WAITING_DATA, error,
1241 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1242 return false;
1243 }
1244
1245 if (debug_visitor_ != nullptr) {
1246 debug_visitor_->OnStopWaitingFrame(frame);
1247 }
1248
1249 largest_seen_packet_with_stop_waiting_ = last_header_.packet_number;
QUICHE teamb23daa72019-03-21 08:37:48 -07001250 if (use_uber_received_packet_manager_) {
QUICHE team1dfa46b2019-03-22 10:39:10 -07001251 uber_received_packet_manager_.DontWaitForPacketsBefore(
1252 last_decrypted_packet_level_, frame.least_unacked);
QUICHE teamb23daa72019-03-21 08:37:48 -07001253 } else {
1254 received_packet_manager_.DontWaitForPacketsBefore(frame.least_unacked);
1255 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001256 return connected_;
1257}
1258
1259bool QuicConnection::OnPaddingFrame(const QuicPaddingFrame& frame) {
1260 DCHECK(connected_);
1261 UpdatePacketContent(SECOND_FRAME_IS_PADDING);
1262
1263 if (debug_visitor_ != nullptr) {
1264 debug_visitor_->OnPaddingFrame(frame);
1265 }
1266 return true;
1267}
1268
1269bool QuicConnection::OnPingFrame(const QuicPingFrame& frame) {
1270 DCHECK(connected_);
1271 UpdatePacketContent(FIRST_FRAME_IS_PING);
1272
1273 if (debug_visitor_ != nullptr) {
1274 debug_visitor_->OnPingFrame(frame);
1275 }
1276 should_last_packet_instigate_acks_ = true;
1277 return true;
1278}
1279
QUICHE teama6ef0a62019-03-07 20:34:33 -05001280const char* QuicConnection::ValidateStopWaitingFrame(
1281 const QuicStopWaitingFrame& stop_waiting) {
QUICHE teamb23daa72019-03-21 08:37:48 -07001282 const QuicPacketNumber peer_least_packet_awaiting_ack =
1283 use_uber_received_packet_manager_
1284 ? uber_received_packet_manager_.peer_least_packet_awaiting_ack()
1285 : received_packet_manager_.peer_least_packet_awaiting_ack();
1286 if (peer_least_packet_awaiting_ack.IsInitialized() &&
1287 stop_waiting.least_unacked < peer_least_packet_awaiting_ack) {
1288 QUIC_DLOG(ERROR) << ENDPOINT << "Peer's sent low least_unacked: "
1289 << stop_waiting.least_unacked << " vs "
1290 << peer_least_packet_awaiting_ack;
QUICHE teama6ef0a62019-03-07 20:34:33 -05001291 // We never process old ack frames, so this number should only increase.
1292 return "Least unacked too small.";
1293 }
1294
1295 if (stop_waiting.least_unacked > last_header_.packet_number) {
1296 QUIC_DLOG(ERROR) << ENDPOINT
1297 << "Peer sent least_unacked:" << stop_waiting.least_unacked
1298 << " greater than the enclosing packet number:"
1299 << last_header_.packet_number;
1300 return "Least unacked too large.";
1301 }
1302
1303 return nullptr;
1304}
1305
1306bool QuicConnection::OnRstStreamFrame(const QuicRstStreamFrame& frame) {
1307 DCHECK(connected_);
1308
1309 // Since a reset stream frame was received, this is not a connectivity probe.
1310 // A probe only contains a PING and full padding.
1311 UpdatePacketContent(NOT_PADDED_PING);
1312
1313 if (debug_visitor_ != nullptr) {
1314 debug_visitor_->OnRstStreamFrame(frame);
1315 }
1316 QUIC_DLOG(INFO) << ENDPOINT
1317 << "RST_STREAM_FRAME received for stream: " << frame.stream_id
1318 << " with error: "
1319 << QuicRstStreamErrorCodeToString(frame.error_code);
1320 visitor_->OnRstStream(frame);
1321 should_last_packet_instigate_acks_ = true;
1322 return connected_;
1323}
1324
QUICHE teama6ef0a62019-03-07 20:34:33 -05001325bool QuicConnection::OnStopSendingFrame(const QuicStopSendingFrame& frame) {
1326 DCHECK(connected_);
1327
1328 // Since a reset stream frame was received, this is not a connectivity probe.
1329 // A probe only contains a PING and full padding.
1330 UpdatePacketContent(NOT_PADDED_PING);
1331
1332 if (debug_visitor_ != nullptr) {
1333 debug_visitor_->OnStopSendingFrame(frame);
1334 }
1335
1336 QUIC_DLOG(INFO) << ENDPOINT << "STOP_SENDING frame received for stream: "
1337 << frame.stream_id
1338 << " with error: " << frame.application_error_code;
1339
1340 visitor_->OnStopSendingFrame(frame);
1341 return connected_;
1342}
1343
1344bool QuicConnection::OnPathChallengeFrame(const QuicPathChallengeFrame& frame) {
1345 // Save the path challenge's payload, for later use in generating the
1346 // response.
1347 received_path_challenge_payloads_.push_back(frame.data_buffer);
1348
1349 // For VERSION 99 we define a "Padded PATH CHALLENGE" to be the same thing
1350 // as a PADDED PING -- it will start a connectivity check and prevent
1351 // connection migration. Insofar as the connectivity check and connection
1352 // migration are concerned, logically the PATH CHALLENGE is the same as the
1353 // PING, so as a stopgap, tell the FSM that determines whether we have a
1354 // Padded PING or not that we received a PING.
1355 UpdatePacketContent(FIRST_FRAME_IS_PING);
1356 should_last_packet_instigate_acks_ = true;
1357 return true;
1358}
1359
1360bool QuicConnection::OnPathResponseFrame(const QuicPathResponseFrame& frame) {
1361 should_last_packet_instigate_acks_ = true;
1362 if (!transmitted_connectivity_probe_payload_ ||
1363 *transmitted_connectivity_probe_payload_ != frame.data_buffer) {
1364 // Is not for the probe we sent, ignore it.
1365 return true;
1366 }
1367 // Have received the matching PATH RESPONSE, saved payload no longer valid.
1368 transmitted_connectivity_probe_payload_ = nullptr;
1369 UpdatePacketContent(FIRST_FRAME_IS_PING);
1370 return true;
1371}
1372
1373bool QuicConnection::OnConnectionCloseFrame(
1374 const QuicConnectionCloseFrame& frame) {
1375 DCHECK(connected_);
1376
1377 // Since a connection close frame was received, this is not a connectivity
1378 // probe. A probe only contains a PING and full padding.
1379 UpdatePacketContent(NOT_PADDED_PING);
1380
1381 if (debug_visitor_ != nullptr) {
1382 debug_visitor_->OnConnectionCloseFrame(frame);
1383 }
1384 QUIC_DLOG(INFO) << ENDPOINT << "Received ConnectionClose for connection: "
fkastenholze9d71a82019-04-09 05:12:13 -07001385 << connection_id() << ", with error: "
1386 << QuicErrorCodeToString(frame.quic_error_code) << " ("
1387 << frame.error_details << ")";
1388 if (frame.close_type == GOOGLE_QUIC_CONNECTION_CLOSE &&
1389 frame.quic_error_code == QUIC_BAD_MULTIPATH_FLAG) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001390 QUIC_LOG_FIRST_N(ERROR, 10) << "Unexpected QUIC_BAD_MULTIPATH_FLAG error."
1391 << " last_received_header: " << last_header_
1392 << " encryption_level: " << encryption_level_;
1393 }
fkastenholze9d71a82019-04-09 05:12:13 -07001394 TearDownLocalConnectionState(frame.quic_error_code, frame.error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05001395 ConnectionCloseSource::FROM_PEER);
1396 return connected_;
1397}
1398
fkastenholz3c4eabf2019-04-22 07:49:59 -07001399bool QuicConnection::OnMaxStreamsFrame(const QuicMaxStreamsFrame& frame) {
1400 return visitor_->OnMaxStreamsFrame(frame);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001401}
1402
fkastenholz3c4eabf2019-04-22 07:49:59 -07001403bool QuicConnection::OnStreamsBlockedFrame(
1404 const QuicStreamsBlockedFrame& frame) {
1405 return visitor_->OnStreamsBlockedFrame(frame);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001406}
1407
1408bool QuicConnection::OnGoAwayFrame(const QuicGoAwayFrame& frame) {
1409 DCHECK(connected_);
1410
1411 // Since a go away frame was received, this is not a connectivity probe.
1412 // A probe only contains a PING and full padding.
1413 UpdatePacketContent(NOT_PADDED_PING);
1414
1415 if (debug_visitor_ != nullptr) {
1416 debug_visitor_->OnGoAwayFrame(frame);
1417 }
1418 QUIC_DLOG(INFO) << ENDPOINT << "GOAWAY_FRAME received with last good stream: "
1419 << frame.last_good_stream_id
1420 << " and error: " << QuicErrorCodeToString(frame.error_code)
1421 << " and reason: " << frame.reason_phrase;
1422
1423 visitor_->OnGoAway(frame);
1424 should_last_packet_instigate_acks_ = true;
1425 return connected_;
1426}
1427
1428bool QuicConnection::OnWindowUpdateFrame(const QuicWindowUpdateFrame& frame) {
1429 DCHECK(connected_);
1430
1431 // Since a window update frame was received, this is not a connectivity probe.
1432 // A probe only contains a PING and full padding.
1433 UpdatePacketContent(NOT_PADDED_PING);
1434
1435 if (debug_visitor_ != nullptr) {
1436 debug_visitor_->OnWindowUpdateFrame(frame, time_of_last_received_packet_);
1437 }
1438 QUIC_DLOG(INFO) << ENDPOINT << "WINDOW_UPDATE_FRAME received for stream: "
1439 << frame.stream_id
1440 << " with byte offset: " << frame.byte_offset;
1441 visitor_->OnWindowUpdateFrame(frame);
1442 should_last_packet_instigate_acks_ = true;
1443 return connected_;
1444}
1445
1446bool QuicConnection::OnNewConnectionIdFrame(
1447 const QuicNewConnectionIdFrame& frame) {
1448 return true;
1449}
1450
1451bool QuicConnection::OnRetireConnectionIdFrame(
1452 const QuicRetireConnectionIdFrame& frame) {
1453 return true;
1454}
1455
1456bool QuicConnection::OnNewTokenFrame(const QuicNewTokenFrame& frame) {
1457 return true;
1458}
1459
1460bool QuicConnection::OnMessageFrame(const QuicMessageFrame& frame) {
1461 DCHECK(connected_);
1462
1463 // Since a message frame was received, this is not a connectivity probe.
1464 // A probe only contains a PING and full padding.
1465 UpdatePacketContent(NOT_PADDED_PING);
1466
1467 if (debug_visitor_ != nullptr) {
1468 debug_visitor_->OnMessageFrame(frame);
1469 }
1470 visitor_->OnMessageReceived(
1471 QuicStringPiece(frame.data, frame.message_length));
1472 should_last_packet_instigate_acks_ = true;
1473 return connected_;
1474}
1475
1476bool QuicConnection::OnBlockedFrame(const QuicBlockedFrame& frame) {
1477 DCHECK(connected_);
1478
1479 // Since a blocked frame was received, this is not a connectivity probe.
1480 // A probe only contains a PING and full padding.
1481 UpdatePacketContent(NOT_PADDED_PING);
1482
1483 if (debug_visitor_ != nullptr) {
1484 debug_visitor_->OnBlockedFrame(frame);
1485 }
1486 QUIC_DLOG(INFO) << ENDPOINT
1487 << "BLOCKED_FRAME received for stream: " << frame.stream_id;
1488 visitor_->OnBlockedFrame(frame);
1489 stats_.blocked_frames_received++;
1490 should_last_packet_instigate_acks_ = true;
1491 return connected_;
1492}
1493
1494void QuicConnection::OnPacketComplete() {
1495 // Don't do anything if this packet closed the connection.
1496 if (!connected_) {
1497 ClearLastFrames();
1498 return;
1499 }
1500
1501 if (IsCurrentPacketConnectivityProbing()) {
1502 ++stats_.num_connectivity_probing_received;
1503 }
1504
1505 QUIC_DVLOG(1) << ENDPOINT << "Got packet " << last_header_.packet_number
QUICHE team2252b702019-05-14 23:55:14 -04001506 << " for "
1507 << GetServerConnectionIdAsRecipient(last_header_, perspective_);
QUICHE teama6ef0a62019-03-07 20:34:33 -05001508
1509 QUIC_DLOG_IF(INFO, current_packet_content_ == SECOND_FRAME_IS_PADDING)
1510 << ENDPOINT << "Received a padded PING packet. is_probing: "
1511 << IsCurrentPacketConnectivityProbing();
1512
1513 if (perspective_ == Perspective::IS_CLIENT) {
1514 QUIC_DVLOG(1) << ENDPOINT
1515 << "Received a speculative connectivity probing packet for "
QUICHE team2252b702019-05-14 23:55:14 -04001516 << GetServerConnectionIdAsRecipient(last_header_,
1517 perspective_)
QUICHE teama6ef0a62019-03-07 20:34:33 -05001518 << " from ip:port: " << last_packet_source_address_.ToString()
1519 << " to ip:port: "
1520 << last_packet_destination_address_.ToString();
1521 // TODO(zhongyi): change the method name.
1522 visitor_->OnConnectivityProbeReceived(last_packet_destination_address_,
1523 last_packet_source_address_);
1524 } else if (IsCurrentPacketConnectivityProbing()) {
1525 // This node is not a client (is a server) AND the received packet was
1526 // connectivity-probing, send an appropriate response.
1527 QUIC_DVLOG(1) << ENDPOINT << "Received a connectivity probing packet for "
QUICHE team2252b702019-05-14 23:55:14 -04001528 << GetServerConnectionIdAsRecipient(last_header_,
1529 perspective_)
QUICHE teama6ef0a62019-03-07 20:34:33 -05001530 << " from ip:port: " << last_packet_source_address_.ToString()
1531 << " to ip:port: "
1532 << last_packet_destination_address_.ToString();
1533 visitor_->OnConnectivityProbeReceived(last_packet_destination_address_,
1534 last_packet_source_address_);
1535 } else {
1536 // This node is not a client (is a server) AND the received packet was
1537 // NOT connectivity-probing. If the packet had PATH CHALLENGES, send
1538 // appropriate RESPONSE. Then deal with possible peer migration.
1539 if (transport_version() == QUIC_VERSION_99 &&
1540 !received_path_challenge_payloads_.empty()) {
1541 // If a PATH CHALLENGE was in a "Padded PING (or PATH CHALLENGE)"
1542 // then it is taken care of above. This handles the case where a PATH
1543 // CHALLENGE appeared someplace else (eg, the peer randomly added a PATH
1544 // CHALLENGE frame to some other packet.
1545 // There was at least one PATH CHALLENGE in the received packet,
1546 // Generate the required PATH RESPONSE.
1547 SendGenericPathProbePacket(nullptr, last_packet_source_address_,
1548 /* is_response= */ true);
1549 }
1550
QUICHE team1f3de242019-03-20 07:24:48 -07001551 if (last_header_.packet_number == GetLargestReceivedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001552 direct_peer_address_ = last_packet_source_address_;
1553 if (current_effective_peer_migration_type_ != NO_CHANGE) {
QUICHE team1f3de242019-03-20 07:24:48 -07001554 // TODO(fayang): When multiple packet number spaces is supported, only
1555 // start peer migration for the application data.
QUICHE teama6ef0a62019-03-07 20:34:33 -05001556 StartEffectivePeerMigration(current_effective_peer_migration_type_);
1557 }
1558 }
1559 }
1560
1561 current_effective_peer_migration_type_ = NO_CHANGE;
1562
1563 // An ack will be sent if a missing retransmittable packet was received;
1564 const bool was_missing =
1565 should_last_packet_instigate_acks_ && was_last_packet_missing_;
1566
1567 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07001568 if (use_uber_received_packet_manager_) {
dschinazi05e62b12019-04-18 15:43:41 -07001569 // Some encryption levels share a packet number space, it is therefore
1570 // possible for us to want to ack some packets even though we do not yet
1571 // have the appropriate keys to encrypt the acks. In this scenario we
1572 // do not update the ACK timeout. This can happen for example with
1573 // IETF QUIC on the server when we receive 0-RTT packets and do not yet
1574 // have 1-RTT keys (0-RTT packets are acked at the 1-RTT level).
1575 // Note that this could cause slight performance degradations in the edge
1576 // case where one packet is received, then the encrypter is installed,
1577 // then a second packet is received; as that could cause the ACK for the
1578 // second packet to be delayed instead of immediate. This is currently
1579 // considered to be small enough of an edge case to not be optimized for.
fayangde00f8f2019-04-25 09:01:27 -07001580 if (!SupportsMultiplePacketNumberSpaces() ||
1581 framer_.HasEncrypterOfEncryptionLevel(QuicUtils::GetEncryptionLevel(
dschinazi05e62b12019-04-18 15:43:41 -07001582 QuicUtils::GetPacketNumberSpace(last_decrypted_packet_level_)))) {
1583 uber_received_packet_manager_.MaybeUpdateAckTimeout(
1584 should_last_packet_instigate_acks_, last_decrypted_packet_level_,
1585 last_header_.packet_number, time_of_last_received_packet_,
1586 clock_->ApproximateNow(), sent_packet_manager_.GetRttStats(),
1587 sent_packet_manager_.delayed_ack_time());
1588 } else {
1589 QUIC_DLOG(INFO) << ENDPOINT << "Not updating ACK timeout for "
1590 << QuicUtils::EncryptionLevelToString(
1591 last_decrypted_packet_level_)
1592 << " as we do not have the corresponding encrypter";
1593 }
QUICHE teamb23daa72019-03-21 08:37:48 -07001594 } else {
1595 received_packet_manager_.MaybeUpdateAckTimeout(
1596 should_last_packet_instigate_acks_, last_header_.packet_number,
1597 time_of_last_received_packet_, clock_->ApproximateNow(),
1598 sent_packet_manager_.GetRttStats(),
1599 sent_packet_manager_.delayed_ack_time());
1600 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001601 } else if (ack_frame_updated()) {
1602 // It's possible the ack frame was sent along with response data, so it
1603 // no longer needs to be sent.
