{ // 获取包含Hugging Face文本的span元素 const spans = link.querySelectorAll('span.whitespace-nowrap, span.hidden.whitespace-nowrap'); spans.forEach(span => { if (span.textContent && span.textContent.trim().match(/Hugging\s*Face/i)) { span.textContent = 'AI快站'; } }); }); // 替换logo图片的alt属性 document.querySelectorAll('img[alt*="Hugging"], img[alt*="Face"]').forEach(img => { if (img.alt.match(/Hugging\s*Face/i)) { img.alt = 'AI快站 logo'; } }); } // 替换导航栏中的链接 function replaceNavigationLinks() { // 已替换标记,防止重复运行 if (window._navLinksReplaced) { return; } // 已经替换过的链接集合,防止重复替换 const replacedLinks = new Set(); // 只在导航栏区域查找和替换链接 const headerArea = document.querySelector('header') || document.querySelector('nav'); if (!headerArea) { return; } // 在导航区域内查找链接 const navLinks = headerArea.querySelectorAll('a'); navLinks.forEach(link => { // 如果已经替换过,跳过 if (replacedLinks.has(link)) return; const linkText = link.textContent.trim(); const linkHref = link.getAttribute('href') || ''; // 替换Spaces链接 - 仅替换一次 if ( (linkHref.includes('/spaces') || linkHref === '/spaces' || linkText === 'Spaces' || linkText.match(/^s*Spacess*$/i)) && linkText !== 'PDF TO Markdown' && linkText !== 'PDF TO Markdown' ) { link.textContent = 'PDF TO Markdown'; link.href = 'https://fast360.xyz'; link.setAttribute('target', '_blank'); link.setAttribute('rel', 'noopener noreferrer'); replacedLinks.add(link); } // 删除Posts链接 else if ( (linkHref.includes('/posts') || linkHref === '/posts' || linkText === 'Posts' || linkText.match(/^s*Postss*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } // 替换Docs链接 - 仅替换一次 else if ( (linkHref.includes('/docs') || linkHref === '/docs' || linkText === 'Docs' || linkText.match(/^s*Docss*$/i)) && linkText !== 'Voice Cloning' ) { link.textContent = 'Voice Cloning'; link.href = 'https://vibevoice.info/'; replacedLinks.add(link); } // 删除Enterprise链接 else if ( (linkHref.includes('/enterprise') || linkHref === '/enterprise' || linkText === 'Enterprise' || linkText.match(/^s*Enterprises*$/i)) ) { if (link.parentNode) { link.parentNode.removeChild(link); } replacedLinks.add(link); } }); // 查找可能嵌套的Spaces和Posts文本 const textNodes = []; function findTextNodes(element) { if (element.nodeType === Node.TEXT_NODE) { const text = element.textContent.trim(); if (text === 'Spaces' || text === 'Posts' || text === 'Enterprise') { textNodes.push(element); } } else { for (const child of element.childNodes) { findTextNodes(child); } } } // 只在导航区域内查找文本节点 findTextNodes(headerArea); // 替换找到的文本节点 textNodes.forEach(node => { const text = node.textContent.trim(); if (text === 'Spaces') { node.textContent = node.textContent.replace(/Spaces/g, 'PDF TO Markdown'); } else if (text === 'Posts') { // 删除Posts文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } else if (text === 'Enterprise') { // 删除Enterprise文本节点 if (node.parentNode) { node.parentNode.removeChild(node); } } }); // 标记已替换完成 window._navLinksReplaced = true; } // 替换代码区域中的域名 function replaceCodeDomains() { // 特别处理span.hljs-string和span.njs-string元素 document.querySelectorAll('span.hljs-string, span.njs-string, span[class*="hljs-string"], span[class*="njs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换hljs-string类的span中的域名(移除多余的转义符号) document.querySelectorAll('span.hljs-string, span[class*="hljs-string"]').forEach(span => { if (span.textContent && span.textContent.includes('huggingface.co')) { span.textContent = span.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 替换pre和code标签中包含git clone命令的域名 document.querySelectorAll('pre, code').forEach(element => { if (element.textContent && element.textContent.includes('git clone')) { const text = element.innerHTML; if (text.includes('huggingface.co')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 处理特定的命令行示例 document.querySelectorAll('pre, code').forEach(element => { const text = element.innerHTML; if (text.includes('huggingface.co')) { // 针对git clone命令的专门处理 if (text.includes('git clone') || text.includes('GIT_LFS_SKIP_SMUDGE=1')) { element.innerHTML = text.replace(/huggingface.co/g, 'aifasthub.com'); } } }); // 特别处理模型下载页面上的代码片段 document.querySelectorAll('.flex.border-t, .svelte_hydrator, .inline-block').forEach(container => { const content = container.innerHTML; if (content && content.includes('huggingface.co')) { container.innerHTML = content.replace(/huggingface.co/g, 'aifasthub.com'); } }); // 特别处理模型仓库克隆对话框中的代码片段 try { // 查找包含"Clone this model repository"标题的对话框 const cloneDialog = document.querySelector('.svelte_hydration_boundary, [data-target="MainHeader"]'); if (cloneDialog) { // 查找对话框中所有的代码片段和命令示例 const codeElements = cloneDialog.querySelectorAll('pre, code, span'); codeElements.forEach(element => { if (element.textContent && element.textContent.includes('huggingface.co')) { if (element.innerHTML.includes('huggingface.co')) { element.innerHTML = element.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { element.textContent = element.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); } // 更精确地定位克隆命令中的域名 document.querySelectorAll('[data-target]').forEach(container => { const codeBlocks = container.querySelectorAll('pre, code, span.hljs-string'); codeBlocks.forEach(block => { if (block.textContent && block.textContent.includes('huggingface.co')) { if (block.innerHTML.includes('huggingface.co')) { block.innerHTML = block.innerHTML.replace(/huggingface.co/g, 'aifasthub.com'); } else { block.textContent = block.textContent.replace(/huggingface.co/g, 'aifasthub.com'); } } }); }); } catch (e) { // 错误处理但不打印日志 } } // 当DOM加载完成后执行替换 if (document.readyState === 'loading') { document.addEventListener('DOMContentLoaded', () => { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); }); } else { replaceHeaderBranding(); replaceNavigationLinks(); replaceCodeDomains(); // 只在必要时执行替换 - 3秒后再次检查 setTimeout(() => { if (!window._navLinksReplaced) { console.log('[Client] 3秒后重新检查导航链接'); replaceNavigationLinks(); } }, 3000); } // 增加一个MutationObserver来处理可能的动态元素加载 const observer = new MutationObserver(mutations => { // 检查是否导航区域有变化 const hasNavChanges = mutations.some(mutation => { // 检查是否存在header或nav元素变化 return Array.from(mutation.addedNodes).some(node => { if (node.nodeType === Node.ELEMENT_NODE) { // 检查是否是导航元素或其子元素 if (node.tagName === 'HEADER' || node.tagName === 'NAV' || node.querySelector('header, nav')) { return true; } // 检查是否在导航元素内部 let parent = node.parentElement; while (parent) { if (parent.tagName === 'HEADER' || parent.tagName === 'NAV') { return true; } parent = parent.parentElement; } } return false; }); }); // 只在导航区域有变化时执行替换 if (hasNavChanges) { // 重置替换状态,允许再次替换 window._navLinksReplaced = false; replaceHeaderBranding(); replaceNavigationLinks(); } }); // 开始观察document.body的变化,包括子节点 if (document.body) { observer.observe(document.body, { childList: true, subtree: true }); } else { document.addEventListener('DOMContentLoaded', () => { observer.observe(document.body, { childList: true, subtree: true }); }); } })(); \",\n end_stream=True,\n )\n \n # receive response\n events = h0_transfer(quic_server, h0_client)\n self.assertEqual(len(events), 2)\n \n self.assertTrue(isinstance(events[0], HeadersReceived))\n self.assertEqual(events[0].headers, [])\n self.assertEqual(events[0].stream_id, stream_id)\n self.assertEqual(events[0].stream_ended, False)\n \n self.assertTrue(isinstance(events[1], DataReceived))\n self.assertEqual(events[1].data, b\"hello\")\n self.assertEqual(events[1].stream_id, stream_id)\n self.assertEqual(events[1].stream_ended, True)\n \n \n===========unchanged ref 0===========\n at: tests.test_h0\n h0_client_and_server()\n \n h0_transfer(quic_sender, h0_receiver)\n \n at: tests.test_h0.h0_transfer\n quic_receiver = h0_receiver._quic\n \n at: unittest.case\n TestCase(methodName: str=...)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_h0\n + def h0_client_and_server():\n + return client_and_server(\n + client_options={\"alpn_protocols\": H0_ALPN},\n + client_patch=disable_packet_pacing,\n + server_options={\"alpn_protocols\": H0_ALPN},\n + server_patch=disable_packet_pacing,\n + )\n + \n===========changed ref 1===========\n # module: tests.test_h3\n + def h3_client_and_server():\n + return client_and_server(\n + client_options={\"alpn_protocols\": H3_ALPN},\n + client_patch=disable_packet_pacing,\n + server_options={\"alpn_protocols\": H3_ALPN},\n + server_patch=disable_packet_pacing,\n + )\n + \n===========changed ref 2===========\n # module: tests.test_h3\n class H3ConnectionTest(TestCase):\n def test_uni_stream_grease(self):\n - with client_and_server(\n - client_options={\"alpn_protocols\": H3_ALPN},\n - server_options={\"alpn_protocols\": H3_ALPN},\n + with h3_client_and_server() as (quic_client, quic_server):\n - ) as (quic_client, quic_server):\n h3_server = H3Connection(quic_server)\n \n quic_client.send_stream_data(\n 14, b\"\\xff\\xff\\xff\\xff\\xff\\xff\\xff\\xfeGREASE is the word\"\n )\n self.assertEqual(h3_transfer(quic_client, h3_server), [])\n \n===========changed ref 3===========\n # module: tests.test_h3\n class H3ConnectionTest(TestCase):\n def test_request(self):\n - with client_and_server(\n - client_options={\"alpn_protocols\": H3_ALPN},\n - server_options={\"alpn_protocols\": H3_ALPN},\n + with h3_client_and_server() as (quic_client, quic_server):\n - ) as (quic_client, quic_server):\n h3_client = H3Connection(quic_client)\n h3_server = H3Connection(quic_server)\n \n # make first request\n self._make_request(h3_client, h3_server)\n \n # make second request\n self._make_request(h3_client, h3_server)\n \n # make third request -> dynamic table\n self._make_request(h3_client, h3_server)\n \n===========changed ref 4===========\n # module: tests.test_h3\n class H3ConnectionTest(TestCase):\n def test_request_with_server_push_max_push_id(self):\n - with client_and_server(\n - client_options={\"alpn_protocols\": H3_ALPN},\n - server_options={\"alpn_protocols\": H3_ALPN},\n + with h3_client_and_server() as (quic_client, quic_server):\n - ) as (quic_client, quic_server):\n h3_client = H3Connection(quic_client)\n h3_server = H3Connection(quic_server)\n \n # send request\n stream_id = quic_client.get_next_available_stream_id()\n h3_client.send_headers(\n stream_id=stream_id,\n headers=[\n (b\":method\", b\"GET\"),\n (b\":scheme\", b\"https\"),\n (b\":authority\", b\"localhost\"),\n (b\":path\", b\"/\"),\n ],\n end_stream=True,\n )\n \n # receive request\n events = h3_transfer(quic_client, h3_server)\n self.assertEqual(\n events,\n [\n HeadersReceived(\n headers=[\n (b\":method\", b\"GET\"),\n (b\":scheme\", b\"https\"),\n (b\":authority\", b\"localhost\"),\n (b\":path\", b\"/\"),\n ],\n stream_id=stream_id,\n stream_ended=True,\n )\n ],\n )\n \n # send push promises\n for i in range(0, 8):\n h3_server.send_push_promise(\n stream_id=stream_id,\n headers=[\n (b\":method\", b\"GET\"),\n (b\":scheme\", b\"https\"),\n (b\":authority\", b\"localhost\"),\n (b\":path\", \"/{}.css\".format(i).encode(\"ascii\")),\n ],\n )\n \n===========changed ref 5===========\n # module: tests.test_h3\n class H3ConnectionTest(TestCase):\n def test_request_with_server_push_max_push_id(self):\n # offset: 1\n \"),\n (b\":path\", \"/{}.css\".format(i).encode(\"ascii\")),\n ],\n )\n \n # send one too many\n with self.assertRaises(NoAvailablePushIDError):\n h3_server.send_push_promise(\n stream_id=stream_id,\n headers=[\n (b\":method\", b\"GET\"),\n (b\":scheme\", b\"https\"),\n (b\":authority\", b\"localhost\"),\n (b\":path\", b\"/8.css\"),\n ],\n )\n "}}},{"rowIdx":4101,"cells":{"path":{"kind":"string","value":"tests.test_h0/H0ConnectionTest.test_headers_only"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fd084338b0d72d996d1be928d81f8beb3b55c3f9"},"commit_message":{"kind":"string","value":"[tests] disable packet pacing for H0 / H3 tests"},"ground_truth":{"kind":"string","value":" <0>: with client_and_server(\n <1>: client_options={\"alpn_protocols\": H0_ALPN},\n <2>: server_options={\"alpn_protocols\": H0_ALPN},\n <3>: with h0_client_and_server() as (quic_client, quic_server):\n ) as (quic_client, quic_server):\n"},"main_code":{"kind":"string","value":" # module: tests.test_h0\n class H0ConnectionTest(TestCase):\n def test_headers_only(self):\n <0> with client_and_server(\n <1> client_options={\"alpn_protocols\": H0_ALPN},\n <2> server_options={\"alpn_protocols\": H0_ALPN},\n <3> ) as (quic_client, quic_server):\n <4> h0_client = H0Connection(quic_client)\n <5> h0_server = H0Connection(quic_server)\n <6> \n <7> # send request\n <8> stream_id = quic_client.get_next_available_stream_id()\n <9> h0_client.send_headers(\n<10> stream_id=stream_id,\n<11> headers=[\n<12> (b\":method\", b\"HEAD\"),\n<13> (b\":scheme\", b\"https\"),\n<14> (b\":authority\", b\"localhost\"),\n<15> (b\":path\", b\"/\"),\n<16> ],\n<17> end_stream=True,\n<18> )\n<19> \n<20> # receive request\n<21> events = h0_transfer(quic_client, h0_server)\n<22> self.assertEqual(len(events), 2)\n<23> \n<24> self.assertTrue(isinstance(events[0], HeadersReceived))\n<25> self.assertEqual(\n<26> events[0].headers, [(b\":method\", b\"HEAD\"), (b\":path\", b\"/\")]\n<27> )\n<28> self.assertEqual(events[0].stream_id, stream_id)\n<29> self.assertEqual(events[0].stream_ended, False)\n<30> \n<31> self.assertTrue(isinstance(events[1], DataReceived))\n<32> self.assertEqual(events[1].data, b\"\")\n<33> self.assertEqual(events[1].stream_id, stream_id)\n<34> self.assertEqual(events[1].stream_ended, True)\n<35> \n<36> # send response\n<37> h0_server.send_headers(\n<38> stream_id=stream_id,\n<39> headers=[\n<40> ("},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_h0\n class H0ConnectionTest(TestCase):\n def test_headers_only(self):\n # offset: 1\n (b\"content-type\", b\"text/html; charset=utf-8\"),\n ],\n end_stream=True,\n )\n \n # receive response\n events = h0_transfer(quic_server, h0_client)\n self.assertEqual(len(events), 2)\n \n self.assertTrue(isinstance(events[0], HeadersReceived))\n self.assertEqual(events[0].headers, [])\n self.assertEqual(events[0].stream_id, stream_id)\n self.assertEqual(events[0].stream_ended, False)\n \n self.assertTrue(isinstance(events[1], DataReceived))\n self.assertEqual(events[1].data, b\"\")\n self.assertEqual(events[1].stream_id, stream_id)\n self.assertEqual(events[1].stream_ended, True)\n \n \n===========unchanged ref 0===========\n at: tests.test_h0\n h0_client_and_server()\n \n h0_transfer(quic_sender, h0_receiver)\n \n at: tests.test_h0.H0ConnectionTest.test_connect\n stream_id = quic_client.get_next_available_stream_id()\n \n events = h0_transfer(quic_client, h0_server)\n events = h0_transfer(quic_server, h0_client)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_h0\n + def h0_client_and_server():\n + return client_and_server(\n + client_options={\"alpn_protocols\": H0_ALPN},\n + client_patch=disable_packet_pacing,\n + server_options={\"alpn_protocols\": H0_ALPN},\n + server_patch=disable_packet_pacing,\n + )\n + \n===========changed ref 1===========\n # module: tests.test_h0\n class H0ConnectionTest(TestCase):\n def test_connect(self):\n - with client_and_server(\n - client_options={\"alpn_protocols\": H0_ALPN},\n - server_options={\"alpn_protocols\": H0_ALPN},\n + with h0_client_and_server() as (quic_client, quic_server):\n - ) as (quic_client, quic_server):\n h0_client = H0Connection(quic_client)\n h0_server = H0Connection(quic_server)\n \n # send request\n stream_id = quic_client.get_next_available_stream_id()\n h0_client.send_headers(\n stream_id=stream_id,\n headers=[\n (b\":method\", b\"GET\"),\n (b\":scheme\", b\"https\"),\n (b\":authority\", b\"localhost\"),\n (b\":path\", b\"/\"),\n ],\n )\n h0_client.send_data(stream_id=stream_id, data=b\"\", end_stream=True)\n \n # receive request\n events = h0_transfer(quic_client, h0_server)\n self.assertEqual(len(events), 2)\n \n self.assertTrue(isinstance(events[0], HeadersReceived))\n self.assertEqual(\n events[0].headers, [(b\":method\", b\"GET\"), (b\":path\", b\"/\")]\n )\n self.assertEqual(events[0].stream_id, stream_id)\n self.assertEqual(events[0].stream_ended, False)\n \n self.assertTrue(isinstance(events[1], DataReceived))\n self.assertEqual(events[1].data, b\"\")\n self.assertEqual(events[1].stream_id, stream_id)\n self.assertEqual(events[1].stream_ended, True)\n \n # send response\n h0_server.send_headers(\n stream_id=stream_id\n===========changed ref 2===========\n # module: tests.test_h0\n class H0ConnectionTest(TestCase):\n def test_connect(self):\n # offset: 1\n ended, True)\n \n # send response\n h0_server.send_headers(\n stream_id=stream_id,\n headers=[\n (b\":status\", b\"200\"),\n (b\"content-type\", b\"text/html; charset=utf-8\"),\n ],\n )\n h0_server.send_data(\n stream_id=stream_id,\n data=b\"hello\",\n end_stream=True,\n )\n \n # receive response\n events = h0_transfer(quic_server, h0_client)\n self.assertEqual(len(events), 2)\n \n self.assertTrue(isinstance(events[0], HeadersReceived))\n self.assertEqual(events[0].headers, [])\n self.assertEqual(events[0].stream_id, stream_id)\n self.assertEqual(events[0].stream_ended, False)\n \n self.assertTrue(isinstance(events[1], DataReceived))\n self.assertEqual(events[1].data, b\"hello\")\n self.assertEqual(events[1].stream_id, stream_id)\n self.assertEqual(events[1].stream_ended, True)\n \n===========changed ref 3===========\n # module: tests.test_h3\n + def h3_client_and_server():\n + return client_and_server(\n + client_options={\"alpn_protocols\": H3_ALPN},\n + client_patch=disable_packet_pacing,\n + server_options={\"alpn_protocols\": H3_ALPN},\n + server_patch=disable_packet_pacing,\n + )\n + \n===========changed ref 4===========\n # module: tests.test_h3\n class H3ConnectionTest(TestCase):\n def test_uni_stream_grease(self):\n - with client_and_server(\n - client_options={\"alpn_protocols\": H3_ALPN},\n - server_options={\"alpn_protocols\": H3_ALPN},\n + with h3_client_and_server() as (quic_client, quic_server):\n - ) as (quic_client, quic_server):\n h3_server = H3Connection(quic_server)\n \n quic_client.send_stream_data(\n 14, b\"\\xff\\xff\\xff\\xff\\xff\\xff\\xff\\xfeGREASE is the word\"\n )\n self.assertEqual(h3_transfer(quic_client, h3_server), [])\n \n===========changed ref 5===========\n # module: tests.test_h3\n class H3ConnectionTest(TestCase):\n def test_request(self):\n - with client_and_server(\n - client_options={\"alpn_protocols\": H3_ALPN},\n - server_options={\"alpn_protocols\": H3_ALPN},\n + with h3_client_and_server() as (quic_client, quic_server):\n - ) as (quic_client, quic_server):\n h3_client = H3Connection(quic_client)\n h3_server = H3Connection(quic_server)\n \n # make first request\n self._make_request(h3_client, h3_server)\n \n # make second request\n self._make_request(h3_client, h3_server)\n \n # make third request -> dynamic table\n self._make_request(h3_client, h3_server)\n "}}},{"rowIdx":4102,"cells":{"path":{"kind":"string","value":"tests.test_connection/client_and_server"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"9bfddce361e172cd69365fe3f1a9703d4a7ec106"},"commit_message":{"kind":"string","value":"[tests] disable packet pacing for all sync tests"},"ground_truth":{"kind":"string","value":" <7>: disable_packet_pacing(client)\n<16>: disable_packet_pacing(server)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n - transport_options={},\n ):\n <0> client_configuration = QuicConfiguration(\n <1> is_client=True, quic_logger=QuicLogger(), **client_options\n <2> )\n <3> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n <4> \n <5> client = QuicConnection(configuration=client_configuration, **client_kwargs)\n <6> client._ack_delay = 0\n <7> client_patch(client)\n <8> \n <9> server_configuration = QuicConfiguration(\n<10> is_client=False, quic_logger=QuicLogger(), **server_options\n<11> )\n<12> server_configuration.load_cert_chain(server_certfile, server_keyfile)\n<13> \n<14> server = QuicConnection(configuration=server_configuration, **server_kwargs)\n<15> server._ack_delay = 0\n<16> server_patch(server)\n<17> \n<18> # perform handshake\n<19> if handshake:\n<20> client.connect(SERVER_ADDR, now=time.time())\n<21> for i in range(3):\n<22> roundtrip(client, server)\n<23> \n<24> yield client, server\n<25> \n<26> # close\n<27> client.close()\n<28> server.close()\n<29> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: contextlib\n contextmanager(func: Callable[..., Iterator[_T]]) -> Callable[..., _GeneratorContextManager[_T]]\n \n at: tests.test_connection\n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n disable_packet_pacing(connection)\n \n roundtrip(sender, receiver)\n \n at: tests.utils\n SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), \"pycacert.pem\")\n \n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n at: time\n time() -> float\n \n "}}},{"rowIdx":4103,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_datagram_frame_2"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"9bfddce361e172cd69365fe3f1a9703d4a7ec106"},"commit_message":{"kind":"string","value":"[tests] disable packet pacing for all sync tests"},"ground_truth":{"kind":"string","value":" <5>: client_patch=disable_packet_pacing,\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_datagram_frame_2(self):\n <0> # payload which exactly fills an entire packet\n <1> payload = b\"Z\" * 1250\n <2> \n <3> with client_and_server(\n <4> client_options={\"max_datagram_frame_size\": 65536},\n <5> client_patch=disable_packet_pacing,\n <6> server_options={\"max_datagram_frame_size\": 65536},\n <7> ) as (client, server):\n <8> # check handshake completed\n <9> self.check_handshake(client=client, server=server, alpn_protocol=None)\n<10> \n<11> # queue 20 datagrams\n<12> for i in range(20):\n<13> client.send_datagram_frame(payload)\n<14> \n<15> # client can only 11 datagrams are sent due to congestion control\n<16> self.assertEqual(transfer(client, server), 11)\n<17> for i in range(11):\n<18> event = server.next_event()\n<19> self.assertEqual(type(event), events.DatagramFrameReceived)\n<20> self.assertEqual(event.data, payload)\n<21> \n<22> # server sends ACK\n<23> self.assertEqual(transfer(server, client), 1)\n<24> \n<25> # client sends remaining datagrams\n<26> self.assertEqual(transfer(client, server), 9)\n<27> for i in range(9):\n<28> event = server.next_event()\n<29> self.assertEqual(type(event), events.DatagramFrameReceived)\n<30> self.assertEqual(event.data, payload)\n<31> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n transfer(sender, receiver)\n \n at: tests.test_connection.QuicConnectionTest\n check_handshake(client, server, alpn_protocol=None)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n - transport_options={},\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n + disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n + disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n "}}},{"rowIdx":4104,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_send_max_stream_data_retransmit"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"9bfddce361e172cd69365fe3f1a9703d4a7ec106"},"commit_message":{"kind":"string","value":"[tests] disable packet pacing for all sync tests"},"ground_truth":{"kind":"string","value":" <0>: with client_and_server() as (client, server):\n with client_and_server(server_patch=disable_packet_pacing) as (client, server):\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n <0> with client_and_server(server_patch=disable_packet_pacing) as (client, server):\n <1> # client creates bidirectional stream 0\n <2> stream = client._create_stream(stream_id=0)\n <3> client.send_stream_data(0, b\"hello\")\n <4> self.assertEqual(stream.max_stream_data_local, 1048576)\n <5> self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n <6> roundtrip(client, server)\n <7> \n <8> # server sends data, just before raising MAX_STREAM_DATA\n <9> server.send_stream_data(0, b\"Z\" * 524288) # 1048576 // 2\n<10> for i in range(10):\n<11> roundtrip(server, client)\n<12> self.assertEqual(stream.max_stream_data_local, 1048576)\n<13> self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n<14> \n<15> # server sends one more byte\n<16> server.send_stream_data(0, b\"Z\")\n<17> transfer(server, client)\n<18> \n<19> # MAX_STREAM_DATA is sent and lost\n<20> self.assertEqual(drop(client), 1)\n<21> self.assertEqual(stream.max_stream_data_local, 2097152)\n<22> self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n<23> client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream)\n<24> self.assertEqual(stream.max_stream_data_local, 2097152)\n<25> self.assertEqual(stream.max_stream_data_local_sent, 0)\n<26> \n<27> # MAX_DATA is retransmitted and acked\n<28> self.assertEqual(roundtrip(client, server), (1, 1))\n<29> self.assertEqual(stream.max_stream_data_"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n # offset: 1\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n \n \n===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n drop(sender)\n \n roundtrip(sender, receiver)\n \n transfer(sender, receiver)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n - transport_options={},\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n + disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n + disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_datagram_frame_2(self):\n # payload which exactly fills an entire packet\n payload = b\"Z\" * 1250\n \n with client_and_server(\n client_options={\"max_datagram_frame_size\": 65536},\n - client_patch=disable_packet_pacing,\n server_options={\"max_datagram_frame_size\": 65536},\n ) as (client, server):\n # check handshake completed\n self.check_handshake(client=client, server=server, alpn_protocol=None)\n \n # queue 20 datagrams\n for i in range(20):\n client.send_datagram_frame(payload)\n \n # client can only 11 datagrams are sent due to congestion control\n self.assertEqual(transfer(client, server), 11)\n for i in range(11):\n event = server.next_event()\n self.assertEqual(type(event), events.DatagramFrameReceived)\n self.assertEqual(event.data, payload)\n \n # server sends ACK\n self.assertEqual(transfer(server, client), 1)\n \n # client sends remaining datagrams\n self.assertEqual(transfer(client, server), 9)\n for i in range(9):\n event = server.next_event()\n self.assertEqual(type(event), events.DatagramFrameReceived)\n self.assertEqual(event.data, payload)\n "}}},{"rowIdx":4105,"cells":{"path":{"kind":"string","value":"tests.test_h3/h3_client_and_server"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"9bfddce361e172cd69365fe3f1a9703d4a7ec106"},"commit_message":{"kind":"string","value":"[tests] disable packet pacing for all sync tests"},"ground_truth":{"kind":"string","value":" <2>: client_patch=disable_packet_pacing,\n <4>: server_patch=disable_packet_pacing,\n"},"main_code":{"kind":"string","value":" # module: tests.test_h3\n def h3_client_and_server():\n <0> return client_and_server(\n <1> client_options={\"alpn_protocols\": H3_ALPN},\n <2> client_patch=disable_packet_pacing,\n <3> server_options={\"alpn_protocols\": H3_ALPN},\n <4> server_patch=disable_packet_pacing,\n <5> )\n <6> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n - transport_options={},\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n + disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n + disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_datagram_frame_2(self):\n # payload which exactly fills an entire packet\n payload = b\"Z\" * 1250\n \n with client_and_server(\n client_options={\"max_datagram_frame_size\": 65536},\n - client_patch=disable_packet_pacing,\n server_options={\"max_datagram_frame_size\": 65536},\n ) as (client, server):\n # check handshake completed\n self.check_handshake(client=client, server=server, alpn_protocol=None)\n \n # queue 20 datagrams\n for i in range(20):\n client.send_datagram_frame(payload)\n \n # client can only 11 datagrams are sent due to congestion control\n self.assertEqual(transfer(client, server), 11)\n for i in range(11):\n event = server.next_event()\n self.assertEqual(type(event), events.DatagramFrameReceived)\n self.assertEqual(event.data, payload)\n \n # server sends ACK\n self.assertEqual(transfer(server, client), 1)\n \n # client sends remaining datagrams\n self.assertEqual(transfer(client, server), 9)\n for i in range(9):\n event = server.next_event()\n self.assertEqual(type(event), events.DatagramFrameReceived)\n self.assertEqual(event.data, payload)\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n + with client_and_server() as (client, server):\n - with client_and_server(server_patch=disable_packet_pacing) as (client, server):\n # client creates bidirectional stream 0\n stream = client._create_stream(stream_id=0)\n client.send_stream_data(0, b\"hello\")\n self.assertEqual(stream.max_stream_data_local, 1048576)\n self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n roundtrip(client, server)\n \n # server sends data, just before raising MAX_STREAM_DATA\n server.send_stream_data(0, b\"Z\" * 524288) # 1048576 // 2\n for i in range(10):\n roundtrip(server, client)\n self.assertEqual(stream.max_stream_data_local, 1048576)\n self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n \n # server sends one more byte\n server.send_stream_data(0, b\"Z\")\n transfer(server, client)\n \n # MAX_STREAM_DATA is sent and lost\n self.assertEqual(drop(client), 1)\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream)\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 0)\n \n # MAX_DATA is retransmitted and acked\n self.assertEqual(roundtrip(client, server), (1, 1))\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(\n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n # offset: 1\n 1))\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n "}}},{"rowIdx":4106,"cells":{"path":{"kind":"string","value":"tests.test_h0/h0_client_and_server"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"9bfddce361e172cd69365fe3f1a9703d4a7ec106"},"commit_message":{"kind":"string","value":"[tests] disable packet pacing for all sync tests"},"ground_truth":{"kind":"string","value":" <2>: client_patch=disable_packet_pacing,\n <4>: server_patch=disable_packet_pacing,\n"},"main_code":{"kind":"string","value":" # module: tests.test_h0\n def h0_client_and_server():\n <0> return client_and_server(\n <1> client_options={\"alpn_protocols\": H0_ALPN},\n <2> client_patch=disable_packet_pacing,\n <3> server_options={\"alpn_protocols\": H0_ALPN},\n <4> server_patch=disable_packet_pacing,\n <5> )\n <6> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n - transport_options={},\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n + disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n + disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n \n===========changed ref 1===========\n # module: tests.test_h3\n def h3_client_and_server():\n return client_and_server(\n client_options={\"alpn_protocols\": H3_ALPN},\n - client_patch=disable_packet_pacing,\n server_options={\"alpn_protocols\": H3_ALPN},\n - server_patch=disable_packet_pacing,\n )\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_datagram_frame_2(self):\n # payload which exactly fills an entire packet\n payload = b\"Z\" * 1250\n \n with client_and_server(\n client_options={\"max_datagram_frame_size\": 65536},\n - client_patch=disable_packet_pacing,\n server_options={\"max_datagram_frame_size\": 65536},\n ) as (client, server):\n # check handshake completed\n self.check_handshake(client=client, server=server, alpn_protocol=None)\n \n # queue 20 datagrams\n for i in range(20):\n client.send_datagram_frame(payload)\n \n # client can only 11 datagrams are sent due to congestion control\n self.assertEqual(transfer(client, server), 11)\n for i in range(11):\n event = server.next_event()\n self.assertEqual(type(event), events.DatagramFrameReceived)\n self.assertEqual(event.data, payload)\n \n # server sends ACK\n self.assertEqual(transfer(server, client), 1)\n \n # client sends remaining datagrams\n self.assertEqual(transfer(client, server), 9)\n for i in range(9):\n event = server.next_event()\n self.assertEqual(type(event), events.DatagramFrameReceived)\n self.assertEqual(event.data, payload)\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n + with client_and_server() as (client, server):\n - with client_and_server(server_patch=disable_packet_pacing) as (client, server):\n # client creates bidirectional stream 0\n stream = client._create_stream(stream_id=0)\n client.send_stream_data(0, b\"hello\")\n self.assertEqual(stream.max_stream_data_local, 1048576)\n self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n roundtrip(client, server)\n \n # server sends data, just before raising MAX_STREAM_DATA\n server.send_stream_data(0, b\"Z\" * 524288) # 1048576 // 2\n for i in range(10):\n roundtrip(server, client)\n self.assertEqual(stream.max_stream_data_local, 1048576)\n self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n \n # server sends one more byte\n server.send_stream_data(0, b\"Z\")\n transfer(server, client)\n \n # MAX_STREAM_DATA is sent and lost\n self.assertEqual(drop(client), 1)\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream)\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 0)\n \n # MAX_DATA is retransmitted and acked\n self.assertEqual(roundtrip(client, server), (1, 1))\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(\n===========changed ref 4===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n # offset: 1\n 1))\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n "}}},{"rowIdx":4107,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_connect_with_quantum_readiness"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"770e56f0a4c4499fdbfa717db26c96e4c338c5ff"},"commit_message":{"kind":"string","value":"[tests] check number of transfered datagrams for more tests"},"ground_truth":{"kind":"string","value":" <7>: self.assertEqual(roundtrip(client, server), (1, 1))\n roundtrip(client, server)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_quantum_readiness(self):\n <0> with client_and_server(client_options={\"quantum_readiness_test\": True},) as (\n <1> client,\n <2> server,\n <3> ):\n <4> stream_id = client.get_next_available_stream_id()\n <5> client.send_stream_data(stream_id, b\"hello\")\n <6> \n <7> roundtrip(client, server)\n <8> \n <9> received = None\n<10> while True:\n<11> event = server.next_event()\n<12> if isinstance(event, events.StreamDataReceived):\n<13> received = event.data\n<14> elif event is None:\n<15> break\n<16> \n<17> self.assertEqual(received, b\"hello\")\n<18> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n roundtrip(sender, receiver)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n "}}},{"rowIdx":4108,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_connect_with_0rtt"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"770e56f0a4c4499fdbfa717db26c96e4c338c5ff"},"commit_message":{"kind":"string","value":"[tests] check number of transfered datagrams for more tests"},"ground_truth":{"kind":"string","value":"<22>: self.assertEqual(roundtrip(client, server), (2, 1))\n roundtrip(client, server)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_0rtt(self):\n <0> client_ticket = None\n <1> ticket_store = SessionTicketStore()\n <2> \n <3> def save_session_ticket(ticket):\n <4> nonlocal client_ticket\n <5> client_ticket = ticket\n <6> \n <7> with client_and_server(\n <8> client_kwargs={\"session_ticket_handler\": save_session_ticket},\n <9> server_kwargs={\"session_ticket_handler\": ticket_store.add},\n<10> ) as (client, server):\n<11> pass\n<12> \n<13> with client_and_server(\n<14> client_options={\"session_ticket\": client_ticket},\n<15> server_kwargs={\"session_ticket_fetcher\": ticket_store.pop},\n<16> handshake=False,\n<17> ) as (client, server):\n<18> client.connect(SERVER_ADDR, now=time.time())\n<19> stream_id = client.get_next_available_stream_id()\n<20> client.send_stream_data(stream_id, b\"hello\")\n<21> \n<22> roundtrip(client, server)\n<23> \n<24> event = server.next_event()\n<25> self.assertEqual(type(event), events.ProtocolNegotiated)\n<26> \n<27> event = server.next_event()\n<28> self.assertEqual(type(event), events.StreamDataReceived)\n<29> self.assertEqual(event.data, b\"hello\")\n<30> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n SessionTicketStore()\n \n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n roundtrip(sender, receiver)\n \n at: tests.test_connection.SessionTicketStore\n add(ticket)\n \n pop(label)\n \n at: time\n time() -> float\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_quantum_readiness(self):\n with client_and_server(client_options={\"quantum_readiness_test\": True},) as (\n client,\n server,\n ):\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n received = None\n while True:\n event = server.next_event()\n if isinstance(event, events.StreamDataReceived):\n received = event.data\n elif event is None:\n break\n \n self.assertEqual(received, b\"hello\")\n "}}},{"rowIdx":4109,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_handle_connection_close_frame"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"770e56f0a4c4499fdbfa717db26c96e4c338c5ff"},"commit_message":{"kind":"string","value":"[tests] check number of transfered datagrams for more tests"},"ground_truth":{"kind":"string","value":" <6>: self.assertEqual(roundtrip(server, client), (1, 0))\n roundtrip(server, client)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame(self):\n <0> with client_and_server() as (client, server):\n <1> server.close(\n <2> error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n <3> frame_type=QuicFrameType.ACK,\n <4> reason_phrase=\"illegal ACK frame\",\n <5> )\n <6> roundtrip(server, client)\n <7> \n <8> self.assertEqual(\n <9> client._close_event,\n<10> events.ConnectionTerminated(\n<11> error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n<12> frame_type=QuicFrameType.ACK,\n<13> reason_phrase=\"illegal ACK frame\",\n<14> ),\n<15> )\n<16> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n roundtrip(sender, receiver)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_quantum_readiness(self):\n with client_and_server(client_options={\"quantum_readiness_test\": True},) as (\n client,\n server,\n ):\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n received = None\n while True:\n event = server.next_event()\n if isinstance(event, events.StreamDataReceived):\n received = event.data\n elif event is None:\n break\n \n self.assertEqual(received, b\"hello\")\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_0rtt(self):\n client_ticket = None\n ticket_store = SessionTicketStore()\n \n def save_session_ticket(ticket):\n nonlocal client_ticket\n client_ticket = ticket\n \n with client_and_server(\n client_kwargs={\"session_ticket_handler\": save_session_ticket},\n server_kwargs={\"session_ticket_handler\": ticket_store.add},\n ) as (client, server):\n pass\n \n with client_and_server(\n client_options={\"session_ticket\": client_ticket},\n server_kwargs={\"session_ticket_fetcher\": ticket_store.pop},\n handshake=False,\n ) as (client, server):\n client.connect(SERVER_ADDR, now=time.time())\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (2, 1))\n - roundtrip(client, server)\n \n event = server.next_event()\n self.assertEqual(type(event), events.ProtocolNegotiated)\n \n event = server.next_event()\n self.assertEqual(type(event), events.StreamDataReceived)\n self.assertEqual(event.data, b\"hello\")\n "}}},{"rowIdx":4110,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_handle_connection_close_frame_app"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"770e56f0a4c4499fdbfa717db26c96e4c338c5ff"},"commit_message":{"kind":"string","value":"[tests] check number of transfered datagrams for more tests"},"ground_truth":{"kind":"string","value":" <2>: self.assertEqual(roundtrip(server, client), (1, 0))\n roundtrip(server, client)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame_app(self):\n <0> with client_and_server() as (client, server):\n <1> server.close(error_code=QuicErrorCode.NO_ERROR, reason_phrase=\"goodbye\")\n <2> roundtrip(server, client)\n <3> \n <4> self.assertEqual(\n <5> client._close_event,\n <6> events.ConnectionTerminated(\n <7> error_code=QuicErrorCode.NO_ERROR,\n <8> frame_type=None,\n <9> reason_phrase=\"goodbye\",\n<10> ),\n<11> )\n<12> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n roundtrip(sender, receiver)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame(self):\n with client_and_server() as (client, server):\n server.close(\n error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n frame_type=QuicFrameType.ACK,\n reason_phrase=\"illegal ACK frame\",\n )\n + self.assertEqual(roundtrip(server, client), (1, 0))\n - roundtrip(server, client)\n \n self.assertEqual(\n client._close_event,\n events.ConnectionTerminated(\n error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n frame_type=QuicFrameType.ACK,\n reason_phrase=\"illegal ACK frame\",\n ),\n )\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_quantum_readiness(self):\n with client_and_server(client_options={\"quantum_readiness_test\": True},) as (\n client,\n server,\n ):\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n received = None\n while True:\n event = server.next_event()\n if isinstance(event, events.StreamDataReceived):\n received = event.data\n elif event is None:\n break\n \n self.assertEqual(received, b\"hello\")\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_0rtt(self):\n client_ticket = None\n ticket_store = SessionTicketStore()\n \n def save_session_ticket(ticket):\n nonlocal client_ticket\n client_ticket = ticket\n \n with client_and_server(\n client_kwargs={\"session_ticket_handler\": save_session_ticket},\n server_kwargs={\"session_ticket_handler\": ticket_store.add},\n ) as (client, server):\n pass\n \n with client_and_server(\n client_options={\"session_ticket\": client_ticket},\n server_kwargs={\"session_ticket_fetcher\": ticket_store.pop},\n handshake=False,\n ) as (client, server):\n client.connect(SERVER_ADDR, now=time.time())\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (2, 1))\n - roundtrip(client, server)\n \n event = server.next_event()\n self.assertEqual(type(event), events.ProtocolNegotiated)\n \n event = server.next_event()\n self.assertEqual(type(event), events.StreamDataReceived)\n self.assertEqual(event.data, b\"hello\")\n "}}},{"rowIdx":4111,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_send_max_stream_data_retransmit"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"770e56f0a4c4499fdbfa717db26c96e4c338c5ff"},"commit_message":{"kind":"string","value":"[tests] check number of transfered datagrams for more tests"},"ground_truth":{"kind":"string","value":" <6>: self.assertEqual(roundtrip(client, server), (1, 1))\n roundtrip(client, server)\n<17>: self.assertEqual(transfer(server, client), 1)\n transfer(server, client)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n <0> with client_and_server() as (client, server):\n <1> # client creates bidirectional stream 0\n <2> stream = client._create_stream(stream_id=0)\n <3> client.send_stream_data(0, b\"hello\")\n <4> self.assertEqual(stream.max_stream_data_local, 1048576)\n <5> self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n <6> roundtrip(client, server)\n <7> \n <8> # server sends data, just before raising MAX_STREAM_DATA\n <9> server.send_stream_data(0, b\"Z\" * 524288) # 1048576 // 2\n<10> for i in range(10):\n<11> roundtrip(server, client)\n<12> self.assertEqual(stream.max_stream_data_local, 1048576)\n<13> self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n<14> \n<15> # server sends one more byte\n<16> server.send_stream_data(0, b\"Z\")\n<17> transfer(server, client)\n<18> \n<19> # MAX_STREAM_DATA is sent and lost\n<20> self.assertEqual(drop(client), 1)\n<21> self.assertEqual(stream.max_stream_data_local, 2097152)\n<22> self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n<23> client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream)\n<24> self.assertEqual(stream.max_stream_data_local, 2097152)\n<25> self.assertEqual(stream.max_stream_data_local_sent, 0)\n<26> \n<27> # MAX_DATA is retransmitted and acked\n<28> self.assertEqual(roundtrip(client, server), (1, 1))\n<29> self.assertEqual(stream.max_stream_data_local, 2097152)\n<30> self."},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n # offset: 1\n \n \n===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n drop(sender)\n \n roundtrip(sender, receiver)\n \n transfer(sender, receiver)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame_app(self):\n with client_and_server() as (client, server):\n server.close(error_code=QuicErrorCode.NO_ERROR, reason_phrase=\"goodbye\")\n + self.assertEqual(roundtrip(server, client), (1, 0))\n - roundtrip(server, client)\n \n self.assertEqual(\n client._close_event,\n events.ConnectionTerminated(\n error_code=QuicErrorCode.NO_ERROR,\n frame_type=None,\n reason_phrase=\"goodbye\",\n ),\n )\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame(self):\n with client_and_server() as (client, server):\n server.close(\n error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n frame_type=QuicFrameType.ACK,\n reason_phrase=\"illegal ACK frame\",\n )\n + self.assertEqual(roundtrip(server, client), (1, 0))\n - roundtrip(server, client)\n \n self.assertEqual(\n client._close_event,\n events.ConnectionTerminated(\n error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n frame_type=QuicFrameType.ACK,\n reason_phrase=\"illegal ACK frame\",\n ),\n )\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_quantum_readiness(self):\n with client_and_server(client_options={\"quantum_readiness_test\": True},) as (\n client,\n server,\n ):\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n received = None\n while True:\n event = server.next_event()\n if isinstance(event, events.StreamDataReceived):\n received = event.data\n elif event is None:\n break\n \n self.assertEqual(received, b\"hello\")\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_0rtt(self):\n client_ticket = None\n ticket_store = SessionTicketStore()\n \n def save_session_ticket(ticket):\n nonlocal client_ticket\n client_ticket = ticket\n \n with client_and_server(\n client_kwargs={\"session_ticket_handler\": save_session_ticket},\n server_kwargs={\"session_ticket_handler\": ticket_store.add},\n ) as (client, server):\n pass\n \n with client_and_server(\n client_options={\"session_ticket\": client_ticket},\n server_kwargs={\"session_ticket_fetcher\": ticket_store.pop},\n handshake=False,\n ) as (client, server):\n client.connect(SERVER_ADDR, now=time.time())\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (2, 1))\n - roundtrip(client, server)\n \n event = server.next_event()\n self.assertEqual(type(event), events.ProtocolNegotiated)\n \n event = server.next_event()\n self.assertEqual(type(event), events.StreamDataReceived)\n self.assertEqual(event.data, b\"hello\")\n "}}},{"rowIdx":4112,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_send_ping"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"770e56f0a4c4499fdbfa717db26c96e4c338c5ff"},"commit_message":{"kind":"string","value":"[tests] check number of transfered datagrams for more tests"},"ground_truth":{"kind":"string","value":" <5>: self.assertEqual(roundtrip(client, server), (1, 1))\n roundtrip(client, server)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_ping(self):\n <0> with client_and_server() as (client, server):\n <1> consume_events(client)\n <2> \n <3> # client sends ping, server ACKs it\n <4> client.send_ping(uid=12345)\n <5> roundtrip(client, server)\n <6> \n <7> # check event\n <8> event = client.next_event()\n <9> self.assertEqual(type(event), events.PingAcknowledged)\n<10> self.assertEqual(event.uid, 12345)\n<11> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n consume_events(connection)\n \n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n roundtrip(sender, receiver)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n with client_and_server() as (client, server):\n # client creates bidirectional stream 0\n stream = client._create_stream(stream_id=0)\n client.send_stream_data(0, b\"hello\")\n self.assertEqual(stream.max_stream_data_local, 1048576)\n self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n # server sends data, just before raising MAX_STREAM_DATA\n server.send_stream_data(0, b\"Z\" * 524288) # 1048576 // 2\n for i in range(10):\n roundtrip(server, client)\n self.assertEqual(stream.max_stream_data_local, 1048576)\n self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n \n # server sends one more byte\n server.send_stream_data(0, b\"Z\")\n + self.assertEqual(transfer(server, client), 1)\n - transfer(server, client)\n \n # MAX_STREAM_DATA is sent and lost\n self.assertEqual(drop(client), 1)\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream)\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 0)\n \n # MAX_DATA is retransmitted and acked\n self.assertEqual(roundtrip(client, server), (1, 1))\n self.assertEqual(stream.max_stream_data_local, 20\n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n # offset: 1\n roundtrip(client, server), (1, 1))\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame_app(self):\n with client_and_server() as (client, server):\n server.close(error_code=QuicErrorCode.NO_ERROR, reason_phrase=\"goodbye\")\n + self.assertEqual(roundtrip(server, client), (1, 0))\n - roundtrip(server, client)\n \n self.assertEqual(\n client._close_event,\n events.ConnectionTerminated(\n error_code=QuicErrorCode.NO_ERROR,\n frame_type=None,\n reason_phrase=\"goodbye\",\n ),\n )\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame(self):\n with client_and_server() as (client, server):\n server.close(\n error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n frame_type=QuicFrameType.ACK,\n reason_phrase=\"illegal ACK frame\",\n )\n + self.assertEqual(roundtrip(server, client), (1, 0))\n - roundtrip(server, client)\n \n self.assertEqual(\n client._close_event,\n events.ConnectionTerminated(\n error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n frame_type=QuicFrameType.ACK,\n reason_phrase=\"illegal ACK frame\",\n ),\n )\n \n===========changed ref 4===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_quantum_readiness(self):\n with client_and_server(client_options={\"quantum_readiness_test\": True},) as (\n client,\n server,\n ):\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n received = None\n while True:\n event = server.next_event()\n if isinstance(event, events.StreamDataReceived):\n received = event.data\n elif event is None:\n break\n \n self.assertEqual(received, b\"hello\")\n \n===========changed ref 5===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_0rtt(self):\n client_ticket = None\n ticket_store = SessionTicketStore()\n \n def save_session_ticket(ticket):\n nonlocal client_ticket\n client_ticket = ticket\n \n with client_and_server(\n client_kwargs={\"session_ticket_handler\": save_session_ticket},\n server_kwargs={\"session_ticket_handler\": ticket_store.add},\n ) as (client, server):\n pass\n \n with client_and_server(\n client_options={\"session_ticket\": client_ticket},\n server_kwargs={\"session_ticket_fetcher\": ticket_store.pop},\n handshake=False,\n ) as (client, server):\n client.connect(SERVER_ADDR, now=time.time())\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (2, 1))\n - roundtrip(client, server)\n \n event = server.next_event()\n self.assertEqual(type(event), events.ProtocolNegotiated)\n \n event = server.next_event()\n self.assertEqual(type(event), events.StreamDataReceived)\n self.assertEqual(event.data, b\"hello\")\n "}}},{"rowIdx":4113,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_send_stream_data_peer_initiated"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"770e56f0a4c4499fdbfa717db26c96e4c338c5ff"},"commit_message":{"kind":"string","value":"[tests] check number of transfered datagrams for more tests"},"ground_truth":{"kind":"string","value":" <3>: self.assertEqual(roundtrip(server, client), (1, 1))\n roundtrip(server, client)\n <7>: self.assertEqual(roundtrip(server, client), (1, 1))\n roundtrip(server, client)\n<11>: self.assertEqual(roundtrip(client, server), (1, 1))\n roundtrip(client, server)\n<15>: self.assertEqual(roundtrip(client, server), (1, 1))\n roundtrip(client, server)\n<19>: self.assertEqual(roundtrip(client, server), (1, 1))\n roundtrip(client, server)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_stream_data_peer_initiated(self):\n <0> with client_and_server() as (client, server):\n <1> # server creates bidirectional stream\n <2> server.send_stream_data(1, b\"hello\")\n <3> roundtrip(server, client)\n <4> \n <5> # server creates unidirectional stream\n <6> server.send_stream_data(3, b\"hello\")\n <7> roundtrip(server, client)\n <8> \n <9> # client creates bidirectional stream\n<10> client.send_stream_data(0, b\"hello\")\n<11> roundtrip(client, server)\n<12> \n<13> # client sends data on server-initiated bidirectional stream\n<14> client.send_stream_data(1, b\"hello\")\n<15> roundtrip(client, server)\n<16> \n<17> # client create unidirectional stream\n<18> client.send_stream_data(2, b\"hello\")\n<19> roundtrip(client, server)\n<20> \n<21> # client tries to send data on server-initial unidirectional stream\n<22> with self.assertRaises(ValueError) as cm:\n<23> client.send_stream_data(3, b\"hello\")\n<24> self.assertEqual(\n<25> str(cm.exception),\n<26> \"Cannot send data on peer-initiated unidirectional stream\",\n<27> )\n<28> \n<29> # client tries to send data on unknown server-initiated bidirectional stream\n<30> with self.assertRaises(ValueError) as cm:\n<31> client.send_stream_data(5, b\"hello\")\n<32> self.assertEqual(\n<33> str(cm.exception), \"Cannot send data on unknown peer-initiated stream\"\n<34> )\n<35> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n roundtrip(sender, receiver)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n at: unittest.case._AssertRaisesContext.__exit__\n self.exception = exc_value.with_traceback(None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_ping(self):\n with client_and_server() as (client, server):\n consume_events(client)\n \n # client sends ping, server ACKs it\n client.send_ping(uid=12345)\n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n # check event\n event = client.next_event()\n self.assertEqual(type(event), events.PingAcknowledged)\n self.assertEqual(event.uid, 12345)\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n with client_and_server() as (client, server):\n # client creates bidirectional stream 0\n stream = client._create_stream(stream_id=0)\n client.send_stream_data(0, b\"hello\")\n self.assertEqual(stream.max_stream_data_local, 1048576)\n self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n # server sends data, just before raising MAX_STREAM_DATA\n server.send_stream_data(0, b\"Z\" * 524288) # 1048576 // 2\n for i in range(10):\n roundtrip(server, client)\n self.assertEqual(stream.max_stream_data_local, 1048576)\n self.assertEqual(stream.max_stream_data_local_sent, 1048576)\n \n # server sends one more byte\n server.send_stream_data(0, b\"Z\")\n + self.assertEqual(transfer(server, client), 1)\n - transfer(server, client)\n \n # MAX_STREAM_DATA is sent and lost\n self.assertEqual(drop(client), 1)\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream)\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 0)\n \n # MAX_DATA is retransmitted and acked\n self.assertEqual(roundtrip(client, server), (1, 1))\n self.assertEqual(stream.max_stream_data_local, 20\n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_max_stream_data_retransmit(self):\n # offset: 1\n roundtrip(client, server), (1, 1))\n self.assertEqual(stream.max_stream_data_local, 2097152)\n self.assertEqual(stream.max_stream_data_local_sent, 2097152)\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame_app(self):\n with client_and_server() as (client, server):\n server.close(error_code=QuicErrorCode.NO_ERROR, reason_phrase=\"goodbye\")\n + self.assertEqual(roundtrip(server, client), (1, 0))\n - roundtrip(server, client)\n \n self.assertEqual(\n client._close_event,\n events.ConnectionTerminated(\n error_code=QuicErrorCode.NO_ERROR,\n frame_type=None,\n reason_phrase=\"goodbye\",\n ),\n )\n \n===========changed ref 4===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_handle_connection_close_frame(self):\n with client_and_server() as (client, server):\n server.close(\n error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n frame_type=QuicFrameType.ACK,\n reason_phrase=\"illegal ACK frame\",\n )\n + self.assertEqual(roundtrip(server, client), (1, 0))\n - roundtrip(server, client)\n \n self.assertEqual(\n client._close_event,\n events.ConnectionTerminated(\n error_code=QuicErrorCode.PROTOCOL_VIOLATION,\n frame_type=QuicFrameType.ACK,\n reason_phrase=\"illegal ACK frame\",\n ),\n )\n \n===========changed ref 5===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_quantum_readiness(self):\n with client_and_server(client_options={\"quantum_readiness_test\": True},) as (\n client,\n server,\n ):\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (1, 1))\n - roundtrip(client, server)\n \n received = None\n while True:\n event = server.next_event()\n if isinstance(event, events.StreamDataReceived):\n received = event.data\n elif event is None:\n break\n \n self.assertEqual(received, b\"hello\")\n \n===========changed ref 6===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_0rtt(self):\n client_ticket = None\n ticket_store = SessionTicketStore()\n \n def save_session_ticket(ticket):\n nonlocal client_ticket\n client_ticket = ticket\n \n with client_and_server(\n client_kwargs={\"session_ticket_handler\": save_session_ticket},\n server_kwargs={\"session_ticket_handler\": ticket_store.add},\n ) as (client, server):\n pass\n \n with client_and_server(\n client_options={\"session_ticket\": client_ticket},\n server_kwargs={\"session_ticket_fetcher\": ticket_store.pop},\n handshake=False,\n ) as (client, server):\n client.connect(SERVER_ADDR, now=time.time())\n stream_id = client.get_next_available_stream_id()\n client.send_stream_data(stream_id, b\"hello\")\n \n + self.assertEqual(roundtrip(client, server), (2, 1))\n - roundtrip(client, server)\n \n event = server.next_event()\n self.assertEqual(type(event), events.ProtocolNegotiated)\n \n event = server.next_event()\n self.assertEqual(type(event), events.StreamDataReceived)\n self.assertEqual(event.data, b\"hello\")\n "}}},{"rowIdx":4114,"cells":{"path":{"kind":"string","value":"aioquic.tls/verify_certificate"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"464a47055970cdcdf2c6f2dbf30717cd0a2bc8e8"},"commit_message":{"kind":"string","value":"[tls] use `certifi` for certificate authority"},"ground_truth":{"kind":"string","value":"<37>: paths\n"},"main_code":{"kind":"string","value":" # module: aioquic.tls\n def verify_certificate(\n certificate: x509.Certificate,\n chain: List[x509.Certificate] = [],\n server_name: Optional[str] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n ) -> None:\n <0> # verify dates\n <1> now = utcnow()\n <2> if now < certificate.not_valid_before:\n <3> raise AlertCertificateExpired(\"Certificate is not valid yet\")\n <4> if now > certificate.not_valid_after:\n <5> raise AlertCertificateExpired(\"Certificate is no longer valid\")\n <6> \n <7> # verify subject\n <8> if server_name is not None:\n <9> subject = []\n<10> subjectAltName: List[Tuple[str, str]] = []\n<11> for attr in certificate.subject:\n<12> if attr.oid == x509.NameOID.COMMON_NAME:\n<13> subject.append(((\"commonName\", attr.value),))\n<14> for ext in certificate.extensions:\n<15> if isinstance(ext.value, x509.SubjectAlternativeName):\n<16> for name in ext.value:\n<17> if isinstance(name, x509.DNSName):\n<18> subjectAltName.append((\"DNS\", name.value))\n<19> \n<20> try:\n<21> ssl.match_hostname(\n<22> {\"subject\": tuple(subject), \"subjectAltName\": tuple(subjectAltName)},\n<23> server_name,\n<24> )\n<25> except ssl.CertificateError as exc:\n<26> raise AlertBadCertificate(\"\\n\".join(exc.args)) from exc\n<27> \n<28> # verify certificate chain\n<29> store = lib.X509_STORE_new()\n<30> openssl_assert(store != ffi.NULL, \"X509_store_new\")\n<31> store = ffi.gc(store, lib.X509_STORE_free)\n<32> \n<33> # load default CAs\n<34> openssl_assert(\n<35> lib.X509_STORE_set_default_paths(store), \"X509_STORE_set_default_paths\"\n<36> )\n<37> paths"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.tls\n def verify_certificate(\n certificate: x509.Certificate,\n chain: List[x509.Certificate] = [],\n server_name: Optional[str] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n ) -> None:\n # offset: 1\n if paths.cafile is not None or paths.capath is not None:\n openssl_assert(\n lib.X509_STORE_load_locations(\n store,\n openssl_encode_path(paths.cafile),\n openssl_encode_path(paths.capath),\n ),\n \"X509_STORE_load_locations\",\n )\n \n # load extra CAs\n if cadata is not None:\n for cert in load_pem_x509_certificates(cadata):\n openssl_assert(\n lib.X509_STORE_add_cert(store, cert_x509_ptr(cert)),\n \"X509_STORE_add_cert\",\n )\n \n if cafile is not None or capath is not None:\n openssl_assert(\n lib.X509_STORE_load_locations(\n store, openssl_encode_path(cafile), openssl_encode_path(capath)\n ),\n \"X509_STORE_load_locations\",\n )\n \n chain_stack = lib.sk_X509_new_null()\n openssl_assert(chain_stack != ffi.NULL, \"sk_X509_new_null\")\n chain_stack = ffi.gc(chain_stack, lib.sk_X509_free)\n for cert in chain:\n openssl_assert(\n lib.sk_X509_push(chain_stack, cert_x509_ptr(cert)), \"sk_X509_push\"\n )\n \n store_ctx = lib.X509_STORE_CTX_new()\n openssl_assert(store_ctx != ffi.NULL, \"X509_STORE_CTX_new\")\n store_ctx = ffi.gc(store_\n===========below chunk 1===========\n # module: aioquic.tls\n def verify_certificate(\n certificate: x509.Certificate,\n chain: List[x509.Certificate] = [],\n server_name: Optional[str] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n ) -> None:\n # offset: 2\n _ctx != ffi.NULL, \"X509_STORE_CTX_new\")\n store_ctx = ffi.gc(store_ctx, lib.X509_STORE_CTX_free)\n openssl_assert(\n lib.X509_STORE_CTX_init(\n store_ctx, store, cert_x509_ptr(certificate), chain_stack\n ),\n \"X509_STORE_CTX_init\",\n )\n \n res = lib.X509_verify_cert(store_ctx)\n if not res:\n err = lib.X509_STORE_CTX_get_error(store_ctx)\n err_str = openssl_decode_string(lib.X509_verify_cert_error_string(err))\n raise AlertBadCertificate(err_str)\n \n \n===========unchanged ref 0===========\n at: aioquic.tls\n ffi = binding.ffi\n \n lib = binding.lib\n \n utcnow = datetime.datetime.utcnow\n \n AlertBadCertificate(*args: object)\n \n AlertCertificateExpired(*args: object)\n \n load_pem_x509_certificates(data: bytes) -> List[x509.Certificate]\n \n openssl_assert(ok: bool, func: str) -> None\n \n openssl_decode_string(charp) -> str\n \n openssl_encode_path(s: Optional[str]) -> Any\n \n cert_x509_ptr(certificate: x509.Certificate) -> Any\n \n at: certifi\n where() -> str\n \n at: enum\n IntEnum(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n IntEnum(x: Union[str, bytes, bytearray], base: int)\n \n at: ssl\n CertificateError = SSLCertVerificationError\n \n match_hostname(cert: _PeerCertRetType, hostname: str) -> None\n \n at: typing\n Tuple = _TupleType(tuple, -1, inst=False, name='Tuple')\n \n List = _alias(list, 1, inst=False, name='List')\n \n \n===========changed ref 0===========\n # module: setup\n root_dir = os.path.abspath(os.path.dirname(__file__))\n \n about = {}\n about_file = os.path.join(root_dir, \"src\", \"aioquic\", \"about.py\")\n with open(about_file, encoding=\"utf-8\") as fp:\n exec(fp.read(), about)\n \n readme_file = os.path.join(root_dir, \"README.rst\")\n with open(readme_file, encoding=\"utf-8\") as f:\n long_description = f.read()\n \n if sys.platform == \"win32\":\n extra_compile_args = []\n libraries = [\"libcrypto\"]\n else:\n extra_compile_args = [\"-std=c99\"]\n libraries = [\"crypto\"]\n \n setuptools.setup(\n name=about[\"__title__\"],\n version=about[\"__version__\"],\n description=about[\"__summary__\"],\n long_description=long_description,\n url=about[\"__uri__\"],\n author=about[\"__author__\"],\n author_email=about[\"__email__\"],\n license=about[\"__license__\"],\n include_package_data=True,\n classifiers=[\n \"Development Status :: 4 - Beta\",\n \"Environment :: Web Environment\",\n \"Intended Audience :: Developers\",\n \"License :: OSI Approved :: BSD License\",\n \"Operating System :: OS Independent\",\n \"Programming Language :: Python\",\n \"Programming Language :: Python :: 3\",\n \"Programming Language :: Python :: 3.6\",\n \"Programming Language :: Python :: 3.7\",\n \"Programming Language :: Python :: 3.8\",\n \"Topic :: Internet :: WWW/HTTP\",\n ],\n ext_modules=[\n setuptools.Extension(\n \"aioquic._buffer\",\n extra_compile_args=extra_compile_args,\n sources=[\"src/aioquic/_buffer.c\"],\n ),\n setuptools.Extension(\n \"aioquic._crypto\",\n extra_compile_args=extra_\n===========changed ref 1===========\n # module: setup\n # offset: 1\n ),\n setuptools.Extension(\n \"aioquic._crypto\",\n extra_compile_args=extra_compile_args,\n libraries=libraries,\n sources=[\"src/aioquic/_crypto.c\"],\n ),\n ],\n package_dir={\"\": \"src\"},\n package_data={\"aioquic\": [\"py.typed\", \"_buffer.pyi\", \"_crypto.pyi\"]},\n packages=[\"aioquic\", \"aioquic.asyncio\", \"aioquic.h0\", \"aioquic.h3\", \"aioquic.quic\"],\n install_requires=[\n + \"certifi\",\n \"cryptography >= 2.5\",\n 'dataclasses; python_version < \"3.7\"',\n \"pylsqpack >= 0.3.3, < 0.4.0\",\n ],\n )\n "}}},{"rowIdx":4115,"cells":{"path":{"kind":"string","value":"tests.test_asyncio/HighLevelTest.setUp"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"324b1997fcbe7366c1867b75ef6a16108a6e3bee"},"commit_message":{"kind":"string","value":"[asyncio] use IPv4 socket on Windows to talk to an IPv4 host"},"ground_truth":{"kind":"string","value":" <1>: self.server_host = \"localhost\"\n self.server_host = \"::1\"\n"},"main_code":{"kind":"string","value":" # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n def setUp(self):\n <0> self.server = None\n <1> self.server_host = \"::1\"\n <2> self.server_port = 4433\n <3> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_asyncio.HighLevelTest.run_server\n self.server = await serve(\n host=host,\n port=self.server_port,\n configuration=configuration,\n stream_handler=handle_stream,\n **kwargs\n )\n \n at: unittest.case.TestCase\n failureException = AssertionError\n \n longMessage = True\n \n maxDiff = 80*8\n \n _diffThreshold = 2**16\n \n setUp(self) -> None\n \n failUnlessEqual = assertEquals = _deprecate(assertEqual)\n \n failUnlessEqual = assertEquals = _deprecate(assertEqual)\n \n failIfEqual = assertNotEquals = _deprecate(assertNotEqual)\n \n failIfEqual = assertNotEquals = _deprecate(assertNotEqual)\n \n failUnlessAlmostEqual = assertAlmostEquals = _deprecate(assertAlmostEqual)\n \n failUnlessAlmostEqual = assertAlmostEquals = _deprecate(assertAlmostEqual)\n \n failIfAlmostEqual = assertNotAlmostEquals = _deprecate(assertNotAlmostEqual)\n \n failIfAlmostEqual = assertNotAlmostEquals = _deprecate(assertNotAlmostEqual)\n \n failUnless = assert_ = _deprecate(assertTrue)\n \n failUnless = assert_ = _deprecate(assertTrue)\n \n failUnlessRaises = _deprecate(assertRaises)\n \n failIf = _deprecate(assertFalse)\n \n assertRaisesRegexp = _deprecate(assertRaisesRegex)\n \n assertRegexpMatches = _deprecate(assertRegex)\n \n assertNotRegexpMatches = _deprecate(assertNotRegex)\n \n "}}},{"rowIdx":4116,"cells":{"path":{"kind":"string","value":"tests.test_asyncio/HighLevelTest.run_server"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"324b1997fcbe7366c1867b75ef6a16108a6e3bee"},"commit_message":{"kind":"string","value":"[asyncio] use IPv4 socket on Windows to talk to an IPv4 host"},"ground_truth":{"kind":"string","value":" <4>: host=host,\n host=\"::\",\n <5>: port=self.server_port,\n port=4433,\n"},"main_code":{"kind":"string","value":" # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def run_server(self, configuration=None, host=\"::\", **kwargs):\n - def run_server(self, configuration=None, **kwargs):\n <0> if configuration is None:\n <1> configuration = QuicConfiguration(is_client=False)\n <2> configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n <3> self.server = await serve(\n <4> host=\"::\",\n <5> port=4433,\n <6> configuration=configuration,\n <7> stream_handler=handle_stream,\n <8> **kwargs\n <9> )\n<10> return self.server\n<11> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_asyncio\n handle_stream(reader, writer)\n \n at: tests.test_asyncio.HighLevelTest.setUp\n self.server = None\n \n self.server_port = 4433\n \n at: tests.utils\n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n \n===========changed ref 0===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n def setUp(self):\n self.server = None\n + self.server_host = \"localhost\"\n - self.server_host = \"::1\"\n self.server_port = 4433\n "}}},{"rowIdx":4117,"cells":{"path":{"kind":"string","value":"aioquic.asyncio.client/connect"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"324b1997fcbe7366c1867b75ef6a16108a6e3bee"},"commit_message":{"kind":"string","value":"[asyncio] use IPv4 socket on Windows to talk to an IPv4 host"},"ground_truth":{"kind":"string","value":"<22>: local_host = \"::\"\n"},"main_code":{"kind":"string","value":" # module: aioquic.asyncio.client\n @asynccontextmanager\n async def connect(\n host: str,\n port: int,\n *,\n configuration: Optional[QuicConfiguration] = None,\n create_protocol: Optional[Callable] = QuicConnectionProtocol,\n session_ticket_handler: Optional[SessionTicketHandler] = None,\n stream_handler: Optional[QuicStreamHandler] = None,\n wait_connected: bool = True,\n ) -> AsyncGenerator[QuicConnectionProtocol, None]:\n <0> \"\"\"\n <1> Connect to a QUIC server at the given `host` and `port`.