blob: 3d24b817eeb84832e6dad4f37de02dcedbdc1a1f [file] [log] [blame]
[email protected]8b37a092012-10-18 21:53:491// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#ifndef NET_QUIC_QUIC_PROTOCOL_H_
6#define NET_QUIC_QUIC_PROTOCOL_H_
7
[email protected]e537f742012-12-07 15:33:538#include <stddef.h>
tfarina3723da22015-06-03 21:39:309#include <stdint.h>
[email protected]8b37a092012-10-18 21:53:4910#include <limits>
rtenneti4b06ae72014-08-26 03:43:4311#include <list>
[email protected]a674b4c2012-12-05 03:44:3012#include <map>
[email protected]5640d0a2012-10-22 18:17:0213#include <ostream>
[email protected]e537f742012-12-07 15:33:5314#include <set>
15#include <string>
[email protected]8b37a092012-10-18 21:53:4916#include <utility>
17#include <vector>
18
19#include "base/basictypes.h"
[email protected]14c1c232013-06-11 17:52:4420#include "base/containers/hash_tables.h"
[email protected]8b37a092012-10-18 21:53:4921#include "base/logging.h"
[email protected]d069c11a2013-04-13 00:01:5522#include "base/strings/string_piece.h"
[email protected]165e0752012-11-16 07:49:4423#include "net/base/int128.h"
rtennetic14c8ab2015-06-18 05:47:4024#include "net/base/iovec.h"
[email protected]79d13dcb2014-02-05 07:23:1325#include "net/base/ip_endpoint.h"
[email protected]8b37a092012-10-18 21:53:4926#include "net/base/net_export.h"
[email protected]fee17f72013-02-03 07:47:4127#include "net/quic/quic_bandwidth.h"
[email protected]2a960e02012-11-11 14:48:1028#include "net/quic/quic_time.h"
rtennetic14c8ab2015-06-18 05:47:4029#include "net/quic/quic_types.h"
[email protected]8b37a092012-10-18 21:53:4930
31namespace net {
32
[email protected]97cf3022013-09-05 14:30:1633class QuicAckNotifier;
[email protected]8b37a092012-10-18 21:53:4934class QuicPacket;
[email protected]b064310782013-05-30 21:12:1735struct QuicPacketHeader;
[email protected]8b37a092012-10-18 21:53:4936
[email protected]3aa9ca72014-02-27 19:39:4337typedef uint64 QuicConnectionId;
[email protected]8b37a092012-10-18 21:53:4938typedef uint32 QuicStreamId;
39typedef uint64 QuicStreamOffset;
40typedef uint64 QuicPacketSequenceNumber;
[email protected]c995c572013-01-18 05:43:2041typedef QuicPacketSequenceNumber QuicFecGroupNumber;
[email protected]86a318d2013-01-23 21:16:0442typedef uint64 QuicPublicResetNonceProof;
[email protected]9db443912013-02-25 05:27:0343typedef uint8 QuicPacketEntropyHash;
[email protected]c244c5a12013-05-07 20:55:0444typedef uint32 QuicHeaderId;
[email protected]2532de12013-05-09 12:29:3345// QuicTag is the type of a tag in the wire protocol.
46typedef uint32 QuicTag;
47typedef std::vector<QuicTag> QuicTagVector;
[email protected]79d13dcb2014-02-05 07:23:1348typedef std::map<QuicTag, std::string> QuicTagValueMap;
[email protected]497bfb22014-01-08 01:28:0349// TODO(rtenneti): Didn't use SpdyPriority because SpdyPriority is uint8 and
50// QuicPriority is uint32. Use SpdyPriority when we change the QUIC_VERSION.
[email protected]8edeb8d2013-08-28 06:11:4351typedef uint32 QuicPriority;
[email protected]cff7b7b2013-01-11 08:49:0752
[email protected]8e01c062013-10-31 07:35:3153// Default and initial maximum size in bytes of a QUIC packet.
[email protected]310d37b2014-08-02 06:15:3754const QuicByteCount kDefaultMaxPacketSize = 1350;
rtenneti16a20772015-02-17 18:58:4855// Default initial maximum size in bytes of a QUIC packet for servers.
56const QuicByteCount kDefaultServerMaxPacketSize = 1000;
[email protected]8e01c062013-10-31 07:35:3157// The maximum packet size of any QUIC packet, based on ethernet's max size,
[email protected]41fb6372013-12-10 05:26:4058// minus the IP and UDP headers. IPv6 has a 40 byte header, UPD adds an
59// additional 8 bytes. This is a total overhead of 48 bytes. Ethernet's
60// max packet size is 1500 bytes, 1500 - 48 = 1452.
61const QuicByteCount kMaxPacketSize = 1452;
rtenneti9e0fb502015-03-08 06:07:1662// Default maximum packet size used in the Linux TCP implementation.
63// Used in QUIC for congestion window computations in bytes.
[email protected]ce7bb1412014-05-17 15:51:3364const QuicByteCount kDefaultTCPMSS = 1460;
[email protected]8e01c062013-10-31 07:35:3165
rtenneti3fe4ebbc2014-11-16 16:43:4766// We match SPDY's use of 32 when secure (since we'd compete with SPDY).
67const QuicPacketCount kInitialCongestionWindowSecure = 32;
68// Be conservative, and just use double a typical TCP ICWND for HTTP.
69const QuicPacketCount kInitialCongestionWindowInsecure = 20;
[email protected]8e01c062013-10-31 07:35:3170
rtenneti7652bf32015-01-05 18:51:0771// Minimum size of initial flow control window, for both stream and session.
72const uint32 kMinimumFlowControlSendWindow = 16 * 1024; // 16 KB
[email protected]9bb57c72014-03-31 20:36:0473
rtennetifb3fa6c2015-03-16 23:04:5574// Minimum size of the CWND, in packets, when doing bandwidth resumption.
rtenneti8d2a808d2014-11-26 01:10:0975const QuicPacketCount kMinCongestionWindowForBandwidthResumption = 10;
76
rtenneti581b6ae82015-07-20 20:48:0177// Maximum size of the CWND, in packets.
78const QuicPacketCount kMaxCongestionWindow = 200;
rtenneti69e64aa2015-06-26 04:25:3079
80// Maximum number of tracked packets.
81const QuicPacketCount kMaxTrackedPackets = 5000;
[email protected]0ac0c5b2013-11-20 05:55:5882
rtenneti23186682014-10-30 01:49:3383// Default size of the socket receive buffer in bytes.
[email protected]648f81142014-08-15 21:38:4684const QuicByteCount kDefaultSocketReceiveBuffer = 256 * 1024;
rtenneti23186682014-10-30 01:49:3385// Minimum size of the socket receive buffer in bytes.
86// Smaller values are ignored.
87const QuicByteCount kMinSocketReceiveBuffer = 16 * 1024;
[email protected]a97b3182014-08-08 08:10:1888
rtenneti95293802015-03-27 18:59:2389// Fraction of the receive buffer that can be used for encrypted bytes.
90// Allows a 5% overhead for IP and UDP framing, as well as ack only packets.
91static const float kUsableRecieveBufferFraction = 0.95f;
rtenneti581b6ae82015-07-20 20:48:0192// Fraction of the receive buffer that can be used, based on conservative
93// estimates and testing on Linux.
94// An alternative to kUsableRecieveBufferFraction.
95static const float kConservativeReceiveBufferFraction = 0.6f;
rtenneti95293802015-03-27 18:59:2396
rtennetifc97ab62014-11-11 22:17:4997// Don't allow a client to suggest an RTT shorter than 10ms.
98const uint32 kMinInitialRoundTripTimeUs = 10 * kNumMicrosPerMilli;
99
[email protected]8e01c062013-10-31 07:35:31100// Don't allow a client to suggest an RTT longer than 15 seconds.
[email protected]2d43c40122014-04-21 14:51:27101const uint32 kMaxInitialRoundTripTimeUs = 15 * kNumMicrosPerSecond;
[email protected]8b37a092012-10-18 21:53:49102
103// Maximum number of open streams per connection.
104const size_t kDefaultMaxStreamsPerConnection = 100;
105
[email protected]af806e62013-05-22 14:47:50106// Number of bytes reserved for public flags in the packet header.
107const size_t kPublicFlagsSize = 1;
[email protected]5351cc4b2013-03-03 07:22:41108// Number of bytes reserved for version number in the packet header.
109const size_t kQuicVersionSize = 4;
[email protected]c995c572013-01-18 05:43:20110// Number of bytes reserved for private flags in the packet header.
111const size_t kPrivateFlagsSize = 1;
112// Number of bytes reserved for FEC group in the packet header.
113const size_t kFecGroupSize = 1;
[email protected]5351cc4b2013-03-03 07:22:41114
115// Signifies that the QuicPacket will contain version of the protocol.
116const bool kIncludeVersion = true;
[email protected]c995c572013-01-18 05:43:20117
[email protected]5351cc4b2013-03-03 07:22:41118// Index of the first byte in a QUIC packet which is used in hash calculation.
119const size_t kStartOfHashData = 0;
[email protected]8b37a092012-10-18 21:53:49120
121// Limit on the delta between stream IDs.
[email protected]c5cc9bd2014-03-31 23:17:14122const QuicStreamId kMaxStreamIdDelta = 200;
[email protected]8b37a092012-10-18 21:53:49123
124// Reserved ID for the crypto stream.
[email protected]8b37a092012-10-18 21:53:49125const QuicStreamId kCryptoStreamId = 1;
126
[email protected]4d640792013-12-18 22:21:08127// Reserved ID for the headers stream.
