2021-08-03 09:04:02 +00:00
|
|
|
package quic
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-12-04 09:49:00 +00:00
|
|
|
"crypto/tls"
|
2021-08-03 09:04:02 +00:00
|
|
|
"errors"
|
|
|
|
"io"
|
|
|
|
"net"
|
|
|
|
"time"
|
|
|
|
|
2023-05-06 00:42:41 +00:00
|
|
|
"github.com/quic-go/quic-go/internal/handshake"
|
|
|
|
"github.com/quic-go/quic-go/internal/protocol"
|
|
|
|
"github.com/quic-go/quic-go/logging"
|
2021-08-03 09:04:02 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// The StreamID is the ID of a QUIC stream.
|
|
|
|
type StreamID = protocol.StreamID
|
|
|
|
|
|
|
|
// A VersionNumber is a QUIC version number.
|
|
|
|
type VersionNumber = protocol.VersionNumber
|
|
|
|
|
|
|
|
const (
|
2021-08-27 11:26:00 +00:00
|
|
|
// Version1 is RFC 9000
|
|
|
|
Version1 = protocol.Version1
|
2023-12-04 09:49:00 +00:00
|
|
|
// Version2 is RFC 9369
|
2022-08-08 14:49:10 +00:00
|
|
|
Version2 = protocol.Version2
|
2021-08-03 09:04:02 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// A ClientToken is a token received by the client.
|
|
|
|
// It can be used to skip address validation on future connection attempts.
|
|
|
|
type ClientToken struct {
|
|
|
|
data []byte
|
|
|
|
}
|
|
|
|
|
|
|
|
type TokenStore interface {
|
|
|
|
// Pop searches for a ClientToken associated with the given key.
|
|
|
|
// Since tokens are not supposed to be reused, it must remove the token from the cache.
|
|
|
|
// It returns nil when no token is found.
|
|
|
|
Pop(key string) (token *ClientToken)
|
|
|
|
|
|
|
|
// Put adds a token to the cache with the given key. It might get called
|
|
|
|
// multiple times in a connection.
|
|
|
|
Put(key string, token *ClientToken)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Err0RTTRejected is the returned from:
|
|
|
|
// * Open{Uni}Stream{Sync}
|
|
|
|
// * Accept{Uni}Stream
|
|
|
|
// * Stream.Read and Stream.Write
|
|
|
|
// when the server rejects a 0-RTT connection attempt.
|
|
|
|
var Err0RTTRejected = errors.New("0-RTT rejected")
|
|
|
|
|
2022-06-06 13:15:35 +00:00
|
|
|
// ConnectionTracingKey can be used to associate a ConnectionTracer with a Connection.
|
|
|
|
// It is set on the Connection.Context() context,
|
2021-08-27 11:26:00 +00:00
|
|
|
// as well as on the context passed to logging.Tracer.NewConnectionTracer.
|
2022-06-06 13:15:35 +00:00
|
|
|
var ConnectionTracingKey = connTracingCtxKey{}
|
2021-08-27 11:26:00 +00:00
|
|
|
|
2022-06-06 13:15:35 +00:00
|
|
|
type connTracingCtxKey struct{}
|
2021-08-27 11:26:00 +00:00
|
|
|
|
2023-05-06 00:42:41 +00:00
|
|
|
// QUICVersionContextKey can be used to find out the QUIC version of a TLS handshake from the
|
|
|
|
// context returned by tls.Config.ClientHelloInfo.Context.
|
|
|
|
var QUICVersionContextKey = handshake.QUICVersionContextKey
|
|
|
|
|
2021-08-03 09:04:02 +00:00
|
|
|
// Stream is the interface implemented by QUIC streams
|
2022-06-06 13:15:35 +00:00
|
|
|
// In addition to the errors listed on the Connection,
|
2021-08-27 11:26:00 +00:00
|
|
|
// calls to stream functions can return a StreamError if the stream is canceled.