\n <2> \n <3> :meth:`connect()` returns an awaitable. Awaiting it yields a\n <4> :class:`~aioquic.asyncio.QuicConnectionProtocol` which can be used to\n <5> create streams.\n <6> \n <7> :func:`connect` also accepts the following optional arguments:\n <8> \n <9> * ``configuration`` is a :class:`~aioquic.quic.configuration.QuicConfiguration`\n<10> configuration object.\n<11> * ``create_protocol`` allows customizing the :class:`~asyncio.Protocol` that\n<12> manages the connection. It should be a callable or class accepting the same\n<13> arguments as :class:`~aioquic.asyncio.QuicConnectionProtocol` and returning\n<14> an instance of :class:`~aioquic.asyncio.QuicConnectionProtocol` or a subclass.\n<15> * ``session_ticket_handler`` is a callback which is invoked by the TLS\n<16> engine when a new session ticket is received.\n<17> * ``stream_handler`` is a callback which is invoked whenever a stream is\n<18> created. It must accept two arguments: a :class:`asyncio.StreamReader`\n<19> and a :class:`asyncio.StreamWriter`.\n<20> \"\"\"\n<21> loop = asyncio.get_event_loop()\n<22> \n<23> # if host is not an IP address, pass it to enable SNI\n<24> try:\n<25> ipaddress.ip_address(host)\n<26> server_name = None\n<27> except ValueError:\n<28> server_name = host\n<29> \n<30> # lookup remote address\n<31> "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.asyncio.client\n @asynccontextmanager\n async def connect(\n host: str,\n port: int,\n *,\n configuration: Optional[QuicConfiguration] = None,\n create_protocol: Optional[Callable] = QuicConnectionProtocol,\n session_ticket_handler: Optional[SessionTicketHandler] = None,\n stream_handler: Optional[QuicStreamHandler] = None,\n wait_connected: bool = True,\n ) -> AsyncGenerator[QuicConnectionProtocol, None]:\n # offset: 1\n addr = infos[0][4]\n if len(addr) == 2:\n addr = (\"::ffff:\" + addr[0], addr[1], 0, 0)\n \n # prepare QUIC connection\n if configuration is None:\n configuration = QuicConfiguration(is_client=True)\n if server_name is not None:\n configuration.server_name = server_name\n connection = QuicConnection(\n configuration=configuration, session_ticket_handler=session_ticket_handler\n )\n \n # connect\n _, protocol = await loop.create_datagram_endpoint(\n lambda: create_protocol(connection, stream_handler=stream_handler),\n local_addr=(\"::\", 0),\n )\n protocol = cast(QuicConnectionProtocol, protocol)\n protocol.connect(addr)\n if wait_connected:\n await protocol.wait_connected()\n try:\n yield protocol\n finally:\n protocol.close()\n await protocol.wait_closed()\n \n \n===========unchanged ref 0===========\n at: _asyncio\n get_event_loop()\n \n at: asyncio.events\n get_event_loop() -> AbstractEventLoop\n \n at: asyncio.events.AbstractEventLoop\n getaddrinfo(host: Optional[str], port: Union[str, int, None], *, family: int=..., type: int=..., proto: int=..., flags: int=...) -> List[Tuple[AddressFamily, SocketKind, int, str, Union[Tuple[str, int], Tuple[str, int, int, int]]]]\n \n create_datagram_endpoint(protocol_factory: _ProtocolFactory, local_addr: Optional[Tuple[str, int]]=..., remote_addr: Optional[Tuple[str, int]]=..., *, family: int=..., proto: int=..., flags: int=..., reuse_address: Optional[bool]=..., reuse_port: Optional[bool]=..., allow_broadcast: Optional[bool]=..., sock: Optional[socket]=...) -> _TransProtPair\n \n at: ipaddress\n ip_address(address: object) -> Any\n \n at: socket\n SOCK_DGRAM: SocketKind\n \n at: sys\n platform: str\n \n at: typing\n cast(typ: Type[_T], val: Any) -> _T\n cast(typ: str, val: Any) -> Any\n cast(typ: object, val: Any) -> Any\n \n Callable = _CallableType(collections.abc.Callable, 2)\n \n AsyncGenerator = _alias(collections.abc.AsyncGenerator, 2)\n \n \n===========changed ref 0===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n def setUp(self):\n self.server = None\n + self.server_host = \"localhost\"\n - self.server_host = \"::1\"\n self.server_port = 4433\n \n===========changed ref 1===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n - def test_connect_and_serve_with_sni(self):\n - run(self.run_server())\n - response = run(self.run_client(host=\"localhost\"))\n - self.assertEqual(response, b\"gnip\")\n - \n===========changed ref 2===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_and_serve_ipv6(self):\n + run(self.run_server(host=\"::\"))\n + response = run(self.run_client(host=\"::1\"))\n + self.assertEqual(response, b\"gnip\")\n + \n===========changed ref 3===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_and_serve_ipv4(self):\n + run(self.run_server(host=\"0.0.0.0\"))\n + response = run(self.run_client(host=\"127.0.0.1\"))\n + self.assertEqual(response, b\"gnip\")\n + \n===========changed ref 4===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def run_server(self, configuration=None, host=\"::\", **kwargs):\n - def run_server(self, configuration=None, **kwargs):\n if configuration is None:\n configuration = QuicConfiguration(is_client=False)\n configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n self.server = await serve(\n + host=host,\n - host=\"::\",\n + port=self.server_port,\n - port=4433,\n configuration=configuration,\n stream_handler=handle_stream,\n **kwargs\n )\n return self.server\n "}}},{"rowIdx":4118,"cells":{"path":{"kind":"string","value":"examples.http3_client/run"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e1347661373b02858170246226cf247576b51805"},"commit_message":{"kind":"string","value":"Add local port for the client (#58)"},"ground_truth":{"kind":"string","value":"<19>: local_port=local_port,\n"},"main_code":{"kind":"string","value":" # module: examples.http3_client\n def run(\n configuration: QuicConfiguration,\n urls: List[str],\n data: str,\n include: bool,\n output_dir: Optional[str],\n + local_port: int,\n ) -> None:\n <0> # parse URL\n <1> parsed = urlparse(urls[0])\n <2> assert parsed.scheme in (\n <3> \"https\",\n <4> \"wss\",\n <5> ), \"Only https:// or wss:// URLs are supported.\"\n <6> if \":\" in parsed.netloc:\n <7> host, port_str = parsed.netloc.split(\":\")\n <8> port = int(port_str)\n <9> else:\n<10> host = parsed.netloc\n<11> port = 443\n<12> \n<13> async with connect(\n<14> host,\n<15> port,\n<16> configuration=configuration,\n<17> create_protocol=HttpClient,\n<18> session_ticket_handler=save_session_ticket,\n<19> ) as client:\n<20> client = cast(HttpClient, client)\n<21> \n<22> if parsed.scheme == \"wss\":\n<23> ws = await client.websocket(urls[0], subprotocols=[\"chat\", \"superchat\"])\n<24> \n<25> # send some messages and receive reply\n<26> for i in range(2):\n<27> message = \"Hello {}, WebSocket!\".format(i)\n<28> print(\"> \" + message)\n<29> await ws.send(message)\n<30> \n<31> message = await ws.recv()\n<32> print(\"< \" + message)\n<33> \n<34> await ws.close()\n<35> else:\n<36> # perform request\n<37> coros = [\n<38> perform_http_request(\n<39> client=client,\n<40> url=url,\n<41> data=data,\n<42> include=include,\n<43> output_dir=output_dir,\n<44> )\n<45> for url in urls\n<46> ]\n<47> await asyncio.gather(*coros)\n<48> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: examples.http3_client\n HttpClient(*args, **kwargs)\n \n perform_http_request(client: HttpClient, url: str, data: str, include: bool, output_dir: Optional[str]) -> None\n \n save_session_ticket(ticket: SessionTicket) -> None\n \n at: typing\n cast(typ: Type[_T], val: Any) -> _T\n cast(typ: str, val: Any) -> Any\n cast(typ: object, val: Any) -> Any\n \n List = _alias(list, 1, inst=False, name='List')\n \n at: urllib.parse\n urlparse(url: str, scheme: Optional[str]=..., allow_fragments: bool=...) -> ParseResult\n urlparse(url: Optional[bytes], scheme: Optional[bytes]=..., allow_fragments: bool=...) -> ParseResultBytes\n \n \n===========changed ref 0===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_local_port(self):\n + run(self.run_server())\n + response = run(self.run_client(local_port=3456))\n + self.assertEqual(response, b\"gnip\")\n + "}}},{"rowIdx":4119,"cells":{"path":{"kind":"string","value":"aioquic.asyncio.client/connect"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e1347661373b02858170246226cf247576b51805"},"commit_message":{"kind":"string","value":"Add local port for the client (#58)"},"ground_truth":{"kind":"string","value":"<20>: * ``local_port`` is the UDP port number that this client wants to bind.\n"},"main_code":{"kind":"string","value":" asyncio.client\n @asynccontextmanager\n async def connect(\n host: str,\n port: int,\n *,\n configuration: Optional[QuicConfiguration] = None,\n create_protocol: Optional[Callable] = QuicConnectionProtocol,\n session_ticket_handler: Optional[SessionTicketHandler] = None,\n stream_handler: Optional[QuicStreamHandler] = None,\n wait_connected: bool = True,\n + local_port: int = 0,\n ) -> AsyncGenerator[QuicConnectionProtocol, None]:\n <0> \"\"\"\n <1> Connect to a QUIC server at the given `host` and `port`.\n <2> \n <3> :meth:`connect()` returns an awaitable. Awaiting it yields a\n <4> :class:`~aioquic.asyncio.QuicConnectionProtocol` which can be used to\n <5> create streams.\n <6> \n <7> :func:`connect` also accepts the following optional arguments:\n <8> \n <9> * ``configuration`` is a :class:`~aioquic.quic.configuration.QuicConfiguration`\n<10> configuration object.\n<11> * ``create_protocol`` allows customizing the :class:`~asyncio.Protocol` that\n<12> manages the connection. It should be a callable or class accepting the same\n<13> arguments as :class:`~aioquic.asyncio.QuicConnectionProtocol` and returning\n<14> an instance of :class:`~aioquic.asyncio.QuicConnectionProtocol` or a subclass.\n<15> * ``session_ticket_handler`` is a callback which is invoked by the TLS\n<16> engine when a new session ticket is received.\n<17> * ``stream_handler`` is a callback which is invoked whenever a stream is\n<18> created. It must accept two arguments: a :class:`asyncio.StreamReader`\n<19> and a :class:`asyncio.StreamWriter`.\n<20> \"\"\"\n<21> loop = asyncio.get_event_loop()\n<22> local_host = \"::\"\n<23> \n<24> # if host is not an IP address, pass it to enable SNI\n<25> try:\n<26> ipaddress.ip_address(host)\n<27> server_name = None\n<28> except ValueError:\n<29> server_name ="},"context":{"kind":"string","value":"===========below chunk 0===========\n @asynccontextmanager\n async def connect(\n host: str,\n port: int,\n *,\n configuration: Optional[QuicConfiguration] = None,\n create_protocol: Optional[Callable] = QuicConnectionProtocol,\n session_ticket_handler: Optional[SessionTicketHandler] = None,\n stream_handler: Optional[QuicStreamHandler] = None,\n wait_connected: bool = True,\n + local_port: int = 0,\n ) -> AsyncGenerator[QuicConnectionProtocol, None]:\n # offset: 1\n \n # lookup remote address\n infos = await loop.getaddrinfo(host, port, type=socket.SOCK_DGRAM)\n addr = infos[0][4]\n if len(addr) == 2:\n # determine behaviour for IPv4\n if sys.platform == \"win32\":\n # on Windows, we must use an IPv4 socket to reach an IPv4 host\n local_host = \"0.0.0.0\"\n else:\n # other platforms support dual-stack sockets\n addr = (\"::ffff:\" + addr[0], addr[1], 0, 0)\n \n # prepare QUIC connection\n if configuration is None:\n configuration = QuicConfiguration(is_client=True)\n if server_name is not None:\n configuration.server_name = server_name\n connection = QuicConnection(\n configuration=configuration, session_ticket_handler=session_ticket_handler\n )\n \n # connect\n _, protocol = await loop.create_datagram_endpoint(\n lambda: create_protocol(connection, stream_handler=stream_handler),\n local_addr=(local_host, 0),\n )\n protocol = cast(QuicConnectionProtocol, protocol)\n protocol.connect(addr)\n if wait_connected:\n await protocol.wait_connected()\n try:\n yield protocol\n finally:\n protocol.close()\n await protocol.wait_closed()\n \n \n===========unchanged ref 0===========\n at: _asyncio\n get_event_loop()\n \n at: asyncio.events\n get_event_loop() -> AbstractEventLoop\n \n at: asyncio.events.AbstractEventLoop\n getaddrinfo(host: Optional[str], port: Union[str, int, None], *, family: int=..., type: int=..., proto: int=..., flags: int=...) -> List[Tuple[AddressFamily, SocketKind, int, str, Union[Tuple[str, int], Tuple[str, int, int, int]]]]\n \n create_datagram_endpoint(protocol_factory: _ProtocolFactory, local_addr: Optional[Tuple[str, int]]=..., remote_addr: Optional[Tuple[str, int]]=..., *, family: int=..., proto: int=..., flags: int=..., reuse_address: Optional[bool]=..., reuse_port: Optional[bool]=..., allow_broadcast: Optional[bool]=..., sock: Optional[socket]=...) -> _TransProtPair\n \n at: ipaddress\n ip_address(address: object) -> Any\n \n at: socket\n SOCK_DGRAM: SocketKind\n \n at: sys\n platform: str\n \n at: typing\n cast(typ: Type[_T], val: Any) -> _T\n cast(typ: str, val: Any) -> Any\n cast(typ: object, val: Any) -> Any\n \n Callable = _CallableType(collections.abc.Callable, 2)\n \n AsyncGenerator = _alias(collections.abc.AsyncGenerator, 2)\n \n \n===========changed ref 0===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_local_port(self):\n + run(self.run_server())\n + response = run(self.run_client(local_port=3456))\n + self.assertEqual(response, b\"gnip\")\n + \n===========changed ref 1===========\n # module: examples.http3_client\n def run(\n configuration: QuicConfiguration,\n urls: List[str],\n data: str,\n include: bool,\n output_dir: Optional[str],\n + local_port: int,\n ) -> None:\n # parse URL\n parsed = urlparse(urls[0])\n assert parsed.scheme in (\n \"https\",\n \"wss\",\n ), \"Only https:// or wss:// URLs are supported.\"\n if \":\" in parsed.netloc:\n host, port_str = parsed.netloc.split(\":\")\n port = int(port_str)\n else:\n host = parsed.netloc\n port = 443\n \n async with connect(\n host,\n port,\n configuration=configuration,\n create_protocol=HttpClient,\n session_ticket_handler=save_session_ticket,\n + local_port=local_port,\n ) as client:\n client = cast(HttpClient, client)\n \n if parsed.scheme == \"wss\":\n ws = await client.websocket(urls[0], subprotocols=[\"chat\", \"superchat\"])\n \n # send some messages and receive reply\n for i in range(2):\n message = \"Hello {}, WebSocket!\".format(i)\n print(\"> \" + message)\n await ws.send(message)\n \n message = await ws.recv()\n print(\"< \" + message)\n \n await ws.close()\n else:\n # perform request\n coros = [\n perform_http_request(\n client=client,\n url=url,\n data=data,\n include=include,\n output_dir=output_dir,\n )\n for url in urls\n ]\n await asyncio.gather(*coros)\n \n===========changed ref 2===========\n # module: examples.http3_client\n if __name__ == \"__main__\":\n defaults = QuicConfiguration(is_client=True)\n \n parser = argparse.ArgumentParser(description=\"HTTP/3 client\")\n parser.add_argument(\n \"url\", type=str, nargs=\"+\", help=\"the URL to query (must be HTTPS)\"\n )\n parser.add_argument(\n \"--ca-certs\", type=str, help=\"load CA certificates from the specified file\"\n )\n parser.add_argument(\n \"-d\", \"--data\", type=str, help=\"send the specified data in a POST request\"\n )\n parser.add_argument(\n \"-i\",\n \"--include\",\n action=\"store_true\",\n help=\"include the HTTP response headers in the output\",\n )\n parser.add_argument(\n \"--max-data\",\n type=int,\n help=\"connection-wide flow control limit (default: %d)\" % defaults.max_data,\n )\n parser.add_argument(\n \"--max-stream-data\",\n type=int,\n help=\"per-stream flow control limit (default: %d)\" % defaults.max_stream_data,\n )\n parser.add_argument(\n \"-k\",\n \"--insecure\",\n action=\"store_true\",\n help=\"do not validate server certificate\",\n )\n parser.add_argument(\"--legacy-http\", action=\"store_true\", help=\"use HTTP/0.9\")\n parser.add_argument(\n \"--output-dir\", type=str, help=\"write downloaded files to this directory\",\n )\n parser.add_argument(\n \"-q\", \"--quic-log\", type=str, help=\"log QUIC events to a file in QLOG format\"\n )\n parser.add_argument(\n \"-l\",\n \"--secrets-log\",\n type=str,\n help=\"log secrets to a file, for use with Wireshark\",\n )\n parser.add_argument(\n \"-s\",\n \"--session-ticket\",\n type=str,\n help=\"read and write"}}},{"rowIdx":4120,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._initialize"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"229c0f1bfb6e663e79532047afcd53f8e1276061"},"commit_message":{"kind":"string","value":"Raise size of crypto buffers for huge certificates (fixes: #89)"},"ground_truth":{"kind":"string","value":""},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _initialize(self, peer_cid: bytes) -> None:\n <0> # TLS\n <1> self.tls = tls.Context(\n <2> alpn_protocols=self._configuration.alpn_protocols,\n <3> cadata=self._configuration.cadata,\n <4> cafile=self._configuration.cafile,\n <5> capath=self._configuration.capath,\n <6> is_client=self._is_client,\n <7> logger=self._logger,\n <8> max_early_data=None if self._is_client else MAX_EARLY_DATA,\n <9> server_name=self._configuration.server_name,\n<10> verify_mode=self._configuration.verify_mode,\n<11> )\n<12> self.tls.certificate = self._configuration.certificate\n<13> self.tls.certificate_chain = self._configuration.certificate_chain\n<14> self.tls.certificate_private_key = self._configuration.private_key\n<15> self.tls.handshake_extensions = [\n<16> (\n<17> tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n<18> self._serialize_transport_parameters(),\n<19> )\n<20> ]\n<21> \n<22> # TLS session resumption\n<23> session_ticket = self._configuration.session_ticket\n<24> if (\n<25> self._is_client\n<26> and session_ticket is not None\n<27> and session_ticket.is_valid\n<28> and session_ticket.server_name == self._configuration.server_name\n<29> ):\n<30> self.tls.session_ticket = self._configuration.session_ticket\n<31> \n<32> # parse saved QUIC transport parameters - for 0-RTT\n<33> if session_ticket.max_early_data_size == MAX_EARLY_DATA:\n<34> for ext_type, ext_data in session_ticket.other_extensions:\n<35> if ext_type == tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS:\n<36> self._parse_transport_parameters(\n<37> ext_data, from_session_ticket=True\n<38> )\n<39> break\n<40> \n "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _initialize(self, peer_cid: bytes) -> None:\n # offset: 1\n self.tls.alpn_cb = self._alpn_handler\n if self._session_ticket_fetcher is not None:\n self.tls.get_session_ticket_cb = self._session_ticket_fetcher\n if self._session_ticket_handler is not None:\n self.tls.new_session_ticket_cb = self._handle_session_ticket\n self.tls.update_traffic_key_cb = self._update_traffic_key\n \n # packet spaces\n self._cryptos = {\n tls.Epoch.INITIAL: CryptoPair(),\n tls.Epoch.ZERO_RTT: CryptoPair(),\n tls.Epoch.HANDSHAKE: CryptoPair(),\n tls.Epoch.ONE_RTT: CryptoPair(),\n }\n self._crypto_buffers = {\n tls.Epoch.INITIAL: Buffer(capacity=4096),\n tls.Epoch.HANDSHAKE: Buffer(capacity=4096),\n tls.Epoch.ONE_RTT: Buffer(capacity=4096),\n }\n self._crypto_streams = {\n tls.Epoch.INITIAL: QuicStream(),\n tls.Epoch.HANDSHAKE: QuicStream(),\n tls.Epoch.ONE_RTT: QuicStream(),\n }\n self._spaces = {\n tls.Epoch.INITIAL: QuicPacketSpace(),\n tls.Epoch.HANDSHAKE: QuicPacketSpace(),\n tls.Epoch.ONE_RTT: QuicPacketSpace(),\n }\n \n self._cryptos[tls.Epoch.INITIAL].setup_initial(\n cid=peer_cid, is_client=self._is_client, version=self._version\n )\n \n self._loss.spaces = list(self._spaces.values())\n self._packet_number = 0\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n CRYPTO_BUFFER_SIZE = 16384\n \n MAX_EARLY_DATA = 0xFFFFFFFF\n \n at: aioquic.quic.connection.QuicConnection\n _alpn_handler(alpn_protocol: str) -> None\n \n _handle_session_ticket(session_ticket: tls.SessionTicket) -> None\n \n _parse_transport_parameters(data: bytes, from_session_ticket: bool=False) -> None\n \n _serialize_transport_parameters() -> bytes\n \n _update_traffic_key(direction: tls.Direction, epoch: tls.Epoch, cipher_suite: tls.CipherSuite, secret: bytes) -> None\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._configuration = configuration\n \n self._is_client = configuration.is_client\n \n self._cryptos: Dict[tls.Epoch, CryptoPair] = {}\n \n self._crypto_buffers: Dict[tls.Epoch, Buffer] = {}\n \n self._crypto_streams: Dict[tls.Epoch, QuicStream] = {}\n \n self._spaces: Dict[tls.Epoch, QuicPacketSpace] = {}\n \n self._version: Optional[int] = None\n \n self._logger = QuicConnectionAdapter(\n logger, {\"id\": dump_cid(logger_connection_id)}\n )\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n self._session_ticket_fetcher = session_ticket_fetcher\n \n self._session_ticket_handler = session_ticket_handler\n \n at: aioquic.quic.connection.QuicConnection.connect\n self._version = self._configuration.supported_versions[0]\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._version = QuicProtocolVersion(header.version)\n self._version = QuicProtocolVersion(max(common))\n \n \n===========changed ref 0===========\n # module: aioquic.quic.connection\n logger = logging.getLogger(\"quic\")\n \n + CRYPTO_BUFFER_SIZE = 16384\n EPOCH_SHORTCUTS = {\n \"I\": tls.Epoch.INITIAL,\n \"H\": tls.Epoch.HANDSHAKE,\n \"0\": tls.Epoch.ZERO_RTT,\n \"1\": tls.Epoch.ONE_RTT,\n }\n MAX_EARLY_DATA = 0xFFFFFFFF\n SECRETS_LABELS = [\n [\n None,\n \"QUIC_CLIENT_EARLY_TRAFFIC_SECRET\",\n \"QUIC_CLIENT_HANDSHAKE_TRAFFIC_SECRET\",\n \"QUIC_CLIENT_TRAFFIC_SECRET_0\",\n ],\n [\n None,\n None,\n \"QUIC_SERVER_HANDSHAKE_TRAFFIC_SECRET\",\n \"QUIC_SERVER_TRAFFIC_SECRET_0\",\n ],\n ]\n STREAM_FLAGS = 0x07\n \n NetworkAddress = Any\n \n # frame sizes\n ACK_FRAME_CAPACITY = 64 # FIXME: this is arbitrary!\n APPLICATION_CLOSE_FRAME_CAPACITY = 1 + 8 + 8 # + reason length\n HANDSHAKE_DONE_FRAME_CAPACITY = 1\n MAX_DATA_FRAME_CAPACITY = 1 + 8\n MAX_STREAM_DATA_FRAME_CAPACITY = 1 + 8 + 8\n NEW_CONNECTION_ID_FRAME_CAPACITY = 1 + 8 + 8 + 1 + 20 + 16\n PATH_CHALLENGE_FRAME_CAPACITY = 1 + 8\n PATH_RESPONSE_FRAME_CAPACITY = 1 + 8\n PING_FRAME_CAPACITY = 1\n RETIRE_CONNECTION_ID_CAPACITY = 1 + 8\n STREAMS_BLOCKED_CAPACITY = 1 + 8\n TRANSPORT_CLOSE_FRAME_CAPACITY = 1 + 8 + 8 + 8 # + reason length\n "}}},{"rowIdx":4121,"cells":{"path":{"kind":"string","value":"tests.test_tls/TlsTest.test_pull_client_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":"<11>: hello.legacy_session_id,\n hello.session_id,\n<24>: self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello(self):\n <0> buf = Buffer(data=load(\"tls_client_hello.bin\"))\n <1> hello = pull_client_hello(buf)\n <2> self.assertTrue(buf.eof())\n <3> \n <4> self.assertEqual(\n <5> hello.random,\n <6> binascii.unhexlify(\n <7> \"18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5\"\n <8> ),\n <9> )\n<10> self.assertEqual(\n<11> hello.session_id,\n<12> binascii.unhexlify(\n<13> \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n<14> ),\n<15> )\n<16> self.assertEqual(\n<17> hello.cipher_suites,\n<18> [\n<19> tls.CipherSuite.AES_256_GCM_SHA384,\n<20> tls.CipherSuite.AES_128_GCM_SHA256,\n<21> tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n<22> ],\n<23> )\n<24> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n<25> \n<26> # extensions\n<27> self.assertEqual(hello.alpn_protocols, None)\n<28> self.assertEqual(\n<29> hello.key_share,\n<30> [\n<31> (\n<32> tls.Group.SECP256R1,\n<33> binascii.unhexlify(\n<34> \"047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8\"\n<35> \"93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello(self):\n # offset: 1\n \"b0\"\n ),\n )\n ],\n )\n self.assertEqual(\n hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE]\n )\n self.assertEqual(hello.server_name, None)\n self.assertEqual(\n hello.signature_algorithms,\n [\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n )\n self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1])\n self.assertEqual(\n hello.supported_versions,\n [\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n )\n \n self.assertEqual(\n hello.other_extensions,\n [\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n \n \n===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.test_tls\n CLIENT_QUIC_TRANSPORT_PARAMETERS = binascii.unhexlify(\n b\"ff0000110031000500048010000000060004801000000007000480100000000\"\n b\"4000481000000000100024258000800024064000a00010a\"\n )\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n "}}},{"rowIdx":4122,"cells":{"path":{"kind":"string","value":"tests.test_tls/TlsTest.test_pull_client_hello_with_alpn"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":"<10>: self.assertEqual(hello.legacy_session_id, b\"\")\n self.assertEqual(hello.session_id, b\"\")\n<20>: self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_alpn(self):\n <0> buf = Buffer(data=load(\"tls_client_hello_with_alpn.bin\"))\n <1> hello = pull_client_hello(buf)\n <2> self.assertTrue(buf.eof())\n <3> \n <4> self.assertEqual(\n <5> hello.random,\n <6> binascii.unhexlify(\n <7> \"ed575c6fbd599c4dfaabd003dca6e860ccdb0e1782c1af02e57bf27cb6479b76\"\n <8> ),\n <9> )\n<10> self.assertEqual(hello.session_id, b\"\")\n<11> self.assertEqual(\n<12> hello.cipher_suites,\n<13> [\n<14> tls.CipherSuite.AES_128_GCM_SHA256,\n<15> tls.CipherSuite.AES_256_GCM_SHA384,\n<16> tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n<17> tls.CipherSuite.EMPTY_RENEGOTIATION_INFO_SCSV,\n<18> ],\n<19> )\n<20> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n<21> \n<22> # extensions\n<23> self.assertEqual(hello.alpn_protocols, [\"h3-19\"])\n<24> self.assertEqual(hello.early_data, False)\n<25> self.assertEqual(\n<26> hello.key_share,\n<27> [\n<28> (\n<29> tls.Group.SECP256R1,\n<30> binascii.unhexlify(\n<31> \"048842315c437bb0ce2929c816fee4e942ec5cb6db6a6b9bf622680188ebb0d4\"\n<32> \"b652e69033f71686aa01cbc79155866e264c9f33f45aa16b0dfa10a222e3a669\"\n<33> \"22\"\n<34> ),\n "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_alpn(self):\n # offset: 1\n ],\n )\n self.assertEqual(\n hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE]\n )\n self.assertEqual(hello.server_name, \"cloudflare-quic.com\")\n self.assertEqual(\n hello.signature_algorithms,\n [\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP384R1_SHA384,\n tls.SignatureAlgorithm.ECDSA_SECP521R1_SHA512,\n tls.SignatureAlgorithm.ED25519,\n tls.SignatureAlgorithm.ED448,\n tls.SignatureAlgorithm.RSA_PSS_PSS_SHA256,\n tls.SignatureAlgorithm.RSA_PSS_PSS_SHA384,\n tls.SignatureAlgorithm.RSA_PSS_PSS_SHA512,\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA384,\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA512,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA384,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA512,\n ],\n )\n self.assertEqual(\n hello.supported_groups,\n [\n tls.Group.SECP256R1,\n tls.Group.X25519,\n tls.Group.SECP384R1,\n tls.Group.SECP521R1,\n ],\n )\n self.assertEqual(hello.supported_versions, [tls.TLS_VERSION_1_3])\n \n # serialize\n buf = Buffer(1000)\n push_client_hello(buf, hello)\n self.assertEqual(len(buf.data), len(load(\"tls_client_hello_\n===========below chunk 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_alpn(self):\n # offset: 2\n _hello(buf, hello)\n self.assertEqual(len(buf.data), len(load(\"tls_client_hello_with_alpn.bin\")))\n \n \n===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello(self):\n buf = Buffer(data=load(\"tls_client_hello.bin\"))\n hello = pull_client_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n )\n self.assertEqual(\n hello.cipher_suites,\n [\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n )\n + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n \n # extensions\n self.assertEqual(hello.alpn_protocols, None)\n self.assertEqual(\n hello.key_share,\n [\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8\"\n \"93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a\n===========changed ref 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello(self):\n # offset: 1\n 73d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15\"\n \"b0\"\n ),\n )\n ],\n )\n self.assertEqual(\n hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE]\n )\n self.assertEqual(hello.server_name, None)\n self.assertEqual(\n hello.signature_algorithms,\n [\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n )\n self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1])\n self.assertEqual(\n hello.supported_versions,\n [\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n )\n \n self.assertEqual(\n hello.other_extensions,\n [\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n "}}},{"rowIdx":4123,"cells":{"path":{"kind":"string","value":"tests.test_tls/TlsTest.test_pull_client_hello_with_sni"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":"<11>: hello.legacy_session_id,\n hello.session_id,\n<24>: self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_sni(self):\n <0> buf = Buffer(data=load(\"tls_client_hello_with_sni.bin\"))\n <1> hello = pull_client_hello(buf)\n <2> self.assertTrue(buf.eof())\n <3> \n <4> self.assertEqual(\n <5> hello.random,\n <6> binascii.unhexlify(\n <7> \"987d8934140b0a42cc5545071f3f9f7f61963d7b6404eb674c8dbe513604346b\"\n <8> ),\n <9> )\n<10> self.assertEqual(\n<11> hello.session_id,\n<12> binascii.unhexlify(\n<13> \"26b19bdd30dbf751015a3a16e13bd59002dfe420b799d2a5cd5e11b8fa7bcb66\"\n<14> ),\n<15> )\n<16> self.assertEqual(\n<17> hello.cipher_suites,\n<18> [\n<19> tls.CipherSuite.AES_256_GCM_SHA384,\n<20> tls.CipherSuite.AES_128_GCM_SHA256,\n<21> tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n<22> ],\n<23> )\n<24> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n<25> \n<26> # extensions\n<27> self.assertEqual(hello.alpn_protocols, None)\n<28> self.assertEqual(\n<29> hello.key_share,\n<30> [\n<31> (\n<32> tls.Group.SECP256R1,\n<33> binascii.unhexlify(\n<34> \"04b62d70f907c814cd65d0f73b8b991f06b70c77153f548410a191d2b19764a2\"\n<35> \"ecc06065a480efa9e1f10c8da6e737d5bfc04be3f"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_sni(self):\n # offset: 1\n \"40\"\n ),\n )\n ],\n )\n self.assertEqual(\n hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE]\n )\n self.assertEqual(hello.server_name, \"cloudflare-quic.com\")\n self.assertEqual(\n hello.signature_algorithms,\n [\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n )\n self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1])\n self.assertEqual(\n hello.supported_versions,\n [\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n )\n \n self.assertEqual(\n hello.other_extensions,\n [\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n \n # serialize\n buf = Buffer(1000)\n push_client_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_client_hello_with_sni.bin\"))\n \n \n===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.test_tls\n CLIENT_QUIC_TRANSPORT_PARAMETERS = binascii.unhexlify(\n b\"ff0000110031000500048010000000060004801000000007000480100000000\"\n b\"4000481000000000100024258000800024064000a00010a\"\n )\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello(self):\n buf = Buffer(data=load(\"tls_client_hello.bin\"))\n hello = pull_client_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n )\n self.assertEqual(\n hello.cipher_suites,\n [\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n )\n + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n \n # extensions\n self.assertEqual(hello.alpn_protocols, None)\n self.assertEqual(\n hello.key_share,\n [\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8\"\n \"93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a\n===========changed ref 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello(self):\n # offset: 1\n 73d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15\"\n \"b0\"\n ),\n )\n ],\n )\n self.assertEqual(\n hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE]\n )\n self.assertEqual(hello.server_name, None)\n self.assertEqual(\n hello.signature_algorithms,\n [\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n )\n self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1])\n self.assertEqual(\n hello.supported_versions,\n [\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n )\n \n self.assertEqual(\n hello.other_extensions,\n [\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n "}}},{"rowIdx":4124,"cells":{"path":{"kind":"string","value":"tests.test_tls/TlsTest.test_push_client_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":" <4>: legacy_session_id=binascii.unhexlify(\n session_id=binascii.unhexlify(\n<12>: legacy_compression_methods=[tls.CompressionMethod.NULL],\n compression_methods=[tls.CompressionMethod.NULL],\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_client_hello(self):\n <0> hello = ClientHello(\n <1> random=binascii.unhexlify(\n <2> \"18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5\"\n <3> ),\n <4> session_id=binascii.unhexlify(\n <5> \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n <6> ),\n <7> cipher_suites=[\n <8> tls.CipherSuite.AES_256_GCM_SHA384,\n <9> tls.CipherSuite.AES_128_GCM_SHA256,\n<10> tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n<11> ],\n<12> compression_methods=[tls.CompressionMethod.NULL],\n<13> key_share=[\n<14> (\n<15> tls.Group.SECP256R1,\n<16> binascii.unhexlify(\n<17> \"047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8\"\n<18> \"93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15\"\n<19> \"b0\"\n<20> ),\n<21> )\n<22> ],\n<23> psk_key_exchange_modes=[tls.PskKeyExchangeMode.PSK_DHE_KE],\n<24> signature_algorithms=[\n<25> tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n<26> tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n<27> tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n<28> tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n<29> "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_client_hello(self):\n # offset: 1\n supported_groups=[tls.Group.SECP256R1],\n supported_versions=[\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n other_extensions=[\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n \n buf = Buffer(1000)\n push_client_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_client_hello.bin\"))\n \n \n===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.test_tls\n CLIENT_QUIC_TRANSPORT_PARAMETERS = binascii.unhexlify(\n b\"ff0000110031000500048010000000060004801000000007000480100000000\"\n b\"4000481000000000100024258000800024064000a00010a\"\n )\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_sni(self):\n buf = Buffer(data=load(\"tls_client_hello_with_sni.bin\"))\n hello = pull_client_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"987d8934140b0a42cc5545071f3f9f7f61963d7b6404eb674c8dbe513604346b\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"26b19bdd30dbf751015a3a16e13bd59002dfe420b799d2a5cd5e11b8fa7bcb66\"\n ),\n )\n self.assertEqual(\n hello.cipher_suites,\n [\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n )\n + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n \n # extensions\n self.assertEqual(hello.alpn_protocols, None)\n self.assertEqual(\n hello.key_share,\n [\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"04b62d70f907c814cd65d0f73b8b991f06b70c77153f548410a191d2b19764a2\"\n \"ecc06065a480efa9e1f10c8da6e737d5bfc04be3\n===========changed ref 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_sni(self):\n # offset: 1\n \"ecc06065a480efa9e1f10c8da6e737d5bfc04be3f773e20a0c997f51b5621280\"\n \"40\"\n ),\n )\n ],\n )\n self.assertEqual(\n hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE]\n )\n self.assertEqual(hello.server_name, \"cloudflare-quic.com\")\n self.assertEqual(\n hello.signature_algorithms,\n [\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n )\n self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1])\n self.assertEqual(\n hello.supported_versions,\n [\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n )\n \n self.assertEqual(\n hello.other_extensions,\n [\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n \n # serialize\n buf = Buffer(1000)\n push_client_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_client_hello_\n===========changed ref 2===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello(self):\n buf = Buffer(data=load(\"tls_client_hello.bin\"))\n hello = pull_client_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n )\n self.assertEqual(\n hello.cipher_suites,\n [\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n )\n + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n \n # extensions\n self.assertEqual(hello.alpn_protocols, None)\n self.assertEqual(\n hello.key_share,\n [\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8\"\n \"93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a"}}},{"rowIdx":4125,"cells":{"path":{"kind":"string","value":"tests.test_tls/TlsTest.test_pull_server_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":"<11>: hello.legacy_session_id,\n hello.session_id,\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello(self):\n <0> buf = Buffer(data=load(\"tls_server_hello.bin\"))\n <1> hello = pull_server_hello(buf)\n <2> self.assertTrue(buf.eof())\n <3> \n <4> self.assertEqual(\n <5> hello.random,\n <6> binascii.unhexlify(\n <7> \"ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280\"\n <8> ),\n <9> )\n<10> self.assertEqual(\n<11> hello.session_id,\n<12> binascii.unhexlify(\n<13> \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n<14> ),\n<15> )\n<16> self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384)\n<17> self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL)\n<18> self.assertEqual(\n<19> hello.key_share,\n<20> (\n<21> tls.Group.SECP256R1,\n<22> binascii.unhexlify(\n<23> \"048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189\"\n<24> \"5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf\"\n<25> \"b2\"\n<26> ),\n<27> ),\n<28> )\n<29> self.assertEqual(hello.pre_shared_key, None)\n<30> self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3)\n<31> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_client_hello(self):\n hello = ClientHello(\n random=binascii.unhexlify(\n \"18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5\"\n ),\n + legacy_session_id=binascii.unhexlify(\n - session_id=binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n cipher_suites=[\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n + legacy_compression_methods=[tls.CompressionMethod.NULL],\n - compression_methods=[tls.CompressionMethod.NULL],\n key_share=[\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8\"\n \"93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15\"\n \"b0\"\n ),\n )\n ],\n psk_key_exchange_modes=[tls.PskKeyExchangeMode.PSK_DHE_KE],\n signature_algorithms=[\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_\n===========changed ref 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_client_hello(self):\n # offset: 1\n SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n supported_groups=[tls.Group.SECP256R1],\n supported_versions=[\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n other_extensions=[\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n \n buf = Buffer(1000)\n push_client_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_client_hello.bin\"))\n \n===========changed ref 2===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_sni(self):\n buf = Buffer(data=load(\"tls_client_hello_with_sni.bin\"))\n hello = pull_client_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"987d8934140b0a42cc5545071f3f9f7f61963d7b6404eb674c8dbe513604346b\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"26b19bdd30dbf751015a3a16e13bd59002dfe420b799d2a5cd5e11b8fa7bcb66\"\n ),\n )\n self.assertEqual(\n hello.cipher_suites,\n [\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n )\n + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n \n # extensions\n self.assertEqual(hello.alpn_protocols, None)\n self.assertEqual(\n hello.key_share,\n [\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"04b62d70f907c814cd65d0f73b8b991f06b70c77153f548410a191d2b19764a2\"\n \"ecc06065a480efa9e1f10c8da6e737d5bfc04be3\n===========changed ref 3===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_sni(self):\n # offset: 1\n \"ecc06065a480efa9e1f10c8da6e737d5bfc04be3f773e20a0c997f51b5621280\"\n \"40\"\n ),\n )\n ],\n )\n self.assertEqual(\n hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE]\n )\n self.assertEqual(hello.server_name, \"cloudflare-quic.com\")\n self.assertEqual(\n hello.signature_algorithms,\n [\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n )\n self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1])\n self.assertEqual(\n hello.supported_versions,\n [\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n )\n \n self.assertEqual(\n hello.other_extensions,\n [\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n \n # serialize\n buf = Buffer(1000)\n push_client_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_client_hello_"}}},{"rowIdx":4126,"cells":{"path":{"kind":"string","value":"tests.test_tls/TlsTest.test_pull_server_hello_with_psk"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":"<11>: hello.legacy_session_id,\n hello.session_id,\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello_with_psk(self):\n <0> buf = Buffer(data=load(\"tls_server_hello_with_psk.bin\"))\n <1> hello = pull_server_hello(buf)\n <2> self.assertTrue(buf.eof())\n <3> \n <4> self.assertEqual(\n <5> hello.random,\n <6> binascii.unhexlify(\n <7> \"ccbaaf04fc1bd5143b2cc6b97520cf37d91470dbfc8127131a7bf0f941e3a137\"\n <8> ),\n <9> )\n<10> self.assertEqual(\n<11> hello.session_id,\n<12> binascii.unhexlify(\n<13> \"9483e7e895d0f4cec17086b0849601c0632662cd764e828f2f892f4c4b7771b0\"\n<14> ),\n<15> )\n<16> self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384)\n<17> self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL)\n<18> self.assertEqual(\n<19> hello.key_share,\n<20> (\n<21> tls.Group.SECP256R1,\n<22> binascii.unhexlify(\n<23> \"0485d7cecbebfc548fc657bf51b8e8da842a4056b164a27f7702ca318c16e488\"\n<24> \"18b6409593b15c6649d6f459387a53128b164178adc840179aad01d36ce95d62\"\n<25> \"76\"\n<26> ),\n<27> ),\n<28> )\n<29> self.assertEqual(hello.pre_shared_key, 0)\n<30> self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3)\n<31> \n<32> # serialize\n<33> buf = Buffer(1000)\n "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello_with_psk(self):\n # offset: 1\n self.assertEqual(buf.data, load(\"tls_server_hello_with_psk.bin\"))\n \n \n===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello(self):\n buf = Buffer(data=load(\"tls_server_hello.bin\"))\n hello = pull_server_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n )\n self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384)\n self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL)\n self.assertEqual(\n hello.key_share,\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189\"\n \"5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf\"\n \"b2\"\n ),\n ),\n )\n self.assertEqual(hello.pre_shared_key, None)\n self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3)\n \n===========changed ref 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_client_hello(self):\n hello = ClientHello(\n random=binascii.unhexlify(\n \"18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5\"\n ),\n + legacy_session_id=binascii.unhexlify(\n - session_id=binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n cipher_suites=[\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n + legacy_compression_methods=[tls.CompressionMethod.NULL],\n - compression_methods=[tls.CompressionMethod.NULL],\n key_share=[\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8\"\n \"93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15\"\n \"b0\"\n ),\n )\n ],\n psk_key_exchange_modes=[tls.PskKeyExchangeMode.PSK_DHE_KE],\n signature_algorithms=[\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_\n===========changed ref 2===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_client_hello(self):\n # offset: 1\n SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n supported_groups=[tls.Group.SECP256R1],\n supported_versions=[\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n other_extensions=[\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n \n buf = Buffer(1000)\n push_client_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_client_hello.bin\"))\n \n===========changed ref 3===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_client_hello_with_sni(self):\n buf = Buffer(data=load(\"tls_client_hello_with_sni.bin\"))\n hello = pull_client_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"987d8934140b0a42cc5545071f3f9f7f61963d7b6404eb674c8dbe513604346b\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"26b19bdd30dbf751015a3a16e13bd59002dfe420b799d2a5cd5e11b8fa7bcb66\"\n ),\n )\n self.assertEqual(\n hello.cipher_suites,\n [\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n )\n + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL])\n - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])\n \n # extensions\n self.assertEqual(hello.alpn_protocols, None)\n self.assertEqual(\n hello.key_share,\n [\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"04b62d70f907c814cd65d0f73b8b991f06b70c77153f548410a191d2b19764a2\"\n \"ecc06065a480efa9e1f10c8da6e737d5bfc04be3"}}},{"rowIdx":4127,"cells":{"path":{"kind":"string","value":"tests.test_tls/TlsTest.test_pull_server_hello_with_unknown_extension"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":"<10>: legacy_session_id=binascii.unhexlify(\n session_id=binascii.unhexlify(\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello_with_unknown_extension(self):\n <0> buf = Buffer(data=load(\"tls_server_hello_with_unknown_extension.bin\"))\n <1> hello = pull_server_hello(buf)\n <2> self.assertTrue(buf.eof())\n <3> \n <4> self.assertEqual(\n <5> hello,\n <6> ServerHello(\n <7> random=binascii.unhexlify(\n <8> \"ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280\"\n <9> ),\n<10> session_id=binascii.unhexlify(\n<11> \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n<12> ),\n<13> cipher_suite=tls.CipherSuite.AES_256_GCM_SHA384,\n<14> compression_method=tls.CompressionMethod.NULL,\n<15> key_share=(\n<16> tls.Group.SECP256R1,\n<17> binascii.unhexlify(\n<18> \"048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189\"\n<19> \"5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf\"\n<20> \"b2\"\n<21> ),\n<22> ),\n<23> supported_version=tls.TLS_VERSION_1_3,\n<24> other_extensions=[(12345, b\"foo\")],\n<25> ),\n<26> )\n<27> \n<28> # serialize\n<29> buf = Buffer(1000)\n<30> push_server_hello(buf, hello)\n<31> self.assertEqual(buf.data, load(\"tls_server_hello_with_unknown_extension.bin\"))"},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello(self):\n buf = Buffer(data=load(\"tls_server_hello.bin\"))\n hello = pull_server_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n )\n self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384)\n self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL)\n self.assertEqual(\n hello.key_share,\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189\"\n \"5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf\"\n \"b2\"\n ),\n ),\n )\n self.assertEqual(hello.pre_shared_key, None)\n self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3)\n \n===========changed ref 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello_with_psk(self):\n buf = Buffer(data=load(\"tls_server_hello_with_psk.bin\"))\n hello = pull_server_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"ccbaaf04fc1bd5143b2cc6b97520cf37d91470dbfc8127131a7bf0f941e3a137\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"9483e7e895d0f4cec17086b0849601c0632662cd764e828f2f892f4c4b7771b0\"\n ),\n )\n self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384)\n self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL)\n self.assertEqual(\n hello.key_share,\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"0485d7cecbebfc548fc657bf51b8e8da842a4056b164a27f7702ca318c16e488\"\n \"18b6409593b15c6649d6f459387a53128b164178adc840179aad01d36ce95d62\"\n \"76\"\n ),\n ),\n )\n self.assertEqual(hello.pre_shared_key, 0)\n self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3)\n \n # serialize\n buf = Buffer(1000)\n push_server_hello(buf, hello)\n self.assertEqual(buf.data,\n===========changed ref 2===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello_with_psk(self):\n # offset: 1\n buf = Buffer(1000)\n push_server_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_server_hello_with_psk.bin\"))\n \n===========changed ref 3===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_client_hello(self):\n hello = ClientHello(\n random=binascii.unhexlify(\n \"18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5\"\n ),\n + legacy_session_id=binascii.unhexlify(\n - session_id=binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n cipher_suites=[\n tls.CipherSuite.AES_256_GCM_SHA384,\n tls.CipherSuite.AES_128_GCM_SHA256,\n tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n ],\n + legacy_compression_methods=[tls.CompressionMethod.NULL],\n - compression_methods=[tls.CompressionMethod.NULL],\n key_share=[\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8\"\n \"93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15\"\n \"b0\"\n ),\n )\n ],\n psk_key_exchange_modes=[tls.PskKeyExchangeMode.PSK_DHE_KE],\n signature_algorithms=[\n tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_\n===========changed ref 4===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_client_hello(self):\n # offset: 1\n SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA256,\n tls.SignatureAlgorithm.RSA_PKCS1_SHA1,\n ],\n supported_groups=[tls.Group.SECP256R1],\n supported_versions=[\n tls.TLS_VERSION_1_3,\n tls.TLS_VERSION_1_3_DRAFT_28,\n tls.TLS_VERSION_1_3_DRAFT_27,\n tls.TLS_VERSION_1_3_DRAFT_26,\n ],\n other_extensions=[\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n CLIENT_QUIC_TRANSPORT_PARAMETERS,\n )\n ],\n )\n \n buf = Buffer(1000)\n push_client_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_client_hello.bin\"))\n "}}},{"rowIdx":4128,"cells":{"path":{"kind":"string","value":"tests.test_tls/TlsTest.test_push_server_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":" <4>: legacy_session_id=binascii.unhexlify(\n session_id=binascii.unhexlify(\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_server_hello(self):\n <0> hello = ServerHello(\n <1> random=binascii.unhexlify(\n <2> \"ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280\"\n <3> ),\n <4> session_id=binascii.unhexlify(\n <5> \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n <6> ),\n <7> cipher_suite=tls.CipherSuite.AES_256_GCM_SHA384,\n <8> compression_method=tls.CompressionMethod.NULL,\n <9> key_share=(\n<10> tls.Group.SECP256R1,\n<11> binascii.unhexlify(\n<12> \"048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189\"\n<13> \"5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf\"\n<14> \"b2\"\n<15> ),\n<16> ),\n<17> supported_version=tls.TLS_VERSION_1_3,\n<18> )\n<19> \n<20> buf = Buffer(1000)\n<21> push_server_hello(buf, hello)\n<22> self.assertEqual(buf.data, load(\"tls_server_hello.bin\"))\n<23> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello_with_unknown_extension(self):\n buf = Buffer(data=load(\"tls_server_hello_with_unknown_extension.bin\"))\n hello = pull_server_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello,\n ServerHello(\n random=binascii.unhexlify(\n \"ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280\"\n ),\n + legacy_session_id=binascii.unhexlify(\n - session_id=binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n cipher_suite=tls.CipherSuite.AES_256_GCM_SHA384,\n compression_method=tls.CompressionMethod.NULL,\n key_share=(\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189\"\n \"5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf\"\n \"b2\"\n ),\n ),\n supported_version=tls.TLS_VERSION_1_3,\n other_extensions=[(12345, b\"foo\")],\n ),\n )\n \n # serialize\n buf = Buffer(1000)\n push_server_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_server_hello_with_unknown_extension.bin\"))\n \n===========changed ref 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello(self):\n buf = Buffer(data=load(\"tls_server_hello.bin\"))\n hello = pull_server_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n )\n self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384)\n self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL)\n self.assertEqual(\n hello.key_share,\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189\"\n \"5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf\"\n \"b2\"\n ),\n ),\n )\n self.assertEqual(hello.pre_shared_key, None)\n self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3)\n \n===========changed ref 2===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello_with_psk(self):\n buf = Buffer(data=load(\"tls_server_hello_with_psk.bin\"))\n hello = pull_server_hello(buf)\n self.assertTrue(buf.eof())\n \n self.assertEqual(\n hello.random,\n binascii.unhexlify(\n \"ccbaaf04fc1bd5143b2cc6b97520cf37d91470dbfc8127131a7bf0f941e3a137\"\n ),\n )\n self.assertEqual(\n + hello.legacy_session_id,\n - hello.session_id,\n binascii.unhexlify(\n \"9483e7e895d0f4cec17086b0849601c0632662cd764e828f2f892f4c4b7771b0\"\n ),\n )\n self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384)\n self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL)\n self.assertEqual(\n hello.key_share,\n (\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"0485d7cecbebfc548fc657bf51b8e8da842a4056b164a27f7702ca318c16e488\"\n \"18b6409593b15c6649d6f459387a53128b164178adc840179aad01d36ce95d62\"\n \"76\"\n ),\n ),\n )\n self.assertEqual(hello.pre_shared_key, 0)\n self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3)\n \n # serialize\n buf = Buffer(1000)\n push_server_hello(buf, hello)\n self.assertEqual(buf.data,\n===========changed ref 3===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_pull_server_hello_with_psk(self):\n # offset: 1\n buf = Buffer(1000)\n push_server_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_server_hello_with_psk.bin\"))\n "}}},{"rowIdx":4129,"cells":{"path":{"kind":"string","value":"aioquic.tls/pull_client_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":" <3>: client_random = buf.pull_bytes(32)\n <6>: random=buf.pull_bytes(32),\n random=client_random,\n <7>: legacy_session_id=pull_opaque(buf, 1),\n session_id=pull_opaque(buf, 1),\n <9>: legacy_compression_methods=pull_list(buf, 1, buf.pull_uint8),\n compression_methods=pull_list(buf, 1, buf.pull_uint8),\n"},"main_code":{"kind":"string","value":" # module: aioquic.tls\n def pull_client_hello(buf: Buffer) -> ClientHello:\n <0> assert buf.pull_uint8() == HandshakeType.CLIENT_HELLO\n <1> with pull_block(buf, 3):\n <2> assert buf.pull_uint16() == TLS_VERSION_1_2\n <3> client_random = buf.pull_bytes(32)\n <4> \n <5> hello = ClientHello(\n <6> random=client_random,\n <7> session_id=pull_opaque(buf, 1),\n <8> cipher_suites=pull_list(buf, 2, buf.pull_uint16),\n <9> compression_methods=pull_list(buf, 1, buf.pull_uint8),\n<10> )\n<11> \n<12> # extensions\n<13> after_psk = False\n<14> \n<15> def pull_extension() -> None:\n<16> # pre_shared_key MUST be last\n<17> nonlocal after_psk\n<18> assert not after_psk\n<19> \n<20> extension_type = buf.pull_uint16()\n<21> extension_length = buf.pull_uint16()\n<22> if extension_type == ExtensionType.KEY_SHARE:\n<23> hello.key_share = pull_list(buf, 2, partial(pull_key_share, buf))\n<24> elif extension_type == ExtensionType.SUPPORTED_VERSIONS:\n<25> hello.supported_versions = pull_list(buf, 1, buf.pull_uint16)\n<26> elif extension_type == ExtensionType.SIGNATURE_ALGORITHMS:\n<27> hello.signature_algorithms = pull_list(buf, 2, buf.pull_uint16)\n<28> elif extension_type == ExtensionType.SUPPORTED_GROUPS:\n<29> hello.supported_groups = pull_list(buf, 2, buf.pull_uint16)\n<30> elif extension_type == ExtensionType.PSK_KEY_EXCHANGE_MODES:\n<31> hello.psk_key_exchange_modes = pull_list(buf, 1, buf.pull_uint8)\n<32> elif extension_type == ExtensionType.SERVER_NAME:\n<33> with pull_block(buf, 2):\n<34> assert buf.pull"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.tls\n def pull_client_hello(buf: Buffer) -> ClientHello:\n # offset: 1\n hello.server_name = pull_opaque(buf, 2).decode(\"ascii\")\n elif extension_type == ExtensionType.ALPN:\n hello.alpn_protocols = pull_list(\n buf, 2, partial(pull_alpn_protocol, buf)\n )\n elif extension_type == ExtensionType.EARLY_DATA:\n hello.early_data = True\n elif extension_type == ExtensionType.PRE_SHARED_KEY:\n hello.pre_shared_key = OfferedPsks(\n identities=pull_list(buf, 2, partial(pull_psk_identity, buf)),\n binders=pull_list(buf, 2, partial(pull_psk_binder, buf)),\n )\n after_psk = True\n else:\n hello.other_extensions.append(\n (extension_type, buf.pull_bytes(extension_length))\n )\n \n pull_list(buf, 2, pull_extension)\n \n return hello\n \n \n===========unchanged ref 0===========\n at: aioquic.tls\n TLS_VERSION_1_2 = 0x0303\n \n ExtensionType(x: Union[str, bytes, bytearray], base: int)\n ExtensionType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n HandshakeType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n HandshakeType(x: Union[str, bytes, bytearray], base: int)\n \n pull_block(buf: Buffer, capacity: int) -> Generator\n \n pull_list(buf: Buffer, capacity: int, func: Callable[[], T]) -> List[T]\n \n pull_opaque(buf: Buffer, capacity: int) -> bytes\n \n pull_key_share(buf: Buffer) -> KeyShareEntry\n \n pull_alpn_protocol(buf: Buffer) -> str\n \n pull_psk_identity(buf: Buffer) -> PskIdentity\n \n pull_psk_binder(buf: Buffer) -> bytes\n \n OfferedPsks(identities: List[PskIdentity], binders: List[bytes])\n \n ClientHello(random: bytes, legacy_session_id: bytes, cipher_suites: List[int], legacy_compression_methods: List[int], alpn_protocols: Optional[List[str]]=None, early_data: bool=False, key_share: Optional[List[KeyShareEntry]]=None, pre_shared_key: Optional[OfferedPsks]=None, psk_key_exchange_modes: Optional[List[int]]=None, server_name: Optional[str]=None, signature_algorithms: Optional[List[int]]=None, supported_groups: Optional[List[int]]=None, supported_versions: Optional[List[int]]=None, other_extensions: List[Extension]=field(default_factory=list))\n \n at: aioquic.tls.ClientHello\n random: bytes\n \n legacy_session_id: bytes\n \n cipher_suites: List[int]\n \n legacy_compression_methods: List[int]\n \n \n===========unchanged ref 1===========\n alpn_protocols: Optional[List[str]] = None\n \n early_data: bool = False\n \n key_share: Optional[List[KeyShareEntry]] = None\n \n pre_shared_key: Optional[OfferedPsks] = None\n \n psk_key_exchange_modes: Optional[List[int]] = None\n \n server_name: Optional[str] = None\n \n signature_algorithms: Optional[List[int]] = None\n \n supported_groups: Optional[List[int]] = None\n \n supported_versions: Optional[List[int]] = None\n \n other_extensions: List[Extension] = field(default_factory=list)\n \n at: aioquic.tls.OfferedPsks\n identities: List[PskIdentity]\n \n binders: List[bytes]\n \n at: functools\n partial(func: Callable[..., _T], *args: Any, **kwargs: Any)\n partial(func, *args, **keywords, /) -> function with partial application()\n \n \n===========changed ref 0===========\n # module: aioquic.tls\n @dataclass\n class ClientHello:\n random: bytes\n + legacy_session_id: bytes\n - session_id: bytes\n cipher_suites: List[int]\n + legacy_compression_methods: List[int]\n - compression_methods: List[int]\n \n # extensions\n alpn_protocols: Optional[List[str]] = None\n early_data: bool = False\n key_share: Optional[List[KeyShareEntry]] = None\n pre_shared_key: Optional[OfferedPsks] = None\n psk_key_exchange_modes: Optional[List[int]] = None\n server_name: Optional[str] = None\n signature_algorithms: Optional[List[int]] = None\n supported_groups: Optional[List[int]] = None\n supported_versions: Optional[List[int]] = None\n \n other_extensions: List[Extension] = field(default_factory=list)\n \n===========changed ref 1===========\n # module: tests.test_tls\n class TlsTest(TestCase):\n def test_push_server_hello(self):\n hello = ServerHello(\n random=binascii.unhexlify(\n \"ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280\"\n ),\n + legacy_session_id=binascii.unhexlify(\n - session_id=binascii.unhexlify(\n \"9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235\"\n ),\n cipher_suite=tls.CipherSuite.AES_256_GCM_SHA384,\n compression_method=tls.CompressionMethod.NULL,\n key_share=(\n tls.Group.SECP256R1,\n binascii.unhexlify(\n \"048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189\"\n \"5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf\"\n \"b2\"\n ),\n ),\n supported_version=tls.TLS_VERSION_1_3,\n )\n \n buf = Buffer(1000)\n push_server_hello(buf, hello)\n self.assertEqual(buf.data, load(\"tls_server_hello.bin\"))\n "}}},{"rowIdx":4130,"cells":{"path":{"kind":"string","value":"aioquic.tls/push_client_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":" <4>: push_opaque(buf, 1, hello.legacy_session_id)\n push_opaque(buf, 1, hello.session_id)\n <6>: push_list(buf, 1, buf.push_uint8, hello.legacy_compression_methods)\n push_list(buf, 1, buf.push_uint8, hello.compression_methods)\n"},"main_code":{"kind":"string","value":" # module: aioquic.tls\n def push_client_hello(buf: Buffer, hello: ClientHello) -> None:\n <0> buf.push_uint8(HandshakeType.CLIENT_HELLO)\n <1> with push_block(buf, 3):\n <2> buf.push_uint16(TLS_VERSION_1_2)\n <3> buf.push_bytes(hello.random)\n <4> push_opaque(buf, 1, hello.session_id)\n <5> push_list(buf, 2, buf.push_uint16, hello.cipher_suites)\n <6> push_list(buf, 1, buf.push_uint8, hello.compression_methods)\n <7> \n <8> # extensions\n <9> with push_block(buf, 2):\n<10> with push_extension(buf, ExtensionType.KEY_SHARE):\n<11> push_list(buf, 2, partial(push_key_share, buf), hello.key_share)\n<12> \n<13> with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS):\n<14> push_list(buf, 1, buf.push_uint16, hello.supported_versions)\n<15> \n<16> with push_extension(buf, ExtensionType.SIGNATURE_ALGORITHMS):\n<17> push_list(buf, 2, buf.push_uint16, hello.signature_algorithms)\n<18> \n<19> with push_extension(buf, ExtensionType.SUPPORTED_GROUPS):\n<20> push_list(buf, 2, buf.push_uint16, hello.supported_groups)\n<21> \n<22> if hello.psk_key_exchange_modes is not None:\n<23> with push_extension(buf, ExtensionType.PSK_KEY_EXCHANGE_MODES):\n<24> push_list(buf, 1, buf.push_uint8, hello.psk_key_exchange_modes)\n<25> \n<26> if hello.server_name is not None:\n<27> with push_extension(buf, ExtensionType.SERVER_NAME):\n<28> with push_block(buf, 2):\n<29> buf.push_uint8(0)\n<30> push_opaque(buf, 2, hello.server_name.encode(\"ascii\"))\n<31> \n<32> if"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.tls\n def push_client_hello(buf: Buffer, hello: ClientHello) -> None:\n # offset: 1\n with push_extension(buf, ExtensionType.ALPN):\n push_list(\n buf, 2, partial(push_alpn_protocol, buf), hello.alpn_protocols\n )\n \n for extension_type, extension_value in hello.other_extensions:\n with push_extension(buf, extension_type):\n buf.push_bytes(extension_value)\n \n if hello.early_data:\n with push_extension(buf, ExtensionType.EARLY_DATA):\n pass\n \n # pre_shared_key MUST be last\n if hello.pre_shared_key is not None:\n with push_extension(buf, ExtensionType.PRE_SHARED_KEY):\n push_list(\n buf,\n 2,\n partial(push_psk_identity, buf),\n hello.pre_shared_key.identities,\n )\n push_list(\n buf,\n 2,\n partial(push_psk_binder, buf),\n hello.pre_shared_key.binders,\n )\n \n \n===========unchanged ref 0===========\n at: aioquic.tls\n TLS_VERSION_1_2 = 0x0303\n \n ExtensionType(x: Union[str, bytes, bytearray], base: int)\n ExtensionType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n HandshakeType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n HandshakeType(x: Union[str, bytes, bytearray], base: int)\n \n push_block(buf: Buffer, capacity: int) -> Generator\n \n push_list(buf: Buffer, capacity: int, func: Callable[[T], None], values: Sequence[T]) -> None\n \n push_opaque(buf: Buffer, capacity: int, value: bytes) -> None\n \n push_extension(buf: Buffer, extension_type: int) -> Generator\n \n push_key_share(buf: Buffer, value: KeyShareEntry) -> None\n \n push_alpn_protocol(buf: Buffer, protocol: str) -> None\n \n push_psk_identity(buf: Buffer, entry: PskIdentity) -> None\n \n push_psk_binder(buf: Buffer, binder: bytes) -> None\n \n at: aioquic.tls.ClientHello\n random: bytes\n \n legacy_session_id: bytes\n \n cipher_suites: List[int]\n \n legacy_compression_methods: List[int]\n \n alpn_protocols: Optional[List[str]] = None\n \n early_data: bool = False\n \n key_share: Optional[List[KeyShareEntry]] = None\n \n pre_shared_key: Optional[OfferedPsks] = None\n \n psk_key_exchange_modes: Optional[List[int]] = None\n \n server_name: Optional[str] = None\n \n signature_algorithms: Optional[List[int]] = None\n \n supported_groups: Optional[List[int]] = None\n \n supported_versions: Optional[List[int]] = None\n \n other_extensions: List[Extension] = field(default_factory=list)\n \n \n===========unchanged ref 1===========\n at: aioquic.tls.OfferedPsks\n identities: List[PskIdentity]\n \n binders: List[bytes]\n \n at: functools\n partial(func: Callable[..., _T], *args: Any, **kwargs: Any)\n partial(func, *args, **keywords, /) -> function with partial application()\n \n \n===========changed ref 0===========\n # module: aioquic.tls\n @dataclass\n class ClientHello:\n random: bytes\n + legacy_session_id: bytes\n - session_id: bytes\n cipher_suites: List[int]\n + legacy_compression_methods: List[int]\n - compression_methods: List[int]\n \n # extensions\n alpn_protocols: Optional[List[str]] = None\n early_data: bool = False\n key_share: Optional[List[KeyShareEntry]] = None\n pre_shared_key: Optional[OfferedPsks] = None\n psk_key_exchange_modes: Optional[List[int]] = None\n server_name: Optional[str] = None\n signature_algorithms: Optional[List[int]] = None\n supported_groups: Optional[List[int]] = None\n supported_versions: Optional[List[int]] = None\n \n other_extensions: List[Extension] = field(default_factory=list)\n \n===========changed ref 1===========\n # module: aioquic.tls\n def pull_client_hello(buf: Buffer) -> ClientHello:\n assert buf.pull_uint8() == HandshakeType.CLIENT_HELLO\n with pull_block(buf, 3):\n assert buf.pull_uint16() == TLS_VERSION_1_2\n - client_random = buf.pull_bytes(32)\n \n hello = ClientHello(\n + random=buf.pull_bytes(32),\n - random=client_random,\n + legacy_session_id=pull_opaque(buf, 1),\n - session_id=pull_opaque(buf, 1),\n cipher_suites=pull_list(buf, 2, buf.pull_uint16),\n + legacy_compression_methods=pull_list(buf, 1, buf.pull_uint8),\n - compression_methods=pull_list(buf, 1, buf.pull_uint8),\n )\n \n # extensions\n after_psk = False\n \n def pull_extension() -> None:\n # pre_shared_key MUST be last\n nonlocal after_psk\n assert not after_psk\n \n extension_type = buf.pull_uint16()\n extension_length = buf.pull_uint16()\n if extension_type == ExtensionType.KEY_SHARE:\n hello.key_share = pull_list(buf, 2, partial(pull_key_share, buf))\n elif extension_type == ExtensionType.SUPPORTED_VERSIONS:\n hello.supported_versions = pull_list(buf, 1, buf.pull_uint16)\n elif extension_type == ExtensionType.SIGNATURE_ALGORITHMS:\n hello.signature_algorithms = pull_list(buf, 2, buf.pull_uint16)\n elif extension_type == ExtensionType.SUPPORTED_GROUPS:\n hello.supported_groups = pull_list(buf, 2, buf.pull_uint16)\n elif extension_type == ExtensionType.PSK_KEY_EXCHANGE_MODES:\n hello.psk_key_exchange_modes = pull_list(buf, 1, buf.pull_uint8)\n elif extension_type ==\n===========changed ref 2===========\n # module: aioquic.tls\n def pull_client_hello(buf: Buffer) -> ClientHello:\n # offset: 1\n k_key_exchange_modes = pull_list(buf, 1, buf.pull_uint8)\n elif extension_type == ExtensionType.SERVER_NAME:\n with pull_block(buf, 2):\n assert