128const QuicStreamId kHeadersStreamId = 3;
129
[email protected]648f81142014-08-15 21:38:46130// Maximum delayed ack time, in ms.
pkastingacec86f2014-10-14 23:08:55131const int64 kMaxDelayedAckTimeMs = 25;
[email protected]648f81142014-08-15 21:38:46132
rtennetib5512bb2014-09-29 19:17:15133// The timeout before the handshake succeeds.
134const int64 kInitialIdleTimeoutSecs = 5;
135// The default idle timeout.
136const int64 kDefaultIdleTimeoutSecs = 30;
rtenneti31e9fd62014-09-16 05:22:15137// The maximum idle timeout that can be negotiated.
138const int64 kMaximumIdleTimeoutSecs = 60 * 10; // 10 minutes.
139// The default timeout for a connection until the crypto handshake succeeds.
rtennetib5512bb2014-09-29 19:17:15140const int64 kMaxTimeForCryptoHandshakeSecs = 10; // 10 secs.
[email protected]8b37a092012-10-18 21:53:49141
rtenneti93bce7ece2014-10-13 22:38:41142// Default limit on the number of undecryptable packets the connection buffers
143// before the CHLO/SHLO arrive.
144const size_t kDefaultMaxUndecryptablePackets = 10;
145
[email protected]525948df2014-04-21 06:26:58146// Default ping timeout.
147const int64 kPingTimeoutSecs = 15; // 15 secs.
148
[email protected]ca4e0d92014-08-22 16:33:22149// Minimum number of RTTs between Server Config Updates (SCUP) sent to client.
150const int kMinIntervalBetweenServerConfigUpdatesRTTs = 10;
151
152// Minimum time between Server Config Updates (SCUP) sent to client.
153const int kMinIntervalBetweenServerConfigUpdatesMs = 1000;
154
rtenneti33da8ab2014-11-04 04:17:00155// Minimum number of packets between Server Config Updates (SCUP).
156const int kMinPacketsBetweenServerConfigUpdates = 100;
157
rtennetib5512bb2014-09-29 19:17:15158// The number of open streams that a server will accept is set to be slightly
159// larger than the negotiated limit. Immediately closing the connection if the
160// client opens slightly too many streams is not ideal: the client may have sent
161// a FIN that was lost, and simultaneously opened a new stream. The number of
162// streams a server accepts is a fixed increment over the negotiated limit, or a
163// percentage increase, whichever is larger.
rtenneti31e9fd62014-09-16 05:22:15164const float kMaxStreamsMultiplier = 1.1f;
rtennetib5512bb2014-09-29 19:17:15165const int kMaxStreamsMinimumIncrement = 10;
rtenneti31e9fd62014-09-16 05:22:15166
[email protected]b007e632013-10-28 08:39:25167// We define an unsigned 16-bit floating point value, inspired by IEEE floats
168// (http://en.wikipedia.org/wiki/Half_precision_floating-point_format),
169// with 5-bit exponent (bias 1), 11-bit mantissa (effective 12 with hidden
170// bit) and denormals, but without signs, transfinites or fractions. Wire format
171// 16 bits (little-endian byte order) are split into exponent (high 5) and
172// mantissa (low 11) and decoded as:
173// uint64 value;
174// if (exponent == 0) value = mantissa;
175// else value = (mantissa | 1 << 11) << (exponent - 1)
176const int kUFloat16ExponentBits = 5;
177const int kUFloat16MaxExponent = (1 << kUFloat16ExponentBits) - 2; // 30
178const int kUFloat16MantissaBits = 16 - kUFloat16ExponentBits; // 11
179const int kUFloat16MantissaEffectiveBits = kUFloat16MantissaBits + 1; // 12
180const uint64 kUFloat16MaxValue = // 0x3FFC0000000
tfarina3723da22015-06-03 21:39:30181 ((UINT64_C(1) << kUFloat16MantissaEffectiveBits) - 1) <<
[email protected]b007e632013-10-28 08:39:25182 kUFloat16MaxExponent;
183
[email protected]c67a82cb2013-09-24 02:53:21184enum TransmissionType {
[email protected]2532de12013-05-09 12:29:33185 NOT_RETRANSMISSION,
[email protected]b9475b582014-03-20 20:04:33186 FIRST_TRANSMISSION_TYPE = NOT_RETRANSMISSION,
187 HANDSHAKE_RETRANSMISSION, // Retransmits due to handshake timeouts.
rtenneti31e9fd62014-09-16 05:22:15188 ALL_UNACKED_RETRANSMISSION, // Retransmits all unacked packets.
189 ALL_INITIAL_RETRANSMISSION, // Retransmits all initially encrypted packets.
[email protected]b9475b582014-03-20 20:04:33190 LOSS_RETRANSMISSION, // Retransmits due to loss detection.
191 RTO_RETRANSMISSION, // Retransmits due to retransmit time out.
192 TLP_RETRANSMISSION, // Tail loss probes.
193 LAST_TRANSMISSION_TYPE = TLP_RETRANSMISSION,
[email protected]74bda142013-03-31 02:49:11194};
195
196enum HasRetransmittableData {
[email protected]2532de12013-05-09 12:29:33197 NO_RETRANSMITTABLE_DATA,
198 HAS_RETRANSMITTABLE_DATA,
[email protected]74bda142013-03-31 02:49:11199};
200
[email protected]575cce62013-08-03 02:06:43201enum IsHandshake {
202 NOT_HANDSHAKE,
203 IS_HANDSHAKE
204};
205
rtenneti6f48aa92015-03-16 02:18:48206enum class Perspective { IS_SERVER, IS_CLIENT };
207
208NET_EXPORT_PRIVATE std::ostream& operator<<(std::ostream& os,
209 const Perspective& s);
210
[email protected]bbb10072014-06-13 07:41:59211// Indicates FEC protection level for data being written.
212enum FecProtection {
213 MUST_FEC_PROTECT, // Callee must FEC protect this data.
[email protected]a5b98172014-06-18 07:01:59214 MAY_FEC_PROTECT // Callee does not have to but may FEC protect this data.
215};
216
[email protected]bc356fe2014-06-19 11:14:14217// Indicates FEC policy.
[email protected]a5b98172014-06-18 07:01:59218enum FecPolicy {
219 FEC_PROTECT_ALWAYS, // All data in the stream should be FEC protected.
220 FEC_PROTECT_OPTIONAL // Data in the stream does not need FEC protection.
[email protected]bbb10072014-06-13 07:41:59221};
222
rtennetia4228ea2015-06-04 02:31:44223// Indicates FEC policy about when to send FEC packet.
224enum FecSendPolicy {
225 // Send FEC packet when FEC group is full or when FEC alarm goes off.
226 FEC_ANY_TRIGGER,
227 // Send FEC packet only when FEC alarm goes off.
228 FEC_ALARM_TRIGGER
229};
230
[email protected]be24ab22012-10-22 03:01:52231enum QuicFrameType {
[email protected]6ae6e342014-02-06 02:21:42232 // Regular frame types. The values set here cannot change without the
233 // introduction of a new QUIC version.
[email protected]c995c572013-01-18 05:43:20234 PADDING_FRAME = 0,
[email protected]6ae6e342014-02-06 02:21:42235 RST_STREAM_FRAME = 1,
236 CONNECTION_CLOSE_FRAME = 2,
237 GOAWAY_FRAME = 3,
238 WINDOW_UPDATE_FRAME = 4,
239 BLOCKED_FRAME = 5,
[email protected]93dd91f2014-02-27 00:09:03240 STOP_WAITING_FRAME = 6,
[email protected]d8c522112014-04-23 09:23:25241 PING_FRAME = 7,
[email protected]6ae6e342014-02-06 02:21:42242
rtennetif4bdb542015-01-21 14:33:05243 // STREAM and ACK frames are special frames. They are encoded differently on
244 // the wire and their values do not need to be stable.
[email protected]97cf3022013-09-05 14:30:16245 STREAM_FRAME,
246 ACK_FRAME,
rtenneti69e64aa2015-06-26 04:25:30247 // The path MTU discovery frame is encoded as a PING frame on the wire.
248 MTU_DISCOVERY_FRAME,
[email protected]be24ab22012-10-22 03:01:52249 NUM_FRAME_TYPES
[email protected]8b37a092012-10-18 21:53:49250};
251
[email protected]3aa9ca72014-02-27 19:39:43252enum QuicConnectionIdLength {
253 PACKET_0BYTE_CONNECTION_ID = 0,
254 PACKET_1BYTE_CONNECTION_ID = 1,
255 PACKET_4BYTE_CONNECTION_ID = 4,
256 PACKET_8BYTE_CONNECTION_ID = 8
[email protected]b064310782013-05-30 21:12:17257};
258
259enum InFecGroup {
260 NOT_IN_FEC_GROUP,
261 IN_FEC_GROUP,
262};
263
[email protected]25c31dc2013-06-05 17:56:04264enum QuicSequenceNumberLength {
265 PACKET_1BYTE_SEQUENCE_NUMBER = 1,
266 PACKET_2BYTE_SEQUENCE_NUMBER = 2,
267 PACKET_4BYTE_SEQUENCE_NUMBER = 4,
268 PACKET_6BYTE_SEQUENCE_NUMBER = 6
269};
270
[email protected]8e01c062013-10-31 07:35:31271// Used to indicate a QuicSequenceNumberLength using two flag bits.