|
2021-08-03 09:04:02 +00:00
|
|
|
type Stream interface {
|
|
|
|
ReceiveStream
|
|
|
|
SendStream
|
|
|
|
// SetDeadline sets the read and write deadlines associated
|
|
|
|
// with the connection. It is equivalent to calling both
|
|
|
|
// SetReadDeadline and SetWriteDeadline.
|
|
|
|
SetDeadline(t time.Time) error
|
|
|
|
}
|
|
|
|
|
|
|
|
// A ReceiveStream is a unidirectional Receive Stream.
|
|
|
|
type ReceiveStream interface {
|
|
|
|
// StreamID returns the stream ID.
|
|
|
|
StreamID() StreamID
|
|
|
|
// Read reads data from the stream.
|
|
|
|
// Read can be made to time out and return a net.Error with Timeout() == true
|
|
|
|
// after a fixed time limit; see SetDeadline and SetReadDeadline.
|
|
|
|
// If the stream was canceled by the peer, the error implements the StreamError
|
|
|
|
// interface, and Canceled() == true.
|
2022-06-06 13:15:35 +00:00
|
|
|
// If the connection was closed due to a timeout, the error satisfies
|
2021-08-03 09:04:02 +00:00
|
|
|
// the net.Error interface, and Timeout() will be true.
|
|
|
|
io.Reader
|
|
|
|
// CancelRead aborts receiving on this stream.
|
|
|
|
// It will ask the peer to stop transmitting stream data.
|
|
|
|
// Read will unblock immediately, and future Read calls will fail.
|
|
|
|
// When called multiple times or after reading the io.EOF it is a no-op.
|
2021-08-27 11:26:00 +00:00
|
|
|
CancelRead(StreamErrorCode)
|
2021-08-03 09:04:02 +00:00
|
|
|
// SetReadDeadline sets the deadline for future Read calls and
|
|
|
|
// any currently-blocked Read call.
|
|
|
|
// A zero value for t means Read will not time out.
|
|
|
|
|
|
|
|
SetReadDeadline(t time.Time) error
|
|
|
|
}
|
|
|
|
|
|
|
|
// A SendStream is a unidirectional Send Stream.
|
|
|
|
type SendStream interface {
|
|
|
|
// StreamID returns the stream ID.
|
|
|
|
StreamID() StreamID
|
|
|
|
// Write writes data to the stream.
|
|
|
|
// Write can be made to time out and return a net.Error with Timeout() == true
|
|
|
|
// after a fixed time limit; see SetDeadline and SetWriteDeadline.
|
|
|
|
// If the stream was canceled by the peer, the error implements the StreamError
|
|
|
|
// interface, and Canceled() == true.
|
2022-06-06 13:15:35 +00:00
|
|
|
// If the connection was closed due to a timeout, the error satisfies
|
2021-08-03 09:04:02 +00:00
|
|
|
// the net.Error interface, and Timeout() will be true.
|
|
|
|
io.Writer
|
|
|
|
// Close closes the write-direction of the stream.
|
|
|
|
// Future calls to Write are not permitted after calling Close.
|
|
|
|
// It must not be called concurrently with Write.
|
|
|
|
// It must not be called after calling CancelWrite.
|
|
|
|
io.Closer
|
|
|
|
// CancelWrite aborts sending on this stream.
|
|
|
|
// Data already written, but not yet delivered to the peer is not guaranteed to be delivered reliably.
|
|
|
|
// Write will unblock immediately, and future calls to Write will fail.
|
|
|
|
// When called multiple times or after closing the stream it is a no-op.
|
2021-08-27 11:26:00 +00:00
|
|
|
CancelWrite(StreamErrorCode)
|
2022-06-06 13:15:35 +00:00
|
|
|
// The Context is canceled as soon as the write-side of the stream is closed.
|
2021-08-03 09:04:02 +00:00
|
|
|
// This happens when Close() or CancelWrite() is called, or when the peer
|
|
|
|
// cancels the read-side of their stream.
|
2023-12-04 09:49:00 +00:00
|
|
|
// The cancellation cause is set to the error that caused the stream to
|
|
|
|
// close, or `context.Canceled` in case the stream is closed without error.