buf.pull_uint8() == 0\n hello.server_name = pull_opaque(buf, 2).decode(\"ascii\")\n elif extension_type == ExtensionType.ALPN:\n hello.alpn_protocols = pull_list(\n buf, 2, partial(pull_alpn_protocol, buf)\n )\n elif extension_type == ExtensionType.EARLY_DATA:\n hello.early_data = True\n elif extension_type == ExtensionType.PRE_SHARED_KEY:\n hello.pre_shared_key = OfferedPsks(\n identities=pull_list(buf, 2, partial(pull_psk_identity, buf)),\n binders=pull_list(buf, 2, partial(pull_psk_binder, buf)),\n )\n after_psk = True\n else:\n hello.other_extensions.append(\n (extension_type, buf.pull_bytes(extension_length))\n )\n \n pull_list(buf, 2, pull_extension)\n \n return hello\n "}}},{"rowIdx":4131,"cells":{"path":{"kind":"string","value":"aioquic.tls/pull_server_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":" <3>: server_random = buf.pull_bytes(32)\n <6>: random=buf.pull_bytes(32),\n random=server_random,\n <7>: legacy_session_id=pull_opaque(buf, 1),\n session_id=pull_opaque(buf, 1),\n"},"main_code":{"kind":"string","value":" # module: aioquic.tls\n def pull_server_hello(buf: Buffer) -> ServerHello:\n <0> assert buf.pull_uint8() == HandshakeType.SERVER_HELLO\n <1> with pull_block(buf, 3):\n <2> assert buf.pull_uint16() == TLS_VERSION_1_2\n <3> server_random = buf.pull_bytes(32)\n <4> \n <5> hello = ServerHello(\n <6> random=server_random,\n <7> session_id=pull_opaque(buf, 1),\n <8> cipher_suite=buf.pull_uint16(),\n <9> compression_method=buf.pull_uint8(),\n<10> )\n<11> \n<12> # extensions\n<13> def pull_extension() -> None:\n<14> extension_type = buf.pull_uint16()\n<15> extension_length = buf.pull_uint16()\n<16> if extension_type == ExtensionType.SUPPORTED_VERSIONS:\n<17> hello.supported_version = buf.pull_uint16()\n<18> elif extension_type == ExtensionType.KEY_SHARE:\n<19> hello.key_share = pull_key_share(buf)\n<20> elif extension_type == ExtensionType.PRE_SHARED_KEY:\n<21> hello.pre_shared_key = buf.pull_uint16()\n<22> else:\n<23> hello.other_extensions.append(\n<24> (extension_type, buf.pull_bytes(extension_length))\n<25> )\n<26> \n<27> pull_list(buf, 2, pull_extension)\n<28> \n<29> return hello\n<30> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.tls\n TLS_VERSION_1_2 = 0x0303\n \n ExtensionType(x: Union[str, bytes, bytearray], base: int)\n ExtensionType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n HandshakeType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n HandshakeType(x: Union[str, bytes, bytearray], base: int)\n \n pull_block(buf: Buffer, capacity: int) -> Generator\n \n pull_list(buf: Buffer, capacity: int, func: Callable[[], T]) -> List[T]\n \n pull_opaque(buf: Buffer, capacity: int) -> bytes\n \n pull_key_share(buf: Buffer) -> KeyShareEntry\n \n ServerHello(random: bytes, legacy_session_id: bytes, cipher_suite: int, compression_method: int, key_share: Optional[KeyShareEntry]=None, pre_shared_key: Optional[int]=None, supported_version: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list))\n \n at: aioquic.tls.ServerHello\n random: bytes\n \n legacy_session_id: bytes\n \n cipher_suite: int\n \n compression_method: int\n \n key_share: Optional[KeyShareEntry] = None\n \n pre_shared_key: Optional[int] = None\n \n supported_version: Optional[int] = None\n \n other_extensions: List[Tuple[int, bytes]] = field(default_factory=list)\n \n \n===========changed ref 0===========\n # module: aioquic.tls\n @dataclass\n class ServerHello:\n random: bytes\n + legacy_session_id: bytes\n - session_id: bytes\n cipher_suite: int\n compression_method: int\n \n # extensions\n key_share: Optional[KeyShareEntry] = None\n pre_shared_key: Optional[int] = None\n supported_version: Optional[int] = None\n other_extensions: List[Tuple[int, bytes]] = field(default_factory=list)\n \n===========changed ref 1===========\n # module: aioquic.tls\n @dataclass\n class ClientHello:\n random: bytes\n + legacy_session_id: bytes\n - session_id: bytes\n cipher_suites: List[int]\n + legacy_compression_methods: List[int]\n - compression_methods: List[int]\n \n # extensions\n alpn_protocols: Optional[List[str]] = None\n early_data: bool = False\n key_share: Optional[List[KeyShareEntry]] = None\n pre_shared_key: Optional[OfferedPsks] = None\n psk_key_exchange_modes: Optional[List[int]] = None\n server_name: Optional[str] = None\n signature_algorithms: Optional[List[int]] = None\n supported_groups: Optional[List[int]] = None\n supported_versions: Optional[List[int]] = None\n \n other_extensions: List[Extension] = field(default_factory=list)\n \n===========changed ref 2===========\n # module: aioquic.tls\n def push_client_hello(buf: Buffer, hello: ClientHello) -> None:\n buf.push_uint8(HandshakeType.CLIENT_HELLO)\n with push_block(buf, 3):\n buf.push_uint16(TLS_VERSION_1_2)\n buf.push_bytes(hello.random)\n + push_opaque(buf, 1, hello.legacy_session_id)\n - push_opaque(buf, 1, hello.session_id)\n push_list(buf, 2, buf.push_uint16, hello.cipher_suites)\n + push_list(buf, 1, buf.push_uint8, hello.legacy_compression_methods)\n - push_list(buf, 1, buf.push_uint8, hello.compression_methods)\n \n # extensions\n with push_block(buf, 2):\n with push_extension(buf, ExtensionType.KEY_SHARE):\n push_list(buf, 2, partial(push_key_share, buf), hello.key_share)\n \n with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS):\n push_list(buf, 1, buf.push_uint16, hello.supported_versions)\n \n with push_extension(buf, ExtensionType.SIGNATURE_ALGORITHMS):\n push_list(buf, 2, buf.push_uint16, hello.signature_algorithms)\n \n with push_extension(buf, ExtensionType.SUPPORTED_GROUPS):\n push_list(buf, 2, buf.push_uint16, hello.supported_groups)\n \n if hello.psk_key_exchange_modes is not None:\n with push_extension(buf, ExtensionType.PSK_KEY_EXCHANGE_MODES):\n push_list(buf, 1, buf.push_uint8, hello.psk_key_exchange_modes)\n \n if hello.server_name is not None:\n with push_extension(buf, ExtensionType.SERVER_NAME):\n with push_block(buf, 2):\n buf.push_uint8(0)\n push_opaque(buf, 2,\n===========changed ref 3===========\n # module: aioquic.tls\n def push_client_hello(buf: Buffer, hello: ClientHello) -> None:\n # offset: 1\n push_block(buf, 2):\n buf.push_uint8(0)\n push_opaque(buf, 2, hello.server_name.encode(\"ascii\"))\n \n if hello.alpn_protocols is not None:\n with push_extension(buf, ExtensionType.ALPN):\n push_list(\n buf, 2, partial(push_alpn_protocol, buf), hello.alpn_protocols\n )\n \n for extension_type, extension_value in hello.other_extensions:\n with push_extension(buf, extension_type):\n buf.push_bytes(extension_value)\n \n if hello.early_data:\n with push_extension(buf, ExtensionType.EARLY_DATA):\n pass\n \n # pre_shared_key MUST be last\n if hello.pre_shared_key is not None:\n with push_extension(buf, ExtensionType.PRE_SHARED_KEY):\n push_list(\n buf,\n 2,\n partial(push_psk_identity, buf),\n hello.pre_shared_key.identities,\n )\n push_list(\n buf,\n 2,\n partial(push_psk_binder, buf),\n hello.pre_shared_key.binders,\n )\n "}}},{"rowIdx":4132,"cells":{"path":{"kind":"string","value":"aioquic.tls/push_server_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":" <5>: push_opaque(buf, 1, hello.legacy_session_id)\n push_opaque(buf, 1, hello.session_id)\n"},"main_code":{"kind":"string","value":" # module: aioquic.tls\n def push_server_hello(buf: Buffer, hello: ServerHello) -> None:\n <0> buf.push_uint8(HandshakeType.SERVER_HELLO)\n <1> with push_block(buf, 3):\n <2> buf.push_uint16(TLS_VERSION_1_2)\n <3> buf.push_bytes(hello.random)\n <4> \n <5> push_opaque(buf, 1, hello.session_id)\n <6> buf.push_uint16(hello.cipher_suite)\n <7> buf.push_uint8(hello.compression_method)\n <8> \n <9> # extensions\n<10> with push_block(buf, 2):\n<11> if hello.supported_version is not None:\n<12> with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS):\n<13> buf.push_uint16(hello.supported_version)\n<14> \n<15> if hello.key_share is not None:\n<16> with push_extension(buf, ExtensionType.KEY_SHARE):\n<17> push_key_share(buf, hello.key_share)\n<18> \n<19> if hello.pre_shared_key is not None:\n<20> with push_extension(buf, ExtensionType.PRE_SHARED_KEY):\n<21> buf.push_uint16(hello.pre_shared_key)\n<22> \n<23> for extension_type, extension_value in hello.other_extensions:\n<24> with push_extension(buf, extension_type):\n<25> buf.push_bytes(extension_value)\n<26> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.tls\n TLS_VERSION_1_2 = 0x0303\n \n ExtensionType(x: Union[str, bytes, bytearray], base: int)\n ExtensionType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n push_block(buf: Buffer, capacity: int) -> Generator\n \n push_opaque(buf: Buffer, capacity: int, value: bytes) -> None\n \n push_extension(buf: Buffer, extension_type: int) -> Generator\n \n push_key_share(buf: Buffer, value: KeyShareEntry) -> None\n \n at: aioquic.tls.ServerHello\n random: bytes\n \n legacy_session_id: bytes\n \n cipher_suite: int\n \n compression_method: int\n \n key_share: Optional[KeyShareEntry] = None\n \n pre_shared_key: Optional[int] = None\n \n supported_version: Optional[int] = None\n \n other_extensions: List[Tuple[int, bytes]] = field(default_factory=list)\n \n \n===========changed ref 0===========\n # module: aioquic.tls\n @dataclass\n class ServerHello:\n random: bytes\n + legacy_session_id: bytes\n - session_id: bytes\n cipher_suite: int\n compression_method: int\n \n # extensions\n key_share: Optional[KeyShareEntry] = None\n pre_shared_key: Optional[int] = None\n supported_version: Optional[int] = None\n other_extensions: List[Tuple[int, bytes]] = field(default_factory=list)\n \n===========changed ref 1===========\n # module: aioquic.tls\n def pull_server_hello(buf: Buffer) -> ServerHello:\n assert buf.pull_uint8() == HandshakeType.SERVER_HELLO\n with pull_block(buf, 3):\n assert buf.pull_uint16() == TLS_VERSION_1_2\n - server_random = buf.pull_bytes(32)\n \n hello = ServerHello(\n + random=buf.pull_bytes(32),\n - random=server_random,\n + legacy_session_id=pull_opaque(buf, 1),\n - session_id=pull_opaque(buf, 1),\n cipher_suite=buf.pull_uint16(),\n compression_method=buf.pull_uint8(),\n )\n \n # extensions\n def pull_extension() -> None:\n extension_type = buf.pull_uint16()\n extension_length = buf.pull_uint16()\n if extension_type == ExtensionType.SUPPORTED_VERSIONS:\n hello.supported_version = buf.pull_uint16()\n elif extension_type == ExtensionType.KEY_SHARE:\n hello.key_share = pull_key_share(buf)\n elif extension_type == ExtensionType.PRE_SHARED_KEY:\n hello.pre_shared_key = buf.pull_uint16()\n else:\n hello.other_extensions.append(\n (extension_type, buf.pull_bytes(extension_length))\n )\n \n pull_list(buf, 2, pull_extension)\n \n return hello\n \n===========changed ref 2===========\n # module: aioquic.tls\n @dataclass\n class ClientHello:\n random: bytes\n + legacy_session_id: bytes\n - session_id: bytes\n cipher_suites: List[int]\n + legacy_compression_methods: List[int]\n - compression_methods: List[int]\n \n # extensions\n alpn_protocols: Optional[List[str]] = None\n early_data: bool = False\n key_share: Optional[List[KeyShareEntry]] = None\n pre_shared_key: Optional[OfferedPsks] = None\n psk_key_exchange_modes: Optional[List[int]] = None\n server_name: Optional[str] = None\n signature_algorithms: Optional[List[int]] = None\n supported_groups: Optional[List[int]] = None\n supported_versions: Optional[List[int]] = None\n \n other_extensions: List[Extension] = field(default_factory=list)\n \n===========changed ref 3===========\n # module: aioquic.tls\n def push_client_hello(buf: Buffer, hello: ClientHello) -> None:\n buf.push_uint8(HandshakeType.CLIENT_HELLO)\n with push_block(buf, 3):\n buf.push_uint16(TLS_VERSION_1_2)\n buf.push_bytes(hello.random)\n + push_opaque(buf, 1, hello.legacy_session_id)\n - push_opaque(buf, 1, hello.session_id)\n push_list(buf, 2, buf.push_uint16, hello.cipher_suites)\n + push_list(buf, 1, buf.push_uint8, hello.legacy_compression_methods)\n - push_list(buf, 1, buf.push_uint8, hello.compression_methods)\n \n # extensions\n with push_block(buf, 2):\n with push_extension(buf, ExtensionType.KEY_SHARE):\n push_list(buf, 2, partial(push_key_share, buf), hello.key_share)\n \n with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS):\n push_list(buf, 1, buf.push_uint16, hello.supported_versions)\n \n with push_extension(buf, ExtensionType.SIGNATURE_ALGORITHMS):\n push_list(buf, 2, buf.push_uint16, hello.signature_algorithms)\n \n with push_extension(buf, ExtensionType.SUPPORTED_GROUPS):\n push_list(buf, 2, buf.push_uint16, hello.supported_groups)\n \n if hello.psk_key_exchange_modes is not None:\n with push_extension(buf, ExtensionType.PSK_KEY_EXCHANGE_MODES):\n push_list(buf, 1, buf.push_uint8, hello.psk_key_exchange_modes)\n \n if hello.server_name is not None:\n with push_extension(buf, ExtensionType.SERVER_NAME):\n with push_block(buf, 2):\n buf.push_uint8(0)\n push_opaque(buf, 2,\n===========changed ref 4===========\n # module: aioquic.tls\n def push_client_hello(buf: Buffer, hello: ClientHello) -> None:\n # offset: 1\n push_block(buf, 2):\n buf.push_uint8(0)\n push_opaque(buf, 2, hello.server_name.encode(\"ascii\"))\n \n if hello.alpn_protocols is not None:\n with push_extension(buf, ExtensionType.ALPN):\n push_list(\n buf, 2, partial(push_alpn_protocol, buf), hello.alpn_protocols\n )\n \n for extension_type, extension_value in hello.other_extensions:\n with push_extension(buf, extension_type):\n buf.push_bytes(extension_value)\n \n if hello.early_data:\n with push_extension(buf, ExtensionType.EARLY_DATA):\n pass\n \n # pre_shared_key MUST be last\n if hello.pre_shared_key is not None:\n with push_extension(buf, ExtensionType.PRE_SHARED_KEY):\n push_list(\n buf,\n 2,\n partial(push_psk_identity, buf),\n hello.pre_shared_key.identities,\n )\n push_list(\n buf,\n 2,\n partial(push_psk_binder, buf),\n hello.pre_shared_key.binders,\n )\n "}}},{"rowIdx":4133,"cells":{"path":{"kind":"string","value":"aioquic.tls/Context.__init__"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":""},"main_code":{"kind":"string","value":" \n is_client: bool,\n alpn_protocols: Optional[List[str]] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n <0> # configuration\n <1> self._alpn_protocols = alpn_protocols\n <2> self._cadata = cadata\n <3> self._cafile = cafile\n <4> self._capath = capath\n <5> self.certificate: Optional[x509.Certificate] = None\n <6> self.certificate_chain: List[x509.Certificate] = []\n <7> self.certificate_private_key: Optional[\n <8> Union[dsa.DSAPrivateKey, ec.EllipticCurvePrivateKey, rsa.RSAPrivateKey]\n <9> ] = None\n<10> self.handshake_extensions: List[Extension] = []\n<11> self._max_early_data = max_early_data\n<12> self.session_ticket: Optional[SessionTicket] = None\n<13> self._server_name = server_name\n<14> if verify_mode is not None:\n<15> self._verify_mode = verify_mode\n<16> else:\n<17> self._verify_mode = ssl.CERT_REQUIRED if is_client else ssl.CERT_NONE\n<18> \n<19> # callbacks\n<20> self.alpn_cb: Optional[AlpnHandler] = None\n<21> self.get_session_ticket_cb: Optional[SessionTicketFetcher] = None\n<22> self.new_session_ticket_cb: Optional[SessionTicketHandler] = None\n<23> self.update_traffic_key_cb: Callable[\n<24> [Direction, Epoch, CipherSuite, bytes], None\n<25> ] = lambda d, e, c, s: None\n<26> \n<27> # supported parameters\n<28> self._cipher_suites = [\n<29> CipherSuite.AES_256_GCM_"},"context":{"kind":"string","value":"===========below chunk 0===========\n : bool,\n alpn_protocols: Optional[List[str]] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n # offset: 1\n CipherSuite.AES_128_GCM_SHA256,\n CipherSuite.CHACHA20_POLY1305_SHA256,\n ]\n self._compression_methods: List[int] = [CompressionMethod.NULL]\n self._psk_key_exchange_modes: List[int] = [PskKeyExchangeMode.PSK_DHE_KE]\n self._signature_algorithms: List[int] = [\n SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n SignatureAlgorithm.RSA_PKCS1_SHA256,\n SignatureAlgorithm.RSA_PKCS1_SHA1,\n ]\n self._supported_groups = [Group.SECP256R1]\n if default_backend().x25519_supported():\n self._supported_groups.append(Group.X25519)\n if default_backend().x448_supported():\n self._supported_groups.append(Group.X448)\n self._supported_versions = [TLS_VERSION_1_3]\n \n # state\n self.alpn_negotiated: Optional[str] = None\n self.early_data_accepted = False\n self.key_schedule: Optional[KeySchedule] = None\n self.received_extensions: Optional[List[Extension]] = None\n self._key_schedule_psk: Optional[KeySchedule] = None\n self._key_schedule_proxy: Optional[KeyScheduleProxy] = None\n self._new_session_ticket: Optional[NewSessionTicket] = None\n self._peer_certificate: Optional[\n===========below chunk 1===========\n : bool,\n alpn_protocols: Optional[List[str]] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n # offset: 2\n = None\n self._new_session_ticket: Optional[NewSessionTicket] = None\n self._peer_certificate: Optional[x509.Certificate] = None\n self._peer_certificate_chain: List[x509.Certificate] = []\n self._receive_buffer = b\"\"\n self._session_resumed = False\n self._enc_key: Optional[bytes] = None\n self._dec_key: Optional[bytes] = None\n self.__logger = logger\n \n self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None\n self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None\n self._x448_private_key: Optional[x448.X448PrivateKey] = None\n \n if is_client:\n self.client_random = os.urandom(32)\n self.session_id = os.urandom(32)\n self.state = State.CLIENT_HANDSHAKE_START\n else:\n self.client_random = None\n self.session_id = None\n self.state = State.SERVER_EXPECT_CLIENT_HELLO\n \n \n===========unchanged ref 0===========\n at: aioquic.tls\n TLS_VERSION_1_3 = 0x0304\n \n Direction()\n \n Epoch()\n \n State()\n \n CipherSuite(x: Union[str, bytes, bytearray], base: int)\n CipherSuite(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n CompressionMethod(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n CompressionMethod(x: Union[str, bytes, bytearray], base: int)\n \n Group(x: Union[str, bytes, bytearray], base: int)\n Group(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n PskKeyExchangeMode(x: Union[str, bytes, bytearray], base: int)\n PskKeyExchangeMode(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n SignatureAlgorithm(x: Union[str, bytes, bytearray], base: int)\n SignatureAlgorithm(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n Extension = Tuple[int, bytes]\n \n NewSessionTicket(ticket_lifetime: int=0, ticket_age_add: int=0, ticket_nonce: bytes=b\"\", ticket: bytes=b\"\", max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list))\n \n KeySchedule(cipher_suite: CipherSuite)\n \n KeyScheduleProxy(cipher_suites: List[CipherSuite])\n \n SessionTicket(age_add: int, cipher_suite: CipherSuite, not_valid_after: datetime.datetime, not_valid_before: datetime.datetime, resumption_secret: bytes, server_name: str, ticket: bytes, max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list))\n \n AlpnHandler = Callable[[str], None]\n \n \n===========unchanged ref 1===========\n SessionTicketFetcher = Callable[[bytes], Optional[SessionTicket]]\n \n SessionTicketHandler = Callable[[SessionTicket], None]\n \n at: aioquic.tls.Context._client_handle_certificate\n self._peer_certificate = x509.load_der_x509_certificate(\n certificate.certificates[0][0], backend=default_backend()\n )\n \n self._peer_certificate_chain = [\n x509.load_der_x509_certificate(\n certificate.certificates[i][0], backend=default_backend()\n )\n for i in range(1, len(certificate.certificates))\n ]\n \n at: aioquic.tls.Context._client_handle_encrypted_extensions\n self.alpn_negotiated = encrypted_extensions.alpn_protocol\n \n self.early_data_accepted = encrypted_extensions.early_data\n \n self.received_extensions = encrypted_extensions.other_extensions\n \n at: aioquic.tls.Context._client_handle_finished\n self._enc_key = next_enc_key\n \n at: aioquic.tls.Context._client_handle_hello\n self.key_schedule = self._key_schedule_psk\n self.key_schedule = self._key_schedule_proxy.select(cipher_suite)\n \n self._session_resumed = True\n \n self._key_schedule_psk = None\n \n self._key_schedule_proxy = None\n \n at: aioquic.tls.Context._client_send_hello\n self._ec_private_key = ec.generate_private_key(\n GROUP_TO_CURVE[Group.SECP256R1](), default_backend()\n )\n \n self._x25519_private_key = x25519.X25519PrivateKey.generate()\n \n self._x448_private_key = x448.X448PrivateKey.generate()\n \n self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite)\n \n self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites)\n \n "}}},{"rowIdx":4134,"cells":{"path":{"kind":"string","value":"aioquic.tls/Context._client_send_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":"<28>: legacy_session_id=self.legacy_session_id,\n session_id=self.session_id,\n<30>: legacy_compression_methods=self._legacy_compression_methods,\n compression_methods=self._compression_methods,\n"},"main_code":{"kind":"string","value":" # module: aioquic.tls\n class Context:\n def _client_send_hello(self, output_buf: Buffer) -> None:\n <0> key_share: List[KeyShareEntry] = []\n <1> supported_groups: List[int] = []\n <2> \n <3> for group in self._supported_groups:\n <4> if group == Group.SECP256R1:\n <5> self._ec_private_key = ec.generate_private_key(\n <6> GROUP_TO_CURVE[Group.SECP256R1](), default_backend()\n <7> )\n <8> key_share.append(encode_public_key(self._ec_private_key.public_key()))\n <9> supported_groups.append(Group.SECP256R1)\n<10> elif group == Group.X25519:\n<11> self._x25519_private_key = x25519.X25519PrivateKey.generate()\n<12> key_share.append(\n<13> encode_public_key(self._x25519_private_key.public_key())\n<14> )\n<15> supported_groups.append(Group.X25519)\n<16> elif group == Group.X448:\n<17> self._x448_private_key = x448.X448PrivateKey.generate()\n<18> key_share.append(encode_public_key(self._x448_private_key.public_key()))\n<19> supported_groups.append(Group.X448)\n<20> elif group == Group.GREASE:\n<21> key_share.append((Group.GREASE, b\"\\x00\"))\n<22> supported_groups.append(Group.GREASE)\n<23> \n<24> assert len(key_share), \"no key share entries\"\n<25> \n<26> hello = ClientHello(\n<27> random=self.client_random,\n<28> session_id=self.session_id,\n<29> cipher_suites=[int(x) for x in self._cipher_suites],\n<30> compression_methods=self._compression_methods,\n<31> alpn_protocols=self._alpn_protocols,\n<32> key_share=key_share,\n<33> psk_key_"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.tls\n class Context:\n def _client_send_hello(self, output_buf: Buffer) -> None:\n # offset: 1\n if (self.session_ticket or self.new_session_ticket_cb is not None)\n else None,\n server_name=self._server_name,\n signature_algorithms=self._signature_algorithms,\n supported_groups=supported_groups,\n supported_versions=self._supported_versions,\n other_extensions=self.handshake_extensions,\n )\n \n # PSK\n if self.session_ticket and self.session_ticket.is_valid:\n self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite)\n self._key_schedule_psk.extract(self.session_ticket.resumption_secret)\n binder_key = self._key_schedule_psk.derive_secret(b\"res binder\")\n binder_length = self._key_schedule_psk.algorithm.digest_size\n \n # update hello\n if self.session_ticket.max_early_data_size is not None:\n hello.early_data = True\n hello.pre_shared_key = OfferedPsks(\n identities=[\n (self.session_ticket.ticket, self.session_ticket.obfuscated_age)\n ],\n binders=[bytes(binder_length)],\n )\n \n # serialize hello without binder\n tmp_buf = Buffer(capacity=1024)\n push_client_hello(tmp_buf, hello)\n \n # calculate binder\n hash_offset = tmp_buf.tell() - binder_length - 3\n self._key_schedule_psk.update_hash(tmp_buf.data_slice(0, hash_offset))\n binder = self._key_schedule_psk.finished_verify_data(binder_key)\n hello.pre_shared_key.binders[0] = binder\n self._key_schedule_psk.update_hash(\n tmp_buf.data_slice(hash_offset, hash_offset\n===========below chunk 1===========\n # module: aioquic.tls\n class Context:\n def _client_send_hello(self, output_buf: Buffer) -> None:\n # offset: 2\n self._key_schedule_psk.update_hash(\n tmp_buf.data_slice(hash_offset, hash_offset + 3) + binder\n )\n \n # calculate early data key\n if hello.early_data:\n early_key = self._key_schedule_psk.derive_secret(b\"c e traffic\")\n self.update_traffic_key_cb(\n Direction.ENCRYPT,\n Epoch.ZERO_RTT,\n self._key_schedule_psk.cipher_suite,\n early_key,\n )\n \n self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites)\n self._key_schedule_proxy.extract(None)\n \n with push_message(self._key_schedule_proxy, output_buf):\n push_client_hello(output_buf, hello)\n \n self._set_state(State.CLIENT_EXPECT_SERVER_HELLO)\n \n \n===========unchanged ref 0===========\n at: aioquic.tls\n Direction()\n \n Epoch()\n \n State()\n \n Group(x: Union[str, bytes, bytearray], base: int)\n Group(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n OfferedPsks(identities: List[PskIdentity], binders: List[bytes])\n \n ClientHello(random: bytes, legacy_session_id: bytes, cipher_suites: List[int], legacy_compression_methods: List[int], alpn_protocols: Optional[List[str]]=None, early_data: bool=False, key_share: Optional[List[KeyShareEntry]]=None, pre_shared_key: Optional[OfferedPsks]=None, psk_key_exchange_modes: Optional[List[int]]=None, server_name: Optional[str]=None, signature_algorithms: Optional[List[int]]=None, supported_groups: Optional[List[int]]=None, supported_versions: Optional[List[int]]=None, other_extensions: List[Extension]=field(default_factory=list))\n \n push_client_hello(buf: Buffer, hello: ClientHello) -> None\n \n KeySchedule(cipher_suite: CipherSuite)\n \n KeyScheduleProxy(cipher_suites: List[CipherSuite])\n \n GROUP_TO_CURVE: Dict = {\n Group.SECP256R1: ec.SECP256R1,\n Group.SECP384R1: ec.SECP384R1,\n Group.SECP521R1: ec.SECP521R1,\n }\n \n encode_public_key(public_key: Union[\n ec.EllipticCurvePublicKey, x25519.X25519PublicKey, x448.X448PublicKey\n ]) -> KeyShareEntry\n \n push_message(key_schedule: Union[KeySchedule, KeyScheduleProxy], buf: Buffer) -> Generator\n \n at: aioquic.tls.ClientHello\n early_data: bool = False\n \n pre_shared_key: Optional[OfferedPsks] = None\n \n \n===========unchanged ref 1===========\n at: aioquic.tls.Context\n _set_state(state: State) -> None\n \n at: aioquic.tls.Context.__init__\n self._alpn_protocols = alpn_protocols\n \n self.handshake_extensions: List[Extension] = []\n \n self.session_ticket: Optional[SessionTicket] = None\n \n self._server_name = server_name\n \n self.new_session_ticket_cb: Optional[SessionTicketHandler] = None\n \n self.update_traffic_key_cb: Callable[\n [Direction, Epoch, CipherSuite, bytes], None\n ] = lambda d, e, c, s: None\n \n self._cipher_suites = [\n CipherSuite.AES_256_GCM_SHA384,\n CipherSuite.AES_128_GCM_SHA256,\n CipherSuite.CHACHA20_POLY1305_SHA256,\n ]\n \n self._legacy_compression_methods: List[int] = [CompressionMethod.NULL]\n \n self._psk_key_exchange_modes: List[int] = [PskKeyExchangeMode.PSK_DHE_KE]\n \n self._signature_algorithms: List[int] = [\n SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n SignatureAlgorithm.RSA_PKCS1_SHA256,\n SignatureAlgorithm.RSA_PKCS1_SHA1,\n ]\n \n self._supported_groups = [Group.SECP256R1]\n \n self._supported_versions = [TLS_VERSION_1_3]\n \n self._key_schedule_psk: Optional[KeySchedule] = None\n \n self._key_schedule_proxy: Optional[KeyScheduleProxy] = None\n \n self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None\n \n self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None\n \n self._x448_private_key: Optional[x448.X448PrivateKey] = None\n \n "}}},{"rowIdx":4135,"cells":{"path":{"kind":"string","value":"aioquic.tls/Context._client_handle_hello"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"341caf8988c9a808f81a2050a580cccc0bf597e7"},"commit_message":{"kind":"string","value":"[tls] rename ClientHello / ServerHello attributes to match spec"},"ground_truth":{"kind":"string","value":" <7>: assert peer_hello.compression_method in self._legacy_compression_methods\n assert peer_hello.compression_method in self._compression_methods\n"},"main_code":{"kind":"string","value":" # module: aioquic.tls\n class Context:\n def _client_handle_hello(self, input_buf: Buffer, output_buf: Buffer) -> None:\n <0> peer_hello = pull_server_hello(input_buf)\n <1> \n <2> cipher_suite = negotiate(\n <3> self._cipher_suites,\n <4> [peer_hello.cipher_suite],\n <5> AlertHandshakeFailure(\"Unsupported cipher suite\"),\n <6> )\n <7> assert peer_hello.compression_method in self._compression_methods\n <8> assert peer_hello.supported_version in self._supported_versions\n <9> \n<10> # select key schedule\n<11> if peer_hello.pre_shared_key is not None:\n<12> if (\n<13> self._key_schedule_psk is None\n<14> or peer_hello.pre_shared_key != 0\n<15> or cipher_suite != self._key_schedule_psk.cipher_suite\n<16> ):\n<17> raise AlertIllegalParameter\n<18> self.key_schedule = self._key_schedule_psk\n<19> self._session_resumed = True\n<20> else:\n<21> self.key_schedule = self._key_schedule_proxy.select(cipher_suite)\n<22> self._key_schedule_psk = None\n<23> self._key_schedule_proxy = None\n<24> \n<25> # perform key exchange\n<26> peer_public_key = decode_public_key(peer_hello.key_share)\n<27> shared_key: Optional[bytes] = None\n<28> if (\n<29> isinstance(peer_public_key, x25519.X25519PublicKey)\n<30> and self._x25519_private_key is not None\n<31> ):\n<32> shared_key = self._x25519_private_key.exchange(peer_public_key)\n<33> elif (\n<34> isinstance(peer_public_key, x448.X448PublicKey)\n<35> and self._x448_private_key is not None\n<36> ):\n<37> shared_key = self._x448_private_key.exchange(peer_public_key)\n<38> elif (\n<39> isinstance(peer_public_key"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.tls\n class Context:\n def _client_handle_hello(self, input_buf: Buffer, output_buf: Buffer) -> None:\n # offset: 1\n and self._ec_private_key is not None\n and self._ec_private_key.public_key().curve.__class__\n == peer_public_key.curve.__class__\n ):\n shared_key = self._ec_private_key.exchange(ec.ECDH(), peer_public_key)\n assert shared_key is not None\n \n self.key_schedule.update_hash(input_buf.data)\n self.key_schedule.extract(shared_key)\n \n self._setup_traffic_protection(\n Direction.DECRYPT, Epoch.HANDSHAKE, b\"s hs traffic\"\n )\n \n self._set_state(State.CLIENT_EXPECT_ENCRYPTED_EXTENSIONS)\n \n \n===========unchanged ref 0===========\n at: aioquic.tls\n AlertHandshakeFailure(*args: object)\n \n AlertIllegalParameter(*args: object)\n \n Direction()\n \n Epoch()\n \n State()\n \n decode_public_key(key_share: KeyShareEntry) -> Union[ec.EllipticCurvePublicKey, x25519.X25519PublicKey, x448.X448PublicKey, None]\n \n negotiate(supported: List[T], offered: Optional[List[Any]], exc: Optional[Alert]=None) -> T\n \n at: aioquic.tls.Context\n _setup_traffic_protection(direction: Direction, epoch: Epoch, label: bytes) -> None\n \n _set_state(state: State) -> None\n \n at: aioquic.tls.Context.__init__\n self._cipher_suites = [\n CipherSuite.AES_256_GCM_SHA384,\n CipherSuite.AES_128_GCM_SHA256,\n CipherSuite.CHACHA20_POLY1305_SHA256,\n ]\n \n self._legacy_compression_methods: List[int] = [CompressionMethod.NULL]\n \n self._supported_versions = [TLS_VERSION_1_3]\n \n self.key_schedule: Optional[KeySchedule] = None\n \n self._key_schedule_psk: Optional[KeySchedule] = None\n \n self._key_schedule_proxy: Optional[KeyScheduleProxy] = None\n \n self._session_resumed = False\n \n self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None\n \n self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None\n \n self._x448_private_key: Optional[x448.X448PrivateKey] = None\n \n at: aioquic.tls.Context._client_handle_hello\n peer_hello = pull_server_hello(input_buf)\n \n \n===========unchanged ref 1===========\n at: aioquic.tls.Context._client_send_hello\n self._ec_private_key = ec.generate_private_key(\n GROUP_TO_CURVE[Group.SECP256R1](), default_backend()\n )\n \n self._x25519_private_key = x25519.X25519PrivateKey.generate()\n \n self._x448_private_key = x448.X448PrivateKey.generate()\n \n self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite)\n \n self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites)\n \n at: aioquic.tls.Context._server_handle_hello\n self.key_schedule = KeySchedule(cipher_suite)\n \n self._session_resumed = True\n \n self._x25519_private_key = x25519.X25519PrivateKey.generate()\n \n self._x448_private_key = x448.X448PrivateKey.generate()\n \n self._ec_private_key = ec.generate_private_key(\n GROUP_TO_CURVE[key_share[0]](), default_backend()\n )\n \n at: aioquic.tls.KeySchedule\n extract(key_material: Optional[bytes]=None) -> None\n \n update_hash(data: bytes) -> None\n \n at: aioquic.tls.KeySchedule.__init__\n self.cipher_suite = cipher_suite\n \n at: aioquic.tls.KeyScheduleProxy\n select(cipher_suite: CipherSuite) -> KeySchedule\n \n at: aioquic.tls.ServerHello\n cipher_suite: int\n \n compression_method: int\n \n key_share: Optional[KeyShareEntry] = None\n \n pre_shared_key: Optional[int] = None\n \n supported_version: Optional[int] = None\n \n \n===========changed ref 0===========\n # module: aioquic.tls\n @dataclass\n class ServerHello:\n random: bytes\n + legacy_session_id: bytes\n - session_id: bytes\n cipher_suite: int\n compression_method: int\n \n # extensions\n key_share: Optional[KeyShareEntry] = None\n pre_shared_key: Optional[int] = None\n supported_version: Optional[int] = None\n other_extensions: List[Tuple[int, bytes]] = field(default_factory=list)\n \n===========changed ref 1===========\n # module: aioquic.tls\n def push_server_hello(buf: Buffer, hello: ServerHello) -> None:\n buf.push_uint8(HandshakeType.SERVER_HELLO)\n with push_block(buf, 3):\n buf.push_uint16(TLS_VERSION_1_2)\n buf.push_bytes(hello.random)\n \n + push_opaque(buf, 1, hello.legacy_session_id)\n - push_opaque(buf, 1, hello.session_id)\n buf.push_uint16(hello.cipher_suite)\n buf.push_uint8(hello.compression_method)\n \n # extensions\n with push_block(buf, 2):\n if hello.supported_version is not None:\n with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS):\n buf.push_uint16(hello.supported_version)\n \n if hello.key_share is not None:\n with push_extension(buf, ExtensionType.KEY_SHARE):\n push_key_share(buf, hello.key_share)\n \n if hello.pre_shared_key is not None:\n with push_extension(buf, ExtensionType.PRE_SHARED_KEY):\n buf.push_uint16(hello.pre_shared_key)\n \n for extension_type, extension_value in hello.other_extensions:\n with push_extension(buf, extension_type):\n buf.push_bytes(extension_value)\n \n===========changed ref 2===========\n # module: aioquic.tls\n def pull_server_hello(buf: Buffer) -> ServerHello:\n assert buf.pull_uint8() == HandshakeType.SERVER_HELLO\n with pull_block(buf, 3):\n assert buf.pull_uint16() == TLS_VERSION_1_2\n - server_random = buf.pull_bytes(32)\n \n hello = ServerHello(\n + random=buf.pull_bytes(32),\n - random=server_random,\n + legacy_session_id=pull_opaque(buf, 1),\n - session_id=pull_opaque(buf, 1),\n cipher_suite=buf.pull_uint16(),\n compression_method=buf.pull_uint8(),\n )\n \n # extensions\n def pull_extension() -> None:\n extension_type = buf.pull_uint16()\n extension_length = buf.pull_uint16()\n if extension_type == ExtensionType.SUPPORTED_VERSIONS:\n hello.supported_version = buf.pull_uint16()\n elif extension_type == ExtensionType.KEY_SHARE:\n hello.key_share = pull_key_share(buf)\n elif extension_type == ExtensionType.PRE_SHARED_KEY:\n hello.pre_shared_key = buf.pull_uint16()\n else:\n hello.other_extensions.append(\n (extension_type, buf.pull_bytes(extension_length))\n )\n \n pull_list(buf, 2, pull_extension)\n \n return hello\n "}}},{"rowIdx":4136,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_connect_with_loss_1"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a15b779532737f0f06bf7d6cdfecc73b010c4926"},"commit_message":{"kind":"string","value":"[tls] send an empty legacy_session_id in ClientHello"},"ground_truth":{"kind":"string","value":"<37>: self.assertEqual(datagram_sizes(items), [1280, 1030])\n self.assertEqual(datagram_sizes(items), [1280, 1062])\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n <0> \"\"\"\n <1> Check connection is established even in the client's INITIAL is lost.\n <2> \"\"\"\n <3> \n <4> def datagram_sizes(items):\n <5> return [len(x[0]) for x in items]\n <6> \n <7> client_configuration = QuicConfiguration(is_client=True)\n <8> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n <9> \n<10> client = QuicConnection(configuration=client_configuration)\n<11> client._ack_delay = 0\n<12> \n<13> server_configuration = QuicConfiguration(is_client=False)\n<14> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n<15> \n<16> server = QuicConnection(configuration=server_configuration)\n<17> server._ack_delay = 0\n<18> \n<19> # client sends INITIAL\n<20> now = 0.0\n<21> client.connect(SERVER_ADDR, now=now)\n<22> items = client.datagrams_to_send(now=now)\n<23> self.assertEqual(datagram_sizes(items), [1280])\n<24> self.assertEqual(client.get_timer(), 1.0)\n<25> \n<26> # INITIAL is lost\n<27> now = 1.0\n<28> client.handle_timer(now=now)\n<29> items = client.datagrams_to_send(now=now)\n<30> self.assertEqual(datagram_sizes(items), [1280])\n<31> self.assertEqual(client.get_timer(), 3.0)\n<32> \n<33> # server receives INITIAL, sends INITIAL + HANDSHAKE\n<34> now = 1.1\n<35> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n<36> items = server.datagrams_to_send(now=now)\n<37> self.assertEqual(datagram_sizes(items), [1280, 1062])\n<38> self.assertEqual(server.get_timer(), 2.1)\n<39> self.assertEqual"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n # offset: 1\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 2)\n self.assertEqual(type(server.next_event()), events.ProtocolNegotiated)\n self.assertIsNone(server.next_event())\n \n # handshake continues normally\n now = 1.2\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n client.receive_datagram(items[1][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [376])\n self.assertAlmostEqual(client.get_timer(), 1.825)\n self.assertEqual(type(client.next_event()), events.ProtocolNegotiated)\n self.assertEqual(type(client.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(client.next_event()), events.ConnectionIdIssued)\n \n now = 1.3\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [229])\n self.assertAlmostEqual(server.get_timer(), 1.825)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 0)\n self.assertEqual(type(server.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(server.next_event()), events.ConnectionIdIssued)\n \n now = 1.4\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual\n===========below chunk 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n # offset: 2\n ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32])\n self.assertAlmostEqual(client.get_timer(), 61.4) # idle timeout\n \n \n===========unchanged ref 0===========\n at: tests.test_connection\n CLIENT_ADDR = (\"1.2.3.4\", 1234)\n \n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n at: tests.utils\n SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), \"pycacert.pem\")\n \n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertIsNone(obj: Any, msg: Any=...) -> None\n \n assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None\n assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None\n \n "}}},{"rowIdx":4137,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_connect_with_loss_2"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a15b779532737f0f06bf7d6cdfecc73b010c4926"},"commit_message":{"kind":"string","value":"[tls] send an empty legacy_session_id in ClientHello"},"ground_truth":{"kind":"string","value":"<26>: self.assertEqual(datagram_sizes(items), [1280, 1030])\n self.assertEqual(datagram_sizes(items), [1280, 1062])\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_2(self):\n <0> def datagram_sizes(items):\n <1> return [len(x[0]) for x in items]\n <2> \n <3> client_configuration = QuicConfiguration(is_client=True)\n <4> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n <5> \n <6> client = QuicConnection(configuration=client_configuration)\n <7> client._ack_delay = 0\n <8> \n <9> server_configuration = QuicConfiguration(is_client=False)\n<10> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n<11> \n<12> server = QuicConnection(configuration=server_configuration)\n<13> server._ack_delay = 0\n<14> \n<15> # client sends INITIAL\n<16> now = 0.0\n<17> client.connect(SERVER_ADDR, now=now)\n<18> items = client.datagrams_to_send(now=now)\n<19> self.assertEqual(datagram_sizes(items), [1280])\n<20> self.assertEqual(client.get_timer(), 1.0)\n<21> \n<22> # server receives INITIAL, sends INITIAL + HANDSHAKE but second datagram is lost\n<23> now = 0.1\n<24> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n<25> items = server.datagrams_to_send(now=now)\n<26> self.assertEqual(datagram_sizes(items), [1280, 1062])\n<27> self.assertEqual(server.get_timer(), 1.1)\n<28> self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)\n<29> self.assertEqual(len(server._loss.spaces[1].sent_packets), 2)\n<30> \n<31> # client only receives first datagram and sends ACKS\n<32> now = 0.2\n<33> client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n<34> items = client.datagrams_to_send(now="},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_2(self):\n # offset: 1\n self.assertEqual(datagram_sizes(items), [97])\n self.assertAlmostEqual(client.get_timer(), 0.625)\n self.assertEqual(type(client.next_event()), events.ProtocolNegotiated)\n self.assertIsNone(client.next_event())\n \n # client PTO - HANDSHAKE PING\n now = client.get_timer() # ~0.625\n client.handle_timer(now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [44])\n self.assertAlmostEqual(client.get_timer(), 1.875)\n \n # server receives PING, discards INITIAL and sends ACK\n now = 0.725\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [48])\n self.assertAlmostEqual(server.get_timer(), 1.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 3)\n self.assertEqual(type(server.next_event()), events.ProtocolNegotiated)\n self.assertIsNone(server.next_event())\n \n # ACKs are lost, server retransmits HANDSHAKE\n now = server.get_timer()\n server.handle_timer(now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280, 854])\n self.assertAlmostEqual(server.get_timer(), 3.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n \n===========below chunk 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_2(self):\n # offset: 2\n (), 3.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 3)\n self.assertIsNone(server.next_event())\n \n # handshake continues normally\n now = 1.2\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n client.receive_datagram(items[1][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [329])\n self.assertAlmostEqual(client.get_timer(), 2.45)\n self.assertEqual(type(client.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(client.next_event()), events.ConnectionIdIssued)\n \n now = 1.3\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [229])\n self.assertAlmostEqual(server.get_timer(), 1.925)\n self.assertEqual(type(server.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(server.next_event()), events.ConnectionIdIssued)\n \n now = 1.4\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32])\n self.assertAlmostEqual(client.get_timer(), 61.4)\n===========unchanged ref 0===========\n at: tests.test_connection\n CLIENT_ADDR = (\"1.2.3.4\", 1234)\n \n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n at: tests.utils\n SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), \"pycacert.pem\")\n \n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertIsNone(obj: Any, msg: Any=...) -> None\n \n assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None\n assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n \"\"\"\n Check connection is established even in the client's INITIAL is lost.\n \"\"\"\n \n def datagram_sizes(items):\n return [len(x[0]) for x in items]\n \n client_configuration = QuicConfiguration(is_client=True)\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration)\n client._ack_delay = 0\n \n server_configuration = QuicConfiguration(is_client=False)\n server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n \n server = QuicConnection(configuration=server_configuration)\n server._ack_delay = 0\n \n # client sends INITIAL\n now = 0.0\n client.connect(SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 1.0)\n \n # INITIAL is lost\n now = 1.0\n client.handle_timer(now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 3.0)\n \n # server receives INITIAL, sends INITIAL + HANDSHAKE\n now = 1.1\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n + self.assertEqual(datagram_sizes(items), [1280, 1030])\n - self.assertEqual(datagram_sizes(items), [1280, 1062])\n self.assertEqual(server.get_timer(), 2.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)"}}},{"rowIdx":4138,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_connect_with_loss_3"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a15b779532737f0f06bf7d6cdfecc73b010c4926"},"commit_message":{"kind":"string","value":"[tls] send an empty legacy_session_id in ClientHello"},"ground_truth":{"kind":"string","value":"<26>: self.assertEqual(datagram_sizes(items), [1280, 1030])\n self.assertEqual(datagram_sizes(items), [1280, 1062])\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_3(self):\n <0> def datagram_sizes(items):\n <1> return [len(x[0]) for x in items]\n <2> \n <3> client_configuration = QuicConfiguration(is_client=True)\n <4> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n <5> \n <6> client = QuicConnection(configuration=client_configuration)\n <7> client._ack_delay = 0\n <8> \n <9> server_configuration = QuicConfiguration(is_client=False)\n<10> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n<11> \n<12> server = QuicConnection(configuration=server_configuration)\n<13> server._ack_delay = 0\n<14> \n<15> # client sends INITIAL\n<16> now = 0.0\n<17> client.connect(SERVER_ADDR, now=now)\n<18> items = client.datagrams_to_send(now=now)\n<19> self.assertEqual(datagram_sizes(items), [1280])\n<20> self.assertEqual(client.get_timer(), 1.0)\n<21> \n<22> # server receives INITIAL, sends INITIAL + HANDSHAKE\n<23> now = 0.1\n<24> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n<25> items = server.datagrams_to_send(now=now)\n<26> self.assertEqual(datagram_sizes(items), [1280, 1062])\n<27> self.assertEqual(server.get_timer(), 1.1)\n<28> self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)\n<29> self.assertEqual(len(server._loss.spaces[1].sent_packets), 2)\n<30> \n<31> # client receives INITIAL + HANDSHAKE\n<32> now = 0.2\n<33> client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n<34> client.receive_datagram(items[1][0], SERVER_ADDR, now=now)\n<35> "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_3(self):\n # offset: 1\n self.assertEqual(datagram_sizes(items), [376])\n self.assertAlmostEqual(client.get_timer(), 0.825)\n self.assertEqual(type(client.next_event()), events.ProtocolNegotiated)\n self.assertEqual(type(client.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(client.next_event()), events.ConnectionIdIssued)\n \n # server completes handshake\n now = 0.3\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [229])\n self.assertAlmostEqual(server.get_timer(), 0.825)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 0)\n self.assertEqual(type(server.next_event()), events.ProtocolNegotiated)\n self.assertEqual(type(server.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(server.next_event()), events.ConnectionIdIssued)\n \n # server PTO - 1-RTT PING\n now = 0.825\n server.handle_timer(now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [29])\n self.assertAlmostEqual(server.get_timer(), 1.875)\n \n # client receives PING, sends ACK\n now = 0.9\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32\n===========below chunk 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_3(self):\n # offset: 2\n client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32])\n self.assertAlmostEqual(client.get_timer(), 0.825)\n \n # server receives ACK, retransmits HANDSHAKE_DONE\n now = 1.0\n self.assertFalse(server._handshake_done_pending)\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n self.assertTrue(server._handshake_done_pending)\n items = server.datagrams_to_send(now=now)\n self.assertFalse(server._handshake_done_pending)\n self.assertEqual(datagram_sizes(items), [224])\n \n \n===========unchanged ref 0===========\n at: tests.test_connection\n CLIENT_ADDR = (\"1.2.3.4\", 1234)\n \n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n at: tests.utils\n SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), \"pycacert.pem\")\n \n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n assertFalse(expr: Any, msg: Any=...) -> None\n \n assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None\n assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n \"\"\"\n Check connection is established even in the client's INITIAL is lost.\n \"\"\"\n \n def datagram_sizes(items):\n return [len(x[0]) for x in items]\n \n client_configuration = QuicConfiguration(is_client=True)\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration)\n client._ack_delay = 0\n \n server_configuration = QuicConfiguration(is_client=False)\n server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n \n server = QuicConnection(configuration=server_configuration)\n server._ack_delay = 0\n \n # client sends INITIAL\n now = 0.0\n client.connect(SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 1.0)\n \n # INITIAL is lost\n now = 1.0\n client.handle_timer(now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 3.0)\n \n # server receives INITIAL, sends INITIAL + HANDSHAKE\n now = 1.1\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n + self.assertEqual(datagram_sizes(items), [1280, 1030])\n - self.assertEqual(datagram_sizes(items), [1280, 1062])\n self.assertEqual(server.get_timer(), 2.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)"}}},{"rowIdx":4139,"cells":{"path":{"kind":"string","value":"tests.test_tls/ContextTest._handshake"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a15b779532737f0f06bf7d6cdfecc73b010c4926"},"commit_message":{"kind":"string","value":"[tls] send an empty legacy_session_id in ClientHello"},"ground_truth":{"kind":"string","value":" <5>: self.assertGreaterEqual(len(server_input), 181)\n self.assertGreaterEqual(len(server_input), 213)\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class ContextTest(TestCase):\n def _handshake(self, client, server):\n <0> # send client hello\n <1> client_buf = create_buffers()\n <2> client.handle_message(b\"\", client_buf)\n <3> self.assertEqual(client.state, State.CLIENT_EXPECT_SERVER_HELLO)\n <4> server_input = merge_buffers(client_buf)\n <5> self.assertGreaterEqual(len(server_input), 213)\n <6> self.assertLessEqual(len(server_input), 358)\n <7> reset_buffers(client_buf)\n <8> \n <9> # handle client hello\n<10> # send server hello, encrypted extensions, certificate, certificate verify, finished, (session ticket)\n<11> server_buf = create_buffers()\n<12> server.handle_message(server_input, server_buf)\n<13> self.assertEqual(server.state, State.SERVER_EXPECT_FINISHED)\n<14> client_input = merge_buffers(server_buf)\n<15> self.assertGreaterEqual(len(client_input), 600)\n<16> self.assertLessEqual(len(client_input), 2316)\n<17> \n<18> reset_buffers(server_buf)\n<19> \n<20> # handle server hello, encrypted extensions, certificate, certificate verify, finished, (session ticket)\n<21> # send finished\n<22> client.handle_message(client_input, client_buf)\n<23> self.assertEqual(client.state, State.CLIENT_POST_HANDSHAKE)\n<24> server_input = merge_buffers(client_buf)\n<25> self.assertEqual(len(server_input), 52)\n<26> reset_buffers(client_buf)\n<27> \n<28> # handle finished\n<29> server.handle_message(server_input, server_buf)\n<30> self.assertEqual(server.state, State.SERVER_POST_HANDSHAKE)\n<31> client_input = merge_buffers(server_buf)\n<32> self.assertEqual(len(client_input), 0)\n<33> \n<34> # check keys match\n<35> self.assertEqual(client._dec_key, server._enc_"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_tls\n class ContextTest(TestCase):\n def _handshake(self, client, server):\n # offset: 1\n self.assertEqual(client._enc_key, server._dec_key)\n \n # check cipher suite\n self.assertEqual(\n client.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384\n )\n self.assertEqual(\n server.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384\n )\n \n \n===========unchanged ref 0===========\n at: tests.test_tls\n create_buffers()\n \n merge_buffers(buffers)\n \n reset_buffers(buffers)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertGreaterEqual(a: Any, b: Any, msg: Any=...) -> None\n \n assertLessEqual(a: Any, b: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n \"\"\"\n Check connection is established even in the client's INITIAL is lost.\n \"\"\"\n \n def datagram_sizes(items):\n return [len(x[0]) for x in items]\n \n client_configuration = QuicConfiguration(is_client=True)\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration)\n client._ack_delay = 0\n \n server_configuration = QuicConfiguration(is_client=False)\n server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n \n server = QuicConnection(configuration=server_configuration)\n server._ack_delay = 0\n \n # client sends INITIAL\n now = 0.0\n client.connect(SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 1.0)\n \n # INITIAL is lost\n now = 1.0\n client.handle_timer(now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 3.0)\n \n # server receives INITIAL, sends INITIAL + HANDSHAKE\n now = 1.1\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n + self.assertEqual(datagram_sizes(items), [1280, 1030])\n - self.assertEqual(datagram_sizes(items), [1280, 1062])\n self.assertEqual(server.get_timer(), 2.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)\n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n # offset: 1\n _timer(), 2.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 2)\n self.assertEqual(type(server.next_event()), events.ProtocolNegotiated)\n self.assertIsNone(server.next_event())\n \n # handshake continues normally\n now = 1.2\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n client.receive_datagram(items[1][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [376])\n self.assertAlmostEqual(client.get_timer(), 1.825)\n self.assertEqual(type(client.next_event()), events.ProtocolNegotiated)\n self.assertEqual(type(client.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(client.next_event()), events.ConnectionIdIssued)\n \n now = 1.3\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [229])\n self.assertAlmostEqual(server.get_timer(), 1.825)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 0)\n self.assertEqual(type(server.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(server.next_event\n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n # offset: 2\n events.ConnectionIdIssued)\n \n now = 1.4\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32])\n self.assertAlmostEqual(client.get_timer(), 61.4) # idle timeout\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_3(self):\n def datagram_sizes(items):\n return [len(x[0]) for x in items]\n \n client_configuration = QuicConfiguration(is_client=True)\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration)\n client._ack_delay = 0\n \n server_configuration = QuicConfiguration(is_client=False)\n server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n \n server = QuicConnection(configuration=server_configuration)\n server._ack_delay = 0\n \n # client sends INITIAL\n now = 0.0\n client.connect(SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 1.0)\n \n # server receives INITIAL, sends INITIAL + HANDSHAKE\n now = 0.1\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n + self.assertEqual(datagram_sizes(items), [1280, 1030])\n - self.assertEqual(datagram_sizes(items), [1280, 1062])\n self.assertEqual(server.get_timer(), 1.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 2)\n \n # client receives INITIAL + HANDSHAKE\n now = 0.2\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n client.receive_datagram(items[1][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send("}}},{"rowIdx":4140,"cells":{"path":{"kind":"string","value":"aioquic.tls/Context.__init__"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a15b779532737f0f06bf7d6cdfecc73b010c4926"},"commit_message":{"kind":"string","value":"[tls] send an empty legacy_session_id in ClientHello"},"ground_truth":{"kind":"string","value":""},"main_code":{"kind":"string","value":" \n is_client: bool,\n alpn_protocols: Optional[List[str]] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n <0> # configuration\n <1> self._alpn_protocols = alpn_protocols\n <2> self._cadata = cadata\n <3> self._cafile = cafile\n <4> self._capath = capath\n <5> self.certificate: Optional[x509.Certificate] = None\n <6> self.certificate_chain: List[x509.Certificate] = []\n <7> self.certificate_private_key: Optional[\n <8> Union[dsa.DSAPrivateKey, ec.EllipticCurvePrivateKey, rsa.RSAPrivateKey]\n <9> ] = None\n<10> self.handshake_extensions: List[Extension] = []\n<11> self._max_early_data = max_early_data\n<12> self.session_ticket: Optional[SessionTicket] = None\n<13> self._server_name = server_name\n<14> if verify_mode is not None:\n<15> self._verify_mode = verify_mode\n<16> else:\n<17> self._verify_mode = ssl.CERT_REQUIRED if is_client else ssl.CERT_NONE\n<18> \n<19> # callbacks\n<20> self.alpn_cb: Optional[AlpnHandler] = None\n<21> self.get_session_ticket_cb: Optional[SessionTicketFetcher] = None\n<22> self.new_session_ticket_cb: Optional[SessionTicketHandler] = None\n<23> self.update_traffic_key_cb: Callable[\n<24> [Direction, Epoch, CipherSuite, bytes], None\n<25> ] = lambda d, e, c, s: None\n<26> \n<27> # supported parameters\n<28> self._cipher_suites = [\n<29> CipherSuite.AES_256_GCM_"},"context":{"kind":"string","value":"===========below chunk 0===========\n : bool,\n alpn_protocols: Optional[List[str]] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n # offset: 1\n CipherSuite.AES_128_GCM_SHA256,\n CipherSuite.CHACHA20_POLY1305_SHA256,\n ]\n self._legacy_compression_methods: List[int] = [CompressionMethod.NULL]\n self._psk_key_exchange_modes: List[int] = [PskKeyExchangeMode.PSK_DHE_KE]\n self._signature_algorithms: List[int] = [\n SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n SignatureAlgorithm.RSA_PKCS1_SHA256,\n SignatureAlgorithm.RSA_PKCS1_SHA1,\n ]\n self._supported_groups = [Group.SECP256R1]\n if default_backend().x25519_supported():\n self._supported_groups.append(Group.X25519)\n if default_backend().x448_supported():\n self._supported_groups.append(Group.X448)\n self._supported_versions = [TLS_VERSION_1_3]\n \n # state\n self.alpn_negotiated: Optional[str] = None\n self.early_data_accepted = False\n self.key_schedule: Optional[KeySchedule] = None\n self.received_extensions: Optional[List[Extension]] = None\n self._key_schedule_psk: Optional[KeySchedule] = None\n self._key_schedule_proxy: Optional[KeyScheduleProxy] = None\n self._new_session_ticket: Optional[NewSessionTicket] = None\n self._peer_certificate:\n===========below chunk 1===========\n : bool,\n alpn_protocols: Optional[List[str]] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n # offset: 2\n Proxy] = None\n self._new_session_ticket: Optional[NewSessionTicket] = None\n self._peer_certificate: Optional[x509.Certificate] = None\n self._peer_certificate_chain: List[x509.Certificate] = []\n self._receive_buffer = b\"\"\n self._session_resumed = False\n self._enc_key: Optional[bytes] = None\n self._dec_key: Optional[bytes] = None\n self.__logger = logger\n \n self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None\n self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None\n self._x448_private_key: Optional[x448.X448PrivateKey] = None\n \n if is_client:\n self.client_random = os.urandom(32)\n self.legacy_session_id = os.urandom(32)\n self.state = State.CLIENT_HANDSHAKE_START\n else:\n self.client_random = None\n self.legacy_session_id = None\n self.state = State.SERVER_EXPECT_CLIENT_HELLO\n \n \n===========unchanged ref 0===========\n at: aioquic.tls\n TLS_VERSION_1_3 = 0x0304\n \n Direction()\n \n Epoch()\n \n State()\n \n CipherSuite(x: Union[str, bytes, bytearray], base: int)\n CipherSuite(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n CompressionMethod(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n CompressionMethod(x: Union[str, bytes, bytearray], base: int)\n \n Group(x: Union[str, bytes, bytearray], base: int)\n Group(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n PskKeyExchangeMode(x: Union[str, bytes, bytearray], base: int)\n PskKeyExchangeMode(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n SignatureAlgorithm(x: Union[str, bytes, bytearray], base: int)\n SignatureAlgorithm(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n Extension = Tuple[int, bytes]\n \n NewSessionTicket(ticket_lifetime: int=0, ticket_age_add: int=0, ticket_nonce: bytes=b\"\", ticket: bytes=b\"\", max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list))\n \n KeySchedule(cipher_suite: CipherSuite)\n \n KeyScheduleProxy(cipher_suites: List[CipherSuite])\n \n SessionTicket(age_add: int, cipher_suite: CipherSuite, not_valid_after: datetime.datetime, not_valid_before: datetime.datetime, resumption_secret: bytes, server_name: str, ticket: bytes, max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list))\n \n AlpnHandler = Callable[[str], None]\n \n \n===========unchanged ref 1===========\n SessionTicketFetcher = Callable[[bytes], Optional[SessionTicket]]\n \n SessionTicketHandler = Callable[[SessionTicket], None]\n \n at: aioquic.tls.Context._client_handle_certificate\n self._peer_certificate = x509.load_der_x509_certificate(\n certificate.certificates[0][0], backend=default_backend()\n )\n \n self._peer_certificate_chain = [\n x509.load_der_x509_certificate(\n certificate.certificates[i][0], backend=default_backend()\n )\n for i in range(1, len(certificate.certificates))\n ]\n \n at: aioquic.tls.Context._client_handle_encrypted_extensions\n self.alpn_negotiated = encrypted_extensions.alpn_protocol\n \n self.early_data_accepted = encrypted_extensions.early_data\n \n self.received_extensions = encrypted_extensions.other_extensions\n \n at: aioquic.tls.Context._client_handle_finished\n self._enc_key = next_enc_key\n \n at: aioquic.tls.Context._client_handle_hello\n self.key_schedule = self._key_schedule_psk\n self.key_schedule = self._key_schedule_proxy.select(cipher_suite)\n \n self._session_resumed = True\n \n self._key_schedule_psk = None\n \n self._key_schedule_proxy = None\n \n at: aioquic.tls.Context._client_send_hello\n self._ec_private_key = ec.generate_private_key(\n GROUP_TO_CURVE[Group.SECP256R1](), default_backend()\n )\n \n self._x25519_private_key = x25519.X25519PrivateKey.generate()\n \n self._x448_private_key = x448.X448PrivateKey.generate()\n \n self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite)\n \n self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites)\n \n "}}},{"rowIdx":4141,"cells":{"path":{"kind":"string","value":"aioquic.tls/SessionTicket.obfuscated_age"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"50ef21f79dfc75af5dbb7342f224c9cc3cd61010"},"commit_message":{"kind":"string","value":"Properly calculate Session Ticket's obfuscated age"},"ground_truth":{"kind":"string","value":" <0>: age = int((utcnow() - self.not_valid_before).total_seconds() * 1000)\n age = int((utcnow() - self.not_valid_before).total_seconds())\n"},"main_code":{"kind":"string","value":" # module: aioquic.tls\n # callback types\n \n \n @dataclass\n class SessionTicket:\n @property\n def obfuscated_age(self) -> int:\n <0> age = int((utcnow() - self.not_valid_before).total_seconds())\n <1> return (age + self.age_add) % (1 << 32)\n <2> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.tls\n utcnow = datetime.datetime.utcnow\n \n at: aioquic.tls.SessionTicket\n age_add: int\n \n cipher_suite: CipherSuite\n \n not_valid_after: datetime.datetime\n \n not_valid_before: datetime.datetime\n \n resumption_secret: bytes\n \n server_name: str\n \n ticket: bytes\n \n max_early_data_size: Optional[int] = None\n \n other_extensions: List[Tuple[int, bytes]] = field(default_factory=list)\n \n at: datetime.timedelta\n __slots__ = '_days', '_seconds', '_microseconds', '_hashcode'\n \n total_seconds() -> float\n \n __radd__ = __add__\n \n __rmul__ = __mul__\n \n "}}},{"rowIdx":4142,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"4efe45750250b50c99ea11cd0f408e502422f32f"},"commit_message":{"kind":"string","value":"[connection] validate remote active_connection_id_limit"},"ground_truth":{"kind":"string","value":" <0>: \"\"\"\n Parse and apply remote transport parameters.\n \n `from_session_ticket` is `True` when restoring saved transport parameters,\n and `False` when handling received transport parameters.\n \"\"\"\n \n<28>: if (\n quic_transport_parameters.active_connection_id_limit is not None\n and quic_transport_parameters.active_connection_id_limit < 2\n ):\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"active_connection_id_limit must be no less than 2\",\n )\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n <0> quic_transport_parameters = pull_quic_transport_parameters(\n <1> Buffer(data=data), protocol_version=self._version\n <2> )\n <3> \n <4> # log event\n <5> if self._quic_logger is not None and not from_session_ticket:\n <6> self._quic_logger.log_event(\n <7> category=\"transport\",\n <8> event=\"parameters_set\",\n <9> data=self._quic_logger.encode_transport_parameters(\n<10> owner=\"remote\", parameters=quic_transport_parameters\n<11> ),\n<12> )\n<13> \n<14> # validate remote parameters\n<15> if (\n<16> self._is_client\n<17> and not from_session_ticket\n<18> and (\n<19> quic_transport_parameters.original_connection_id\n<20> != self._original_connection_id\n<21> )\n<22> ):\n<23> raise QuicConnectionError(\n<24> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<25> frame_type=QuicFrameType.CRYPTO,\n<26> reason_phrase=\"original_connection_id does not match\",\n<27> )\n<28> \n<29> # store remote parameters\n<30> if quic_transport_parameters.ack_delay_exponent is not None:\n<31> self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n<32> if quic_transport_parameters.active_connection_id_limit is not None:\n<33> self._remote_active_connection_id_limit = (\n<34> quic_transport_parameters.active_connection_id_limit\n<35> )\n<36> if quic_transport_parameters.idle_timeout is not None:\n<37> self._remote_idle_timeout = quic_transport_parameters.idle_timeout / 1000.0\n<38> if quic_transport_parameters.max_ack_delay is not None:\n<39> self._loss.max_ack_delay = quic"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str)\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._is_client = configuration.is_client\n \n self._original_connection_id = original_connection_id\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client, odcid=logger_connection_id\n )\n \n self._remote_ack_delay_exponent = 3\n \n self._remote_active_connection_id_limit = 0\n \n self._remote_idle_timeout = 0.0 # seconds\n \n self._version: Optional[int] = None\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n at: aioquic.quic.connection.QuicConnection.connect\n self._version = self._configuration.supported_versions[0]\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._version = QuicProtocolVersion(header.version)\n self._version = QuicProtocolVersion(max(common))\n \n self._original_connection_id = self._peer_cid\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_parse_transport_parameters(self):\n + client = create_standalone_client(self)\n + \n + buf = Buffer(capacity=32)\n + push_quic_transport_parameters(\n + buf,\n + QuicTransportParameters(),\n + protocol_version=QuicProtocolVersion.DRAFT_27,\n + )\n + client._parse_transport_parameters(buf.data)\n + \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n + client = create_standalone_client(self)\n + \n + for active_connection_id_limit in [0, 1]:\n + buf = Buffer(capacity=32)\n + push_quic_transport_parameters(\n + buf,\n + QuicTransportParameters(active_connection_id_limit=active_connection_id_limit),\n + protocol_version=QuicProtocolVersion.DRAFT_27,\n + )\n + with self.assertRaises(QuicConnectionError) as cm:\n + client._parse_transport_parameters(buf.data)\n + self.assertEqual(cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR)\n + self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n + self.assertEqual(cm.exception.reason_phrase, \"active_connection_id_limit must be no less than 2\")\n + "}}},{"rowIdx":4143,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"86a54f3822e43db15c5661e6560182fc92317aa1"},"commit_message":{"kind":"string","value":"[connection] do not use some remembered transport parameters"},"ground_truth":{"kind":"string","value":"<46>: if not from_session_ticket:\n if quic_transport_parameters.ack_delay_exponent is not None:\n if quic_\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n <0> \"\"\"\n <1> Parse and apply remote transport parameters.