272enum QuicSequenceNumberLengthFlags {
273 PACKET_FLAGS_1BYTE_SEQUENCE = 0, // 00
274 PACKET_FLAGS_2BYTE_SEQUENCE = 1, // 01
275 PACKET_FLAGS_4BYTE_SEQUENCE = 1 << 1, // 10
276 PACKET_FLAGS_6BYTE_SEQUENCE = 1 << 1 | 1, // 11
277};
278
[email protected]f62262b2013-07-05 20:57:30279// The public flags are specified in one byte.
[email protected]c995c572013-01-18 05:43:20280enum QuicPacketPublicFlags {
281 PACKET_PUBLIC_FLAGS_NONE = 0,
[email protected]f62262b2013-07-05 20:57:30282
283 // Bit 0: Does the packet header contains version info?
284 PACKET_PUBLIC_FLAGS_VERSION = 1 << 0,
285
286 // Bit 1: Is this packet a public reset packet?
287 PACKET_PUBLIC_FLAGS_RST = 1 << 1,
288
[email protected]3aa9ca72014-02-27 19:39:43289 // Bits 2 and 3 specify the length of the ConnectionId as follows:
[email protected]f62262b2013-07-05 20:57:30290 // ----00--: 0 bytes
291 // ----01--: 1 byte
292 // ----10--: 4 bytes
293 // ----11--: 8 bytes
[email protected]3aa9ca72014-02-27 19:39:43294 PACKET_PUBLIC_FLAGS_0BYTE_CONNECTION_ID = 0,
295 PACKET_PUBLIC_FLAGS_1BYTE_CONNECTION_ID = 1 << 2,
296 PACKET_PUBLIC_FLAGS_4BYTE_CONNECTION_ID = 1 << 3,
297 PACKET_PUBLIC_FLAGS_8BYTE_CONNECTION_ID = 1 << 3 | 1 << 2,
[email protected]f62262b2013-07-05 20:57:30298
299 // Bits 4 and 5 describe the packet sequence number length as follows:
300 // --00----: 1 byte
301 // --01----: 2 bytes
302 // --10----: 4 bytes
303 // --11----: 6 bytes
[email protected]8e01c062013-10-31 07:35:31304 PACKET_PUBLIC_FLAGS_1BYTE_SEQUENCE = PACKET_FLAGS_1BYTE_SEQUENCE << 4,
305 PACKET_PUBLIC_FLAGS_2BYTE_SEQUENCE = PACKET_FLAGS_2BYTE_SEQUENCE << 4,
306 PACKET_PUBLIC_FLAGS_4BYTE_SEQUENCE = PACKET_FLAGS_4BYTE_SEQUENCE << 4,
307 PACKET_PUBLIC_FLAGS_6BYTE_SEQUENCE = PACKET_FLAGS_6BYTE_SEQUENCE << 4,
[email protected]f62262b2013-07-05 20:57:30308
309 // All bits set (bits 6 and 7 are not currently used): 00111111
310 PACKET_PUBLIC_FLAGS_MAX = (1 << 6) - 1
[email protected]c995c572013-01-18 05:43:20311};
[email protected]8b37a092012-10-18 21:53:49312
[email protected]f62262b2013-07-05 20:57:30313// The private flags are specified in one byte.
[email protected]c995c572013-01-18 05:43:20314enum QuicPacketPrivateFlags {
315 PACKET_PRIVATE_FLAGS_NONE = 0,
[email protected]f62262b2013-07-05 20:57:30316
317 // Bit 0: Does this packet contain an entropy bit?
[email protected]b064310782013-05-30 21:12:17318 PACKET_PRIVATE_FLAGS_ENTROPY = 1 << 0,
[email protected]f62262b2013-07-05 20:57:30319
320 // Bit 1: Payload is part of an FEC group?
321 PACKET_PRIVATE_FLAGS_FEC_GROUP = 1 << 1,
322
323 // Bit 2: Payload is FEC as opposed to frames?
324 PACKET_PRIVATE_FLAGS_FEC = 1 << 2,
325
326 // All bits set (bits 3-7 are not currently used): 00000111
327 PACKET_PRIVATE_FLAGS_MAX = (1 << 3) - 1
[email protected]c995c572013-01-18 05:43:20328};
329
[email protected]48878092013-07-26 14:51:56330// The available versions of QUIC. Guaranteed that the integer value of the enum
331// will match the version number.
332// When adding a new version to this enum you should add it to
[email protected]8bbfaeb72013-08-09 06:38:26333// kSupportedQuicVersions (if appropriate), and also add a new case to the
334// helper methods QuicVersionToQuicTag, QuicTagToQuicVersion, and
335// QuicVersionToString.
[email protected]48878092013-07-26 14:51:56336enum QuicVersion {
337 // Special case to indicate unknown/unsupported QUIC version.
338 QUIC_VERSION_UNSUPPORTED = 0,
339
rtenneti501f0a92015-01-17 01:55:40340 QUIC_VERSION_24 = 24, // SPDY/4 header compression.
rchc0815442015-04-18 13:29:46341 QUIC_VERSION_25 = 25, // SPDY/4 header keys, and removal of error_details
342 // from QuicRstStreamFrame
[email protected]48878092013-07-26 14:51:56343};
344
345// This vector contains QUIC versions which we currently support.
346// This should be ordered such that the highest supported version is the first
347// element, with subsequent elements in descending order (versions can be
348// skipped as necessary).
[email protected]31ae854842013-11-27 00:05:46349//
[email protected]310d37b2014-08-02 06:15:37350// IMPORTANT: if you are adding to this list, follow the instructions at
[email protected]31ae854842013-11-27 00:05:46351// http://sites/quic/adding-and-removing-versions
rchc0815442015-04-18 13:29:46352static const QuicVersion kSupportedQuicVersions[] = {QUIC_VERSION_25,
rtennetie0ee6eb2015-05-01 00:55:09353 QUIC_VERSION_24};
[email protected]48878092013-07-26 14:51:56354
355typedef std::vector<QuicVersion> QuicVersionVector;
356
[email protected]b007e632013-10-28 08:39:25357// Returns a vector of QUIC versions in kSupportedQuicVersions.
358NET_EXPORT_PRIVATE QuicVersionVector QuicSupportedVersions();
[email protected]ea2ab47b2013-08-13 00:44:11359
[email protected]48878092013-07-26 14:51:56360// QuicTag is written to and read from the wire, but we prefer to use
361// the more readable QuicVersion at other levels.
362// Helper function which translates from a QuicVersion to a QuicTag. Returns 0
363// if QuicVersion is unsupported.
364NET_EXPORT_PRIVATE QuicTag QuicVersionToQuicTag(const QuicVersion version);
365
366// Returns appropriate QuicVersion from a QuicTag.
367// Returns QUIC_VERSION_UNSUPPORTED if version_tag cannot be understood.
368NET_EXPORT_PRIVATE QuicVersion QuicTagToQuicVersion(const QuicTag version_tag);
369
370// Helper function which translates from a QuicVersion to a string.
371// Returns strings corresponding to enum names (e.g. QUIC_VERSION_6).
372NET_EXPORT_PRIVATE std::string QuicVersionToString(const QuicVersion version);
373
374// Returns comma separated list of string representations of QuicVersion enum
[email protected]b007e632013-10-28 08:39:25375// values in the supplied |versions| vector.
376NET_EXPORT_PRIVATE std::string QuicVersionVectorToString(
377 const QuicVersionVector& versions);
[email protected]48878092013-07-26 14:51:56378
379// Version and Crypto tags are written to the wire with a big-endian
380// representation of the name of the tag. For example
381// the client hello tag (CHLO) will be written as the
382// following 4 bytes: 'C' 'H' 'L' 'O'. Since it is
383// stored in memory as a little endian uint32, we need
384// to reverse the order of the bytes.
385
386// MakeQuicTag returns a value given the four bytes. For example:
387// MakeQuicTag('C', 'H', 'L', 'O');
388NET_EXPORT_PRIVATE QuicTag MakeQuicTag(char a, char b, char c, char d);
389
[email protected]9cda5fd2014-06-03 10:20:28390// Returns true if the tag vector contains the specified tag.
[email protected]cc1aa272014-06-30 19:48:22391NET_EXPORT_PRIVATE bool ContainsQuicTag(const QuicTagVector& tag_vector,
392 QuicTag tag);
[email protected]9cda5fd2014-06-03 10:20:28393
[email protected]b064310782013-05-30 21:12:17394// Size in bytes of the data or fec packet header.
[email protected]79d13dcb2014-02-05 07:23:13395NET_EXPORT_PRIVATE size_t GetPacketHeaderSize(const QuicPacketHeader& header);
[email protected]b064310782013-05-30 21:12:17396
[email protected]25c31dc2013-06-05 17:56:04397NET_EXPORT_PRIVATE size_t GetPacketHeaderSize(
[email protected]3aa9ca72014-02-27 19:39:43398 QuicConnectionIdLength connection_id_length,
[email protected]25c31dc2013-06-05 17:56:04399 bool include_version,
400 QuicSequenceNumberLength sequence_number_length,
401 InFecGroup is_in_fec_group);
[email protected]b064310782013-05-30 21:12:17402
[email protected]b064310782013-05-30 21:12:17403// Index of the first byte in a QUIC packet of FEC protected data.
[email protected]25c31dc2013-06-05 17:56:04404NET_EXPORT_PRIVATE size_t GetStartOfFecProtectedData(
[email protected]3aa9ca72014-02-27 19:39:43405 QuicConnectionIdLength connection_id_length,
[email protected]25c31dc2013-06-05 17:56:04406 bool include_version,
407 QuicSequenceNumberLength sequence_number_length);
[email protected]b064310782013-05-30 21:12:17408// Index of the first byte in a QUIC packet of encrypted data.