1604 MaybeQueueAck(was_missing);
1605 }
1606
1607 ClearLastFrames();
1608 CloseIfTooManyOutstandingSentPackets();
1609}
1610
1611bool QuicConnection::IsValidStatelessResetToken(QuicUint128 token) const {
1612 return stateless_reset_token_received_ &&
1613 token == received_stateless_reset_token_;
1614}
1615
1616void QuicConnection::OnAuthenticatedIetfStatelessResetPacket(
1617 const QuicIetfStatelessResetPacket& packet) {
1618 // TODO(fayang): Add OnAuthenticatedIetfStatelessResetPacket to
1619 // debug_visitor_.
vasilvvc48c8712019-03-11 13:38:16 -07001620 const std::string error_details = "Received stateless reset.";
QUICHE teama6ef0a62019-03-07 20:34:33 -05001621 QUIC_CODE_COUNT(quic_tear_down_local_connection_on_stateless_reset);
1622 TearDownLocalConnectionState(QUIC_PUBLIC_RESET, error_details,
1623 ConnectionCloseSource::FROM_PEER);
1624}
1625
1626void QuicConnection::MaybeQueueAck(bool was_missing) {
1627 DCHECK(!received_packet_manager_.decide_when_to_send_acks());
1628 ++num_packets_received_since_last_ack_sent_;
1629 // Determine whether the newly received packet was missing before recording
1630 // the received packet.
1631 if (was_missing) {
1632 // Only ack immediately if an ACK frame was sent with a larger
1633 // largest acked than the newly received packet number.
1634 const QuicPacketNumber largest_sent_largest_acked =
1635 sent_packet_manager_.unacked_packets().largest_sent_largest_acked();
1636 if (largest_sent_largest_acked.IsInitialized() &&
1637 last_header_.packet_number < largest_sent_largest_acked) {
1638 if (packet_generator_.deprecate_ack_bundling_mode()) {
1639 MaybeSetAckAlarmTo(clock_->ApproximateNow());
1640 } else {
1641 ack_queued_ = true;
1642 }
1643 }
1644 }
1645
1646 if (should_last_packet_instigate_acks_ && !ack_queued_) {
1647 ++num_retransmittable_packets_received_since_last_ack_sent_;
1648 if (ack_mode_ != TCP_ACKING &&
1649 last_header_.packet_number >=
1650 received_packet_manager_.PeerFirstSendingPacketNumber() +
1651 min_received_before_ack_decimation_) {
1652 // Ack up to 10 packets at once unless ack decimation is unlimited.
1653 if (!unlimited_ack_decimation_ &&
1654 num_retransmittable_packets_received_since_last_ack_sent_ >=
1655 kMaxRetransmittablePacketsBeforeAck) {
1656 if (packet_generator_.deprecate_ack_bundling_mode()) {
1657 MaybeSetAckAlarmTo(clock_->ApproximateNow());
1658 } else {
1659 ack_queued_ = true;
1660 }
1661 } else if (ShouldSetAckAlarm()) {
1662 // Wait for the minimum of the ack decimation delay or the delayed ack
1663 // time before sending an ack.
1664 QuicTime::Delta ack_delay =
1665 std::min(sent_packet_manager_.delayed_ack_time(),
1666 sent_packet_manager_.GetRttStats()->min_rtt() *
1667 ack_decimation_delay_);
1668 const QuicTime approximate_now = clock_->ApproximateNow();
1669 if (fast_ack_after_quiescence_ &&
1670 (approximate_now - time_of_previous_received_packet_) >
1671 sent_packet_manager_.GetRttStats()->SmoothedOrInitialRtt()) {
1672 // Ack the first packet out of queiscence faster, because QUIC does
1673 // not pace the first few packets and commonly these may be handshake
1674 // or TLP packets, which we'd like to acknowledge quickly.
1675 ack_delay = QuicTime::Delta::FromMilliseconds(1);
1676 }
1677 ack_alarm_->Set(approximate_now + ack_delay);
1678 }
1679 } else {
1680 // Ack with a timer or every 2 packets by default.
1681 if (num_retransmittable_packets_received_since_last_ack_sent_ >=
1682 ack_frequency_before_ack_decimation_) {
1683 if (packet_generator_.deprecate_ack_bundling_mode()) {
1684 MaybeSetAckAlarmTo(clock_->ApproximateNow());
1685 } else {
1686 ack_queued_ = true;
1687 }
1688 } else if (ShouldSetAckAlarm()) {
1689 const QuicTime approximate_now = clock_->ApproximateNow();
1690 if (fast_ack_after_quiescence_ &&
1691 (approximate_now - time_of_previous_received_packet_) >
1692 sent_packet_manager_.GetRttStats()->SmoothedOrInitialRtt()) {
1693 // Ack the first packet out of queiscence faster, because QUIC does
1694 // not pace the first few packets and commonly these may be handshake
1695 // or TLP packets, which we'd like to acknowledge quickly.
1696 ack_alarm_->Set(approximate_now +
1697 QuicTime::Delta::FromMilliseconds(1));
1698 } else {
1699 ack_alarm_->Set(approximate_now +
1700 sent_packet_manager_.delayed_ack_time());
1701 }
1702 }
1703 }
1704
1705 // If there are new missing packets to report, send an ack immediately.
1706 if (received_packet_manager_.HasNewMissingPackets()) {
1707 if (ack_mode_ == ACK_DECIMATION_WITH_REORDERING) {
1708 // Wait the minimum of an eighth min_rtt and the existing ack time.
1709 QuicTime ack_time =
1710 clock_->ApproximateNow() +
1711 0.125 * sent_packet_manager_.GetRttStats()->min_rtt();
1712 if (ShouldSetAckAlarm() || ack_alarm_->deadline() > ack_time) {
1713 ack_alarm_->Update(ack_time, QuicTime::Delta::Zero());
1714 }
1715 } else {
1716 if (packet_generator_.deprecate_ack_bundling_mode()) {
1717 MaybeSetAckAlarmTo(clock_->ApproximateNow());
1718 } else {
1719 ack_queued_ = true;
1720 }
1721 }
1722 }
1723
1724 if (fast_ack_after_quiescence_) {
1725 time_of_previous_received_packet_ = time_of_last_received_packet_;
1726 }
1727 }
1728
1729 if (ack_queued_) {
1730 ack_alarm_->Cancel();
1731 }
1732}
1733
1734void QuicConnection::ClearLastFrames() {
1735 should_last_packet_instigate_acks_ = false;
1736}
1737
1738void QuicConnection::CloseIfTooManyOutstandingSentPackets() {
1739 // This occurs if we don't discard old packets we've seen fast enough. It's
1740 // possible largest observed is less than leaset unacked.
1741 if (sent_packet_manager_.GetLargestObserved().IsInitialized() &&
1742 sent_packet_manager_.GetLargestObserved() >
1743 sent_packet_manager_.GetLeastUnacked() + max_tracked_packets_) {
1744 CloseConnection(
1745 QUIC_TOO_MANY_OUTSTANDING_SENT_PACKETS,
1746 QuicStrCat("More than ", max_tracked_packets_,
1747 " outstanding, least_unacked: ",
1748 sent_packet_manager_.GetLeastUnacked().ToUint64()),
1749 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
1750 }
1751}
1752
1753const QuicFrame QuicConnection::GetUpdatedAckFrame() {
QUICHE teamb23daa72019-03-21 08:37:48 -07001754 if (use_uber_received_packet_manager_) {
1755 return uber_received_packet_manager_.GetUpdatedAckFrame(
QUICHE team1dfa46b2019-03-22 10:39:10 -07001756 QuicUtils::GetPacketNumberSpace(encryption_level_),
QUICHE teamb23daa72019-03-21 08:37:48 -07001757 clock_->ApproximateNow());
1758 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001759 return received_packet_manager_.GetUpdatedAckFrame(clock_->ApproximateNow());
1760}
1761
1762void QuicConnection::PopulateStopWaitingFrame(
1763 QuicStopWaitingFrame* stop_waiting) {
1764 stop_waiting->least_unacked = GetLeastUnacked();
1765}
1766
1767QuicPacketNumber QuicConnection::GetLeastUnacked() const {
1768 return sent_packet_manager_.GetLeastUnacked();
1769}
1770
1771bool QuicConnection::HandleWriteBlocked() {
1772 if (!writer_->IsWriteBlocked()) {
1773 return false;
1774 }
1775
1776 visitor_->OnWriteBlocked();
1777 return true;
1778}
1779
1780void QuicConnection::MaybeSendInResponseToPacket() {
1781 if (!connected_) {
1782 return;
1783 }
1784
1785 // If the writer is blocked, don't attempt to send packets now or in the send
1786 // alarm. When the writer unblocks, OnCanWrite() will be called for this
1787 // connection to send.
1788 if (HandleWriteBlocked()) {
1789 return;
1790 }
1791
1792 // Now that we have received an ack, we might be able to send packets which
1793 // are queued locally, or drain streams which are blocked.
1794 if (defer_send_in_response_to_packets_) {
1795 send_alarm_->Update(clock_->ApproximateNow(), QuicTime::Delta::Zero());
1796 } else {
1797 WriteAndBundleAcksIfNotBlocked();
1798 }
1799}
1800
1801void QuicConnection::SendVersionNegotiationPacket(bool ietf_quic) {
1802 pending_version_negotiation_packet_ = true;
1803 send_ietf_version_negotiation_packet_ = ietf_quic;
1804
1805 if (HandleWriteBlocked()) {
1806 return;
1807 }
1808
1809 QUIC_DLOG(INFO) << ENDPOINT << "Sending version negotiation packet: {"
1810 << ParsedQuicVersionVectorToString(
1811 framer_.supported_versions())
1812 << "}, ietf_quic: " << ietf_quic;
1813 std::unique_ptr<QuicEncryptedPacket> version_packet(
1814 packet_generator_.SerializeVersionNegotiationPacket(
1815 ietf_quic, framer_.supported_versions()));
1816 WriteResult result = writer_->WritePacket(
1817 version_packet->data(), version_packet->length(), self_address().host(),
1818 peer_address(), per_packet_options_);
1819
1820 if (IsWriteError(result.status)) {
1821 OnWriteError(result.error_code);
1822 return;
1823 }
1824 if (IsWriteBlockedStatus(result.status)) {
1825 visitor_->OnWriteBlocked();
1826 if (result.status == WRITE_STATUS_BLOCKED_DATA_BUFFERED) {
1827 pending_version_negotiation_packet_ = false;
1828 }
1829 return;
1830 }
1831
1832 pending_version_negotiation_packet_ = false;
1833}
1834
1835size_t QuicConnection::SendCryptoData(EncryptionLevel level,
1836 size_t write_length,
1837 QuicStreamOffset offset) {
1838 if (write_length == 0) {
1839 QUIC_BUG << "Attempt to send empty crypto frame";
1840 return 0;
1841 }
1842
1843 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
1844 return packet_generator_.ConsumeCryptoData(level, write_length, offset);
1845}
1846
1847QuicConsumedData QuicConnection::SendStreamData(QuicStreamId id,
1848 size_t write_length,
1849 QuicStreamOffset offset,
1850 StreamSendingState state) {
1851 if (state == NO_FIN && write_length == 0) {
1852 QUIC_BUG << "Attempt to send empty stream frame";
1853 return QuicConsumedData(0, false);
1854 }
1855
1856 // Opportunistically bundle an ack with every outgoing packet.
1857 // Particularly, we want to bundle with handshake packets since we don't know
1858 // which decrypter will be used on an ack packet following a handshake
1859 // packet (a handshake packet from client to server could result in a REJ or a
1860 // SHLO from the server, leading to two different decrypters at the server.)
1861 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
1862 return packet_generator_.ConsumeData(id, write_length, offset, state);
1863}
1864
1865bool QuicConnection::SendControlFrame(const QuicFrame& frame) {
fayang3203f252019-05-03 06:00:03 -07001866 if (!packet_generator_.deprecate_queued_control_frames() &&
1867 !CanWrite(HAS_RETRANSMITTABLE_DATA) && frame.type != PING_FRAME) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05001868 QUIC_DVLOG(1) << ENDPOINT << "Failed to send control frame: " << frame;
1869 // Do not check congestion window for ping.
1870 return false;
1871 }
1872 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
fayang3203f252019-05-03 06:00:03 -07001873 const bool consumed =
1874 packet_generator_.ConsumeRetransmittableControlFrame(frame);
1875 if (packet_generator_.deprecate_queued_control_frames() && !consumed) {
1876 QUIC_DVLOG(1) << ENDPOINT << "Failed to send control frame: " << frame;
1877 return false;
1878 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05001879 if (frame.type == PING_FRAME) {
1880 // Flush PING frame immediately.
1881 packet_generator_.FlushAllQueuedFrames();
1882 if (debug_visitor_ != nullptr) {
1883 debug_visitor_->OnPingSent();
1884 }
1885 }
1886 if (frame.type == BLOCKED_FRAME) {
1887 stats_.blocked_frames_sent++;
1888 }
1889 return true;
1890}
1891
1892void QuicConnection::OnStreamReset(QuicStreamId id,
1893 QuicRstStreamErrorCode error) {
1894 if (error == QUIC_STREAM_NO_ERROR) {
1895 // All data for streams which are reset with QUIC_STREAM_NO_ERROR must
1896 // be received by the peer.
1897 return;
1898 }
1899 // Flush stream frames of reset stream.
1900 if (packet_generator_.HasPendingStreamFramesOfStream(id)) {
1901 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
1902 packet_generator_.FlushAllQueuedFrames();
1903 }
1904
1905 sent_packet_manager_.CancelRetransmissionsForStream(id);
1906 // Remove all queued packets which only contain data for the reset stream.
1907 // TODO(fayang): consider removing this because it should be rarely executed.
1908 auto packet_iterator = queued_packets_.begin();
1909 while (packet_iterator != queued_packets_.end()) {
1910 QuicFrames* retransmittable_frames =
1911 &packet_iterator->retransmittable_frames;
1912 if (retransmittable_frames->empty()) {
1913 ++packet_iterator;
1914 continue;
1915 }
1916 // NOTE THAT RemoveFramesForStream removes only STREAM frames
1917 // for the specified stream.
1918 RemoveFramesForStream(retransmittable_frames, id);
1919 if (!retransmittable_frames->empty()) {
1920 ++packet_iterator;
1921 continue;
1922 }
1923 delete[] packet_iterator->encrypted_buffer;
1924 ClearSerializedPacket(&(*packet_iterator));
1925 packet_iterator = queued_packets_.erase(packet_iterator);
1926 }
1927 // TODO(ianswett): Consider checking for 3 RTOs when the last stream is
1928 // cancelled as well.
1929}
1930
1931const QuicConnectionStats& QuicConnection::GetStats() {
1932 const RttStats* rtt_stats = sent_packet_manager_.GetRttStats();
1933
1934 // Update rtt and estimated bandwidth.
1935 QuicTime::Delta min_rtt = rtt_stats->min_rtt();
1936 if (min_rtt.IsZero()) {
1937 // If min RTT has not been set, use initial RTT instead.
1938 min_rtt = rtt_stats->initial_rtt();
1939 }
1940 stats_.min_rtt_us = min_rtt.ToMicroseconds();
1941
1942 QuicTime::Delta srtt = rtt_stats->SmoothedOrInitialRtt();
1943 stats_.srtt_us = srtt.ToMicroseconds();
1944
1945 stats_.estimated_bandwidth = sent_packet_manager_.BandwidthEstimate();
1946 stats_.max_packet_size = packet_generator_.GetCurrentMaxPacketLength();
1947 stats_.max_received_packet_size = largest_received_packet_size_;
1948 return stats_;
1949}
1950
1951void QuicConnection::OnCoalescedPacket(const QuicEncryptedPacket& packet) {
1952 QueueCoalescedPacket(packet);
1953}
1954
1955void QuicConnection::ProcessUdpPacket(const QuicSocketAddress& self_address,
1956 const QuicSocketAddress& peer_address,
1957 const QuicReceivedPacket& packet) {
1958 if (!connected_) {
1959 return;
1960 }
dschinazid9467b52019-04-03 16:47:08 -07001961 QUIC_DVLOG(2) << ENDPOINT << "Received encrypted " << packet.length()
1962 << " bytes:" << std::endl
1963 << QuicTextUtils::HexDump(
1964 QuicStringPiece(packet.data(), packet.length()));
QUICHE teama6ef0a62019-03-07 20:34:33 -05001965 QUIC_BUG_IF(current_packet_data_ != nullptr)
1966 << "ProcessUdpPacket must not be called while processing a packet.";
1967 if (debug_visitor_ != nullptr) {
1968 debug_visitor_->OnPacketReceived(self_address, peer_address, packet);
1969 }
1970 last_size_ = packet.length();
1971 current_packet_data_ = packet.data();
1972
1973 last_packet_destination_address_ = self_address;
1974 last_packet_source_address_ = peer_address;
1975 if (!self_address_.IsInitialized()) {
1976 self_address_ = last_packet_destination_address_;
1977 }
1978
1979 if (!direct_peer_address_.IsInitialized()) {
1980 direct_peer_address_ = last_packet_source_address_;
1981 }
1982
1983 if (!effective_peer_address_.IsInitialized()) {
1984 const QuicSocketAddress effective_peer_addr =
1985 GetEffectivePeerAddressFromCurrentPacket();
1986
1987 // effective_peer_address_ must be initialized at the beginning of the
1988 // first packet processed(here). If effective_peer_addr is uninitialized,
1989 // just set effective_peer_address_ to the direct peer address.