\n <2> \n <3> `from_session_ticket` is `True` when restoring saved transport parameters,\n <4> and `False` when handling received transport parameters.\n <5> \"\"\"\n <6> \n <7> quic_transport_parameters = pull_quic_transport_parameters(\n <8> Buffer(data=data), protocol_version=self._version\n <9> )\n<10> \n<11> # log event\n<12> if self._quic_logger is not None and not from_session_ticket:\n<13> self._quic_logger.log_event(\n<14> category=\"transport\",\n<15> event=\"parameters_set\",\n<16> data=self._quic_logger.encode_transport_parameters(\n<17> owner=\"remote\", parameters=quic_transport_parameters\n<18> ),\n<19> )\n<20> \n<21> # validate remote parameters\n<22> if (\n<23> self._is_client\n<24> and not from_session_ticket\n<25> and (\n<26> quic_transport_parameters.original_connection_id\n<27> != self._original_connection_id\n<28> )\n<29> ):\n<30> raise QuicConnectionError(\n<31> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<32> frame_type=QuicFrameType.CRYPTO,\n<33> reason_phrase=\"original_connection_id does not match\",\n<34> )\n<35> if (\n<36> quic_transport_parameters.active_connection_id_limit is not None\n<37> and quic_transport_parameters.active_connection_id_limit < 2\n<38> ):\n<39> raise QuicConnectionError(\n<40> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<41> frame_type=QuicFrameType.CRYPTO,\n<42> reason_phrase=\"active_connection_id_limit must be no less than 2\",\n<43> )\n<44> \n<45> # store remote parameters\n<46> if quic_"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n if quic_transport_parameters.idle_timeout is not None:\n self._remote_idle_timeout = quic_transport_parameters.idle_timeout / 1000.0\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = quic_transport_parameters.max_ack_delay / 1000.0\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str)\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._is_client = configuration.is_client\n \n self._original_connection_id = original_connection_id\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client, odcid=logger_connection_id\n )\n \n self._remote_ack_delay_exponent = 3\n \n self._remote_active_connection_id_limit = 0\n \n self._remote_idle_timeout = 0.0 # seconds\n \n self._remote_max_datagram_frame_size: Optional[int] = None\n \n self._version: Optional[int] = None\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n at: aioquic.quic.connection.QuicConnection.connect\n self._version = self._configuration.supported_versions[0]\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._version = QuicProtocolVersion(header.version)\n self._version = QuicProtocolVersion(max(common))\n \n self._original_connection_id = self._peer_cid\n \n "}}},{"rowIdx":4144,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection.datagrams_to_send"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"b9adb51db62a73e60c0ea784925654159a28a2df"},"commit_message":{"kind":"string","value":"[connection] convert CONNECTION_CLOSE of type 0x1D to 0x1C"},"ground_truth":{"kind":"string","value":"<36>: epoch=epoch,\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]:\n <0> \"\"\"\n <1> Return a list of `(data, addr)` tuples of datagrams which need to be\n <2> sent, and the network address to which they need to be sent.\n <3> \n <4> After calling this method call :meth:`get_timer` to know when the next\n <5> timer needs to be set.\n <6> \n <7> :param now: The current time.\n <8> \"\"\"\n <9> network_path = self._network_paths[0]\n<10> \n<11> if self._state in END_STATES:\n<12> return []\n<13> \n<14> # build datagrams\n<15> builder = QuicPacketBuilder(\n<16> host_cid=self.host_cid,\n<17> is_client=self._is_client,\n<18> packet_number=self._packet_number,\n<19> peer_cid=self._peer_cid,\n<20> peer_token=self._peer_token,\n<21> quic_logger=self._quic_logger,\n<22> spin_bit=self._spin_bit,\n<23> version=self._version,\n<24> )\n<25> if self._close_pending:\n<26> for epoch, packet_type in (\n<27> (tls.Epoch.ONE_RTT, PACKET_TYPE_ONE_RTT),\n<28> (tls.Epoch.HANDSHAKE, PACKET_TYPE_HANDSHAKE),\n<29> (tls.Epoch.INITIAL, PACKET_TYPE_INITIAL),\n<30> ):\n<31> crypto = self._cryptos[epoch]\n<32> if crypto.send.is_valid():\n<33> builder.start_packet(packet_type, crypto)\n<34> self._write_connection_close_frame(\n<35> builder=builder,\n<36> error_code=self._close_event.error_code,\n<37> frame_type=self._close_event.frame_type,\n<38> reason_phrase=self._close_event.reason_phrase,\n<39> )\n<40> self._close_pending = False\n<41> "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]:\n # offset: 1\n self._close_begin(is_initiator=True, now=now)\n else:\n # congestion control\n builder.max_flight_bytes = (\n self._loss.congestion_window - self._loss.bytes_in_flight\n )\n if self._probe_pending and builder.max_flight_bytes < PACKET_MAX_SIZE:\n builder.max_flight_bytes = PACKET_MAX_SIZE\n \n # limit data on un-validated network paths\n if not network_path.is_validated:\n builder.max_total_bytes = (\n network_path.bytes_received * 3 - network_path.bytes_sent\n )\n \n try:\n if not self._handshake_confirmed:\n for epoch in [tls.Epoch.INITIAL, tls.Epoch.HANDSHAKE]:\n self._write_handshake(builder, epoch, now)\n self._write_application(builder, network_path, now)\n except QuicPacketBuilderStop:\n pass\n \n datagrams, packets = builder.flush()\n \n if datagrams:\n self._packet_number = builder.packet_number\n \n # register packets\n sent_handshake = False\n for packet in packets:\n packet.sent_time = now\n self._loss.on_packet_sent(\n packet=packet, space=self._spaces[packet.epoch]\n )\n if packet.epoch == tls.Epoch.HANDSHAKE:\n sent_handshake = True\n \n # log packet\n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"packet_sent\",\n data={\n \"packet_type\": self._quic_logger.packet_type(\n packet.packet_type\n ),\n \"header\": {\n \"packet_number\": str(packet.packet_number),\n===========below chunk 1===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]:\n # offset: 2\n packet.packet_type\n ),\n \"header\": {\n \"packet_number\": str(packet.packet_number),\n \"packet_size\": packet.sent_bytes,\n \"scid\": dump_cid(self.host_cid)\n if is_long_header(packet.packet_type)\n else \"\",\n \"dcid\": dump_cid(self._peer_cid),\n },\n \"frames\": packet.quic_logger_frames,\n },\n )\n \n # check if we can discard initial keys\n if sent_handshake and self._is_client:\n self._discard_epoch(tls.Epoch.INITIAL)\n \n # return datagrams to send and the destination network address\n ret = []\n for datagram in datagrams:\n byte_length = len(datagram)\n network_path.bytes_sent += byte_length\n ret.append((datagram, network_path.addr))\n \n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"datagrams_sent\",\n data={\"byte_length\": byte_length, \"count\": 1},\n )\n return ret\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n NetworkAddress = Any\n \n dump_cid(cid: bytes) -> str\n \n END_STATES = frozenset(\n [\n QuicConnectionState.CLOSING,\n QuicConnectionState.DRAINING,\n QuicConnectionState.TERMINATED,\n ]\n )\n \n at: aioquic.quic.connection.QuicConnection\n _close_begin(is_initiator: bool, now: float) -> None\n \n _discard_epoch(epoch: tls.Epoch) -> None\n \n _write_application(builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float) -> None\n \n _write_handshake(builder: QuicPacketBuilder, epoch: tls.Epoch, now: float) -> None\n \n _write_connection_close_frame(builder: QuicPacketBuilder, epoch: tls.Epoch, error_code: int, frame_type: Optional[int], reason_phrase: str) -> None\n _write_connection_close_frame(self, builder: QuicPacketBuilder, epoch: tls.Epoch, error_code: int, frame_type: Optional[int], reason_phrase: str) -> None\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._is_client = configuration.is_client\n \n self._close_event: Optional[events.ConnectionTerminated] = None\n \n self._cryptos: Dict[tls.Epoch, CryptoPair] = {}\n \n self._handshake_confirmed = False\n \n self.host_cid = self._host_cids[0].cid\n \n self._network_paths: List[QuicNetworkPath] = []\n \n self._packet_number = 0\n \n self._peer_cid = os.urandom(configuration.connection_id_length)\n \n self._peer_token = b\"\"\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client, odcid=logger_connection_id\n )\n \n \n===========unchanged ref 1===========\n self._spaces: Dict[tls.Epoch, QuicPacketSpace] = {}\n \n self._spin_bit = False\n \n self._state = QuicConnectionState.FIRSTFLIGHT\n \n self._version: Optional[int] = None\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n self._close_pending = False\n \n self._probe_pending = False\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n at: aioquic.quic.connection.QuicConnection._handle_connection_close_frame\n self._close_event = events.ConnectionTerminated(\n error_code=error_code, frame_type=frame_type, reason_phrase=reason_phrase\n )\n \n at: aioquic.quic.connection.QuicConnection._handle_crypto_frame\n self._handshake_confirmed = True\n \n at: aioquic.quic.connection.QuicConnection._handle_handshake_done_frame\n self._handshake_confirmed = True\n \n at: aioquic.quic.connection.QuicConnection._initialize\n self._cryptos = {\n tls.Epoch.INITIAL: CryptoPair(),\n tls.Epoch.ZERO_RTT: CryptoPair(),\n tls.Epoch.HANDSHAKE: CryptoPair(),\n tls.Epoch.ONE_RTT: CryptoPair(),\n }\n \n self._spaces = {\n tls.Epoch.INITIAL: QuicPacketSpace(),\n tls.Epoch.HANDSHAKE: QuicPacketSpace(),\n tls.Epoch.ONE_RTT: QuicPacketSpace(),\n }\n \n self._packet_number = 0\n \n at: aioquic.quic.connection.QuicConnection._send_probe\n self._probe_pending = True\n \n at: aioquic.quic.connection.QuicConnection._set_state\n self._state = state\n \n "}}},{"rowIdx":4145,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._write_connection_close_frame"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"b9adb51db62a73e60c0ea784925654159a28a2df"},"commit_message":{"kind":"string","value":"[connection] convert CONNECTION_CLOSE of type 0x1D to 0x1C"},"ground_truth":{"kind":"string","value":" <0>: # convert application-level close to transport-level close in early stages\n if frame_type is None and epoch in (tls.Epoch.INITIAL, tls.Epoch.HANDSHAKE):\n error_code = QuicErrorCode.APPLICATION_ERROR\n frame_type = QuicFrameType.PADDING\n reason_phrase = \"\"\n \n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _write_connection_close_frame(\n self,\n builder: QuicPacketBuilder,\n + epoch: tls.Epoch,\n error_code: int,\n frame_type: Optional[int],\n reason_phrase: str,\n ) -> None:\n <0> reason_bytes = reason_phrase.encode(\"utf8\")\n <1> reason_length = len(reason_bytes)\n <2> \n <3> if frame_type is None:\n <4> buf = builder.start_frame(\n <5> QuicFrameType.APPLICATION_CLOSE,\n <6> capacity=APPLICATION_CLOSE_FRAME_CAPACITY + reason_length,\n <7> )\n <8> buf.push_uint_var(error_code)\n <9> buf.push_uint_var(reason_length)\n<10> buf.push_bytes(reason_bytes)\n<11> else:\n<12> buf = builder.start_frame(\n<13> QuicFrameType.TRANSPORT_CLOSE,\n<14> capacity=TRANSPORT_CLOSE_FRAME_CAPACITY + reason_length,\n<15> )\n<16> buf.push_uint_var(error_code)\n<17> buf.push_uint_var(frame_type)\n<18> buf.push_uint_var(reason_length)\n<19> buf.push_bytes(reason_bytes)\n<20> \n<21> # log frame\n<22> if self._quic_logger is not None:\n<23> builder.quic_logger_frames.append(\n<24> self._quic_logger.encode_connection_close_frame(\n<25> error_code=error_code,\n<26> frame_type=frame_type,\n<27> reason_phrase=reason_phrase,\n<28> )\n<29> )\n<30> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.quic.connection\n APPLICATION_CLOSE_FRAME_CAPACITY = 1 + 8 + 8 # + reason length\n \n TRANSPORT_CLOSE_FRAME_CAPACITY = 1 + 8 + 8 + 8 # + reason length\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n class QuicErrorCode(IntEnum):\n NO_ERROR = 0x0\n INTERNAL_ERROR = 0x1\n SERVER_BUSY = 0x2\n FLOW_CONTROL_ERROR = 0x3\n STREAM_LIMIT_ERROR = 0x4\n STREAM_STATE_ERROR = 0x5\n FINAL_SIZE_ERROR = 0x6\n FRAME_ENCODING_ERROR = 0x7\n TRANSPORT_PARAMETER_ERROR = 0x8\n CONNECTION_ID_LIMIT_ERROR = 0x9\n PROTOCOL_VIOLATION = 0xA\n INVALID_TOKEN = 0xB\n + APPLICATION_ERROR = 0xC\n CRYPTO_BUFFER_EXCEEDED = 0xD\n CRYPTO_ERROR = 0x100\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_write_connection_close_early(self):\n + client = create_standalone_client(self)\n + \n + builder = QuicPacketBuilder(\n + host_cid=client.host_cid,\n + is_client=True,\n + peer_cid=client._peer_cid,\n + version=client._version,\n + )\n + crypto = CryptoPair()\n + crypto.setup_initial(client.host_cid, is_client=True, version=client._version)\n + builder.start_packet(PACKET_TYPE_INITIAL, crypto)\n + client._write_connection_close_frame(\n + builder=builder,\n + epoch=tls.Epoch.INITIAL,\n + error_code=123,\n + frame_type=None,\n + reason_phrase=\"some reason\",\n + )\n + \n + self.assertEqual(\n + builder.quic_logger_frames,\n + [\n + {\n + \"error_code\": QuicErrorCode.APPLICATION_ERROR,\n + \"error_space\": \"transport\",\n + \"frame_type\": \"connection_close\",\n + \"raw_error_code\": QuicErrorCode.APPLICATION_ERROR,\n + \"reason\": \"\",\n + \"trigger_frame_type\": QuicFrameType.PADDING,\n + }\n + ],\n + )\n + \n===========changed ref 2===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]:\n \"\"\"\n Return a list of `(data, addr)` tuples of datagrams which need to be\n sent, and the network address to which they need to be sent.\n \n After calling this method call :meth:`get_timer` to know when the next\n timer needs to be set.\n \n :param now: The current time.\n \"\"\"\n network_path = self._network_paths[0]\n \n if self._state in END_STATES:\n return []\n \n # build datagrams\n builder = QuicPacketBuilder(\n host_cid=self.host_cid,\n is_client=self._is_client,\n packet_number=self._packet_number,\n peer_cid=self._peer_cid,\n peer_token=self._peer_token,\n quic_logger=self._quic_logger,\n spin_bit=self._spin_bit,\n version=self._version,\n )\n if self._close_pending:\n for epoch, packet_type in (\n (tls.Epoch.ONE_RTT, PACKET_TYPE_ONE_RTT),\n (tls.Epoch.HANDSHAKE, PACKET_TYPE_HANDSHAKE),\n (tls.Epoch.INITIAL, PACKET_TYPE_INITIAL),\n ):\n crypto = self._cryptos[epoch]\n if crypto.send.is_valid():\n builder.start_packet(packet_type, crypto)\n self._write_connection_close_frame(\n builder=builder,\n + epoch=epoch,\n error_code=self._close_event.error_code,\n frame_type=self._close_event.frame_type,\n reason_phrase=self._close_event.reason_phrase,\n )\n self._close_pending = False\n break\n self._close_begin(is_initiator=True, now=now)\n else:\n # congestion control\n builder.\n===========changed ref 3===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]:\n # offset: 1\n close_begin(is_initiator=True, now=now)\n else:\n # congestion control\n builder.max_flight_bytes = (\n self._loss.congestion_window - self._loss.bytes_in_flight\n )\n if self._probe_pending and builder.max_flight_bytes < PACKET_MAX_SIZE:\n builder.max_flight_bytes = PACKET_MAX_SIZE\n \n # limit data on un-validated network paths\n if not network_path.is_validated:\n builder.max_total_bytes = (\n network_path.bytes_received * 3 - network_path.bytes_sent\n )\n \n try:\n if not self._handshake_confirmed:\n for epoch in [tls.Epoch.INITIAL, tls.Epoch.HANDSHAKE]:\n self._write_handshake(builder, epoch, now)\n self._write_application(builder, network_path, now)\n except QuicPacketBuilderStop:\n pass\n \n datagrams, packets = builder.flush()\n \n if datagrams:\n self._packet_number = builder.packet_number\n \n # register packets\n sent_handshake = False\n for packet in packets:\n packet.sent_time = now\n self._loss.on_packet_sent(\n packet=packet, space=self._spaces[packet.epoch]\n )\n if packet.epoch == tls.Epoch.HANDSHAKE:\n sent_handshake = True\n \n # log packet\n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"packet_sent\",\n data={\n \"packet_type\": self._quic_logger.packet_type(\n \n===========changed ref 4===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]:\n # offset: 2\n packet_type\n ),\n \"header\": {\n \"packet_number\": str(packet.packet_number),\n \"packet_size\": packet.sent_bytes,\n \"scid\": dump_cid(self.host_cid)\n if is_long_header(packet.packet_type)\n else \"\",\n \"dcid\": dump_cid(self._peer_cid),\n },\n \"frames\": packet.quic_logger_frames,\n },\n )\n \n # check if we can discard initial keys\n if sent_handshake and self._is_client:\n self._discard_epoch(tls.Epoch.INITIAL)\n \n # return datagrams to send and the destination network address\n ret = []\n for datagram in datagrams:\n byte_length = len(datagram)\n network_path.bytes_sent += byte_length\n ret.append((datagram, network_path.addr))\n \n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"datagrams_sent\",\n data={\"byte_length\": byte_length, \"count\": 1},\n )\n return ret\n "}}},{"rowIdx":4146,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"acf5133b0a3c5e02a5fce79a806e6522a2baae2d"},"commit_message":{"kind":"string","value":"[parameters] rename 'max_packet_size' to 'max_udp_payload_size'"},"ground_truth":{"kind":"string","value":"<15>: max_udp_payload_size=2020,\n max_packet_size=2020,\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params(self):\n <0> data = binascii.unhexlify(\n <1> \"010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff\"\n <2> \"a05048000ffff06048000ffff0801060a01030b0119\"\n <3> )\n <4> \n <5> # parse\n <6> buf = Buffer(data=data)\n <7> params = pull_quic_transport_parameters(\n <8> buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <9> )\n<10> self.assertEqual(\n<11> params,\n<12> QuicTransportParameters(\n<13> idle_timeout=10000,\n<14> stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n<15> max_packet_size=2020,\n<16> initial_max_data=393210,\n<17> initial_max_stream_data_bidi_local=65535,\n<18> initial_max_stream_data_bidi_remote=65535,\n<19> initial_max_stream_data_uni=None,\n<20> initial_max_streams_bidi=6,\n<21> initial_max_streams_uni=None,\n<22> ack_delay_exponent=3,\n<23> max_ack_delay=25,\n<24> ),\n<25> )\n<26> \n<27> # serialize\n<28> buf = Buffer(capacity=len(data))\n<29> push_quic_transport_parameters(\n<30> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n<31> )\n<32> self.assertEqual(len(buf.data), len(data))\n<33> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.test_packet.ParamsTest\n maxDiff = None\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n PARAMS = {\n 0: (\"original_connection_id\", bytes),\n 1: (\"idle_timeout\", int),\n 2: (\"stateless_reset_token\", bytes),\n + 3: (\"max_udp_payload_size\", int),\n - 3: (\"max_packet_size\", int),\n 4: (\"initial_max_data\", int),\n 5: (\"initial_max_stream_data_bidi_local\", int),\n 6: (\"initial_max_stream_data_bidi_remote\", int),\n 7: (\"initial_max_stream_data_uni\", int),\n 8: (\"initial_max_streams_bidi\", int),\n 9: (\"initial_max_streams_uni\", int),\n 10: (\"ack_delay_exponent\", int),\n 11: (\"max_ack_delay\", int),\n 12: (\"disable_active_migration\", bool),\n 13: (\"preferred_address\", QuicPreferredAddress),\n 14: (\"active_connection_id_limit\", int),\n 32: (\"max_datagram_frame_size\", int),\n 3127: (\"quantum_readiness\", bytes),\n }\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n original_connection_id: Optional[bytes] = None\n idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n + max_udp_payload_size: Optional[int] = None\n - max_packet_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n "}}},{"rowIdx":4147,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params_legacy"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"acf5133b0a3c5e02a5fce79a806e6522a2baae2d"},"commit_message":{"kind":"string","value":"[parameters] rename 'max_packet_size' to 'max_udp_payload_size'"},"ground_truth":{"kind":"string","value":"<16>: max_udp_payload_size=2020,\n max_packet_size=2020,\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_legacy(self):\n <0> data = binascii.unhexlify(\n <1> \"004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026\"\n <2> \"710000600048000ffff000500048000ffff000400048005fffa000a00010300\"\n <3> \"0b0001190003000247e4\"\n <4> )\n <5> \n <6> # parse\n <7> buf = Buffer(data=data)\n <8> params = pull_quic_transport_parameters(\n <9> buf, protocol_version=QuicProtocolVersion.DRAFT_25\n<10> )\n<11> self.assertEqual(\n<12> params,\n<13> QuicTransportParameters(\n<14> idle_timeout=10000,\n<15> stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n<16> max_packet_size=2020,\n<17> initial_max_data=393210,\n<18> initial_max_stream_data_bidi_local=65535,\n<19> initial_max_stream_data_bidi_remote=65535,\n<20> initial_max_stream_data_uni=None,\n<21> initial_max_streams_bidi=6,\n<22> initial_max_streams_uni=None,\n<23> ack_delay_exponent=3,\n<24> max_ack_delay=25,\n<25> ),\n<26> )\n<27> \n<28> # serialize\n<29> buf = Buffer(capacity=len(data))\n<30> push_quic_transport_parameters(\n<31> buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n<32> )\n<33> self.assertEqual(len(buf.data), len(data))\n<34> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params(self):\n data = binascii.unhexlify(\n \"010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff\"\n \"a05048000ffff06048000ffff0801060a01030b0119\"\n )\n \n # parse\n buf = Buffer(data=data)\n params = pull_quic_transport_parameters(\n buf, protocol_version=QuicProtocolVersion.DRAFT_27\n )\n self.assertEqual(\n params,\n QuicTransportParameters(\n idle_timeout=10000,\n stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n + max_udp_payload_size=2020,\n - max_packet_size=2020,\n initial_max_data=393210,\n initial_max_stream_data_bidi_local=65535,\n initial_max_stream_data_bidi_remote=65535,\n initial_max_stream_data_uni=None,\n initial_max_streams_bidi=6,\n initial_max_streams_uni=None,\n ack_delay_exponent=3,\n max_ack_delay=25,\n ),\n )\n \n # serialize\n buf = Buffer(capacity=len(data))\n push_quic_transport_parameters(\n buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n )\n self.assertEqual(len(buf.data), len(data))\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n PARAMS = {\n 0: (\"original_connection_id\", bytes),\n 1: (\"idle_timeout\", int),\n 2: (\"stateless_reset_token\", bytes),\n + 3: (\"max_udp_payload_size\", int),\n - 3: (\"max_packet_size\", int),\n 4: (\"initial_max_data\", int),\n 5: (\"initial_max_stream_data_bidi_local\", int),\n 6: (\"initial_max_stream_data_bidi_remote\", int),\n 7: (\"initial_max_stream_data_uni\", int),\n 8: (\"initial_max_streams_bidi\", int),\n 9: (\"initial_max_streams_uni\", int),\n 10: (\"ack_delay_exponent\", int),\n 11: (\"max_ack_delay\", int),\n 12: (\"disable_active_migration\", bool),\n 13: (\"preferred_address\", QuicPreferredAddress),\n 14: (\"active_connection_id_limit\", int),\n 32: (\"max_datagram_frame_size\", int),\n 3127: (\"quantum_readiness\", bytes),\n }\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n original_connection_id: Optional[bytes] = None\n idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n + max_udp_payload_size: Optional[int] = None\n - max_packet_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n "}}},{"rowIdx":4148,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params_unknown_legacy"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"acf5133b0a3c5e02a5fce79a806e6522a2baae2d"},"commit_message":{"kind":"string","value":"[parameters] rename 'max_packet_size' to 'max_udp_payload_size'"},"ground_truth":{"kind":"string","value":"<18>: max_udp_payload_size=4096,\n max_packet_size=4096,\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_unknown_legacy(self):\n <0> # fb.mvfst.net sends a proprietary parameter 65280\n <1> data = binascii.unhexlify(\n <2> \"006400050004800104000006000480010400000700048001040000040004801\"\n <3> \"0000000080008c0000000ffffffff00090008c0000000ffffffff0001000480\"\n <4> \"00ea60000a00010300030002500000020010616161616262626263636363646\"\n <5> \"46464ff00000100\"\n <6> )\n <7> \n <8> # parse\n <9> buf = Buffer(data=data)\n<10> params = pull_quic_transport_parameters(\n<11> buf, protocol_version=QuicProtocolVersion.DRAFT_25\n<12> )\n<13> self.assertEqual(\n<14> params,\n<15> QuicTransportParameters(\n<16> idle_timeout=60000,\n<17> stateless_reset_token=b\"aaaabbbbccccdddd\",\n<18> max_packet_size=4096,\n<19> initial_max_data=1048576,\n<20> initial_max_stream_data_bidi_local=66560,\n<21> initial_max_stream_data_bidi_remote=66560,\n<22> initial_max_stream_data_uni=66560,\n<23> initial_max_streams_bidi=4294967295,\n<24> initial_max_streams_uni=4294967295,\n<25> ack_delay_exponent=3,\n<26> ),\n<27> )\n<28> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_legacy(self):\n data = binascii.unhexlify(\n \"004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026\"\n \"710000600048000ffff000500048000ffff000400048005fffa000a00010300\"\n \"0b0001190003000247e4\"\n )\n \n # parse\n buf = Buffer(data=data)\n params = pull_quic_transport_parameters(\n buf, protocol_version=QuicProtocolVersion.DRAFT_25\n )\n self.assertEqual(\n params,\n QuicTransportParameters(\n idle_timeout=10000,\n stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n + max_udp_payload_size=2020,\n - max_packet_size=2020,\n initial_max_data=393210,\n initial_max_stream_data_bidi_local=65535,\n initial_max_stream_data_bidi_remote=65535,\n initial_max_stream_data_uni=None,\n initial_max_streams_bidi=6,\n initial_max_streams_uni=None,\n ack_delay_exponent=3,\n max_ack_delay=25,\n ),\n )\n \n # serialize\n buf = Buffer(capacity=len(data))\n push_quic_transport_parameters(\n buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n )\n self.assertEqual(len(buf.data), len(data))\n \n===========changed ref 1===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params(self):\n data = binascii.unhexlify(\n \"010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff\"\n \"a05048000ffff06048000ffff0801060a01030b0119\"\n )\n \n # parse\n buf = Buffer(data=data)\n params = pull_quic_transport_parameters(\n buf, protocol_version=QuicProtocolVersion.DRAFT_27\n )\n self.assertEqual(\n params,\n QuicTransportParameters(\n idle_timeout=10000,\n stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n + max_udp_payload_size=2020,\n - max_packet_size=2020,\n initial_max_data=393210,\n initial_max_stream_data_bidi_local=65535,\n initial_max_stream_data_bidi_remote=65535,\n initial_max_stream_data_uni=None,\n initial_max_streams_bidi=6,\n initial_max_streams_uni=None,\n ack_delay_exponent=3,\n max_ack_delay=25,\n ),\n )\n \n # serialize\n buf = Buffer(capacity=len(data))\n push_quic_transport_parameters(\n buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n )\n self.assertEqual(len(buf.data), len(data))\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n PARAMS = {\n 0: (\"original_connection_id\", bytes),\n 1: (\"idle_timeout\", int),\n 2: (\"stateless_reset_token\", bytes),\n + 3: (\"max_udp_payload_size\", int),\n - 3: (\"max_packet_size\", int),\n 4: (\"initial_max_data\", int),\n 5: (\"initial_max_stream_data_bidi_local\", int),\n 6: (\"initial_max_stream_data_bidi_remote\", int),\n 7: (\"initial_max_stream_data_uni\", int),\n 8: (\"initial_max_streams_bidi\", int),\n 9: (\"initial_max_streams_uni\", int),\n 10: (\"ack_delay_exponent\", int),\n 11: (\"max_ack_delay\", int),\n 12: (\"disable_active_migration\", bool),\n 13: (\"preferred_address\", QuicPreferredAddress),\n 14: (\"active_connection_id_limit\", int),\n 32: (\"max_datagram_frame_size\", int),\n 3127: (\"quantum_readiness\", bytes),\n }\n \n===========changed ref 3===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n original_connection_id: Optional[bytes] = None\n idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n + max_udp_payload_size: Optional[int] = None\n - max_packet_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n "}}},{"rowIdx":4149,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1"},"commit_message":{"kind":"string","value":"[parameters] rename 'idle_timeout' to 'max_idle_timeout'"},"ground_truth":{"kind":"string","value":"<13>: max_idle_timeout=10000,\n idle_timeout=10000,\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params(self):\n <0> data = binascii.unhexlify(\n <1> \"010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff\"\n <2> \"a05048000ffff06048000ffff0801060a01030b0119\"\n <3> )\n <4> \n <5> # parse\n <6> buf = Buffer(data=data)\n <7> params = pull_quic_transport_parameters(\n <8> buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <9> )\n<10> self.assertEqual(\n<11> params,\n<12> QuicTransportParameters(\n<13> idle_timeout=10000,\n<14> stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n<15> max_udp_payload_size=2020,\n<16> initial_max_data=393210,\n<17> initial_max_stream_data_bidi_local=65535,\n<18> initial_max_stream_data_bidi_remote=65535,\n<19> initial_max_stream_data_uni=None,\n<20> initial_max_streams_bidi=6,\n<21> initial_max_streams_uni=None,\n<22> ack_delay_exponent=3,\n<23> max_ack_delay=25,\n<24> ),\n<25> )\n<26> \n<27> # serialize\n<28> buf = Buffer(capacity=len(data))\n<29> push_quic_transport_parameters(\n<30> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n<31> )\n<32> self.assertEqual(len(buf.data), len(data))\n<33> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.test_packet.ParamsTest\n maxDiff = None\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n PARAMS = {\n 0: (\"original_connection_id\", bytes),\n + 1: (\"max_idle_timeout\", int),\n - 1: (\"idle_timeout\", int),\n 2: (\"stateless_reset_token\", bytes),\n 3: (\"max_udp_payload_size\", int),\n 4: (\"initial_max_data\", int),\n 5: (\"initial_max_stream_data_bidi_local\", int),\n 6: (\"initial_max_stream_data_bidi_remote\", int),\n 7: (\"initial_max_stream_data_uni\", int),\n 8: (\"initial_max_streams_bidi\", int),\n 9: (\"initial_max_streams_uni\", int),\n 10: (\"ack_delay_exponent\", int),\n 11: (\"max_ack_delay\", int),\n 12: (\"disable_active_migration\", bool),\n 13: (\"preferred_address\", QuicPreferredAddress),\n 14: (\"active_connection_id_limit\", int),\n 32: (\"max_datagram_frame_size\", int),\n 3127: (\"quantum_readiness\", bytes),\n }\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n original_connection_id: Optional[bytes] = None\n + max_idle_timeout: Optional[int] = None\n - idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n "}}},{"rowIdx":4150,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params_legacy"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1"},"commit_message":{"kind":"string","value":"[parameters] rename 'idle_timeout' to 'max_idle_timeout'"},"ground_truth":{"kind":"string","value":"<14>: max_idle_timeout=10000,\n idle_timeout=10000,\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_legacy(self):\n <0> data = binascii.unhexlify(\n <1> \"004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026\"\n <2> \"710000600048000ffff000500048000ffff000400048005fffa000a00010300\"\n <3> \"0b0001190003000247e4\"\n <4> )\n <5> \n <6> # parse\n <7> buf = Buffer(data=data)\n <8> params = pull_quic_transport_parameters(\n <9> buf, protocol_version=QuicProtocolVersion.DRAFT_25\n<10> )\n<11> self.assertEqual(\n<12> params,\n<13> QuicTransportParameters(\n<14> idle_timeout=10000,\n<15> stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n<16> max_udp_payload_size=2020,\n<17> initial_max_data=393210,\n<18> initial_max_stream_data_bidi_local=65535,\n<19> initial_max_stream_data_bidi_remote=65535,\n<20> initial_max_stream_data_uni=None,\n<21> initial_max_streams_bidi=6,\n<22> initial_max_streams_uni=None,\n<23> ack_delay_exponent=3,\n<24> max_ack_delay=25,\n<25> ),\n<26> )\n<27> \n<28> # serialize\n<29> buf = Buffer(capacity=len(data))\n<30> push_quic_transport_parameters(\n<31> buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n<32> )\n<33> self.assertEqual(len(buf.data), len(data))\n<34> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params(self):\n data = binascii.unhexlify(\n \"010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff\"\n \"a05048000ffff06048000ffff0801060a01030b0119\"\n )\n \n # parse\n buf = Buffer(data=data)\n params = pull_quic_transport_parameters(\n buf, protocol_version=QuicProtocolVersion.DRAFT_27\n )\n self.assertEqual(\n params,\n QuicTransportParameters(\n + max_idle_timeout=10000,\n - idle_timeout=10000,\n stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n max_udp_payload_size=2020,\n initial_max_data=393210,\n initial_max_stream_data_bidi_local=65535,\n initial_max_stream_data_bidi_remote=65535,\n initial_max_stream_data_uni=None,\n initial_max_streams_bidi=6,\n initial_max_streams_uni=None,\n ack_delay_exponent=3,\n max_ack_delay=25,\n ),\n )\n \n # serialize\n buf = Buffer(capacity=len(data))\n push_quic_transport_parameters(\n buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n )\n self.assertEqual(len(buf.data), len(data))\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n PARAMS = {\n 0: (\"original_connection_id\", bytes),\n + 1: (\"max_idle_timeout\", int),\n - 1: (\"idle_timeout\", int),\n 2: (\"stateless_reset_token\", bytes),\n 3: (\"max_udp_payload_size\", int),\n 4: (\"initial_max_data\", int),\n 5: (\"initial_max_stream_data_bidi_local\", int),\n 6: (\"initial_max_stream_data_bidi_remote\", int),\n 7: (\"initial_max_stream_data_uni\", int),\n 8: (\"initial_max_streams_bidi\", int),\n 9: (\"initial_max_streams_uni\", int),\n 10: (\"ack_delay_exponent\", int),\n 11: (\"max_ack_delay\", int),\n 12: (\"disable_active_migration\", bool),\n 13: (\"preferred_address\", QuicPreferredAddress),\n 14: (\"active_connection_id_limit\", int),\n 32: (\"max_datagram_frame_size\", int),\n 3127: (\"quantum_readiness\", bytes),\n }\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n original_connection_id: Optional[bytes] = None\n + max_idle_timeout: Optional[int] = None\n - idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n "}}},{"rowIdx":4151,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params_unknown_legacy"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1"},"commit_message":{"kind":"string","value":"[parameters] rename 'idle_timeout' to 'max_idle_timeout'"},"ground_truth":{"kind":"string","value":"<16>: max_idle_timeout=60000,\n idle_timeout=60000,\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_unknown_legacy(self):\n <0> # fb.mvfst.net sends a proprietary parameter 65280\n <1> data = binascii.unhexlify(\n <2> \"006400050004800104000006000480010400000700048001040000040004801\"\n <3> \"0000000080008c0000000ffffffff00090008c0000000ffffffff0001000480\"\n <4> \"00ea60000a00010300030002500000020010616161616262626263636363646\"\n <5> \"46464ff00000100\"\n <6> )\n <7> \n <8> # parse\n <9> buf = Buffer(data=data)\n<10> params = pull_quic_transport_parameters(\n<11> buf, protocol_version=QuicProtocolVersion.DRAFT_25\n<12> )\n<13> self.assertEqual(\n<14> params,\n<15> QuicTransportParameters(\n<16> idle_timeout=60000,\n<17> stateless_reset_token=b\"aaaabbbbccccdddd\",\n<18> max_udp_payload_size=4096,\n<19> initial_max_data=1048576,\n<20> initial_max_stream_data_bidi_local=66560,\n<21> initial_max_stream_data_bidi_remote=66560,\n<22> initial_max_stream_data_uni=66560,\n<23> initial_max_streams_bidi=4294967295,\n<24> initial_max_streams_uni=4294967295,\n<25> ack_delay_exponent=3,\n<26> ),\n<27> )\n<28> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_legacy(self):\n data = binascii.unhexlify(\n \"004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026\"\n \"710000600048000ffff000500048000ffff000400048005fffa000a00010300\"\n \"0b0001190003000247e4\"\n )\n \n # parse\n buf = Buffer(data=data)\n params = pull_quic_transport_parameters(\n buf, protocol_version=QuicProtocolVersion.DRAFT_25\n )\n self.assertEqual(\n params,\n QuicTransportParameters(\n + max_idle_timeout=10000,\n - idle_timeout=10000,\n stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n max_udp_payload_size=2020,\n initial_max_data=393210,\n initial_max_stream_data_bidi_local=65535,\n initial_max_stream_data_bidi_remote=65535,\n initial_max_stream_data_uni=None,\n initial_max_streams_bidi=6,\n initial_max_streams_uni=None,\n ack_delay_exponent=3,\n max_ack_delay=25,\n ),\n )\n \n # serialize\n buf = Buffer(capacity=len(data))\n push_quic_transport_parameters(\n buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n )\n self.assertEqual(len(buf.data), len(data))\n \n===========changed ref 1===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params(self):\n data = binascii.unhexlify(\n \"010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff\"\n \"a05048000ffff06048000ffff0801060a01030b0119\"\n )\n \n # parse\n buf = Buffer(data=data)\n params = pull_quic_transport_parameters(\n buf, protocol_version=QuicProtocolVersion.DRAFT_27\n )\n self.assertEqual(\n params,\n QuicTransportParameters(\n + max_idle_timeout=10000,\n - idle_timeout=10000,\n stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n max_udp_payload_size=2020,\n initial_max_data=393210,\n initial_max_stream_data_bidi_local=65535,\n initial_max_stream_data_bidi_remote=65535,\n initial_max_stream_data_uni=None,\n initial_max_streams_bidi=6,\n initial_max_streams_uni=None,\n ack_delay_exponent=3,\n max_ack_delay=25,\n ),\n )\n \n # serialize\n buf = Buffer(capacity=len(data))\n push_quic_transport_parameters(\n buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n )\n self.assertEqual(len(buf.data), len(data))\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n PARAMS = {\n 0: (\"original_connection_id\", bytes),\n + 1: (\"max_idle_timeout\", int),\n - 1: (\"idle_timeout\", int),\n 2: (\"stateless_reset_token\", bytes),\n 3: (\"max_udp_payload_size\", int),\n 4: (\"initial_max_data\", int),\n 5: (\"initial_max_stream_data_bidi_local\", int),\n 6: (\"initial_max_stream_data_bidi_remote\", int),\n 7: (\"initial_max_stream_data_uni\", int),\n 8: (\"initial_max_streams_bidi\", int),\n 9: (\"initial_max_streams_uni\", int),\n 10: (\"ack_delay_exponent\", int),\n 11: (\"max_ack_delay\", int),\n 12: (\"disable_active_migration\", bool),\n 13: (\"preferred_address\", QuicPreferredAddress),\n 14: (\"active_connection_id_limit\", int),\n 32: (\"max_datagram_frame_size\", int),\n 3127: (\"quantum_readiness\", bytes),\n }\n \n===========changed ref 3===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n original_connection_id: Optional[bytes] = None\n + max_idle_timeout: Optional[int] = None\n - idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n "}}},{"rowIdx":4152,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1"},"commit_message":{"kind":"string","value":"[parameters] rename 'idle_timeout' to 'max_idle_timeout'"},"ground_truth":{"kind":"string","value":""},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n <0> \"\"\"\n <1> Parse and apply remote transport parameters.\n <2> \n <3> `from_session_ticket` is `True` when restoring saved transport parameters,\n <4> and `False` when handling received transport parameters.\n <5> \"\"\"\n <6> \n <7> quic_transport_parameters = pull_quic_transport_parameters(\n <8> Buffer(data=data), protocol_version=self._version\n <9> )\n<10> \n<11> # log event\n<12> if self._quic_logger is not None and not from_session_ticket:\n<13> self._quic_logger.log_event(\n<14> category=\"transport\",\n<15> event=\"parameters_set\",\n<16> data=self._quic_logger.encode_transport_parameters(\n<17> owner=\"remote\", parameters=quic_transport_parameters\n<18> ),\n<19> )\n<20> \n<21> # validate remote parameters\n<22> if (\n<23> self._is_client\n<24> and not from_session_ticket\n<25> and (\n<26> quic_transport_parameters.original_connection_id\n<27> != self._original_connection_id\n<28> )\n<29> ):\n<30> raise QuicConnectionError(\n<31> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<32> frame_type=QuicFrameType.CRYPTO,\n<33> reason_phrase=\"original_connection_id does not match\",\n<34> )\n<35> if (\n<36> quic_transport_parameters.active_connection_id_limit is not None\n<37> and quic_transport_parameters.active_connection_id_limit < 2\n<38> ):\n<39> raise QuicConnectionError(\n<40> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<41> frame_type=QuicFrameType.CRYPTO,\n<42> reason_phrase=\"active_connection_id_limit must be no less than 2\",\n<43> )\n<44> \n<45> # store remote parameters\n<46> if not from_"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n if quic_transport_parameters.ack_delay_exponent is not None:\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = (\n quic_transport_parameters.max_ack_delay / 1000.0\n )\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n if quic_transport_parameters.idle_timeout is not None:\n self._remote_idle_timeout = quic_transport_parameters.idle_timeout / 1000.0\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str)\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._is_client = configuration.is_client\n \n self._original_connection_id = original_connection_id\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client, odcid=logger_connection_id\n )\n \n self._remote_ack_delay_exponent = 3\n \n self._remote_active_connection_id_limit = 0\n \n self._remote_max_idle_timeout = 0.0 # seconds\n \n self._remote_max_datagram_frame_size: Optional[int] = None\n \n self._version: Optional[int] = None\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n at: aioquic.quic.connection.QuicConnection.connect\n self._version = self._configuration.supported_versions[0]\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._version = QuicProtocolVersion(header.version)\n self._version = QuicProtocolVersion(max(common))\n \n self._original_connection_id = self._peer_cid\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n PARAMS = {\n 0: (\"original_connection_id\", bytes),\n + 1: (\"max_idle_timeout\", int),\n - 1: (\"idle_timeout\", int),\n 2: (\"stateless_reset_token\", bytes),\n 3: (\"max_udp_payload_size\", int),\n 4: (\"initial_max_data\", int),\n 5: (\"initial_max_stream_data_bidi_local\", int),\n 6: (\"initial_max_stream_data_bidi_remote\", int),\n 7: (\"initial_max_stream_data_uni\", int),\n 8: (\"initial_max_streams_bidi\", int),\n 9: (\"initial_max_streams_uni\", int),\n 10: (\"ack_delay_exponent\", int),\n 11: (\"max_ack_delay\", int),\n 12: (\"disable_active_migration\", bool),\n 13: (\"preferred_address\", QuicPreferredAddress),\n 14: (\"active_connection_id_limit\", int),\n 32: (\"max_datagram_frame_size\", int),\n 3127: (\"quantum_readiness\", bytes),\n }\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n original_connection_id: Optional[bytes] = None\n + max_idle_timeout: Optional[int] = None\n - idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n \n===========changed ref 2===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_unknown_legacy(self):\n # fb.mvfst.net sends a proprietary parameter 65280\n data = binascii.unhexlify(\n \"006400050004800104000006000480010400000700048001040000040004801\"\n \"0000000080008c0000000ffffffff00090008c0000000ffffffff0001000480\"\n \"00ea60000a00010300030002500000020010616161616262626263636363646\"\n \"46464ff00000100\"\n )\n \n # parse\n buf = Buffer(data=data)\n params = pull_quic_transport_parameters(\n buf, protocol_version=QuicProtocolVersion.DRAFT_25\n )\n self.assertEqual(\n params,\n QuicTransportParameters(\n + max_idle_timeout=60000,\n - idle_timeout=60000,\n stateless_reset_token=b\"aaaabbbbccccdddd\",\n max_udp_payload_size=4096,\n initial_max_data=1048576,\n initial_max_stream_data_bidi_local=66560,\n initial_max_stream_data_bidi_remote=66560,\n initial_max_stream_data_uni=66560,\n initial_max_streams_bidi=4294967295,\n initial_max_streams_uni=4294967295,\n ack_delay_exponent=3,\n ),\n )\n "}}},{"rowIdx":4153,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._serialize_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1"},"commit_message":{"kind":"string","value":"[parameters] rename 'idle_timeout' to 'max_idle_timeout'"},"ground_truth":{"kind":"string","value":" <3>: max_idle_timeout=int(self._configuration.idle_timeout * 1000),\n idle_timeout=int(self._configuration.idle_timeout * 1000),\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n <0> quic_transport_parameters = QuicTransportParameters(\n <1> ack_delay_exponent=self._local_ack_delay_exponent,\n <2> active_connection_id_limit=self._local_active_connection_id_limit,\n <3> idle_timeout=int(self._configuration.idle_timeout * 1000),\n <4> initial_max_data=self._local_max_data,\n <5> initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local,\n <6> initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote,\n <7> initial_max_stream_data_uni=self._local_max_stream_data_uni,\n <8> initial_max_streams_bidi=self._local_max_streams_bidi,\n <9> initial_max_streams_uni=self._local_max_streams_uni,\n<10> max_ack_delay=25,\n<11> max_datagram_frame_size=self._configuration.max_datagram_frame_size,\n<12> quantum_readiness=b\"Q\" * 1200\n<13> if self._configuration.quantum_readiness_test\n<14> else None,\n<15> )\n<16> if not self._is_client:\n<17> quic_transport_parameters.original_connection_id = (\n<18> self._original_connection_id\n<19> )\n<20> \n<21> # log event\n<22> if self._quic_logger is not None:\n<23> self._quic_logger.log_event(\n<24> category=\"transport\",\n<25> event=\"parameters_set\",\n<26> data=self._quic_logger.encode_transport_parameters(\n<27> owner=\"local\", parameters=quic_transport_parameters\n<28> ),\n<29> )\n<30> \n<31> buf = Buffer(capacity=3 * PACKET_MAX_SIZE)\n<32> push_quic_transport_parameters(\n<33> buf, qu"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n # offset: 1\n )\n return buf.data\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection.QuicConnection.__init__\n self._configuration = configuration\n \n self._is_client = configuration.is_client\n \n self._local_ack_delay_exponent = 3\n \n self._local_active_connection_id_limit = 8\n \n self._local_max_data = configuration.max_data\n \n self._local_max_stream_data_bidi_local = configuration.max_stream_data\n \n self._local_max_stream_data_bidi_remote = configuration.max_stream_data\n \n self._local_max_stream_data_uni = configuration.max_stream_data\n \n self._local_max_streams_bidi = 128\n \n self._local_max_streams_uni = 128\n \n self._original_connection_id = original_connection_id\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client, odcid=logger_connection_id\n )\n \n self._version: Optional[int] = None\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n at: aioquic.quic.connection.QuicConnection._parse_transport_parameters\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n \n at: aioquic.quic.connection.QuicConnection._write_connection_limits\n self._local_max_data *= 2\n \n at: aioquic.quic.connection.QuicConnection.connect\n self._version = self._configuration.supported_versions[0]\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._version = QuicProtocolVersion(header.version)\n self._version = QuicProtocolVersion(max(common))\n \n self._original_connection_id = self._peer_cid\n \n \n===========changed ref 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n \"\"\"\n Parse and apply remote transport parameters.\n \n `from_session_ticket` is `True` when restoring saved transport parameters,\n and `False` when handling received transport parameters.\n \"\"\"\n \n quic_transport_parameters = pull_quic_transport_parameters(\n Buffer(data=data), protocol_version=self._version\n )\n \n # log event\n if self._quic_logger is not None and not from_session_ticket:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"parameters_set\",\n data=self._quic_logger.encode_transport_parameters(\n owner=\"remote\", parameters=quic_transport_parameters\n ),\n )\n \n # validate remote parameters\n if (\n self._is_client\n and not from_session_ticket\n and (\n quic_transport_parameters.original_connection_id\n != self._original_connection_id\n )\n ):\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"original_connection_id does not match\",\n )\n if (\n quic_transport_parameters.active_connection_id_limit is not None\n and quic_transport_parameters.active_connection_id_limit < 2\n ):\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"active_connection_id_limit must be no less than 2\",\n )\n \n # store remote parameters\n if not from_session_ticket:\n if quic_transport_parameters.ack_delay_exponent is not None:\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if\n===========changed ref 1===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n _exponent is not None:\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = (\n quic_transport_parameters.max_ack_delay / 1000.0\n )\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n + if quic_transport_parameters.max_idle_timeout is not None:\n - if quic_transport_parameters.idle_timeout is not None:\n + self._remote_max_idle_timeout = (\n + quic_transport_parameters.max_idle_timeout / 1000.0\n - self._remote_idle_timeout = quic_transport_parameters.idle_timeout / 1000.0\n + )\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n PARAMS = {\n 0: (\"original_connection_id\", bytes),\n + 1: (\"max_idle_timeout\", int),\n - 1: (\"idle_timeout\", int),\n 2: (\"stateless_reset_token\", bytes),\n 3: (\"max_udp_payload_size\", int),\n 4: (\"initial_max_data\", int),\n 5: (\"initial_max_stream_data_bidi_local\", int),\n 6: (\"initial_max_stream_data_bidi_remote\", int),\n 7: (\"initial_max_stream_data_uni\", int),\n 8: (\"initial_max_streams_bidi\", int),\n 9: (\"initial_max_streams_uni\", int),\n 10: (\"ack_delay_exponent\", int),\n 11: (\"max_ack_delay\", int),\n 12: (\"disable_active_migration\", bool),\n 13: (\"preferred_address\", QuicPreferredAddress),\n 14: (\"active_connection_id_limit\", int),\n 32: (\"max_datagram_frame_size\", int),\n 3127: (\"quantum_readiness\", bytes),\n }\n "}}},{"rowIdx":4154,"cells":{"path":{"kind":"string","value":"tests.test_connection/client_and_server"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":"<15>: server = QuicConnection(\n configuration=server_configuration,\n original_destination_connection_id=client.original_destination_connection_id,\n **server_kwargs\n )\n server = QuicConnection(configuration=server_configuration, **server_kwargs)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n <0> client_configuration = QuicConfiguration(\n <1> is_client=True, quic_logger=QuicLogger(), **client_options\n <2> )\n <3> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n <4> \n <5> client = QuicConnection(configuration=client_configuration, **client_kwargs)\n <6> client._ack_delay = 0\n <7> disable_packet_pacing(client)\n <8> client_patch(client)\n <9> \n<10> server_configuration = QuicConfiguration(\n<11> is_client=False, quic_logger=QuicLogger(), **server_options\n<12> )\n<13> server_configuration.load_cert_chain(server_certfile, server_keyfile)\n<14> \n<15> server = QuicConnection(configuration=server_configuration, **server_kwargs)\n<16> server._ack_delay = 0\n<17> disable_packet_pacing(server)\n<18> server_patch(server)\n<19> \n<20> # perform handshake\n<21> if handshake:\n<22> client.connect(SERVER_ADDR, now=time.time())\n<23> for i in range(3):\n<24> roundtrip(client, server)\n<25> \n<26> yield client, server\n<27> \n<28> # close\n<29> client.close()\n<30> server.close()\n<31> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: contextlib\n contextmanager(func: Callable[..., Iterator[_T]]) -> Callable[..., _GeneratorContextManager[_T]]\n \n at: tests.test_connection\n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n disable_packet_pacing(connection)\n \n roundtrip(sender, receiver)\n \n at: tests.utils\n SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), \"pycacert.pem\")\n \n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n at: time\n time() -> float\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n + original_destination_connection_id: Optional[bytes] = None\n - original_connection_id: Optional[bytes] = None\n max_idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n + initial_source_connection_id: Optional[bytes] = None\n + retry_source_connection_id: Optional[bytes] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n PARAMS = {\n + 0x00: (\"original_destination_connection_id\", bytes),\n - 0: (\"original_connection_id\", bytes),\n + 0x01: (\"max_idle_timeout\", int),\n - 1: (\"max_idle_timeout\", int),\n + 0x02: (\"stateless_reset_token\", bytes),\n - 2: (\"stateless_reset_token\", bytes),\n + 0x03: (\"max_udp_payload_size\", int),\n - 3: (\"max_udp_payload_size\", int),\n + 0x04: (\"initial_max_data\", int),\n - 4: (\"initial_max_data\", int),\n + 0x05: (\"initial_max_stream_data_bidi_local\", int),\n - 5: (\"initial_max_stream_data_bidi_local\", int),\n + 0x06: (\"initial_max_stream_data_bidi_remote\", int),\n - 6: (\"initial_max_stream_data_bidi_remote\", int),\n + 0x07: (\"initial_max_stream_data_uni\", int),\n - 7: (\"initial_max_stream_data_uni\", int),\n + 0x08: (\"initial_max_streams_bidi\", int),\n - 8: (\"initial_max_streams_bidi\", int),\n + 0x09: (\"initial_max_streams_uni\", int),\n - 9: (\"initial_max_streams_uni\", int),\n + 0x0A: (\"ack_delay_exponent\", int),\n - 10: (\"ack_delay_exponent\", int),\n + 0x0B: (\"max_ack_delay\", int),\n - 11: (\"max_ack_delay\", int),\n + 0x0C: (\"disable_active_migration\", bool),\n - 12: (\"disable_active_migration\", bool),\n + 0x0D: (\"preferred_address\", QuicPreferredAddress),\n - 13: (\"preferred_address\", QuicPreferredAddress),\n + 0x0E: (\"active_connection\n===========changed ref 2===========\n # module: aioquic.quic.packet\n # offset: 1\n PreferredAddress),\n - 13: (\"preferred_address\", QuicPreferredAddress),\n + 0x0E: (\"active_connection_id_limit\", int),\n - 14: (\"active_connection_id_limit\", int),\n + 0x0F: (\"initial_source_connection_id\", bytes),\n + 0x10: (\"retry_source_connection_id\", bytes),\n + # extensions\n + 0x0020: (\"max_datagram_frame_size\", int),\n - 32: (\"max_datagram_frame_size\", int),\n + 0x0C37: (\"quantum_readiness\", bytes),\n - 3127: (\"quantum_readiness\", bytes),\n }\n "}}},{"rowIdx":4155,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_connect_with_loss_1"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":"<16>: server = QuicConnection(\n configuration=server_configuration,\n server = QuicConnection(configuration=server_configuration)\n<17>: original_destination_connection_id=client.original_destination_connection_id,\n )\n<37>: self.assertEqual(datagram_sizes(items), [1280, 1050])\n self.assertEqual(datagram_sizes(items), [1280, 1030])\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n <0> \"\"\"\n <1> Check connection is established even in the client's INITIAL is lost.\n <2> \"\"\"\n <3> \n <4> def datagram_sizes(items):\n <5> return [len(x[0]) for x in items]\n <6> \n <7> client_configuration = QuicConfiguration(is_client=True)\n <8> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n <9> \n<10> client = QuicConnection(configuration=client_configuration)\n<11> client._ack_delay = 0\n<12> \n<13> server_configuration = QuicConfiguration(is_client=False)\n<14> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n<15> \n<16> server = QuicConnection(configuration=server_configuration)\n<17> server._ack_delay = 0\n<18> \n<19> # client sends INITIAL\n<20> now = 0.0\n<21> client.connect(SERVER_ADDR, now=now)\n<22> items = client.datagrams_to_send(now=now)\n<23> self.assertEqual(datagram_sizes(items), [1280])\n<24> self.assertEqual(client.get_timer(), 1.0)\n<25> \n<26> # INITIAL is lost\n<27> now = 1.0\n<28> client.handle_timer(now=now)\n<29> items = client.datagrams_to_send(now=now)\n<30> self.assertEqual(datagram_sizes(items), [1280])\n<31> self.assertEqual(client.get_timer(), 3.0)\n<32> \n<33> # server receives INITIAL, sends INITIAL + HANDSHAKE\n<34> now = 1.1\n<35> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n<36> items = server.datagrams_to_send(now=now)\n<37> self.assertEqual(datagram_sizes(items), [1280, 1030])\n<38> self.assertEqual(server.get_timer(), 2.1)\n<39> self.assertEqual"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n # offset: 1\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 2)\n self.assertEqual(type(server.next_event()), events.ProtocolNegotiated)\n self.assertIsNone(server.next_event())\n \n # handshake continues normally\n now = 1.2\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n client.receive_datagram(items[1][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [376])\n self.assertAlmostEqual(client.get_timer(), 1.825)\n self.assertEqual(type(client.next_event()), events.ProtocolNegotiated)\n self.assertEqual(type(client.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(client.next_event()), events.ConnectionIdIssued)\n \n now = 1.3\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [229])\n self.assertAlmostEqual(server.get_timer(), 1.825)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 0)\n self.assertEqual(type(server.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(server.next_event()), events.ConnectionIdIssued)\n \n now = 1.4\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual\n===========below chunk 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n # offset: 2\n ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32])\n self.assertAlmostEqual(client.get_timer(), 61.4) # idle timeout\n \n \n===========unchanged ref 0===========\n at: tests.test_connection\n CLIENT_ADDR = (\"1.2.3.4\", 1234)\n \n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n at: tests.utils\n SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), \"pycacert.pem\")\n \n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertIsNone(obj: Any, msg: Any=...) -> None\n \n assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None\n assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=client.original_destination_connection_id,\n + **server_kwargs\n + )\n - server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n + original_destination_connection_id: Optional[bytes] = None\n - original_connection_id: Optional[bytes] = None\n max_idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n + initial_source_connection_id: Optional[bytes] = None\n + retry_source_connection_id: Optional[bytes] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n "}}},{"rowIdx":4156,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_connect_with_loss_2"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":"<12>: server = QuicConnection(\n configuration=server_configuration,\n server = QuicConnection(configuration=server_configuration)\n<13>: original_destination_connection_id=client.original_destination_connection_id,\n )\n<26>: self.assertEqual(datagram_sizes(items), [1280, 1050])\n self.assertEqual(datagram_sizes(items), [1280, 1030])\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_2(self):\n <0> def datagram_sizes(items):\n <1> return [len(x[0]) for x in items]\n <2> \n <3> client_configuration = QuicConfiguration(is_client=True)\n <4> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n <5> \n <6> client = QuicConnection(configuration=client_configuration)\n <7> client._ack_delay = 0\n <8> \n <9> server_configuration = QuicConfiguration(is_client=False)\n<10> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n<11> \n<12> server = QuicConnection(configuration=server_configuration)\n<13> server._ack_delay = 0\n<14> \n<15> # client sends INITIAL\n<16> now = 0.0\n<17> client.connect(SERVER_ADDR, now=now)\n<18> items = client.datagrams_to_send(now=now)\n<19> self.assertEqual(datagram_sizes(items), [1280])\n<20> self.assertEqual(client.get_timer(), 1.0)\n<21> \n<22> # server receives INITIAL, sends INITIAL + HANDSHAKE but second datagram is lost\n<23> now = 0.1\n<24> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n<25> items = server.datagrams_to_send(now=now)\n<26> self.assertEqual(datagram_sizes(items), [1280, 1030])\n<27> self.assertEqual(server.get_timer(), 1.1)\n<28> self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)\n<29> self.assertEqual(len(server._loss.spaces[1].sent_packets), 2)\n<30> \n<31> # client only receives first datagram and sends ACKS\n<32> now = 0.2\n<33> client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n<34> items = client.datagrams_to_send(now="},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_2(self):\n # offset: 1\n self.assertEqual(datagram_sizes(items), [97])\n self.assertAlmostEqual(client.get_timer(), 0.625)\n self.assertEqual(type(client.next_event()), events.ProtocolNegotiated)\n self.assertIsNone(client.next_event())\n \n # client PTO - HANDSHAKE PING\n now = client.get_timer() # ~0.625\n client.handle_timer(now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [44])\n self.assertAlmostEqual(client.get_timer(), 1.875)\n \n # server receives PING, discards INITIAL and sends ACK\n now = 0.725\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [48])\n self.assertAlmostEqual(server.get_timer(), 1.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 3)\n self.assertEqual(type(server.next_event()), events.ProtocolNegotiated)\n self.assertIsNone(server.next_event())\n \n # ACKs are lost, server retransmits HANDSHAKE\n now = server.get_timer()\n server.handle_timer(now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280, 854])\n self.assertAlmostEqual(server.get_timer(), 3.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n \n===========below chunk 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_2(self):\n # offset: 2\n (), 3.1)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 3)\n self.assertIsNone(server.next_event())\n \n # handshake continues normally\n now = 1.2\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n client.receive_datagram(items[1][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [329])\n self.assertAlmostEqual(client.get_timer(), 2.45)\n self.assertEqual(type(client.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(client.next_event()), events.ConnectionIdIssued)\n \n now = 1.3\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [229])\n self.assertAlmostEqual(server.get_timer(), 1.925)\n self.assertEqual(type(server.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(server.next_event()), events.ConnectionIdIssued)\n \n now = 1.4\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32])\n self.assertAlmostEqual(client.get_timer(), 61.4)\n===========unchanged ref 0===========\n at: tests.test_connection\n CLIENT_ADDR = (\"1.2.3.4\", 1234)\n \n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n at: tests.utils\n SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), \"pycacert.pem\")\n \n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertIsNone(obj: Any, msg: Any=...) -> None\n \n assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None\n assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=client.original_destination_connection_id,\n + **server_kwargs\n + )\n - server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n "}}},{"rowIdx":4157,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_connect_with_loss_3"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":"<12>: server = QuicConnection(\n configuration=server_configuration,\n server = QuicConnection(configuration=server_configuration)\n<13>: original_destination_connection_id=client.original_destination_connection_id,\n )\n<26>: self.assertEqual(datagram_sizes(items), [1280, 1050])\n self.assertEqual(datagram_sizes(items), [1280, 1030])\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_3(self):\n <0> def datagram_sizes(items):\n <1> return [len(x[0]) for x in items]\n <2> \n <3> client_configuration = QuicConfiguration(is_client=True)\n <4> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n <5> \n <6> client = QuicConnection(configuration=client_configuration)\n <7> client._ack_delay = 0\n <8> \n <9> server_configuration = QuicConfiguration(is_client=False)\n<10> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n<11> \n<12> server = QuicConnection(configuration=server_configuration)\n<13> server._ack_delay = 0\n<14> \n<15> # client sends INITIAL\n<16> now = 0.0\n<17> client.connect(SERVER_ADDR, now=now)\n<18> items = client.datagrams_to_send(now=now)\n<19> self.assertEqual(datagram_sizes(items), [1280])\n<20> self.assertEqual(client.get_timer(), 1.0)\n<21> \n<22> # server receives INITIAL, sends INITIAL + HANDSHAKE\n<23> now = 0.1\n<24> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n<25> items = server.datagrams_to_send(now=now)\n<26> self.assertEqual(datagram_sizes(items), [1280, 1030])\n<27> self.assertEqual(server.get_timer(), 1.1)\n<28> self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)\n<29> self.assertEqual(len(server._loss.spaces[1].sent_packets), 2)\n<30> \n<31> # client receives INITIAL + HANDSHAKE\n<32> now = 0.2\n<33> client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n<34> client.receive_datagram(items[1][0], SERVER_ADDR, now=now)\n<35> "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_3(self):\n # offset: 1\n self.assertEqual(datagram_sizes(items), [376])\n self.assertAlmostEqual(client.get_timer(), 0.825)\n self.assertEqual(type(client.next_event()), events.ProtocolNegotiated)\n self.assertEqual(type(client.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(client.next_event()), events.ConnectionIdIssued)\n \n # server completes handshake\n now = 0.3\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [229])\n self.assertAlmostEqual(server.get_timer(), 0.825)\n self.assertEqual(len(server._loss.spaces[0].sent_packets), 0)\n self.assertEqual(len(server._loss.spaces[1].sent_packets), 0)\n self.assertEqual(type(server.next_event()), events.ProtocolNegotiated)\n self.assertEqual(type(server.next_event()), events.HandshakeCompleted)\n self.assertEqual(type(server.next_event()), events.ConnectionIdIssued)\n \n # server PTO - 1-RTT PING\n now = 0.825\n server.handle_timer(now=now)\n items = server.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [29])\n self.assertAlmostEqual(server.get_timer(), 1.875)\n \n # client receives PING, sends ACK\n now = 0.9\n client.receive_datagram(items[0][0], SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32\n===========below chunk 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_3(self):\n # offset: 2\n client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [32])\n self.assertAlmostEqual(client.get_timer(), 0.825)\n \n # server receives ACK, retransmits HANDSHAKE_DONE\n now = 1.0\n self.assertFalse(server._handshake_done_pending)\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n self.assertTrue(server._handshake_done_pending)\n items = server.datagrams_to_send(now=now)\n self.assertFalse(server._handshake_done_pending)\n self.assertEqual(datagram_sizes(items), [224])\n \n \n===========unchanged ref 0===========\n at: tests.test_connection\n CLIENT_ADDR = (\"1.2.3.4\", 1234)\n \n SERVER_ADDR = (\"2.3.4.5\", 4433)\n \n at: tests.utils\n SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), \"pycacert.pem\")\n \n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n assertFalse(expr: Any, msg: Any=...) -> None\n \n assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None\n assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=client.original_destination_connection_id,\n + **server_kwargs\n + )\n - server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_connect_with_loss_1(self):\n \"\"\"\n Check connection is established even in the client's INITIAL is lost.