|
2021-08-03 09:04:02 +00:00
|
|
|
Context() context.Context
|
|
|
|
// SetWriteDeadline sets the deadline for future Write calls
|
|
|
|
// and any currently-blocked Write call.
|
|
|
|
// Even if write times out, it may return n > 0, indicating that
|
2022-06-06 13:15:35 +00:00
|
|
|
// some data was successfully written.
|
2021-08-03 09:04:02 +00:00
|
|
|
// A zero value for t means Write will not time out.
|
|
|
|
SetWriteDeadline(t time.Time) error
|
|
|
|
}
|
|
|
|
|
2022-06-06 13:15:35 +00:00
|
|
|
// A Connection is a QUIC connection between two peers.
|
|
|
|
// Calls to the connection (and to streams) can return the following types of errors:
|
2021-08-27 11:26:00 +00:00
|
|
|
// * ApplicationError: for errors triggered by the application running on top of QUIC
|
|
|
|
// * TransportError: for errors triggered by the QUIC transport (in many cases a misbehaving peer)
|
|
|
|
// * IdleTimeoutError: when the peer goes away unexpectedly (this is a net.Error timeout error)
|
|
|
|
// * HandshakeTimeoutError: when the cryptographic handshake takes too long (this is a net.Error timeout error)
|
|
|
|
// * StatelessResetError: when we receive a stateless reset (this is a net.Error temporary error)
|
|
|
|
// * VersionNegotiationError: returned by the client, when there's no version overlap between the peers
|
2022-06-06 13:15:35 +00:00
|
|
|
type Connection interface {
|
2021-08-03 09:04:02 +00:00
|
|
|
// AcceptStream returns the next stream opened by the peer, blocking until one is available.
|
2022-06-06 13:15:35 +00:00
|
|
|
// If the connection was closed due to a timeout, the error satisfies
|
2021-08-03 09:04:02 +00:00
|
|
|
// the net.Error interface, and Timeout() will be true.
|
|
|
|
AcceptStream(context.Context) (Stream, error)
|
|
|
|
// AcceptUniStream returns the next unidirectional stream opened by the peer, blocking until one is available.
|
2022-06-06 13:15:35 +00:00
|
|
|
// If the connection was closed due to a timeout, the error satisfies
|
2021-08-03 09:04:02 +00:00
|
|
|
// the net.Error interface, and Timeout() will be true.
|
|
|
|
AcceptUniStream(context.Context) (ReceiveStream, error)
|
|
|
|
// OpenStream opens a new bidirectional QUIC stream.
|
|
|
|
// There is no signaling to the peer about new streams:
|
|
|
|
// The peer can only accept the stream after data has been sent on the stream.
|
|
|
|
// If the error is non-nil, it satisfies the net.Error interface.
|
|
|
|
// When reaching the peer's stream limit, err.Temporary() will be true.
|
2022-06-06 13:15:35 +00:00
|
|
|
// If the connection was closed due to a timeout, Timeout() will be true.
|
2021-08-03 09:04:02 +00:00
|
|
|
OpenStream() (Stream, error)
|
|
|
|
// OpenStreamSync opens a new bidirectional QUIC stream.
|
|
|
|
// It blocks until a new stream can be opened.
|
|
|
|
// If the error is non-nil, it satisfies the net.Error interface.
|
2022-06-06 13:15:35 +00:00
|
|
|
// If the connection was closed due to a timeout, Timeout() will be true.
|
2021-08-03 09:04:02 +00:00
|
|
|
OpenStreamSync(context.Context) (Stream, error)
|
|
|
|
// OpenUniStream opens a new outgoing unidirectional QUIC stream.
|
|
|
|
// If the error is non-nil, it satisfies the net.Error interface.
|
|
|
|
// When reaching the peer's stream limit, Temporary() will be true.
|
2022-06-06 13:15:35 +00:00
|
|
|
// If the connection was closed due to a timeout, Timeout() will be true.
