Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1405)

Unified Diff: net/quic/crypto/quic_crypto_client_config.cc

Issue 154933003: Persist server's crypto config data to disk cache for 0-RTT (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fixed comments in patch set 7 Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/quic/crypto/quic_crypto_client_config.cc
diff --git a/net/quic/crypto/quic_crypto_client_config.cc b/net/quic/crypto/quic_crypto_client_config.cc
index 0ce7e83d27c85ea32f3c7c6e98cc9fa55fcfc58b..7c1bd61ea44e6d142fb6ccd87cbf8684da4620ed 100644
--- a/net/quic/crypto/quic_crypto_client_config.cc
+++ b/net/quic/crypto/quic_crypto_client_config.cc
@@ -38,11 +38,13 @@ QuicCryptoClientConfig::~QuicCryptoClientConfig() {
QuicCryptoClientConfig::CachedState::CachedState()
: server_config_valid_(false),
+ need_to_persist_(false),
generation_counter_(0) {}
QuicCryptoClientConfig::CachedState::CachedState(
scoped_ptr<QuicServerInfo> quic_server_info)
: server_config_valid_(false),
+ need_to_persist_(false),
generation_counter_(0),
quic_server_info_(quic_server_info.Pass()) {}
@@ -69,6 +71,10 @@ bool QuicCryptoClientConfig::CachedState::IsComplete(QuicWallTime now) const {
return true;
}
+bool QuicCryptoClientConfig::CachedState::IsEmpty() const {
+ return server_config_.empty();
+}
+
const CryptoHandshakeMessage*
QuicCryptoClientConfig::CachedState::GetServerConfig() const {
if (server_config_.empty()) {
@@ -118,6 +124,7 @@ QuicErrorCode QuicCryptoClientConfig::CachedState::SetServerConfig(
server_config_ = server_config.as_string();
SetProofInvalid();
scfg_.reset(new_scfg_storage.release());
+ need_to_persist_ = true;
}
return QUIC_NO_ERROR;
}
@@ -160,6 +167,7 @@ void QuicCryptoClientConfig::CachedState::ClearProof() {
void QuicCryptoClientConfig::CachedState::SetProofValid() {
server_config_valid_ = true;
+ SaveQuicServerInfo();
}
void QuicCryptoClientConfig::CachedState::SetProofInvalid() {
@@ -197,6 +205,10 @@ QuicCryptoClientConfig::CachedState::proof_verify_details() const {
return proof_verify_details_.get();
}
+QuicServerInfo* QuicCryptoClientConfig::CachedState::quic_server_info() const {
+ return quic_server_info_.get();
+}
+
void QuicCryptoClientConfig::CachedState::set_source_address_token(
StringPiece token) {
source_address_token_ = token.as_string();
@@ -216,6 +228,63 @@ void QuicCryptoClientConfig::CachedState::InitializeFrom(
certs_ = other.certs_;
server_config_sig_ = other.server_config_sig_;
server_config_valid_ = other.server_config_valid_;
+ ++generation_counter_;
wtc 2014/02/20 20:06:16 I verified that whenever we change (set, modify, o
ramant (doing other things) 2014/02/20 23:44:08 We lazily initialize it in GetServerConfig (which
+}
+
+// TODO(rtenneti): LoadQuicServerInfo and SaveQuicServerInfo have duplication of
+// data in CachedState and QuicServerInfo. We should eliminate the duplication
+// of data.
+// An issue to be solved: while we are loading the data from disk cache, it is
+// possible for another request for the same hostname update the CachedState
+// because that request has sent FillInchoateClientHello and got REJ message.
+// Loading of data from disk cache shouldn't blindly overwrite what is in
+// CachedState.
+bool QuicCryptoClientConfig::CachedState::LoadQuicServerInfo(QuicWallTime now) {
+ DCHECK(server_config_.empty());
+ DCHECK(quic_server_info_.get());
+ DCHECK(quic_server_info_->IsDataReady());
+
+ const QuicServerInfo::State& state(quic_server_info_->state());
+ if (state.server_config.empty()) {
+ return false;
+ }
+
+ string error_details;
+ QuicErrorCode error = SetServerConfig(state.server_config, now,
+ &error_details);
+ if (error != QUIC_NO_ERROR) {
+ DVLOG(1) << "SetServerConfig failed with " << error_details;
+ return false;
+ }
+
+ source_address_token_ = state.source_address_token;
+ server_config_sig_ = state.server_config_sig;
+ certs_ = state.certs;
+ need_to_persist_ = false;
+ return true;
+}
+
+void QuicCryptoClientConfig::CachedState::SaveQuicServerInfo() {
+ if (!quic_server_info_.get() || !need_to_persist_) {
+ return;
+ }
+ DCHECK(server_config_valid_);
+
+ // If the QuicServerInfo hasn't managed to load from disk yet then we can't
+ // save anything. TODO(rtenneti): we should fix this.
+ if (!quic_server_info_->IsDataReady()) {
+ return;
+ }
+
+ QuicServerInfo::State* state = quic_server_info_->mutable_state();
+
+ state->server_config = server_config_;
+ state->source_address_token = source_address_token_;
+ state->server_config_sig = server_config_sig_;
+ state->certs = certs_;
+
+ quic_server_info_->Persist();
+ need_to_persist_ = false;
}
void QuicCryptoClientConfig::SetDefaults() {

Powered by Google App Engine
This is Rietveld 408576698