\n \"\"\"\n \n def datagram_sizes(items):\n return [len(x[0]) for x in items]\n \n client_configuration = QuicConfiguration(is_client=True)\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration)\n client._ack_delay = 0\n \n server_configuration = QuicConfiguration(is_client=False)\n server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n - server = QuicConnection(configuration=server_configuration)\n + original_destination_connection_id=client.original_destination_connection_id,\n + )\n server._ack_delay = 0\n \n # client sends INITIAL\n now = 0.0\n client.connect(SERVER_ADDR, now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 1.0)\n \n # INITIAL is lost\n now = 1.0\n client.handle_timer(now=now)\n items = client.datagrams_to_send(now=now)\n self.assertEqual(datagram_sizes(items), [1280])\n self.assertEqual(client.get_timer(), 3.0)\n \n # server receives INITIAL, sends INITIAL + HANDSHAKE\n now = 1.1\n server.receive_datagram(items[0][0], CLIENT_ADDR, now=now)\n items = server.datagrams_to_send(now=now)\n + self.assertEqual(datagram_sizes(items), [1280, 1050])\n - self.assertEqual(datagram_sizes(items), [1280"}}},{"rowIdx":4158,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":" <5>: QuicTransportParameters(\n QuicTransportParameters(),\n <6>: original_destination_connection_id=client.original_destination_connection_id\n ),\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n <0> client = create_standalone_client(self)\n <1> \n <2> buf = Buffer(capacity=32)\n <3> push_quic_transport_parameters(\n <4> buf,\n <5> QuicTransportParameters(),\n <6> protocol_version=QuicProtocolVersion.DRAFT_27,\n <7> )\n <8> client._parse_transport_parameters(buf.data)\n <9> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n create_standalone_client(self, **client_options)\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n + original_destination_connection_id: Optional[bytes] = None\n - original_connection_id: Optional[bytes] = None\n max_idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n + initial_source_connection_id: Optional[bytes] = None\n + retry_source_connection_id: Optional[bytes] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n \n===========changed ref 1===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=client.original_destination_connection_id,\n + **server_kwargs\n + )\n - server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n PARAMS = {\n + 0x00: (\"original_destination_connection_id\", bytes),\n - 0: (\"original_connection_id\", bytes),\n + 0x01: (\"max_idle_timeout\", int),\n - 1: (\"max_idle_timeout\", int),\n + 0x02: (\"stateless_reset_token\", bytes),\n - 2: (\"stateless_reset_token\", bytes),\n + 0x03: (\"max_udp_payload_size\", int),\n - 3: (\"max_udp_payload_size\", int),\n + 0x04: (\"initial_max_data\", int),\n - 4: (\"initial_max_data\", int),\n + 0x05: (\"initial_max_stream_data_bidi_local\", int),\n - 5: (\"initial_max_stream_data_bidi_local\", int),\n + 0x06: (\"initial_max_stream_data_bidi_remote\", int),\n - 6: (\"initial_max_stream_data_bidi_remote\", int),\n + 0x07: (\"initial_max_stream_data_uni\", int),\n - 7: (\"initial_max_stream_data_uni\", int),\n + 0x08: (\"initial_max_streams_bidi\", int),\n - 8: (\"initial_max_streams_bidi\", int),\n + 0x09: (\"initial_max_streams_uni\", int),\n - 9: (\"initial_max_streams_uni\", int),\n + 0x0A: (\"ack_delay_exponent\", int),\n - 10: (\"ack_delay_exponent\", int),\n + 0x0B: (\"max_ack_delay\", int),\n - 11: (\"max_ack_delay\", int),\n + 0x0C: (\"disable_active_migration\", bool),\n - 12: (\"disable_active_migration\", bool),\n + 0x0D: (\"preferred_address\", QuicPreferredAddress),\n - 13: (\"preferred_address\", QuicPreferredAddress),\n + 0x0E: (\"active_connection\n===========changed ref 3===========\n # module: aioquic.quic.packet\n # offset: 1\n PreferredAddress),\n - 13: (\"preferred_address\", QuicPreferredAddress),\n + 0x0E: (\"active_connection_id_limit\", int),\n - 14: (\"active_connection_id_limit\", int),\n + 0x0F: (\"initial_source_connection_id\", bytes),\n + 0x10: (\"retry_source_connection_id\", bytes),\n + # extensions\n + 0x0020: (\"max_datagram_frame_size\", int),\n - 32: (\"max_datagram_frame_size\", int),\n + 0x0C37: (\"quantum_readiness\", bytes),\n - 3127: (\"quantum_readiness\", bytes),\n }\n "}}},{"rowIdx":4159,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_parse_transport_parameters_with_bad_active_connection_id_limit"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":" <7>: active_connection_id_limit=active_connection_id_limit,\n active_connection_id_limit=active_connection_id_limit\n <8>: original_destination_connection_id=client.original_destination_connection_id,\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n <0> client = create_standalone_client(self)\n <1> \n <2> for active_connection_id_limit in [0, 1]:\n <3> buf = Buffer(capacity=32)\n <4> push_quic_transport_parameters(\n <5> buf,\n <6> QuicTransportParameters(\n <7> active_connection_id_limit=active_connection_id_limit\n <8> ),\n <9> protocol_version=QuicProtocolVersion.DRAFT_27,\n<10> )\n<11> with self.assertRaises(QuicConnectionError) as cm:\n<12> client._parse_transport_parameters(buf.data)\n<13> self.assertEqual(\n<14> cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n<15> )\n<16> self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n<17> self.assertEqual(\n<18> cm.exception.reason_phrase,\n<19> \"active_connection_id_limit must be no less than 2\",\n<20> )\n<21> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n create_standalone_client(self, **client_options)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n at: unittest.case._AssertRaisesContext.__exit__\n self.exception = exc_value.with_traceback(None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n + QuicTransportParameters(\n - QuicTransportParameters(),\n + original_destination_connection_id=client.original_destination_connection_id\n + ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n + original_destination_connection_id: Optional[bytes] = None\n - original_connection_id: Optional[bytes] = None\n max_idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n + initial_source_connection_id: Optional[bytes] = None\n + retry_source_connection_id: Optional[bytes] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n \n===========changed ref 2===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=client.original_destination_connection_id,\n + **server_kwargs\n + )\n - server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n \n===========changed ref 3===========\n # module: aioquic.quic.packet\n PARAMS = {\n + 0x00: (\"original_destination_connection_id\", bytes),\n - 0: (\"original_connection_id\", bytes),\n + 0x01: (\"max_idle_timeout\", int),\n - 1: (\"max_idle_timeout\", int),\n + 0x02: (\"stateless_reset_token\", bytes),\n - 2: (\"stateless_reset_token\", bytes),\n + 0x03: (\"max_udp_payload_size\", int),\n - 3: (\"max_udp_payload_size\", int),\n + 0x04: (\"initial_max_data\", int),\n - 4: (\"initial_max_data\", int),\n + 0x05: (\"initial_max_stream_data_bidi_local\", int),\n - 5: (\"initial_max_stream_data_bidi_local\", int),\n + 0x06: (\"initial_max_stream_data_bidi_remote\", int),\n - 6: (\"initial_max_stream_data_bidi_remote\", int),\n + 0x07: (\"initial_max_stream_data_uni\", int),\n - 7: (\"initial_max_stream_data_uni\", int),\n + 0x08: (\"initial_max_streams_bidi\", int),\n - 8: (\"initial_max_streams_bidi\", int),\n + 0x09: (\"initial_max_streams_uni\", int),\n - 9: (\"initial_max_streams_uni\", int),\n + 0x0A: (\"ack_delay_exponent\", int),\n - 10: (\"ack_delay_exponent\", int),\n + 0x0B: (\"max_ack_delay\", int),\n - 11: (\"max_ack_delay\", int),\n + 0x0C: (\"disable_active_migration\", bool),\n - 12: (\"disable_active_migration\", bool),\n + 0x0D: (\"preferred_address\", QuicPreferredAddress),\n - 13: (\"preferred_address\", QuicPreferredAddress),\n + 0x0E: (\"active_connection\n===========changed ref 4===========\n # module: aioquic.quic.packet\n # offset: 1\n PreferredAddress),\n - 13: (\"preferred_address\", QuicPreferredAddress),\n + 0x0E: (\"active_connection_id_limit\", int),\n - 14: (\"active_connection_id_limit\", int),\n + 0x0F: (\"initial_source_connection_id\", bytes),\n + 0x10: (\"retry_source_connection_id\", bytes),\n + # extensions\n + 0x0020: (\"max_datagram_frame_size\", int),\n - 32: (\"max_datagram_frame_size\", int),\n + 0x0C37: (\"quantum_readiness\", bytes),\n - 3127: (\"quantum_readiness\", bytes),\n }\n "}}},{"rowIdx":4160,"cells":{"path":{"kind":"string","value":"tests.test_retry/QuicRetryTokenHandlerTest.test_retry_token"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":" <1>: original_destination_connection_id = b\"\\x08\\x07\\x06\\05\\x04\\x03\\x02\\x01\"\n cid = b\"\\x08\\x07\\x06\\05\\x04\\x03\\x02\\x01\"\n <2>: retry_source_connection_id = b\"abcdefgh\"\n <6>: token = handler.create_token(\n token = handler.create_token(addr, cid)\n <7>: addr, original_destination_connection_id, retry_source_connection_id\n )\n<10>: self.assertEqual(\n handler.validate_token(addr, token),\n self.assertEqual(handler.validate_token(addr, token), cid)\n<11>: (original_destination_connection_id, retry_source_connection_id),\n )\n"},"main_code":{"kind":"string","value":" # module: tests.test_retry\n class QuicRetryTokenHandlerTest(TestCase):\n def test_retry_token(self):\n <0> addr = (\"127.0.0.1\", 1234)\n <1> cid = b\"\\x08\\x07\\x06\\05\\x04\\x03\\x02\\x01\"\n <2> \n <3> handler = QuicRetryTokenHandler()\n <4> \n <5> # create token\n <6> token = handler.create_token(addr, cid)\n <7> self.assertIsNotNone(token)\n <8> \n <9> # validate token - ok\n<10> self.assertEqual(handler.validate_token(addr, token), cid)\n<11> \n<12> # validate token - empty\n<13> with self.assertRaises(ValueError) as cm:\n<14> handler.validate_token(addr, b\"\")\n<15> self.assertEqual(\n<16> str(cm.exception), \"Ciphertext length must be equal to key size.\"\n<17> )\n<18> \n<19> # validate token - wrong address\n<20> with self.assertRaises(ValueError) as cm:\n<21> handler.validate_token((\"1.2.3.4\", 12345), token)\n<22> self.assertEqual(str(cm.exception), \"Remote address does not match.\")\n<23> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertIsNotNone(obj: Any, msg: Any=...) -> None\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n at: unittest.case._AssertRaisesContext.__exit__\n self.exception = exc_value.with_traceback(None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n + QuicTransportParameters(\n - QuicTransportParameters(),\n + original_destination_connection_id=client.original_destination_connection_id\n + ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n + active_connection_id_limit=active_connection_id_limit,\n - active_connection_id_limit=active_connection_id_limit\n + original_destination_connection_id=client.original_destination_connection_id,\n ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n + original_destination_connection_id: Optional[bytes] = None\n - original_connection_id: Optional[bytes] = None\n max_idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n + initial_source_connection_id: Optional[bytes] = None\n + retry_source_connection_id: Optional[bytes] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n \n===========changed ref 3===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=client.original_destination_connection_id,\n + **server_kwargs\n + )\n - server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n \n===========changed ref 4===========\n # module: aioquic.quic.packet\n PARAMS = {\n + 0x00: (\"original_destination_connection_id\", bytes),\n - 0: (\"original_connection_id\", bytes),\n + 0x01: (\"max_idle_timeout\", int),\n - 1: (\"max_idle_timeout\", int),\n + 0x02: (\"stateless_reset_token\", bytes),\n - 2: (\"stateless_reset_token\", bytes),\n + 0x03: (\"max_udp_payload_size\", int),\n - 3: (\"max_udp_payload_size\", int),\n + 0x04: (\"initial_max_data\", int),\n - 4: (\"initial_max_data\", int),\n + 0x05: (\"initial_max_stream_data_bidi_local\", int),\n - 5: (\"initial_max_stream_data_bidi_local\", int),\n + 0x06: (\"initial_max_stream_data_bidi_remote\", int),\n - 6: (\"initial_max_stream_data_bidi_remote\", int),\n + 0x07: (\"initial_max_stream_data_uni\", int),\n - 7: (\"initial_max_stream_data_uni\", int),\n + 0x08: (\"initial_max_streams_bidi\", int),\n - 8: (\"initial_max_streams_bidi\", int),\n + 0x09: (\"initial_max_streams_uni\", int),\n - 9: (\"initial_max_streams_uni\", int),\n + 0x0A: (\"ack_delay_exponent\", int),\n - 10: (\"ack_delay_exponent\", int),\n + 0x0B: (\"max_ack_delay\", int),\n - 11: (\"max_ack_delay\", int),\n + 0x0C: (\"disable_active_migration\", bool),\n - 12: (\"disable_active_migration\", bool),\n + 0x0D: (\"preferred_address\", QuicPreferredAddress),\n - 13: (\"preferred_address\", QuicPreferredAddress),\n + 0x0E: (\"active_connection"}}},{"rowIdx":4161,"cells":{"path":{"kind":"string","value":"aioquic.quic.retry/QuicRetryTokenHandler.create_token"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":" <0>: retry_message = (\n encode_address(addr)\n + b\"|\"\n + original_destination_connection_id\n + b\"|\"\n + retry_source_connection_id\n )\n retry_message = encode_address(addr) + b\"|\" + destination_cid\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n + def create_token(\n + self,\n + addr: NetworkAddress,\n + original_destination_connection_id: bytes,\n + retry_source_connection_id: bytes,\n + ) -> bytes:\n - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes:\n <0> retry_message = encode_address(addr) + b\"|\" + destination_cid\n <1> return self._key.public_key().encrypt(\n <2> retry_message,\n <3> padding.OAEP(\n <4> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n <5> ),\n <6> )\n <7> \n "},"context":{"kind":"string","value":"===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n + QuicTransportParameters(\n - QuicTransportParameters(),\n + original_destination_connection_id=client.original_destination_connection_id\n + ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 1===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id(\n + self,\n + ):\n + \"\"\"\n + If the server's transport parameters do not have the correct\n + original_destination_connection_id the connection fail.\n + \"\"\"\n + \n + def create_protocol(*args, **kwargs):\n + protocol = QuicConnectionProtocol(*args, **kwargs)\n + protocol._quic._original_destination_connection_id = None\n + return protocol\n + \n + run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n + with self.assertRaises(ConnectionError):\n + run(self.run_client())\n + \n===========changed ref 2===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n - def test_connect_and_serve_with_stateless_retry_bad_original_connection_id(self):\n - \"\"\"\n - If the server's transport parameters do not have the correct\n - original_connection_id the connection fail.\n - \"\"\"\n - \n - def create_protocol(*args, **kwargs):\n - protocol = QuicConnectionProtocol(*args, **kwargs)\n - protocol._quic._original_connection_id = None\n - return protocol\n - \n - run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n - with self.assertRaises(ConnectionError):\n - run(self.run_client())\n - \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n + active_connection_id_limit=active_connection_id_limit,\n - active_connection_id_limit=active_connection_id_limit\n + original_destination_connection_id=client.original_destination_connection_id,\n ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 4===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n + original_destination_connection_id: Optional[bytes] = None\n - original_connection_id: Optional[bytes] = None\n max_idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n + initial_source_connection_id: Optional[bytes] = None\n + retry_source_connection_id: Optional[bytes] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n \n===========changed ref 5===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=client.original_destination_connection_id,\n + **server_kwargs\n + )\n - server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n "}}},{"rowIdx":4162,"cells":{"path":{"kind":"string","value":"aioquic.quic.retry/QuicRetryTokenHandler.validate_token"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":" <6>: (\n encoded_addr,\n original_destination_connection_id,\n retry_source_connection_id,\n ) = retry_message.split(b\"|\", maxsplit=2)\n encoded_addr, original_connection_id = retry_message.split(b\"|\", maxsplit=1)\n <9>: return original_destination_connection_id, retry_source_connection_id\n return original_connection_id\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n + def validate_token(self, addr: NetworkAddress, token: bytes) -> Tuple[bytes, bytes]:\n - def validate_token(self, addr: NetworkAddress, token: bytes) -> bytes:\n <0> retry_message = self._key.decrypt(\n <1> token,\n <2> padding.OAEP(\n <3> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n <4> ),\n <5> )\n <6> encoded_addr, original_connection_id = retry_message.split(b\"|\", maxsplit=1)\n <7> if encoded_addr != encode_address(addr):\n <8> raise ValueError(\"Remote address does not match.\")\n <9> return original_connection_id\n<10> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.quic.retry.QuicRetryTokenHandler.__init__\n self._key = rsa.generate_private_key(\n public_exponent=65537, key_size=1024, backend=default_backend()\n )\n \n at: aioquic.quic.retry.QuicRetryTokenHandler.create_token\n retry_message = (\n encode_address(addr)\n + b\"|\"\n + original_destination_connection_id\n + b\"|\"\n + retry_source_connection_id\n )\n \n \n===========changed ref 0===========\n # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n + def create_token(\n + self,\n + addr: NetworkAddress,\n + original_destination_connection_id: bytes,\n + retry_source_connection_id: bytes,\n + ) -> bytes:\n - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes:\n + retry_message = (\n + encode_address(addr)\n + + b\"|\"\n + + original_destination_connection_id\n + + b\"|\"\n + + retry_source_connection_id\n + )\n - retry_message = encode_address(addr) + b\"|\" + destination_cid\n return self._key.public_key().encrypt(\n retry_message,\n padding.OAEP(\n mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n ),\n )\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n + QuicTransportParameters(\n - QuicTransportParameters(),\n + original_destination_connection_id=client.original_destination_connection_id\n + ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 2===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id(\n + self,\n + ):\n + \"\"\"\n + If the server's transport parameters do not have the correct\n + original_destination_connection_id the connection fail.\n + \"\"\"\n + \n + def create_protocol(*args, **kwargs):\n + protocol = QuicConnectionProtocol(*args, **kwargs)\n + protocol._quic._original_destination_connection_id = None\n + return protocol\n + \n + run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n + with self.assertRaises(ConnectionError):\n + run(self.run_client())\n + \n===========changed ref 3===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n - def test_connect_and_serve_with_stateless_retry_bad_original_connection_id(self):\n - \"\"\"\n - If the server's transport parameters do not have the correct\n - original_connection_id the connection fail.\n - \"\"\"\n - \n - def create_protocol(*args, **kwargs):\n - protocol = QuicConnectionProtocol(*args, **kwargs)\n - protocol._quic._original_connection_id = None\n - return protocol\n - \n - run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n - with self.assertRaises(ConnectionError):\n - run(self.run_client())\n - \n===========changed ref 4===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n + active_connection_id_limit=active_connection_id_limit,\n - active_connection_id_limit=active_connection_id_limit\n + original_destination_connection_id=client.original_destination_connection_id,\n ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 5===========\n # module: aioquic.quic.packet\n @dataclass\n class QuicTransportParameters:\n + original_destination_connection_id: Optional[bytes] = None\n - original_connection_id: Optional[bytes] = None\n max_idle_timeout: Optional[int] = None\n stateless_reset_token: Optional[bytes] = None\n max_udp_payload_size: Optional[int] = None\n initial_max_data: Optional[int] = None\n initial_max_stream_data_bidi_local: Optional[int] = None\n initial_max_stream_data_bidi_remote: Optional[int] = None\n initial_max_stream_data_uni: Optional[int] = None\n initial_max_streams_bidi: Optional[int] = None\n initial_max_streams_uni: Optional[int] = None\n ack_delay_exponent: Optional[int] = None\n max_ack_delay: Optional[int] = None\n disable_active_migration: Optional[bool] = False\n preferred_address: Optional[QuicPreferredAddress] = None\n active_connection_id_limit: Optional[int] = None\n + initial_source_connection_id: Optional[bytes] = None\n + retry_source_connection_id: Optional[bytes] = None\n max_datagram_frame_size: Optional[int] = None\n quantum_readiness: Optional[bytes] = None\n \n===========changed ref 6===========\n # module: tests.test_connection\n @contextlib.contextmanager\n def client_and_server(\n client_kwargs={},\n client_options={},\n client_patch=lambda x: None,\n handshake=True,\n server_kwargs={},\n server_certfile=SERVER_CERTFILE,\n server_keyfile=SERVER_KEYFILE,\n server_options={},\n server_patch=lambda x: None,\n ):\n client_configuration = QuicConfiguration(\n is_client=True, quic_logger=QuicLogger(), **client_options\n )\n client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE)\n \n client = QuicConnection(configuration=client_configuration, **client_kwargs)\n client._ack_delay = 0\n disable_packet_pacing(client)\n client_patch(client)\n \n server_configuration = QuicConfiguration(\n is_client=False, quic_logger=QuicLogger(), **server_options\n )\n server_configuration.load_cert_chain(server_certfile, server_keyfile)\n \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=client.original_destination_connection_id,\n + **server_kwargs\n + )\n - server = QuicConnection(configuration=server_configuration, **server_kwargs)\n server._ack_delay = 0\n disable_packet_pacing(server)\n server_patch(server)\n \n # perform handshake\n if handshake:\n client.connect(SERVER_ADDR, now=time.time())\n for i in range(3):\n roundtrip(client, server)\n \n yield client, server\n \n # close\n client.close()\n server.close()\n "}}},{"rowIdx":4163,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":"<26>: quic_transport_parameters.original_destination_connection_id\n quic_transport_parameters.original_connection_id\n<27>: != self._original_destination_connection_id\n != self._original_connection_id\n<33>: reason_phrase=\"original_destination_connection_id does not match\",\n reason_phrase=\"original_connection_id does not match\",\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n <0> \"\"\"\n <1> Parse and apply remote transport parameters.\n <2> \n <3> `from_session_ticket` is `True` when restoring saved transport parameters,\n <4> and `False` when handling received transport parameters.\n <5> \"\"\"\n <6> \n <7> quic_transport_parameters = pull_quic_transport_parameters(\n <8> Buffer(data=data), protocol_version=self._version\n <9> )\n<10> \n<11> # log event\n<12> if self._quic_logger is not None and not from_session_ticket:\n<13> self._quic_logger.log_event(\n<14> category=\"transport\",\n<15> event=\"parameters_set\",\n<16> data=self._quic_logger.encode_transport_parameters(\n<17> owner=\"remote\", parameters=quic_transport_parameters\n<18> ),\n<19> )\n<20> \n<21> # validate remote parameters\n<22> if (\n<23> self._is_client\n<24> and not from_session_ticket\n<25> and (\n<26> quic_transport_parameters.original_connection_id\n<27> != self._original_connection_id\n<28> )\n<29> ):\n<30> raise QuicConnectionError(\n<31> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<32> frame_type=QuicFrameType.CRYPTO,\n<33> reason_phrase=\"original_connection_id does not match\",\n<34> )\n<35> if (\n<36> quic_transport_parameters.active_connection_id_limit is not None\n<37> and quic_transport_parameters.active_connection_id_limit < 2\n<38> ):\n<39> raise QuicConnectionError(\n<40> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<41> frame_type=QuicFrameType.CRYPTO,\n<42> reason_phrase=\"active_connection_id_limit must be no less than 2\",\n<43> )\n<44> \n<45> # store remote parameters\n<46> if not from_"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n if quic_transport_parameters.ack_delay_exponent is not None:\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = (\n quic_transport_parameters.max_ack_delay / 1000.0\n )\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n if quic_transport_parameters.max_idle_timeout is not None:\n self._remote_max_idle_timeout = (\n quic_transport_parameters.max_idle_timeout / 1000.0\n )\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str)\n \n QuicConnectionId(cid: bytes, sequence_number: int, stateless_reset_token: bytes=b\"\", was_sent: bool=False)\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._configuration = configuration\n \n self._is_client = configuration.is_client\n \n self._crypto_buffers: Dict[tls.Epoch, Buffer] = {}\n \n self._crypto_streams: Dict[tls.Epoch, QuicStream] = {}\n \n self._host_cids = [\n QuicConnectionId(\n cid=os.urandom(configuration.connection_id_length),\n sequence_number=0,\n stateless_reset_token=os.urandom(16),\n was_sent=True,\n )\n ]\n \n self._host_cid_seq = 1\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client,\n odcid=self._original_destination_connection_id,\n )\n \n self._remote_ack_delay_exponent = 3\n \n self._remote_active_connection_id_limit = 0\n \n self._version: Optional[int] = None\n \n self._original_destination_connection_id = self._peer_cid\n self._original_destination_connection_id = (\n original_destination_connection_id\n )\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n self._probe_pending = False\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n \n===========unchanged ref 1===========\n at: aioquic.quic.connection.QuicConnection._initialize\n self._crypto_buffers = {\n tls.Epoch.INITIAL: Buffer(capacity=CRYPTO_BUFFER_SIZE),\n tls.Epoch.HANDSHAKE: Buffer(capacity=CRYPTO_BUFFER_SIZE),\n tls.Epoch.ONE_RTT: Buffer(capacity=CRYPTO_BUFFER_SIZE),\n }\n \n self._crypto_streams = {\n tls.Epoch.INITIAL: QuicStream(),\n tls.Epoch.HANDSHAKE: QuicStream(),\n tls.Epoch.ONE_RTT: QuicStream(),\n }\n \n at: aioquic.quic.connection.QuicConnection._write_application\n self._probe_pending = False\n \n at: aioquic.quic.connection.QuicConnection._write_handshake\n self._probe_pending = False\n \n at: aioquic.quic.connection.QuicConnection.connect\n self._version = self._configuration.supported_versions[0]\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._version = QuicProtocolVersion(header.version)\n self._version = QuicProtocolVersion(max(common))\n \n self._original_destination_connection_id = self._peer_cid\n \n at: aioquic.quic.connection.QuicConnectionId\n cid: bytes\n \n sequence_number: int\n \n stateless_reset_token: bytes = b\"\"\n \n was_sent: bool = False\n \n at: os\n urandom(size: int, /) -> bytes\n \n \n===========changed ref 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n + @property\n + def original_destination_connection_id(self) -> bytes:\n + return self._original_destination_connection_id\n + \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n + QuicTransportParameters(\n - QuicTransportParameters(),\n + original_destination_connection_id=client.original_destination_connection_id\n + ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 2===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id(\n + self,\n + ):\n + \"\"\"\n + If the server's transport parameters do not have the correct\n + original_destination_connection_id the connection fail.\n + \"\"\"\n + \n + def create_protocol(*args, **kwargs):\n + protocol = QuicConnectionProtocol(*args, **kwargs)\n + protocol._quic._original_destination_connection_id = None\n + return protocol\n + \n + run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n + with self.assertRaises(ConnectionError):\n + run(self.run_client())\n + \n===========changed ref 3===========\n # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n + def create_token(\n + self,\n + addr: NetworkAddress,\n + original_destination_connection_id: bytes,\n + retry_source_connection_id: bytes,\n + ) -> bytes:\n - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes:\n + retry_message = (\n + encode_address(addr)\n + + b\"|\"\n + + original_destination_connection_id\n + + b\"|\"\n + + retry_source_connection_id\n + )\n - retry_message = encode_address(addr) + b\"|\" + destination_cid\n return self._key.public_key().encrypt(\n retry_message,\n padding.OAEP(\n mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n ),\n )\n "}}},{"rowIdx":4164,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._serialize_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":"<10>: initial_source_connection_id=self._local_initial_source_connection_id,\n<17>: quic_transport_parameters.original_destination_connection_id = (\n quic_transport_parameters.original_connection_id = (\n<18>: self._original_destination_connection_id\n self._original_connection_id\n<19>: )\n quic_transport_parameters.retry_source_connection_id = (\n self._retry_source_connection_id\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n <0> quic_transport_parameters = QuicTransportParameters(\n <1> ack_delay_exponent=self._local_ack_delay_exponent,\n <2> active_connection_id_limit=self._local_active_connection_id_limit,\n <3> max_idle_timeout=int(self._configuration.idle_timeout * 1000),\n <4> initial_max_data=self._local_max_data,\n <5> initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local,\n <6> initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote,\n <7> initial_max_stream_data_uni=self._local_max_stream_data_uni,\n <8> initial_max_streams_bidi=self._local_max_streams_bidi,\n <9> initial_max_streams_uni=self._local_max_streams_uni,\n<10> max_ack_delay=25,\n<11> max_datagram_frame_size=self._configuration.max_datagram_frame_size,\n<12> quantum_readiness=b\"Q\" * 1200\n<13> if self._configuration.quantum_readiness_test\n<14> else None,\n<15> )\n<16> if not self._is_client:\n<17> quic_transport_parameters.original_connection_id = (\n<18> self._original_connection_id\n<19> )\n<20> \n<21> # log event\n<22> if self._quic_logger is not None:\n<23> self._quic_logger.log_event(\n<24> category=\"transport\",\n<25> event=\"parameters_set\",\n<26> data=self._quic_logger.encode_transport_parameters(\n<27> owner=\"local\", parameters=quic_transport_parameters\n<28> ),\n<29> )\n<30> \n<31> buf = Buffer(capacity=3 * PACKET_MAX_SIZE)\n<32> push_quic_transport_parameters(\n<33> buf"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n # offset: 1\n )\n return buf.data\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection.QuicConnection.__init__\n self._configuration = configuration\n \n self._is_client = configuration.is_client\n \n self._local_ack_delay_exponent = 3\n \n self._local_active_connection_id_limit = 8\n \n self._local_initial_source_connection_id = self._host_cids[0].cid\n \n self._local_max_data = configuration.max_data\n \n self._local_max_stream_data_bidi_local = configuration.max_stream_data\n \n self._local_max_stream_data_bidi_remote = configuration.max_stream_data\n \n self._local_max_stream_data_uni = configuration.max_stream_data\n \n self._local_max_streams_bidi = 128\n \n self._local_max_streams_uni = 128\n \n self._remote_max_datagram_frame_size: Optional[int] = None\n \n at: aioquic.quic.connection.QuicConnection._parse_transport_parameters\n quic_transport_parameters = pull_quic_transport_parameters(\n Buffer(data=data), protocol_version=self._version\n )\n \n at: aioquic.quic.connection.QuicConnection._write_connection_limits\n self._local_max_data *= 2\n \n \n===========changed ref 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n \"\"\"\n Parse and apply remote transport parameters.\n \n `from_session_ticket` is `True` when restoring saved transport parameters,\n and `False` when handling received transport parameters.\n \"\"\"\n \n quic_transport_parameters = pull_quic_transport_parameters(\n Buffer(data=data), protocol_version=self._version\n )\n \n # log event\n if self._quic_logger is not None and not from_session_ticket:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"parameters_set\",\n data=self._quic_logger.encode_transport_parameters(\n owner=\"remote\", parameters=quic_transport_parameters\n ),\n )\n \n # validate remote parameters\n if (\n self._is_client\n and not from_session_ticket\n and (\n + quic_transport_parameters.original_destination_connection_id\n - quic_transport_parameters.original_connection_id\n + != self._original_destination_connection_id\n - != self._original_connection_id\n )\n ):\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n + reason_phrase=\"original_destination_connection_id does not match\",\n - reason_phrase=\"original_connection_id does not match\",\n )\n if (\n quic_transport_parameters.active_connection_id_limit is not None\n and quic_transport_parameters.active_connection_id_limit < 2\n ):\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"active_connection_id_limit must be no less than 2\",\n )\n \n # store remote parameters\n \n===========changed ref 1===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n reason_phrase=\"active_connection_id_limit must be no less than 2\",\n )\n \n # store remote parameters\n if not from_session_ticket:\n if quic_transport_parameters.ack_delay_exponent is not None:\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = (\n quic_transport_parameters.max_ack_delay / 1000.0\n )\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n if quic_transport_parameters.max_idle_timeout is not None:\n self._remote_max_idle_timeout = (\n quic_transport_parameters.max_idle_timeout / 1000.0\n )\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n===========changed ref 2===========\n # module: aioquic.quic.connection\n class QuicConnection:\n + @property\n + def original_destination_connection_id(self) -> bytes:\n + return self._original_destination_connection_id\n + \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n + QuicTransportParameters(\n - QuicTransportParameters(),\n + original_destination_connection_id=client.original_destination_connection_id\n + ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 4===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id(\n + self,\n + ):\n + \"\"\"\n + If the server's transport parameters do not have the correct\n + original_destination_connection_id the connection fail.\n + \"\"\"\n + \n + def create_protocol(*args, **kwargs):\n + protocol = QuicConnectionProtocol(*args, **kwargs)\n + protocol._quic._original_destination_connection_id = None\n + return protocol\n + \n + run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n + with self.assertRaises(ConnectionError):\n + run(self.run_client())\n + \n===========changed ref 5===========\n # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n + def create_token(\n + self,\n + addr: NetworkAddress,\n + original_destination_connection_id: bytes,\n + retry_source_connection_id: bytes,\n + ) -> bytes:\n - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes:\n + retry_message = (\n + encode_address(addr)\n + + b\"|\"\n + + original_destination_connection_id\n + + b\"|\"\n + + retry_source_connection_id\n + )\n - retry_message = encode_address(addr) + b\"|\" + destination_cid\n return self._key.public_key().encrypt(\n retry_message,\n padding.OAEP(\n mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n ),\n )\n "}}},{"rowIdx":4165,"cells":{"path":{"kind":"string","value":"aioquic.asyncio.server/QuicServer.datagram_received"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"92b8e68c2fdf6ba43a38a705c24a2663ec4079f2"},"commit_message":{"kind":"string","value":"[parameters] add support for new transport parameters"},"ground_truth":{"kind":"string","value":"<26>: original_destination_connection_id: Optional[bytes] = None\n original_connection_id: Optional[bytes] = None\n<27>: retry_source_connection_id: Optional[bytes] = None\n<36>: source_cid = os.urandom(8)\n<39>: source_cid=source_cid,\n source_cid=os.urandom(8),\n<43>: addr, header.destination_cid, source_cid\n addr, header.destination_cid\n<52>: original_connection_id =\n"},"main_code":{"kind":"string","value":" # module: aioquic.asyncio.server\n class QuicServer(asyncio.DatagramProtocol):\n def datagram_received(self, data: Union[bytes, Text], addr: NetworkAddress) -> None:\n <0> data = cast(bytes, data)\n <1> buf = Buffer(data=data)\n <2> \n <3> try:\n <4> header = pull_quic_header(\n <5> buf, host_cid_length=self._configuration.connection_id_length\n <6> )\n <7> except ValueError:\n <8> return\n <9> \n<10> # version negotiation\n<11> if (\n<12> header.version is not None\n<13> and header.version not in self._configuration.supported_versions\n<14> ):\n<15> self._transport.sendto(\n<16> encode_quic_version_negotiation(\n<17> source_cid=header.destination_cid,\n<18> destination_cid=header.source_cid,\n<19> supported_versions=self._configuration.supported_versions,\n<20> ),\n<21> addr,\n<22> )\n<23> return\n<24> \n<25> protocol = self._protocols.get(header.destination_cid, None)\n<26> original_connection_id: Optional[bytes] = None\n<27> if (\n<28> protocol is None\n<29> and len(data) >= 1200\n<30> and header.packet_type == PACKET_TYPE_INITIAL\n<31> ):\n<32> # stateless retry\n<33> if self._retry is not None:\n<34> if not header.token:\n<35> # create a retry token\n<36> self._transport.sendto(\n<37> encode_quic_retry(\n<38> version=header.version,\n<39> source_cid=os.urandom(8),\n<40> destination_cid=header.source_cid,\n<41> original_destination_cid=header.destination_cid,\n<42> retry_token=self._retry.create_token(\n<43> addr, header.destination_cid\n<44> ),\n<45> ),\n<46> addr,\n<47> )\n<48> return\n<49> else:\n<50> # validate retry token\n<51> try:\n<52> original_connection_id ="},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.asyncio.server\n class QuicServer(asyncio.DatagramProtocol):\n def datagram_received(self, data: Union[bytes, Text], addr: NetworkAddress) -> None:\n # offset: 1\n addr, header.token\n )\n except ValueError:\n return\n \n # create new connection\n connection = QuicConnection(\n configuration=self._configuration,\n logger_connection_id=original_connection_id or header.destination_cid,\n original_connection_id=original_connection_id,\n session_ticket_fetcher=self._session_ticket_fetcher,\n session_ticket_handler=self._session_ticket_handler,\n )\n protocol = self._create_protocol(\n connection, stream_handler=self._stream_handler\n )\n protocol.connection_made(self._transport)\n \n # register callbacks\n protocol._connection_id_issued_handler = partial(\n self._connection_id_issued, protocol=protocol\n )\n protocol._connection_id_retired_handler = partial(\n self._connection_id_retired, protocol=protocol\n )\n protocol._connection_terminated_handler = partial(\n self._connection_terminated, protocol=protocol\n )\n \n self._protocols[header.destination_cid] = protocol\n self._protocols[connection.host_cid] = protocol\n \n if protocol is not None:\n protocol.datagram_received(data, addr)\n \n \n===========unchanged ref 0===========\n at: aioquic.asyncio.server.QuicServer\n _connection_id_issued(cid: bytes, protocol: QuicConnectionProtocol)\n \n _connection_id_retired(cid: bytes, protocol: QuicConnectionProtocol) -> None\n \n _connection_terminated(protocol: QuicConnectionProtocol)\n \n at: aioquic.asyncio.server.QuicServer.__init__\n self._configuration = configuration\n \n self._create_protocol = create_protocol\n \n self._protocols: Dict[bytes, QuicConnectionProtocol] = {}\n \n self._session_ticket_fetcher = session_ticket_fetcher\n \n self._session_ticket_handler = session_ticket_handler\n \n self._transport: Optional[asyncio.DatagramTransport] = None\n \n self._stream_handler = stream_handler\n \n self._retry = QuicRetryTokenHandler()\n self._retry = None\n \n at: aioquic.asyncio.server.QuicServer.connection_made\n self._transport = cast(asyncio.DatagramTransport, transport)\n \n at: asyncio.protocols.DatagramProtocol\n __slots__ = ()\n \n datagram_received(self, data: bytes, addr: Tuple[str, int]) -> None\n \n at: asyncio.transports.DatagramTransport\n __slots__ = ()\n \n sendto(data: Any, addr: Optional[_Address]=...) -> None\n \n at: functools\n partial(func: Callable[..., _T], *args: Any, **kwargs: Any)\n partial(func, *args, **keywords, /) -> function with partial application()\n \n at: os\n urandom(size: int, /) -> bytes\n \n at: typing\n cast(typ: Type[_T], val: Any) -> _T\n cast(typ: str, val: Any) -> Any\n cast(typ: object, val: Any) -> Any\n \n Text = str\n \n \n===========unchanged ref 1===========\n at: typing.Mapping\n get(key: _KT, default: Union[_VT_co, _T]) -> Union[_VT_co, _T]\n get(key: _KT) -> Optional[_VT_co]\n \n \n===========changed ref 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n + @property\n + def original_destination_connection_id(self) -> bytes:\n + return self._original_destination_connection_id\n + \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n + QuicTransportParameters(\n - QuicTransportParameters(),\n + original_destination_connection_id=client.original_destination_connection_id\n + ),\n protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 2===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id(\n + self,\n + ):\n + \"\"\"\n + If the server's transport parameters do not have the correct\n + original_destination_connection_id the connection fail.\n + \"\"\"\n + \n + def create_protocol(*args, **kwargs):\n + protocol = QuicConnectionProtocol(*args, **kwargs)\n + protocol._quic._original_destination_connection_id = None\n + return protocol\n + \n + run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n + with self.assertRaises(ConnectionError):\n + run(self.run_client())\n + \n===========changed ref 3===========\n # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n + def create_token(\n + self,\n + addr: NetworkAddress,\n + original_destination_connection_id: bytes,\n + retry_source_connection_id: bytes,\n + ) -> bytes:\n - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes:\n + retry_message = (\n + encode_address(addr)\n + + b\"|\"\n + + original_destination_connection_id\n + + b\"|\"\n + + retry_source_connection_id\n + )\n - retry_message = encode_address(addr) + b\"|\" + destination_cid\n return self._key.public_key().encrypt(\n retry_message,\n padding.OAEP(\n mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n ),\n )\n \n===========changed ref 4===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n - def test_connect_and_serve_with_stateless_retry_bad_original_connection_id(self):\n - \"\"\"\n - If the server's transport parameters do not have the correct\n - original_connection_id the connection fail.\n - \"\"\"\n - \n - def create_protocol(*args, **kwargs):\n - protocol = QuicConnectionProtocol(*args, **kwargs)\n - protocol._quic._original_connection_id = None\n - return protocol\n - \n - run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n - with self.assertRaises(ConnectionError):\n - run(self.run_client())\n - \n===========changed ref 5===========\n # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n + def validate_token(self, addr: NetworkAddress, token: bytes) -> Tuple[bytes, bytes]:\n - def validate_token(self, addr: NetworkAddress, token: bytes) -> bytes:\n retry_message = self._key.decrypt(\n token,\n padding.OAEP(\n mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n ),\n )\n + (\n + encoded_addr,\n + original_destination_connection_id,\n + retry_source_connection_id,\n + ) = retry_message.split(b\"|\", maxsplit=2)\n - encoded_addr, original_connection_id = retry_message.split(b\"|\", maxsplit=1)\n if encoded_addr != encode_address(addr):\n raise ValueError(\"Remote address does not match.\")\n + return original_destination_connection_id, retry_source_connection_id\n - return original_connection_id\n "}}},{"rowIdx":4166,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"5ee5dd9c9fa65bd086e79a4cd85c52ad439eb0d2"},"commit_message":{"kind":"string","value":"Advertise draft-28 support"},"ground_truth":{"kind":"string","value":" <8>: protocol_version=QuicProtocolVersion.DRAFT_28,\n protocol_version=QuicProtocolVersion.DRAFT_27,\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n <0> client = create_standalone_client(self)\n <1> \n <2> buf = Buffer(capacity=32)\n <3> push_quic_transport_parameters(\n <4> buf,\n <5> QuicTransportParameters(\n <6> original_destination_connection_id=client.original_destination_connection_id\n <7> ),\n <8> protocol_version=QuicProtocolVersion.DRAFT_27,\n <9> )\n<10> client._parse_transport_parameters(buf.data)\n<11> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n create_standalone_client(self, **client_options)\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n DRAFT_25 = 0xFF000019\n DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n + DRAFT_28 = 0xFF00001C\n "}}},{"rowIdx":4167,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_parse_transport_parameters_with_bad_active_connection_id_limit"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"5ee5dd9c9fa65bd086e79a4cd85c52ad439eb0d2"},"commit_message":{"kind":"string","value":"Advertise draft-28 support"},"ground_truth":{"kind":"string","value":"<10>: protocol_version=QuicProtocolVersion.DRAFT_28,\n protocol_version=QuicProtocolVersion.DRAFT_27,\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n <0> client = create_standalone_client(self)\n <1> \n <2> for active_connection_id_limit in [0, 1]:\n <3> buf = Buffer(capacity=32)\n <4> push_quic_transport_parameters(\n <5> buf,\n <6> QuicTransportParameters(\n <7> active_connection_id_limit=active_connection_id_limit,\n <8> original_destination_connection_id=client.original_destination_connection_id,\n <9> ),\n<10> protocol_version=QuicProtocolVersion.DRAFT_27,\n<11> )\n<12> with self.assertRaises(QuicConnectionError) as cm:\n<13> client._parse_transport_parameters(buf.data)\n<14> self.assertEqual(\n<15> cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n<16> )\n<17> self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n<18> self.assertEqual(\n<19> cm.exception.reason_phrase,\n<20> \"active_connection_id_limit must be no less than 2\",\n<21> )\n<22> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n create_standalone_client(self, **client_options)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n at: unittest.case._AssertRaisesContext.__exit__\n self.exception = exc_value.with_traceback(None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n + protocol_version=QuicProtocolVersion.DRAFT_28,\n - protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n DRAFT_25 = 0xFF000019\n DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n + DRAFT_28 = 0xFF00001C\n "}}},{"rowIdx":4168,"cells":{"path":{"kind":"string","value":"tests.test_packet_builder/create_builder"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"5ee5dd9c9fa65bd086e79a4cd85c52ad439eb0d2"},"commit_message":{"kind":"string","value":"Advertise draft-28 support"},"ground_truth":{"kind":"string","value":" <7>: version=QuicProtocolVersion.DRAFT_28,\n version=QuicProtocolVersion.DRAFT_25,\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet_builder\n def create_builder(is_client=False):\n <0> return QuicPacketBuilder(\n <1> host_cid=bytes(8),\n <2> is_client=is_client,\n <3> packet_number=0,\n <4> peer_cid=bytes(8),\n <5> peer_token=b\"\",\n <6> spin_bit=False,\n <7> version=QuicProtocolVersion.DRAFT_25,\n <8> )\n <9> \n "},"context":{"kind":"string","value":"===========changed ref 0===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n DRAFT_25 = 0xFF000019\n DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n + DRAFT_28 = 0xFF00001C\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n + protocol_version=QuicProtocolVersion.DRAFT_28,\n - protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n ),\n + protocol_version=QuicProtocolVersion.DRAFT_28,\n - protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 3===========\n # module: aioquic.quic.configuration\n @dataclass\n class QuicConfiguration:\n \"\"\"\n A QUIC configuration.\n \"\"\"\n \n alpn_protocols: Optional[List[str]] = None\n \"\"\"\n A list of supported ALPN protocols.\n \"\"\"\n \n connection_id_length: int = 8\n \"\"\"\n The length in bytes of local connection IDs.\n \"\"\"\n \n idle_timeout: float = 60.0\n \"\"\"\n The idle timeout in seconds.\n \n The connection is terminated if nothing is received for the given duration.\n \"\"\"\n \n is_client: bool = True\n \"\"\"\n Whether this is the client side of the QUIC connection.\n \"\"\"\n \n max_data: int = 1048576\n \"\"\"\n Connection-wide flow control limit.\n \"\"\"\n \n max_stream_data: int = 1048576\n \"\"\"\n Per-stream flow control limit.\n \"\"\"\n \n quic_logger: Optional[QuicLogger] = None\n \"\"\"\n The :class:`~aioquic.quic.logger.QuicLogger` instance to log events to.\n \"\"\"\n \n secrets_log_file: TextIO = None\n \"\"\"\n A file-like object in which to log traffic secrets.\n \n This is useful to analyze traffic captures with Wireshark.\n \"\"\"\n \n server_name: Optional[str] = None\n \"\"\"\n The server name to send during the TLS handshake the Server Name Indication.\n \n .. note:: This is only used by clients.\n \"\"\"\n \n session_ticket: Optional[SessionTicket] = None\n \"\"\"\n The TLS session ticket which should be used for session resumption.\n \"\"\"\n \n cadata: Optional[bytes] = None\n cafile: Optional[str] = None\n capath: Optional[str] = None\n certificate: Any = None\n certificate_chain: List[Any] = field(default_factory=list)\n max_datagram_frame_size: Optional[int] = None\n private_key: Any = None\n quantum_readiness_test: bool = False\n supported_versions: List\n===========changed ref 4===========\n # module: aioquic.quic.configuration\n @dataclass\n class QuicConfiguration:\n # offset: 1\n None\n private_key: Any = None\n quantum_readiness_test: bool = False\n supported_versions: List[int] = field(\n default_factory=lambda: [\n + QuicProtocolVersion.DRAFT_28,\n QuicProtocolVersion.DRAFT_27,\n QuicProtocolVersion.DRAFT_26,\n QuicProtocolVersion.DRAFT_25,\n ]\n )\n verify_mode: Optional[int] = None\n "}}},{"rowIdx":4169,"cells":{"path":{"kind":"string","value":"tests.test_packet_builder/create_crypto"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"5ee5dd9c9fa65bd086e79a4cd85c52ad439eb0d2"},"commit_message":{"kind":"string","value":"Advertise draft-28 support"},"ground_truth":{"kind":"string","value":" <1>: crypto.setup_initial(bytes(8), is_client=True, version=QuicProtocolVersion.DRAFT_28)\n crypto.setup_initial(bytes(8), is_client=True, version=QuicProtocolVersion.DRAFT_25)\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet_builder\n def create_crypto():\n <0> crypto = CryptoPair()\n <1> crypto.setup_initial(bytes(8), is_client=True, version=QuicProtocolVersion.DRAFT_25)\n <2> return crypto\n <3> \n "},"context":{"kind":"string","value":"===========changed ref 0===========\n # module: tests.test_packet_builder\n def create_builder(is_client=False):\n return QuicPacketBuilder(\n host_cid=bytes(8),\n is_client=is_client,\n packet_number=0,\n peer_cid=bytes(8),\n peer_token=b\"\",\n spin_bit=False,\n + version=QuicProtocolVersion.DRAFT_28,\n - version=QuicProtocolVersion.DRAFT_25,\n )\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n DRAFT_25 = 0xFF000019\n DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n + DRAFT_28 = 0xFF00001C\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n + protocol_version=QuicProtocolVersion.DRAFT_28,\n - protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n ),\n + protocol_version=QuicProtocolVersion.DRAFT_28,\n - protocol_version=QuicProtocolVersion.DRAFT_27,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 4===========\n # module: aioquic.quic.configuration\n @dataclass\n class QuicConfiguration:\n \"\"\"\n A QUIC configuration.\n \"\"\"\n \n alpn_protocols: Optional[List[str]] = None\n \"\"\"\n A list of supported ALPN protocols.\n \"\"\"\n \n connection_id_length: int = 8\n \"\"\"\n The length in bytes of local connection IDs.\n \"\"\"\n \n idle_timeout: float = 60.0\n \"\"\"\n The idle timeout in seconds.\n \n The connection is terminated if nothing is received for the given duration.\n \"\"\"\n \n is_client: bool = True\n \"\"\"\n Whether this is the client side of the QUIC connection.\n \"\"\"\n \n max_data: int = 1048576\n \"\"\"\n Connection-wide flow control limit.\n \"\"\"\n \n max_stream_data: int = 1048576\n \"\"\"\n Per-stream flow control limit.\n \"\"\"\n \n quic_logger: Optional[QuicLogger] = None\n \"\"\"\n The :class:`~aioquic.quic.logger.QuicLogger` instance to log events to.\n \"\"\"\n \n secrets_log_file: TextIO = None\n \"\"\"\n A file-like object in which to log traffic secrets.\n \n This is useful to analyze traffic captures with Wireshark.\n \"\"\"\n \n server_name: Optional[str] = None\n \"\"\"\n The server name to send during the TLS handshake the Server Name Indication.\n \n .. note:: This is only used by clients.\n \"\"\"\n \n session_ticket: Optional[SessionTicket] = None\n \"\"\"\n The TLS session ticket which should be used for session resumption.\n \"\"\"\n \n cadata: Optional[bytes] = None\n cafile: Optional[str] = None\n capath: Optional[str] = None\n certificate: Any = None\n certificate_chain: List[Any] = field(default_factory=list)\n max_datagram_frame_size: Optional[int] = None\n private_key: Any = None\n quantum_readiness_test: bool = False\n supported_versions: List\n===========changed ref 5===========\n # module: aioquic.quic.configuration\n @dataclass\n class QuicConfiguration:\n # offset: 1\n None\n private_key: Any = None\n quantum_readiness_test: bool = False\n supported_versions: List[int] = field(\n default_factory=lambda: [\n + QuicProtocolVersion.DRAFT_28,\n QuicProtocolVersion.DRAFT_27,\n QuicProtocolVersion.DRAFT_26,\n QuicProtocolVersion.DRAFT_25,\n ]\n )\n verify_mode: Optional[int] = None\n "}}},{"rowIdx":4170,"cells":{"path":{"kind":"string","value":"aioquic.quic.packet/pull_quic_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <1>: \n <2>: if protocol_version < QuicProtocolVersion.DRAFT_27:\n <3>: with pull_block(buf, 2) as length:\n <4>: end = buf.tell() + length\n <5>: while buf.tell() < end:\n <6>: param_id = buf.pull_uint16()\n <7>: param_len = buf.pull_uint16()\n <8>: param_start = buf.tell()\n <9>: if param_id in PARAMS:\n<10>: # parse known parameter\n<11>: param_name, param_type = PARAMS[param_id]\n<12>: if param_type == int:\n<13>: setattr(params, param_name, buf.pull_uint_var())\n<14>: elif param_type == bytes:\n<15>: setattr(params, param_name, buf.pull_bytes(param_len))\n<16>: elif param_type == QuicPreferredAddress:\n<17>: setattr(params, param_name, pull_quic_preferred_address(buf))\n<18>: else:\n<19>: setattr(params, param_name, True)\n<20>: else:\n<21>: # skip unknown parameter\n<22>: buf.pull_bytes(param_len)\n<23>: assert buf.tell() == param_start + param_len\n<24>: else:\n<25>: while not buf.eof():\n while not buf.eof():\n<26>: param_id = buf.pull_uint_var()\n param_id = buf.pull_uint_var()\n<27>: param_len = buf.pull_uint_var()\n param_len = buf.pull_uint_var()\n<28>: param_start = buf.tell()\n param_start = buf.tell()\n<29>: if param_id in PARAMS:\n if param_id in PARAMS:\n<30>: # parse known parameter\n # parse known parameter\n<31>: param_name, param_type = PARAMS[param_id]\n param_name, param_type = PARAMS[param_id]\n<32>: if param_type == int:\n if param_type == int:\n<33>: setattr(params, param_name, buf.pull_uint_var())\n setattr(params, param_name, buf.pull_uint_var())\n<34>: elif param_type == bytes:\n elif param_type == bytes:\n<35>: setattr(params, param_name, buf.pull_bytes(param_len))\n setattr(params, param_name, buf.pull_\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.packet\n - def pull_quic_transport_parameters(\n - buf: Buffer, protocol_version: int\n - ) -> QuicTransportParameters:\n + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters:\n <0> params = QuicTransportParameters()\n <1> \n <2> if protocol_version < QuicProtocolVersion.DRAFT_27:\n <3> with pull_block(buf, 2) as length:\n <4> end = buf.tell() + length\n <5> while buf.tell() < end:\n <6> param_id = buf.pull_uint16()\n <7> param_len = buf.pull_uint16()\n <8> param_start = buf.tell()\n <9> if param_id in PARAMS:\n<10> # parse known parameter\n<11> param_name, param_type = PARAMS[param_id]\n<12> if param_type == int:\n<13> setattr(params, param_name, buf.pull_uint_var())\n<14> elif param_type == bytes:\n<15> setattr(params, param_name, buf.pull_bytes(param_len))\n<16> elif param_type == QuicPreferredAddress:\n<17> setattr(params, param_name, pull_quic_preferred_address(buf))\n<18> else:\n<19> setattr(params, param_name, True)\n<20> else:\n<21> # skip unknown parameter\n<22> buf.pull_bytes(param_len)\n<23> assert buf.tell() == param_start + param_len\n<24> else:\n<25> while not buf.eof():\n<26> param_id = buf.pull_uint_var()\n<27> param_len = buf.pull_uint_var()\n<28> param_start = buf.tell()\n<29> if param_id in PARAMS:\n<30> # parse known parameter\n<31> param_name, param_type = PARAMS[param_id]\n<32> if param_type == int:\n<33> setattr(params, param_name, buf.pull_uint_var())\n<34> elif param_type == bytes:\n<35> setattr(params, param_name, buf.pull_"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.packet\n - def pull_quic_transport_parameters(\n - buf: Buffer, protocol_version: int\n - ) -> QuicTransportParameters:\n + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters:\n # offset: 1\n elif param_type == QuicPreferredAddress:\n setattr(params, param_name, pull_quic_preferred_address(buf))\n else:\n setattr(params, param_name, True)\n else:\n # skip unknown parameter\n buf.pull_bytes(param_len)\n assert buf.tell() == param_start + param_len\n \n return params\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.packet\n QuicPreferredAddress(ipv4_address: Optional[Tuple[str, int]], ipv6_address: Optional[Tuple[str, int]], connection_id: bytes, stateless_reset_token: bytes)\n \n QuicTransportParameters(original_destination_connection_id: Optional[bytes]=None, max_idle_timeout: Optional[int]=None, stateless_reset_token: Optional[bytes]=None, max_udp_payload_size: Optional[int]=None, initial_max_data: Optional[int]=None, initial_max_stream_data_bidi_local: Optional[int]=None, initial_max_stream_data_bidi_remote: Optional[int]=None, initial_max_stream_data_uni: Optional[int]=None, initial_max_streams_bidi: Optional[int]=None, initial_max_streams_uni: Optional[int]=None, ack_delay_exponent: Optional[int]=None, max_ack_delay: Optional[int]=None, disable_active_migration: Optional[bool]=False, preferred_address: Optional[QuicPreferredAddress]=None, active_connection_id_limit: Optional[int]=None, initial_source_connection_id: Optional[bytes]=None, retry_source_connection_id: Optional[bytes]=None, max_datagram_frame_size: Optional[int]=None, quantum_readiness: Optional[bytes]=None)\n \n \n===========unchanged ref 1===========\n PARAMS = {\n 0x00: (\"original_destination_connection_id\", bytes),\n 0x01: (\"max_idle_timeout\", int),\n 0x02: (\"stateless_reset_token\", bytes),\n 0x03: (\"max_udp_payload_size\", int),\n 0x04: (\"initial_max_data\", int),\n 0x05: (\"initial_max_stream_data_bidi_local\", int),\n 0x06: (\"initial_max_stream_data_bidi_remote\", int),\n 0x07: (\"initial_max_stream_data_uni\", int),\n 0x08: (\"initial_max_streams_bidi\", int),\n 0x09: (\"initial_max_streams_uni\", int),\n 0x0A: (\"ack_delay_exponent\", int),\n 0x0B: (\"max_ack_delay\", int),\n 0x0C: (\"disable_active_migration\", bool),\n 0x0D: (\"preferred_address\", QuicPreferredAddress),\n 0x0E: (\"active_connection_id_limit\", int),\n 0x0F: (\"initial_source_connection_id\", bytes),\n 0x10: (\"retry_source_connection_id\", bytes),\n # extensions\n 0x0020: (\"max_datagram_frame_size\", int),\n 0x0C37: (\"quantum_readiness\", bytes),\n }\n \n pull_quic_preferred_address(buf: Buffer) -> QuicPreferredAddress\n \n push_quic_preferred_address(buf: Buffer, preferred_address: QuicPreferredAddress) -> None\n \n at: aioquic.quic.packet.QuicFrameType\n STOP_SENDING = 0x05\n \n CRYPTO = 0x06\n \n NEW_TOKEN = 0x07\n \n STREAM_BASE = 0x08\n \n MAX_DATA = 0x10\n \n MAX_STREAM_DATA = 0x11\n \n MAX_STREAMS_BIDI = 0x12\n \n MAX_STREAMS_UNI = 0x13\n \n DATA_BLOCKED = 0x14\n \n \n===========unchanged ref 2===========\n STREAM_DATA_BLOCKED = 0x15\n \n STREAMS_BLOCKED_BIDI = 0x16\n \n STREAMS_BLOCKED_UNI = 0x17\n \n NEW_CONNECTION_ID = 0x18\n \n RETIRE_CONNECTION_ID = 0x19\n \n PATH_CHALLENGE = 0x1A\n \n PATH_RESPONSE = 0x1B\n \n TRANSPORT_CLOSE = 0x1C\n \n APPLICATION_CLOSE = 0x1D\n \n HANDSHAKE_DONE = 0x1E\n \n DATAGRAM = 0x30\n \n DATAGRAM_WITH_LENGTH = 0x31\n \n at: aioquic.quic.packet.pull_quic_transport_parameters\n params = QuicTransportParameters()\n \n at: enum\n IntEnum(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n IntEnum(x: Union[str, bytes, bytearray], base: int)\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n "}}},{"rowIdx":4171,"cells":{"path":{"kind":"string","value":"aioquic.quic.packet/push_quic_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <0>: if protocol_version < QuicProtocolVersion.DRAFT_27:\n <1>: with push_block(buf, 2):\n <2>: for param_id, (param_name, param_type) in PARAMS.items():\n <3>: param_value = getattr(params, param_name)\n <4>: if param_value is not None and param_value is not False:\n <5>: buf.push_uint16(param_id)\n <6>: with push_block(buf, 2):\n <7>: if param_type == int:\n <8>: buf.push_uint_var(param_value)\n <9>: elif param_type == bytes:\n<10>: buf.push_bytes(param_value)\n<11>: elif param_type == QuicPreferredAddress:\n<12>: push_quic_preferred_address(buf, param_value)\n<13>: else:\n<14>: for param_id, (param_name, param_type) in PARAMS.items():\n for param_id, (param_name, param_type) in PARAMS.items():\n<15>: param_value = getattr(params, param_name)\n param_value = getattr(params, param_name)\n<16>: if param_value is not None and param_value is not False:\n if param_value is not None and param_value is not False:\n<17>: param_buf = Buffer(capacity=65536)\n param_buf = Buffer(capacity=65536)\n<18>: if param_type == int:\n if param_type == int:\n<19>: param_buf.push_uint_var(param_value)\n param_buf.push_uint_var(param_value)\n<20>: elif param_type == bytes:\n elif param_type == bytes:\n<21>: param_buf.push_bytes(param_value)\n param_buf.push_bytes(param_value)\n<22>: elif param_type == QuicPreferredAddress:\n elif param_type == QuicPreferredAddress:\n<23>: push_quic_preferred_address(param_buf, param_value)\n push_quic_preferred_address(param_buf, param_value)\n<24>: buf.push_uint_var(param_id)\n buf.push_uint_var(param_id)\n<25>: buf.push_uint_var(param_buf.tell())\n buf.push_uint_var(param_buf.tell())\n<26>: buf.push_bytes(param_buf.data)"},"main_code":{"kind":"string","value":" # module: aioquic.quic.packet\n def push_quic_transport_parameters(\n + buf: Buffer, params: QuicTransportParameters\n - buf: Buffer, params: QuicTransportParameters, protocol_version: int\n ) -> None:\n <0> if protocol_version < QuicProtocolVersion.DRAFT_27:\n <1> with push_block(buf, 2):\n <2> for param_id, (param_name, param_type) in PARAMS.items():\n <3> param_value = getattr(params, param_name)\n <4> if param_value is not None and param_value is not False:\n <5> buf.push_uint16(param_id)\n <6> with push_block(buf, 2):\n <7> if param_type == int:\n <8> buf.push_uint_var(param_value)\n <9> elif param_type == bytes:\n<10> buf.push_bytes(param_value)\n<11> elif param_type == QuicPreferredAddress:\n<12> push_quic_preferred_address(buf, param_value)\n<13> else:\n<14> for param_id, (param_name, param_type) in PARAMS.items():\n<15> param_value = getattr(params, param_name)\n<16> if param_value is not None and param_value is not False:\n<17> param_buf = Buffer(capacity=65536)\n<18> if param_type == int:\n<19> param_buf.push_uint_var(param_value)\n<20> elif param_type == bytes:\n<21> param_buf.push_bytes(param_value)\n<22> elif param_type == QuicPreferredAddress:\n<23> push_quic_preferred_address(param_buf, param_value)\n<24> buf.push_uint_var(param_id)\n<25> buf.push_uint_var(param_buf.tell())\n<26> buf.push_bytes(param_buf.data)\n<27> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.quic.packet\n QuicFrameType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n QuicFrameType(x: Union[str, bytes, bytearray], base: int)\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n - def pull_quic_transport_parameters(\n - buf: Buffer, protocol_version: int\n - ) -> QuicTransportParameters:\n + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters:\n params = QuicTransportParameters()\n - \n - if protocol_version < QuicProtocolVersion.DRAFT_27:\n - with pull_block(buf, 2) as length:\n - end = buf.tell() + length\n - while buf.tell() < end:\n - param_id = buf.pull_uint16()\n - param_len = buf.pull_uint16()\n - param_start = buf.tell()\n - if param_id in PARAMS:\n - # parse known parameter\n - param_name, param_type = PARAMS[param_id]\n - if param_type == int:\n - setattr(params, param_name, buf.pull_uint_var())\n - elif param_type == bytes:\n - setattr(params, param_name, buf.pull_bytes(param_len))\n - elif param_type == QuicPreferredAddress:\n - setattr(params, param_name, pull_quic_preferred_address(buf))\n - else:\n - setattr(params, param_name, True)\n - else:\n - # skip unknown parameter\n - buf.pull_bytes(param_len)\n - assert buf.tell() == param_start + param_len\n - else:\n + while not buf.eof():\n - while not buf.eof():\n + param_id = buf.pull_uint_var()\n - param_id = buf.pull_uint_var()\n + param_len = buf.pull_uint_var()\n - param_len = buf.pull_uint_var()\n + param_start = buf.tell()\n - param_start = buf.tell()\n + if param_id in PARAMS:\n - if param_id in PARAMS:\n + # parse known parameter\n - # parse known parameter\n + param\n===========changed ref 2===========\n # module: aioquic.quic.packet\n - def pull_quic_transport_parameters(\n - buf: Buffer, protocol_version: int\n - ) -> QuicTransportParameters:\n + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters:\n # offset: 1\n :\n - if param_id in PARAMS:\n + # parse known parameter\n - # parse known parameter\n + param_name, param_type = PARAMS[param_id]\n - param_name, param_type = PARAMS[param_id]\n + if param_type == int:\n - if param_type == int:\n + setattr(params, param_name, buf.pull_uint_var())\n - setattr(params, param_name, buf.pull_uint_var())\n + elif param_type == bytes:\n - elif param_type == bytes:\n + setattr(params, param_name, buf.pull_bytes(param_len))\n - setattr(params, param_name, buf.pull_bytes(param_len))\n + elif param_type == QuicPreferredAddress:\n - elif param_type == QuicPreferredAddress:\n + setattr(params, param_name, pull_quic_preferred_address(buf))\n - setattr(params, param_name, pull_quic_preferred_address(buf))\n - else:\n - setattr(params, param_name, True)\n else:\n + setattr(params, param_name, True)\n + else:\n + # skip unknown parameter\n - # skip unknown parameter\n + buf.pull_bytes(param_len)\n - buf.pull_bytes(param_len)\n + assert buf.tell() == param_start + param_len\n - assert buf.tell() == param_start + param_len\n \n return params\n "}}},{"rowIdx":4172,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <8>: protocol_version=QuicProtocolVersion.DRAFT_28,\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n <0> client = create_standalone_client(self)\n <1> \n <2> buf = Buffer(capacity=32)\n <3> push_quic_transport_parameters(\n <4> buf,\n <5> QuicTransportParameters(\n <6> original_destination_connection_id=client.original_destination_connection_id\n <7> ),\n <8> protocol_version=QuicProtocolVersion.DRAFT_28,\n <9> )\n<10> client._parse_transport_parameters(buf.data)\n<11> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n create_standalone_client(self, **client_options)\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n def push_quic_transport_parameters(\n + buf: Buffer, params: QuicTransportParameters\n - buf: Buffer, params: QuicTransportParameters, protocol_version: int\n ) -> None:\n - if protocol_version < QuicProtocolVersion.DRAFT_27:\n - with push_block(buf, 2):\n - for param_id, (param_name, param_type) in PARAMS.items():\n - param_value = getattr(params, param_name)\n - if param_value is not None and param_value is not False:\n - buf.push_uint16(param_id)\n - with push_block(buf, 2):\n - if param_type == int:\n - buf.push_uint_var(param_value)\n - elif param_type == bytes:\n - buf.push_bytes(param_value)\n - elif param_type == QuicPreferredAddress:\n - push_quic_preferred_address(buf, param_value)\n - else:\n + for param_id, (param_name, param_type) in PARAMS.items():\n - for param_id, (param_name, param_type) in PARAMS.items():\n + param_value = getattr(params, param_name)\n - param_value = getattr(params, param_name)\n + if param_value is not None and param_value is not False:\n - if param_value is not None and param_value is not False:\n + param_buf = Buffer(capacity=65536)\n - param_buf = Buffer(capacity=65536)\n + if param_type == int:\n - if param_type == int:\n + param_buf.push_uint_var(param_value)\n - param_buf.push_uint_var(param_value)\n + elif param_type == bytes:\n - elif param_type == bytes:\n + param_buf.push_bytes(param_value)\n - param_buf.push_bytes(param_value)\n + elif param_type == QuicPreferred\n===========changed ref 2===========\n # module: aioquic.quic.packet\n def push_quic_transport_parameters(\n + buf: Buffer, params: QuicTransportParameters\n - buf: Buffer, params: QuicTransportParameters, protocol_version: int\n ) -> None:\n # offset: 1\n param_value)\n - param_buf.push_bytes(param_value)\n + elif param_type == QuicPreferredAddress:\n - elif param_type == QuicPreferredAddress:\n + push_quic_preferred_address(param_buf, param_value)\n - push_quic_preferred_address(param_buf, param_value)\n + buf.push_uint_var(param_id)\n - buf.push_uint_var(param_id)\n + buf.push_uint_var(param_buf.tell())\n - buf.push_uint_var(param_buf.tell())\n + buf.push_bytes(param_buf.data)\n - buf.push_bytes(param_buf.data)\n \n===========changed ref 3===========\n # module: aioquic.quic.packet\n - def pull_quic_transport_parameters(\n - buf: Buffer, protocol_version: int\n - ) -> QuicTransportParameters:\n + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters:\n params = QuicTransportParameters()\n - \n - if protocol_version < QuicProtocolVersion.DRAFT_27:\n - with pull_block(buf, 2) as length:\n - end = buf.tell() + length\n - while buf.tell() < end:\n - param_id = buf.pull_uint16()\n - param_len = buf.pull_uint16()\n - param_start = buf.tell()\n - if param_id in PARAMS:\n - # parse known parameter\n - param_name, param_type = PARAMS[param_id]\n - if param_type == int:\n - setattr(params, param_name, buf.pull_uint_var())\n - elif param_type == bytes:\n - setattr(params, param_name, buf.pull_bytes(param_len))\n - elif param_type == QuicPreferredAddress:\n - setattr(params, param_name, pull_quic_preferred_address(buf))\n - else:\n - setattr(params, param_name, True)\n - else:\n - # skip unknown parameter\n - buf.pull_bytes(param_len)\n - assert buf.tell() == param_start + param_len\n - else:\n + while not buf.eof():\n - while not buf.eof():\n + param_id = buf.pull_uint_var()\n - param_id = buf.pull_uint_var()\n + param_len = buf.pull_uint_var()\n - param_len = buf.pull_uint_var()\n + param_start = buf.tell()\n - param_start = buf.tell()\n + if param_id in PARAMS:\n - if param_id in PARAMS:\n + # parse known parameter\n - # parse known parameter\n + param\n===========changed ref 4===========\n # module: aioquic.quic.packet\n - def pull_quic_transport_parameters(\n - buf: Buffer, protocol_version: int\n - ) -> QuicTransportParameters:\n + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters:\n # offset: 1\n :\n - if param_id in PARAMS:\n + # parse known parameter\n - # parse known parameter\n + param_name, param_type = PARAMS[param_id]\n - param_name, param_type = PARAMS[param_id]\n + if param_type == int:\n - if param_type == int:\n + setattr(params, param_name, buf.pull_uint_var())\n - setattr(params, param_name, buf.pull_uint_var())\n + elif param_type == bytes:\n - elif param_type == bytes:\n + setattr(params, param_name, buf.pull_bytes(param_len))\n - setattr(params, param_name, buf.pull_bytes(param_len))\n + elif param_type == QuicPreferredAddress:\n - elif param_type == QuicPreferredAddress:\n + setattr(params, param_name, pull_quic_preferred_address(buf))\n - setattr(params, param_name, pull_quic_preferred_address(buf))\n - else:\n - setattr(params, param_name, True)\n else:\n + setattr(params, param_name, True)\n + else:\n + # skip unknown parameter\n - # skip unknown parameter\n + buf.pull_bytes(param_len)\n - buf.pull_bytes(param_len)\n + assert buf.tell() == param_start + param_len\n - assert buf.tell() == param_start + param_len\n \n return params\n "}}},{"rowIdx":4173,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_parse_transport_parameters_with_bad_active_connection_id_limit"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":"<10>: protocol_version=QuicProtocolVersion.DRAFT_28,\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n <0> client = create_standalone_client(self)\n <1> \n <2> for active_connection_id_limit in [0, 1]:\n <3> buf = Buffer(capacity=32)\n <4> push_quic_transport_parameters(\n <5> buf,\n <6> QuicTransportParameters(\n <7> active_connection_id_limit=active_connection_id_limit,\n <8> original_destination_connection_id=client.original_destination_connection_id,\n <9> ),\n<10> protocol_version=QuicProtocolVersion.DRAFT_28,\n<11> )\n<12> with self.assertRaises(QuicConnectionError) as cm:\n<13> client._parse_transport_parameters(buf.data)\n<14> self.assertEqual(\n<15> cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n<16> )\n<17> self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n<18> self.assertEqual(\n<19> cm.exception.reason_phrase,\n<20> \"active_connection_id_limit must be no less than 2\",\n<21> )\n<22> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n create_standalone_client(self, **client_options)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n at: unittest.case._AssertRaisesContext.