1990 effective_peer_address_ = effective_peer_addr.IsInitialized()
1991 ? effective_peer_addr
1992 : direct_peer_address_;
1993 }
1994
1995 stats_.bytes_received += packet.length();
1996 ++stats_.packets_received;
1997
1998 // Ensure the time coming from the packet reader is within 2 minutes of now.
1999 if (std::abs((packet.receipt_time() - clock_->ApproximateNow()).ToSeconds()) >
2000 2 * 60) {
2001 QUIC_BUG << "Packet receipt time:"
2002 << packet.receipt_time().ToDebuggingValue()
2003 << " too far from current time:"
2004 << clock_->ApproximateNow().ToDebuggingValue();
2005 }
2006 time_of_last_received_packet_ = packet.receipt_time();
2007 QUIC_DVLOG(1) << ENDPOINT << "time of last received packet: "
2008 << time_of_last_received_packet_.ToDebuggingValue();
2009
2010 ScopedPacketFlusher flusher(this, NO_ACK);
2011 if (!framer_.ProcessPacket(packet)) {
2012 // If we are unable to decrypt this packet, it might be
2013 // because the CHLO or SHLO packet was lost.
2014 if (framer_.error() == QUIC_DECRYPTION_FAILURE) {
dschinazi6ece5002019-05-22 06:35:49 -07002015 ++stats_.undecryptable_packets_received;
QUICHE teama6ef0a62019-03-07 20:34:33 -05002016 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE &&
2017 undecryptable_packets_.size() < max_undecryptable_packets_) {
2018 QueueUndecryptablePacket(packet);
2019 } else if (debug_visitor_ != nullptr) {
2020 debug_visitor_->OnUndecryptablePacket();
2021 }
2022 }
2023 QUIC_DVLOG(1) << ENDPOINT
2024 << "Unable to process packet. Last packet processed: "
2025 << last_header_.packet_number;
2026 current_packet_data_ = nullptr;
2027 is_current_packet_connectivity_probing_ = false;
2028
2029 MaybeProcessCoalescedPackets();
2030 return;
2031 }
2032
2033 ++stats_.packets_processed;
2034
2035 QUIC_DLOG_IF(INFO, active_effective_peer_migration_type_ != NO_CHANGE)
2036 << "sent_packet_manager_.GetLargestObserved() = "
2037 << sent_packet_manager_.GetLargestObserved()
2038 << ", highest_packet_sent_before_effective_peer_migration_ = "
2039 << highest_packet_sent_before_effective_peer_migration_;
2040 if (active_effective_peer_migration_type_ != NO_CHANGE &&
2041 sent_packet_manager_.GetLargestObserved().IsInitialized() &&
2042 (!highest_packet_sent_before_effective_peer_migration_.IsInitialized() ||
2043 sent_packet_manager_.GetLargestObserved() >
2044 highest_packet_sent_before_effective_peer_migration_)) {
2045 if (perspective_ == Perspective::IS_SERVER) {
2046 OnEffectivePeerMigrationValidated();
2047 }
2048 }
2049
2050 MaybeProcessCoalescedPackets();
2051 MaybeProcessUndecryptablePackets();
2052 MaybeSendInResponseToPacket();
2053 SetPingAlarm();
2054 current_packet_data_ = nullptr;
2055 is_current_packet_connectivity_probing_ = false;
2056}
2057
2058void QuicConnection::OnBlockedWriterCanWrite() {
2059 writer_->SetWritable();
2060 OnCanWrite();
2061}
2062
2063void QuicConnection::OnCanWrite() {
2064 DCHECK(!writer_->IsWriteBlocked());
2065
2066 // Add a flusher to ensure the connection is marked app-limited.
2067 ScopedPacketFlusher flusher(this, NO_ACK);
2068
2069 WriteQueuedPackets();
2070 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07002071 const QuicTime ack_timeout =
2072 use_uber_received_packet_manager_
QUICHE teamcd098022019-03-22 18:49:55 -07002073 ? uber_received_packet_manager_.GetEarliestAckTimeout()
QUICHE teamb23daa72019-03-21 08:37:48 -07002074 : received_packet_manager_.ack_timeout();
QUICHE teama6ef0a62019-03-07 20:34:33 -05002075 if (ack_timeout.IsInitialized() &&
2076 ack_timeout <= clock_->ApproximateNow()) {
2077 // Send an ACK now because either 1) we were write blocked when we last
2078 // tried to send an ACK, or 2) both ack alarm and send alarm were set to
2079 // go off together.
QUICHE teamcd098022019-03-22 18:49:55 -07002080 if (SupportsMultiplePacketNumberSpaces()) {
2081 SendAllPendingAcks();
2082 } else {
2083 SendAck();
2084 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002085 }
2086 } else if (send_ack_when_on_can_write_) {
2087 // Send an ACK now because either 1) we were write blocked when we last
2088 // tried to send an ACK, or 2) both ack alarm and send alarm were set to go
2089 // off together.
2090 DCHECK(packet_generator_.deprecate_ack_bundling_mode());
2091 SendAck();
2092 }
2093 if (!session_decides_what_to_write()) {
2094 WritePendingRetransmissions();
2095 }
2096
2097 WriteNewData();
2098}
2099
2100void QuicConnection::WriteNewData() {
2101 // Sending queued packets may have caused the socket to become write blocked,
2102 // or the congestion manager to prohibit sending. If we've sent everything
2103 // we had queued and we're still not blocked, let the visitor know it can
2104 // write more.
2105 if (!CanWrite(HAS_RETRANSMITTABLE_DATA)) {
2106 return;
2107 }
2108
2109 {
2110 ScopedPacketFlusher flusher(this, SEND_ACK_IF_QUEUED);
2111 visitor_->OnCanWrite();
2112 }
2113
2114 // After the visitor writes, it may have caused the socket to become write
2115 // blocked or the congestion manager to prohibit sending, so check again.
2116 if (visitor_->WillingAndAbleToWrite() && !send_alarm_->IsSet() &&
2117 CanWrite(HAS_RETRANSMITTABLE_DATA)) {
2118 // We're not write blocked, but some stream didn't write out all of its
2119 // bytes. Register for 'immediate' resumption so we'll keep writing after
2120 // other connections and events have had a chance to use the thread.
2121 send_alarm_->Set(clock_->ApproximateNow());
2122 }
2123}
2124
2125void QuicConnection::WriteIfNotBlocked() {
2126 if (!HandleWriteBlocked()) {
2127 OnCanWrite();
2128 }
2129}
2130
2131void QuicConnection::WriteAndBundleAcksIfNotBlocked() {
2132 if (!HandleWriteBlocked()) {
2133 ScopedPacketFlusher flusher(this, SEND_ACK_IF_QUEUED);
2134 WriteIfNotBlocked();
2135 }
2136}
2137
2138bool QuicConnection::ProcessValidatedPacket(const QuicPacketHeader& header) {
2139 if (perspective_ == Perspective::IS_SERVER && self_address_.IsInitialized() &&
2140 last_packet_destination_address_.IsInitialized() &&
2141 self_address_ != last_packet_destination_address_) {
2142 // Allow change between pure IPv4 and equivalent mapped IPv4 address.
2143 if (self_address_.port() != last_packet_destination_address_.port() ||
2144 self_address_.host().Normalized() !=
2145 last_packet_destination_address_.host().Normalized()) {
2146 if (!visitor_->AllowSelfAddressChange()) {
2147 CloseConnection(
2148 QUIC_ERROR_MIGRATING_ADDRESS,
2149 "Self address migration is not supported at the server.",
2150 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2151 return false;
2152 }
2153 }
2154 self_address_ = last_packet_destination_address_;
2155 }
2156
QUICHE teamc65d1d12019-03-19 20:58:04 -07002157 if (PacketCanReplaceConnectionId(header, perspective_) &&
dschinazi7b9278c2019-05-20 07:36:21 -07002158 server_connection_id_ != header.source_connection_id) {
2159 QUIC_DLOG(INFO) << ENDPOINT << "Replacing connection ID "
2160 << server_connection_id_ << " with "
2161 << header.source_connection_id;
2162 server_connection_id_ = header.source_connection_id;
2163 packet_generator_.SetServerConnectionId(server_connection_id_);
QUICHE teamc65d1d12019-03-19 20:58:04 -07002164 }
2165
QUICHE teamd791e2c2019-03-15 10:28:21 -07002166 if (!ValidateReceivedPacketNumber(header.packet_number)) {
2167 return false;
QUICHE teama6ef0a62019-03-07 20:34:33 -05002168 }
2169
2170 if (version_negotiation_state_ != NEGOTIATED_VERSION) {
2171 if (perspective_ == Perspective::IS_CLIENT) {
2172 DCHECK(!header.version_flag || header.form != GOOGLE_QUIC_PACKET);
2173 if (framer_.transport_version() <= QUIC_VERSION_43) {
2174 // If the client gets a packet without the version flag from the server
2175 // it should stop sending version since the version negotiation is done.
2176 // IETF QUIC stops sending version once encryption level switches to
2177 // forward secure.
2178 packet_generator_.StopSendingVersion();
2179 }
2180 version_negotiation_state_ = NEGOTIATED_VERSION;
2181 visitor_->OnSuccessfulVersionNegotiation(version());
2182 if (debug_visitor_ != nullptr) {
2183 debug_visitor_->OnSuccessfulVersionNegotiation(version());
2184 }
2185 }
2186 }
2187
2188 if (last_size_ > largest_received_packet_size_) {
2189 largest_received_packet_size_ = last_size_;
2190 }
2191
2192 if (perspective_ == Perspective::IS_SERVER &&
QUICHE team6987b4a2019-03-15 16:23:04 -07002193 encryption_level_ == ENCRYPTION_INITIAL &&
QUICHE teama6ef0a62019-03-07 20:34:33 -05002194 last_size_ > packet_generator_.GetCurrentMaxPacketLength()) {
2195 SetMaxPacketLength(last_size_);
2196 }
2197 return true;
2198}
2199
QUICHE teamd791e2c2019-03-15 10:28:21 -07002200bool QuicConnection::ValidateReceivedPacketNumber(
2201 QuicPacketNumber packet_number) {
QUICHE teamb23daa72019-03-21 08:37:48 -07002202 if (validate_packet_number_post_decryption_) {
2203 const bool is_awaiting =
2204 use_uber_received_packet_manager_
QUICHE team1dfa46b2019-03-22 10:39:10 -07002205 ? uber_received_packet_manager_.IsAwaitingPacket(
2206 last_decrypted_packet_level_, packet_number)
QUICHE teamb23daa72019-03-21 08:37:48 -07002207 : received_packet_manager_.IsAwaitingPacket(packet_number);
2208 if (!is_awaiting) {
dschinazid9467b52019-04-03 16:47:08 -07002209 if (use_uber_received_packet_manager_) {
2210 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << packet_number
2211 << " no longer being waited for at level "
2212 << static_cast<int>(last_decrypted_packet_level_)
2213 << ". Discarding.";
2214 } else {
2215 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << packet_number
2216 << " no longer being waited for. Discarding.";
2217 }
QUICHE teamb23daa72019-03-21 08:37:48 -07002218 if (debug_visitor_ != nullptr) {
2219 debug_visitor_->OnDuplicatePacket(packet_number);
2220 }
2221 return false;
QUICHE team692750b2019-03-17 17:57:46 -07002222 }
QUICHE team692750b2019-03-17 17:57:46 -07002223 }
2224
QUICHE teamcd098022019-03-22 18:49:55 -07002225 if (use_uber_received_packet_manager_) {
2226 // When using uber_received_packet_manager, accept any packet numbers.
2227 return true;
2228 }
2229
QUICHE teamd791e2c2019-03-15 10:28:21 -07002230 if (GetQuicRestartFlag(quic_enable_accept_random_ipn)) {
2231 QUIC_RESTART_FLAG_COUNT_N(quic_enable_accept_random_ipn, 2, 2);
2232 // Configured to accept any packet number in range 1...0x7fffffff as initial
2233 // packet number.
2234 bool out_of_bound = false;
rchd5d13c22019-03-18 14:31:09 -07002235 std::string error_detail = "Packet number out of bounds.";
QUICHE teamd791e2c2019-03-15 10:28:21 -07002236 if (last_header_.packet_number.IsInitialized()) {
2237 out_of_bound = !Near(packet_number, last_header_.packet_number);
2238 } else if ((packet_number > MaxRandomInitialPacketNumber())) {
2239 out_of_bound = true;
2240 error_detail = "Initial packet number out of bounds.";
2241 }
2242 if (out_of_bound) {
2243 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << packet_number
2244 << " out of bounds. Discarding";
2245 CloseConnection(QUIC_INVALID_PACKET_HEADER, error_detail,
2246 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2247 return false;
2248 }
2249 return true;
2250 }
QUICHE teamcd098022019-03-22 18:49:55 -07002251
2252 if (packet_number > received_packet_manager_.PeerFirstSendingPacketNumber() &&
QUICHE teamd791e2c2019-03-15 10:28:21 -07002253 packet_number <= MaxRandomInitialPacketNumber()) {
2254 QUIC_CODE_COUNT_N(had_possibly_random_ipn, 2, 2);
2255 }
2256 const bool out_of_bound =
2257 last_header_.packet_number.IsInitialized()
2258 ? !Near(packet_number, last_header_.packet_number)
QUICHE teamcd098022019-03-22 18:49:55 -07002259 : packet_number >=
2260 (received_packet_manager_.PeerFirstSendingPacketNumber() +
2261 kMaxPacketGap);
QUICHE teamd791e2c2019-03-15 10:28:21 -07002262 if (!out_of_bound) {
2263 return true;
2264 }
2265 QUIC_DLOG(INFO) << ENDPOINT << "Packet " << packet_number
2266 << " out of bounds. Discarding";
2267 QuicStringPiece packet_data = GetCurrentPacket();
2268 const size_t kMaxPacketLengthInErrorDetails = 64;
2269 CloseConnection(
2270 QUIC_INVALID_PACKET_HEADER,
2271 QuicStrCat(
2272 "Packet number out of bounds. ",
2273 last_header_.packet_number.IsInitialized()
2274 ? QuicStrCat("last_pkn=", last_header_.packet_number.ToUint64())
2275 : "first received packet",
2276 ", current_pkn=", packet_number.ToUint64(),
2277 ", current_pkt_len=", packet_data.length(), ", current_hdr=",
2278 QuicTextUtils::HexEncode(
2279 packet_data.length() > kMaxPacketLengthInErrorDetails
2280 ? QuicStringPiece(packet_data.data(),
2281 kMaxPacketLengthInErrorDetails)
2282 : packet_data)),
2283 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2284 return false;
2285}
2286
QUICHE teama6ef0a62019-03-07 20:34:33 -05002287void QuicConnection::WriteQueuedPackets() {
2288 DCHECK(!writer_->IsWriteBlocked());
2289
2290 if (pending_version_negotiation_packet_) {
2291 SendVersionNegotiationPacket(send_ietf_version_negotiation_packet_);
2292 }
2293
2294 QUIC_CLIENT_HISTOGRAM_COUNTS("QuicSession.NumQueuedPacketsBeforeWrite",
2295 queued_packets_.size(), 1, 1000, 50, "");
2296 while (!queued_packets_.empty()) {
2297 // WritePacket() can potentially clear all queued packets, so we need to
2298 // save the first queued packet to a local variable before calling it.
2299 SerializedPacket packet(std::move(queued_packets_.front()));
2300 queued_packets_.pop_front();
2301
2302 const bool write_result = WritePacket(&packet);
2303
2304 if (connected_ && !write_result) {
2305 // Write failed but connection is open, re-insert |packet| into the
2306 // front of the queue, it will be retried later.
2307 queued_packets_.emplace_front(std::move(packet));
2308 break;
2309 }
2310
2311 delete[] packet.encrypted_buffer;
2312 ClearSerializedPacket(&packet);
2313 if (!connected_) {
2314 DCHECK(queued_packets_.empty()) << "Queued packets should have been "
2315 "cleared while closing connection";
2316 break;
2317 }
2318
2319 // Continue to send the next packet in queue.
2320 }
2321}
2322
2323void QuicConnection::WritePendingRetransmissions() {
2324 DCHECK(!session_decides_what_to_write());
2325 // Keep writing as long as there's a pending retransmission which can be
2326 // written.
2327 while (sent_packet_manager_.HasPendingRetransmissions() &&
2328 CanWrite(HAS_RETRANSMITTABLE_DATA)) {
2329 const QuicPendingRetransmission pending =
2330 sent_packet_manager_.NextPendingRetransmission();
2331
2332 // Re-packetize the frames with a new packet number for retransmission.
2333 // Retransmitted packets use the same packet number length as the
2334 // original.
2335 // Flush the packet generator before making a new packet.
2336 // TODO(ianswett): Implement ReserializeAllFrames as a separate path that
2337 // does not require the creator to be flushed.
2338 // TODO(fayang): FlushAllQueuedFrames should only be called once, and should
2339 // be moved outside of the loop. Also, CanWrite is not checked after the
2340 // generator is flushed.
2341 {
2342 ScopedPacketFlusher flusher(this, NO_ACK);
2343 packet_generator_.FlushAllQueuedFrames();
2344 }
2345 DCHECK(!packet_generator_.HasQueuedFrames());
dschinazi66dea072019-04-09 11:41:06 -07002346 char buffer[kMaxOutgoingPacketSize];
2347 packet_generator_.ReserializeAllFrames(pending, buffer,
2348 kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002349 }
2350}
2351
2352void QuicConnection::SendProbingRetransmissions() {
2353 while (sent_packet_manager_.GetSendAlgorithm()->ShouldSendProbingPacket() &&
2354 CanWrite(HAS_RETRANSMITTABLE_DATA)) {
QUICHE teamb8343252019-04-29 13:58:01 -07002355 if (!visitor_->SendProbingData()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05002356 QUIC_DVLOG(1)
2357 << "Cannot send probing retransmissions: nothing to retransmit.";
2358 break;
2359 }
2360
2361 if (!session_decides_what_to_write()) {
2362 DCHECK(sent_packet_manager_.HasPendingRetransmissions());
2363 WritePendingRetransmissions();
2364 }
2365 }
2366}
2367
2368void QuicConnection::RetransmitUnackedPackets(
2369 TransmissionType retransmission_type) {
2370 sent_packet_manager_.RetransmitUnackedPackets(retransmission_type);
2371
2372 WriteIfNotBlocked();
2373}
2374
2375void QuicConnection::NeuterUnencryptedPackets() {
2376 sent_packet_manager_.NeuterUnencryptedPackets();
2377 // This may have changed the retransmission timer, so re-arm it.