[email protected]25c31dc2013-06-05 17:56:04409NET_EXPORT_PRIVATE size_t GetStartOfEncryptedData(
[email protected]3aa9ca72014-02-27 19:39:43410 QuicConnectionIdLength connection_id_length,
[email protected]25c31dc2013-06-05 17:56:04411 bool include_version,
412 QuicSequenceNumberLength sequence_number_length);
[email protected]b064310782013-05-30 21:12:17413
[email protected]74bda142013-03-31 02:49:11414enum QuicRstStreamErrorCode {
415 QUIC_STREAM_NO_ERROR = 0,
[email protected]8b37a092012-10-18 21:53:49416
[email protected]24e5bc52013-09-18 15:36:58417 // There was some error which halted stream processing.
418 QUIC_ERROR_PROCESSING_STREAM,
[email protected]8b37a092012-10-18 21:53:49419 // We got two fin or reset offsets which did not match.
420 QUIC_MULTIPLE_TERMINATION_OFFSETS,
421 // We got bad payload and can not respond to it at the protocol level.
422 QUIC_BAD_APPLICATION_PAYLOAD,
[email protected]74bda142013-03-31 02:49:11423 // Stream closed due to connection error. No reset frame is sent when this
424 // happens.
425 QUIC_STREAM_CONNECTION_ERROR,
426 // GoAway frame sent. No more stream can be created.
427 QUIC_STREAM_PEER_GOING_AWAY,
[email protected]06ff5152013-08-29 01:03:05428 // The stream has been cancelled.
429 QUIC_STREAM_CANCELLED,
rtenneti4a5df262014-11-07 00:43:58430 // Closing stream locally, sending a RST to allow for proper flow control
431 // accounting. Sent in response to a RST from the peer.
432 QUIC_RST_ACKNOWLEDGEMENT,
[email protected]8b37a092012-10-18 21:53:49433
[email protected]74bda142013-03-31 02:49:11434 // No error. Used as bound while iterating.
435 QUIC_STREAM_LAST_ERROR,
436};
[email protected]8b37a092012-10-18 21:53:49437
[email protected]51cc1342014-04-18 23:44:37438// Because receiving an unknown QuicRstStreamErrorCode results in connection
439// teardown, we use this to make sure any errors predating a given version are
440// downgraded to the most appropriate existing error.
441NET_EXPORT_PRIVATE QuicRstStreamErrorCode AdjustErrorForVersion(
442 QuicRstStreamErrorCode error_code,
443 QuicVersion version);
444
[email protected]89264042013-08-21 07:35:24445// These values must remain stable as they are uploaded to UMA histograms.
446// To add a new error code, use the current value of QUIC_LAST_ERROR and
447// increment QUIC_LAST_ERROR.
[email protected]74bda142013-03-31 02:49:11448enum QuicErrorCode {
449 QUIC_NO_ERROR = 0,
450
451 // Connection has reached an invalid state.
[email protected]89264042013-08-21 07:35:24452 QUIC_INTERNAL_ERROR = 1,
[email protected]74bda142013-03-31 02:49:11453 // There were data frames after the a fin or reset.
[email protected]89264042013-08-21 07:35:24454 QUIC_STREAM_DATA_AFTER_TERMINATION = 2,
[email protected]8b37a092012-10-18 21:53:49455 // Control frame is malformed.
[email protected]89264042013-08-21 07:35:24456 QUIC_INVALID_PACKET_HEADER = 3,
[email protected]be24ab22012-10-22 03:01:52457 // Frame data is malformed.
[email protected]89264042013-08-21 07:35:24458 QUIC_INVALID_FRAME_DATA = 4,
459 // The packet contained no payload.
460 QUIC_MISSING_PAYLOAD = 48,
[email protected]8b37a092012-10-18 21:53:49461 // FEC data is malformed.
[email protected]89264042013-08-21 07:35:24462 QUIC_INVALID_FEC_DATA = 5,
463 // STREAM frame data is malformed.
464 QUIC_INVALID_STREAM_DATA = 46,
[email protected]42a3eba2014-04-30 10:52:55465 // STREAM frame data is not encrypted.
466 QUIC_UNENCRYPTED_STREAM_DATA = 61,
[email protected]89264042013-08-21 07:35:24467 // RST_STREAM frame data is malformed.
468 QUIC_INVALID_RST_STREAM_DATA = 6,
469 // CONNECTION_CLOSE frame data is malformed.
470 QUIC_INVALID_CONNECTION_CLOSE_DATA = 7,
471 // GOAWAY frame data is malformed.
472 QUIC_INVALID_GOAWAY_DATA = 8,
[email protected]6ae6e342014-02-06 02:21:42473 // WINDOW_UPDATE frame data is malformed.
474 QUIC_INVALID_WINDOW_UPDATE_DATA = 57,
475 // BLOCKED frame data is malformed.
476 QUIC_INVALID_BLOCKED_DATA = 58,
[email protected]93dd91f2014-02-27 00:09:03477 // STOP_WAITING frame data is malformed.
478 QUIC_INVALID_STOP_WAITING_DATA = 60,
[email protected]89264042013-08-21 07:35:24479 // ACK frame data is malformed.
480 QUIC_INVALID_ACK_DATA = 9,
rtennetif4bdb542015-01-21 14:33:05481
482 // deprecated: QUIC_INVALID_CONGESTION_FEEDBACK_DATA = 47,
483
[email protected]14e8106c2013-03-14 16:25:33484 // Version negotiation packet is malformed.
[email protected]89264042013-08-21 07:35:24485 QUIC_INVALID_VERSION_NEGOTIATION_PACKET = 10,
[email protected]899951652013-05-16 12:52:39486 // Public RST packet is malformed.
[email protected]89264042013-08-21 07:35:24487 QUIC_INVALID_PUBLIC_RST_PACKET = 11,
[email protected]8b37a092012-10-18 21:53:49488 // There was an error decrypting.
[email protected]89264042013-08-21 07:35:24489 QUIC_DECRYPTION_FAILURE = 12,
[email protected]8b37a092012-10-18 21:53:49490 // There was an error encrypting.
[email protected]89264042013-08-21 07:35:24491 QUIC_ENCRYPTION_FAILURE = 13,
[email protected]8b37a092012-10-18 21:53:49492 // The packet exceeded kMaxPacketSize.
[email protected]89264042013-08-21 07:35:24493 QUIC_PACKET_TOO_LARGE = 14,
[email protected]8b37a092012-10-18 21:53:49494 // Data was sent for a stream which did not exist.
[email protected]89264042013-08-21 07:35:24495 QUIC_PACKET_FOR_NONEXISTENT_STREAM = 15,
[email protected]9db443912013-02-25 05:27:03496 // The peer is going away. May be a client or server.
[email protected]89264042013-08-21 07:35:24497 QUIC_PEER_GOING_AWAY = 16,
[email protected]8b37a092012-10-18 21:53:49498 // A stream ID was invalid.
[email protected]89264042013-08-21 07:35:24499 QUIC_INVALID_STREAM_ID = 17,
[email protected]24e5bc52013-09-18 15:36:58500 // A priority was invalid.
501 QUIC_INVALID_PRIORITY = 49,
[email protected]8b37a092012-10-18 21:53:49502 // Too many streams already open.
[email protected]89264042013-08-21 07:35:24503 QUIC_TOO_MANY_OPEN_STREAMS = 18,
[email protected]9693157b2014-08-08 11:13:49504 // The peer must send a FIN/RST for each stream, and has not been doing so.
505 QUIC_TOO_MANY_UNFINISHED_STREAMS = 66,
[email protected]86a318d2013-01-23 21:16:04506 // Received public reset for this connection.
[email protected]89264042013-08-21 07:35:24507 QUIC_PUBLIC_RESET = 19,
[email protected]c244c5a12013-05-07 20:55:04508 // Invalid protocol version.
[email protected]89264042013-08-21 07:35:24509 QUIC_INVALID_VERSION = 20,
[email protected]92bf17c2014-03-03 21:14:03510
511 // deprecated: QUIC_STREAM_RST_BEFORE_HEADERS_DECOMPRESSED = 21
512
[email protected]c244c5a12013-05-07 20:55:04513 // The Header ID for a stream was too far from the previous.
[email protected]89264042013-08-21 07:35:24514 QUIC_INVALID_HEADER_ID = 22,
[email protected]899951652013-05-16 12:52:39515 // Negotiable parameter received during handshake had invalid value.
[email protected]89264042013-08-21 07:35:24516 QUIC_INVALID_NEGOTIATED_VALUE = 23,
[email protected]899951652013-05-16 12:52:39517 // There was an error decompressing data.
[email protected]89264042013-08-21 07:35:24518 QUIC_DECOMPRESSION_FAILURE = 24,
[email protected]8b37a092012-10-18 21:53:49519 // We hit our prenegotiated (or default) timeout
[email protected]89264042013-08-21 07:35:24520 QUIC_CONNECTION_TIMED_OUT = 25,
rtenneti31e9fd62014-09-16 05:22:15521 // We hit our overall connection timeout
522 QUIC_CONNECTION_OVERALL_TIMED_OUT = 67,
[email protected]899951652013-05-16 12:52:39523 // There was an error encountered migrating addresses
[email protected]89264042013-08-21 07:35:24524 QUIC_ERROR_MIGRATING_ADDRESS = 26,
[email protected]1505a512013-09-04 22:59:35525 // There was an error while writing to the socket.