|
2021-08-03 09:04:02 +00:00
|
|
|
OpenUniStream() (SendStream, error)
|
|
|
|
// OpenUniStreamSync opens a new outgoing unidirectional QUIC stream.
|
|
|
|
// It blocks until a new stream can be opened.
|
|
|
|
// If the error is non-nil, it satisfies the net.Error interface.
|
2022-06-06 13:15:35 +00:00
|
|
|
// If the connection was closed due to a timeout, Timeout() will be true.
|
2021-08-03 09:04:02 +00:00
|
|
|
OpenUniStreamSync(context.Context) (SendStream, error)
|
|
|
|
// LocalAddr returns the local address.
|
|
|
|
LocalAddr() net.Addr
|
|
|
|
// RemoteAddr returns the address of the peer.
|
|
|
|
RemoteAddr() net.Addr
|
2021-08-27 11:26:00 +00:00
|
|
|
// CloseWithError closes the connection with an error.
|
2021-08-03 09:04:02 +00:00
|
|
|
// The error string will be sent to the peer.
|
2021-08-27 11:26:00 +00:00
|
|
|
CloseWithError(ApplicationErrorCode, string) error
|
2023-05-06 00:42:41 +00:00
|
|
|
// Context returns a context that is cancelled when the connection is closed.
|
2023-12-04 09:49:00 +00:00
|
|
|
// The cancellation cause is set to the error that caused the connection to
|
|
|
|
// close, or `context.Canceled` in case the listener is closed first.
|
2021-08-03 09:04:02 +00:00
|
|
|
Context() context.Context
|
|
|
|
// ConnectionState returns basic details about the QUIC connection.
|
|
|
|
// Warning: This API should not be considered stable and might change soon.
|
|
|
|
ConnectionState() ConnectionState
|
|
|
|
|
2024-01-01 09:43:25 +00:00
|
|
|
// SendDatagram sends a message using a QUIC datagram, as specified in RFC 9221.
|
|
|
|
// There is no delivery guarantee for DATAGRAM frames, they are not retransmitted if lost.
|
|
|
|
// The payload of the datagram needs to fit into a single QUIC packet.
|
|
|
|
// In addition, a datagram may be dropped before being sent out if the available packet size suddenly decreases.
|
|
|
|
// If the payload is too large to be sent at the current time, a DatagramTooLargeError is returned.
|
|
|
|
SendDatagram(payload []byte) error
|
2023-12-04 09:49:00 +00:00
|
|
|
// ReceiveDatagram gets a message received in a datagram, as specified in RFC 9221.
|
|
|
|
ReceiveDatagram(context.Context) ([]byte, error)
|
2021-08-03 09:04:02 +00:00
|
|
|
}
|
|
|
|
|
2022-06-06 13:15:35 +00:00
|
|
|
// An EarlyConnection is a connection that is handshaking.
|
2021-08-03 09:04:02 +00:00
|
|
|
// Data sent during the handshake is encrypted using the forward secure keys.
|
|
|
|
// When using client certificates, the client's identity is only verified
|
|
|
|
// after completion of the handshake.
|
2022-06-06 13:15:35 +00:00
|
|
|
type EarlyConnection interface {
|
|
|
|
Connection
|
2021-08-03 09:04:02 +00:00
|
|
|
|
2022-06-06 13:15:35 +00:00
|
|
|
// HandshakeComplete blocks until the handshake completes (or fails).
|
2023-05-06 00:42:41 +00:00
|
|
|
// For the client, data sent before completion of the handshake is encrypted with 0-RTT keys.
|
2023-12-04 09:49:00 +00:00
|
|
|
// For the server, data sent before completion of the handshake is encrypted with 1-RTT keys,
|
2023-05-06 00:42:41 +00:00
|
|
|
// however the client's identity is only verified once the handshake completes.