2378 SetRetransmissionAlarm();
2379}
2380
2381bool QuicConnection::ShouldGeneratePacket(
2382 HasRetransmittableData retransmittable,
2383 IsHandshake handshake) {
2384 // We should serialize handshake packets immediately to ensure that they
2385 // end up sent at the right encryption level.
2386 if (handshake == IS_HANDSHAKE) {
2387 return true;
2388 }
2389
2390 return CanWrite(retransmittable);
2391}
2392
2393const QuicFrames QuicConnection::MaybeBundleAckOpportunistically() {
2394 DCHECK(packet_generator_.deprecate_ack_bundling_mode());
2395 QuicFrames frames;
2396 bool has_pending_ack = false;
2397 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07002398 if (use_uber_received_packet_manager_) {
2399 has_pending_ack =
QUICHE team1dfa46b2019-03-22 10:39:10 -07002400 uber_received_packet_manager_
2401 .GetAckTimeout(QuicUtils::GetPacketNumberSpace(encryption_level_))
2402 .IsInitialized();
QUICHE teamb23daa72019-03-21 08:37:48 -07002403 } else {
2404 has_pending_ack = received_packet_manager_.ack_timeout().IsInitialized();
2405 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002406 } else {
2407 has_pending_ack = ack_alarm_->IsSet();
2408 }
2409 if (!has_pending_ack && stop_waiting_count_ <= 1) {
2410 // No need to send an ACK.
2411 return frames;
2412 }
2413 ResetAckStates();
2414
2415 QUIC_DVLOG(1) << ENDPOINT << "Bundle an ACK opportunistically";
dschinazi8cf087e2019-05-23 05:27:48 -07002416 QuicFrame updated_ack_frame = GetUpdatedAckFrame();
2417 QUIC_BUG_IF(updated_ack_frame.ack_frame->packets.Empty())
2418 << ENDPOINT << "Attempted to opportunistically bundle an empty "
2419 << QuicUtils::EncryptionLevelToString(encryption_level_) << " ACK, "
2420 << (has_pending_ack ? "" : "!") << "has_pending_ack, stop_waiting_count_ "
2421 << stop_waiting_count_;
2422 frames.push_back(updated_ack_frame);
2423
QUICHE teama6ef0a62019-03-07 20:34:33 -05002424 if (!no_stop_waiting_frames_) {
2425 QuicStopWaitingFrame stop_waiting;
2426 PopulateStopWaitingFrame(&stop_waiting);
2427 frames.push_back(QuicFrame(stop_waiting));
2428 }
2429 return frames;
2430}
2431
2432bool QuicConnection::CanWrite(HasRetransmittableData retransmittable) {
2433 if (!connected_) {
2434 return false;
2435 }
2436
2437 if (session_decides_what_to_write() &&
2438 sent_packet_manager_.pending_timer_transmission_count() > 0) {
2439 // Force sending the retransmissions for HANDSHAKE, TLP, RTO, PROBING cases.
2440 return true;
2441 }
2442
2443 if (HandleWriteBlocked()) {
2444 return false;
2445 }
2446
2447 // Allow acks to be sent immediately.
2448 if (retransmittable == NO_RETRANSMITTABLE_DATA) {
2449 return true;
2450 }
2451 // If the send alarm is set, wait for it to fire.
2452 if (send_alarm_->IsSet()) {
2453 return false;
2454 }
2455
2456 QuicTime now = clock_->Now();
2457 QuicTime::Delta delay = sent_packet_manager_.TimeUntilSend(now);
2458 if (delay.IsInfinite()) {
2459 send_alarm_->Cancel();
2460 return false;
2461 }
2462
2463 // Scheduler requires a delay.
2464 if (!delay.IsZero()) {
2465 if (delay <= release_time_into_future_) {
2466 // Required delay is within pace time into future, send now.
2467 return true;
2468 }
2469 // Cannot send packet now because delay is too far in the future.
2470 send_alarm_->Update(now + delay, QuicTime::Delta::FromMilliseconds(1));
2471 QUIC_DVLOG(1) << ENDPOINT << "Delaying sending " << delay.ToMilliseconds()
2472 << "ms";
2473 return false;
2474 }
2475 return true;
2476}
2477
2478bool QuicConnection::WritePacket(SerializedPacket* packet) {
2479 if (ShouldDiscardPacket(*packet)) {
2480 ++stats_.packets_discarded;
2481 return true;
2482 }
2483 if (sent_packet_manager_.GetLargestSentPacket().IsInitialized() &&
2484 packet->packet_number < sent_packet_manager_.GetLargestSentPacket()) {
2485 QUIC_BUG << "Attempt to write packet:" << packet->packet_number
2486 << " after:" << sent_packet_manager_.GetLargestSentPacket();
2487 QUIC_CLIENT_HISTOGRAM_COUNTS("QuicSession.NumQueuedPacketsAtOutOfOrder",
2488 queued_packets_.size(), 1, 1000, 50, "");
2489 CloseConnection(QUIC_INTERNAL_ERROR, "Packet written out of order.",
2490 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2491 return true;
2492 }
2493 // Termination packets are encrypted and saved, so don't exit early.
2494 const bool is_termination_packet = IsTerminationPacket(*packet);
2495 if (HandleWriteBlocked() && !is_termination_packet) {
2496 return false;
2497 }
2498
2499 QuicPacketNumber packet_number = packet->packet_number;
2500
2501 QuicPacketLength encrypted_length = packet->encrypted_length;
2502 // Termination packets are eventually owned by TimeWaitListManager.
2503 // Others are deleted at the end of this call.
2504 if (is_termination_packet) {
2505 if (termination_packets_ == nullptr) {
2506 termination_packets_.reset(
2507 new std::vector<std::unique_ptr<QuicEncryptedPacket>>);
2508 }
2509 // Copy the buffer so it's owned in the future.
2510 char* buffer_copy = CopyBuffer(*packet);
2511 termination_packets_->emplace_back(
2512 new QuicEncryptedPacket(buffer_copy, encrypted_length, true));
2513 // This assures we won't try to write *forced* packets when blocked.
2514 // Return true to stop processing.
2515 if (HandleWriteBlocked()) {
2516 return true;
2517 }
2518 }
2519
dschinazi66dea072019-04-09 11:41:06 -07002520 DCHECK_LE(encrypted_length, kMaxOutgoingPacketSize);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002521 DCHECK_LE(encrypted_length, packet_generator_.GetCurrentMaxPacketLength());
2522 QUIC_DVLOG(1) << ENDPOINT << "Sending packet " << packet_number << " : "
2523 << (IsRetransmittable(*packet) == HAS_RETRANSMITTABLE_DATA
2524 ? "data bearing "
2525 : " ack only ")
2526 << ", encryption level: "
2527 << QuicUtils::EncryptionLevelToString(packet->encryption_level)
2528 << ", encrypted length:" << encrypted_length;
2529 QUIC_DVLOG(2) << ENDPOINT << "packet(" << packet_number << "): " << std::endl
2530 << QuicTextUtils::HexDump(QuicStringPiece(
2531 packet->encrypted_buffer, encrypted_length));
2532
2533 // Measure the RTT from before the write begins to avoid underestimating the
2534 // min_rtt_, especially in cases where the thread blocks or gets swapped out
2535 // during the WritePacket below.
2536 QuicTime packet_send_time = clock_->Now();
2537 if (supports_release_time_ && per_packet_options_ != nullptr) {
2538 QuicTime next_release_time = sent_packet_manager_.GetNextReleaseTime();
2539 QuicTime::Delta release_time_delay = QuicTime::Delta::Zero();
2540 QuicTime now = packet_send_time;
2541 if (next_release_time > now) {
2542 release_time_delay = next_release_time - now;
2543 // Set packet_send_time to the future to make the RTT estimation accurate.
2544 packet_send_time = next_release_time;
2545 }
2546 per_packet_options_->release_time_delay = release_time_delay;
2547 }
2548 WriteResult result = writer_->WritePacket(
2549 packet->encrypted_buffer, encrypted_length, self_address().host(),
2550 peer_address(), per_packet_options_);
2551
2552 QUIC_HISTOGRAM_ENUM(
2553 "QuicConnection.WritePacketStatus", result.status,
2554 WRITE_STATUS_NUM_VALUES,
2555 "Status code returned by writer_->WritePacket() in QuicConnection.");
2556
2557 if (IsWriteBlockedStatus(result.status)) {
2558 // Ensure the writer is still write blocked, otherwise QUIC may continue
2559 // trying to write when it will not be able to.
2560 DCHECK(writer_->IsWriteBlocked());
2561 visitor_->OnWriteBlocked();
2562 // If the socket buffers the data, then the packet should not
2563 // be queued and sent again, which would result in an unnecessary
2564 // duplicate packet being sent. The helper must call OnCanWrite
2565 // when the write completes, and OnWriteError if an error occurs.
2566 if (result.status != WRITE_STATUS_BLOCKED_DATA_BUFFERED) {
2567 return false;
2568 }
2569 }
2570
2571 // In some cases, an MTU probe can cause EMSGSIZE. This indicates that the
2572 // MTU discovery is permanently unsuccessful.
2573 if (IsMsgTooBig(result) && packet->retransmittable_frames.empty() &&
2574 packet->encrypted_length > long_term_mtu_) {
2575 mtu_discovery_target_ = 0;
2576 mtu_discovery_alarm_->Cancel();
2577 // The write failed, but the writer is not blocked, so return true.
2578 return true;
2579 }
2580
2581 if (IsWriteError(result.status)) {
2582 OnWriteError(result.error_code);
2583 QUIC_LOG_FIRST_N(ERROR, 10)
2584 << ENDPOINT << "failed writing " << encrypted_length
2585 << " bytes from host " << self_address().host().ToString()
2586 << " to address " << peer_address().ToString() << " with error code "
2587 << result.error_code;
2588 return false;
2589 }
2590
2591 if (debug_visitor_ != nullptr) {
2592 // Pass the write result to the visitor.
2593 debug_visitor_->OnPacketSent(*packet, packet->original_packet_number,
2594 packet->transmission_type, packet_send_time);
2595 }
2596 if (IsRetransmittable(*packet) == HAS_RETRANSMITTABLE_DATA) {
2597 if (!is_path_degrading_ && !path_degrading_alarm_->IsSet()) {
2598 // This is the first retransmittable packet on the working path.
2599 // Start the path degrading alarm to detect new path degrading.
2600 SetPathDegradingAlarm();
2601 }
2602
2603 if (GetQuicReloadableFlag(
2604 quic_fix_time_of_first_packet_sent_after_receiving)) {
2605 // Update |time_of_first_packet_sent_after_receiving_| if this is the
2606 // first packet sent after the last packet was received. If it were
2607 // updated on every sent packet, then sending into a black hole might
2608 // never timeout.
2609 if (time_of_first_packet_sent_after_receiving_ <
2610 time_of_last_received_packet_) {
2611 QUIC_RELOADABLE_FLAG_COUNT(
2612 quic_fix_time_of_first_packet_sent_after_receiving);
2613 time_of_first_packet_sent_after_receiving_ = packet_send_time;
2614 }
2615 } else {
2616 // Only adjust the last sent time (for the purpose of tracking the idle
2617 // timeout) if this is the first retransmittable packet sent after a
2618 // packet is received. If it were updated on every sent packet, then
2619 // sending into a black hole might never timeout.
2620 if (time_of_first_packet_sent_after_receiving_ <=
2621 time_of_last_received_packet_) {
2622 time_of_first_packet_sent_after_receiving_ = packet_send_time;
2623 }
2624 }
2625 }
2626
2627 MaybeSetMtuAlarm(packet_number);
2628 QUIC_DVLOG(1) << ENDPOINT << "time we began writing last sent packet: "
2629 << packet_send_time.ToDebuggingValue();
2630
2631 bool reset_retransmission_alarm = sent_packet_manager_.OnPacketSent(
2632 packet, packet->original_packet_number, packet_send_time,
2633 packet->transmission_type, IsRetransmittable(*packet));
2634
2635 if (reset_retransmission_alarm || !retransmission_alarm_->IsSet()) {
2636 SetRetransmissionAlarm();
2637 }
2638 SetPingAlarm();
2639
2640 // The packet number length must be updated after OnPacketSent, because it
2641 // may change the packet number length in packet.
2642 packet_generator_.UpdatePacketNumberLength(
2643 sent_packet_manager_.GetLeastUnacked(),
2644 sent_packet_manager_.EstimateMaxPacketsInFlight(max_packet_length()));
2645
2646 stats_.bytes_sent += result.bytes_written;
2647 ++stats_.packets_sent;
2648 if (packet->transmission_type != NOT_RETRANSMISSION) {
2649 stats_.bytes_retransmitted += result.bytes_written;
2650 ++stats_.packets_retransmitted;
2651 }
2652
2653 return true;
2654}
2655
2656void QuicConnection::FlushPackets() {
2657 if (!connected_) {
2658 return;
2659 }
2660
2661 if (!writer_->IsBatchMode()) {
2662 return;
2663 }
2664
2665 if (HandleWriteBlocked()) {
2666 QUIC_DLOG(INFO) << ENDPOINT << "FlushPackets called while blocked.";
2667 return;
2668 }
2669
2670 WriteResult result = writer_->Flush();
2671
2672 if (HandleWriteBlocked()) {
2673 DCHECK_EQ(WRITE_STATUS_BLOCKED, result.status)
2674 << "Unexpected flush result:" << result;
2675 QUIC_DLOG(INFO) << ENDPOINT << "Write blocked in FlushPackets.";
2676 return;
2677 }
2678
2679 if (IsWriteError(result.status)) {
2680 OnWriteError(result.error_code);
2681 }
2682}
2683
2684bool QuicConnection::IsMsgTooBig(const WriteResult& result) {
2685 return (result.status == WRITE_STATUS_MSG_TOO_BIG) ||
2686 (IsWriteError(result.status) && result.error_code == QUIC_EMSGSIZE);
2687}
2688
2689bool QuicConnection::ShouldDiscardPacket(const SerializedPacket& packet) {
2690 if (!connected_) {
2691 QUIC_DLOG(INFO) << ENDPOINT
2692 << "Not sending packet as connection is disconnected.";
2693 return true;
2694 }
2695
2696 QuicPacketNumber packet_number = packet.packet_number;
2697 if (encryption_level_ == ENCRYPTION_FORWARD_SECURE &&
QUICHE team6987b4a2019-03-15 16:23:04 -07002698 packet.encryption_level == ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05002699 // Drop packets that are NULL encrypted since the peer won't accept them
2700 // anymore.
2701 QUIC_DLOG(INFO) << ENDPOINT
2702 << "Dropping NULL encrypted packet: " << packet_number
2703 << " since the connection is forward secure.";
2704 return true;
2705 }
2706
2707 return false;
2708}
2709
2710void QuicConnection::OnWriteError(int error_code) {
2711 if (write_error_occurred_) {
2712 // A write error already occurred. The connection is being closed.
2713 return;
2714 }
2715 write_error_occurred_ = true;
2716
vasilvvc48c8712019-03-11 13:38:16 -07002717 const std::string error_details = QuicStrCat(
QUICHE teama6ef0a62019-03-07 20:34:33 -05002718 "Write failed with error: ", error_code, " (", strerror(error_code), ")");
2719 QUIC_LOG_FIRST_N(ERROR, 2) << ENDPOINT << error_details;
2720 switch (error_code) {
2721 case QUIC_EMSGSIZE:
ianswettdc1e7ab2019-05-03 16:10:44 -07002722 CloseConnection(QUIC_PACKET_WRITE_ERROR, error_details,
2723 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
QUICHE teama6ef0a62019-03-07 20:34:33 -05002724 break;
2725 default:
2726 // We can't send an error as the socket is presumably borked.
2727 if (transport_version() > QUIC_VERSION_43) {
2728 QUIC_CODE_COUNT(quic_tear_down_local_connection_on_write_error_ietf);
2729 } else {
2730 QUIC_CODE_COUNT(
2731 quic_tear_down_local_connection_on_write_error_non_ietf);
2732 }
2733 TearDownLocalConnectionState(QUIC_PACKET_WRITE_ERROR, error_details,
2734 ConnectionCloseSource::FROM_SELF);
2735 }
2736}
2737
2738char* QuicConnection::GetPacketBuffer() {
2739 return writer_->GetNextWriteLocation(self_address().host(), peer_address());
2740}
2741
2742void QuicConnection::OnSerializedPacket(SerializedPacket* serialized_packet) {
2743 if (serialized_packet->encrypted_buffer == nullptr) {
2744 // We failed to serialize the packet, so close the connection.
2745 // TearDownLocalConnectionState does not send close packet, so no infinite
2746 // loop here.
2747 // TODO(ianswett): This is actually an internal error, not an
2748 // encryption failure.
2749 if (transport_version() > QUIC_VERSION_43) {
2750 QUIC_CODE_COUNT(
2751 quic_tear_down_local_connection_on_serialized_packet_ietf);
2752 } else {
2753 QUIC_CODE_COUNT(
2754 quic_tear_down_local_connection_on_serialized_packet_non_ietf);
2755 }
2756 TearDownLocalConnectionState(
2757 QUIC_ENCRYPTION_FAILURE,
2758 "Serialized packet does not have an encrypted buffer.",
2759 ConnectionCloseSource::FROM_SELF);
2760 return;
2761 }
2762
2763 if (serialized_packet->retransmittable_frames.empty() &&
2764 !serialized_packet->original_packet_number.IsInitialized()) {
2765 // Increment consecutive_num_packets_with_no_retransmittable_frames_ if
2766 // this packet is a new transmission with no retransmittable frames.