[email protected]89264042013-08-21 07:35:24526 QUIC_PACKET_WRITE_ERROR = 27,
[email protected]1505a512013-09-04 22:59:35527 // There was an error while reading from the socket.
528 QUIC_PACKET_READ_ERROR = 51,
[email protected]24e5bc52013-09-18 15:36:58529 // We received a STREAM_FRAME with no data and no fin flag set.
530 QUIC_INVALID_STREAM_FRAME = 50,
[email protected]4d640792013-12-18 22:21:08531 // We received invalid data on the headers stream.
532 QUIC_INVALID_HEADERS_STREAM_DATA = 56,
[email protected]730b35d72014-06-05 03:23:22533 // The peer received too much data, violating flow control.
534 QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA = 59,
535 // The peer sent too much data, violating flow control.
536 QUIC_FLOW_CONTROL_SENT_TOO_MUCH_DATA = 63,
537 // The peer received an invalid flow control window.
538 QUIC_FLOW_CONTROL_INVALID_WINDOW = 64,
[email protected]71c84e592014-05-28 23:39:29539 // The connection has been IP pooled into an existing connection.
540 QUIC_CONNECTION_IP_POOLED = 62,
rtenneti23186682014-10-30 01:49:33541 // The connection has too many outstanding sent packets.
542 QUIC_TOO_MANY_OUTSTANDING_SENT_PACKETS = 68,
543 // The connection has too many outstanding received packets.
544 QUIC_TOO_MANY_OUTSTANDING_RECEIVED_PACKETS = 69,
rtenneti14abd312015-02-06 21:56:01545 // The quic connection job to load server config is cancelled.
546 QUIC_CONNECTION_CANCELLED = 70,
rtenneti85dcfac22015-03-27 20:22:19547 // Disabled QUIC because of high packet loss rate.
548 QUIC_BAD_PACKET_LOSS_RATE = 71,
ckrasic1e53b642015-07-08 22:39:35549 // Disabled QUIC because of too many PUBLIC_RESETs post handshake.
550 QUIC_PUBLIC_RESETS_POST_HANDSHAKE = 73,
551 // Disabled QUIC because of too many timeouts with streams open.
552 QUIC_TIMEOUTS_WITH_OPEN_STREAMS = 74,
rtenneti8811fdb2015-07-22 00:17:07553 // Closed because we failed to serialize a packet.
554 QUIC_FAILED_TO_SERIALIZE_PACKET = 75,
[email protected]8b37a092012-10-18 21:53:49555
556 // Crypto errors.
557
[email protected]1354bf62013-05-23 23:17:18558 // Hanshake failed.
[email protected]89264042013-08-21 07:35:24559 QUIC_HANDSHAKE_FAILED = 28,
[email protected]8b37a092012-10-18 21:53:49560 // Handshake message contained out of order tags.
[email protected]89264042013-08-21 07:35:24561 QUIC_CRYPTO_TAGS_OUT_OF_ORDER = 29,
[email protected]701bc892013-01-17 04:51:54562 // Handshake message contained too many entries.
[email protected]89264042013-08-21 07:35:24563 QUIC_CRYPTO_TOO_MANY_ENTRIES = 30,
[email protected]8b37a092012-10-18 21:53:49564 // Handshake message contained an invalid value length.
[email protected]89264042013-08-21 07:35:24565 QUIC_CRYPTO_INVALID_VALUE_LENGTH = 31,
[email protected]8b37a092012-10-18 21:53:49566 // A crypto message was received after the handshake was complete.
[email protected]89264042013-08-21 07:35:24567 QUIC_CRYPTO_MESSAGE_AFTER_HANDSHAKE_COMPLETE = 32,
[email protected]d3d15bf2013-01-30 02:51:54568 // A crypto message was received with an illegal message tag.
[email protected]89264042013-08-21 07:35:24569 QUIC_INVALID_CRYPTO_MESSAGE_TYPE = 33,
[email protected]d3d15bf2013-01-30 02:51:54570 // A crypto message was received with an illegal parameter.
[email protected]89264042013-08-21 07:35:24571 QUIC_INVALID_CRYPTO_MESSAGE_PARAMETER = 34,
[email protected]752fbe52013-10-14 08:35:32572 // An invalid channel id signature was supplied.
573 QUIC_INVALID_CHANNEL_ID_SIGNATURE = 52,
[email protected]d3d15bf2013-01-30 02:51:54574 // A crypto message was received with a mandatory parameter missing.
[email protected]89264042013-08-21 07:35:24575 QUIC_CRYPTO_MESSAGE_PARAMETER_NOT_FOUND = 35,
[email protected]d3d15bf2013-01-30 02:51:54576 // A crypto message was received with a parameter that has no overlap
577 // with the local parameter.
[email protected]89264042013-08-21 07:35:24578 QUIC_CRYPTO_MESSAGE_PARAMETER_NO_OVERLAP = 36,
[email protected]ed3fc15d2013-03-08 18:37:44579 // A crypto message was received that contained a parameter with too few
580 // values.
[email protected]89264042013-08-21 07:35:24581 QUIC_CRYPTO_MESSAGE_INDEX_NOT_FOUND = 37,
[email protected]ccc66e8a2013-03-26 08:26:14582 // An internal error occured in crypto processing.
[email protected]89264042013-08-21 07:35:24583 QUIC_CRYPTO_INTERNAL_ERROR = 38,
[email protected]ccc66e8a2013-03-26 08:26:14584 // A crypto handshake message specified an unsupported version.
[email protected]89264042013-08-21 07:35:24585 QUIC_CRYPTO_VERSION_NOT_SUPPORTED = 39,
rtennetie0ee6eb2015-05-01 00:55:09586 // A crypto handshake message resulted in a stateless reject.
587 QUIC_CRYPTO_HANDSHAKE_STATELESS_REJECT = 72,
[email protected]ccc66e8a2013-03-26 08:26:14588 // There was no intersection between the crypto primitives supported by the
589 // peer and ourselves.
[email protected]89264042013-08-21 07:35:24590 QUIC_CRYPTO_NO_SUPPORT = 40,
[email protected]ef95114d2013-04-17 17:57:01591 // The server rejected our client hello messages too many times.
[email protected]89264042013-08-21 07:35:24592 QUIC_CRYPTO_TOO_MANY_REJECTS = 41,
[email protected]a57e0272013-04-26 07:31:47593 // The client rejected the server's certificate chain or signature.
[email protected]89264042013-08-21 07:35:24594 QUIC_PROOF_INVALID = 42,
[email protected]8ba81212013-05-03 13:11:48595 // A crypto message was received with a duplicate tag.
[email protected]89264042013-08-21 07:35:24596 QUIC_CRYPTO_DUPLICATE_TAG = 43,
[email protected]2532de12013-05-09 12:29:33597 // A crypto message was received with the wrong encryption level (i.e. it
598 // should have been encrypted but was not.)
[email protected]89264042013-08-21 07:35:24599 QUIC_CRYPTO_ENCRYPTION_LEVEL_INCORRECT = 44,
[email protected]2532de12013-05-09 12:29:33600 // The server config for a server has expired.
[email protected]89264042013-08-21 07:35:24601 QUIC_CRYPTO_SERVER_CONFIG_EXPIRED = 45,
[email protected]752fbe52013-10-14 08:35:32602 // We failed to setup the symmetric keys for a connection.
603 QUIC_CRYPTO_SYMMETRIC_KEY_SETUP_FAILED = 53,
[email protected]691f45a982013-11-19 10:52:04604 // A handshake message arrived, but we are still validating the
605 // previous handshake message.
606 QUIC_CRYPTO_MESSAGE_WHILE_VALIDATING_CLIENT_HELLO = 54,
[email protected]ccb34212014-07-18 09:27:50607 // A server config update arrived before the handshake is complete.
608 QUIC_CRYPTO_UPDATE_BEFORE_HANDSHAKE_COMPLETE = 65,
[email protected]d89f1862013-11-26 21:21:27609 // This connection involved a version negotiation which appears to have been
610 // tampered with.
611 QUIC_VERSION_NEGOTIATION_MISMATCH = 55,
[email protected]ccc66e8a2013-03-26 08:26:14612
[email protected]74bda142013-03-31 02:49:11613 // No error. Used as bound while iterating.
rtenneti8811fdb2015-07-22 00:17:07614 QUIC_LAST_ERROR = 76,
[email protected]8b37a092012-10-18 21:53:49615};
616
[email protected]c995c572013-01-18 05:43:20617struct NET_EXPORT_PRIVATE QuicPacketPublicHeader {
[email protected]14e8106c2013-03-14 16:25:33618 QuicPacketPublicHeader();
619 explicit QuicPacketPublicHeader(const QuicPacketPublicHeader& other);
620 ~QuicPacketPublicHeader();
621
[email protected]3aa9ca72014-02-27 19:39:43622 // Universal header. All QuicPacket headers will have a connection_id and
623 // public flags.
624 QuicConnectionId connection_id;
625 QuicConnectionIdLength connection_id_length;
[email protected]9db443912013-02-25 05:27:03626 bool reset_flag;
627 bool version_flag;
[email protected]25c31dc2013-06-05 17:56:04628 QuicSequenceNumberLength sequence_number_length;
[email protected]48878092013-07-26 14:51:56629 QuicVersionVector versions;
[email protected]c995c572013-01-18 05:43:20630};
631
rtenneti9e0fb502015-03-08 06:07:16632// An integer which cannot be a packet sequence number.
633const QuicPacketSequenceNumber kInvalidPacketSequenceNumber = 0;
634
[email protected]c995c572013-01-18 05:43:20635// Header for Data or FEC packets.