__exit__\n self.exception = exc_value.with_traceback(None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n def push_quic_transport_parameters(\n + buf: Buffer, params: QuicTransportParameters\n - buf: Buffer, params: QuicTransportParameters, protocol_version: int\n ) -> None:\n - if protocol_version < QuicProtocolVersion.DRAFT_27:\n - with push_block(buf, 2):\n - for param_id, (param_name, param_type) in PARAMS.items():\n - param_value = getattr(params, param_name)\n - if param_value is not None and param_value is not False:\n - buf.push_uint16(param_id)\n - with push_block(buf, 2):\n - if param_type == int:\n - buf.push_uint_var(param_value)\n - elif param_type == bytes:\n - buf.push_bytes(param_value)\n - elif param_type == QuicPreferredAddress:\n - push_quic_preferred_address(buf, param_value)\n - else:\n + for param_id, (param_name, param_type) in PARAMS.items():\n - for param_id, (param_name, param_type) in PARAMS.items():\n + param_value = getattr(params, param_name)\n - param_value = getattr(params, param_name)\n + if param_value is not None and param_value is not False:\n - if param_value is not None and param_value is not False:\n + param_buf = Buffer(capacity=65536)\n - param_buf = Buffer(capacity=65536)\n + if param_type == int:\n - if param_type == int:\n + param_buf.push_uint_var(param_value)\n - param_buf.push_uint_var(param_value)\n + elif param_type == bytes:\n - elif param_type == bytes:\n + param_buf.push_bytes(param_value)\n - param_buf.push_bytes(param_value)\n + elif param_type == QuicPreferred\n===========changed ref 3===========\n # module: aioquic.quic.packet\n def push_quic_transport_parameters(\n + buf: Buffer, params: QuicTransportParameters\n - buf: Buffer, params: QuicTransportParameters, protocol_version: int\n ) -> None:\n # offset: 1\n param_value)\n - param_buf.push_bytes(param_value)\n + elif param_type == QuicPreferredAddress:\n - elif param_type == QuicPreferredAddress:\n + push_quic_preferred_address(param_buf, param_value)\n - push_quic_preferred_address(param_buf, param_value)\n + buf.push_uint_var(param_id)\n - buf.push_uint_var(param_id)\n + buf.push_uint_var(param_buf.tell())\n - buf.push_uint_var(param_buf.tell())\n + buf.push_bytes(param_buf.data)\n - buf.push_bytes(param_buf.data)\n \n===========changed ref 4===========\n # module: aioquic.quic.packet\n - def pull_quic_transport_parameters(\n - buf: Buffer, protocol_version: int\n - ) -> QuicTransportParameters:\n + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters:\n params = QuicTransportParameters()\n - \n - if protocol_version < QuicProtocolVersion.DRAFT_27:\n - with pull_block(buf, 2) as length:\n - end = buf.tell() + length\n - while buf.tell() < end:\n - param_id = buf.pull_uint16()\n - param_len = buf.pull_uint16()\n - param_start = buf.tell()\n - if param_id in PARAMS:\n - # parse known parameter\n - param_name, param_type = PARAMS[param_id]\n - if param_type == int:\n - setattr(params, param_name, buf.pull_uint_var())\n - elif param_type == bytes:\n - setattr(params, param_name, buf.pull_bytes(param_len))\n - elif param_type == QuicPreferredAddress:\n - setattr(params, param_name, pull_quic_preferred_address(buf))\n - else:\n - setattr(params, param_name, True)\n - else:\n - # skip unknown parameter\n - buf.pull_bytes(param_len)\n - assert buf.tell() == param_start + param_len\n - else:\n + while not buf.eof():\n - while not buf.eof():\n + param_id = buf.pull_uint_var()\n - param_id = buf.pull_uint_var()\n + param_len = buf.pull_uint_var()\n - param_len = buf.pull_uint_var()\n + param_start = buf.tell()\n - param_start = buf.tell()\n + if param_id in PARAMS:\n - if param_id in PARAMS:\n + # parse known parameter\n - # parse known parameter\n + param"}}},{"rowIdx":4174,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <7>: quic_transport_parameters = pull_quic_transport_parameters(Buffer(data=data))\n quic_transport_parameters = pull_quic_transport_parameters(\n <8>: Buffer(data=data), protocol_version=self._version\n <9>: )\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n <0> \"\"\"\n <1> Parse and apply remote transport parameters.\n <2> \n <3> `from_session_ticket` is `True` when restoring saved transport parameters,\n <4> and `False` when handling received transport parameters.\n <5> \"\"\"\n <6> \n <7> quic_transport_parameters = pull_quic_transport_parameters(\n <8> Buffer(data=data), protocol_version=self._version\n <9> )\n<10> \n<11> # log event\n<12> if self._quic_logger is not None and not from_session_ticket:\n<13> self._quic_logger.log_event(\n<14> category=\"transport\",\n<15> event=\"parameters_set\",\n<16> data=self._quic_logger.encode_transport_parameters(\n<17> owner=\"remote\", parameters=quic_transport_parameters\n<18> ),\n<19> )\n<20> \n<21> # validate remote parameters\n<22> if (\n<23> self._is_client\n<24> and not from_session_ticket\n<25> and (\n<26> quic_transport_parameters.original_destination_connection_id\n<27> != self._original_destination_connection_id\n<28> )\n<29> ):\n<30> raise QuicConnectionError(\n<31> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<32> frame_type=QuicFrameType.CRYPTO,\n<33> reason_phrase=\"original_destination_connection_id does not match\",\n<34> )\n<35> if (\n<36> quic_transport_parameters.active_connection_id_limit is not None\n<37> and quic_transport_parameters.active_connection_id_limit < 2\n<38> ):\n<39> raise QuicConnectionError(\n<40> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<41> frame_type=QuicFrameType.CRYPTO,\n<42> reason_phrase=\"active_connection_id_limit must be no less than 2\",\n<43> )\n<44> \n<45> # store remote parameters\n "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n if quic_transport_parameters.ack_delay_exponent is not None:\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = (\n quic_transport_parameters.max_ack_delay / 1000.0\n )\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n if quic_transport_parameters.max_idle_timeout is not None:\n self._remote_max_idle_timeout = (\n quic_transport_parameters.max_idle_timeout / 1000.0\n )\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str)\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._is_client = configuration.is_client\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client,\n odcid=self._original_destination_connection_id,\n )\n \n self._remote_ack_delay_exponent = 3\n \n self._remote_active_connection_id_limit = 0\n \n self._remote_max_idle_timeout = 0.0 # seconds\n \n self._remote_max_datagram_frame_size: Optional[int] = None\n \n self._original_destination_connection_id = self._peer_cid\n self._original_destination_connection_id = (\n original_destination_connection_id\n )\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._original_destination_connection_id = self._peer_cid\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 3===========\n # module: aioquic.quic.configuration\n @dataclass\n class QuicConfiguration:\n \"\"\"\n A QUIC configuration.\n \"\"\"\n \n alpn_protocols: Optional[List[str]] = None\n \"\"\"\n A list of supported ALPN protocols.\n \"\"\"\n \n connection_id_length: int = 8\n \"\"\"\n The length in bytes of local connection IDs.\n \"\"\"\n \n idle_timeout: float = 60.0\n \"\"\"\n The idle timeout in seconds.\n \n The connection is terminated if nothing is received for the given duration.\n \"\"\"\n \n is_client: bool = True\n \"\"\"\n Whether this is the client side of the QUIC connection.\n \"\"\"\n \n max_data: int = 1048576\n \"\"\"\n Connection-wide flow control limit.\n \"\"\"\n \n max_stream_data: int = 1048576\n \"\"\"\n Per-stream flow control limit.\n \"\"\"\n \n quic_logger: Optional[QuicLogger] = None\n \"\"\"\n The :class:`~aioquic.quic.logger.QuicLogger` instance to log events to.\n \"\"\"\n \n secrets_log_file: TextIO = None\n \"\"\"\n A file-like object in which to log traffic secrets.\n \n This is useful to analyze traffic captures with Wireshark.\n \"\"\"\n \n server_name: Optional[str] = None\n \"\"\"\n The server name to send during the TLS handshake the Server Name Indication.\n \n .. note:: This is only used by clients.\n \"\"\"\n \n session_ticket: Optional[SessionTicket] = None\n \"\"\"\n The TLS session ticket which should be used for session resumption.\n \"\"\"\n \n cadata: Optional[bytes] = None\n cafile: Optional[str] = None\n capath: Optional[str] = None\n certificate: Any = None\n certificate_chain: List[Any] = field(default_factory=list)\n max_datagram_frame_size: Optional[int] = None\n private_key: Any = None\n quantum_readiness_test: bool = False\n supported_versions: List\n===========changed ref 4===========\n # module: aioquic.quic.configuration\n @dataclass\n class QuicConfiguration:\n # offset: 1\n None\n private_key: Any = None\n quantum_readiness_test: bool = False\n supported_versions: List[int] = field(\n default_factory=lambda: [\n QuicProtocolVersion.DRAFT_28,\n QuicProtocolVersion.DRAFT_27,\n - QuicProtocolVersion.DRAFT_26,\n - QuicProtocolVersion.DRAFT_25,\n ]\n )\n verify_mode: Optional[int] = None\n "}}},{"rowIdx":4175,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._serialize_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":""},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n <0> quic_transport_parameters = QuicTransportParameters(\n <1> ack_delay_exponent=self._local_ack_delay_exponent,\n <2> active_connection_id_limit=self._local_active_connection_id_limit,\n <3> max_idle_timeout=int(self._configuration.idle_timeout * 1000),\n <4> initial_max_data=self._local_max_data,\n <5> initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local,\n <6> initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote,\n <7> initial_max_stream_data_uni=self._local_max_stream_data_uni,\n <8> initial_max_streams_bidi=self._local_max_streams_bidi,\n <9> initial_max_streams_uni=self._local_max_streams_uni,\n<10> initial_source_connection_id=self._local_initial_source_connection_id,\n<11> max_ack_delay=25,\n<12> max_datagram_frame_size=self._configuration.max_datagram_frame_size,\n<13> quantum_readiness=b\"Q\" * 1200\n<14> if self._configuration.quantum_readiness_test\n<15> else None,\n<16> )\n<17> if not self._is_client:\n<18> quic_transport_parameters.original_destination_connection_id = (\n<19> self._original_destination_connection_id\n<20> )\n<21> quic_transport_parameters.retry_source_connection_id = (\n<22> self._retry_source_connection_id\n<23> )\n<24> \n<25> # log event\n<26> if self._quic_logger is not None:\n<27> self._quic_logger.log_event(\n<28> category=\"transport\",\n<29> event=\"parameters_set\",\n<30> data=self._quic_logger.encode_transport_"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n # offset: 1\n owner=\"local\", parameters=quic_transport_parameters\n ),\n )\n \n buf = Buffer(capacity=3 * PACKET_MAX_SIZE)\n push_quic_transport_parameters(\n buf, quic_transport_parameters, protocol_version=self._version\n )\n return buf.data\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n QuicConnectionState()\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._configuration = configuration\n \n self._is_client = configuration.is_client\n \n self._local_ack_delay_exponent = 3\n \n self._local_active_connection_id_limit = 8\n \n self._local_initial_source_connection_id = self._host_cids[0].cid\n \n self._local_max_data = configuration.max_data\n \n self._local_max_stream_data_bidi_local = configuration.max_stream_data\n \n self._local_max_stream_data_bidi_remote = configuration.max_stream_data\n \n self._local_max_stream_data_uni = configuration.max_stream_data\n \n self._local_max_streams_bidi = 128\n \n self._local_max_streams_uni = 128\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client,\n odcid=self._original_destination_connection_id,\n )\n \n self._retry_source_connection_id = retry_source_connection_id\n \n self._state = QuicConnectionState.FIRSTFLIGHT\n \n self._original_destination_connection_id = self._peer_cid\n self._original_destination_connection_id = (\n original_destination_connection_id\n )\n \n self._logger = QuicConnectionAdapter(\n logger, {\"id\": dump_cid(self._original_destination_connection_id)}\n )\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n \n===========unchanged ref 1===========\n at: aioquic.quic.connection.QuicConnection._serialize_transport_parameters\n quic_transport_parameters = QuicTransportParameters(\n ack_delay_exponent=self._local_ack_delay_exponent,\n active_connection_id_limit=self._local_active_connection_id_limit,\n max_idle_timeout=int(self._configuration.idle_timeout * 1000),\n initial_max_data=self._local_max_data,\n initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local,\n initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote,\n initial_max_stream_data_uni=self._local_max_stream_data_uni,\n initial_max_streams_bidi=self._local_max_streams_bidi,\n initial_max_streams_uni=self._local_max_streams_uni,\n initial_source_connection_id=self._local_initial_source_connection_id,\n max_ack_delay=25,\n max_datagram_frame_size=self._configuration.max_datagram_frame_size,\n quantum_readiness=b\"Q\" * 1200\n if self._configuration.quantum_readiness_test\n else None,\n )\n \n at: aioquic.quic.connection.QuicConnection._write_connection_limits\n self._local_max_data *= 2\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._original_destination_connection_id = self._peer_cid\n \n at: logging.LoggerAdapter\n logger: Logger\n \n extra: Mapping[str, Any]\n \n debug(msg: Any, *args: Any, exc_info: _ExcInfoType=..., stack_info: bool=..., extra: Optional[Dict[str, Any]]=..., **kwargs: Any) -> None\n \n \n===========changed ref 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n \"\"\"\n Parse and apply remote transport parameters.\n \n `from_session_ticket` is `True` when restoring saved transport parameters,\n and `False` when handling received transport parameters.\n \"\"\"\n \n + quic_transport_parameters = pull_quic_transport_parameters(Buffer(data=data))\n - quic_transport_parameters = pull_quic_transport_parameters(\n - Buffer(data=data), protocol_version=self._version\n - )\n \n # log event\n if self._quic_logger is not None and not from_session_ticket:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"parameters_set\",\n data=self._quic_logger.encode_transport_parameters(\n owner=\"remote\", parameters=quic_transport_parameters\n ),\n )\n \n # validate remote parameters\n if (\n self._is_client\n and not from_session_ticket\n and (\n quic_transport_parameters.original_destination_connection_id\n != self._original_destination_connection_id\n )\n ):\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"original_destination_connection_id does not match\",\n )\n if (\n quic_transport_parameters.active_connection_id_limit is not None\n and quic_transport_parameters.active_connection_id_limit < 2\n ):\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"active_connection_id_limit must be no less than 2\",\n )\n \n # store remote parameters\n if not from_session_ticket:\n if quic_transport_parameters\n===========changed ref 1===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n \",\n )\n \n # store remote parameters\n if not from_session_ticket:\n if quic_transport_parameters.ack_delay_exponent is not None:\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = (\n quic_transport_parameters.max_ack_delay / 1000.0\n )\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n if quic_transport_parameters.max_idle_timeout is not None:\n self._remote_max_idle_timeout = (\n quic_transport_parameters.max_idle_timeout / 1000.0\n )\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n "}}},{"rowIdx":4176,"cells":{"path":{"kind":"string","value":"tests.test_packet/PacketTest.test_pull_initial_client"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <3>: self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_client(self):\n <0> buf = Buffer(data=load(\"initial_client.bin\"))\n <1> header = pull_quic_header(buf, host_cid_length=8)\n <2> self.assertTrue(header.is_long_header)\n <3> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n <4> self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n <5> self.assertEqual(header.destination_cid, binascii.unhexlify(\"858b39368b8e3c6e\"))\n <6> self.assertEqual(header.source_cid, b\"\")\n <7> self.assertEqual(header.token, b\"\")\n <8> self.assertEqual(header.integrity_tag, b\"\")\n <9> self.assertEqual(header.rest_length, 1262)\n<10> self.assertEqual(buf.tell(), 18)\n<11> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 3===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n quic_transport_parameters = QuicTransportParameters(\n ack_delay_exponent=self._local_ack_delay_exponent,\n active_connection_id_limit=self._local_active_connection_id_limit,\n max_idle_timeout=int(self._configuration.idle_timeout * 1000),\n initial_max_data=self._local_max_data,\n initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local,\n initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote,\n initial_max_stream_data_uni=self._local_max_stream_data_uni,\n initial_max_streams_bidi=self._local_max_streams_bidi,\n initial_max_streams_uni=self._local_max_streams_uni,\n initial_source_connection_id=self._local_initial_source_connection_id,\n max_ack_delay=25,\n max_datagram_frame_size=self._configuration.max_datagram_frame_size,\n quantum_readiness=b\"Q\" * 1200\n if self._configuration.quantum_readiness_test\n else None,\n )\n if not self._is_client:\n quic_transport_parameters.original_destination_connection_id = (\n self._original_destination_connection_id\n )\n quic_transport_parameters.retry_source_connection_id = (\n self._retry_source_connection_id\n )\n \n # log event\n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"parameters_set\",\n data=self._quic_logger.encode_transport_parameters(\n owner=\"local\", parameters=quic_transport_parameters\n ),\n )\n \n buf = Buffer(capacity\n===========changed ref 4===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n # offset: 1\n (\n owner=\"local\", parameters=quic_transport_parameters\n ),\n )\n \n buf = Buffer(capacity=3 * PACKET_MAX_SIZE)\n - push_quic_transport_parameters(\n - buf, quic_transport_parameters, protocol_version=self._version\n - )\n + push_quic_transport_parameters(buf, quic_transport_parameters)\n return buf.data\n \n===========changed ref 5===========\n # module: aioquic.quic.configuration\n @dataclass\n class QuicConfiguration:\n \"\"\"\n A QUIC configuration.\n \"\"\"\n \n alpn_protocols: Optional[List[str]] = None\n \"\"\"\n A list of supported ALPN protocols.\n \"\"\"\n \n connection_id_length: int = 8\n \"\"\"\n The length in bytes of local connection IDs.\n \"\"\"\n \n idle_timeout: float = 60.0\n \"\"\"\n The idle timeout in seconds.\n \n The connection is terminated if nothing is received for the given duration.\n \"\"\"\n \n is_client: bool = True\n \"\"\"\n Whether this is the client side of the QUIC connection.\n \"\"\"\n \n max_data: int = 1048576\n \"\"\"\n Connection-wide flow control limit.\n \"\"\"\n \n max_stream_data: int = 1048576\n \"\"\"\n Per-stream flow control limit.\n \"\"\"\n \n quic_logger: Optional[QuicLogger] = None\n \"\"\"\n The :class:`~aioquic.quic.logger.QuicLogger` instance to log events to.\n \"\"\"\n \n secrets_log_file: TextIO = None\n \"\"\"\n A file-like object in which to log traffic secrets.\n \n This is useful to analyze traffic captures with Wireshark.\n \"\"\"\n \n server_name: Optional[str] = None\n \"\"\"\n The server name to send during the TLS handshake the Server Name Indication.\n \n .. note:: This is only used by clients.\n \"\"\"\n \n session_ticket: Optional[SessionTicket] = None\n \"\"\"\n The TLS session ticket which should be used for session resumption.\n \"\"\"\n \n cadata: Optional[bytes] = None\n cafile: Optional[str] = None\n capath: Optional[str] = None\n certificate: Any = None\n certificate_chain: List[Any] = field(default_factory=list)\n max_datagram_frame_size: Optional[int] = None\n private_key: Any = None\n quantum_readiness_test: bool = False\n supported_versions: List\n===========changed ref 6===========\n # module: aioquic.quic.configuration\n @dataclass\n class QuicConfiguration:\n # offset: 1\n None\n private_key: Any = None\n quantum_readiness_test: bool = False\n supported_versions: List[int] = field(\n default_factory=lambda: [\n QuicProtocolVersion.DRAFT_28,\n QuicProtocolVersion.DRAFT_27,\n - QuicProtocolVersion.DRAFT_26,\n - QuicProtocolVersion.DRAFT_25,\n ]\n )\n verify_mode: Optional[int] = None\n "}}},{"rowIdx":4177,"cells":{"path":{"kind":"string","value":"tests.test_packet/PacketTest.test_pull_initial_server"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <3>: self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_server(self):\n <0> buf = Buffer(data=load(\"initial_server.bin\"))\n <1> header = pull_quic_header(buf, host_cid_length=8)\n <2> self.assertTrue(header.is_long_header)\n <3> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n <4> self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n <5> self.assertEqual(header.destination_cid, b\"\")\n <6> self.assertEqual(header.source_cid, binascii.unhexlify(\"195c68344e28d479\"))\n <7> self.assertEqual(header.token, b\"\")\n <8> self.assertEqual(header.integrity_tag, b\"\")\n <9> self.assertEqual(header.rest_length, 184)\n<10> self.assertEqual(buf.tell(), 18)\n<11> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_client(self):\n buf = Buffer(data=load(\"initial_client.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, binascii.unhexlify(\"858b39368b8e3c6e\"))\n self.assertEqual(header.source_cid, b\"\")\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 1262)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 1===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 4===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n quic_transport_parameters = QuicTransportParameters(\n ack_delay_exponent=self._local_ack_delay_exponent,\n active_connection_id_limit=self._local_active_connection_id_limit,\n max_idle_timeout=int(self._configuration.idle_timeout * 1000),\n initial_max_data=self._local_max_data,\n initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local,\n initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote,\n initial_max_stream_data_uni=self._local_max_stream_data_uni,\n initial_max_streams_bidi=self._local_max_streams_bidi,\n initial_max_streams_uni=self._local_max_streams_uni,\n initial_source_connection_id=self._local_initial_source_connection_id,\n max_ack_delay=25,\n max_datagram_frame_size=self._configuration.max_datagram_frame_size,\n quantum_readiness=b\"Q\" * 1200\n if self._configuration.quantum_readiness_test\n else None,\n )\n if not self._is_client:\n quic_transport_parameters.original_destination_connection_id = (\n self._original_destination_connection_id\n )\n quic_transport_parameters.retry_source_connection_id = (\n self._retry_source_connection_id\n )\n \n # log event\n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"parameters_set\",\n data=self._quic_logger.encode_transport_parameters(\n owner=\"local\", parameters=quic_transport_parameters\n ),\n )\n \n buf = Buffer(capacity\n===========changed ref 5===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n # offset: 1\n (\n owner=\"local\", parameters=quic_transport_parameters\n ),\n )\n \n buf = Buffer(capacity=3 * PACKET_MAX_SIZE)\n - push_quic_transport_parameters(\n - buf, quic_transport_parameters, protocol_version=self._version\n - )\n + push_quic_transport_parameters(buf, quic_transport_parameters)\n return buf.data\n "}}},{"rowIdx":4178,"cells":{"path":{"kind":"string","value":"tests.test_packet/PacketTest.test_pull_retry"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <0>: original_destination_cid = binascii.unhexlify(\"fbbd219b7363b64b\")\n \n data = load(\"retry.bin\")\n buf = Buffer(data=load(\"retry.bin\"))\n <1>: buf = Buffer(data=data)\n <3>: self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n<19>: header.integrity_tag, binascii.unhexlify(\"f15154a271f10139ef6b129033ac38ae\")\n header.integrity_tag, binascii.unhexlify(\"e1a3c80c797ea401c08fc9c342a2d90d\")\n<26>: get_retry_integrity_tag(\n<27>: buf.data_slice(0, 109), binascii.unhexlify(\"fbbd219b7363b64b\"),\n<28>: ),\n<29>: get_retry_integrity_tag(buf.data_slice(0, 109), original_destination_cid,),\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_retry(self):\n <0> buf = Buffer(data=load(\"retry.bin\"))\n <1> header = pull_quic_header(buf, host_cid_length=8)\n <2> self.assertTrue(header.is_long_header)\n <3> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n <4> self.assertEqual(header.packet_type, PACKET_TYPE_RETRY)\n <5> self.assertEqual(header.destination_cid, binascii.unhexlify(\"e9d146d8d14cb28e\"))\n <6> self.assertEqual(\n <7> header.source_cid,\n <8> binascii.unhexlify(\"0b0a205a648fcf82d85f128b67bbe08053e6\"),\n <9> )\n<10> self.assertEqual(\n<11> header.token,\n<12> binascii.unhexlify(\n<13> \"44397a35d698393c134b08a932737859f446d3aadd00ed81540c8d8de172\"\n<14> \"906d3e7a111b503f9729b8928e7528f9a86a4581f9ebb4cb3b53c283661e\"\n<15> \"8530741a99192ee56914c5626998ec0f\"\n<16> ),\n<17> )\n<18> self.assertEqual(\n<19> header.integrity_tag, binascii.unhexlify(\"e1a3c80c797ea401c08fc9c342a2d90d\")\n<20> )\n<21> self.assertEqual(header.rest_length, 0)\n<22> self.assertEqual(buf.tell(), 125)\n<23> \n<24> # check integrity\n<25> self.assertEqual(\n<26> get_retry_integrity_tag(\n<27> buf.data_slice(0, 109), binascii.unhexlify(\"fbbd219b7363b64b\"),\n<28> ),\n<29> header."},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_retry(self):\n # offset: 1\n )\n \n \n===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertTrue(expr: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_server(self):\n buf = Buffer(data=load(\"initial_server.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, b\"\")\n self.assertEqual(header.source_cid, binascii.unhexlify(\"195c68344e28d479\"))\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 184)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 1===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_client(self):\n buf = Buffer(data=load(\"initial_client.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, binascii.unhexlify(\"858b39368b8e3c6e\"))\n self.assertEqual(header.source_cid, b\"\")\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 1262)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 2===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 4===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 5===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n quic_transport_parameters = QuicTransportParameters(\n ack_delay_exponent=self._local_ack_delay_exponent,\n active_connection_id_limit=self._local_active_connection_id_limit,\n max_idle_timeout=int(self._configuration.idle_timeout * 1000),\n initial_max_data=self._local_max_data,\n initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local,\n initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote,\n initial_max_stream_data_uni=self._local_max_stream_data_uni,\n initial_max_streams_bidi=self._local_max_streams_bidi,\n initial_max_streams_uni=self._local_max_streams_uni,\n initial_source_connection_id=self._local_initial_source_connection_id,\n max_ack_delay=25,\n max_datagram_frame_size=self._configuration.max_datagram_frame_size,\n quantum_readiness=b\"Q\" * 1200\n if self._configuration.quantum_readiness_test\n else None,\n )\n if not self._is_client:\n quic_transport_parameters.original_destination_connection_id = (\n self._original_destination_connection_id\n )\n quic_transport_parameters.retry_source_connection_id = (\n self._retry_source_connection_id\n )\n \n # log event\n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"parameters_set\",\n data=self._quic_logger.encode_transport_parameters(\n owner=\"local\", parameters=quic_transport_parameters\n ),\n )\n \n buf = Buffer(capacity\n===========changed ref 6===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _serialize_transport_parameters(self) -> bytes:\n # offset: 1\n (\n owner=\"local\", parameters=quic_transport_parameters\n ),\n )\n \n buf = Buffer(capacity=3 * PACKET_MAX_SIZE)\n - push_quic_transport_parameters(\n - buf, quic_transport_parameters, protocol_version=self._version\n - )\n + push_quic_transport_parameters(buf, quic_transport_parameters)\n return buf.data\n "}}},{"rowIdx":4179,"cells":{"path":{"kind":"string","value":"tests.test_packet/PacketTest.test_encode_quic_version_negotiation"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <3>: supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28],\n supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25],\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class PacketTest(TestCase):\n def test_encode_quic_version_negotiation(self):\n <0> data = encode_quic_version_negotiation(\n <1> destination_cid=binascii.unhexlify(\"9aac5a49ba87a849\"),\n <2> source_cid=binascii.unhexlify(\"f92f4336fa951ba1\"),\n <3> supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25],\n <4> )\n <5> self.assertEqual(data[1:], load(\"version_negotiation.bin\")[1:])\n <6> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.utils\n load(name)\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_server(self):\n buf = Buffer(data=load(\"initial_server.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, b\"\")\n self.assertEqual(header.source_cid, binascii.unhexlify(\"195c68344e28d479\"))\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 184)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 1===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_client(self):\n buf = Buffer(data=load(\"initial_client.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, binascii.unhexlify(\"858b39368b8e3c6e\"))\n self.assertEqual(header.source_cid, b\"\")\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 1262)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 2===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_retry(self):\n + original_destination_cid = binascii.unhexlify(\"fbbd219b7363b64b\")\n + \n + data = load(\"retry.bin\")\n - buf = Buffer(data=load(\"retry.bin\"))\n + buf = Buffer(data=data)\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_RETRY)\n self.assertEqual(header.destination_cid, binascii.unhexlify(\"e9d146d8d14cb28e\"))\n self.assertEqual(\n header.source_cid,\n binascii.unhexlify(\"0b0a205a648fcf82d85f128b67bbe08053e6\"),\n )\n self.assertEqual(\n header.token,\n binascii.unhexlify(\n \"44397a35d698393c134b08a932737859f446d3aadd00ed81540c8d8de172\"\n \"906d3e7a111b503f9729b8928e7528f9a86a4581f9ebb4cb3b53c283661e\"\n \"8530741a99192ee56914c5626998ec0f\"\n ),\n )\n self.assertEqual(\n + header.integrity_tag, binascii.unhexlify(\"f15154a271f10139ef6b129033ac38ae\")\n - header.integrity_tag, binascii.unhexlify(\"e1a3c80c797ea401c08fc9c342a2d90d\")\n )\n self.assertEqual(header.rest_length\n===========changed ref 3===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_retry(self):\n # offset: 1\n ea401c08fc9c342a2d90d\")\n )\n self.assertEqual(header.rest_length, 0)\n self.assertEqual(buf.tell(), 125)\n \n # check integrity\n self.assertEqual(\n - get_retry_integrity_tag(\n - buf.data_slice(0, 109), binascii.unhexlify(\"fbbd219b7363b64b\"),\n - ),\n + get_retry_integrity_tag(buf.data_slice(0, 109), original_destination_cid,),\n header.integrity_tag,\n )\n \n===========changed ref 4===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 5===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 6===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n "}}},{"rowIdx":4180,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <7>: params = pull_quic_transport_parameters(buf)\n params = pull_quic_transport_parameters(\n <8>: buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <9>: )\n<29>: push_quic_transport_parameters(buf, params)\n push_quic_transport_parameters(\n<30>: buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n<31>: )\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params(self):\n <0> data = binascii.unhexlify(\n <1> \"010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff\"\n <2> \"a05048000ffff06048000ffff0801060a01030b0119\"\n <3> )\n <4> \n <5> # parse\n <6> buf = Buffer(data=data)\n <7> params = pull_quic_transport_parameters(\n <8> buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <9> )\n<10> self.assertEqual(\n<11> params,\n<12> QuicTransportParameters(\n<13> max_idle_timeout=10000,\n<14> stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n<15> max_udp_payload_size=2020,\n<16> initial_max_data=393210,\n<17> initial_max_stream_data_bidi_local=65535,\n<18> initial_max_stream_data_bidi_remote=65535,\n<19> initial_max_stream_data_uni=None,\n<20> initial_max_streams_bidi=6,\n<21> initial_max_streams_uni=None,\n<22> ack_delay_exponent=3,\n<23> max_ack_delay=25,\n<24> ),\n<25> )\n<26> \n<27> # serialize\n<28> buf = Buffer(capacity=len(data))\n<29> push_quic_transport_parameters(\n<30> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n<31> )\n<32> self.assertEqual(len(buf.data), len(data))\n<33> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: tests.test_packet.ParamsTest\n maxDiff = None\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_encode_quic_version_negotiation(self):\n data = encode_quic_version_negotiation(\n destination_cid=binascii.unhexlify(\"9aac5a49ba87a849\"),\n source_cid=binascii.unhexlify(\"f92f4336fa951ba1\"),\n + supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28],\n - supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25],\n )\n self.assertEqual(data[1:], load(\"version_negotiation.bin\")[1:])\n \n===========changed ref 1===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_server(self):\n buf = Buffer(data=load(\"initial_server.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, b\"\")\n self.assertEqual(header.source_cid, binascii.unhexlify(\"195c68344e28d479\"))\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 184)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 2===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_client(self):\n buf = Buffer(data=load(\"initial_client.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, binascii.unhexlify(\"858b39368b8e3c6e\"))\n self.assertEqual(header.source_cid, b\"\")\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 1262)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 3===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_retry(self):\n + original_destination_cid = binascii.unhexlify(\"fbbd219b7363b64b\")\n + \n + data = load(\"retry.bin\")\n - buf = Buffer(data=load(\"retry.bin\"))\n + buf = Buffer(data=data)\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_RETRY)\n self.assertEqual(header.destination_cid, binascii.unhexlify(\"e9d146d8d14cb28e\"))\n self.assertEqual(\n header.source_cid,\n binascii.unhexlify(\"0b0a205a648fcf82d85f128b67bbe08053e6\"),\n )\n self.assertEqual(\n header.token,\n binascii.unhexlify(\n \"44397a35d698393c134b08a932737859f446d3aadd00ed81540c8d8de172\"\n \"906d3e7a111b503f9729b8928e7528f9a86a4581f9ebb4cb3b53c283661e\"\n \"8530741a99192ee56914c5626998ec0f\"\n ),\n )\n self.assertEqual(\n + header.integrity_tag, binascii.unhexlify(\"f15154a271f10139ef6b129033ac38ae\")\n - header.integrity_tag, binascii.unhexlify(\"e1a3c80c797ea401c08fc9c342a2d90d\")\n )\n self.assertEqual(header.rest_length\n===========changed ref 4===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_retry(self):\n # offset: 1\n ea401c08fc9c342a2d90d\")\n )\n self.assertEqual(header.rest_length, 0)\n self.assertEqual(buf.tell(), 125)\n \n # check integrity\n self.assertEqual(\n - get_retry_integrity_tag(\n - buf.data_slice(0, 109), binascii.unhexlify(\"fbbd219b7363b64b\"),\n - ),\n + get_retry_integrity_tag(buf.data_slice(0, 109), original_destination_cid,),\n header.integrity_tag,\n )\n \n===========changed ref 5===========\n # module: aioquic.quic.packet\n class QuicProtocolVersion(IntEnum):\n NEGOTIATION = 0\n - DRAFT_25 = 0xFF000019\n - DRAFT_26 = 0xFF00001A\n DRAFT_27 = 0xFF00001B\n DRAFT_28 = 0xFF00001C\n \n===========changed ref 6===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n client._parse_transport_parameters(buf.data)\n \n===========changed ref 7===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n buf = Buffer(capacity=32)\n push_quic_transport_parameters(\n buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n ),\n - protocol_version=QuicProtocolVersion.DRAFT_28,\n )\n with self.assertRaises(QuicConnectionError) as cm:\n client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n "}}},{"rowIdx":4181,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params_disable_active_migration"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <4>: params = pull_quic_transport_parameters(buf)\n params = pull_quic_transport_parameters(\n <5>: buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <6>: )\n<11>: push_quic_transport_parameters(buf, params)\n push_quic_transport_parameters(\n<12>: buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n<13>: )\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_disable_active_migration(self):\n <0> data = binascii.unhexlify(\"0c00\")\n <1> \n <2> # parse\n <3> buf = Buffer(data=data)\n <4> params = pull_quic_transport_parameters(\n <5> buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <6> )\n <7> self.assertEqual(params, QuicTransportParameters(disable_active_migration=True))\n <8> \n <9> # serialize\n<10> buf = Buffer(capacity=len(data))\n<11> push_quic_transport_parameters(\n<12> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n<13> )\n<14> self.assertEqual(buf.data, data)\n<15> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_encode_quic_version_negotiation(self):\n data = encode_quic_version_negotiation(\n destination_cid=binascii.unhexlify(\"9aac5a49ba87a849\"),\n source_cid=binascii.unhexlify(\"f92f4336fa951ba1\"),\n + supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28],\n - supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25],\n )\n self.assertEqual(data[1:], load(\"version_negotiation.bin\")[1:])\n \n===========changed ref 1===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_server(self):\n buf = Buffer(data=load(\"initial_server.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, b\"\")\n self.assertEqual(header.source_cid, binascii.unhexlify(\"195c68344e28d479\"))\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 184)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 2===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_client(self):\n buf = Buffer(data=load(\"initial_client.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, binascii.unhexlify(\"858b39368b8e3c6e\"))\n self.assertEqual(header.source_cid, b\"\")\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 1262)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 3===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n - def test_params_legacy(self):\n - data = binascii.unhexlify(\n - \"004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026\"\n - \"710000600048000ffff000500048000ffff000400048005fffa000a00010300\"\n - \"0b0001190003000247e4\"\n - )\n - \n - # parse\n - buf = Buffer(data=data)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(\n - params,\n - QuicTransportParameters(\n - max_idle_timeout=10000,\n - stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n - max_udp_payload_size=2020,\n - initial_max_data=393210,\n - initial_max_stream_data_bidi_local=65535,\n - initial_max_stream_data_bidi_remote=65535,\n - initial_max_stream_data_uni=None,\n - initial_max_streams_bidi=6,\n - initial_max_streams_uni=None,\n - ack_delay_exponent=3,\n - max_ack_delay=25,\n - ),\n - )\n - \n - # serialize\n - buf = Buffer(capacity=len(data))\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(len(buf.data), len(data))\n - \n===========changed ref 4===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params(self):\n data = binascii.unhexlify(\n \"010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff\"\n \"a05048000ffff06048000ffff0801060a01030b0119\"\n )\n \n # parse\n buf = Buffer(data=data)\n + params = pull_quic_transport_parameters(buf)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_27\n - )\n self.assertEqual(\n params,\n QuicTransportParameters(\n max_idle_timeout=10000,\n stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n max_udp_payload_size=2020,\n initial_max_data=393210,\n initial_max_stream_data_bidi_local=65535,\n initial_max_stream_data_bidi_remote=65535,\n initial_max_stream_data_uni=None,\n initial_max_streams_bidi=6,\n initial_max_streams_uni=None,\n ack_delay_exponent=3,\n max_ack_delay=25,\n ),\n )\n \n # serialize\n buf = Buffer(capacity=len(data))\n + push_quic_transport_parameters(buf, params)\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n - )\n self.assertEqual(len(buf.data), len(data))\n "}}},{"rowIdx":4182,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params_preferred_address"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <7>: params = pull_quic_transport_parameters(buf)\n params = pull_quic_transport_parameters(\n <8>: buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <9>: )\n<24>: push_quic_transport_parameters(buf, params)\n push_quic_transport_parameters(\n<25>: buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n<26>: )\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_preferred_address(self):\n <0> data = binascii.unhexlify(\n <1> \"0d3b8ba27b8611532400890200000000f03c91fffe69a45411531262c4518d6\"\n <2> \"3013f0c287ed3573efa9095603746b2e02d45480ba6643e5c6e7d48ecb4\"\n <3> )\n <4> \n <5> # parse\n <6> buf = Buffer(data=data)\n <7> params = pull_quic_transport_parameters(\n <8> buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <9> )\n<10> self.assertEqual(\n<11> params,\n<12> QuicTransportParameters(\n<13> preferred_address=QuicPreferredAddress(\n<14> ipv4_address=(\"139.162.123.134\", 4435),\n<15> ipv6_address=(\"2400:8902::f03c:91ff:fe69:a454\", 4435),\n<16> connection_id=b\"b\\xc4Q\\x8dc\\x01?\\x0c(~\\xd3W>\\xfa\\x90\\x95`7\",\n<17> stateless_reset_token=b\"F\\xb2\\xe0-EH\\x0b\\xa6d>\\\\n}H\\xec\\xb4\",\n<18> ),\n<19> ),\n<20> )\n<21> \n<22> # serialize\n<23> buf = Buffer(capacity=1000)\n<24> push_quic_transport_parameters(\n<25> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n<26> )\n<27> self.assertEqual(buf.data, data)\n<28> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n - def test_params_disable_active_migration_legacy(self):\n - data = binascii.unhexlify(\"0004000c0000\")\n - \n - # parse\n - buf = Buffer(data=data)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(params, QuicTransportParameters(disable_active_migration=True))\n - \n - # serialize\n - buf = Buffer(capacity=len(data))\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(buf.data, data)\n - \n===========changed ref 1===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_disable_active_migration(self):\n data = binascii.unhexlify(\"0c00\")\n \n # parse\n buf = Buffer(data=data)\n + params = pull_quic_transport_parameters(buf)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_27\n - )\n self.assertEqual(params, QuicTransportParameters(disable_active_migration=True))\n \n # serialize\n buf = Buffer(capacity=len(data))\n + push_quic_transport_parameters(buf, params)\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n - )\n self.assertEqual(buf.data, data)\n \n===========changed ref 2===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_encode_quic_version_negotiation(self):\n data = encode_quic_version_negotiation(\n destination_cid=binascii.unhexlify(\"9aac5a49ba87a849\"),\n source_cid=binascii.unhexlify(\"f92f4336fa951ba1\"),\n + supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28],\n - supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25],\n )\n self.assertEqual(data[1:], load(\"version_negotiation.bin\")[1:])\n \n===========changed ref 3===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_server(self):\n buf = Buffer(data=load(\"initial_server.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, b\"\")\n self.assertEqual(header.source_cid, binascii.unhexlify(\"195c68344e28d479\"))\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 184)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 4===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_client(self):\n buf = Buffer(data=load(\"initial_client.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, binascii.unhexlify(\"858b39368b8e3c6e\"))\n self.assertEqual(header.source_cid, b\"\")\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 1262)\n self.assertEqual(buf.tell(), 18)\n \n===========changed ref 5===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n - def test_params_legacy(self):\n - data = binascii.unhexlify(\n - \"004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026\"\n - \"710000600048000ffff000500048000ffff000400048005fffa000a00010300\"\n - \"0b0001190003000247e4\"\n - )\n - \n - # parse\n - buf = Buffer(data=data)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(\n - params,\n - QuicTransportParameters(\n - max_idle_timeout=10000,\n - stateless_reset_token=b\"\\xcc/\\xd6\\xe7\\xd9zS\\xab[\\xe8[(\\xd7\\\\\\x80\\x08\",\n - max_udp_payload_size=2020,\n - initial_max_data=393210,\n - initial_max_stream_data_bidi_local=65535,\n - initial_max_stream_data_bidi_remote=65535,\n - initial_max_stream_data_uni=None,\n - initial_max_streams_bidi=6,\n - initial_max_streams_uni=None,\n - ack_delay_exponent=3,\n - max_ack_delay=25,\n - ),\n - )\n - \n - # serialize\n - buf = Buffer(capacity=len(data))\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(len(buf.data), len(data))\n - "}}},{"rowIdx":4183,"cells":{"path":{"kind":"string","value":"tests.test_packet/ParamsTest.test_params_unknown"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fac2fdd03d55987358b574ad40a64b8c03791bc4"},"commit_message":{"kind":"string","value":"Drop support for draft-25 and draft-26"},"ground_truth":{"kind":"string","value":" <4>: params = pull_quic_transport_parameters(buf)\n params = pull_quic_transport_parameters(\n <5>: buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <6>: )\n"},"main_code":{"kind":"string","value":" # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_unknown(self):\n <0> data = binascii.unhexlify(\"8000ff000100\")\n <1> \n <2> # parse\n <3> buf = Buffer(data=data)\n <4> params = pull_quic_transport_parameters(\n <5> buf, protocol_version=QuicProtocolVersion.DRAFT_27\n <6> )\n <7> self.assertEqual(params, QuicTransportParameters())\n <8> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: binascii\n unhexlify(hexstr: _Ascii, /) -> bytes\n \n at: unittest.case.TestCase\n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n - def test_params_disable_active_migration_legacy(self):\n - data = binascii.unhexlify(\"0004000c0000\")\n - \n - # parse\n - buf = Buffer(data=data)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(params, QuicTransportParameters(disable_active_migration=True))\n - \n - # serialize\n - buf = Buffer(capacity=len(data))\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(buf.data, data)\n - \n===========changed ref 1===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_disable_active_migration(self):\n data = binascii.unhexlify(\"0c00\")\n \n # parse\n buf = Buffer(data=data)\n + params = pull_quic_transport_parameters(buf)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_27\n - )\n self.assertEqual(params, QuicTransportParameters(disable_active_migration=True))\n \n # serialize\n buf = Buffer(capacity=len(data))\n + push_quic_transport_parameters(buf, params)\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n - )\n self.assertEqual(buf.data, data)\n \n===========changed ref 2===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_encode_quic_version_negotiation(self):\n data = encode_quic_version_negotiation(\n destination_cid=binascii.unhexlify(\"9aac5a49ba87a849\"),\n source_cid=binascii.unhexlify(\"f92f4336fa951ba1\"),\n + supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28],\n - supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25],\n )\n self.assertEqual(data[1:], load(\"version_negotiation.bin\")[1:])\n \n===========changed ref 3===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n - def test_params_preferred_address_legacy(self):\n - data = binascii.unhexlify(\n - \"003f000d003b8ba27b8611532400890200000000f03c91fffe69a4541153126\"\n - \"2c4518d63013f0c287ed3573efa9095603746b2e02d45480ba6643e5c6e7d48\"\n - \"ecb4\"\n - )\n - \n - # parse\n - buf = Buffer(data=data)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(\n - params,\n - QuicTransportParameters(\n - preferred_address=QuicPreferredAddress(\n - ipv4_address=(\"139.162.123.134\", 4435),\n - ipv6_address=(\"2400:8902::f03c:91ff:fe69:a454\", 4435),\n - connection_id=b\"b\\xc4Q\\x8dc\\x01?\\x0c(~\\xd3W>\\xfa\\x90\\x95`7\",\n - stateless_reset_token=b\"F\\xb2\\xe0-EH\\x0b\\xa6d>\\\\n}H\\xec\\xb4\",\n - ),\n - ),\n - )\n - \n - # serialize\n - buf = Buffer(capacity=len(data))\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25\n - )\n - self.assertEqual(buf.data, data)\n - \n===========changed ref 4===========\n # module: tests.test_packet\n class ParamsTest(TestCase):\n def test_params_preferred_address(self):\n data = binascii.unhexlify(\n \"0d3b8ba27b8611532400890200000000f03c91fffe69a45411531262c4518d6\"\n \"3013f0c287ed3573efa9095603746b2e02d45480ba6643e5c6e7d48ecb4\"\n )\n \n # parse\n buf = Buffer(data=data)\n + params = pull_quic_transport_parameters(buf)\n - params = pull_quic_transport_parameters(\n - buf, protocol_version=QuicProtocolVersion.DRAFT_27\n - )\n self.assertEqual(\n params,\n QuicTransportParameters(\n preferred_address=QuicPreferredAddress(\n ipv4_address=(\"139.162.123.134\", 4435),\n ipv6_address=(\"2400:8902::f03c:91ff:fe69:a454\", 4435),\n connection_id=b\"b\\xc4Q\\x8dc\\x01?\\x0c(~\\xd3W>\\xfa\\x90\\x95`7\",\n stateless_reset_token=b\"F\\xb2\\xe0-EH\\x0b\\xa6d>\\\\n}H\\xec\\xb4\",\n ),\n ),\n )\n \n # serialize\n buf = Buffer(capacity=1000)\n + push_quic_transport_parameters(buf, params)\n - push_quic_transport_parameters(\n - buf, params, protocol_version=QuicProtocolVersion.DRAFT_27\n - )\n self.assertEqual(buf.data, data)\n \n===========changed ref 5===========\n # module: tests.test_packet\n class PacketTest(TestCase):\n def test_pull_initial_server(self):\n buf = Buffer(data=load(\"initial_server.bin\"))\n header = pull_quic_header(buf, host_cid_length=8)\n self.assertTrue(header.is_long_header)\n + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28)\n - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)\n self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL)\n self.assertEqual(header.destination_cid, b\"\")\n self.assertEqual(header.source_cid, binascii.unhexlify(\"195c68344e28d479\"))\n self.assertEqual(header.token, b\"\")\n self.assertEqual(header.integrity_tag, b\"\")\n self.assertEqual(header.rest_length, 184)\n self.assertEqual(buf.tell(), 18)\n "}}},{"rowIdx":4184,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"c948332d6e0f56e8311c2cbf6908a1abb05a0c6b"},"commit_message":{"kind":"string","value":"[connection] validate retry_source_connection_id matches"},"ground_truth":{"kind":"string","value":"<20>: if (\n<21>: self._is_client\n<22>: if not from_session_ticket:\n and not from_session_ticket\n<23>: if self._is_client and (\n and (\n<26>: ):\n )\n<27>: ):\n<28>: raise QuicConnectionError(\n raise QuicConnectionError(\n<29>: error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<30>: frame_type=QuicFrameType.CRYPTO,\n frame_type=QuicFrameType.CRYPTO,\n<31>: reason_phrase=\"original_destination_connection_id does not match\",\n reason_phrase=\"original_destination_connection_id does not match\",\n<32>: )\n if self._is_client and (\n quic_transport_parameters.retry_source_connection_id\n != self._retry_source_connection_id\n ):\n )\n<33>: raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"retry_source_connection_id does not match\",\n )\n if (\n if (\n<34>: quic_"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n <0> \"\"\"\n <1> Parse and apply remote transport parameters.\n <2> \n <3> `from_session_ticket` is `True` when restoring saved transport parameters,\n <4> and `False` when handling received transport parameters.\n <5> \"\"\"\n <6> \n <7> quic_transport_parameters = pull_quic_transport_parameters(Buffer(data=data))\n <8> \n <9> # log event\n<10> if self._quic_logger is not None and not from_session_ticket:\n<11> self._quic_logger.log_event(\n<12> category=\"transport\",\n<13> event=\"parameters_set\",\n<14> data=self._quic_logger.encode_transport_parameters(\n<15> owner=\"remote\", parameters=quic_transport_parameters\n<16> ),\n<17> )\n<18> \n<19> # validate remote parameters\n<20> if (\n<21> self._is_client\n<22> and not from_session_ticket\n<23> and (\n<24> quic_transport_parameters.original_destination_connection_id\n<25> != self._original_destination_connection_id\n<26> )\n<27> ):\n<28> raise QuicConnectionError(\n<29> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<30> frame_type=QuicFrameType.CRYPTO,\n<31> reason_phrase=\"original_destination_connection_id does not match\",\n<32> )\n<33> if (\n<34> quic_transport_parameters.active_connection_id_limit is not None\n<35> and quic_transport_parameters.active_connection_id_limit < 2\n<36> ):\n<37> raise QuicConnectionError(\n<38> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<39> frame_type=QuicFrameType.CRYPTO,\n<40> reason_phrase=\"active_connection_id_limit must be no less than 2\",\n<41> )\n<42> \n<43> # store remote parameters\n<44> if not from_session_ticket:\n<45> if"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = (\n quic_transport_parameters.max_ack_delay / 1000.0\n )\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n if quic_transport_parameters.max_idle_timeout is not None:\n self._remote_max_idle_timeout = (\n quic_transport_parameters.max_idle_timeout / 1000.0\n )\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str)\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._is_client = configuration.is_client\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client,\n odcid=self._original_destination_connection_id,\n )\n \n self._remote_ack_delay_exponent = 3\n \n self._remote_active_connection_id_limit = 0\n \n self._remote_max_idle_timeout = 0.0 # seconds\n \n self._remote_max_datagram_frame_size: Optional[int] = None\n \n self._retry_source_connection_id = retry_source_connection_id\n \n self._original_destination_connection_id = self._peer_cid\n self._original_destination_connection_id = (\n original_destination_connection_id\n )\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._retry_source_connection_id = header.source_cid\n \n \n===========changed ref 0===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + @patch(\"aioquic.quic.retry.QuicRetryTokenHandler.validate_token\")\n + def test_connect_and_serve_with_stateless_retry_bad_token(self, mock_validate):\n + mock_validate.side_effect = ValueError(\"Decryption failed.\")\n + \n + run(self.run_server(stateless_retry=True))\n + with self.assertRaises(ConnectionError):\n + run(\n + self.run_client(\n + configuration=QuicConfiguration(is_client=True, idle_timeout=4.0),\n + )\n + )\n + \n===========changed ref 1===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n - @patch(\"aioquic.quic.retry.QuicRetryTokenHandler.validate_token\")\n - def test_connect_and_serve_with_stateless_retry_bad(self, mock_validate):\n - mock_validate.side_effect = ValueError(\"Decryption failed.\")\n - \n - run(self.run_server(stateless_retry=True))\n - with self.assertRaises(ConnectionError):\n - run(\n - self.run_client(\n - configuration=QuicConfiguration(is_client=True, idle_timeout=4.0),\n - )\n - )\n - \n===========changed ref 2===========\n # module: tests.test_asyncio\n class HighLevelTest(TestCase):\n + def test_connect_and_serve_with_stateless_retry_bad_retry_source_connection_id(\n + self,\n + ):\n + \"\"\"\n + If the server's transport parameters do not have the correct\n + retry_source_connection_id the connection must fail.\n + \"\"\"\n + \n + def create_protocol(*args, **kwargs):\n + protocol = QuicConnectionProtocol(*args, **kwargs)\n + protocol._quic._retry_source_connection_id = None\n + return protocol\n + \n + run(self.run_server(create_protocol=create_protocol, stateless_retry=True))\n + with self.assertRaises(ConnectionError):\n + run(self.run_client())\n + \n===========changed ref 3===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def receive_datagram(self, data: bytes, addr: NetworkAddress, now: float) -> None:\n \"\"\"\n Handle an incoming datagram.\n \n After calling this method call :meth:`datagrams_to_send` to retrieve data\n which needs to be sent.\n \n :param data: The datagram which was received.\n :param addr: The network address from which the datagram was received.\n :param now: The current time.\n \"\"\"\n # stop handling packets when closing\n if self._state in END_STATES:\n return\n \n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"datagrams_received\",\n data={\"byte_length\": len(data), \"count\": 1},\n )\n \n buf = Buffer(data=data)\n while not buf.eof():\n start_off = buf.tell()\n try:\n header = pull_quic_header(\n buf, host_cid_length=self._configuration.connection_id_length\n )\n except ValueError:\n return\n \n # check destination CID matches\n destination_cid_seq: Optional[int] = None\n for connection_id in self._host_cids:\n if header.destination_cid == connection_id.cid:\n destination_cid_seq = connection_id.sequence_number\n break\n if self._is_client and destination_cid_seq is None:\n if self._quic_logger is not None:\n self._quic_logger.log_event(\n category=\"transport\",\n event=\"packet_dropped\",\n data={\"trigger\": \"unknown_connection_id\"},\n )\n return\n \n # check protocol version\n if (\n self._is_client\n and self._state == QuicConnectionState.FIRSTFLIGHT\n and header.version == QuicProtocolVersion.NEGOTIATION\n ):\n # version negotiation\n versions = []\n while not buf.eof():"}}},{"rowIdx":4185,"cells":{"path":{"kind":"string","value":"aioquic.quic.retry/QuicRetryTokenHandler.create_token"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fbb3b5d771c61ff0fd012961ee05757bd7e69808"},"commit_message":{"kind":"string","value":"[server] rework retry token serialization / parsing"},"ground_truth":{"kind":"string","value":" <0>: retry_message = (\n <1>: encode_address(addr)\n <2>: + b\"|\"\n <3>: buf = Buffer(capacity=512)\n push_opaque(buf, 1, encode_address(addr))\n push_opaque(buf, 1, original_destination_connection_id)\n + original_destination_connection_id\n <4>: + b\"|\"\n <5>: push_opaque(buf, 1, retry_source_connection_id)\n + retry_source_connection_id\n <6>: )\n <8>: buf.data,\n retry_message,\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n def create_token(\n self,\n addr: NetworkAddress,\n original_destination_connection_id: bytes,\n retry_source_connection_id: bytes,\n ) -> bytes:\n <0> retry_message = (\n <1> encode_address(addr)\n <2> + b\"|\"\n <3> + original_destination_connection_id\n <4> + b\"|\"\n <5> + retry_source_connection_id\n <6> )\n <7> return self._key.public_key().encrypt(\n <8> retry_message,\n <9> padding.OAEP(\n<10> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n<11> ),\n<12> )\n<13> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.quic.retry\n encode_address(addr: NetworkAddress) -> bytes\n \n at: aioquic.quic.retry.QuicRetryTokenHandler.__init__\n self._key = rsa.generate_private_key(\n public_exponent=65537, key_size=1024, backend=default_backend()\n )\n \n "}}},{"rowIdx":4186,"cells":{"path":{"kind":"string","value":"aioquic.quic.retry/QuicRetryTokenHandler.validate_token"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"fbb3b5d771c61ff0fd012961ee05757bd7e69808"},"commit_message":{"kind":"string","value":"[server] rework retry token serialization / parsing"},"ground_truth":{"kind":"string","value":" <0>: buf = Buffer(\n data=self._key.decrypt(\n retry_message = self._key.decrypt(\n <1>: token,\n token,\n <2>: padding.OAEP(\n padding.OAEP(\n <3>: mgf=padding.MGF1(hashes.SHA256()),\n algorithm=hashes.SHA256(),\n label=None,\n ),\n mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n <4>: )\n ),\n <6>: (\n <7>: encoded_addr,\n <8>: encoded_addr = pull_opaque(buf, 1)\n original_destination_connection_id = pull_opaque(buf, 1)\n original_destination_connection_id,\n <9>: retry_source_connection_id,\n<10>: ) = retry_message.split(b\"|\", maxsplit=2)\n<11>: retry_source_connection_id = pull_opaque(buf, 1)\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n def validate_token(self, addr: NetworkAddress, token: bytes) -> Tuple[bytes, bytes]:\n <0> retry_message = self._key.decrypt(\n <1> token,\n <2> padding.OAEP(\n <3> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n <4> ),\n <5> )\n <6> (\n <7> encoded_addr,\n <8> original_destination_connection_id,\n <9> retry_source_connection_id,\n<10> ) = retry_message.split(b\"|\", maxsplit=2)\n<11> if encoded_addr != encode_address(addr):\n<12> raise ValueError(\"Remote address does not match.\")\n<13> return original_destination_connection_id, retry_source_connection_id\n<14> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.quic.retry\n encode_address(addr: NetworkAddress) -> bytes\n \n at: aioquic.quic.retry.QuicRetryTokenHandler.__init__\n self._key = rsa.generate_private_key(\n public_exponent=65537, key_size=1024, backend=default_backend()\n )\n \n \n===========changed ref 0===========\n # module: aioquic.quic.retry\n class QuicRetryTokenHandler:\n def create_token(\n self,\n addr: NetworkAddress,\n original_destination_connection_id: bytes,\n retry_source_connection_id: bytes,\n ) -> bytes:\n - retry_message = (\n - encode_address(addr)\n - + b\"|\"\n + buf = Buffer(capacity=512)\n + push_opaque(buf, 1, encode_address(addr))\n + push_opaque(buf, 1, original_destination_connection_id)\n - + original_destination_connection_id\n - + b\"|\"\n + push_opaque(buf, 1, retry_source_connection_id)\n - + retry_source_connection_id\n - )\n return self._key.public_key().encrypt(\n + buf.data,\n - retry_message,\n padding.OAEP(\n mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None\n ),\n )\n "}}},{"rowIdx":4187,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e6d57d5332f7a4f37a6bced810d0db8401604645"},"commit_message":{"kind":"string","value":"[parameters] check server-only transport parameters"},"ground_truth":{"kind":"string","value":" <2>: buf = Buffer(capacity=32)\n <3>: data = encode_transport_parameters(\n push_quic_transport_parameters(\n <4>: buf,\n <7>: )\n ),\n <9>: client._parse_transport_parameters(data)\n client._parse_transport_parameters(buf.data)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n <0> client = create_standalone_client(self)\n <1> \n <2> buf = Buffer(capacity=32)\n <3> push_quic_transport_parameters(\n <4> buf,\n <5> QuicTransportParameters(\n <6> original_destination_connection_id=client.original_destination_connection_id\n <7> ),\n <8> )\n <9> client._parse_transport_parameters(buf.data)\n<10> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n create_standalone_client(self, **client_options)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n + def encode_transport_parameters(parameters: QuicTransportParameters) -> bytes:\n + buf = Buffer(capacity=512)\n + push_quic_transport_parameters(buf, parameters)\n + return buf.data\n + "}}},{"rowIdx":4188,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_parse_transport_parameters_with_bad_active_connection_id_limit"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e6d57d5332f7a4f37a6bced810d0db8401604645"},"commit_message":{"kind":"string","value":"[parameters] check server-only transport parameters"},"ground_truth":{"kind":"string","value":" <3>: buf = Buffer(capacity=32)\n <4>: data = encode_transport_parameters(\n push_quic_transport_parameters(\n <5>: buf,\n <9>: )\n ),\n<12>: client._parse_transport_parameters(data)\n client._parse_transport_parameters(buf.data)\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n <0> client = create_standalone_client(self)\n <1> \n <2> for active_connection_id_limit in [0, 1]:\n <3> buf = Buffer(capacity=32)\n <4> push_quic_transport_parameters(\n <5> buf,\n <6> QuicTransportParameters(\n <7> active_connection_id_limit=active_connection_id_limit,\n <8> original_destination_connection_id=client.original_destination_connection_id,\n <9> ),\n<10> )\n<11> with self.assertRaises(QuicConnectionError) as cm:\n<12> client._parse_transport_parameters(buf.data)\n<13> self.assertEqual(\n<14> cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n<15> )\n<16> self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n<17> self.assertEqual(\n<18> cm.exception.reason_phrase,\n<19> \"active_connection_id_limit must be no less than 2\",\n<20> )\n<21> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n create_standalone_client(self, **client_options)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n at: unittest.case._AssertRaisesContext.