2767 ++consecutive_num_packets_with_no_retransmittable_frames_;
2768 } else {
2769 consecutive_num_packets_with_no_retransmittable_frames_ = 0;
2770 }
2771 SendOrQueuePacket(serialized_packet);
2772}
2773
2774void QuicConnection::OnUnrecoverableError(QuicErrorCode error,
vasilvvc48c8712019-03-11 13:38:16 -07002775 const std::string& error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05002776 ConnectionCloseSource source) {
2777 // The packet creator or generator encountered an unrecoverable error: tear
2778 // down local connection state immediately.
2779 if (transport_version() > QUIC_VERSION_43) {
2780 QUIC_CODE_COUNT(
2781 quic_tear_down_local_connection_on_unrecoverable_error_ietf);
2782 } else {
2783 QUIC_CODE_COUNT(
2784 quic_tear_down_local_connection_on_unrecoverable_error_non_ietf);
2785 }
2786 TearDownLocalConnectionState(error, error_details, source);
2787}
2788
2789void QuicConnection::OnCongestionChange() {
2790 visitor_->OnCongestionWindowChange(clock_->ApproximateNow());
2791
2792 // Uses the connection's smoothed RTT. If zero, uses initial_rtt.
2793 QuicTime::Delta rtt = sent_packet_manager_.GetRttStats()->smoothed_rtt();
2794 if (rtt.IsZero()) {
2795 rtt = sent_packet_manager_.GetRttStats()->initial_rtt();
2796 }
2797
2798 if (debug_visitor_ != nullptr) {
2799 debug_visitor_->OnRttChanged(rtt);
2800 }
2801}
2802
2803void QuicConnection::OnPathMtuIncreased(QuicPacketLength packet_size) {
2804 if (packet_size > max_packet_length()) {
2805 SetMaxPacketLength(packet_size);
2806 }
2807}
2808
2809void QuicConnection::OnHandshakeComplete() {
2810 sent_packet_manager_.SetHandshakeConfirmed();
2811 if (sent_packet_manager_.unacked_packets().use_uber_loss_algorithm()) {
2812 // This may have changed the retransmission timer, so re-arm it.
2813 SetRetransmissionAlarm();
2814 }
2815 // The client should immediately ack the SHLO to confirm the handshake is
2816 // complete with the server.
2817 if (perspective_ == Perspective::IS_CLIENT && !ack_queued_ &&
2818 ack_frame_updated()) {
2819 ack_alarm_->Update(clock_->ApproximateNow(), QuicTime::Delta::Zero());
2820 }
2821}
2822
2823void QuicConnection::SendOrQueuePacket(SerializedPacket* packet) {
2824 // The caller of this function is responsible for checking CanWrite().
2825 if (packet->encrypted_buffer == nullptr) {
2826 QUIC_BUG << "packet.encrypted_buffer == nullptr in to SendOrQueuePacket";
2827 return;
2828 }
2829 // If there are already queued packets, queue this one immediately to ensure
2830 // it's written in sequence number order.
2831 if (!queued_packets_.empty() || !WritePacket(packet)) {
2832 // Take ownership of the underlying encrypted packet.
2833 packet->encrypted_buffer = CopyBuffer(*packet);
2834 queued_packets_.push_back(*packet);
2835 packet->retransmittable_frames.clear();
2836 }
2837
2838 ClearSerializedPacket(packet);
2839}
2840
2841void QuicConnection::OnPingTimeout() {
2842 if (!retransmission_alarm_->IsSet()) {
zhongyifbb25772019-04-10 16:54:08 -07002843 bool enable_half_rtt_tail_loss_probe =
2844 sent_packet_manager_.enable_half_rtt_tail_loss_probe();
2845 if (enable_half_rtt_tail_loss_probe &&
2846 GetQuicReloadableFlag(quic_ignore_tlpr_if_sending_ping)) {
zhongyi19461252019-04-29 12:44:25 -07002847 QUIC_RELOADABLE_FLAG_COUNT_N(quic_ignore_tlpr_if_sending_ping, 1, 2);
zhongyifbb25772019-04-10 16:54:08 -07002848 sent_packet_manager_.set_enable_half_rtt_tail_loss_probe(false);
2849 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002850 visitor_->SendPing();
zhongyifbb25772019-04-10 16:54:08 -07002851 if (enable_half_rtt_tail_loss_probe &&
2852 GetQuicReloadableFlag(quic_ignore_tlpr_if_sending_ping)) {
zhongyi19461252019-04-29 12:44:25 -07002853 QUIC_RELOADABLE_FLAG_COUNT_N(quic_ignore_tlpr_if_sending_ping, 2, 2);
zhongyifbb25772019-04-10 16:54:08 -07002854 sent_packet_manager_.set_enable_half_rtt_tail_loss_probe(true);
2855 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05002856 }
2857}
2858
2859void QuicConnection::SendAck() {
QUICHE teamcd098022019-03-22 18:49:55 -07002860 DCHECK(!SupportsMultiplePacketNumberSpaces());
QUICHE teama6ef0a62019-03-07 20:34:33 -05002861 if (!received_packet_manager_.decide_when_to_send_acks()) {
2862 // When received_packet_manager decides when to send ack, delaying
2863 // ResetAckStates until ACK is successfully flushed.
2864 ResetAckStates();
2865 }
2866
2867 if (packet_generator_.deprecate_ack_bundling_mode()) {
2868 QUIC_DVLOG(1) << ENDPOINT << "Sending an ACK proactively";
2869 QuicFrames frames;
2870 frames.push_back(GetUpdatedAckFrame());
2871 if (!no_stop_waiting_frames_) {
2872 QuicStopWaitingFrame stop_waiting;
2873 PopulateStopWaitingFrame(&stop_waiting);
2874 frames.push_back(QuicFrame(stop_waiting));
2875 }
2876 if (received_packet_manager_.decide_when_to_send_acks()) {
2877 if (!packet_generator_.FlushAckFrame(frames)) {
2878 return;
2879 }
2880 ResetAckStates();
2881 } else {
2882 send_ack_when_on_can_write_ = !packet_generator_.FlushAckFrame(frames);
2883 }
2884 } else {
2885 packet_generator_.SetShouldSendAck(!no_stop_waiting_frames_);
2886 }
2887 if (consecutive_num_packets_with_no_retransmittable_frames_ <
2888 max_consecutive_num_packets_with_no_retransmittable_frames_) {
2889 return;
2890 }
2891 consecutive_num_packets_with_no_retransmittable_frames_ = 0;
2892 if (packet_generator_.HasRetransmittableFrames() ||
2893 visitor_->WillingAndAbleToWrite()) {
2894 // There are pending retransmittable frames.
2895 return;
2896 }
2897
2898 visitor_->OnAckNeedsRetransmittableFrame();
2899}
2900
2901void QuicConnection::OnPathDegradingTimeout() {
2902 is_path_degrading_ = true;
2903 visitor_->OnPathDegrading();
2904}
2905
2906void QuicConnection::OnRetransmissionTimeout() {
2907 DCHECK(!sent_packet_manager_.unacked_packets().empty());
2908 if (close_connection_after_five_rtos_ &&
2909 sent_packet_manager_.GetConsecutiveRtoCount() >= 4) {
2910 // Close on the 5th consecutive RTO, so after 4 previous RTOs have occurred.
2911 CloseConnection(QUIC_TOO_MANY_RTOS, "5 consecutive retransmission timeouts",
2912 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
2913 return;
2914 }
2915
2916 sent_packet_manager_.OnRetransmissionTimeout();
2917 WriteIfNotBlocked();
2918
2919 // A write failure can result in the connection being closed, don't attempt to
2920 // write further packets, or to set alarms.
2921 if (!connected_) {
2922 return;
2923 }
2924
2925 // In the TLP case, the SentPacketManager gives the connection the opportunity
2926 // to send new data before retransmitting.
2927 if (sent_packet_manager_.MaybeRetransmitTailLossProbe()) {
2928 // Send the pending retransmission now that it's been queued.
2929 WriteIfNotBlocked();
2930 }
2931
2932 // Ensure the retransmission alarm is always set if there are unacked packets
2933 // and nothing waiting to be sent.
2934 // This happens if the loss algorithm invokes a timer based loss, but the
2935 // packet doesn't need to be retransmitted.
2936 if (!HasQueuedData() && !retransmission_alarm_->IsSet()) {
2937 SetRetransmissionAlarm();
2938 }
2939}
2940
2941void QuicConnection::SetEncrypter(EncryptionLevel level,
2942 std::unique_ptr<QuicEncrypter> encrypter) {
2943 packet_generator_.SetEncrypter(level, std::move(encrypter));
2944}
2945
2946void QuicConnection::SetDiversificationNonce(
2947 const DiversificationNonce& nonce) {
2948 DCHECK_EQ(Perspective::IS_SERVER, perspective_);
2949 packet_generator_.SetDiversificationNonce(nonce);
2950}
2951
2952void QuicConnection::SetDefaultEncryptionLevel(EncryptionLevel level) {
2953 if (level != encryption_level_ && packet_generator_.HasQueuedFrames()) {
2954 // Flush all queued frames when encryption level changes.
2955 ScopedPacketFlusher flusher(this, NO_ACK);
2956 packet_generator_.FlushAllQueuedFrames();
2957 }
2958 encryption_level_ = level;
2959 packet_generator_.set_encryption_level(level);
2960}
2961
2962void QuicConnection::SetDecrypter(EncryptionLevel level,
2963 std::unique_ptr<QuicDecrypter> decrypter) {
2964 framer_.SetDecrypter(level, std::move(decrypter));
2965
2966 if (!undecryptable_packets_.empty() &&
2967 !process_undecryptable_packets_alarm_->IsSet()) {
2968 process_undecryptable_packets_alarm_->Set(clock_->ApproximateNow());
2969 }
2970}
2971
2972void QuicConnection::SetAlternativeDecrypter(
2973 EncryptionLevel level,
2974 std::unique_ptr<QuicDecrypter> decrypter,
2975 bool latch_once_used) {
2976 framer_.SetAlternativeDecrypter(level, std::move(decrypter), latch_once_used);
2977
2978 if (!undecryptable_packets_.empty() &&
2979 !process_undecryptable_packets_alarm_->IsSet()) {
2980 process_undecryptable_packets_alarm_->Set(clock_->ApproximateNow());
2981 }
2982}
2983
zhongyi546cc452019-04-12 15:27:49 -07002984void QuicConnection::InstallDecrypter(
2985 EncryptionLevel level,
2986 std::unique_ptr<QuicDecrypter> decrypter) {
2987 framer_.InstallDecrypter(level, std::move(decrypter));
2988 if (!undecryptable_packets_.empty() &&
2989 !process_undecryptable_packets_alarm_->IsSet()) {
2990 process_undecryptable_packets_alarm_->Set(clock_->ApproximateNow());
2991 }
2992}
2993
2994void QuicConnection::RemoveDecrypter(EncryptionLevel level) {
2995 framer_.RemoveDecrypter(level);
2996}
2997
QUICHE teama6ef0a62019-03-07 20:34:33 -05002998const QuicDecrypter* QuicConnection::decrypter() const {
2999 return framer_.decrypter();
3000}
3001
3002const QuicDecrypter* QuicConnection::alternative_decrypter() const {
3003 return framer_.alternative_decrypter();
3004}
3005
3006void QuicConnection::QueueUndecryptablePacket(
3007 const QuicEncryptedPacket& packet) {
3008 QUIC_DVLOG(1) << ENDPOINT << "Queueing undecryptable packet.";
3009 undecryptable_packets_.push_back(packet.Clone());
3010}
3011
3012void QuicConnection::MaybeProcessUndecryptablePackets() {
3013 process_undecryptable_packets_alarm_->Cancel();
3014
QUICHE team6987b4a2019-03-15 16:23:04 -07003015 if (undecryptable_packets_.empty() ||
3016 encryption_level_ == ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05003017 return;
3018 }
3019
3020 while (connected_ && !undecryptable_packets_.empty()) {
3021 // Making sure there is no pending frames when processing next undecrypted
3022 // packet because the queued ack frame may change.
3023 packet_generator_.FlushAllQueuedFrames();
3024 if (!connected_) {
3025 return;
3026 }
3027 QUIC_DVLOG(1) << ENDPOINT << "Attempting to process undecryptable packet";
3028 QuicEncryptedPacket* packet = undecryptable_packets_.front().get();
3029 if (!framer_.ProcessPacket(*packet) &&
3030 framer_.error() == QUIC_DECRYPTION_FAILURE) {
3031 QUIC_DVLOG(1) << ENDPOINT << "Unable to process undecryptable packet...";
3032 break;
3033 }
3034 QUIC_DVLOG(1) << ENDPOINT << "Processed undecryptable packet!";
3035 ++stats_.packets_processed;
3036 undecryptable_packets_.pop_front();
3037 }
3038
3039 // Once forward secure encryption is in use, there will be no
3040 // new keys installed and hence any undecryptable packets will
3041 // never be able to be decrypted.
3042 if (encryption_level_ == ENCRYPTION_FORWARD_SECURE) {
3043 if (debug_visitor_ != nullptr) {
3044 // TODO(rtenneti): perhaps more efficient to pass the number of
3045 // undecryptable packets as the argument to OnUndecryptablePacket so that
3046 // we just need to call OnUndecryptablePacket once?
3047 for (size_t i = 0; i < undecryptable_packets_.size(); ++i) {
3048 debug_visitor_->OnUndecryptablePacket();
3049 }
3050 }
3051 undecryptable_packets_.clear();
3052 }
3053}
3054
3055void QuicConnection::QueueCoalescedPacket(const QuicEncryptedPacket& packet) {
3056 QUIC_DVLOG(1) << ENDPOINT << "Queueing coalesced packet.";
3057 coalesced_packets_.push_back(packet.Clone());
3058}
3059
3060void QuicConnection::MaybeProcessCoalescedPackets() {
3061 bool processed = false;
3062 for (const auto& packet : coalesced_packets_) {
3063 if (!connected_) {
3064 return;
3065 }
3066
3067 // }
3068 // while (connected_ && !coalesced_packets_.empty()) {
3069 QUIC_DVLOG(1) << ENDPOINT << "Processing coalesced packet";
3070 // QuicEncryptedPacket* packet = coalesced_packets_.front().get();
3071 if (framer_.ProcessPacket(*packet)) {
3072 processed = true;
3073 } else {
3074 // If we are unable to decrypt this packet, it might be
3075 // because the CHLO or SHLO packet was lost.
3076 if (framer_.error() == QUIC_DECRYPTION_FAILURE) {
dschinazi6ece5002019-05-22 06:35:49 -07003077 ++stats_.undecryptable_packets_received;
QUICHE teama6ef0a62019-03-07 20:34:33 -05003078 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE &&
3079 undecryptable_packets_.size() < max_undecryptable_packets_) {
3080 QueueUndecryptablePacket(*packet);
3081 } else if (debug_visitor_ != nullptr) {
3082 debug_visitor_->OnUndecryptablePacket();
3083 }
3084 }
3085 }
3086 // coalesced_packets_.pop_front();
3087 }
3088 coalesced_packets_.clear();
3089 if (processed) {
3090 MaybeProcessUndecryptablePackets();
3091 }
3092}
3093
3094void QuicConnection::CloseConnection(
3095 QuicErrorCode error,
vasilvvc48c8712019-03-11 13:38:16 -07003096 const std::string& error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05003097 ConnectionCloseBehavior connection_close_behavior) {
3098 DCHECK(!error_details.empty());
3099 if (!connected_) {
3100 QUIC_DLOG(INFO) << "Connection is already closed.";
3101 return;
3102 }
3103
3104 QUIC_DLOG(INFO) << ENDPOINT << "Closing connection: " << connection_id()
3105 << ", with error: " << QuicErrorCodeToString(error) << " ("
3106 << error << "), and details: " << error_details;
3107
ianswettdc1e7ab2019-05-03 16:10:44 -07003108 if (connection_close_behavior != ConnectionCloseBehavior::SILENT_CLOSE) {
3109 SendConnectionClosePacket(error, error_details);
QUICHE teama6ef0a62019-03-07 20:34:33 -05003110 }
3111
3112 ConnectionCloseSource source = ConnectionCloseSource::FROM_SELF;
3113 if (perspective_ == Perspective::IS_CLIENT &&
3114 error == QUIC_CRYPTO_HANDSHAKE_STATELESS_REJECT) {
3115 // Regard stateless rejected connection as closed by server.
3116 source = ConnectionCloseSource::FROM_PEER;
3117 }
3118 TearDownLocalConnectionState(error, error_details, source);
3119}
3120
3121void QuicConnection::SendConnectionClosePacket(QuicErrorCode error,
ianswettdc1e7ab2019-05-03 16:10:44 -07003122 const std::string& details) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05003123 QUIC_DLOG(INFO) << ENDPOINT << "Sending connection close packet.";
QUICHE team2252b702019-05-14 23:55:14 -04003124 SetDefaultEncryptionLevel(GetConnectionCloseEncryptionLevel());
QUICHE teama6ef0a62019-03-07 20:34:33 -05003125 ClearQueuedPackets();
ianswettdc1e7ab2019-05-03 16:10:44 -07003126 // If there was a packet write error, write the smallest close possible.
3127 AckBundling ack_mode = (error == QUIC_PACKET_WRITE_ERROR) ? NO_ACK : SEND_ACK;
QUICHE teama6ef0a62019-03-07 20:34:33 -05003128 ScopedPacketFlusher flusher(this, ack_mode);
QUICHE teamcd098022019-03-22 18:49:55 -07003129 // When multiple packet number spaces is supported, an ACK frame will be
3130 // bundled when connection is not write blocked.