[email protected]74bda142013-03-31 02:49:11636struct NET_EXPORT_PRIVATE QuicPacketHeader {
637 QuicPacketHeader();
638 explicit QuicPacketHeader(const QuicPacketPublicHeader& header);
[email protected]9db443912013-02-25 05:27:03639
640 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
641 std::ostream& os, const QuicPacketHeader& s);
642
[email protected]c995c572013-01-18 05:43:20643 QuicPacketPublicHeader public_header;
rtennetid39bd762015-06-12 01:05:52644 QuicPacketSequenceNumber packet_sequence_number;
[email protected]9db443912013-02-25 05:27:03645 bool fec_flag;
[email protected]9db443912013-02-25 05:27:03646 bool entropy_flag;
647 QuicPacketEntropyHash entropy_hash;
[email protected]b064310782013-05-30 21:12:17648 InFecGroup is_in_fec_group;
[email protected]8b37a092012-10-18 21:53:49649 QuicFecGroupNumber fec_group;
650};
651
[email protected]74bda142013-03-31 02:49:11652struct NET_EXPORT_PRIVATE QuicPublicResetPacket {
[email protected]6ae6e342014-02-06 02:21:42653 QuicPublicResetPacket();
654 explicit QuicPublicResetPacket(const QuicPacketPublicHeader& header);
655
[email protected]86a318d2013-01-23 21:16:04656 QuicPacketPublicHeader public_header;
[email protected]86a318d2013-01-23 21:16:04657 QuicPublicResetNonceProof nonce_proof;
[email protected]300ccd52014-01-25 08:00:19658 QuicPacketSequenceNumber rejected_sequence_number;
[email protected]79d13dcb2014-02-05 07:23:13659 IPEndPoint client_address;
[email protected]86a318d2013-01-23 21:16:04660};
661
[email protected]14e8106c2013-03-14 16:25:33662enum QuicVersionNegotiationState {
663 START_NEGOTIATION = 0,
[email protected]ec640112013-08-09 03:56:18664 // Server-side this implies we've sent a version negotiation packet and are
665 // waiting on the client to select a compatible version. Client-side this
666 // implies we've gotten a version negotiation packet, are retransmitting the
667 // initial packets with a supported version and are waiting for our first
668 // packet from the server.
669 NEGOTIATION_IN_PROGRESS,
670 // This indicates this endpoint has received a packet from the peer with a
671 // version this endpoint supports. Version negotiation is complete, and the
672 // version number will no longer be sent with future packets.
[email protected]14e8106c2013-03-14 16:25:33673 NEGOTIATED_VERSION
674};
675
676typedef QuicPacketPublicHeader QuicVersionNegotiationPacket;
677
[email protected]c995c572013-01-18 05:43:20678// A padding frame contains no payload.
679struct NET_EXPORT_PRIVATE QuicPaddingFrame {
680};
681
[email protected]d8c522112014-04-23 09:23:25682// A ping frame contains no payload, though it is retransmittable,
683// and ACK'd just like other normal frames.
684struct NET_EXPORT_PRIVATE QuicPingFrame {
685};
686
rtenneti69e64aa2015-06-26 04:25:30687// A path MTU discovery frame contains no payload and is serialized as a ping
688// frame.
689struct NET_EXPORT_PRIVATE QuicMtuDiscoveryFrame {};
690
[email protected]be24ab22012-10-22 03:01:52691struct NET_EXPORT_PRIVATE QuicStreamFrame {
692 QuicStreamFrame();
[email protected]5dafdb62013-11-14 01:24:26693 QuicStreamFrame(const QuicStreamFrame& frame);
[email protected]be24ab22012-10-22 03:01:52694 QuicStreamFrame(QuicStreamId stream_id,
[email protected]a5061242012-10-23 23:29:37695 bool fin,
[email protected]701bc892013-01-17 04:51:54696 QuicStreamOffset offset,
rtennetia4228ea2015-06-04 02:31:44697 base::StringPiece data);
[email protected]5dafdb62013-11-14 01:24:26698
[email protected]c5e1aca2014-01-30 04:03:04699 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
700 std::ostream& os, const QuicStreamFrame& s);
701
[email protected]8b37a092012-10-18 21:53:49702 QuicStreamId stream_id;
703 bool fin;
[email protected]701bc892013-01-17 04:51:54704 QuicStreamOffset offset; // Location of this data in the stream.
rtennetia4228ea2015-06-04 02:31:44705 base::StringPiece data;
[email protected]8b37a092012-10-18 21:53:49706};
707
[email protected]e537f742012-12-07 15:33:53708// TODO(ianswett): Re-evaluate the trade-offs of hash_set vs set when framing
709// is finalized.
[email protected]9db443912013-02-25 05:27:03710typedef std::set<QuicPacketSequenceNumber> SequenceNumberSet;
rtennetidd4bf8f2014-09-03 00:45:16711typedef std::list<QuicPacketSequenceNumber> SequenceNumberList;
rtenneti4b06ae72014-08-26 03:43:43712
mostynbdc40b80612014-09-10 03:45:42713typedef std::list<
714 std::pair<QuicPacketSequenceNumber, QuicTime> > PacketTimeList;
[email protected]044ac2b2012-11-13 21:41:06715
[email protected]310d37b2014-08-02 06:15:37716struct NET_EXPORT_PRIVATE QuicStopWaitingFrame {
717 QuicStopWaitingFrame();
718 ~QuicStopWaitingFrame();
[email protected]6ae6e342014-02-06 02:21:42719
[email protected]26f3f8e2012-12-13 21:07:19720 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
[email protected]310d37b2014-08-02 06:15:37721 std::ostream& os, const QuicStopWaitingFrame& s);
722 // Entropy hash of all packets up to, but not including, the least unacked
723 // packet.
724 QuicPacketEntropyHash entropy_hash;
725 // The lowest packet we've sent which is unacked, and we expect an ack for.
726 QuicPacketSequenceNumber least_unacked;
727};
728
729struct NET_EXPORT_PRIVATE QuicAckFrame {
730 QuicAckFrame();
731 ~QuicAckFrame();
732
733 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
734 std::ostream& os, const QuicAckFrame& s);
[email protected]a674b4c2012-12-05 03:44:30735
[email protected]9db443912013-02-25 05:27:03736 // Entropy hash of all packets up to largest observed not including missing
737 // packets.
738 QuicPacketEntropyHash entropy_hash;
[email protected]e537f742012-12-07 15:33:53739
[email protected]48697d8a2013-01-15 19:42:24740 // The highest packet sequence number we've observed from the peer.
741 //
742 // In general, this should be the largest packet number we've received. In
743 // the case of truncated acks, we may have to advertise a lower "upper bound"
744 // than largest received, to avoid implicitly acking missing packets that
745 // don't fit in the missing packet list due to size limitations. In this
746 // case, largest_observed may be a packet which is also in the missing packets
747 // list.
748 QuicPacketSequenceNumber largest_observed;
[email protected]a674b4c2012-12-05 03:44:30749
[email protected]14e8106c2013-03-14 16:25:33750 // Time elapsed since largest_observed was received until this Ack frame was
751 // sent.
752 QuicTime::Delta delta_time_largest_observed;
753
[email protected]9db443912013-02-25 05:27:03754 // TODO(satyamshekhar): Can be optimized using an interval set like data
755 // structure.
[email protected]e537f742012-12-07 15:33:53756 // The set of packets which we're expecting and have not received.
[email protected]9db443912013-02-25 05:27:03757 SequenceNumberSet missing_packets;
[email protected]8e01c062013-10-31 07:35:31758
759 // Whether the ack had to be truncated when sent.
760 bool is_truncated;
[email protected]bdf2d432014-02-09 10:45:41761
762 // Packets which have been revived via FEC.
763 // All of these must also be in missing_packets.
764 SequenceNumberSet revived_packets;
rtenneti4b06ae72014-08-26 03:43:43765
766 // List of <sequence_number, time> for when packets arrived.
767 PacketTimeList received_packet_times;
[email protected]8b37a092012-10-18 21:53:49768};
769
[email protected]9db443912013-02-25 05:27:03770// True if the sequence number is greater than largest_observed or is listed
771// as missing.
772// Always returns false for sequence numbers less than least_unacked.
773bool NET_EXPORT_PRIVATE IsAwaitingPacket(
[email protected]310d37b2014-08-02 06:15:37774 const QuicAckFrame& ack_frame,
[email protected]9db443912013-02-25 05:27:03775 QuicPacketSequenceNumber sequence_number);
776
777// Inserts missing packets between [lower, higher).
778void NET_EXPORT_PRIVATE InsertMissingPacketsBetween(
[email protected]310d37b2014-08-02 06:15:37779 QuicAckFrame* ack_frame,
[email protected]9db443912013-02-25 05:27:03780 QuicPacketSequenceNumber lower,
781 QuicPacketSequenceNumber higher);
782
[email protected]a692ad9d2014-07-18 21:35:24783// Defines for all types of congestion control algorithms that can be used in
784// QUIC. Note that this is separate from the congestion feedback type -
785// some congestion control algorithms may use the same feedback type
786// (Reno and Cubic are the classic example for that).
787enum CongestionControlType {
788 kCubic,
rtennetifb3fa6c2015-03-16 23:04:55789 kCubicBytes,
[email protected]a692ad9d2014-07-18 21:35:24790 kReno,
rtennetifb3fa6c2015-03-16 23:04:55791 kRenoBytes,
[email protected]a692ad9d2014-07-18 21:35:24792 kBBR,
[email protected]8b37a092012-10-18 21:53:49793};
794
[email protected]c5cc9bd2014-03-31 23:17:14795enum LossDetectionType {
796 kNack, // Used to mimic TCP's loss detection.
