MINOR: quic: Extract CRYPTO frame parsing from qc_parse_pkt_frms()
Implement qc_handle_crypto_frm() to parse a CRYPTO frame.
Must be backported to 2.6.
diff --git a/src/quic_conn.c b/src/quic_conn.c
index 6fc1e30..73bc488 100644
--- a/src/quic_conn.c
+++ b/src/quic_conn.c
@@ -2573,6 +2573,83 @@
return ret;
}
+/* Parse <frm> CRYPTO frame coming with <pkt> packet at <qel> <qc> connectionn.
+ * Returns 1 if succeeded, 0 if not. Also set <*fast_retrans> to 1 if the
+ * speed up handshake completion may be run after having received duplicated
+ * CRYPTO data.
+ */
+static int qc_handle_crypto_frm(struct quic_conn *qc,
+ struct quic_crypto *frm, struct quic_rx_packet *pkt,
+ struct quic_enc_level *qel, int *fast_retrans)
+{
+ int ret = 0;
+ struct quic_rx_crypto_frm *cf;
+ /* XXX TO DO: <cfdebug> is used only for the traces. */
+ struct quic_rx_crypto_frm cfdebug = {
+ .offset_node.key = frm->offset,
+ .len = frm->len,
+ };
+
+ TRACE_ENTER(QUIC_EV_CONN_PRSHPKT, qc);
+ if (unlikely(qel->tls_ctx.flags & QUIC_FL_TLS_SECRETS_DCD)) {
+ TRACE_PROTO("CRYPTO data discarded",
+ QUIC_EV_CONN_RXPKT, qc, pkt, &cfdebug);
+ goto done;
+ }
+
+ if (unlikely(frm->offset < qel->rx.crypto.offset)) {
+ size_t diff;
+
+ if (frm->offset + frm->len <= qel->rx.crypto.offset) {
+ /* Nothing to do */
+ TRACE_PROTO("Already received CRYPTO data",
+ QUIC_EV_CONN_RXPKT, qc, pkt, &cfdebug);
+ if (qc_is_listener(qc) && qel == &qc->els[QUIC_TLS_ENC_LEVEL_INITIAL] &&
+ !(qc->flags & QUIC_FL_CONN_HANDSHAKE_SPEED_UP))
+ *fast_retrans = 1;
+ goto done;
+ }
+
+ TRACE_PROTO("Partially already received CRYPTO data",
+ QUIC_EV_CONN_RXPKT, qc, pkt, &cfdebug);
+
+ diff = qel->rx.crypto.offset - frm->offset;
+ frm->len -= diff;
+ frm->data += diff;
+ frm->offset = qel->rx.crypto.offset;
+ }
+
+ if (frm->offset == qel->rx.crypto.offset) {
+ if (!qc_provide_cdata(qel, qc->xprt_ctx, frm->data, frm->len,
+ pkt, &cfdebug)) {
+ // trace already emitted by function above
+ goto leave;
+ }
+
+ goto done;
+ }
+
+ /* frm->offset > qel->rx.crypto.offset */
+ cf = pool_alloc(pool_head_quic_rx_crypto_frm);
+ if (!cf) {
+ TRACE_ERROR("CRYPTO frame allocation failed", QUIC_EV_CONN_PRSHPKT, qc);
+ goto leave;
+ }
+
+ cf->offset_node.key = frm->offset;
+ cf->len = frm->len;
+ cf->data = frm->data;
+ cf->pkt = pkt;
+ eb64_insert(&qel->rx.crypto.frms, &cf->offset_node);
+ quic_rx_packet_refinc(pkt);
+
+ done:
+ ret = 1;
+ leave:
+ TRACE_LEAVE(QUIC_EV_CONN_PRSHPKT, qc);
+ return ret;
+}
+
/* Parse all the frames of <pkt> QUIC packet for QUIC connection <qc> and <qel>
* as encryption level.
* Returns 1 if succeeded, 0 if failed.
@@ -2638,83 +2715,9 @@
break;
}
case QUIC_FT_CRYPTO:
- {
- struct quic_rx_crypto_frm *cf;
-
- if (unlikely(qel->tls_ctx.flags & QUIC_FL_TLS_SECRETS_DCD)) {
- /* XXX TO DO: <cfdebug> is used only for the traces. */
- struct quic_rx_crypto_frm cfdebug = { };
-
- cfdebug.offset_node.key = frm.crypto.offset;
- cfdebug.len = frm.crypto.len;
- TRACE_PROTO("CRYPTO data discarded",
- QUIC_EV_CONN_RXPKT, qc, pkt, &cfdebug);
- break;
- }
-
- if (unlikely(frm.crypto.offset < qel->rx.crypto.offset)) {
- if (frm.crypto.offset + frm.crypto.len <= qel->rx.crypto.offset) {
- /* XXX TO DO: <cfdebug> is used only for the traces. */
- struct quic_rx_crypto_frm cfdebug = { };
-
- cfdebug.offset_node.key = frm.crypto.offset;
- cfdebug.len = frm.crypto.len;
- /* Nothing to do */
- TRACE_PROTO("Already received CRYPTO data",
- QUIC_EV_CONN_RXPKT, qc, pkt, &cfdebug);
- if (qc_is_listener(qc) &&
- qel == &qc->els[QUIC_TLS_ENC_LEVEL_INITIAL] &&
- !(qc->flags & QUIC_FL_CONN_HANDSHAKE_SPEED_UP))
- fast_retrans = 1;
- break;
- }
- else {
- size_t diff = qel->rx.crypto.offset - frm.crypto.offset;
- /* XXX TO DO: <cfdebug> is used only for the traces. */
- struct quic_rx_crypto_frm cfdebug = { };
-
- cfdebug.offset_node.key = frm.crypto.offset;
- cfdebug.len = frm.crypto.len;
- TRACE_PROTO("Partially already received CRYPTO data",
- QUIC_EV_CONN_RXPKT, qc, pkt, &cfdebug);
- frm.crypto.len -= diff;
- frm.crypto.data += diff;
- frm.crypto.offset = qel->rx.crypto.offset;
- }
- }
-
- if (frm.crypto.offset == qel->rx.crypto.offset) {
- /* XXX TO DO: <cf> is used only for the traces. */
- struct quic_rx_crypto_frm cfdebug = { };
-
- cfdebug.offset_node.key = frm.crypto.offset;
- cfdebug.len = frm.crypto.len;
- if (!qc_provide_cdata(qel, qc->xprt_ctx,
- frm.crypto.data, frm.crypto.len,
- pkt, &cfdebug)) {
- // trace already emitted by function above
- goto leave;
- }
-
- break;
- }
-
- /* frm.crypto.offset > qel->rx.crypto.offset */
- cf = pool_alloc(pool_head_quic_rx_crypto_frm);
- if (!cf) {
- TRACE_ERROR("CRYPTO frame allocation failed",
- QUIC_EV_CONN_PRSHPKT, qc);
+ if (!qc_handle_crypto_frm(qc, &frm.crypto, pkt, qel, &fast_retrans))
goto leave;
- }
-
- cf->offset_node.key = frm.crypto.offset;
- cf->len = frm.crypto.len;
- cf->data = frm.crypto.data;
- cf->pkt = pkt;
- eb64_insert(&qel->rx.crypto.frms, &cf->offset_node);
- quic_rx_packet_refinc(pkt);
break;
- }
case QUIC_FT_STREAM_8 ... QUIC_FT_STREAM_F:
{
struct quic_stream *stream = &frm.stream;