3131 if (!SupportsMultiplePacketNumberSpaces() &&
3132 packet_generator_.deprecate_ack_bundling_mode() && ack_mode == SEND_ACK &&
QUICHE teama6ef0a62019-03-07 20:34:33 -05003133 !GetUpdatedAckFrame().ack_frame->packets.Empty()) {
3134 SendAck();
3135 }
fkastenholze9d71a82019-04-09 05:12:13 -07003136 QuicConnectionCloseFrame* frame =
3137 new QuicConnectionCloseFrame(error, details);
fkastenholz04bd4f32019-04-16 12:24:38 -07003138 // If version99/IETF QUIC set the close type. Default close type is Google
3139 // QUIC.
fkastenholz72f509b2019-04-10 09:17:49 -07003140 if (transport_version() == QUIC_VERSION_99) {
3141 frame->close_type = IETF_QUIC_TRANSPORT_CONNECTION_CLOSE;
3142 }
fayang3203f252019-05-03 06:00:03 -07003143 packet_generator_.ConsumeRetransmittableControlFrame(QuicFrame(frame));
QUICHE teama6ef0a62019-03-07 20:34:33 -05003144 packet_generator_.FlushAllQueuedFrames();
3145}
3146
3147void QuicConnection::TearDownLocalConnectionState(
3148 QuicErrorCode error,
vasilvvc48c8712019-03-11 13:38:16 -07003149 const std::string& error_details,
QUICHE teama6ef0a62019-03-07 20:34:33 -05003150 ConnectionCloseSource source) {
3151 if (!connected_) {
3152 QUIC_DLOG(INFO) << "Connection is already closed.";
3153 return;
3154 }
3155
3156 // If we are using a batch writer, flush packets queued in it, if any.
3157 FlushPackets();
3158 connected_ = false;
3159 DCHECK(visitor_ != nullptr);
3160 visitor_->OnConnectionClosed(error, error_details, source);
3161 if (debug_visitor_ != nullptr) {
3162 debug_visitor_->OnConnectionClosed(error, error_details, source);
3163 }
3164 // Cancel the alarms so they don't trigger any action now that the
3165 // connection is closed.
3166 CancelAllAlarms();
3167}
3168
3169void QuicConnection::CancelAllAlarms() {
3170 QUIC_DVLOG(1) << "Cancelling all QuicConnection alarms.";
3171
3172 ack_alarm_->Cancel();
3173 ping_alarm_->Cancel();
3174 retransmission_alarm_->Cancel();
3175 send_alarm_->Cancel();
3176 timeout_alarm_->Cancel();
3177 mtu_discovery_alarm_->Cancel();
3178 path_degrading_alarm_->Cancel();
renjietang11e4a3d2019-05-03 11:27:26 -07003179 process_undecryptable_packets_alarm_->Cancel();
QUICHE teama6ef0a62019-03-07 20:34:33 -05003180}
3181
3182QuicByteCount QuicConnection::max_packet_length() const {
3183 return packet_generator_.GetCurrentMaxPacketLength();
3184}
3185
3186void QuicConnection::SetMaxPacketLength(QuicByteCount length) {
3187 long_term_mtu_ = length;
3188 packet_generator_.SetMaxPacketLength(GetLimitedMaxPacketSize(length));
3189}
3190
3191bool QuicConnection::HasQueuedData() const {
3192 return pending_version_negotiation_packet_ || !queued_packets_.empty() ||
3193 packet_generator_.HasQueuedFrames();
3194}
3195
3196void QuicConnection::EnableSavingCryptoPackets() {
3197 save_crypto_packets_as_termination_packets_ = true;
3198}
3199
3200bool QuicConnection::CanWriteStreamData() {
3201 // Don't write stream data if there are negotiation or queued data packets
3202 // to send. Otherwise, continue and bundle as many frames as possible.
3203 if (pending_version_negotiation_packet_ || !queued_packets_.empty()) {
3204 return false;
3205 }
3206
3207 IsHandshake pending_handshake =
3208 visitor_->HasPendingHandshake() ? IS_HANDSHAKE : NOT_HANDSHAKE;
3209 // Sending queued packets may have caused the socket to become write blocked,
3210 // or the congestion manager to prohibit sending. If we've sent everything
3211 // we had queued and we're still not blocked, let the visitor know it can
3212 // write more.
3213 return ShouldGeneratePacket(HAS_RETRANSMITTABLE_DATA, pending_handshake);
3214}
3215
3216void QuicConnection::SetNetworkTimeouts(QuicTime::Delta handshake_timeout,
3217 QuicTime::Delta idle_timeout) {
3218 QUIC_BUG_IF(idle_timeout > handshake_timeout)
3219 << "idle_timeout:" << idle_timeout.ToMilliseconds()
3220 << " handshake_timeout:" << handshake_timeout.ToMilliseconds();
3221 // Adjust the idle timeout on client and server to prevent clients from
3222 // sending requests to servers which have already closed the connection.
3223 if (perspective_ == Perspective::IS_SERVER) {
3224 idle_timeout = idle_timeout + QuicTime::Delta::FromSeconds(3);
3225 } else if (idle_timeout > QuicTime::Delta::FromSeconds(1)) {
3226 idle_timeout = idle_timeout - QuicTime::Delta::FromSeconds(1);
3227 }
3228 handshake_timeout_ = handshake_timeout;
3229 idle_network_timeout_ = idle_timeout;
3230
3231 SetTimeoutAlarm();
3232}
3233
3234void QuicConnection::CheckForTimeout() {
3235 QuicTime now = clock_->ApproximateNow();
3236 QuicTime time_of_last_packet =
3237 std::max(time_of_last_received_packet_,
3238 time_of_first_packet_sent_after_receiving_);
3239
3240 // |delta| can be < 0 as |now| is approximate time but |time_of_last_packet|
3241 // is accurate time. However, this should not change the behavior of
3242 // timeout handling.
3243 QuicTime::Delta idle_duration = now - time_of_last_packet;
3244 QUIC_DVLOG(1) << ENDPOINT << "last packet "
3245 << time_of_last_packet.ToDebuggingValue()
3246 << " now:" << now.ToDebuggingValue()
3247 << " idle_duration:" << idle_duration.ToMicroseconds()
3248 << " idle_network_timeout: "
3249 << idle_network_timeout_.ToMicroseconds();
3250 if (idle_duration >= idle_network_timeout_) {
vasilvvc48c8712019-03-11 13:38:16 -07003251 const std::string error_details = "No recent network activity.";
QUICHE teama6ef0a62019-03-07 20:34:33 -05003252 QUIC_DVLOG(1) << ENDPOINT << error_details;
3253 if ((sent_packet_manager_.GetConsecutiveTlpCount() > 0 ||
3254 sent_packet_manager_.GetConsecutiveRtoCount() > 0 ||
3255 visitor_->ShouldKeepConnectionAlive())) {
3256 CloseConnection(QUIC_NETWORK_IDLE_TIMEOUT, error_details,
3257 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
3258 } else {
3259 CloseConnection(QUIC_NETWORK_IDLE_TIMEOUT, error_details,
3260 idle_timeout_connection_close_behavior_);
3261 }
3262 return;
3263 }
3264
3265 if (!handshake_timeout_.IsInfinite()) {
3266 QuicTime::Delta connected_duration = now - stats_.connection_creation_time;
3267 QUIC_DVLOG(1) << ENDPOINT
3268 << "connection time: " << connected_duration.ToMicroseconds()
3269 << " handshake timeout: "
3270 << handshake_timeout_.ToMicroseconds();
3271 if (connected_duration >= handshake_timeout_) {
vasilvvc48c8712019-03-11 13:38:16 -07003272 const std::string error_details = "Handshake timeout expired.";
QUICHE teama6ef0a62019-03-07 20:34:33 -05003273 QUIC_DVLOG(1) << ENDPOINT << error_details;
3274 CloseConnection(QUIC_HANDSHAKE_TIMEOUT, error_details,
3275 ConnectionCloseBehavior::SEND_CONNECTION_CLOSE_PACKET);
3276 return;
3277 }
3278 }
3279
3280 SetTimeoutAlarm();
3281}
3282
3283void QuicConnection::SetTimeoutAlarm() {
3284 QuicTime time_of_last_packet =
3285 std::max(time_of_last_received_packet_,
3286 time_of_first_packet_sent_after_receiving_);
3287
3288 QuicTime deadline = time_of_last_packet + idle_network_timeout_;
3289 if (!handshake_timeout_.IsInfinite()) {
3290 deadline = std::min(deadline,
3291 stats_.connection_creation_time + handshake_timeout_);
3292 }
3293
3294 timeout_alarm_->Update(deadline, QuicTime::Delta::Zero());
3295}
3296
3297void QuicConnection::SetPingAlarm() {
3298 if (perspective_ == Perspective::IS_SERVER) {
ianswettb7f7cd22019-05-01 08:04:16 -07003299 // Only clients send pings to avoid NATs from timing out.
QUICHE teama6ef0a62019-03-07 20:34:33 -05003300 return;
3301 }
3302 if (!visitor_->ShouldKeepConnectionAlive()) {
3303 ping_alarm_->Cancel();
ianswettb7f7cd22019-05-01 08:04:16 -07003304 // Don't send a ping unless the application (ie: HTTP/3) says to, usually
3305 // because it is expecting a response from the server.
QUICHE teama6ef0a62019-03-07 20:34:33 -05003306 return;
3307 }
3308 if (retransmittable_on_wire_timeout_.IsInfinite() ||
3309 sent_packet_manager_.HasInFlightPackets()) {
3310 // Extend the ping alarm.
3311 ping_alarm_->Update(clock_->ApproximateNow() + ping_timeout_,
3312 QuicTime::Delta::FromSeconds(1));
3313 return;
3314 }
3315 DCHECK_LT(retransmittable_on_wire_timeout_, ping_timeout_);
3316 // If it's already set to an earlier time, then don't update it.
3317 if (ping_alarm_->IsSet() &&
3318 ping_alarm_->deadline() <
3319 clock_->ApproximateNow() + retransmittable_on_wire_timeout_) {
3320 return;
3321 }
3322 // Use a shorter timeout if there are open streams, but nothing on the wire.
3323 ping_alarm_->Update(
3324 clock_->ApproximateNow() + retransmittable_on_wire_timeout_,
3325 QuicTime::Delta::FromMilliseconds(1));
3326}
3327
3328void QuicConnection::SetRetransmissionAlarm() {
3329 if (packet_generator_.PacketFlusherAttached()) {
3330 pending_retransmission_alarm_ = true;
3331 return;
3332 }
3333 QuicTime retransmission_time = sent_packet_manager_.GetRetransmissionTime();
3334 retransmission_alarm_->Update(retransmission_time,
3335 QuicTime::Delta::FromMilliseconds(1));
3336}
3337
3338void QuicConnection::SetPathDegradingAlarm() {
3339 if (perspective_ == Perspective::IS_SERVER) {
3340 return;
3341 }
3342 const QuicTime::Delta delay = sent_packet_manager_.GetPathDegradingDelay();
3343 path_degrading_alarm_->Update(clock_->ApproximateNow() + delay,
3344 QuicTime::Delta::FromMilliseconds(1));
3345}
3346
3347void QuicConnection::MaybeSetMtuAlarm(QuicPacketNumber sent_packet_number) {
3348 // Do not set the alarm if the target size is less than the current size.
3349 // This covers the case when |mtu_discovery_target_| is at its default value,
3350 // zero.
3351 if (mtu_discovery_target_ <= max_packet_length()) {
3352 return;
3353 }
3354
3355 if (mtu_probe_count_ >= kMtuDiscoveryAttempts) {
3356 return;
3357 }
3358
3359 if (mtu_discovery_alarm_->IsSet()) {
3360 return;
3361 }
3362
3363 if (sent_packet_number >= next_mtu_probe_at_) {
3364 // Use an alarm to send the MTU probe to ensure that no ScopedPacketFlushers
3365 // are active.
3366 mtu_discovery_alarm_->Set(clock_->ApproximateNow());
3367 }
3368}
3369
3370void QuicConnection::MaybeSetAckAlarmTo(QuicTime time) {
3371 DCHECK(packet_generator_.deprecate_ack_bundling_mode());
3372 if (!ack_alarm_->IsSet() || ack_alarm_->deadline() > time) {
3373 ack_alarm_->Update(time, QuicTime::Delta::Zero());
3374 }
3375}
3376
3377QuicConnection::ScopedPacketFlusher::ScopedPacketFlusher(
3378 QuicConnection* connection,
3379 AckBundling ack_mode)
3380 : connection_(connection),
3381 flush_and_set_pending_retransmission_alarm_on_delete_(false) {
3382 if (connection_ == nullptr) {
3383 return;
3384 }
3385
3386 if (!connection_->packet_generator_.PacketFlusherAttached()) {
3387 flush_and_set_pending_retransmission_alarm_on_delete_ = true;
3388 connection->packet_generator_.AttachPacketFlusher();
3389 }
3390 if (connection_->packet_generator_.deprecate_ack_bundling_mode()) {
3391 return;
3392 }
3393
3394 // If caller wants us to include an ack, check the delayed-ack timer to see if
3395 // there's ack info to be sent.
3396 if (ShouldSendAck(ack_mode)) {
3397 if (!connection_->GetUpdatedAckFrame().ack_frame->packets.Empty()) {
3398 QUIC_DVLOG(1) << "Bundling ack with outgoing packet.";
3399 connection_->SendAck();
3400 }
3401 }
3402}
3403
3404bool QuicConnection::ScopedPacketFlusher::ShouldSendAck(
3405 AckBundling ack_mode) const {
3406 DCHECK(!connection_->packet_generator_.deprecate_ack_bundling_mode());
3407 // If the ack alarm is set, make sure the ack has been updated.
3408 DCHECK(!connection_->ack_alarm_->IsSet() || connection_->ack_frame_updated())
3409 << "ack_mode:" << ack_mode;
3410 switch (ack_mode) {
3411 case SEND_ACK:
3412 return true;
3413 case SEND_ACK_IF_QUEUED:
3414 return connection_->ack_queued();
3415 case SEND_ACK_IF_PENDING:
3416 return connection_->ack_alarm_->IsSet() ||
3417 connection_->stop_waiting_count_ > 1;
3418 case NO_ACK:
3419 return false;
3420 default:
3421 QUIC_BUG << "Unsupported ack_mode.";
3422 return true;
3423 }
3424}
3425
3426QuicConnection::ScopedPacketFlusher::~ScopedPacketFlusher() {
3427 if (connection_ == nullptr) {
3428 return;
3429 }
3430
3431 if (flush_and_set_pending_retransmission_alarm_on_delete_) {
3432 if (connection_->packet_generator_.deprecate_ack_bundling_mode()) {
3433 if (connection_->received_packet_manager_.decide_when_to_send_acks()) {
3434 const QuicTime ack_timeout =
QUICHE teamb23daa72019-03-21 08:37:48 -07003435 connection_->use_uber_received_packet_manager_
QUICHE teamcd098022019-03-22 18:49:55 -07003436 ? connection_->uber_received_packet_manager_
3437 .GetEarliestAckTimeout()
QUICHE teamb23daa72019-03-21 08:37:48 -07003438 : connection_->received_packet_manager_.ack_timeout();
QUICHE teama6ef0a62019-03-07 20:34:33 -05003439 if (ack_timeout.IsInitialized()) {
3440 if (ack_timeout <= connection_->clock_->ApproximateNow() &&
3441 !connection_->CanWrite(NO_RETRANSMITTABLE_DATA)) {
3442 // Cancel ACK alarm if connection is write blocked, and ACK will be
3443 // sent when connection gets unblocked.
3444 connection_->ack_alarm_->Cancel();
3445 } else {
3446 connection_->MaybeSetAckAlarmTo(ack_timeout);
3447 }
3448 }
3449 }
3450 if (connection_->ack_alarm_->IsSet() &&
3451 connection_->ack_alarm_->deadline() <=
3452 connection_->clock_->ApproximateNow()) {
3453 // An ACK needs to be sent right now. This ACK did not get bundled
3454 // because either there was no data to write or packets were marked as
3455 // received after frames were queued in the generator.
3456 if (connection_->send_alarm_->IsSet() &&
3457 connection_->send_alarm_->deadline() <=
3458 connection_->clock_->ApproximateNow()) {
3459 // If send alarm will go off soon, let send alarm send the ACK.
3460 connection_->ack_alarm_->Cancel();
3461 if (!connection_->received_packet_manager_
3462 .decide_when_to_send_acks()) {
3463 connection_->send_ack_when_on_can_write_ = true;
3464 }
QUICHE teamcd098022019-03-22 18:49:55 -07003465 } else if (connection_->SupportsMultiplePacketNumberSpaces()) {
3466 connection_->SendAllPendingAcks();
QUICHE teama6ef0a62019-03-07 20:34:33 -05003467 } else {
3468 connection_->SendAck();
3469 }
3470 }
3471 }
3472 connection_->packet_generator_.Flush();
3473 connection_->FlushPackets();
3474 if (connection_->session_decides_what_to_write()) {
3475 // Reset transmission type.
3476 connection_->SetTransmissionType(NOT_RETRANSMISSION);
3477 }
3478
3479 // Once all transmissions are done, check if there is any outstanding data
3480 // to send and notify the congestion controller if not.
3481 //
3482 // Note that this means that the application limited check will happen as
3483 // soon as the last flusher gets destroyed, which is typically after a
3484 // single stream write is finished. This means that if all the data from a
3485 // single write goes through the connection, the application-limited signal
3486 // will fire even if the caller does a write operation immediately after.
3487 // There are two important approaches to remedy this situation:
3488 // (1) Instantiate ScopedPacketFlusher before performing multiple subsequent
3489 // writes, thus deferring this check until all writes are done.