797 kTime, // Time based loss detection.
798};
799
[email protected]be24ab22012-10-22 03:01:52800struct NET_EXPORT_PRIVATE QuicRstStreamFrame {
[email protected]6ae6e342014-02-06 02:21:42801 QuicRstStreamFrame();
802 QuicRstStreamFrame(QuicStreamId stream_id,
803 QuicRstStreamErrorCode error_code,
804 QuicStreamOffset bytes_written);
[email protected]8b37a092012-10-18 21:53:49805
[email protected]c5e1aca2014-01-30 04:03:04806 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
807 std::ostream& os, const QuicRstStreamFrame& r);
808
[email protected]8b37a092012-10-18 21:53:49809 QuicStreamId stream_id;
[email protected]74bda142013-03-31 02:49:11810 QuicRstStreamErrorCode error_code;
rchc0815442015-04-18 13:29:46811 // Only used in versions <= QUIC_VERSION_24.
[email protected]431bb4fd2012-10-19 17:46:09812 std::string error_details;
[email protected]6ae6e342014-02-06 02:21:42813
814 // Used to update flow control windows. On termination of a stream, both
815 // endpoints must inform the peer of the number of bytes they have sent on
816 // that stream. This can be done through normal termination (data packet with
817 // FIN) or through a RST.
818 QuicStreamOffset byte_offset;
[email protected]8b37a092012-10-18 21:53:49819};
820
[email protected]be24ab22012-10-22 03:01:52821struct NET_EXPORT_PRIVATE QuicConnectionCloseFrame {
[email protected]6ae6e342014-02-06 02:21:42822 QuicConnectionCloseFrame();
823
[email protected]c5e1aca2014-01-30 04:03:04824 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
825 std::ostream& os, const QuicConnectionCloseFrame& c);
826
[email protected]431bb4fd2012-10-19 17:46:09827 QuicErrorCode error_code;
[email protected]431bb4fd2012-10-19 17:46:09828 std::string error_details;
[email protected]8b37a092012-10-18 21:53:49829};
830
[email protected]9db443912013-02-25 05:27:03831struct NET_EXPORT_PRIVATE QuicGoAwayFrame {
[email protected]6ae6e342014-02-06 02:21:42832 QuicGoAwayFrame();
[email protected]9db443912013-02-25 05:27:03833 QuicGoAwayFrame(QuicErrorCode error_code,
834 QuicStreamId last_good_stream_id,
835 const std::string& reason);
836
[email protected]c5e1aca2014-01-30 04:03:04837 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
838 std::ostream& os, const QuicGoAwayFrame& g);
839
[email protected]9db443912013-02-25 05:27:03840 QuicErrorCode error_code;
841 QuicStreamId last_good_stream_id;
842 std::string reason_phrase;
843};
844
[email protected]6ae6e342014-02-06 02:21:42845// Flow control updates per-stream and at the connection levoel.
846// Based on SPDY's WINDOW_UPDATE frame, but uses an absolute byte offset rather
847// than a window delta.
848// TODO(rjshade): A possible future optimization is to make stream_id and
849// byte_offset variable length, similar to stream frames.
850struct NET_EXPORT_PRIVATE QuicWindowUpdateFrame {
851 QuicWindowUpdateFrame() {}
852 QuicWindowUpdateFrame(QuicStreamId stream_id, QuicStreamOffset byte_offset);
853
854 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
855 std::ostream& os, const QuicWindowUpdateFrame& w);
856
857 // The stream this frame applies to. 0 is a special case meaning the overall
858 // connection rather than a specific stream.
859 QuicStreamId stream_id;
860
861 // Byte offset in the stream or connection. The receiver of this frame must
862 // not send data which would result in this offset being exceeded.
863 QuicStreamOffset byte_offset;
864};
865
866// The BLOCKED frame is used to indicate to the remote endpoint that this
867// endpoint believes itself to be flow-control blocked but otherwise ready to
868// send data. The BLOCKED frame is purely advisory and optional.
869// Based on SPDY's BLOCKED frame (undocumented as of 2014-01-28).
870struct NET_EXPORT_PRIVATE QuicBlockedFrame {
871 QuicBlockedFrame() {}
872 explicit QuicBlockedFrame(QuicStreamId stream_id);
873
874 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
875 std::ostream& os, const QuicBlockedFrame& b);
876
877 // The stream this frame applies to. 0 is a special case meaning the overall
878 // connection rather than a specific stream.
879 QuicStreamId stream_id;
880};
881
[email protected]8ba81212013-05-03 13:11:48882// EncryptionLevel enumerates the stages of encryption that a QUIC connection
883// progresses through. When retransmitting a packet, the encryption level needs
884// to be specified so that it is retransmitted at a level which the peer can
885// understand.
886enum EncryptionLevel {
887 ENCRYPTION_NONE = 0,
888 ENCRYPTION_INITIAL = 1,
889 ENCRYPTION_FORWARD_SECURE = 2,
890
891 NUM_ENCRYPTION_LEVELS,
892};
893
[email protected]be24ab22012-10-22 03:01:52894struct NET_EXPORT_PRIVATE QuicFrame {
[email protected]6ae6e342014-02-06 02:21:42895 QuicFrame();
896 explicit QuicFrame(QuicPaddingFrame* padding_frame);
897 explicit QuicFrame(QuicStreamFrame* stream_frame);
898 explicit QuicFrame(QuicAckFrame* frame);
rtenneti69e64aa2015-06-26 04:25:30899 explicit QuicFrame(QuicMtuDiscoveryFrame* frame);
rtenneti4b06ae72014-08-26 03:43:43900
[email protected]6ae6e342014-02-06 02:21:42901 explicit QuicFrame(QuicRstStreamFrame* frame);
902 explicit QuicFrame(QuicConnectionCloseFrame* frame);
[email protected]93dd91f2014-02-27 00:09:03903 explicit QuicFrame(QuicStopWaitingFrame* frame);
[email protected]d8c522112014-04-23 09:23:25904 explicit QuicFrame(QuicPingFrame* frame);
[email protected]6ae6e342014-02-06 02:21:42905 explicit QuicFrame(QuicGoAwayFrame* frame);
906 explicit QuicFrame(QuicWindowUpdateFrame* frame);
907 explicit QuicFrame(QuicBlockedFrame* frame);
[email protected]8b37a092012-10-18 21:53:49908
[email protected]c5e1aca2014-01-30 04:03:04909 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
910 std::ostream& os, const QuicFrame& frame);
911
[email protected]be24ab22012-10-22 03:01:52912 QuicFrameType type;
[email protected]8b37a092012-10-18 21:53:49913 union {
[email protected]c995c572013-01-18 05:43:20914 QuicPaddingFrame* padding_frame;
[email protected]be24ab22012-10-22 03:01:52915 QuicStreamFrame* stream_frame;
916 QuicAckFrame* ack_frame;
rtenneti69e64aa2015-06-26 04:25:30917 QuicMtuDiscoveryFrame* mtu_discovery_frame;
rtenneti4b06ae72014-08-26 03:43:43918
[email protected]93dd91f2014-02-27 00:09:03919 QuicStopWaitingFrame* stop_waiting_frame;
rtenneti4b06ae72014-08-26 03:43:43920
[email protected]d8c522112014-04-23 09:23:25921 QuicPingFrame* ping_frame;
[email protected]be24ab22012-10-22 03:01:52922 QuicRstStreamFrame* rst_stream_frame;
923 QuicConnectionCloseFrame* connection_close_frame;
[email protected]9db443912013-02-25 05:27:03924 QuicGoAwayFrame* goaway_frame;
[email protected]6ae6e342014-02-06 02:21:42925 QuicWindowUpdateFrame* window_update_frame;
926 QuicBlockedFrame* blocked_frame;
[email protected]8b37a092012-10-18 21:53:49927 };
928};
929
[email protected]be24ab22012-10-22 03:01:52930typedef std::vector<QuicFrame> QuicFrames;
[email protected]8b37a092012-10-18 21:53:49931
932struct NET_EXPORT_PRIVATE QuicFecData {
933 QuicFecData();
[email protected]a5061242012-10-23 23:29:37934
[email protected]c995c572013-01-18 05:43:20935 // The FEC group number is also the sequence number of the first
936 // FEC protected packet. The last protected packet's sequence number will
937 // be one less than the sequence number of the FEC packet.