|
|
|
|
HandshakeComplete() <-chan struct{}
|
2021-08-03 09:04:02 +00:00
|
|
|
|
2022-06-06 13:15:35 +00:00
|
|
|
NextConnection() Connection
|
2021-08-03 09:04:02 +00:00
|
|
|
}
|
|
|
|
|
2023-05-06 00:42:41 +00:00
|
|
|
// StatelessResetKey is a key used to derive stateless reset tokens.
|
|
|
|
type StatelessResetKey [32]byte
|
|
|
|
|
2023-12-04 09:49:00 +00:00
|
|
|
// TokenGeneratorKey is a key used to encrypt session resumption tokens.
|
|
|
|
type TokenGeneratorKey = handshake.TokenProtectorKey
|
|
|
|
|
2023-05-06 00:42:41 +00:00
|
|
|
// A ConnectionID is a QUIC Connection ID, as defined in RFC 9000.
|
|
|
|
// It is not able to handle QUIC Connection IDs longer than 20 bytes,
|
|
|
|
// as they are allowed by RFC 8999.
|
|
|
|
type ConnectionID = protocol.ConnectionID
|
|
|
|
|
|
|
|
// ConnectionIDFromBytes interprets b as a Connection ID. It panics if b is
|
|
|
|
// longer than 20 bytes.
|
|
|
|
func ConnectionIDFromBytes(b []byte) ConnectionID {
|
|
|
|
return protocol.ParseConnectionID(b)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A ConnectionIDGenerator is an interface that allows clients to implement their own format
|
2022-08-10 13:19:03 +00:00
|
|
|
// for the Connection IDs that servers/clients use as SrcConnectionID in QUIC packets.
|
2023-05-06 00:42:41 +00:00
|
|
|
//
|
|
|
|
// Connection IDs generated by an implementation should always produce IDs of constant size.
|
2022-08-10 13:19:03 +00:00
|
|
|
type ConnectionIDGenerator interface {
|
|
|
|
// GenerateConnectionID generates a new ConnectionID.
|
2023-05-06 00:42:41 +00:00
|
|
|
// Generated ConnectionIDs should be unique and observers should not be able to correlate two ConnectionIDs.
|
|
|
|
GenerateConnectionID() (ConnectionID, error)
|
2022-08-10 13:19:03 +00:00
|
|
|
|
|
|
|
// ConnectionIDLen tells what is the length of the ConnectionIDs generated by the implementation of
|
|
|
|
// this interface.
|
2023-05-06 00:42:41 +00:00
|
|
|
// Effectively, this means that implementations of ConnectionIDGenerator must always return constant-size
|
|
|
|
// connection IDs. Valid lengths are between 0 and 20 and calls to GenerateConnectionID.
|
|
|
|
// 0-length ConnectionsIDs can be used when an endpoint (server or client) does not require multiplexing connections
|
|
|
|
// in the presence of a connection migration environment.
|
2022-08-10 13:19:03 +00:00
|
|
|
ConnectionIDLen() int
|
|
|
|
}
|
|
|
|
|
2021-08-03 09:04:02 +00:00
|
|
|
// Config contains all configuration data needed for a QUIC server or client.
|
|
|
|
type Config struct {
|
2023-05-06 00:42:41 +00:00
|
|
|
// GetConfigForClient is called for incoming connections.
|
|
|
|
// If the error is not nil, the connection attempt is refused.
|
|
|
|
GetConfigForClient func(info *ClientHelloInfo) (*Config, error)
|
2021-08-03 09:04:02 +00:00
|
|
|
// The QUIC versions that can be negotiated.
|
|
|
|
// If not set, it uses all versions available.
|
|
|
|
Versions []VersionNumber
|
|
|
|
// HandshakeIdleTimeout is the idle timeout before completion of the handshake.
|
2023-12-04 09:49:00 +00:00
|
|
|
// If we don't receive any packet from the peer within this time, the connection attempt is aborted.
|
|
|
|
// Additionally, if the handshake doesn't complete in twice this time, the connection attempt is also aborted.
|
2021-08-03 09:04:02 +00:00
|
|
|
// If this value is zero, the timeout is set to 5 seconds.