3490 // (2) Write data in chunks sufficiently large so that they cause the
3491 // connection to be limited by the congestion control. Typically, this
3492 // would mean writing chunks larger than the product of the current
3493 // pacing rate and the pacer granularity. So, for instance, if the
3494 // pacing rate of the connection is 1 Gbps, and the pacer granularity is
3495 // 1 ms, the caller should send at least 125k bytes in order to not
3496 // be marked as application-limited.
3497 connection_->CheckIfApplicationLimited();
3498
3499 if (connection_->pending_retransmission_alarm_) {
3500 connection_->SetRetransmissionAlarm();
3501 connection_->pending_retransmission_alarm_ = false;
3502 }
3503 }
3504 DCHECK_EQ(flush_and_set_pending_retransmission_alarm_on_delete_,
3505 !connection_->packet_generator_.PacketFlusherAttached());
3506}
3507
3508HasRetransmittableData QuicConnection::IsRetransmittable(
3509 const SerializedPacket& packet) {
3510 // Retransmitted packets retransmittable frames are owned by the unacked
3511 // packet map, but are not present in the serialized packet.
3512 if (packet.transmission_type != NOT_RETRANSMISSION ||
3513 !packet.retransmittable_frames.empty()) {
3514 return HAS_RETRANSMITTABLE_DATA;
3515 } else {
3516 return NO_RETRANSMITTABLE_DATA;
3517 }
3518}
3519
3520bool QuicConnection::IsTerminationPacket(const SerializedPacket& packet) {
3521 if (packet.retransmittable_frames.empty()) {
3522 return false;
3523 }
3524 for (const QuicFrame& frame : packet.retransmittable_frames) {
3525 if (frame.type == CONNECTION_CLOSE_FRAME) {
3526 return true;
3527 }
3528 if (save_crypto_packets_as_termination_packets_ &&
3529 QuicUtils::IsHandshakeFrame(frame, transport_version())) {
3530 return true;
3531 }
3532 }
3533 return false;
3534}
3535
3536void QuicConnection::SetMtuDiscoveryTarget(QuicByteCount target) {
3537 mtu_discovery_target_ = GetLimitedMaxPacketSize(target);
3538}
3539
3540QuicByteCount QuicConnection::GetLimitedMaxPacketSize(
3541 QuicByteCount suggested_max_packet_size) {
3542 if (!peer_address_.IsInitialized()) {
3543 QUIC_BUG << "Attempted to use a connection without a valid peer address";
3544 return suggested_max_packet_size;
3545 }
3546
3547 const QuicByteCount writer_limit = writer_->GetMaxPacketSize(peer_address());
3548
3549 QuicByteCount max_packet_size = suggested_max_packet_size;
3550 if (max_packet_size > writer_limit) {
3551 max_packet_size = writer_limit;
3552 }
dschinazi66dea072019-04-09 11:41:06 -07003553 if (max_packet_size > kMaxOutgoingPacketSize) {
3554 max_packet_size = kMaxOutgoingPacketSize;
QUICHE teama6ef0a62019-03-07 20:34:33 -05003555 }
3556 return max_packet_size;
3557}
3558
3559void QuicConnection::SendMtuDiscoveryPacket(QuicByteCount target_mtu) {
3560 // Currently, this limit is ensured by the caller.
3561 DCHECK_EQ(target_mtu, GetLimitedMaxPacketSize(target_mtu));
3562
3563 // Send the probe.
3564 packet_generator_.GenerateMtuDiscoveryPacket(target_mtu);
3565}
3566
3567// TODO(zhongyi): change this method to generate a connectivity probing packet
3568// and let the caller to call writer to write the packet and handle write
3569// status.
3570bool QuicConnection::SendConnectivityProbingPacket(
3571 QuicPacketWriter* probing_writer,
3572 const QuicSocketAddress& peer_address) {
3573 return SendGenericPathProbePacket(probing_writer, peer_address,
3574 /* is_response= */ false);
3575}
3576
3577void QuicConnection::SendConnectivityProbingResponsePacket(
3578 const QuicSocketAddress& peer_address) {
3579 SendGenericPathProbePacket(nullptr, peer_address,
3580 /* is_response= */ true);
3581}
3582
3583bool QuicConnection::SendGenericPathProbePacket(
3584 QuicPacketWriter* probing_writer,
3585 const QuicSocketAddress& peer_address,
3586 bool is_response) {
3587 DCHECK(peer_address.IsInitialized());
3588 if (!connected_) {
3589 QUIC_BUG << "Not sending connectivity probing packet as connection is "
3590 << "disconnected.";
3591 return false;
3592 }
3593 if (perspective_ == Perspective::IS_SERVER && probing_writer == nullptr) {
3594 // Server can use default packet writer to write packet.
3595 probing_writer = writer_;
3596 }
3597 DCHECK(probing_writer);
3598
3599 if (probing_writer->IsWriteBlocked()) {
3600 QUIC_DLOG(INFO)
3601 << ENDPOINT
3602 << "Writer blocked when sending connectivity probing packet.";
3603 if (probing_writer == writer_) {
3604 // Visitor should not be write blocked if the probing writer is not the
3605 // default packet writer.
3606 visitor_->OnWriteBlocked();
3607 }
3608 return true;
3609 }
3610
3611 QUIC_DLOG(INFO) << ENDPOINT
3612 << "Sending path probe packet for connection_id = "
dschinazi7b9278c2019-05-20 07:36:21 -07003613 << server_connection_id_;
QUICHE teama6ef0a62019-03-07 20:34:33 -05003614
3615 OwningSerializedPacketPointer probing_packet;
3616 if (transport_version() != QUIC_VERSION_99) {
3617 // Non-IETF QUIC, generate a padded ping regardless of whether this is a
3618 // request or a response.
3619 probing_packet = packet_generator_.SerializeConnectivityProbingPacket();
3620 } else {
3621 if (is_response) {
3622 // Respond using IETF QUIC PATH_RESPONSE frame
3623 if (IsCurrentPacketConnectivityProbing()) {
3624 // Pad the response if the request was a google connectivity probe
3625 // (padded).
3626 probing_packet =
3627 packet_generator_.SerializePathResponseConnectivityProbingPacket(
3628 received_path_challenge_payloads_, /* is_padded = */ true);
3629 received_path_challenge_payloads_.clear();
3630 } else {
3631 // Do not pad the response if the path challenge was not a google
3632 // connectivity probe.
3633 probing_packet =
3634 packet_generator_.SerializePathResponseConnectivityProbingPacket(
3635 received_path_challenge_payloads_,
3636 /* is_padded = */ false);
3637 received_path_challenge_payloads_.clear();
3638 }
3639 } else {
3640 // Request using IETF QUIC PATH_CHALLENGE frame
3641 transmitted_connectivity_probe_payload_ =
3642 QuicMakeUnique<QuicPathFrameBuffer>();
3643 probing_packet =
3644 packet_generator_.SerializePathChallengeConnectivityProbingPacket(
3645 transmitted_connectivity_probe_payload_.get());
3646 if (!probing_packet) {
3647 transmitted_connectivity_probe_payload_ = nullptr;
3648 }
3649 }
3650 }
3651
3652 DCHECK_EQ(IsRetransmittable(*probing_packet), NO_RETRANSMITTABLE_DATA);
3653
3654 const QuicTime packet_send_time = clock_->Now();
3655 WriteResult result = probing_writer->WritePacket(
3656 probing_packet->encrypted_buffer, probing_packet->encrypted_length,
3657 self_address().host(), peer_address, per_packet_options_);
3658
3659 // If using a batch writer and the probing packet is buffered, flush it.
3660 if (probing_writer->IsBatchMode() && result.status == WRITE_STATUS_OK &&
3661 result.bytes_written == 0) {
3662 result = probing_writer->Flush();
3663 }
3664
3665 if (IsWriteError(result.status)) {
3666 // Write error for any connectivity probe should not affect the connection
3667 // as it is sent on a different path.
3668 QUIC_DLOG(INFO) << ENDPOINT << "Write probing packet failed with error = "
3669 << result.error_code;
3670 return false;
3671 }
3672
3673 if (debug_visitor_ != nullptr) {
3674 debug_visitor_->OnPacketSent(
3675 *probing_packet, probing_packet->original_packet_number,
3676 probing_packet->transmission_type, packet_send_time);
3677 }
3678
3679 // Call OnPacketSent regardless of the write result.
3680 sent_packet_manager_.OnPacketSent(
3681 probing_packet.get(), probing_packet->original_packet_number,
3682 packet_send_time, probing_packet->transmission_type,
3683 NO_RETRANSMITTABLE_DATA);
3684
3685 if (IsWriteBlockedStatus(result.status)) {
3686 if (probing_writer == writer_) {
3687 // Visitor should not be write blocked if the probing writer is not the
3688 // default packet writer.
3689 visitor_->OnWriteBlocked();
3690 }
3691 if (result.status == WRITE_STATUS_BLOCKED_DATA_BUFFERED) {
3692 QUIC_DLOG(INFO) << ENDPOINT << "Write probing packet blocked";
3693 }
3694 }
3695
3696 return true;
3697}
3698
3699void QuicConnection::DiscoverMtu() {
3700 DCHECK(!mtu_discovery_alarm_->IsSet());
3701
3702 // Check if the MTU has been already increased.
3703 if (mtu_discovery_target_ <= max_packet_length()) {
3704 return;
3705 }
3706
3707 // Calculate the packet number of the next probe *before* sending the current
3708 // one. Otherwise, when SendMtuDiscoveryPacket() is called,
3709 // MaybeSetMtuAlarm() will not realize that the probe has been just sent, and
3710 // will reschedule this probe again.
3711 packets_between_mtu_probes_ *= 2;
3712 next_mtu_probe_at_ = sent_packet_manager_.GetLargestSentPacket() +
3713 packets_between_mtu_probes_ + 1;
3714 ++mtu_probe_count_;
3715
3716 QUIC_DVLOG(2) << "Sending a path MTU discovery packet #" << mtu_probe_count_;
3717 SendMtuDiscoveryPacket(mtu_discovery_target_);
3718
3719 DCHECK(!mtu_discovery_alarm_->IsSet());
3720}
3721
3722void QuicConnection::OnEffectivePeerMigrationValidated() {
3723 if (active_effective_peer_migration_type_ == NO_CHANGE) {
3724 QUIC_BUG << "No migration underway.";
3725 return;
3726 }
3727 highest_packet_sent_before_effective_peer_migration_.Clear();
3728 active_effective_peer_migration_type_ = NO_CHANGE;
3729}
3730
3731void QuicConnection::StartEffectivePeerMigration(AddressChangeType type) {
3732 // TODO(fayang): Currently, all peer address change type are allowed. Need to
3733 // add a method ShouldAllowPeerAddressChange(PeerAddressChangeType type) to
3734 // determine whether |type| is allowed.
3735 if (type == NO_CHANGE) {
3736 QUIC_BUG << "EffectivePeerMigration started without address change.";
3737 return;
3738 }
3739 QUIC_DLOG(INFO) << ENDPOINT << "Effective peer's ip:port changed from "
3740 << effective_peer_address_.ToString() << " to "
3741 << GetEffectivePeerAddressFromCurrentPacket().ToString()
3742 << ", address change type is " << type
3743 << ", migrating connection.";
3744
3745 highest_packet_sent_before_effective_peer_migration_ =
3746 sent_packet_manager_.GetLargestSentPacket();
3747 effective_peer_address_ = GetEffectivePeerAddressFromCurrentPacket();
3748 active_effective_peer_migration_type_ = type;
3749
3750 // TODO(wub): Move these calls to OnEffectivePeerMigrationValidated.
3751 OnConnectionMigration(type);
3752}
3753
3754void QuicConnection::OnConnectionMigration(AddressChangeType addr_change_type) {
3755 visitor_->OnConnectionMigration(addr_change_type);
3756 sent_packet_manager_.OnConnectionMigration(addr_change_type);
3757}
3758
3759bool QuicConnection::IsCurrentPacketConnectivityProbing() const {
3760 return is_current_packet_connectivity_probing_;
3761}
3762
3763bool QuicConnection::ack_frame_updated() const {
QUICHE teamb23daa72019-03-21 08:37:48 -07003764 if (use_uber_received_packet_manager_) {
QUICHE team1dfa46b2019-03-22 10:39:10 -07003765 return uber_received_packet_manager_.IsAckFrameUpdated();
QUICHE teamb23daa72019-03-21 08:37:48 -07003766 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003767 return received_packet_manager_.ack_frame_updated();
3768}
3769
3770QuicStringPiece QuicConnection::GetCurrentPacket() {
3771 if (current_packet_data_ == nullptr) {
3772 return QuicStringPiece();
3773 }
3774 return QuicStringPiece(current_packet_data_, last_size_);
3775}
3776
3777bool QuicConnection::MaybeConsiderAsMemoryCorruption(
3778 const QuicStreamFrame& frame) {
nharper46833c32019-05-15 21:33:05 -07003779 if (QuicUtils::IsCryptoStreamId(transport_version(), frame.stream_id) ||
QUICHE team6987b4a2019-03-15 16:23:04 -07003780 last_decrypted_packet_level_ != ENCRYPTION_INITIAL) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05003781 return false;
3782 }
3783
3784 if (perspective_ == Perspective::IS_SERVER &&
3785 frame.data_length >= sizeof(kCHLO) &&
3786 strncmp(frame.data_buffer, reinterpret_cast<const char*>(&kCHLO),
3787 sizeof(kCHLO)) == 0) {
3788 return true;
3789 }
3790
3791 if (perspective_ == Perspective::IS_CLIENT &&
3792 frame.data_length >= sizeof(kREJ) &&
3793 strncmp(frame.data_buffer, reinterpret_cast<const char*>(&kREJ),
3794 sizeof(kREJ)) == 0) {
3795 return true;
3796 }
3797
3798 return false;
3799}
3800
3801void QuicConnection::MaybeSendProbingRetransmissions() {
3802 DCHECK(fill_up_link_during_probing_);
3803
3804 // Don't send probing retransmissions until the handshake has completed.
3805 if (!sent_packet_manager_.handshake_confirmed() ||
3806 sent_packet_manager().HasUnackedCryptoPackets()) {
3807 return;
3808 }
3809
3810 if (probing_retransmission_pending_) {
3811 QUIC_BUG << "MaybeSendProbingRetransmissions is called while another call "
3812 "to it is already in progress";
3813 return;
3814 }
3815
3816 probing_retransmission_pending_ = true;
3817 SendProbingRetransmissions();
3818 probing_retransmission_pending_ = false;
3819}
3820
3821void QuicConnection::CheckIfApplicationLimited() {
3822 if (session_decides_what_to_write() && probing_retransmission_pending_) {
3823 return;
3824 }
3825
3826 bool application_limited =
3827 queued_packets_.empty() &&
3828 !sent_packet_manager_.HasPendingRetransmissions() &&
3829 !visitor_->WillingAndAbleToWrite();
3830
3831 if (!application_limited) {
3832 return;
3833 }
3834
3835 if (fill_up_link_during_probing_) {
3836 MaybeSendProbingRetransmissions();
3837 if (!CanWrite(HAS_RETRANSMITTABLE_DATA)) {
3838 return;
3839 }
3840 }
3841
3842 sent_packet_manager_.OnApplicationLimited();
3843}
3844
3845void QuicConnection::UpdatePacketContent(PacketContent type) {
3846 if (current_packet_content_ == NOT_PADDED_PING) {
3847 // We have already learned the current packet is not a connectivity
3848 // probing packet. Peer migration should have already been started earlier
3849 // if needed.
3850 return;
3851 }
3852
3853 if (type == NO_FRAMES_RECEIVED) {
3854 return;
3855 }
3856
3857 if (type == FIRST_FRAME_IS_PING) {
3858 if (current_packet_content_ == NO_FRAMES_RECEIVED) {
3859 current_packet_content_ = FIRST_FRAME_IS_PING;
3860 return;
3861 }
3862 }
3863
3864 // In Google QUIC we look for a packet with just a PING and PADDING.
3865 // For IETF QUIC, the packet must consist of just a PATH_CHALLENGE frame,
3866 // followed by PADDING. If the condition is met, mark things as
3867 // connectivity-probing, causing later processing to generate the correct
3868 // response.
3869 if (type == SECOND_FRAME_IS_PADDING &&
3870 current_packet_content_ == FIRST_FRAME_IS_PING) {
3871 current_packet_content_ = SECOND_FRAME_IS_PADDING;
3872 if (perspective_ == Perspective::IS_SERVER) {
3873 is_current_packet_connectivity_probing_ =
3874 current_effective_peer_migration_type_ != NO_CHANGE;
3875 } else {
3876 is_current_packet_connectivity_probing_ =
3877 (last_packet_source_address_ != peer_address_) ||
3878 (last_packet_destination_address_ != self_address_);
3879 }
3880 return;
3881 }
3882
3883 current_packet_content_ = NOT_PADDED_PING;
QUICHE team1f3de242019-03-20 07:24:48 -07003884 if (GetLargestReceivedPacket().IsInitialized() &&
3885 last_header_.packet_number == GetLargestReceivedPacket()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05003886 direct_peer_address_ = last_packet_source_address_;
3887 if (current_effective_peer_migration_type_ != NO_CHANGE) {
3888 // Start effective peer migration immediately when the current packet is
3889 // confirmed not a connectivity probing packet.
QUICHE team1f3de242019-03-20 07:24:48 -07003890 // TODO(fayang): When multiple packet number spaces is supported, only
3891 // start peer migration for the application data.
QUICHE teama6ef0a62019-03-07 20:34:33 -05003892 StartEffectivePeerMigration(current_effective_peer_migration_type_);
3893 }
3894 }
3895 current_effective_peer_migration_type_ = NO_CHANGE;
3896}
3897
3898void QuicConnection::MaybeEnableSessionDecidesWhatToWrite() {
3899 // Only enable session decides what to write code path for version 42+,
3900 // because it needs the receiver to allow receiving overlapping stream data.