__exit__\n self.exception = exc_value.with_traceback(None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n - buf = Buffer(capacity=32)\n + data = encode_transport_parameters(\n - push_quic_transport_parameters(\n - buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n + )\n - ),\n )\n + client._parse_transport_parameters(data)\n - client._parse_transport_parameters(buf.data)\n \n===========changed ref 1===========\n # module: tests.test_connection\n + def encode_transport_parameters(parameters: QuicTransportParameters) -> bytes:\n + buf = Buffer(capacity=512)\n + push_quic_transport_parameters(buf, parameters)\n + return buf.data\n + "}}},{"rowIdx":4189,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._parse_transport_parameters"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"e6d57d5332f7a4f37a6bced810d0db8401604645"},"commit_message":{"kind":"string","value":"[parameters] check server-only transport parameters"},"ground_truth":{"kind":"string","value":"<20>: if not self._is_client:\n for attr in [\n \"original_destination_connection_id\",\n \"preferred_address\",\n \"retry_source_connection_id\",\n \"stateless_reset_token\",\n ]:\n if getattr(quic_transport_parameters, attr) is not None:\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"%s is not allowed for clients\" % attr,\n )\n \n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n <0> \"\"\"\n <1> Parse and apply remote transport parameters.\n <2> \n <3> `from_session_ticket` is `True` when restoring saved transport parameters,\n <4> and `False` when handling received transport parameters.\n <5> \"\"\"\n <6> \n <7> quic_transport_parameters = pull_quic_transport_parameters(Buffer(data=data))\n <8> \n <9> # log event\n<10> if self._quic_logger is not None and not from_session_ticket:\n<11> self._quic_logger.log_event(\n<12> category=\"transport\",\n<13> event=\"parameters_set\",\n<14> data=self._quic_logger.encode_transport_parameters(\n<15> owner=\"remote\", parameters=quic_transport_parameters\n<16> ),\n<17> )\n<18> \n<19> # validate remote parameters\n<20> if not from_session_ticket:\n<21> if self._is_client and (\n<22> quic_transport_parameters.original_destination_connection_id\n<23> != self._original_destination_connection_id\n<24> ):\n<25> raise QuicConnectionError(\n<26> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<27> frame_type=QuicFrameType.CRYPTO,\n<28> reason_phrase=\"original_destination_connection_id does not match\",\n<29> )\n<30> if self._is_client and (\n<31> quic_transport_parameters.retry_source_connection_id\n<32> != self._retry_source_connection_id\n<33> ):\n<34> raise QuicConnectionError(\n<35> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n<36> frame_type=QuicFrameType.CRYPTO,\n<37> reason_phrase=\"retry_source_connection_id does not match\",\n<38> )\n<39> if (\n<40> quic_transport_parameters.active_connection_id_limit is not None\n<41> and quic_transport_parameters.active_connection_id"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _parse_transport_parameters(\n self, data: bytes, from_session_ticket: bool = False\n ) -> None:\n # offset: 1\n ):\n raise QuicConnectionError(\n error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR,\n frame_type=QuicFrameType.CRYPTO,\n reason_phrase=\"active_connection_id_limit must be no less than 2\",\n )\n \n # store remote parameters\n if not from_session_ticket:\n if quic_transport_parameters.ack_delay_exponent is not None:\n self._remote_ack_delay_exponent = self._remote_ack_delay_exponent\n if quic_transport_parameters.max_ack_delay is not None:\n self._loss.max_ack_delay = (\n quic_transport_parameters.max_ack_delay / 1000.0\n )\n if quic_transport_parameters.active_connection_id_limit is not None:\n self._remote_active_connection_id_limit = (\n quic_transport_parameters.active_connection_id_limit\n )\n if quic_transport_parameters.max_idle_timeout is not None:\n self._remote_max_idle_timeout = (\n quic_transport_parameters.max_idle_timeout / 1000.0\n )\n self._remote_max_datagram_frame_size = (\n quic_transport_parameters.max_datagram_frame_size\n )\n for param in [\n \"max_data\",\n \"max_stream_data_bidi_local\",\n \"max_stream_data_bidi_remote\",\n \"max_stream_data_uni\",\n \"max_streams_bidi\",\n \"max_streams_uni\",\n ]:\n value = getattr(quic_transport_parameters, \"initial_\" + param)\n if value is not None:\n setattr(self, \"_remote_\" + param, value)\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str)\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._is_client = configuration.is_client\n \n self._quic_logger: Optional[QuicLoggerTrace] = None\n self._quic_logger = configuration.quic_logger.start_trace(\n is_client=configuration.is_client,\n odcid=self._original_destination_connection_id,\n )\n \n self._remote_ack_delay_exponent = 3\n \n self._remote_active_connection_id_limit = 0\n \n self._remote_max_idle_timeout = 0.0 # seconds\n \n self._retry_source_connection_id = retry_source_connection_id\n \n self._original_destination_connection_id = self._peer_cid\n self._original_destination_connection_id = (\n original_destination_connection_id\n )\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n at: aioquic.quic.connection.QuicConnection._close_end\n self._quic_logger = None\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._retry_source_connection_id = header.source_cid\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n + def encode_transport_parameters(parameters: QuicTransportParameters) -> bytes:\n + buf = Buffer(capacity=512)\n + push_quic_transport_parameters(buf, parameters)\n + return buf.data\n + \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters(self):\n client = create_standalone_client(self)\n \n - buf = Buffer(capacity=32)\n + data = encode_transport_parameters(\n - push_quic_transport_parameters(\n - buf,\n QuicTransportParameters(\n original_destination_connection_id=client.original_destination_connection_id\n + )\n - ),\n )\n + client._parse_transport_parameters(data)\n - client._parse_transport_parameters(buf.data)\n \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_parse_transport_parameters_with_bad_active_connection_id_limit(self):\n client = create_standalone_client(self)\n \n for active_connection_id_limit in [0, 1]:\n - buf = Buffer(capacity=32)\n + data = encode_transport_parameters(\n - push_quic_transport_parameters(\n - buf,\n QuicTransportParameters(\n active_connection_id_limit=active_connection_id_limit,\n original_destination_connection_id=client.original_destination_connection_id,\n + )\n - ),\n )\n with self.assertRaises(QuicConnectionError) as cm:\n + client._parse_transport_parameters(data)\n - client._parse_transport_parameters(buf.data)\n self.assertEqual(\n cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n )\n self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n self.assertEqual(\n cm.exception.reason_phrase,\n \"active_connection_id_limit must be no less than 2\",\n )\n \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_parse_transport_parameters_with_server_only_parameter(self):\n + server_configuration = QuicConfiguration(\n + is_client=False, quic_logger=QuicLogger()\n + )\n + server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n + \n + server = QuicConnection(\n + configuration=server_configuration,\n + original_destination_connection_id=bytes(8),\n + )\n + for active_connection_id_limit in [0, 1]:\n + data = encode_transport_parameters(\n + QuicTransportParameters(\n + active_connection_id_limit=active_connection_id_limit,\n + original_destination_connection_id=bytes(8),\n + )\n + )\n + with self.assertRaises(QuicConnectionError) as cm:\n + server._parse_transport_parameters(data)\n + self.assertEqual(\n + cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR\n + )\n + self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO)\n + self.assertEqual(\n + cm.exception.reason_phrase,\n + \"original_destination_connection_id is not allowed for clients\",\n + )\n + "}}},{"rowIdx":4190,"cells":{"path":{"kind":"string","value":"tests.test_tls/ContextTest.create_server"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a0e083ddd8780ed3ce3d38ca138a5fbf8a272caa"},"commit_message":{"kind":"string","value":"[tls] make it possible to specify cipher suites"},"ground_truth":{"kind":"string","value":" <4>: alpn_protocols=alpn_protocols,\n is_client=False,\n max_early_data=0xFFFFFFFF,\n **kwargs\n alpn_protocols=alpn_protocols, is_client=False, max_early_data=0xFFFFFFFF\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class ContextTest(TestCase):\n + def create_server(self, alpn_protocols=None, **kwargs):\n - def create_server(self, alpn_protocols=None):\n <0> configuration = QuicConfiguration(is_client=False)\n <1> configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n <2> \n <3> server = Context(\n <4> alpn_protocols=alpn_protocols, is_client=False, max_early_data=0xFFFFFFFF\n <5> )\n <6> server.certificate = configuration.certificate\n <7> server.certificate_private_key = configuration.private_key\n <8> server.handshake_extensions = [\n <9> (\n<10> tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n<11> SERVER_QUIC_TRANSPORT_PARAMETERS,\n<12> )\n<13> ]\n<14> self.assertEqual(server.state, State.SERVER_EXPECT_CLIENT_HELLO)\n<15> return server\n<16> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_tls\n SERVER_QUIC_TRANSPORT_PARAMETERS = binascii.unhexlify(\n b\"ff00001104ff000011004500050004801000000006000480100000000700048\"\n b\"010000000040004810000000001000242580002001000000000000000000000\"\n b\"000000000000000800024064000a00010a\"\n )\n \n at: tests.utils\n SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), \"ssl_cert.pem\")\n \n SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), \"ssl_key.pem\")\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_connect_with_cipher_suite_aes256(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.AES_256_GCM_SHA384]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384\n + )\n + \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_connect_with_cipher_suite_aes128(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.AES_128_GCM_SHA256]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256\n + )\n + \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + @skipIf(\"chacha20\" in SKIP_TESTS, \"Skipping chacha20 tests\")\n + def test_connect_with_cipher_suite_chacha20(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.CHACHA20_POLY1305_SHA256]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite,\n + tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite,\n + tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n + )\n + "}}},{"rowIdx":4191,"cells":{"path":{"kind":"string","value":"tests.test_tls/ContextTest.test_server_unsupported_cipher_suite"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a0e083ddd8780ed3ce3d38ca138a5fbf8a272caa"},"commit_message":{"kind":"string","value":"[tls] make it possible to specify cipher suites"},"ground_truth":{"kind":"string","value":" <0>: client = self.create_client()\n <1>: client = self.create_client(cipher_suites=[tls.CipherSuite.AES_128_GCM_SHA256])\n client._cipher_suites = [tls.CipherSuite.AES_128_GCM_SHA256]\n <3>: server = self.create_server()\n <4>: server = self.create_server(cipher_suites=[tls.CipherSuite.AES_256_GCM_SHA384])\n server._cipher_suites = [tls.CipherSuite.AES_256_GCM_SHA384]\n"},"main_code":{"kind":"string","value":" # module: tests.test_tls\n class ContextTest(TestCase):\n def test_server_unsupported_cipher_suite(self):\n <0> client = self.create_client()\n <1> client._cipher_suites = [tls.CipherSuite.AES_128_GCM_SHA256]\n <2> \n <3> server = self.create_server()\n <4> server._cipher_suites = [tls.CipherSuite.AES_256_GCM_SHA384]\n <5> \n <6> with self.assertRaises(tls.AlertHandshakeFailure) as cm:\n <7> self._server_fail_hello(client, server)\n <8> self.assertEqual(str(cm.exception), \"No supported cipher suite\")\n <9> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_tls\n create_buffers()\n \n at: tests.test_tls.ContextTest\n create_client(alpn_protocols=None, cadata=None, cafile=SERVER_CACERTFILE, **kwargs)\n \n create_server(self, alpn_protocols=None, **kwargs)\n create_server(alpn_protocols=None, **kwargs)\n \n _server_fail_hello(client, server)\n \n at: tests.test_tls.ContextTest._server_fail_hello\n server_input = merge_buffers(client_buf)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n \n===========changed ref 0===========\n # module: tests.test_tls\n class ContextTest(TestCase):\n + def create_server(self, alpn_protocols=None, **kwargs):\n - def create_server(self, alpn_protocols=None):\n configuration = QuicConfiguration(is_client=False)\n configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE)\n \n server = Context(\n + alpn_protocols=alpn_protocols,\n + is_client=False,\n + max_early_data=0xFFFFFFFF,\n + **kwargs\n - alpn_protocols=alpn_protocols, is_client=False, max_early_data=0xFFFFFFFF\n )\n server.certificate = configuration.certificate\n server.certificate_private_key = configuration.private_key\n server.handshake_extensions = [\n (\n tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n SERVER_QUIC_TRANSPORT_PARAMETERS,\n )\n ]\n self.assertEqual(server.state, State.SERVER_EXPECT_CLIENT_HELLO)\n return server\n \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_connect_with_cipher_suite_aes256(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.AES_256_GCM_SHA384]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384\n + )\n + \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_connect_with_cipher_suite_aes128(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.AES_128_GCM_SHA256]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256\n + )\n + \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + @skipIf(\"chacha20\" in SKIP_TESTS, \"Skipping chacha20 tests\")\n + def test_connect_with_cipher_suite_chacha20(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.CHACHA20_POLY1305_SHA256]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite,\n + tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite,\n + tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n + )\n + "}}},{"rowIdx":4192,"cells":{"path":{"kind":"string","value":"aioquic.tls/Context.__init__"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a0e083ddd8780ed3ce3d38ca138a5fbf8a272caa"},"commit_message":{"kind":"string","value":"[tls] make it possible to specify cipher suites"},"ground_truth":{"kind":"string","value":"<28>: if cipher_suites is not None:\n self._cipher_suites = cipher_suites\n else:\n self._cipher_suites = [\n self._cipher_suites = [\n<29>: CipherSuite.AES_256_GCM_SHA384,\n CipherSuite.AES_256_GCM_\n"},"main_code":{"kind":"string","value":" [str]] = None,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n + cipher_suites: Optional[List[CipherSuite]] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n <0> # configuration\n <1> self._alpn_protocols = alpn_protocols\n <2> self._cadata = cadata\n <3> self._cafile = cafile\n <4> self._capath = capath\n <5> self.certificate: Optional[x509.Certificate] = None\n <6> self.certificate_chain: List[x509.Certificate] = []\n <7> self.certificate_private_key: Optional[\n <8> Union[dsa.DSAPrivateKey, ec.EllipticCurvePrivateKey, rsa.RSAPrivateKey]\n <9> ] = None\n<10> self.handshake_extensions: List[Extension] = []\n<11> self._max_early_data = max_early_data\n<12> self.session_ticket: Optional[SessionTicket] = None\n<13> self._server_name = server_name\n<14> if verify_mode is not None:\n<15> self._verify_mode = verify_mode\n<16> else:\n<17> self._verify_mode = ssl.CERT_REQUIRED if is_client else ssl.CERT_NONE\n<18> \n<19> # callbacks\n<20> self.alpn_cb: Optional[AlpnHandler] = None\n<21> self.get_session_ticket_cb: Optional[SessionTicketFetcher] = None\n<22> self.new_session_ticket_cb: Optional[SessionTicketHandler] = None\n<23> self.update_traffic_key_cb: Callable[\n<24> [Direction, Epoch, CipherSuite, bytes], None\n<25> ] = lambda d, e, c, s: None\n<26> \n<27> # supported parameters\n<28> self._cipher_suites = [\n<29> CipherSuite.AES_256_GCM_"},"context":{"kind":"string","value":"===========below chunk 0===========\n ,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n + cipher_suites: Optional[List[CipherSuite]] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n # offset: 1\n CipherSuite.AES_128_GCM_SHA256,\n CipherSuite.CHACHA20_POLY1305_SHA256,\n ]\n self._legacy_compression_methods: List[int] = [CompressionMethod.NULL]\n self._psk_key_exchange_modes: List[int] = [PskKeyExchangeMode.PSK_DHE_KE]\n self._signature_algorithms: List[int] = [\n SignatureAlgorithm.RSA_PSS_RSAE_SHA256,\n SignatureAlgorithm.ECDSA_SECP256R1_SHA256,\n SignatureAlgorithm.RSA_PKCS1_SHA256,\n SignatureAlgorithm.RSA_PKCS1_SHA1,\n ]\n self._supported_groups = [Group.SECP256R1]\n if default_backend().x25519_supported():\n self._supported_groups.append(Group.X25519)\n if default_backend().x448_supported():\n self._supported_groups.append(Group.X448)\n self._supported_versions = [TLS_VERSION_1_3]\n \n # state\n self.alpn_negotiated: Optional[str] = None\n self.early_data_accepted = False\n self.key_schedule: Optional[KeySchedule] = None\n self.received_extensions: Optional[List[Extension]] = None\n self._key_schedule_psk: Optional[KeySchedule] = None\n self._key_schedule_proxy: Optional[KeyScheduleProxy] = None\n self._new_session_ticket: Optional[NewSessionTicket] = None\n self._peer_certificate:\n===========below chunk 1===========\n ,\n cadata: Optional[bytes] = None,\n cafile: Optional[str] = None,\n capath: Optional[str] = None,\n + cipher_suites: Optional[List[CipherSuite]] = None,\n logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None,\n max_early_data: Optional[int] = None,\n server_name: Optional[str] = None,\n verify_mode: Optional[int] = None,\n ):\n # offset: 2\n Proxy] = None\n self._new_session_ticket: Optional[NewSessionTicket] = None\n self._peer_certificate: Optional[x509.Certificate] = None\n self._peer_certificate_chain: List[x509.Certificate] = []\n self._receive_buffer = b\"\"\n self._session_resumed = False\n self._enc_key: Optional[bytes] = None\n self._dec_key: Optional[bytes] = None\n self.__logger = logger\n \n self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None\n self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None\n self._x448_private_key: Optional[x448.X448PrivateKey] = None\n \n if is_client:\n self.client_random = os.urandom(32)\n self.legacy_session_id = b\"\"\n self.state = State.CLIENT_HANDSHAKE_START\n else:\n self.client_random = None\n self.legacy_session_id = None\n self.state = State.SERVER_EXPECT_CLIENT_HELLO\n \n \n===========unchanged ref 0===========\n at: aioquic.tls\n TLS_VERSION_1_3 = 0x0304\n \n Direction()\n \n Epoch()\n \n State()\n \n CipherSuite(x: Union[str, bytes, bytearray], base: int)\n CipherSuite(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n CompressionMethod(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n CompressionMethod(x: Union[str, bytes, bytearray], base: int)\n \n Group(x: Union[str, bytes, bytearray], base: int)\n Group(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n PskKeyExchangeMode(x: Union[str, bytes, bytearray], base: int)\n PskKeyExchangeMode(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n SignatureAlgorithm(x: Union[str, bytes, bytearray], base: int)\n SignatureAlgorithm(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...)\n \n Extension = Tuple[int, bytes]\n \n NewSessionTicket(ticket_lifetime: int=0, ticket_age_add: int=0, ticket_nonce: bytes=b\"\", ticket: bytes=b\"\", max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list))\n \n KeySchedule(cipher_suite: CipherSuite)\n \n KeyScheduleProxy(cipher_suites: List[CipherSuite])\n \n SessionTicket(age_add: int, cipher_suite: CipherSuite, not_valid_after: datetime.datetime, not_valid_before: datetime.datetime, resumption_secret: bytes, server_name: str, ticket: bytes, max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list))\n \n AlpnHandler = Callable[[str], None]\n \n \n===========unchanged ref 1===========\n SessionTicketFetcher = Callable[[bytes], Optional[SessionTicket]]\n \n SessionTicketHandler = Callable[[SessionTicket], None]\n \n at: aioquic.tls.Context._client_handle_certificate\n self._peer_certificate = x509.load_der_x509_certificate(\n certificate.certificates[0][0], backend=default_backend()\n )\n \n self._peer_certificate_chain = [\n x509.load_der_x509_certificate(\n certificate.certificates[i][0], backend=default_backend()\n )\n for i in range(1, len(certificate.certificates))\n ]\n \n at: aioquic.tls.Context._client_handle_encrypted_extensions\n self.alpn_negotiated = encrypted_extensions.alpn_protocol\n \n self.early_data_accepted = encrypted_extensions.early_data\n \n self.received_extensions = encrypted_extensions.other_extensions\n \n at: aioquic.tls.Context._client_handle_finished\n self._enc_key = next_enc_key\n \n at: aioquic.tls.Context._client_handle_hello\n self.key_schedule = self._key_schedule_psk\n self.key_schedule = self._key_schedule_proxy.select(cipher_suite)\n \n self._session_resumed = True\n \n self._key_schedule_psk = None\n \n self._key_schedule_proxy = None\n \n at: aioquic.tls.Context._client_send_hello\n self._ec_private_key = ec.generate_private_key(\n GROUP_TO_CURVE[Group.SECP256R1](), default_backend()\n )\n \n self._x25519_private_key = x25519.X25519PrivateKey.generate()\n \n self._x448_private_key = x448.X448PrivateKey.generate()\n \n self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite)\n \n self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites)\n \n "}}},{"rowIdx":4193,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._initialize"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"a0e083ddd8780ed3ce3d38ca138a5fbf8a272caa"},"commit_message":{"kind":"string","value":"[tls] make it possible to specify cipher suites"},"ground_truth":{"kind":"string","value":" <6>: cipher_suites=self.configuration.cipher_suites,\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _initialize(self, peer_cid: bytes) -> None:\n <0> # TLS\n <1> self.tls = tls.Context(\n <2> alpn_protocols=self._configuration.alpn_protocols,\n <3> cadata=self._configuration.cadata,\n <4> cafile=self._configuration.cafile,\n <5> capath=self._configuration.capath,\n <6> is_client=self._is_client,\n <7> logger=self._logger,\n <8> max_early_data=None if self._is_client else MAX_EARLY_DATA,\n <9> server_name=self._configuration.server_name,\n<10> verify_mode=self._configuration.verify_mode,\n<11> )\n<12> self.tls.certificate = self._configuration.certificate\n<13> self.tls.certificate_chain = self._configuration.certificate_chain\n<14> self.tls.certificate_private_key = self._configuration.private_key\n<15> self.tls.handshake_extensions = [\n<16> (\n<17> tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS,\n<18> self._serialize_transport_parameters(),\n<19> )\n<20> ]\n<21> \n<22> # TLS session resumption\n<23> session_ticket = self._configuration.session_ticket\n<24> if (\n<25> self._is_client\n<26> and session_ticket is not None\n<27> and session_ticket.is_valid\n<28> and session_ticket.server_name == self._configuration.server_name\n<29> ):\n<30> self.tls.session_ticket = self._configuration.session_ticket\n<31> \n<32> # parse saved QUIC transport parameters - for 0-RTT\n<33> if session_ticket.max_early_data_size == MAX_EARLY_DATA:\n<34> for ext_type, ext_data in session_ticket.other_extensions:\n<35> if ext_type == tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS:\n<36> self._parse_transport_parameters(\n<37> ext_data, from_session_ticket=True\n<38> )\n<39> break\n<40> \n "},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _initialize(self, peer_cid: bytes) -> None:\n # offset: 1\n self.tls.alpn_cb = self._alpn_handler\n if self._session_ticket_fetcher is not None:\n self.tls.get_session_ticket_cb = self._session_ticket_fetcher\n if self._session_ticket_handler is not None:\n self.tls.new_session_ticket_cb = self._handle_session_ticket\n self.tls.update_traffic_key_cb = self._update_traffic_key\n \n # packet spaces\n self._cryptos = {\n tls.Epoch.INITIAL: CryptoPair(),\n tls.Epoch.ZERO_RTT: CryptoPair(),\n tls.Epoch.HANDSHAKE: CryptoPair(),\n tls.Epoch.ONE_RTT: CryptoPair(),\n }\n self._crypto_buffers = {\n tls.Epoch.INITIAL: Buffer(capacity=CRYPTO_BUFFER_SIZE),\n tls.Epoch.HANDSHAKE: Buffer(capacity=CRYPTO_BUFFER_SIZE),\n tls.Epoch.ONE_RTT: Buffer(capacity=CRYPTO_BUFFER_SIZE),\n }\n self._crypto_streams = {\n tls.Epoch.INITIAL: QuicStream(),\n tls.Epoch.HANDSHAKE: QuicStream(),\n tls.Epoch.ONE_RTT: QuicStream(),\n }\n self._spaces = {\n tls.Epoch.INITIAL: QuicPacketSpace(),\n tls.Epoch.HANDSHAKE: QuicPacketSpace(),\n tls.Epoch.ONE_RTT: QuicPacketSpace(),\n }\n \n self._cryptos[tls.Epoch.INITIAL].setup_initial(\n cid=peer_cid, is_client=self._is_client, version=self._version\n )\n \n self._loss.spaces = list(self._spaces.values())\n self._packet_number = 0\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n CRYPTO_BUFFER_SIZE = 16384\n \n MAX_EARLY_DATA = 0xFFFFFFFF\n \n at: aioquic.quic.connection.QuicConnection\n _alpn_handler(alpn_protocol: str) -> None\n \n _handle_session_ticket(session_ticket: tls.SessionTicket) -> None\n \n _parse_transport_parameters(data: bytes, from_session_ticket: bool=False) -> None\n \n _serialize_transport_parameters() -> bytes\n \n _update_traffic_key(direction: tls.Direction, epoch: tls.Epoch, cipher_suite: tls.CipherSuite, secret: bytes) -> None\n \n at: aioquic.quic.connection.QuicConnection.__init__\n self._configuration = configuration\n \n self._is_client = configuration.is_client\n \n self._cryptos: Dict[tls.Epoch, CryptoPair] = {}\n \n self._crypto_buffers: Dict[tls.Epoch, Buffer] = {}\n \n self._crypto_streams: Dict[tls.Epoch, QuicStream] = {}\n \n self._spaces: Dict[tls.Epoch, QuicPacketSpace] = {}\n \n self._version: Optional[int] = None\n \n self._logger = QuicConnectionAdapter(\n logger, {\"id\": dump_cid(self._original_destination_connection_id)}\n )\n \n self._loss = QuicPacketRecovery(\n is_client_without_1rtt=self._is_client,\n quic_logger=self._quic_logger,\n send_probe=self._send_probe,\n )\n \n self._session_ticket_fetcher = session_ticket_fetcher\n \n self._session_ticket_handler = session_ticket_handler\n \n at: aioquic.quic.connection.QuicConnection.connect\n self._version = self._configuration.supported_versions[0]\n \n at: aioquic.quic.connection.QuicConnection.receive_datagram\n self._version = QuicProtocolVersion(header.version)\n self._version = QuicProtocolVersion(max(common))\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_connect_with_cipher_suite_aes256(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.AES_256_GCM_SHA384]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384\n + )\n + \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_connect_with_cipher_suite_aes128(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.AES_128_GCM_SHA256]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256\n + )\n + \n===========changed ref 2===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + @skipIf(\"chacha20\" in SKIP_TESTS, \"Skipping chacha20 tests\")\n + def test_connect_with_cipher_suite_chacha20(self):\n + with client_and_server(\n + client_options={\"cipher_suites\": [tls.CipherSuite.CHACHA20_POLY1305_SHA256]}\n + ) as (client, server):\n + # check handshake completed\n + self.check_handshake(client=client, server=server)\n + \n + # check selected cipher suite\n + self.assertEqual(\n + client.tls.key_schedule.cipher_suite,\n + tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n + )\n + self.assertEqual(\n + server.tls.key_schedule.cipher_suite,\n + tls.CipherSuite.CHACHA20_POLY1305_SHA256,\n + )\n + \n===========changed ref 3===========\n # module: tests.test_tls\n class ContextTest(TestCase):\n def test_server_unsupported_cipher_suite(self):\n - client = self.create_client()\n + client = self.create_client(cipher_suites=[tls.CipherSuite.AES_128_GCM_SHA256])\n - client._cipher_suites = [tls.CipherSuite.AES_128_GCM_SHA256]\n \n - server = self.create_server()\n + server = self.create_server(cipher_suites=[tls.CipherSuite.AES_256_GCM_SHA384])\n - server._cipher_suites = [tls.CipherSuite.AES_256_GCM_SHA384]\n \n with self.assertRaises(tls.AlertHandshakeFailure) as cm:\n self._server_fail_hello(client, server)\n self.assertEqual(str(cm.exception), \"No supported cipher suite\")\n "}}},{"rowIdx":4194,"cells":{"path":{"kind":"string","value":"examples.http3_client/run"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"6f8e1e6ba163aba051a2baa9e93851cd5496f415"},"commit_message":{"kind":"string","value":"[http3 client] add --zero-rtt to send data before connection is up"},"ground_truth":{"kind":"string","value":"<20>: wait_connected=not zero_rtt,\n"},"main_code":{"kind":"string","value":" # module: examples.http3_client\n def run(\n configuration: QuicConfiguration,\n urls: List[str],\n data: str,\n include: bool,\n output_dir: Optional[str],\n local_port: int,\n + zero_rtt: bool,\n ) -> None:\n <0> # parse URL\n <1> parsed = urlparse(urls[0])\n <2> assert parsed.scheme in (\n <3> \"https\",\n <4> \"wss\",\n <5> ), \"Only https:// or wss:// URLs are supported.\"\n <6> if \":\" in parsed.netloc:\n <7> host, port_str = parsed.netloc.split(\":\")\n <8> port = int(port_str)\n <9> else:\n<10> host = parsed.netloc\n<11> port = 443\n<12> \n<13> async with connect(\n<14> host,\n<15> port,\n<16> configuration=configuration,\n<17> create_protocol=HttpClient,\n<18> session_ticket_handler=save_session_ticket,\n<19> local_port=local_port,\n<20> ) as client:\n<21> client = cast(HttpClient, client)\n<22> \n<23> if parsed.scheme == \"wss\":\n<24> ws = await client.websocket(urls[0], subprotocols=[\"chat\", \"superchat\"])\n<25> \n<26> # send some messages and receive reply\n<27> for i in range(2):\n<28> message = \"Hello {}, WebSocket!\".format(i)\n<29> print(\"> \" + message)\n<30> await ws.send(message)\n<31> \n<32> message = await ws.recv()\n<33> print(\"< \" + message)\n<34> \n<35> await ws.close()\n<36> else:\n<37> # perform request\n<38> coros = [\n<39> perform_http_request(\n<40> client=client,\n<41> url=url,\n<42> data=data,\n<43> include=include,\n<44> output_dir=output_dir,\n<45> )\n<46> for url in urls\n<47> ]\n<48> await asyncio.gather(*coros)\n<49> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: examples.http3_client\n HttpClient(*args, **kwargs)\n \n perform_http_request(client: HttpClient, url: str, data: str, include: bool, output_dir: Optional[str]) -> None\n \n save_session_ticket(ticket: SessionTicket) -> None\n \n at: typing\n cast(typ: Type[_T], val: Any) -> _T\n cast(typ: str, val: Any) -> Any\n cast(typ: object, val: Any) -> Any\n \n List = _alias(list, 1, inst=False, name='List')\n \n at: urllib.parse\n urlparse(url: str, scheme: Optional[str]=..., allow_fragments: bool=...) -> ParseResult\n urlparse(url: Optional[bytes], scheme: Optional[bytes]=..., allow_fragments: bool=...) -> ParseResultBytes\n \n "}}},{"rowIdx":4195,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_send_stream_data_peer_initiated"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"8a574f7a66add0808a227f59911895aa393a9d24"},"commit_message":{"kind":"string","value":"[streams] add an API to reset streams"},"ground_truth":{"kind":"string","value":"<17>: # client creates unidirectional stream\n # client create unidirectional stream\n<21>: # client tries to reset unknown stream\n with self.assertRaises(ValueError) as cm:\n client.reset_stream(4, QuicErrorCode.NO_ERROR)\n self.assertEqual(str(cm.exception), \"Cannot reset an unknown stream\")\n \n # client tries to reset server-initiated unidirectional stream\n with self.assertRaises(ValueError) as cm:\n client.reset_stream(3, QuicErrorCode.NO_ERROR)\n self.assertEqual(\n str(cm.exception), \"Cannot reset a peer-initiated unidirectional stream\"\n )\n \n # client tries to send data on server-initiated unidirectional stream\n # client tries to send data on server-initial unidirectional stream\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_stream_data_peer_initiated(self):\n <0> with client_and_server() as (client, server):\n <1> # server creates bidirectional stream\n <2> server.send_stream_data(1, b\"hello\")\n <3> self.assertEqual(roundtrip(server, client), (1, 1))\n <4> \n <5> # server creates unidirectional stream\n <6> server.send_stream_data(3, b\"hello\")\n <7> self.assertEqual(roundtrip(server, client), (1, 1))\n <8> \n <9> # client creates bidirectional stream\n<10> client.send_stream_data(0, b\"hello\")\n<11> self.assertEqual(roundtrip(client, server), (1, 1))\n<12> \n<13> # client sends data on server-initiated bidirectional stream\n<14> client.send_stream_data(1, b\"hello\")\n<15> self.assertEqual(roundtrip(client, server), (1, 1))\n<16> \n<17> # client create unidirectional stream\n<18> client.send_stream_data(2, b\"hello\")\n<19> self.assertEqual(roundtrip(client, server), (1, 1))\n<20> \n<21> # client tries to send data on server-initial unidirectional stream\n<22> with self.assertRaises(ValueError) as cm:\n<23> client.send_stream_data(3, b\"hello\")\n<24> self.assertEqual(\n<25> str(cm.exception),\n<26> \"Cannot send data on peer-initiated unidirectional stream\",\n<27> )\n<28> \n<29> # client tries to send data on unknown server-initiated bidirectional stream\n<30> with self.assertRaises(ValueError) as cm:\n<31> client.send_stream_data(5, b\"hello\")\n<32> self.assertEqual(\n<33> str(cm.exception), \"Cannot send data on unknown peer-initiated stream\"\n<34> )\n<35> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n roundtrip(sender, receiver)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n at: unittest.case._AssertRaisesContext.__exit__\n self.exception = exc_value.with_traceback(None)\n \n \n===========changed ref 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_send_reset_stream(self):\n + with client_and_server() as (client, server):\n + # client creates bidirectional stream\n + client.send_stream_data(0, b\"hello\")\n + self.assertEqual(roundtrip(client, server), (1, 1))\n + \n + # client resets stream\n + client.reset_stream(0, QuicErrorCode.NO_ERROR)\n + self.assertEqual(roundtrip(client, server), (1, 1))\n + "}}},{"rowIdx":4196,"cells":{"path":{"kind":"string","value":"aioquic.quic.stream/QuicStream.__init__"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"8a574f7a66add0808a227f59911895aa393a9d24"},"commit_message":{"kind":"string","value":"[streams] add an API to reset streams"},"ground_truth":{"kind":"string","value":"<20>: self._send_reset_error_code: Optional[int] = None\n self._send_reset_pending = False\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.stream\n class QuicStream:\n def __init__(\n self,\n stream_id: Optional[int] = None,\n max_stream_data_local: int = 0,\n max_stream_data_remote: int = 0,\n ) -> None:\n <0> self.is_blocked = False\n <1> self.max_stream_data_local = max_stream_data_local\n <2> self.max_stream_data_local_sent = max_stream_data_local\n <3> self.max_stream_data_remote = max_stream_data_remote\n <4> self.send_buffer_is_empty = True\n <5> \n <6> self._recv_buffer = bytearray()\n <7> self._recv_buffer_fin: Optional[int] = None\n <8> self._recv_buffer_start = 0 # the offset for the start of the buffer\n <9> self._recv_highest = 0 # the highest offset ever seen\n<10> self._recv_ranges = RangeSet()\n<11> \n<12> self._send_acked = RangeSet()\n<13> self._send_buffer = bytearray()\n<14> self._send_buffer_fin: Optional[int] = None\n<15> self._send_buffer_start = 0 # the offset for the start of the buffer\n<16> self._send_buffer_stop = 0 # the offset for the stop of the buffer\n<17> self._send_highest = 0\n<18> self._send_pending = RangeSet()\n<19> self._send_pending_eof = False\n<20> \n<21> self.__stream_id = stream_id\n<22> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.quic.stream.QuicStream._pull_data\n self._recv_buffer_start = r.stop\n \n at: aioquic.quic.stream.QuicStream.add_frame\n self._recv_buffer_fin = frame_end\n \n self._recv_highest = frame_end\n \n self._recv_buffer_start += count\n \n self._recv_buffer += bytearray(gap)\n \n at: aioquic.quic.stream.QuicStream.get_frame\n self._send_pending_eof = False\n \n self.send_buffer_is_empty = True\n \n self._send_highest = stop\n \n at: aioquic.quic.stream.QuicStream.get_reset_frame\n self._send_reset_pending = False\n \n at: aioquic.quic.stream.QuicStream.on_data_delivery\n self.send_buffer_is_empty = False\n \n self._send_buffer_start += size\n \n self._send_pending_eof = True\n \n at: aioquic.quic.stream.QuicStream.on_reset_delivery\n self._send_reset_pending = True\n \n at: aioquic.quic.stream.QuicStream.reset\n self._send_reset_error_code = error_code\n \n self._send_reset_pending = True\n \n at: aioquic.quic.stream.QuicStream.write\n self.send_buffer_is_empty = False\n \n self._send_buffer += data\n \n self._send_buffer_stop += size\n \n self._send_buffer_fin = self._send_buffer_stop\n \n self._send_pending_eof = True\n \n \n===========changed ref 0===========\n # module: aioquic.quic.packet\n + @dataclass\n + class QuicResetStreamFrame:\n + error_code: int\n + final_size: int\n + \n===========changed ref 1===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n + def test_send_reset_stream(self):\n + with client_and_server() as (client, server):\n + # client creates bidirectional stream\n + client.send_stream_data(0, b\"hello\")\n + self.assertEqual(roundtrip(client, server), (1, 1))\n + \n + # client resets stream\n + client.reset_stream(0, QuicErrorCode.NO_ERROR)\n + self.assertEqual(roundtrip(client, server), (1, 1))\n + \n===========changed ref 2===========\n # module: tests.test_stream\n class QuicStreamTest(TestCase):\n + def test_send_reset(self):\n + stream = QuicStream()\n + \n + # reset is requested\n + stream.reset(QuicErrorCode.NO_ERROR)\n + self.assertTrue(stream.reset_pending)\n + \n + # reset is sent\n + reset = stream.get_reset_frame()\n + self.assertEqual(reset.error_code, QuicErrorCode.NO_ERROR)\n + self.assertEqual(reset.final_size, 0)\n + self.assertFalse(stream.reset_pending)\n + \n + # reset is lost\n + stream.on_reset_delivery(QuicDeliveryState.LOST)\n + self.assertTrue(stream.reset_pending)\n + \n===========changed ref 3===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_stream_data_peer_initiated(self):\n with client_and_server() as (client, server):\n # server creates bidirectional stream\n server.send_stream_data(1, b\"hello\")\n self.assertEqual(roundtrip(server, client), (1, 1))\n \n # server creates unidirectional stream\n server.send_stream_data(3, b\"hello\")\n self.assertEqual(roundtrip(server, client), (1, 1))\n \n # client creates bidirectional stream\n client.send_stream_data(0, b\"hello\")\n self.assertEqual(roundtrip(client, server), (1, 1))\n \n # client sends data on server-initiated bidirectional stream\n client.send_stream_data(1, b\"hello\")\n self.assertEqual(roundtrip(client, server), (1, 1))\n \n + # client creates unidirectional stream\n - # client create unidirectional stream\n client.send_stream_data(2, b\"hello\")\n self.assertEqual(roundtrip(client, server), (1, 1))\n \n + # client tries to reset unknown stream\n + with self.assertRaises(ValueError) as cm:\n + client.reset_stream(4, QuicErrorCode.NO_ERROR)\n + self.assertEqual(str(cm.exception), \"Cannot reset an unknown stream\")\n + \n + # client tries to reset server-initiated unidirectional stream\n + with self.assertRaises(ValueError) as cm:\n + client.reset_stream(3, QuicErrorCode.NO_ERROR)\n + self.assertEqual(\n + str(cm.exception), \"Cannot reset a peer-initiated unidirectional stream\"\n + )\n + \n + # client tries to send data on server-initiated unidirectional stream\n - # client tries to send data on server-initial unidirectional stream\n with self.assertRaises(ValueError) as cm:\n client.send_stream_data(3, b\"hello\")\n self\n===========changed ref 4===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_stream_data_peer_initiated(self):\n # offset: 1\n self.assertRaises(ValueError) as cm:\n client.send_stream_data(3, b\"hello\")\n self.assertEqual(\n str(cm.exception),\n \"Cannot send data on peer-initiated unidirectional stream\",\n )\n \n # client tries to send data on unknown server-initiated bidirectional stream\n with self.assertRaises(ValueError) as cm:\n client.send_stream_data(5, b\"hello\")\n self.assertEqual(\n str(cm.exception), \"Cannot send data on unknown peer-initiated stream\"\n )\n "}}},{"rowIdx":4197,"cells":{"path":{"kind":"string","value":"aioquic.quic.connection/QuicConnection._write_application"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"8a574f7a66add0808a227f59911895aa393a9d24"},"commit_message":{"kind":"string","value":"[streams] add an API to reset streams"},"ground_truth":{"kind":"string","value":""},"main_code":{"kind":"string","value":" # module: aioquic.quic.connection\n class QuicConnection:\n def _write_application(\n self, builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float\n ) -> None:\n <0> crypto_stream: Optional[QuicStream] = None\n <1> if self._cryptos[tls.Epoch.ONE_RTT].send.is_valid():\n <2> crypto = self._cryptos[tls.Epoch.ONE_RTT]\n <3> crypto_stream = self._crypto_streams[tls.Epoch.ONE_RTT]\n <4> packet_type = PACKET_TYPE_ONE_RTT\n <5> elif self._cryptos[tls.Epoch.ZERO_RTT].send.is_valid():\n <6> crypto = self._cryptos[tls.Epoch.ZERO_RTT]\n <7> packet_type = PACKET_TYPE_ZERO_RTT\n <8> else:\n <9> return\n<10> space = self._spaces[tls.Epoch.ONE_RTT]\n<11> \n<12> while True:\n<13> # apply pacing, except if we have ACKs to send\n<14> if space.ack_at is None or space.ack_at >= now:\n<15> self._pacing_at = self._loss._pacer.next_send_time(now=now)\n<16> if self._pacing_at is not None:\n<17> break\n<18> builder.start_packet(packet_type, crypto)\n<19> \n<20> if self._handshake_complete:\n<21> # ACK\n<22> if space.ack_at is not None and space.ack_at <= now:\n<23> self._write_ack_frame(builder=builder, space=space, now=now)\n<24> \n<25> # HANDSHAKE_DONE\n<26> if self._handshake_done_pending:\n<27> self._write_handshake_done_frame(builder=builder)\n<28> self._handshake_done_pending = False\n<29> \n<30> # PATH CHALLENGE\n<31> if (\n<32> not network_path.is_validated\n<33> and network_path.local_challenge is None\n<34> ):\n<35> challenge = os.ur"},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _write_application(\n self, builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float\n ) -> None:\n # offset: 1\n self._write_path_challenge_frame(\n builder=builder, challenge=challenge\n )\n network_path.local_challenge = challenge\n \n # PATH RESPONSE\n if network_path.remote_challenge is not None:\n self._write_path_response_frame(\n builder=builder, challenge=network_path.remote_challenge\n )\n network_path.remote_challenge = None\n \n # NEW_CONNECTION_ID\n for connection_id in self._host_cids:\n if not connection_id.was_sent:\n self._write_new_connection_id_frame(\n builder=builder, connection_id=connection_id\n )\n \n # RETIRE_CONNECTION_ID\n while self._retire_connection_ids:\n sequence_number = self._retire_connection_ids.pop(0)\n self._write_retire_connection_id_frame(\n builder=builder, sequence_number=sequence_number\n )\n \n # STREAMS_BLOCKED\n if self._streams_blocked_pending:\n if self._streams_blocked_bidi:\n self._write_streams_blocked_frame(\n builder=builder,\n frame_type=QuicFrameType.STREAMS_BLOCKED_BIDI,\n limit=self._remote_max_streams_bidi,\n )\n if self._streams_blocked_uni:\n self._write_streams_blocked_frame(\n builder=builder,\n frame_type=QuicFrameType.STREAMS_BLOCKED_UNI,\n limit=self._remote_max_streams_uni,\n )\n self._streams_blocked_pending = False\n \n # MAX_DATA\n self._write_connection_limits(builder=builder, space=space)\n \n # stream-level limits\n for stream in self._streams.values():\n self._write_stream_\n===========below chunk 1===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _write_application(\n self, builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float\n ) -> None:\n # offset: 2\n =space)\n \n # stream-level limits\n for stream in self._streams.values():\n self._write_stream_limits(builder=builder, space=space, stream=stream)\n \n # PING (user-request)\n if self._ping_pending:\n self._write_ping_frame(builder, self._ping_pending)\n self._ping_pending.clear()\n \n # PING (probe)\n if self._probe_pending:\n self._write_ping_frame(builder, comment=\"probe\")\n self._probe_pending = False\n \n # CRYPTO\n if crypto_stream is not None and not crypto_stream.send_buffer_is_empty:\n self._write_crypto_frame(\n builder=builder, space=space, stream=crypto_stream\n )\n \n # DATAGRAM\n while self._datagrams_pending:\n try:\n self._write_datagram_frame(\n builder=builder,\n data=self._datagrams_pending[0],\n frame_type=QuicFrameType.DATAGRAM_WITH_LENGTH,\n )\n self._datagrams_pending.popleft()\n except QuicPacketBuilderStop:\n break\n \n # STREAM\n for stream in self._streams.values():\n if not stream.is_blocked and not stream.send_buffer_is_empty:\n self._remote_max_data_used += self._write_stream_frame(\n builder=builder,\n space=space,\n stream=stream,\n max_offset=min(\n stream._send_highest\n + self._remote_max_data\n - self._remote_max_data_used,\n stream.max_stream_data_\n===========below chunk 2===========\n # module: aioquic.quic.connection\n class QuicConnection:\n def _write_application(\n self, builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float\n ) -> None:\n # offset: 3\n \n ),\n )\n \n if builder.packet_is_empty:\n break\n else:\n self._loss._pacer.update_after_send(now=now)\n \n \n===========unchanged ref 0===========\n at: aioquic.quic.connection\n SECRETS_LABELS = [\n [\n None,\n \"QUIC_CLIENT_EARLY_TRAFFIC_SECRET\",\n \"QUIC_CLIENT_HANDSHAKE_TRAFFIC_SECRET\",\n \"QUIC_CLIENT_TRAFFIC_SECRET_0\",\n ],\n [\n None,\n None,\n \"QUIC_SERVER_HANDSHAKE_TRAFFIC_SECRET\",\n \"QUIC_SERVER_TRAFFIC_SECRET_0\",\n ],\n ]\n \n QuicNetworkPath(addr: NetworkAddress, bytes_received: int=0, bytes_sent: int=0, is_validated: bool=False, local_challenge: Optional[bytes]=None, remote_challenge: Optional[bytes]=None)\n \n at: aioquic.quic.connection.QuicConnection\n _write_ack_frame(builder: QuicPacketBuilder, space: QuicPacketSpace, now: float) -> None\n \n _write_connection_limits(builder: QuicPacketBuilder, space: QuicPacketSpace) -> None\n \n _write_crypto_frame(builder: QuicPacketBuilder, space: QuicPacketSpace, stream: QuicStream) -> bool\n \n _write_datagram_frame(builder: QuicPacketBuilder, data: bytes, frame_type: QuicFrameType) -> bool\n \n _write_handshake_done_frame(builder: QuicPacketBuilder) -> None\n \n _write_new_connection_id_frame(builder: QuicPacketBuilder, connection_id: QuicConnectionId) -> None\n \n _write_path_challenge_frame(builder: QuicPacketBuilder, challenge: bytes) -> None\n \n _write_path_response_frame(builder: QuicPacketBuilder, challenge: bytes) -> None\n \n _write_ping_frame(builder: QuicPacketBuilder, uids: List[int]=[], comment=\"\")\n \n _write_retire_connection_id_frame(builder: QuicPacketBuilder, sequence_number: int) -> None\n \n "}}},{"rowIdx":4198,"cells":{"path":{"kind":"string","value":"aioquic.quic.stream/QuicStream.write"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"2f334455123391843dc600cbaec3fbcb24e27372"},"commit_message":{"kind":"string","value":"[stream] assert write() is never called after reset()"},"ground_truth":{"kind":"string","value":" <4>: assert self._send_reset_error_code is None, \"cannot call write() after reset()\"\n"},"main_code":{"kind":"string","value":" # module: aioquic.quic.stream\n class QuicStream:\n def write(self, data: bytes, end_stream: bool = False) -> None:\n <0> \"\"\"\n <1> Write some data bytes to the QUIC stream.\n <2> \"\"\"\n <3> assert self._send_buffer_fin is None, \"cannot call write() after FIN\"\n <4> size = len(data)\n <5> \n <6> if size:\n <7> self.send_buffer_is_empty = False\n <8> self._send_pending.add(\n <9> self._send_buffer_stop, self._send_buffer_stop + size\n<10> )\n<11> self._send_buffer += data\n<12> self._send_buffer_stop += size\n<13> if end_stream:\n<14> self.send_buffer_is_empty = False\n<15> self._send_buffer_fin = self._send_buffer_stop\n<16> self._send_pending_eof = True\n<17> \n "},"context":{"kind":"string","value":"===========unchanged ref 0===========\n at: aioquic.quic.stream.QuicStream.__init__\n self.send_buffer_is_empty = True\n \n self._send_buffer = bytearray()\n \n self._send_buffer_fin: Optional[int] = None\n \n self._send_buffer_stop = 0 # the offset for the stop of the buffer\n \n self._send_pending = RangeSet()\n \n self._send_reset_error_code: Optional[int] = None\n \n at: aioquic.quic.stream.QuicStream.get_frame\n self.send_buffer_is_empty = True\n \n at: aioquic.quic.stream.QuicStream.on_data_delivery\n self.send_buffer_is_empty = False\n \n at: aioquic.quic.stream.QuicStream.reset\n self._send_reset_error_code = error_code\n \n "}}},{"rowIdx":4199,"cells":{"path":{"kind":"string","value":"tests.test_connection/QuicConnectionTest.test_send_stream_data_peer_initiated"},"type":{"kind":"string","value":"Modified"},"project":{"kind":"string","value":"aiortc~aioquic"},"commit_hash":{"kind":"string","value":"dfbeb83cf95b2ff4e81bd534097ade2ae4bd5939"},"commit_message":{"kind":"string","value":"[streams] refactor local stream creation"},"ground_truth":{"kind":"string","value":"<21>: # client tries to reset unknown stream\n<22>: with self.assertRaises(ValueError) as cm:\n<23>: client.reset_stream(4, QuicErrorCode.NO_ERROR)\n<24>: self.assertEqual(str(cm.exception), \"Cannot reset an unknown stream\")\n<25>: \n<30>: str(cm.exception),\n \"Cannot send data on peer-initiated unidirectional stream\",\n str(cm.exception), \"Cannot reset a peer-initiated unidirectional stream\"\n<31>: )\n \n # client tries to reset unknown server-initiated bidirectional stream\n with self.assertRaises(ValueError) as cm:\n client.reset_stream(5, QuicErrorCode.NO_ERROR)\n self.assertEqual(\n str(cm.exception), \"Cannot send data on unknown peer-initiated stream\"\n"},"main_code":{"kind":"string","value":" # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_stream_data_peer_initiated(self):\n <0> with client_and_server() as (client, server):\n <1> # server creates bidirectional stream\n <2> server.send_stream_data(1, b\"hello\")\n <3> self.assertEqual(roundtrip(server, client), (1, 1))\n <4> \n <5> # server creates unidirectional stream\n <6> server.send_stream_data(3, b\"hello\")\n <7> self.assertEqual(roundtrip(server, client), (1, 1))\n <8> \n <9> # client creates bidirectional stream\n<10> client.send_stream_data(0, b\"hello\")\n<11> self.assertEqual(roundtrip(client, server), (1, 1))\n<12> \n<13> # client sends data on server-initiated bidirectional stream\n<14> client.send_stream_data(1, b\"hello\")\n<15> self.assertEqual(roundtrip(client, server), (1, 1))\n<16> \n<17> # client creates unidirectional stream\n<18> client.send_stream_data(2, b\"hello\")\n<19> self.assertEqual(roundtrip(client, server), (1, 1))\n<20> \n<21> # client tries to reset unknown stream\n<22> with self.assertRaises(ValueError) as cm:\n<23> client.reset_stream(4, QuicErrorCode.NO_ERROR)\n<24> self.assertEqual(str(cm.exception), \"Cannot reset an unknown stream\")\n<25> \n<26> # client tries to reset server-initiated unidirectional stream\n<27> with self.assertRaises(ValueError) as cm:\n<28> client.reset_stream(3, QuicErrorCode.NO_ERROR)\n<29> self.assertEqual(\n<30> str(cm.exception), \"Cannot reset a peer-initiated unidirectional stream\"\n<31> )\n<32> \n<33> # client tries to send data on server-initiated unidirectional stream\n<34> with self.assertRaises(ValueError) as cm:\n<35> client.send_stream_data(3, b\"hello\")\n<36> self.assertEqual("},"context":{"kind":"string","value":"===========below chunk 0===========\n # module: tests.test_connection\n class QuicConnectionTest(TestCase):\n def test_send_stream_data_peer_initiated(self):\n # offset: 1\n \"Cannot send data on peer-initiated unidirectional stream\",\n )\n \n # client tries to send data on unknown server-initiated bidirectional stream\n with self.assertRaises(ValueError) as cm:\n client.send_stream_data(5, b\"hello\")\n self.assertEqual(\n str(cm.exception), \"Cannot send data on unknown peer-initiated stream\"\n )\n \n \n===========unchanged ref 0===========\n at: tests.test_connection\n client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None)\n \n roundtrip(sender, receiver)\n \n at: unittest.case.TestCase\n failureException: Type[BaseException]\n \n longMessage: bool\n \n maxDiff: Optional[int]\n \n _testMethodName: str\n \n _testMethodDoc: str\n \n assertEqual(first: Any, second: Any, msg: Any=...) -> None\n \n assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E]\n assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None\n \n at: unittest.case._AssertRaisesContext.__exit__\n self.exception = exc_value.with_traceback(None)\n \n "}}}],"truncated":false,"partial":false},"paginationData":{"pageIndex":41,"numItemsPerPage":100,"numTotalItems":7800,"offset":4100,"length":100}},"jwt":"eyJhbGciOiJFZERTQSJ9.eyJyZWFkIjp0cnVlLCJwZXJtaXNzaW9ucyI6eyJyZXBvLmNvbnRlbnQucmVhZCI6dHJ1ZX0sImlhdCI6MTc1ODE1Mzk5NSwic3ViIjoiL2RhdGFzZXRzL2tyYWFsZmFyL0NvZWRpdG9yLXByb2Nlc3NlZC1kZW1vMiIsImV4cCI6MTc1ODE1NzU5NSwiaXNzIjoiaHR0cHM6Ly9odWdnaW5nZmFjZS5jbyJ9.U1J1egOjWT3Lgz20XnREXEGKgD9-NQjBrhC1n6z2hNa2gHFiOBLpUNi3clwkY-0p5IzPWjxIm1DEeQMiMiglDg","displayUrls":true},"discussionsStats":{"closed":0,"open":1,"total":1},"fullWidth":true,"hasGatedAccess":true,"hasFullAccess":true,"isEmbedded":false,"savedQueries":{"community":[],"user":[]}}">
path
stringlengths
9
117
type
stringclasses
2 values
project
stringclasses
10 values
commit_hash
stringlengths
40
40
commit_message
stringlengths
1
137
ground_truth
stringlengths
0
2.74k
main_code
stringlengths
102
3.37k
context
stringlengths
0
14.7k
tests.test_h0/H0ConnectionTest.test_connect
Modified
aiortc~aioquic
fd084338b0d72d996d1be928d81f8beb3b55c3f9
[tests] disable packet pacing for H0 / H3 tests
<0>:<del> with client_and_server( <1>:<del> client_options={"alpn_protocols": H0_ALPN}, <2>:<del> server_options={"alpn_protocols": H0_ALPN}, <3>:<add> with h0_client_and_server() as (quic_client, quic_server): <del> ) as (quic_client, quic_server):
# module: tests.test_h0 class H0ConnectionTest(TestCase): def test_connect(self): <0> with client_and_server( <1> client_options={"alpn_protocols": H0_ALPN}, <2> server_options={"alpn_protocols": H0_ALPN}, <3> ) as (quic_client, quic_server): <4> h0_client = H0Connection(quic_client) <5> h0_server = H0Connection(quic_server) <6> <7> # send request <8> stream_id = quic_client.get_next_available_stream_id() <9> h0_client.send_headers( <10> stream_id=stream_id, <11> headers=[ <12> (b":method", b"GET"), <13> (b":scheme", b"https"), <14> (b":authority", b"localhost"), <15> (b":path", b"/"), <16> ], <17> ) <18> h0_client.send_data(stream_id=stream_id, data=b"", end_stream=True) <19> <20> # receive request <21> events = h0_transfer(quic_client, h0_server) <22> self.assertEqual(len(events), 2) <23> <24> self.assertTrue(isinstance(events[0], HeadersReceived)) <25> self.assertEqual( <26> events[0].headers, [(b":method", b"GET"), (b":path", b"/")] <27> ) <28> self.assertEqual(events[0].stream_id, stream_id) <29> self.assertEqual(events[0].stream_ended, False) <30> <31> self.assertTrue(isinstance(events[1], DataReceived)) <32> self.assertEqual(events[1].data, b"") <33> self.assertEqual(events[1].stream_id, stream_id) <34> self.assertEqual(events[1].stream_ended, True) <35> <36> # send response <37> h0_server.send_headers(</s>
===========below chunk 0=========== # module: tests.test_h0 class H0ConnectionTest(TestCase): def test_connect(self): # offset: 1 headers=[ (b":status", b"200"), (b"content-type", b"text/html; charset=utf-8"), ], ) h0_server.send_data( stream_id=stream_id, data=b"<html><body>hello</body></html>", end_stream=True, ) # receive response events = h0_transfer(quic_server, h0_client) self.assertEqual(len(events), 2) self.assertTrue(isinstance(events[0], HeadersReceived)) self.assertEqual(events[0].headers, []) self.assertEqual(events[0].stream_id, stream_id) self.assertEqual(events[0].stream_ended, False) self.assertTrue(isinstance(events[1], DataReceived)) self.assertEqual(events[1].data, b"<html><body>hello</body></html>") self.assertEqual(events[1].stream_id, stream_id) self.assertEqual(events[1].stream_ended, True) ===========unchanged ref 0=========== at: tests.test_h0 h0_client_and_server() h0_transfer(quic_sender, h0_receiver) at: tests.test_h0.h0_transfer quic_receiver = h0_receiver._quic at: unittest.case TestCase(methodName: str=...) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_h0 + def h0_client_and_server(): + return client_and_server( + client_options={"alpn_protocols": H0_ALPN}, + client_patch=disable_packet_pacing, + server_options={"alpn_protocols": H0_ALPN}, + server_patch=disable_packet_pacing, + ) + ===========changed ref 1=========== # module: tests.test_h3 + def h3_client_and_server(): + return client_and_server( + client_options={"alpn_protocols": H3_ALPN}, + client_patch=disable_packet_pacing, + server_options={"alpn_protocols": H3_ALPN}, + server_patch=disable_packet_pacing, + ) + ===========changed ref 2=========== # module: tests.test_h3 class H3ConnectionTest(TestCase): def test_uni_stream_grease(self): - with client_and_server( - client_options={"alpn_protocols": H3_ALPN}, - server_options={"alpn_protocols": H3_ALPN}, + with h3_client_and_server() as (quic_client, quic_server): - ) as (quic_client, quic_server): h3_server = H3Connection(quic_server) quic_client.send_stream_data( 14, b"\xff\xff\xff\xff\xff\xff\xff\xfeGREASE is the word" ) self.assertEqual(h3_transfer(quic_client, h3_server), []) ===========changed ref 3=========== # module: tests.test_h3 class H3ConnectionTest(TestCase): def test_request(self): - with client_and_server( - client_options={"alpn_protocols": H3_ALPN}, - server_options={"alpn_protocols": H3_ALPN}, + with h3_client_and_server() as (quic_client, quic_server): - ) as (quic_client, quic_server): h3_client = H3Connection(quic_client) h3_server = H3Connection(quic_server) # make first request self._make_request(h3_client, h3_server) # make second request self._make_request(h3_client, h3_server) # make third request -> dynamic table self._make_request(h3_client, h3_server) ===========changed ref 4=========== # module: tests.test_h3 class H3ConnectionTest(TestCase): def test_request_with_server_push_max_push_id(self): - with client_and_server( - client_options={"alpn_protocols": H3_ALPN}, - server_options={"alpn_protocols": H3_ALPN}, + with h3_client_and_server() as (quic_client, quic_server): - ) as (quic_client, quic_server): h3_client = H3Connection(quic_client) h3_server = H3Connection(quic_server) # send request stream_id = quic_client.get_next_available_stream_id() h3_client.send_headers( stream_id=stream_id, headers=[ (b":method", b"GET"), (b":scheme", b"https"), (b":authority", b"localhost"), (b":path", b"/"), ], end_stream=True, ) # receive request events = h3_transfer(quic_client, h3_server) self.assertEqual( events, [ HeadersReceived( headers=[ (b":method", b"GET"), (b":scheme", b"https"), (b":authority", b"localhost"), (b":path", b"/"), ], stream_id=stream_id, stream_ended=True, ) ], ) # send push promises for i in range(0, 8): h3_server.send_push_promise( stream_id=stream_id, headers=[ (b":method", b"GET"), (b":scheme", b"https"), (b":authority", b"localhost"), (b":path", "/{}.css".format(i).encode("ascii")), ], ) </s> ===========changed ref 5=========== # module: tests.test_h3 class H3ConnectionTest(TestCase): def test_request_with_server_push_max_push_id(self): # offset: 1 <s>"), (b":path", "/{}.css".format(i).encode("ascii")), ], ) # send one too many with self.assertRaises(NoAvailablePushIDError): h3_server.send_push_promise( stream_id=stream_id, headers=[ (b":method", b"GET"), (b":scheme", b"https"), (b":authority", b"localhost"), (b":path", b"/8.css"), ], )
tests.test_h0/H0ConnectionTest.test_headers_only
Modified
aiortc~aioquic
fd084338b0d72d996d1be928d81f8beb3b55c3f9
[tests] disable packet pacing for H0 / H3 tests
<0>:<del> with client_and_server( <1>:<del> client_options={"alpn_protocols": H0_ALPN}, <2>:<del> server_options={"alpn_protocols": H0_ALPN}, <3>:<add> with h0_client_and_server() as (quic_client, quic_server): <del> ) as (quic_client, quic_server):
# module: tests.test_h0 class H0ConnectionTest(TestCase): def test_headers_only(self): <0> with client_and_server( <1> client_options={"alpn_protocols": H0_ALPN}, <2> server_options={"alpn_protocols": H0_ALPN}, <3> ) as (quic_client, quic_server): <4> h0_client = H0Connection(quic_client) <5> h0_server = H0Connection(quic_server) <6> <7> # send request <8> stream_id = quic_client.get_next_available_stream_id() <9> h0_client.send_headers( <10> stream_id=stream_id, <11> headers=[ <12> (b":method", b"HEAD"), <13> (b":scheme", b"https"), <14> (b":authority", b"localhost"), <15> (b":path", b"/"), <16> ], <17> end_stream=True, <18> ) <19> <20> # receive request <21> events = h0_transfer(quic_client, h0_server) <22> self.assertEqual(len(events), 2) <23> <24> self.assertTrue(isinstance(events[0], HeadersReceived)) <25> self.assertEqual( <26> events[0].headers, [(b":method", b"HEAD"), (b":path", b"/")] <27> ) <28> self.assertEqual(events[0].stream_id, stream_id) <29> self.assertEqual(events[0].stream_ended, False) <30> <31> self.assertTrue(isinstance(events[1], DataReceived)) <32> self.assertEqual(events[1].data, b"") <33> self.assertEqual(events[1].stream_id, stream_id) <34> self.assertEqual(events[1].stream_ended, True) <35> <36> # send response <37> h0_server.send_headers( <38> stream_id=stream_id, <39> headers=[ <40> (</s>
===========below chunk 0=========== # module: tests.test_h0 class H0ConnectionTest(TestCase): def test_headers_only(self): # offset: 1 (b"content-type", b"text/html; charset=utf-8"), ], end_stream=True, ) # receive response events = h0_transfer(quic_server, h0_client) self.assertEqual(len(events), 2) self.assertTrue(isinstance(events[0], HeadersReceived)) self.assertEqual(events[0].headers, []) self.assertEqual(events[0].stream_id, stream_id) self.assertEqual(events[0].stream_ended, False) self.assertTrue(isinstance(events[1], DataReceived)) self.assertEqual(events[1].data, b"") self.assertEqual(events[1].stream_id, stream_id) self.assertEqual(events[1].stream_ended, True) ===========unchanged ref 0=========== at: tests.test_h0 h0_client_and_server() h0_transfer(quic_sender, h0_receiver) at: tests.test_h0.H0ConnectionTest.test_connect stream_id = quic_client.get_next_available_stream_id() events = h0_transfer(quic_client, h0_server) events = h0_transfer(quic_server, h0_client) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_h0 + def h0_client_and_server(): + return client_and_server( + client_options={"alpn_protocols": H0_ALPN}, + client_patch=disable_packet_pacing, + server_options={"alpn_protocols": H0_ALPN}, + server_patch=disable_packet_pacing, + ) + ===========changed ref 1=========== # module: tests.test_h0 class H0ConnectionTest(TestCase): def test_connect(self): - with client_and_server( - client_options={"alpn_protocols": H0_ALPN}, - server_options={"alpn_protocols": H0_ALPN}, + with h0_client_and_server() as (quic_client, quic_server): - ) as (quic_client, quic_server): h0_client = H0Connection(quic_client) h0_server = H0Connection(quic_server) # send request stream_id = quic_client.get_next_available_stream_id() h0_client.send_headers( stream_id=stream_id, headers=[ (b":method", b"GET"), (b":scheme", b"https"), (b":authority", b"localhost"), (b":path", b"/"), ], ) h0_client.send_data(stream_id=stream_id, data=b"", end_stream=True) # receive request events = h0_transfer(quic_client, h0_server) self.assertEqual(len(events), 2) self.assertTrue(isinstance(events[0], HeadersReceived)) self.assertEqual( events[0].headers, [(b":method", b"GET"), (b":path", b"/")] ) self.assertEqual(events[0].stream_id, stream_id) self.assertEqual(events[0].stream_ended, False) self.assertTrue(isinstance(events[1], DataReceived)) self.assertEqual(events[1].data, b"") self.assertEqual(events[1].stream_id, stream_id) self.assertEqual(events[1].stream_ended, True) # send response h0_server.send_headers( stream_id=stream_id</s> ===========changed ref 2=========== # module: tests.test_h0 class H0ConnectionTest(TestCase): def test_connect(self): # offset: 1 <s>ended, True) # send response h0_server.send_headers( stream_id=stream_id, headers=[ (b":status", b"200"), (b"content-type", b"text/html; charset=utf-8"), ], ) h0_server.send_data( stream_id=stream_id, data=b"<html><body>hello</body></html>", end_stream=True, ) # receive response events = h0_transfer(quic_server, h0_client) self.assertEqual(len(events), 2) self.assertTrue(isinstance(events[0], HeadersReceived)) self.assertEqual(events[0].headers, []) self.assertEqual(events[0].stream_id, stream_id) self.assertEqual(events[0].stream_ended, False) self.assertTrue(isinstance(events[1], DataReceived)) self.assertEqual(events[1].data, b"<html><body>hello</body></html>") self.assertEqual(events[1].stream_id, stream_id) self.assertEqual(events[1].stream_ended, True) ===========changed ref 3=========== # module: tests.test_h3 + def h3_client_and_server(): + return client_and_server( + client_options={"alpn_protocols": H3_ALPN}, + client_patch=disable_packet_pacing, + server_options={"alpn_protocols": H3_ALPN}, + server_patch=disable_packet_pacing, + ) + ===========changed ref 4=========== # module: tests.test_h3 class H3ConnectionTest(TestCase): def test_uni_stream_grease(self): - with client_and_server( - client_options={"alpn_protocols": H3_ALPN}, - server_options={"alpn_protocols": H3_ALPN}, + with h3_client_and_server() as (quic_client, quic_server): - ) as (quic_client, quic_server): h3_server = H3Connection(quic_server) quic_client.send_stream_data( 14, b"\xff\xff\xff\xff\xff\xff\xff\xfeGREASE is the word" ) self.assertEqual(h3_transfer(quic_client, h3_server), []) ===========changed ref 5=========== # module: tests.test_h3 class H3ConnectionTest(TestCase): def test_request(self): - with client_and_server( - client_options={"alpn_protocols": H3_ALPN}, - server_options={"alpn_protocols": H3_ALPN}, + with h3_client_and_server() as (quic_client, quic_server): - ) as (quic_client, quic_server): h3_client = H3Connection(quic_client) h3_server = H3Connection(quic_server) # make first request self._make_request(h3_client, h3_server) # make second request self._make_request(h3_client, h3_server) # make third request -> dynamic table self._make_request(h3_client, h3_server)
tests.test_connection/client_and_server
Modified
aiortc~aioquic
9bfddce361e172cd69365fe3f1a9703d4a7ec106
[tests] disable packet pacing for all sync tests
<7>:<add> disable_packet_pacing(client) <16>:<add> disable_packet_pacing(server)
# module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, - transport_options={}, ): <0> client_configuration = QuicConfiguration( <1> is_client=True, quic_logger=QuicLogger(), **client_options <2> ) <3> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) <4> <5> client = QuicConnection(configuration=client_configuration, **client_kwargs) <6> client._ack_delay = 0 <7> client_patch(client) <8> <9> server_configuration = QuicConfiguration( <10> is_client=False, quic_logger=QuicLogger(), **server_options <11> ) <12> server_configuration.load_cert_chain(server_certfile, server_keyfile) <13> <14> server = QuicConnection(configuration=server_configuration, **server_kwargs) <15> server._ack_delay = 0 <16> server_patch(server) <17> <18> # perform handshake <19> if handshake: <20> client.connect(SERVER_ADDR, now=time.time()) <21> for i in range(3): <22> roundtrip(client, server) <23> <24> yield client, server <25> <26> # close <27> client.close() <28> server.close() <29>
===========unchanged ref 0=========== at: contextlib contextmanager(func: Callable[..., Iterator[_T]]) -> Callable[..., _GeneratorContextManager[_T]] at: tests.test_connection SERVER_ADDR = ("2.3.4.5", 4433) disable_packet_pacing(connection) roundtrip(sender, receiver) at: tests.utils SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem") SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") at: time time() -> float