|
|
|
|
HandshakeIdleTimeout time.Duration
|
|
|
|
// MaxIdleTimeout is the maximum duration that may pass without any incoming network activity.
|
|
|
|
// The actual value for the idle timeout is the minimum of this value and the peer's.
|
|
|
|
// This value only applies after the handshake has completed.
|
|
|
|
// If the timeout is exceeded, the connection is closed.
|
|
|
|
// If this value is zero, the timeout is set to 30 seconds.
|
|
|
|
MaxIdleTimeout time.Duration
|
2023-05-06 00:42:41 +00:00
|
|
|
// RequireAddressValidation determines if a QUIC Retry packet is sent.
|
|
|
|
// This allows the server to verify the client's address, at the cost of increasing the handshake latency by 1 RTT.
|
|
|
|
// See https://datatracker.ietf.org/doc/html/rfc9000#section-8 for details.
|
|
|
|
// If not set, every client is forced to prove its remote address.
|
|
|
|
RequireAddressValidation func(net.Addr) bool
|
2021-08-03 09:04:02 +00:00
|
|
|
// The TokenStore stores tokens received from the server.
|
|
|
|
// Tokens are used to skip address validation on future connection attempts.
|
|
|
|
// The key used to store tokens is the ServerName from the tls.Config, if set
|
|
|
|
// otherwise the token is associated with the server's IP address.
|
|
|
|
TokenStore TokenStore
|
|
|
|
// InitialStreamReceiveWindow is the initial size of the stream-level flow control window for receiving data.
|
|
|
|
// If the application is consuming data quickly enough, the flow control auto-tuning algorithm
|
|
|
|
// will increase the window up to MaxStreamReceiveWindow.
|
|
|
|
// If this value is zero, it will default to 512 KB.
|
2023-12-04 09:49:00 +00:00
|
|
|
// Values larger than the maximum varint (quicvarint.Max) will be clipped to that value.
|
2021-08-03 09:04:02 +00:00
|
|
|
InitialStreamReceiveWindow uint64
|
|
|
|
// MaxStreamReceiveWindow is the maximum stream-level flow control window for receiving data.
|
|
|
|
// If this value is zero, it will default to 6 MB.
|
2023-12-04 09:49:00 +00:00
|
|
|
// Values larger than the maximum varint (quicvarint.Max) will be clipped to that value.
|
2021-08-03 09:04:02 +00:00
|
|
|
MaxStreamReceiveWindow uint64
|
|
|
|
// InitialConnectionReceiveWindow is the initial size of the stream-level flow control window for receiving data.
|
|
|
|
// If the application is consuming data quickly enough, the flow control auto-tuning algorithm
|
|
|
|
// will increase the window up to MaxConnectionReceiveWindow.
|
|
|
|
// If this value is zero, it will default to 512 KB.
|
2023-12-04 09:49:00 +00:00
|
|
|
// Values larger than the maximum varint (quicvarint.Max) will be clipped to that value.
|
2021-08-03 09:04:02 +00:00
|
|
|
InitialConnectionReceiveWindow uint64
|
|
|
|
// MaxConnectionReceiveWindow is the connection-level flow control window for receiving data.
|
|
|
|
// If this value is zero, it will default to 15 MB.
|
2023-12-04 09:49:00 +00:00
|
|
|
// Values larger than the maximum varint (quicvarint.Max) will be clipped to that value.
|
2021-08-03 09:04:02 +00:00
|
|
|
MaxConnectionReceiveWindow uint64
|
2022-06-06 13:15:35 +00:00
|
|
|
// AllowConnectionWindowIncrease is called every time the connection flow controller attempts
|
|
|
|
// to increase the connection flow control window.
|
|
|
|
// If set, the caller can prevent an increase of the window. Typically, it would do so to
|
|
|
|
// limit the memory usage.
|
|
|
|
// To avoid deadlocks, it is not valid to call other functions on the connection or on streams
|
|
|
|
// in this callback.