3901 const bool enable_session_decides_what_to_write =
3902 transport_version() > QUIC_VERSION_39;
3903 sent_packet_manager_.SetSessionDecideWhatToWrite(
3904 enable_session_decides_what_to_write);
3905 packet_generator_.SetCanSetTransmissionType(
3906 enable_session_decides_what_to_write);
3907}
3908
3909void QuicConnection::PostProcessAfterAckFrame(bool send_stop_waiting,
3910 bool acked_new_packet) {
3911 if (no_stop_waiting_frames_) {
QUICHE teamb23daa72019-03-21 08:37:48 -07003912 if (use_uber_received_packet_manager_) {
3913 uber_received_packet_manager_.DontWaitForPacketsBefore(
QUICHE team1dfa46b2019-03-22 10:39:10 -07003914 last_decrypted_packet_level_,
QUICHE teamb23daa72019-03-21 08:37:48 -07003915 sent_packet_manager_.largest_packet_peer_knows_is_acked());
3916 } else {
3917 received_packet_manager_.DontWaitForPacketsBefore(
3918 sent_packet_manager_.largest_packet_peer_knows_is_acked());
3919 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003920 }
3921 // Always reset the retransmission alarm when an ack comes in, since we now
3922 // have a better estimate of the current rtt than when it was set.
3923 SetRetransmissionAlarm();
3924 MaybeSetPathDegradingAlarm(acked_new_packet);
3925
QUICHE teama6ef0a62019-03-07 20:34:33 -05003926 if (send_stop_waiting) {
3927 ++stop_waiting_count_;
3928 } else {
3929 stop_waiting_count_ = 0;
3930 }
3931}
3932
3933void QuicConnection::MaybeSetPathDegradingAlarm(bool acked_new_packet) {
3934 if (!sent_packet_manager_.HasInFlightPackets()) {
3935 // There are no retransmittable packets on the wire, so it's impossible to
3936 // say if the connection has degraded.
3937 path_degrading_alarm_->Cancel();
3938 } else if (acked_new_packet) {
3939 // A previously-unacked packet has been acked, which means forward progress
3940 // has been made. Unset |is_path_degrading| if the path was considered as
3941 // degrading previously. Set/update the path degrading alarm.
3942 is_path_degrading_ = false;
3943 SetPathDegradingAlarm();
3944 }
3945}
3946
3947void QuicConnection::SetSessionNotifier(
3948 SessionNotifierInterface* session_notifier) {
3949 sent_packet_manager_.SetSessionNotifier(session_notifier);
3950}
3951
3952void QuicConnection::SetDataProducer(
3953 QuicStreamFrameDataProducer* data_producer) {
3954 framer_.set_data_producer(data_producer);
3955}
3956
3957void QuicConnection::SetTransmissionType(TransmissionType type) {
3958 packet_generator_.SetTransmissionType(type);
3959}
3960
3961bool QuicConnection::session_decides_what_to_write() const {
3962 return sent_packet_manager_.session_decides_what_to_write();
3963}
3964
3965void QuicConnection::UpdateReleaseTimeIntoFuture() {
3966 DCHECK(supports_release_time_);
3967
3968 release_time_into_future_ = std::max(
3969 QuicTime::Delta::FromMilliseconds(kMinReleaseTimeIntoFutureMs),
3970 std::min(
3971 QuicTime::Delta::FromMilliseconds(
3972 GetQuicFlag(FLAGS_quic_max_pace_time_into_future_ms)),
3973 sent_packet_manager_.GetRttStats()->SmoothedOrInitialRtt() *
3974 GetQuicFlag(FLAGS_quic_pace_time_into_future_srtt_fraction)));
3975}
3976
3977void QuicConnection::ResetAckStates() {
3978 ack_alarm_->Cancel();
3979 ack_queued_ = false;
3980 stop_waiting_count_ = 0;
3981 num_retransmittable_packets_received_since_last_ack_sent_ = 0;
3982 num_packets_received_since_last_ack_sent_ = 0;
3983 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07003984 if (use_uber_received_packet_manager_) {
QUICHE team1dfa46b2019-03-22 10:39:10 -07003985 uber_received_packet_manager_.ResetAckStates(encryption_level_);
QUICHE teamb23daa72019-03-21 08:37:48 -07003986 } else {
3987 received_packet_manager_.ResetAckStates();
3988 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05003989 }
3990}
3991
3992MessageStatus QuicConnection::SendMessage(QuicMessageId message_id,
3993 QuicMemSliceSpan message) {
3994 if (transport_version() <= QUIC_VERSION_44) {
3995 QUIC_BUG << "MESSAGE frame is not supported for version "
3996 << transport_version();
3997 return MESSAGE_STATUS_UNSUPPORTED;
3998 }
ianswettb239f862019-04-05 09:15:06 -07003999 if (message.total_length() > GetCurrentLargestMessagePayload()) {
QUICHE teama6ef0a62019-03-07 20:34:33 -05004000 return MESSAGE_STATUS_TOO_LARGE;
4001 }
4002 if (!CanWrite(HAS_RETRANSMITTABLE_DATA)) {
4003 return MESSAGE_STATUS_BLOCKED;
4004 }
4005 ScopedPacketFlusher flusher(this, SEND_ACK_IF_PENDING);
4006 return packet_generator_.AddMessageFrame(message_id, message);
4007}
4008
ianswettb239f862019-04-05 09:15:06 -07004009QuicPacketLength QuicConnection::GetCurrentLargestMessagePayload() const {
4010 return packet_generator_.GetCurrentLargestMessagePayload();
4011}
4012
4013QuicPacketLength QuicConnection::GetGuaranteedLargestMessagePayload() const {
4014 return packet_generator_.GetGuaranteedLargestMessagePayload();
QUICHE teama6ef0a62019-03-07 20:34:33 -05004015}
4016
zhongyi546cc452019-04-12 15:27:49 -07004017uint32_t QuicConnection::cipher_id() const {
4018 if (version().KnowsWhichDecrypterToUse()) {
4019 return framer_.GetDecrypter(last_decrypted_packet_level_)->cipher_id();
4020 }
4021 return framer_.decrypter()->cipher_id();
4022}
4023
QUICHE teama6ef0a62019-03-07 20:34:33 -05004024bool QuicConnection::ShouldSetAckAlarm() const {
4025 DCHECK(ack_frame_updated());
4026 if (ack_alarm_->IsSet()) {
4027 // ACK alarm has been set.
4028 return false;
4029 }
4030 if (GetQuicReloadableFlag(quic_fix_spurious_ack_alarm) &&
4031 packet_generator_.should_send_ack()) {
4032 // If the generator is already configured to send an ACK, then there is no
4033 // need to schedule the ACK alarm. The updated ACK information will be sent
4034 // when the generator flushes.
4035 QUIC_RELOADABLE_FLAG_COUNT(quic_fix_spurious_ack_alarm);
4036 return false;
4037 }
4038 return true;
4039}
4040
4041EncryptionLevel QuicConnection::GetConnectionCloseEncryptionLevel() const {
QUICHE teama6ef0a62019-03-07 20:34:33 -05004042 if (perspective_ == Perspective::IS_CLIENT) {
4043 return encryption_level_;
4044 }
4045 if (sent_packet_manager_.handshake_confirmed()) {
4046 // A forward secure packet has been received.
4047 QUIC_BUG_IF(encryption_level_ != ENCRYPTION_FORWARD_SECURE);
4048 return ENCRYPTION_FORWARD_SECURE;
4049 }
4050 if (framer_.HasEncrypterOfEncryptionLevel(ENCRYPTION_ZERO_RTT)) {
4051 if (encryption_level_ != ENCRYPTION_ZERO_RTT) {
4052 if (transport_version() > QUIC_VERSION_43) {
4053 QUIC_CODE_COUNT(quic_wrong_encryption_level_connection_close_ietf);
4054 } else {
4055 QUIC_CODE_COUNT(quic_wrong_encryption_level_connection_close);
4056 }
4057 }
4058 return ENCRYPTION_ZERO_RTT;
4059 }
QUICHE team6987b4a2019-03-15 16:23:04 -07004060 return ENCRYPTION_INITIAL;
QUICHE teama6ef0a62019-03-07 20:34:33 -05004061}
4062
QUICHE teamcd098022019-03-22 18:49:55 -07004063void QuicConnection::SendAllPendingAcks() {
4064 DCHECK(SupportsMultiplePacketNumberSpaces());
4065 QUIC_DVLOG(1) << ENDPOINT << "Trying to send all pending ACKs";
4066 // Latches current encryption level.
4067 const EncryptionLevel current_encryption_level = encryption_level_;
4068 for (int8_t i = INITIAL_DATA; i <= APPLICATION_DATA; ++i) {
4069 const QuicTime ack_timeout = uber_received_packet_manager_.GetAckTimeout(
4070 static_cast<PacketNumberSpace>(i));
4071 if (!ack_timeout.IsInitialized() ||
4072 ack_timeout > clock_->ApproximateNow()) {
4073 continue;
4074 }
dschinazi05e62b12019-04-18 15:43:41 -07004075 if (!framer_.HasEncrypterOfEncryptionLevel(
4076 QuicUtils::GetEncryptionLevel(static_cast<PacketNumberSpace>(i)))) {
4077 QUIC_BUG << ENDPOINT << "Cannot send ACKs for packet number space "
4078 << static_cast<uint32_t>(i)
4079 << " without corresponding encrypter";
4080 continue;
4081 }
QUICHE teamcd098022019-03-22 18:49:55 -07004082 QUIC_DVLOG(1) << ENDPOINT << "Sending ACK of packet number space: "
4083 << static_cast<uint32_t>(i);
4084 // Switch to the appropriate encryption level.
4085 SetDefaultEncryptionLevel(
4086 QuicUtils::GetEncryptionLevel(static_cast<PacketNumberSpace>(i)));
4087 QuicFrames frames;
4088 frames.push_back(uber_received_packet_manager_.GetUpdatedAckFrame(
4089 static_cast<PacketNumberSpace>(i), clock_->ApproximateNow()));
4090 const bool flushed = packet_generator_.FlushAckFrame(frames);
4091 if (!flushed) {
4092 // Connection is write blocked.
QUICHE teamdb061532019-03-23 18:23:05 -07004093 QUIC_BUG_IF(!writer_->IsWriteBlocked())
4094 << "Writer not blocked, but ACK not flushed for packet space:" << i;
QUICHE teamcd098022019-03-22 18:49:55 -07004095 break;
4096 }
4097 ResetAckStates();
4098 }
4099 // Restores encryption level.
4100 SetDefaultEncryptionLevel(current_encryption_level);
4101
4102 const QuicTime timeout =
4103 uber_received_packet_manager_.GetEarliestAckTimeout();
4104 if (timeout.IsInitialized()) {
4105 // If there are ACKs pending, re-arm ack alarm.
4106 ack_alarm_->Set(timeout);
4107 }
4108 // Only try to bundle retransmittable data with ACK frame if default
4109 // encryption level is forward secure.
4110 if (encryption_level_ != ENCRYPTION_FORWARD_SECURE ||
4111 consecutive_num_packets_with_no_retransmittable_frames_ <
4112 max_consecutive_num_packets_with_no_retransmittable_frames_) {
4113 return;
4114 }
4115 consecutive_num_packets_with_no_retransmittable_frames_ = 0;
4116 if (packet_generator_.HasRetransmittableFrames() ||
4117 visitor_->WillingAndAbleToWrite()) {
4118 // There are pending retransmittable frames.
4119 return;
4120 }
4121
4122 visitor_->OnAckNeedsRetransmittableFrame();
4123}
4124
4125void QuicConnection::MaybeEnableMultiplePacketNumberSpacesSupport() {
4126 const bool enable_multiple_packet_number_spaces =
4127 version().handshake_protocol == PROTOCOL_TLS1_3 &&
4128 use_uber_received_packet_manager_ &&
4129 sent_packet_manager_.use_uber_loss_algorithm() &&
4130 GetQuicRestartFlag(quic_enable_accept_random_ipn);
4131 if (!enable_multiple_packet_number_spaces) {
4132 return;
4133 }
4134 QUIC_DVLOG(1) << ENDPOINT << "connection " << connection_id()
4135 << " supports multiple packet number spaces";
4136 framer_.EnableMultiplePacketNumberSpacesSupport();
4137 sent_packet_manager_.EnableMultiplePacketNumberSpacesSupport();
4138 uber_received_packet_manager_.EnableMultiplePacketNumberSpacesSupport();
4139}
4140
4141bool QuicConnection::SupportsMultiplePacketNumberSpaces() const {
4142 return sent_packet_manager_.supports_multiple_packet_number_spaces();
4143}
4144
QUICHE team76e1c622019-03-19 14:36:39 -07004145void QuicConnection::SetLargestReceivedPacketWithAck(
4146 QuicPacketNumber new_value) {
QUICHE teamcd098022019-03-22 18:49:55 -07004147 if (SupportsMultiplePacketNumberSpaces()) {
4148 largest_seen_packets_with_ack_[QuicUtils::GetPacketNumberSpace(
4149 last_decrypted_packet_level_)] = new_value;
4150 } else {
4151 largest_seen_packet_with_ack_ = new_value;
4152 }
QUICHE team76e1c622019-03-19 14:36:39 -07004153}
4154
4155QuicPacketNumber QuicConnection::GetLargestReceivedPacketWithAck() const {
QUICHE teamcd098022019-03-22 18:49:55 -07004156 if (SupportsMultiplePacketNumberSpaces()) {
4157 return largest_seen_packets_with_ack_[QuicUtils::GetPacketNumberSpace(
4158 last_decrypted_packet_level_)];
4159 }
QUICHE team76e1c622019-03-19 14:36:39 -07004160 return largest_seen_packet_with_ack_;
4161}
4162
4163QuicPacketNumber QuicConnection::GetLargestSentPacket() const {
QUICHE teamcd098022019-03-22 18:49:55 -07004164 if (SupportsMultiplePacketNumberSpaces()) {
4165 return sent_packet_manager_.GetLargestSentPacket(
4166 last_decrypted_packet_level_);
4167 }
QUICHE team76e1c622019-03-19 14:36:39 -07004168 return sent_packet_manager_.GetLargestSentPacket();
4169}
4170
4171QuicPacketNumber QuicConnection::GetLargestAckedPacket() const {
QUICHE teamcd098022019-03-22 18:49:55 -07004172 if (SupportsMultiplePacketNumberSpaces()) {
4173 return sent_packet_manager_.GetLargestAckedPacket(
4174 last_decrypted_packet_level_);
4175 }
QUICHE team76e1c622019-03-19 14:36:39 -07004176 return sent_packet_manager_.GetLargestObserved();
4177}
4178
QUICHE team1f3de242019-03-20 07:24:48 -07004179QuicPacketNumber QuicConnection::GetLargestReceivedPacket() const {
QUICHE teamb23daa72019-03-21 08:37:48 -07004180 if (use_uber_received_packet_manager_) {
QUICHE team1dfa46b2019-03-22 10:39:10 -07004181 return uber_received_packet_manager_.GetLargestObserved(
4182 last_decrypted_packet_level_);
QUICHE teamb23daa72019-03-21 08:37:48 -07004183 }
QUICHE team1f3de242019-03-20 07:24:48 -07004184 return received_packet_manager_.GetLargestObserved();
4185}
4186
QUICHE teama6ef0a62019-03-07 20:34:33 -05004187size_t QuicConnection::min_received_before_ack_decimation() const {
4188 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07004189 if (use_uber_received_packet_manager_) {
4190 return uber_received_packet_manager_.min_received_before_ack_decimation();
4191 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004192 return received_packet_manager_.min_received_before_ack_decimation();
4193 }
4194 return min_received_before_ack_decimation_;
4195}
4196
4197void QuicConnection::set_min_received_before_ack_decimation(size_t new_value) {
4198 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07004199 if (use_uber_received_packet_manager_) {
4200 uber_received_packet_manager_.set_min_received_before_ack_decimation(
4201 new_value);
4202 } else {
4203 received_packet_manager_.set_min_received_before_ack_decimation(
4204 new_value);
4205 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004206 } else {
4207 min_received_before_ack_decimation_ = new_value;
4208 }
4209}
4210
4211size_t QuicConnection::ack_frequency_before_ack_decimation() const {
4212 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07004213 if (use_uber_received_packet_manager_) {
4214 return uber_received_packet_manager_
4215 .ack_frequency_before_ack_decimation();
4216 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004217 return received_packet_manager_.ack_frequency_before_ack_decimation();
4218 }
4219 return ack_frequency_before_ack_decimation_;
4220}
4221
4222void QuicConnection::set_ack_frequency_before_ack_decimation(size_t new_value) {
4223 DCHECK_GT(new_value, 0u);
4224 if (received_packet_manager_.decide_when_to_send_acks()) {
QUICHE teamb23daa72019-03-21 08:37:48 -07004225 if (use_uber_received_packet_manager_) {
4226 uber_received_packet_manager_.set_ack_frequency_before_ack_decimation(
4227 new_value);
4228 } else {
4229 received_packet_manager_.set_ack_frequency_before_ack_decimation(
4230 new_value);
4231 }
QUICHE teama6ef0a62019-03-07 20:34:33 -05004232 } else {
4233 ack_frequency_before_ack_decimation_ = new_value;
4234 }
4235}
4236
fayang21ffb712019-05-16 08:39:26 -07004237const QuicAckFrame& QuicConnection::ack_frame() const {
4238 if (SupportsMultiplePacketNumberSpaces()) {
4239 return uber_received_packet_manager_.GetAckFrame(
4240 QuicUtils::GetPacketNumberSpace(last_decrypted_packet_level_));
4241 }
4242 if (use_uber_received_packet_manager_) {
4243 return uber_received_packet_manager_.ack_frame();
4244 }
4245 return received_packet_manager_.ack_frame();
4246}
4247
QUICHE teama6ef0a62019-03-07 20:34:33 -05004248#undef ENDPOINT // undef for jumbo builds
4249} // namespace quic