[email protected]8b37a092012-10-18 21:53:49938 QuicFecGroupNumber fec_group;
[email protected]8b37a092012-10-18 21:53:49939 base::StringPiece redundancy;
[email protected]8b37a092012-10-18 21:53:49940};
941
[email protected]8b37a092012-10-18 21:53:49942class NET_EXPORT_PRIVATE QuicData {
943 public:
[email protected]6ae6e342014-02-06 02:21:42944 QuicData(const char* buffer, size_t length);
945 QuicData(char* buffer, size_t length, bool owns_buffer);
[email protected]8b37a092012-10-18 21:53:49946 virtual ~QuicData();
947
948 base::StringPiece AsStringPiece() const {
949 return base::StringPiece(data(), length());
950 }
951
952 const char* data() const { return buffer_; }
953 size_t length() const { return length_; }
rtennetie0ee6eb2015-05-01 00:55:09954 bool owns_buffer() const { return owns_buffer_; }
[email protected]8b37a092012-10-18 21:53:49955
956 private:
957 const char* buffer_;
958 size_t length_;
959 bool owns_buffer_;
960
961 DISALLOW_COPY_AND_ASSIGN(QuicData);
962};
963
964class NET_EXPORT_PRIVATE QuicPacket : public QuicData {
965 public:
rtennetica5ac272015-02-07 12:35:12966 QuicPacket(char* buffer,
967 size_t length,
968 bool owns_buffer,
969 QuicConnectionIdLength connection_id_length,
970 bool includes_version,
971 QuicSequenceNumberLength sequence_number_length);
[email protected]8b37a092012-10-18 21:53:49972
[email protected]5351cc4b2013-03-03 07:22:41973 base::StringPiece FecProtectedData() const;
974 base::StringPiece AssociatedData() const;
975 base::StringPiece BeforePlaintext() const;
976 base::StringPiece Plaintext() const;
[email protected]082b65b2012-11-10 19:11:31977
[email protected]8b37a092012-10-18 21:53:49978 char* mutable_data() { return buffer_; }
979
980 private:
981 char* buffer_;
[email protected]3aa9ca72014-02-27 19:39:43982 const QuicConnectionIdLength connection_id_length_;
[email protected]5351cc4b2013-03-03 07:22:41983 const bool includes_version_;
[email protected]25c31dc2013-06-05 17:56:04984 const QuicSequenceNumberLength sequence_number_length_;
[email protected]8b37a092012-10-18 21:53:49985
[email protected]2e740db2012-10-20 19:35:19986 DISALLOW_COPY_AND_ASSIGN(QuicPacket);
[email protected]8b37a092012-10-18 21:53:49987};
988
989class NET_EXPORT_PRIVATE QuicEncryptedPacket : public QuicData {
990 public:
[email protected]6ae6e342014-02-06 02:21:42991 QuicEncryptedPacket(const char* buffer, size_t length);
992 QuicEncryptedPacket(char* buffer, size_t length, bool owns_buffer);
[email protected]8b37a092012-10-18 21:53:49993
[email protected]ec86d5462013-11-17 16:04:49994 // Clones the packet into a new packet which owns the buffer.
995 QuicEncryptedPacket* Clone() const;
996
[email protected]c1b32c62013-01-20 02:49:10997 // By default, gtest prints the raw bytes of an object. The bool data
998 // member (in the base class QuicData) causes this object to have padding
999 // bytes, which causes the default gtest object printer to read
1000 // uninitialize memory. So we need to teach gtest how to print this object.
1001 NET_EXPORT_PRIVATE friend std::ostream& operator<<(
1002 std::ostream& os, const QuicEncryptedPacket& s);
1003
[email protected]2e740db2012-10-20 19:35:191004 private:
1005 DISALLOW_COPY_AND_ASSIGN(QuicEncryptedPacket);
[email protected]8b37a092012-10-18 21:53:491006};
1007
[email protected]9db443912013-02-25 05:27:031008class NET_EXPORT_PRIVATE RetransmittableFrames {
1009 public:
rtennetidc8e5a22015-02-25 01:38:521010 explicit RetransmittableFrames(EncryptionLevel level);
[email protected]9db443912013-02-25 05:27:031011 ~RetransmittableFrames();
1012
[email protected]9db443912013-02-25 05:27:031013 // Takes ownership of the frame inside |frame|.
rtennetia4228ea2015-06-04 02:31:441014 const QuicFrame& AddFrame(const QuicFrame& frame);
1015 // Takes ownership of the frame inside |frame| and |buffer|.
1016 const QuicFrame& AddFrame(const QuicFrame& frame, char* buffer);
rtenneti73e25c12015-03-16 06:12:431017 // Removes all stream frames associated with |stream_id|.
1018 void RemoveFramesForStream(QuicStreamId stream_id);
1019
[email protected]9db443912013-02-25 05:27:031020 const QuicFrames& frames() const { return frames_; }
1021
[email protected]672631c2014-08-16 06:11:451022 IsHandshake HasCryptoHandshake() const {
1023 return has_crypto_handshake_;
1024 }
[email protected]2115d33ba2014-01-02 21:53:521025
[email protected]8ba81212013-05-03 13:11:481026 EncryptionLevel encryption_level() const {
1027 return encryption_level_;
1028 }
1029
rtennetid7d78b02015-06-17 16:54:341030 bool needs_padding() const { return needs_padding_; }
1031
1032 void set_needs_padding(bool needs_padding) { needs_padding_ = needs_padding; }
1033
[email protected]9db443912013-02-25 05:27:031034 private:
1035 QuicFrames frames_;
rtennetidc8e5a22015-02-25 01:38:521036 const EncryptionLevel encryption_level_;
[email protected]672631c2014-08-16 06:11:451037 IsHandshake has_crypto_handshake_;
rtennetid7d78b02015-06-17 16:54:341038 bool needs_padding_;
rtennetic14c8ab2015-06-18 05:47:401039 // Data referenced by the StringPiece of a QuicStreamFrame.
rtennetia4228ea2015-06-04 02:31:441040 std::vector<const char*> stream_data_;
[email protected]9db443912013-02-25 05:27:031041
1042 DISALLOW_COPY_AND_ASSIGN(RetransmittableFrames);
1043};
1044
1045struct NET_EXPORT_PRIVATE SerializedPacket {
1046 SerializedPacket(QuicPacketSequenceNumber sequence_number,
[email protected]ea825e02013-08-21 18:12:451047 QuicSequenceNumberLength sequence_number_length,
rtennetib6ac61a52015-02-11 20:20:521048 QuicEncryptedPacket* packet,
[email protected]9db443912013-02-25 05:27:031049 QuicPacketEntropyHash entropy_hash,
[email protected]97cf3022013-09-05 14:30:161050 RetransmittableFrames* retransmittable_frames);
1051 ~SerializedPacket();
[email protected]9db443912013-02-25 05:27:031052
rtennetid39bd762015-06-12 01:05:521053 QuicEncryptedPacket* packet;
1054 RetransmittableFrames* retransmittable_frames;
[email protected]9db443912013-02-25 05:27:031055 QuicPacketSequenceNumber sequence_number;
[email protected]ea825e02013-08-21 18:12:451056 QuicSequenceNumberLength sequence_number_length;
[email protected]9db443912013-02-25 05:27:031057 QuicPacketEntropyHash entropy_hash;
rtennetica5ac272015-02-07 12:35:121058 bool is_fec_packet;
[email protected]97cf3022013-09-05 14:30:161059
rtenneti6b1c5b12015-01-13 20:08:351060 // Optional notifiers which will be informed when this packet has been ACKed.
rtenneticf54a52c2015-01-26 17:01:541061 std::list<QuicAckNotifier*> notifiers;
[email protected]9db443912013-02-25 05:27:031062};
1063
[email protected]77b5d50b2014-05-07 22:48:481064struct NET_EXPORT_PRIVATE TransmissionInfo {
1065 // Used by STL when assigning into a map.
1066 TransmissionInfo();
1067
1068 // Constructs a Transmission with a new all_tranmissions set
1069 // containing |sequence_number|.
1070 TransmissionInfo(RetransmittableFrames* retransmittable_frames,
[email protected]77b5d50b2014-05-07 22:48:481071 QuicSequenceNumberLength sequence_number_length,
[email protected]730b35d72014-06-05 03:23:221072 TransmissionType transmission_type,
rtenneti3183ac42015-02-28 03:39:411073 QuicTime sent_time,
1074 QuicByteCount bytes_sent,
1075 bool is_fec_packet);
[email protected]77b5d50b2014-05-07 22:48:481076
1077 RetransmittableFrames* retransmittable_frames;
1078 QuicSequenceNumberLength sequence_number_length;
[email protected]77b5d50b2014-05-07 22:48:481079 QuicTime sent_time;
[email protected]77b5d50b2014-05-07 22:48:481080 QuicByteCount bytes_sent;
pkastinga9f22d4e2014-12-01 22:43:461081 QuicPacketCount nack_count;
[email protected]730b35d72014-06-05 03:23:221082 // Reason why this packet was transmitted.
1083 TransmissionType transmission_type;
[email protected]77b5d50b2014-05-07 22:48:481084 // Stores the sequence numbers of all transmissions of this packet.
rtennetibe635732014-10-02 22:51:421085 // Must always be nullptr or have multiple elements.
rtennetidd4bf8f2014-09-03 00:45:161086 SequenceNumberList* all_transmissions;
[email protected]aa7e4ef2014-05-28 03:53:151087 // In flight packets have not been abandoned or lost.
1088 bool in_flight;
rtenneti31e9fd62014-09-16 05:22:151089 // True if the packet can never be acked, so it can be removed.
1090 bool is_unackable;
rtenneti85d89712014-11-20 03:32:241091 // True if the packet is an FEC packet.
1092 bool is_fec_packet;
[email protected]77b5d50b2014-05-07 22:48:481093};
1094
rtennetic14c8ab2015-06-18 05:47:401095// Convenience wrapper to wrap an iovec array and the total length, which must
1096// be less than or equal to the actual total length of the iovecs.
1097struct NET_EXPORT_PRIVATE QuicIOVector {
1098 QuicIOVector(const struct iovec* iov, int iov_count, size_t total_length)
1099 : iov(iov), iov_count(iov_count), total_length(total_length) {}
1100
1101 const struct iovec* iov;
1102 const int iov_count;
1103 const size_t total_length;
1104};
1105
[email protected]8b37a092012-10-18 21:53:491106} // namespace net
1107
1108#endif // NET_QUIC_QUIC_PROTOCOL_H_