|
2023-05-06 00:42:41 +00:00
|
|
|
AllowConnectionWindowIncrease func(conn Connection, delta uint64) bool
|
2021-08-03 09:04:02 +00:00
|
|
|
// MaxIncomingStreams is the maximum number of concurrent bidirectional streams that a peer is allowed to open.
|
|
|
|
// If not set, it will default to 100.
|
|
|
|
// If set to a negative value, it doesn't allow any bidirectional streams.
|
2023-12-04 09:49:00 +00:00
|
|
|
// Values larger than 2^60 will be clipped to that value.
|
2021-08-03 09:04:02 +00:00
|
|
|
MaxIncomingStreams int64
|
|
|
|
// MaxIncomingUniStreams is the maximum number of concurrent unidirectional streams that a peer is allowed to open.
|
|
|
|
// If not set, it will default to 100.
|
|
|
|
// If set to a negative value, it doesn't allow any unidirectional streams.
|
2023-12-04 09:49:00 +00:00
|
|
|
// Values larger than 2^60 will be clipped to that value.
|
2021-08-03 09:04:02 +00:00
|
|
|
MaxIncomingUniStreams int64
|
2022-06-06 13:15:35 +00:00
|
|
|
// KeepAlivePeriod defines whether this peer will periodically send a packet to keep the connection alive.
|
|
|
|
// If set to 0, then no keep alive is sent. Otherwise, the keep alive is sent on that period (or at most
|
|
|
|
// every half of MaxIdleTimeout, whichever is smaller).
|
|
|
|
KeepAlivePeriod time.Duration
|
2021-08-03 09:04:02 +00:00
|
|
|
// DisablePathMTUDiscovery disables Path MTU Discovery (RFC 8899).
|
2023-12-04 09:49:00 +00:00
|
|
|
// This allows the sending of QUIC packets that fully utilize the available MTU of the path.
|
|
|
|
// Path MTU discovery is only available on systems that allow setting of the Don't Fragment (DF) bit.
|
|
|
|
// If unavailable or disabled, packets will be at most 1252 (IPv4) / 1232 (IPv6) bytes in size.
|
2021-08-03 09:04:02 +00:00
|
|
|
DisablePathMTUDiscovery bool
|
2023-05-06 00:42:41 +00:00
|
|
|
// Allow0RTT allows the application to decide if a 0-RTT connection attempt should be accepted.
|
|
|
|
// Only valid for the server.
|
|
|
|
Allow0RTT bool
|
|
|
|
// Enable QUIC datagram support (RFC 9221).
|
|
|
|
EnableDatagrams bool
|
2023-12-04 09:49:00 +00:00
|
|
|
Tracer func(context.Context, logging.Perspective, ConnectionID) *logging.ConnectionTracer
|
2023-05-06 00:42:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type ClientHelloInfo struct {
|
|
|
|
RemoteAddr net.Addr
|
2021-08-03 09:04:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// ConnectionState records basic details about a QUIC connection
|
|
|
|
type ConnectionState struct {
|
2023-12-04 09:49:00 +00:00
|
|
|
// TLS contains information about the TLS connection state, incl. the tls.ConnectionState.
|
|
|
|
TLS tls.ConnectionState
|
|
|
|
// SupportsDatagrams says if support for QUIC datagrams (RFC 9221) was negotiated.
|
|
|
|
// This requires both nodes to support and enable the datagram extensions (via Config.EnableDatagrams).
|
|
|
|
// If datagram support was negotiated, datagrams can be sent and received using the
|
|
|
|
// SendDatagram and ReceiveDatagram methods on the Connection.
|
2021-08-03 09:04:02 +00:00
|
|
|
SupportsDatagrams bool
|
2023-12-04 09:49:00 +00:00
|
|
|
// Used0RTT says if 0-RTT resumption was used.
|
|
|
|
Used0RTT bool
|
|
|
|
// Version is the QUIC version of the QUIC connection.
|
|
|
|
Version VersionNumber
|
|
|
|
// GSO says if generic segmentation offload is used
|
|
|
|
GSO bool
|
2021-08-03 09:04:02 +00:00
|
|
|
}
|