tests.test_connection/QuicConnectionTest.test_datagram_frame_2
Modified
aiortc~aioquic
9bfddce361e172cd69365fe3f1a9703d4a7ec106
[tests] disable packet pacing for all sync tests
<5>:<del> client_patch=disable_packet_pacing,
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_datagram_frame_2(self): <0> # payload which exactly fills an entire packet <1> payload = b"Z" * 1250 <2> <3> with client_and_server( <4> client_options={"max_datagram_frame_size": 65536}, <5> client_patch=disable_packet_pacing, <6> server_options={"max_datagram_frame_size": 65536}, <7> ) as (client, server): <8> # check handshake completed <9> self.check_handshake(client=client, server=server, alpn_protocol=None) <10> <11> # queue 20 datagrams <12> for i in range(20): <13> client.send_datagram_frame(payload) <14> <15> # client can only 11 datagrams are sent due to congestion control <16> self.assertEqual(transfer(client, server), 11) <17> for i in range(11): <18> event = server.next_event() <19> self.assertEqual(type(event), events.DatagramFrameReceived) <20> self.assertEqual(event.data, payload) <21> <22> # server sends ACK <23> self.assertEqual(transfer(server, client), 1) <24> <25> # client sends remaining datagrams <26> self.assertEqual(transfer(client, server), 9) <27> for i in range(9): <28> event = server.next_event() <29> self.assertEqual(type(event), events.DatagramFrameReceived) <30> self.assertEqual(event.data, payload) <31>
===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) transfer(sender, receiver) at: tests.test_connection.QuicConnectionTest check_handshake(client, server, alpn_protocol=None) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, - transport_options={}, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 + disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 + disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close()
tests.test_connection/QuicConnectionTest.test_send_max_stream_data_retransmit
Modified
aiortc~aioquic
9bfddce361e172cd69365fe3f1a9703d4a7ec106
[tests] disable packet pacing for all sync tests
<0>:<add> with client_and_server() as (client, server): <del> with client_and_server(server_patch=disable_packet_pacing) as (client, server):
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): <0> with client_and_server(server_patch=disable_packet_pacing) as (client, server): <1> # client creates bidirectional stream 0 <2> stream = client._create_stream(stream_id=0) <3> client.send_stream_data(0, b"hello") <4> self.assertEqual(stream.max_stream_data_local, 1048576) <5> self.assertEqual(stream.max_stream_data_local_sent, 1048576) <6> roundtrip(client, server) <7> <8> # server sends data, just before raising MAX_STREAM_DATA <9> server.send_stream_data(0, b"Z" * 524288) # 1048576 // 2 <10> for i in range(10): <11> roundtrip(server, client) <12> self.assertEqual(stream.max_stream_data_local, 1048576) <13> self.assertEqual(stream.max_stream_data_local_sent, 1048576) <14> <15> # server sends one more byte <16> server.send_stream_data(0, b"Z") <17> transfer(server, client) <18> <19> # MAX_STREAM_DATA is sent and lost <20> self.assertEqual(drop(client), 1) <21> self.assertEqual(stream.max_stream_data_local, 2097152) <22> self.assertEqual(stream.max_stream_data_local_sent, 2097152) <23> client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream) <24> self.assertEqual(stream.max_stream_data_local, 2097152) <25> self.assertEqual(stream.max_stream_data_local_sent, 0) <26> <27> # MAX_DATA is retransmitted and acked <28> self.assertEqual(roundtrip(client, server), (1, 1)) <29> self.assertEqual(stream.max_stream_data_</s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): # offset: 1 self.assertEqual(stream.max_stream_data_local_sent, 2097152) ===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) drop(sender) roundtrip(sender, receiver) transfer(sender, receiver) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, - transport_options={}, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 + disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 + disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close() ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_datagram_frame_2(self): # payload which exactly fills an entire packet payload = b"Z" * 1250 with client_and_server( client_options={"max_datagram_frame_size": 65536}, - client_patch=disable_packet_pacing, server_options={"max_datagram_frame_size": 65536}, ) as (client, server): # check handshake completed self.check_handshake(client=client, server=server, alpn_protocol=None) # queue 20 datagrams for i in range(20): client.send_datagram_frame(payload) # client can only 11 datagrams are sent due to congestion control self.assertEqual(transfer(client, server), 11) for i in range(11): event = server.next_event() self.assertEqual(type(event), events.DatagramFrameReceived) self.assertEqual(event.data, payload) # server sends ACK self.assertEqual(transfer(server, client), 1) # client sends remaining datagrams self.assertEqual(transfer(client, server), 9) for i in range(9): event = server.next_event() self.assertEqual(type(event), events.DatagramFrameReceived) self.assertEqual(event.data, payload)
tests.test_h3/h3_client_and_server
Modified
aiortc~aioquic
9bfddce361e172cd69365fe3f1a9703d4a7ec106
[tests] disable packet pacing for all sync tests
<2>:<del> client_patch=disable_packet_pacing, <4>:<del> server_patch=disable_packet_pacing,
# module: tests.test_h3 def h3_client_and_server(): <0> return client_and_server( <1> client_options={"alpn_protocols": H3_ALPN}, <2> client_patch=disable_packet_pacing, <3> server_options={"alpn_protocols": H3_ALPN}, <4> server_patch=disable_packet_pacing, <5> ) <6>
===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) ===========changed ref 0=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, - transport_options={}, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 + disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 + disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close() ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_datagram_frame_2(self): # payload which exactly fills an entire packet payload = b"Z" * 1250 with client_and_server( client_options={"max_datagram_frame_size": 65536}, - client_patch=disable_packet_pacing, server_options={"max_datagram_frame_size": 65536}, ) as (client, server): # check handshake completed self.check_handshake(client=client, server=server, alpn_protocol=None) # queue 20 datagrams for i in range(20): client.send_datagram_frame(payload) # client can only 11 datagrams are sent due to congestion control self.assertEqual(transfer(client, server), 11) for i in range(11): event = server.next_event() self.assertEqual(type(event), events.DatagramFrameReceived) self.assertEqual(event.data, payload) # server sends ACK self.assertEqual(transfer(server, client), 1) # client sends remaining datagrams self.assertEqual(transfer(client, server), 9) for i in range(9): event = server.next_event() self.assertEqual(type(event), events.DatagramFrameReceived) self.assertEqual(event.data, payload) ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): + with client_and_server() as (client, server): - with client_and_server(server_patch=disable_packet_pacing) as (client, server): # client creates bidirectional stream 0 stream = client._create_stream(stream_id=0) client.send_stream_data(0, b"hello") self.assertEqual(stream.max_stream_data_local, 1048576) self.assertEqual(stream.max_stream_data_local_sent, 1048576) roundtrip(client, server) # server sends data, just before raising MAX_STREAM_DATA server.send_stream_data(0, b"Z" * 524288) # 1048576 // 2 for i in range(10): roundtrip(server, client) self.assertEqual(stream.max_stream_data_local, 1048576) self.assertEqual(stream.max_stream_data_local_sent, 1048576) # server sends one more byte server.send_stream_data(0, b"Z") transfer(server, client) # MAX_STREAM_DATA is sent and lost self.assertEqual(drop(client), 1) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 2097152) client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 0) # MAX_DATA is retransmitted and acked self.assertEqual(roundtrip(client, server), (1, 1)) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(</s> ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): # offset: 1 <s> 1)) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 2097152)
tests.test_h0/h0_client_and_server
Modified
aiortc~aioquic
9bfddce361e172cd69365fe3f1a9703d4a7ec106
[tests] disable packet pacing for all sync tests
<2>:<del> client_patch=disable_packet_pacing, <4>:<del> server_patch=disable_packet_pacing,
# module: tests.test_h0 def h0_client_and_server(): <0> return client_and_server( <1> client_options={"alpn_protocols": H0_ALPN}, <2> client_patch=disable_packet_pacing, <3> server_options={"alpn_protocols": H0_ALPN}, <4> server_patch=disable_packet_pacing, <5> ) <6>
===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) ===========changed ref 0=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, - transport_options={}, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 + disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 + disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close() ===========changed ref 1=========== # module: tests.test_h3 def h3_client_and_server(): return client_and_server( client_options={"alpn_protocols": H3_ALPN}, - client_patch=disable_packet_pacing, server_options={"alpn_protocols": H3_ALPN}, - server_patch=disable_packet_pacing, ) ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_datagram_frame_2(self): # payload which exactly fills an entire packet payload = b"Z" * 1250 with client_and_server( client_options={"max_datagram_frame_size": 65536}, - client_patch=disable_packet_pacing, server_options={"max_datagram_frame_size": 65536}, ) as (client, server): # check handshake completed self.check_handshake(client=client, server=server, alpn_protocol=None) # queue 20 datagrams for i in range(20): client.send_datagram_frame(payload) # client can only 11 datagrams are sent due to congestion control self.assertEqual(transfer(client, server), 11) for i in range(11): event = server.next_event() self.assertEqual(type(event), events.DatagramFrameReceived) self.assertEqual(event.data, payload) # server sends ACK self.assertEqual(transfer(server, client), 1) # client sends remaining datagrams self.assertEqual(transfer(client, server), 9) for i in range(9): event = server.next_event() self.assertEqual(type(event), events.DatagramFrameReceived) self.assertEqual(event.data, payload) ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): + with client_and_server() as (client, server): - with client_and_server(server_patch=disable_packet_pacing) as (client, server): # client creates bidirectional stream 0 stream = client._create_stream(stream_id=0) client.send_stream_data(0, b"hello") self.assertEqual(stream.max_stream_data_local, 1048576) self.assertEqual(stream.max_stream_data_local_sent, 1048576) roundtrip(client, server) # server sends data, just before raising MAX_STREAM_DATA server.send_stream_data(0, b"Z" * 524288) # 1048576 // 2 for i in range(10): roundtrip(server, client) self.assertEqual(stream.max_stream_data_local, 1048576) self.assertEqual(stream.max_stream_data_local_sent, 1048576) # server sends one more byte server.send_stream_data(0, b"Z") transfer(server, client) # MAX_STREAM_DATA is sent and lost self.assertEqual(drop(client), 1) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 2097152) client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 0) # MAX_DATA is retransmitted and acked self.assertEqual(roundtrip(client, server), (1, 1)) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(</s> ===========changed ref 4=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): # offset: 1 <s> 1)) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 2097152)
tests.test_connection/QuicConnectionTest.test_connect_with_quantum_readiness
Modified
aiortc~aioquic
770e56f0a4c4499fdbfa717db26c96e4c338c5ff
[tests] check number of transfered datagrams for more tests
<7>:<add> self.assertEqual(roundtrip(client, server), (1, 1)) <del> roundtrip(client, server)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_quantum_readiness(self): <0> with client_and_server(client_options={"quantum_readiness_test": True},) as ( <1> client, <2> server, <3> ): <4> stream_id = client.get_next_available_stream_id() <5> client.send_stream_data(stream_id, b"hello") <6> <7> roundtrip(client, server) <8> <9> received = None <10> while True: <11> event = server.next_event() <12> if isinstance(event, events.StreamDataReceived): <13> received = event.data <14> elif event is None: <15> break <16> <17> self.assertEqual(received, b"hello") <18>
===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) roundtrip(sender, receiver) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None
tests.test_connection/QuicConnectionTest.test_connect_with_0rtt
Modified
aiortc~aioquic
770e56f0a4c4499fdbfa717db26c96e4c338c5ff
[tests] check number of transfered datagrams for more tests
<22>:<add> self.assertEqual(roundtrip(client, server), (2, 1)) <del> roundtrip(client, server)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_0rtt(self): <0> client_ticket = None <1> ticket_store = SessionTicketStore() <2> <3> def save_session_ticket(ticket): <4> nonlocal client_ticket <5> client_ticket = ticket <6> <7> with client_and_server( <8> client_kwargs={"session_ticket_handler": save_session_ticket}, <9> server_kwargs={"session_ticket_handler": ticket_store.add}, <10> ) as (client, server): <11> pass <12> <13> with client_and_server( <14> client_options={"session_ticket": client_ticket}, <15> server_kwargs={"session_ticket_fetcher": ticket_store.pop}, <16> handshake=False, <17> ) as (client, server): <18> client.connect(SERVER_ADDR, now=time.time()) <19> stream_id = client.get_next_available_stream_id() <20> client.send_stream_data(stream_id, b"hello") <21> <22> roundtrip(client, server) <23> <24> event = server.next_event() <25> self.assertEqual(type(event), events.ProtocolNegotiated) <26> <27> event = server.next_event() <28> self.assertEqual(type(event), events.StreamDataReceived) <29> self.assertEqual(event.data, b"hello") <30>
===========unchanged ref 0=========== at: tests.test_connection SERVER_ADDR = ("2.3.4.5", 4433) SessionTicketStore() client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) roundtrip(sender, receiver) at: tests.test_connection.SessionTicketStore add(ticket) pop(label) at: time time() -> float at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_quantum_readiness(self): with client_and_server(client_options={"quantum_readiness_test": True},) as ( client, server, ): stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) received = None while True: event = server.next_event() if isinstance(event, events.StreamDataReceived): received = event.data elif event is None: break self.assertEqual(received, b"hello")
tests.test_connection/QuicConnectionTest.test_handle_connection_close_frame
Modified
aiortc~aioquic
770e56f0a4c4499fdbfa717db26c96e4c338c5ff
[tests] check number of transfered datagrams for more tests
<6>:<add> self.assertEqual(roundtrip(server, client), (1, 0)) <del> roundtrip(server, client)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame(self): <0> with client_and_server() as (client, server): <1> server.close( <2> error_code=QuicErrorCode.PROTOCOL_VIOLATION, <3> frame_type=QuicFrameType.ACK, <4> reason_phrase="illegal ACK frame", <5> ) <6> roundtrip(server, client) <7> <8> self.assertEqual( <9> client._close_event, <10> events.ConnectionTerminated( <11> error_code=QuicErrorCode.PROTOCOL_VIOLATION, <12> frame_type=QuicFrameType.ACK, <13> reason_phrase="illegal ACK frame", <14> ), <15> ) <16>
===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) roundtrip(sender, receiver) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_quantum_readiness(self): with client_and_server(client_options={"quantum_readiness_test": True},) as ( client, server, ): stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) received = None while True: event = server.next_event() if isinstance(event, events.StreamDataReceived): received = event.data elif event is None: break self.assertEqual(received, b"hello") ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_0rtt(self): client_ticket = None ticket_store = SessionTicketStore() def save_session_ticket(ticket): nonlocal client_ticket client_ticket = ticket with client_and_server( client_kwargs={"session_ticket_handler": save_session_ticket}, server_kwargs={"session_ticket_handler": ticket_store.add}, ) as (client, server): pass with client_and_server( client_options={"session_ticket": client_ticket}, server_kwargs={"session_ticket_fetcher": ticket_store.pop}, handshake=False, ) as (client, server): client.connect(SERVER_ADDR, now=time.time()) stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (2, 1)) - roundtrip(client, server) event = server.next_event() self.assertEqual(type(event), events.ProtocolNegotiated) event = server.next_event() self.assertEqual(type(event), events.StreamDataReceived) self.assertEqual(event.data, b"hello")
tests.test_connection/QuicConnectionTest.test_handle_connection_close_frame_app
Modified
aiortc~aioquic
770e56f0a4c4499fdbfa717db26c96e4c338c5ff
[tests] check number of transfered datagrams for more tests
<2>:<add> self.assertEqual(roundtrip(server, client), (1, 0)) <del> roundtrip(server, client)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame_app(self): <0> with client_and_server() as (client, server): <1> server.close(error_code=QuicErrorCode.NO_ERROR, reason_phrase="goodbye") <2> roundtrip(server, client) <3> <4> self.assertEqual( <5> client._close_event, <6> events.ConnectionTerminated( <7> error_code=QuicErrorCode.NO_ERROR, <8> frame_type=None, <9> reason_phrase="goodbye", <10> ), <11> ) <12>
===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) roundtrip(sender, receiver) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame(self): with client_and_server() as (client, server): server.close( error_code=QuicErrorCode.PROTOCOL_VIOLATION, frame_type=QuicFrameType.ACK, reason_phrase="illegal ACK frame", ) + self.assertEqual(roundtrip(server, client), (1, 0)) - roundtrip(server, client) self.assertEqual( client._close_event, events.ConnectionTerminated( error_code=QuicErrorCode.PROTOCOL_VIOLATION, frame_type=QuicFrameType.ACK, reason_phrase="illegal ACK frame", ), ) ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_quantum_readiness(self): with client_and_server(client_options={"quantum_readiness_test": True},) as ( client, server, ): stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) received = None while True: event = server.next_event() if isinstance(event, events.StreamDataReceived): received = event.data elif event is None: break self.assertEqual(received, b"hello") ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_0rtt(self): client_ticket = None ticket_store = SessionTicketStore() def save_session_ticket(ticket): nonlocal client_ticket client_ticket = ticket with client_and_server( client_kwargs={"session_ticket_handler": save_session_ticket}, server_kwargs={"session_ticket_handler": ticket_store.add}, ) as (client, server): pass with client_and_server( client_options={"session_ticket": client_ticket}, server_kwargs={"session_ticket_fetcher": ticket_store.pop}, handshake=False, ) as (client, server): client.connect(SERVER_ADDR, now=time.time()) stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (2, 1)) - roundtrip(client, server) event = server.next_event() self.assertEqual(type(event), events.ProtocolNegotiated) event = server.next_event() self.assertEqual(type(event), events.StreamDataReceived) self.assertEqual(event.data, b"hello")
tests.test_connection/QuicConnectionTest.test_send_max_stream_data_retransmit
Modified
aiortc~aioquic
770e56f0a4c4499fdbfa717db26c96e4c338c5ff
[tests] check number of transfered datagrams for more tests
<6>:<add> self.assertEqual(roundtrip(client, server), (1, 1)) <del> roundtrip(client, server) <17>:<add> self.assertEqual(transfer(server, client), 1) <del> transfer(server, client)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): <0> with client_and_server() as (client, server): <1> # client creates bidirectional stream 0 <2> stream = client._create_stream(stream_id=0) <3> client.send_stream_data(0, b"hello") <4> self.assertEqual(stream.max_stream_data_local, 1048576) <5> self.assertEqual(stream.max_stream_data_local_sent, 1048576) <6> roundtrip(client, server) <7> <8> # server sends data, just before raising MAX_STREAM_DATA <9> server.send_stream_data(0, b"Z" * 524288) # 1048576 // 2 <10> for i in range(10): <11> roundtrip(server, client) <12> self.assertEqual(stream.max_stream_data_local, 1048576) <13> self.assertEqual(stream.max_stream_data_local_sent, 1048576) <14> <15> # server sends one more byte <16> server.send_stream_data(0, b"Z") <17> transfer(server, client) <18> <19> # MAX_STREAM_DATA is sent and lost <20> self.assertEqual(drop(client), 1) <21> self.assertEqual(stream.max_stream_data_local, 2097152) <22> self.assertEqual(stream.max_stream_data_local_sent, 2097152) <23> client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream) <24> self.assertEqual(stream.max_stream_data_local, 2097152) <25> self.assertEqual(stream.max_stream_data_local_sent, 0) <26> <27> # MAX_DATA is retransmitted and acked <28> self.assertEqual(roundtrip(client, server), (1, 1)) <29> self.assertEqual(stream.max_stream_data_local, 2097152) <30> self.</s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): # offset: 1 ===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) drop(sender) roundtrip(sender, receiver) transfer(sender, receiver) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame_app(self): with client_and_server() as (client, server): server.close(error_code=QuicErrorCode.NO_ERROR, reason_phrase="goodbye") + self.assertEqual(roundtrip(server, client), (1, 0)) - roundtrip(server, client) self.assertEqual( client._close_event, events.ConnectionTerminated( error_code=QuicErrorCode.NO_ERROR, frame_type=None, reason_phrase="goodbye", ), ) ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame(self): with client_and_server() as (client, server): server.close( error_code=QuicErrorCode.PROTOCOL_VIOLATION, frame_type=QuicFrameType.ACK, reason_phrase="illegal ACK frame", ) + self.assertEqual(roundtrip(server, client), (1, 0)) - roundtrip(server, client) self.assertEqual( client._close_event, events.ConnectionTerminated( error_code=QuicErrorCode.PROTOCOL_VIOLATION, frame_type=QuicFrameType.ACK, reason_phrase="illegal ACK frame", ), ) ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_quantum_readiness(self): with client_and_server(client_options={"quantum_readiness_test": True},) as ( client, server, ): stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) received = None while True: event = server.next_event() if isinstance(event, events.StreamDataReceived): received = event.data elif event is None: break self.assertEqual(received, b"hello") ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_0rtt(self): client_ticket = None ticket_store = SessionTicketStore() def save_session_ticket(ticket): nonlocal client_ticket client_ticket = ticket with client_and_server( client_kwargs={"session_ticket_handler": save_session_ticket}, server_kwargs={"session_ticket_handler": ticket_store.add}, ) as (client, server): pass with client_and_server( client_options={"session_ticket": client_ticket}, server_kwargs={"session_ticket_fetcher": ticket_store.pop}, handshake=False, ) as (client, server): client.connect(SERVER_ADDR, now=time.time()) stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (2, 1)) - roundtrip(client, server) event = server.next_event() self.assertEqual(type(event), events.ProtocolNegotiated) event = server.next_event() self.assertEqual(type(event), events.StreamDataReceived) self.assertEqual(event.data, b"hello")
tests.test_connection/QuicConnectionTest.test_send_ping
Modified
aiortc~aioquic
770e56f0a4c4499fdbfa717db26c96e4c338c5ff
[tests] check number of transfered datagrams for more tests
<5>:<add> self.assertEqual(roundtrip(client, server), (1, 1)) <del> roundtrip(client, server)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_ping(self): <0> with client_and_server() as (client, server): <1> consume_events(client) <2> <3> # client sends ping, server ACKs it <4> client.send_ping(uid=12345) <5> roundtrip(client, server) <6> <7> # check event <8> event = client.next_event() <9> self.assertEqual(type(event), events.PingAcknowledged) <10> self.assertEqual(event.uid, 12345) <11>
===========unchanged ref 0=========== at: tests.test_connection consume_events(connection) client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) roundtrip(sender, receiver) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): with client_and_server() as (client, server): # client creates bidirectional stream 0 stream = client._create_stream(stream_id=0) client.send_stream_data(0, b"hello") self.assertEqual(stream.max_stream_data_local, 1048576) self.assertEqual(stream.max_stream_data_local_sent, 1048576) + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) # server sends data, just before raising MAX_STREAM_DATA server.send_stream_data(0, b"Z" * 524288) # 1048576 // 2 for i in range(10): roundtrip(server, client) self.assertEqual(stream.max_stream_data_local, 1048576) self.assertEqual(stream.max_stream_data_local_sent, 1048576) # server sends one more byte server.send_stream_data(0, b"Z") + self.assertEqual(transfer(server, client), 1) - transfer(server, client) # MAX_STREAM_DATA is sent and lost self.assertEqual(drop(client), 1) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 2097152) client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 0) # MAX_DATA is retransmitted and acked self.assertEqual(roundtrip(client, server), (1, 1)) self.assertEqual(stream.max_stream_data_local, 20</s> ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): # offset: 1 <s>roundtrip(client, server), (1, 1)) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 2097152) ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame_app(self): with client_and_server() as (client, server): server.close(error_code=QuicErrorCode.NO_ERROR, reason_phrase="goodbye") + self.assertEqual(roundtrip(server, client), (1, 0)) - roundtrip(server, client) self.assertEqual( client._close_event, events.ConnectionTerminated( error_code=QuicErrorCode.NO_ERROR, frame_type=None, reason_phrase="goodbye", ), ) ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame(self): with client_and_server() as (client, server): server.close( error_code=QuicErrorCode.PROTOCOL_VIOLATION, frame_type=QuicFrameType.ACK, reason_phrase="illegal ACK frame", ) + self.assertEqual(roundtrip(server, client), (1, 0)) - roundtrip(server, client) self.assertEqual( client._close_event, events.ConnectionTerminated( error_code=QuicErrorCode.PROTOCOL_VIOLATION, frame_type=QuicFrameType.ACK, reason_phrase="illegal ACK frame", ), ) ===========changed ref 4=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_quantum_readiness(self): with client_and_server(client_options={"quantum_readiness_test": True},) as ( client, server, ): stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) received = None while True: event = server.next_event() if isinstance(event, events.StreamDataReceived): received = event.data elif event is None: break self.assertEqual(received, b"hello") ===========changed ref 5=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_0rtt(self): client_ticket = None ticket_store = SessionTicketStore() def save_session_ticket(ticket): nonlocal client_ticket client_ticket = ticket with client_and_server( client_kwargs={"session_ticket_handler": save_session_ticket}, server_kwargs={"session_ticket_handler": ticket_store.add}, ) as (client, server): pass with client_and_server( client_options={"session_ticket": client_ticket}, server_kwargs={"session_ticket_fetcher": ticket_store.pop}, handshake=False, ) as (client, server): client.connect(SERVER_ADDR, now=time.time()) stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (2, 1)) - roundtrip(client, server) event = server.next_event() self.assertEqual(type(event), events.ProtocolNegotiated) event = server.next_event() self.assertEqual(type(event), events.StreamDataReceived) self.assertEqual(event.data, b"hello")
tests.test_connection/QuicConnectionTest.test_send_stream_data_peer_initiated
Modified
aiortc~aioquic
770e56f0a4c4499fdbfa717db26c96e4c338c5ff
[tests] check number of transfered datagrams for more tests
<3>:<add> self.assertEqual(roundtrip(server, client), (1, 1)) <del> roundtrip(server, client) <7>:<add> self.assertEqual(roundtrip(server, client), (1, 1)) <del> roundtrip(server, client) <11>:<add> self.assertEqual(roundtrip(client, server), (1, 1)) <del> roundtrip(client, server) <15>:<add> self.assertEqual(roundtrip(client, server), (1, 1)) <del> roundtrip(client, server) <19>:<add> self.assertEqual(roundtrip(client, server), (1, 1)) <del> roundtrip(client, server)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_stream_data_peer_initiated(self): <0> with client_and_server() as (client, server): <1> # server creates bidirectional stream <2> server.send_stream_data(1, b"hello") <3> roundtrip(server, client) <4> <5> # server creates unidirectional stream <6> server.send_stream_data(3, b"hello") <7> roundtrip(server, client) <8> <9> # client creates bidirectional stream <10> client.send_stream_data(0, b"hello") <11> roundtrip(client, server) <12> <13> # client sends data on server-initiated bidirectional stream <14> client.send_stream_data(1, b"hello") <15> roundtrip(client, server) <16> <17> # client create unidirectional stream <18> client.send_stream_data(2, b"hello") <19> roundtrip(client, server) <20> <21> # client tries to send data on server-initial unidirectional stream <22> with self.assertRaises(ValueError) as cm: <23> client.send_stream_data(3, b"hello") <24> self.assertEqual( <25> str(cm.exception), <26> "Cannot send data on peer-initiated unidirectional stream", <27> ) <28> <29> # client tries to send data on unknown server-initiated bidirectional stream <30> with self.assertRaises(ValueError) as cm: <31> client.send_stream_data(5, b"hello") <32> self.assertEqual( <33> str(cm.exception), "Cannot send data on unknown peer-initiated stream" <34> ) <35>
===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) roundtrip(sender, receiver) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None at: unittest.case._AssertRaisesContext.__exit__ self.exception = exc_value.with_traceback(None) ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_ping(self): with client_and_server() as (client, server): consume_events(client) # client sends ping, server ACKs it client.send_ping(uid=12345) + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) # check event event = client.next_event() self.assertEqual(type(event), events.PingAcknowledged) self.assertEqual(event.uid, 12345) ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): with client_and_server() as (client, server): # client creates bidirectional stream 0 stream = client._create_stream(stream_id=0) client.send_stream_data(0, b"hello") self.assertEqual(stream.max_stream_data_local, 1048576) self.assertEqual(stream.max_stream_data_local_sent, 1048576) + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) # server sends data, just before raising MAX_STREAM_DATA server.send_stream_data(0, b"Z" * 524288) # 1048576 // 2 for i in range(10): roundtrip(server, client) self.assertEqual(stream.max_stream_data_local, 1048576) self.assertEqual(stream.max_stream_data_local_sent, 1048576) # server sends one more byte server.send_stream_data(0, b"Z") + self.assertEqual(transfer(server, client), 1) - transfer(server, client) # MAX_STREAM_DATA is sent and lost self.assertEqual(drop(client), 1) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 2097152) client._on_max_stream_data_delivery(QuicDeliveryState.LOST, stream) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 0) # MAX_DATA is retransmitted and acked self.assertEqual(roundtrip(client, server), (1, 1)) self.assertEqual(stream.max_stream_data_local, 20</s> ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_max_stream_data_retransmit(self): # offset: 1 <s>roundtrip(client, server), (1, 1)) self.assertEqual(stream.max_stream_data_local, 2097152) self.assertEqual(stream.max_stream_data_local_sent, 2097152) ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame_app(self): with client_and_server() as (client, server): server.close(error_code=QuicErrorCode.NO_ERROR, reason_phrase="goodbye") + self.assertEqual(roundtrip(server, client), (1, 0)) - roundtrip(server, client) self.assertEqual( client._close_event, events.ConnectionTerminated( error_code=QuicErrorCode.NO_ERROR, frame_type=None, reason_phrase="goodbye", ), ) ===========changed ref 4=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_handle_connection_close_frame(self): with client_and_server() as (client, server): server.close( error_code=QuicErrorCode.PROTOCOL_VIOLATION, frame_type=QuicFrameType.ACK, reason_phrase="illegal ACK frame", ) + self.assertEqual(roundtrip(server, client), (1, 0)) - roundtrip(server, client) self.assertEqual( client._close_event, events.ConnectionTerminated( error_code=QuicErrorCode.PROTOCOL_VIOLATION, frame_type=QuicFrameType.ACK, reason_phrase="illegal ACK frame", ), ) ===========changed ref 5=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_quantum_readiness(self): with client_and_server(client_options={"quantum_readiness_test": True},) as ( client, server, ): stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (1, 1)) - roundtrip(client, server) received = None while True: event = server.next_event() if isinstance(event, events.StreamDataReceived): received = event.data elif event is None: break self.assertEqual(received, b"hello") ===========changed ref 6=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_0rtt(self): client_ticket = None ticket_store = SessionTicketStore() def save_session_ticket(ticket): nonlocal client_ticket client_ticket = ticket with client_and_server( client_kwargs={"session_ticket_handler": save_session_ticket}, server_kwargs={"session_ticket_handler": ticket_store.add}, ) as (client, server): pass with client_and_server( client_options={"session_ticket": client_ticket}, server_kwargs={"session_ticket_fetcher": ticket_store.pop}, handshake=False, ) as (client, server): client.connect(SERVER_ADDR, now=time.time()) stream_id = client.get_next_available_stream_id() client.send_stream_data(stream_id, b"hello") + self.assertEqual(roundtrip(client, server), (2, 1)) - roundtrip(client, server) event = server.next_event() self.assertEqual(type(event), events.ProtocolNegotiated) event = server.next_event() self.assertEqual(type(event), events.StreamDataReceived) self.assertEqual(event.data, b"hello")
aioquic.tls/verify_certificate
Modified
aiortc~aioquic
464a47055970cdcdf2c6f2dbf30717cd0a2bc8e8
[tls] use `certifi` for certificate authority
<37>:<del> paths
# module: aioquic.tls def verify_certificate( certificate: x509.Certificate, chain: List[x509.Certificate] = [], server_name: Optional[str] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, ) -> None: <0> # verify dates <1> now = utcnow() <2> if now < certificate.not_valid_before: <3> raise AlertCertificateExpired("Certificate is not valid yet") <4> if now > certificate.not_valid_after: <5> raise AlertCertificateExpired("Certificate is no longer valid") <6> <7> # verify subject <8> if server_name is not None: <9> subject = [] <10> subjectAltName: List[Tuple[str, str]] = [] <11> for attr in certificate.subject: <12> if attr.oid == x509.NameOID.COMMON_NAME: <13> subject.append((("commonName", attr.value),)) <14> for ext in certificate.extensions: <15> if isinstance(ext.value, x509.SubjectAlternativeName): <16> for name in ext.value: <17> if isinstance(name, x509.DNSName): <18> subjectAltName.append(("DNS", name.value)) <19> <20> try: <21> ssl.match_hostname( <22> {"subject": tuple(subject), "subjectAltName": tuple(subjectAltName)}, <23> server_name, <24> ) <25> except ssl.CertificateError as exc: <26> raise AlertBadCertificate("\n".join(exc.args)) from exc <27> <28> # verify certificate chain <29> store = lib.X509_STORE_new() <30> openssl_assert(store != ffi.NULL, "X509_store_new") <31> store = ffi.gc(store, lib.X509_STORE_free) <32> <33> # load default CAs <34> openssl_assert( <35> lib.X509_STORE_set_default_paths(store), "X509_STORE_set_default_paths" <36> ) <37> paths</s>
===========below chunk 0=========== # module: aioquic.tls def verify_certificate( certificate: x509.Certificate, chain: List[x509.Certificate] = [], server_name: Optional[str] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, ) -> None: # offset: 1 if paths.cafile is not None or paths.capath is not None: openssl_assert( lib.X509_STORE_load_locations( store, openssl_encode_path(paths.cafile), openssl_encode_path(paths.capath), ), "X509_STORE_load_locations", ) # load extra CAs if cadata is not None: for cert in load_pem_x509_certificates(cadata): openssl_assert( lib.X509_STORE_add_cert(store, cert_x509_ptr(cert)), "X509_STORE_add_cert", ) if cafile is not None or capath is not None: openssl_assert( lib.X509_STORE_load_locations( store, openssl_encode_path(cafile), openssl_encode_path(capath) ), "X509_STORE_load_locations", ) chain_stack = lib.sk_X509_new_null() openssl_assert(chain_stack != ffi.NULL, "sk_X509_new_null") chain_stack = ffi.gc(chain_stack, lib.sk_X509_free) for cert in chain: openssl_assert( lib.sk_X509_push(chain_stack, cert_x509_ptr(cert)), "sk_X509_push" ) store_ctx = lib.X509_STORE_CTX_new() openssl_assert(store_ctx != ffi.NULL, "X509_STORE_CTX_new") store_ctx = ffi.gc(store_</s> ===========below chunk 1=========== # module: aioquic.tls def verify_certificate( certificate: x509.Certificate, chain: List[x509.Certificate] = [], server_name: Optional[str] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, ) -> None: # offset: 2 <s>_ctx != ffi.NULL, "X509_STORE_CTX_new") store_ctx = ffi.gc(store_ctx, lib.X509_STORE_CTX_free) openssl_assert( lib.X509_STORE_CTX_init( store_ctx, store, cert_x509_ptr(certificate), chain_stack ), "X509_STORE_CTX_init", ) res = lib.X509_verify_cert(store_ctx) if not res: err = lib.X509_STORE_CTX_get_error(store_ctx) err_str = openssl_decode_string(lib.X509_verify_cert_error_string(err)) raise AlertBadCertificate(err_str) ===========unchanged ref 0=========== at: aioquic.tls ffi = binding.ffi lib = binding.lib utcnow = datetime.datetime.utcnow AlertBadCertificate(*args: object) AlertCertificateExpired(*args: object) load_pem_x509_certificates(data: bytes) -> List[x509.Certificate] openssl_assert(ok: bool, func: str) -> None openssl_decode_string(charp) -> str openssl_encode_path(s: Optional[str]) -> Any cert_x509_ptr(certificate: x509.Certificate) -> Any at: certifi where() -> str at: enum IntEnum(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) IntEnum(x: Union[str, bytes, bytearray], base: int) at: ssl CertificateError = SSLCertVerificationError match_hostname(cert: _PeerCertRetType, hostname: str) -> None at: typing Tuple = _TupleType(tuple, -1, inst=False, name='Tuple') List = _alias(list, 1, inst=False, name='List') ===========changed ref 0=========== # module: setup root_dir = os.path.abspath(os.path.dirname(__file__)) about = {} about_file = os.path.join(root_dir, "src", "aioquic", "about.py") with open(about_file, encoding="utf-8") as fp: exec(fp.read(), about) readme_file = os.path.join(root_dir, "README.rst") with open(readme_file, encoding="utf-8") as f: long_description = f.read() if sys.platform == "win32": extra_compile_args = [] libraries = ["libcrypto"] else: extra_compile_args = ["-std=c99"] libraries = ["crypto"] setuptools.setup( name=about["__title__"], version=about["__version__"], description=about["__summary__"], long_description=long_description, url=about["__uri__"], author=about["__author__"], author_email=about["__email__"], license=about["__license__"], include_package_data=True, classifiers=[ "Development Status :: 4 - Beta", "Environment :: Web Environment", "Intended Audience :: Developers", "License :: OSI Approved :: BSD License", "Operating System :: OS Independent", "Programming Language :: Python", "Programming Language :: Python :: 3", "Programming Language :: Python :: 3.6", "Programming Language :: Python :: 3.7", "Programming Language :: Python :: 3.8", "Topic :: Internet :: WWW/HTTP", ], ext_modules=[ setuptools.Extension( "aioquic._buffer", extra_compile_args=extra_compile_args, sources=["src/aioquic/_buffer.c"], ), setuptools.Extension( "aioquic._crypto", extra_compile_args=extra_</s> ===========changed ref 1=========== # module: setup # offset: 1 <s> ), setuptools.Extension( "aioquic._crypto", extra_compile_args=extra_compile_args, libraries=libraries, sources=["src/aioquic/_crypto.c"], ), ], package_dir={"": "src"}, package_data={"aioquic": ["py.typed", "_buffer.pyi", "_crypto.pyi"]}, packages=["aioquic", "aioquic.asyncio", "aioquic.h0", "aioquic.h3", "aioquic.quic"], install_requires=[ + "certifi", "cryptography >= 2.5", 'dataclasses; python_version < "3.7"', "pylsqpack >= 0.3.3, < 0.4.0", ], )
tests.test_asyncio/HighLevelTest.setUp
Modified
aiortc~aioquic
324b1997fcbe7366c1867b75ef6a16108a6e3bee
[asyncio] use IPv4 socket on Windows to talk to an IPv4 host
<1>:<add> self.server_host = "localhost" <del> self.server_host = "::1"
# module: tests.test_asyncio class HighLevelTest(TestCase): def setUp(self): <0> self.server = None <1> self.server_host = "::1" <2> self.server_port = 4433 <3>
===========unchanged ref 0=========== at: tests.test_asyncio.HighLevelTest.run_server self.server = await serve( host=host, port=self.server_port, configuration=configuration, stream_handler=handle_stream, **kwargs ) at: unittest.case.TestCase failureException = AssertionError longMessage = True maxDiff = 80*8 _diffThreshold = 2**16 setUp(self) -> None failUnlessEqual = assertEquals = _deprecate(assertEqual) failUnlessEqual = assertEquals = _deprecate(assertEqual) failIfEqual = assertNotEquals = _deprecate(assertNotEqual) failIfEqual = assertNotEquals = _deprecate(assertNotEqual) failUnlessAlmostEqual = assertAlmostEquals = _deprecate(assertAlmostEqual) failUnlessAlmostEqual = assertAlmostEquals = _deprecate(assertAlmostEqual) failIfAlmostEqual = assertNotAlmostEquals = _deprecate(assertNotAlmostEqual) failIfAlmostEqual = assertNotAlmostEquals = _deprecate(assertNotAlmostEqual) failUnless = assert_ = _deprecate(assertTrue) failUnless = assert_ = _deprecate(assertTrue) failUnlessRaises = _deprecate(assertRaises) failIf = _deprecate(assertFalse) assertRaisesRegexp = _deprecate(assertRaisesRegex) assertRegexpMatches = _deprecate(assertRegex) assertNotRegexpMatches = _deprecate(assertNotRegex)
tests.test_asyncio/HighLevelTest.run_server
Modified
aiortc~aioquic
324b1997fcbe7366c1867b75ef6a16108a6e3bee
[asyncio] use IPv4 socket on Windows to talk to an IPv4 host
<4>:<add> host=host, <del> host="::", <5>:<add> port=self.server_port, <del> port=4433,
# module: tests.test_asyncio class HighLevelTest(TestCase): + def run_server(self, configuration=None, host="::", **kwargs): - def run_server(self, configuration=None, **kwargs): <0> if configuration is None: <1> configuration = QuicConfiguration(is_client=False) <2> configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) <3> self.server = await serve( <4> host="::", <5> port=4433, <6> configuration=configuration, <7> stream_handler=handle_stream, <8> **kwargs <9> ) <10> return self.server <11>
===========unchanged ref 0=========== at: tests.test_asyncio handle_stream(reader, writer) at: tests.test_asyncio.HighLevelTest.setUp self.server = None self.server_port = 4433 at: tests.utils SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") ===========changed ref 0=========== # module: tests.test_asyncio class HighLevelTest(TestCase): def setUp(self): self.server = None + self.server_host = "localhost" - self.server_host = "::1" self.server_port = 4433
aioquic.asyncio.client/connect
Modified
aiortc~aioquic
324b1997fcbe7366c1867b75ef6a16108a6e3bee
[asyncio] use IPv4 socket on Windows to talk to an IPv4 host
<22>:<add> local_host = "::"
# module: aioquic.asyncio.client @asynccontextmanager async def connect( host: str, port: int, *, configuration: Optional[QuicConfiguration] = None, create_protocol: Optional[Callable] = QuicConnectionProtocol, session_ticket_handler: Optional[SessionTicketHandler] = None, stream_handler: Optional[QuicStreamHandler] = None, wait_connected: bool = True, ) -> AsyncGenerator[QuicConnectionProtocol, None]: <0> """ <1> Connect to a QUIC server at the given `host` and `port`. <2> <3> :meth:`connect()` returns an awaitable. Awaiting it yields a <4> :class:`~aioquic.asyncio.QuicConnectionProtocol` which can be used to <5> create streams. <6> <7> :func:`connect` also accepts the following optional arguments: <8> <9> * ``configuration`` is a :class:`~aioquic.quic.configuration.QuicConfiguration` <10> configuration object. <11> * ``create_protocol`` allows customizing the :class:`~asyncio.Protocol` that <12> manages the connection. It should be a callable or class accepting the same <13> arguments as :class:`~aioquic.asyncio.QuicConnectionProtocol` and returning <14> an instance of :class:`~aioquic.asyncio.QuicConnectionProtocol` or a subclass. <15> * ``session_ticket_handler`` is a callback which is invoked by the TLS <16> engine when a new session ticket is received. <17> * ``stream_handler`` is a callback which is invoked whenever a stream is <18> created. It must accept two arguments: a :class:`asyncio.StreamReader` <19> and a :class:`asyncio.StreamWriter`. <20> """ <21> loop = asyncio.get_event_loop() <22> <23> # if host is not an IP address, pass it to enable SNI <24> try: <25> ipaddress.ip_address(host) <26> server_name = None <27> except ValueError: <28> server_name = host <29> <30> # lookup remote address <31> </s>
===========below chunk 0=========== # module: aioquic.asyncio.client @asynccontextmanager async def connect( host: str, port: int, *, configuration: Optional[QuicConfiguration] = None, create_protocol: Optional[Callable] = QuicConnectionProtocol, session_ticket_handler: Optional[SessionTicketHandler] = None, stream_handler: Optional[QuicStreamHandler] = None, wait_connected: bool = True, ) -> AsyncGenerator[QuicConnectionProtocol, None]: # offset: 1 addr = infos[0][4] if len(addr) == 2: addr = ("::ffff:" + addr[0], addr[1], 0, 0) # prepare QUIC connection if configuration is None: configuration = QuicConfiguration(is_client=True) if server_name is not None: configuration.server_name = server_name connection = QuicConnection( configuration=configuration, session_ticket_handler=session_ticket_handler ) # connect _, protocol = await loop.create_datagram_endpoint( lambda: create_protocol(connection, stream_handler=stream_handler), local_addr=("::", 0), ) protocol = cast(QuicConnectionProtocol, protocol) protocol.connect(addr) if wait_connected: await protocol.wait_connected() try: yield protocol finally: protocol.close() await protocol.wait_closed() ===========unchanged ref 0=========== at: _asyncio get_event_loop() at: asyncio.events get_event_loop() -> AbstractEventLoop at: asyncio.events.AbstractEventLoop getaddrinfo(host: Optional[str], port: Union[str, int, None], *, family: int=..., type: int=..., proto: int=..., flags: int=...) -> List[Tuple[AddressFamily, SocketKind, int, str, Union[Tuple[str, int], Tuple[str, int, int, int]]]] create_datagram_endpoint(protocol_factory: _ProtocolFactory, local_addr: Optional[Tuple[str, int]]=..., remote_addr: Optional[Tuple[str, int]]=..., *, family: int=..., proto: int=..., flags: int=..., reuse_address: Optional[bool]=..., reuse_port: Optional[bool]=..., allow_broadcast: Optional[bool]=..., sock: Optional[socket]=...) -> _TransProtPair at: ipaddress ip_address(address: object) -> Any at: socket SOCK_DGRAM: SocketKind at: sys platform: str at: typing cast(typ: Type[_T], val: Any) -> _T cast(typ: str, val: Any) -> Any cast(typ: object, val: Any) -> Any Callable = _CallableType(collections.abc.Callable, 2) AsyncGenerator = _alias(collections.abc.AsyncGenerator, 2) ===========changed ref 0=========== # module: tests.test_asyncio class HighLevelTest(TestCase): def setUp(self): self.server = None + self.server_host = "localhost" - self.server_host = "::1" self.server_port = 4433 ===========changed ref 1=========== # module: tests.test_asyncio class HighLevelTest(TestCase): - def test_connect_and_serve_with_sni(self): - run(self.run_server()) - response = run(self.run_client(host="localhost")) - self.assertEqual(response, b"gnip") - ===========changed ref 2=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_and_serve_ipv6(self): + run(self.run_server(host="::")) + response = run(self.run_client(host="::1")) + self.assertEqual(response, b"gnip") + ===========changed ref 3=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_and_serve_ipv4(self): + run(self.run_server(host="0.0.0.0")) + response = run(self.run_client(host="127.0.0.1")) + self.assertEqual(response, b"gnip") + ===========changed ref 4=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def run_server(self, configuration=None, host="::", **kwargs): - def run_server(self, configuration=None, **kwargs): if configuration is None: configuration = QuicConfiguration(is_client=False) configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) self.server = await serve( + host=host, - host="::", + port=self.server_port, - port=4433, configuration=configuration, stream_handler=handle_stream, **kwargs ) return self.server
examples.http3_client/run
Modified
aiortc~aioquic
e1347661373b02858170246226cf247576b51805
Add local port for the client (#58)
<19>:<add> local_port=local_port,
# module: examples.http3_client def run( configuration: QuicConfiguration, urls: List[str], data: str, include: bool, output_dir: Optional[str], + local_port: int, ) -> None: <0> # parse URL <1> parsed = urlparse(urls[0]) <2> assert parsed.scheme in ( <3> "https", <4> "wss", <5> ), "Only https:// or wss:// URLs are supported." <6> if ":" in parsed.netloc: <7> host, port_str = parsed.netloc.split(":") <8> port = int(port_str) <9> else: <10> host = parsed.netloc <11> port = 443 <12> <13> async with connect( <14> host, <15> port, <16> configuration=configuration, <17> create_protocol=HttpClient, <18> session_ticket_handler=save_session_ticket, <19> ) as client: <20> client = cast(HttpClient, client) <21> <22> if parsed.scheme == "wss": <23> ws = await client.websocket(urls[0], subprotocols=["chat", "superchat"]) <24> <25> # send some messages and receive reply <26> for i in range(2): <27> message = "Hello {}, WebSocket!".format(i) <28> print("> " + message) <29> await ws.send(message) <30> <31> message = await ws.recv() <32> print("< " + message) <33> <34> await ws.close() <35> else: <36> # perform request <37> coros = [ <38> perform_http_request( <39> client=client, <40> url=url, <41> data=data, <42> include=include, <43> output_dir=output_dir, <44> ) <45> for url in urls <46> ] <47> await asyncio.gather(*coros) <48>
===========unchanged ref 0=========== at: examples.http3_client HttpClient(*args, **kwargs) perform_http_request(client: HttpClient, url: str, data: str, include: bool, output_dir: Optional[str]) -> None save_session_ticket(ticket: SessionTicket) -> None at: typing cast(typ: Type[_T], val: Any) -> _T cast(typ: str, val: Any) -> Any cast(typ: object, val: Any) -> Any List = _alias(list, 1, inst=False, name='List') at: urllib.parse urlparse(url: str, scheme: Optional[str]=..., allow_fragments: bool=...) -> ParseResult urlparse(url: Optional[bytes], scheme: Optional[bytes]=..., allow_fragments: bool=...) -> ParseResultBytes ===========changed ref 0=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_local_port(self): + run(self.run_server()) + response = run(self.run_client(local_port=3456)) + self.assertEqual(response, b"gnip") +
aioquic.asyncio.client/connect
Modified
aiortc~aioquic
e1347661373b02858170246226cf247576b51805
Add local port for the client (#58)
<20>:<add> * ``local_port`` is the UDP port number that this client wants to bind.
<s>asyncio.client @asynccontextmanager async def connect( host: str, port: int, *, configuration: Optional[QuicConfiguration] = None, create_protocol: Optional[Callable] = QuicConnectionProtocol, session_ticket_handler: Optional[SessionTicketHandler] = None, stream_handler: Optional[QuicStreamHandler] = None, wait_connected: bool = True, + local_port: int = 0, ) -> AsyncGenerator[QuicConnectionProtocol, None]: <0> """ <1> Connect to a QUIC server at the given `host` and `port`. <2> <3> :meth:`connect()` returns an awaitable. Awaiting it yields a <4> :class:`~aioquic.asyncio.QuicConnectionProtocol` which can be used to <5> create streams. <6> <7> :func:`connect` also accepts the following optional arguments: <8> <9> * ``configuration`` is a :class:`~aioquic.quic.configuration.QuicConfiguration` <10> configuration object. <11> * ``create_protocol`` allows customizing the :class:`~asyncio.Protocol` that <12> manages the connection. It should be a callable or class accepting the same <13> arguments as :class:`~aioquic.asyncio.QuicConnectionProtocol` and returning <14> an instance of :class:`~aioquic.asyncio.QuicConnectionProtocol` or a subclass. <15> * ``session_ticket_handler`` is a callback which is invoked by the TLS <16> engine when a new session ticket is received. <17> * ``stream_handler`` is a callback which is invoked whenever a stream is <18> created. It must accept two arguments: a :class:`asyncio.StreamReader` <19> and a :class:`asyncio.StreamWriter`. <20> """ <21> loop = asyncio.get_event_loop() <22> local_host = "::" <23> <24> # if host is not an IP address, pass it to enable SNI <25> try: <26> ipaddress.ip_address(host) <27> server_name = None <28> except ValueError: <29> server_name =</s>
===========below chunk 0=========== <s>@asynccontextmanager async def connect( host: str, port: int, *, configuration: Optional[QuicConfiguration] = None, create_protocol: Optional[Callable] = QuicConnectionProtocol, session_ticket_handler: Optional[SessionTicketHandler] = None, stream_handler: Optional[QuicStreamHandler] = None, wait_connected: bool = True, + local_port: int = 0, ) -> AsyncGenerator[QuicConnectionProtocol, None]: # offset: 1 # lookup remote address infos = await loop.getaddrinfo(host, port, type=socket.SOCK_DGRAM) addr = infos[0][4] if len(addr) == 2: # determine behaviour for IPv4 if sys.platform == "win32": # on Windows, we must use an IPv4 socket to reach an IPv4 host local_host = "0.0.0.0" else: # other platforms support dual-stack sockets addr = ("::ffff:" + addr[0], addr[1], 0, 0) # prepare QUIC connection if configuration is None: configuration = QuicConfiguration(is_client=True) if server_name is not None: configuration.server_name = server_name connection = QuicConnection( configuration=configuration, session_ticket_handler=session_ticket_handler ) # connect _, protocol = await loop.create_datagram_endpoint( lambda: create_protocol(connection, stream_handler=stream_handler), local_addr=(local_host, 0), ) protocol = cast(QuicConnectionProtocol, protocol) protocol.connect(addr) if wait_connected: await protocol.wait_connected() try: yield protocol finally: protocol.close() await protocol.wait_closed() ===========unchanged ref 0=========== at: _asyncio get_event_loop() at: asyncio.events get_event_loop() -> AbstractEventLoop at: asyncio.events.AbstractEventLoop getaddrinfo(host: Optional[str], port: Union[str, int, None], *, family: int=..., type: int=..., proto: int=..., flags: int=...) -> List[Tuple[AddressFamily, SocketKind, int, str, Union[Tuple[str, int], Tuple[str, int, int, int]]]] create_datagram_endpoint(protocol_factory: _ProtocolFactory, local_addr: Optional[Tuple[str, int]]=..., remote_addr: Optional[Tuple[str, int]]=..., *, family: int=..., proto: int=..., flags: int=..., reuse_address: Optional[bool]=..., reuse_port: Optional[bool]=..., allow_broadcast: Optional[bool]=..., sock: Optional[socket]=...) -> _TransProtPair at: ipaddress ip_address(address: object) -> Any at: socket SOCK_DGRAM: SocketKind at: sys platform: str at: typing cast(typ: Type[_T], val: Any) -> _T cast(typ: str, val: Any) -> Any cast(typ: object, val: Any) -> Any Callable = _CallableType(collections.abc.Callable, 2) AsyncGenerator = _alias(collections.abc.AsyncGenerator, 2) ===========changed ref 0=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_local_port(self): + run(self.run_server()) + response = run(self.run_client(local_port=3456)) + self.assertEqual(response, b"gnip") + ===========changed ref 1=========== # module: examples.http3_client def run( configuration: QuicConfiguration, urls: List[str], data: str, include: bool, output_dir: Optional[str], + local_port: int, ) -> None: # parse URL parsed = urlparse(urls[0]) assert parsed.scheme in ( "https", "wss", ), "Only https:// or wss:// URLs are supported." if ":" in parsed.netloc: host, port_str = parsed.netloc.split(":") port = int(port_str) else: host = parsed.netloc port = 443 async with connect( host, port, configuration=configuration, create_protocol=HttpClient, session_ticket_handler=save_session_ticket, + local_port=local_port, ) as client: client = cast(HttpClient, client) if parsed.scheme == "wss": ws = await client.websocket(urls[0], subprotocols=["chat", "superchat"]) # send some messages and receive reply for i in range(2): message = "Hello {}, WebSocket!".format(i) print("> " + message) await ws.send(message) message = await ws.recv() print("< " + message) await ws.close() else: # perform request coros = [ perform_http_request( client=client, url=url, data=data, include=include, output_dir=output_dir, ) for url in urls ] await asyncio.gather(*coros) ===========changed ref 2=========== # module: examples.http3_client if __name__ == "__main__": defaults = QuicConfiguration(is_client=True) parser = argparse.ArgumentParser(description="HTTP/3 client") parser.add_argument( "url", type=str, nargs="+", help="the URL to query (must be HTTPS)" ) parser.add_argument( "--ca-certs", type=str, help="load CA certificates from the specified file" ) parser.add_argument( "-d", "--data", type=str, help="send the specified data in a POST request" ) parser.add_argument( "-i", "--include", action="store_true", help="include the HTTP response headers in the output", ) parser.add_argument( "--max-data", type=int, help="connection-wide flow control limit (default: %d)" % defaults.max_data, ) parser.add_argument( "--max-stream-data", type=int, help="per-stream flow control limit (default: %d)" % defaults.max_stream_data, ) parser.add_argument( "-k", "--insecure", action="store_true", help="do not validate server certificate", ) parser.add_argument("--legacy-http", action="store_true", help="use HTTP/0.9") parser.add_argument( "--output-dir", type=str, help="write downloaded files to this directory", ) parser.add_argument( "-q", "--quic-log", type=str, help="log QUIC events to a file in QLOG format" ) parser.add_argument( "-l", "--secrets-log", type=str, help="log secrets to a file, for use with Wireshark", ) parser.add_argument( "-s", "--session-ticket", type=str, help="read and write</s>
aioquic.quic.connection/QuicConnection._initialize
Modified
aiortc~aioquic
229c0f1bfb6e663e79532047afcd53f8e1276061
Raise size of crypto buffers for huge certificates (fixes: #89)
# module: aioquic.quic.connection class QuicConnection: def _initialize(self, peer_cid: bytes) -> None: <0> # TLS <1> self.tls = tls.Context( <2> alpn_protocols=self._configuration.alpn_protocols, <3> cadata=self._configuration.cadata, <4> cafile=self._configuration.cafile, <5> capath=self._configuration.capath, <6> is_client=self._is_client, <7> logger=self._logger, <8> max_early_data=None if self._is_client else MAX_EARLY_DATA, <9> server_name=self._configuration.server_name, <10> verify_mode=self._configuration.verify_mode, <11> ) <12> self.tls.certificate = self._configuration.certificate <13> self.tls.certificate_chain = self._configuration.certificate_chain <14> self.tls.certificate_private_key = self._configuration.private_key <15> self.tls.handshake_extensions = [ <16> ( <17> tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, <18> self._serialize_transport_parameters(), <19> ) <20> ] <21> <22> # TLS session resumption <23> session_ticket = self._configuration.session_ticket <24> if ( <25> self._is_client <26> and session_ticket is not None <27> and session_ticket.is_valid <28> and session_ticket.server_name == self._configuration.server_name <29> ): <30> self.tls.session_ticket = self._configuration.session_ticket <31> <32> # parse saved QUIC transport parameters - for 0-RTT <33> if session_ticket.max_early_data_size == MAX_EARLY_DATA: <34> for ext_type, ext_data in session_ticket.other_extensions: <35> if ext_type == tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS: <36> self._parse_transport_parameters( <37> ext_data, from_session_ticket=True <38> ) <39> break <40> </s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _initialize(self, peer_cid: bytes) -> None: # offset: 1 self.tls.alpn_cb = self._alpn_handler if self._session_ticket_fetcher is not None: self.tls.get_session_ticket_cb = self._session_ticket_fetcher if self._session_ticket_handler is not None: self.tls.new_session_ticket_cb = self._handle_session_ticket self.tls.update_traffic_key_cb = self._update_traffic_key # packet spaces self._cryptos = { tls.Epoch.INITIAL: CryptoPair(), tls.Epoch.ZERO_RTT: CryptoPair(), tls.Epoch.HANDSHAKE: CryptoPair(), tls.Epoch.ONE_RTT: CryptoPair(), } self._crypto_buffers = { tls.Epoch.INITIAL: Buffer(capacity=4096), tls.Epoch.HANDSHAKE: Buffer(capacity=4096), tls.Epoch.ONE_RTT: Buffer(capacity=4096), } self._crypto_streams = { tls.Epoch.INITIAL: QuicStream(), tls.Epoch.HANDSHAKE: QuicStream(), tls.Epoch.ONE_RTT: QuicStream(), } self._spaces = { tls.Epoch.INITIAL: QuicPacketSpace(), tls.Epoch.HANDSHAKE: QuicPacketSpace(), tls.Epoch.ONE_RTT: QuicPacketSpace(), } self._cryptos[tls.Epoch.INITIAL].setup_initial( cid=peer_cid, is_client=self._is_client, version=self._version ) self._loss.spaces = list(self._spaces.values()) self._packet_number = 0 ===========unchanged ref 0=========== at: aioquic.quic.connection CRYPTO_BUFFER_SIZE = 16384 MAX_EARLY_DATA = 0xFFFFFFFF at: aioquic.quic.connection.QuicConnection _alpn_handler(alpn_protocol: str) -> None _handle_session_ticket(session_ticket: tls.SessionTicket) -> None _parse_transport_parameters(data: bytes, from_session_ticket: bool=False) -> None _serialize_transport_parameters() -> bytes _update_traffic_key(direction: tls.Direction, epoch: tls.Epoch, cipher_suite: tls.CipherSuite, secret: bytes) -> None at: aioquic.quic.connection.QuicConnection.__init__ self._configuration = configuration self._is_client = configuration.is_client self._cryptos: Dict[tls.Epoch, CryptoPair] = {} self._crypto_buffers: Dict[tls.Epoch, Buffer] = {} self._crypto_streams: Dict[tls.Epoch, QuicStream] = {} self._spaces: Dict[tls.Epoch, QuicPacketSpace] = {} self._version: Optional[int] = None self._logger = QuicConnectionAdapter( logger, {"id": dump_cid(logger_connection_id)} ) self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) self._session_ticket_fetcher = session_ticket_fetcher self._session_ticket_handler = session_ticket_handler at: aioquic.quic.connection.QuicConnection.connect self._version = self._configuration.supported_versions[0] at: aioquic.quic.connection.QuicConnection.receive_datagram self._version = QuicProtocolVersion(header.version) self._version = QuicProtocolVersion(max(common)) ===========changed ref 0=========== # module: aioquic.quic.connection logger = logging.getLogger("quic") + CRYPTO_BUFFER_SIZE = 16384 EPOCH_SHORTCUTS = { "I": tls.Epoch.INITIAL, "H": tls.Epoch.HANDSHAKE, "0": tls.Epoch.ZERO_RTT, "1": tls.Epoch.ONE_RTT, } MAX_EARLY_DATA = 0xFFFFFFFF SECRETS_LABELS = [ [ None, "QUIC_CLIENT_EARLY_TRAFFIC_SECRET", "QUIC_CLIENT_HANDSHAKE_TRAFFIC_SECRET", "QUIC_CLIENT_TRAFFIC_SECRET_0", ], [ None, None, "QUIC_SERVER_HANDSHAKE_TRAFFIC_SECRET", "QUIC_SERVER_TRAFFIC_SECRET_0", ], ] STREAM_FLAGS = 0x07 NetworkAddress = Any # frame sizes ACK_FRAME_CAPACITY = 64 # FIXME: this is arbitrary! APPLICATION_CLOSE_FRAME_CAPACITY = 1 + 8 + 8 # + reason length HANDSHAKE_DONE_FRAME_CAPACITY = 1 MAX_DATA_FRAME_CAPACITY = 1 + 8 MAX_STREAM_DATA_FRAME_CAPACITY = 1 + 8 + 8 NEW_CONNECTION_ID_FRAME_CAPACITY = 1 + 8 + 8 + 1 + 20 + 16 PATH_CHALLENGE_FRAME_CAPACITY = 1 + 8 PATH_RESPONSE_FRAME_CAPACITY = 1 + 8 PING_FRAME_CAPACITY = 1 RETIRE_CONNECTION_ID_CAPACITY = 1 + 8 STREAMS_BLOCKED_CAPACITY = 1 + 8 TRANSPORT_CLOSE_FRAME_CAPACITY = 1 + 8 + 8 + 8 # + reason length
tests.test_tls/TlsTest.test_pull_client_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<11>:<add> hello.legacy_session_id, <del> hello.session_id, <24>:<add> self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) <del> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])
# module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello(self): <0> buf = Buffer(data=load("tls_client_hello.bin")) <1> hello = pull_client_hello(buf) <2> self.assertTrue(buf.eof()) <3> <4> self.assertEqual( <5> hello.random, <6> binascii.unhexlify( <7> "18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5" <8> ), <9> ) <10> self.assertEqual( <11> hello.session_id, <12> binascii.unhexlify( <13> "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" <14> ), <15> ) <16> self.assertEqual( <17> hello.cipher_suites, <18> [ <19> tls.CipherSuite.AES_256_GCM_SHA384, <20> tls.CipherSuite.AES_128_GCM_SHA256, <21> tls.CipherSuite.CHACHA20_POLY1305_SHA256, <22> ], <23> ) <24> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) <25> <26> # extensions <27> self.assertEqual(hello.alpn_protocols, None) <28> self.assertEqual( <29> hello.key_share, <30> [ <31> ( <32> tls.Group.SECP256R1, <33> binascii.unhexlify( <34> "047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8" <35> "93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1</s>
===========below chunk 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello(self): # offset: 1 "b0" ), ) ], ) self.assertEqual( hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE] ) self.assertEqual(hello.server_name, None) self.assertEqual( hello.signature_algorithms, [ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], ) self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1]) self.assertEqual( hello.supported_versions, [ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], ) self.assertEqual( hello.other_extensions, [ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], ) ===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.test_tls CLIENT_QUIC_TRANSPORT_PARAMETERS = binascii.unhexlify( b"ff0000110031000500048010000000060004801000000007000480100000000" b"4000481000000000100024258000800024064000a00010a" ) at: tests.utils load(name) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None
tests.test_tls/TlsTest.test_pull_client_hello_with_alpn
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<10>:<add> self.assertEqual(hello.legacy_session_id, b"") <del> self.assertEqual(hello.session_id, b"") <20>:<add> self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) <del> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])
# module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_alpn(self): <0> buf = Buffer(data=load("tls_client_hello_with_alpn.bin")) <1> hello = pull_client_hello(buf) <2> self.assertTrue(buf.eof()) <3> <4> self.assertEqual( <5> hello.random, <6> binascii.unhexlify( <7> "ed575c6fbd599c4dfaabd003dca6e860ccdb0e1782c1af02e57bf27cb6479b76" <8> ), <9> ) <10> self.assertEqual(hello.session_id, b"") <11> self.assertEqual( <12> hello.cipher_suites, <13> [ <14> tls.CipherSuite.AES_128_GCM_SHA256, <15> tls.CipherSuite.AES_256_GCM_SHA384, <16> tls.CipherSuite.CHACHA20_POLY1305_SHA256, <17> tls.CipherSuite.EMPTY_RENEGOTIATION_INFO_SCSV, <18> ], <19> ) <20> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) <21> <22> # extensions <23> self.assertEqual(hello.alpn_protocols, ["h3-19"]) <24> self.assertEqual(hello.early_data, False) <25> self.assertEqual( <26> hello.key_share, <27> [ <28> ( <29> tls.Group.SECP256R1, <30> binascii.unhexlify( <31> "048842315c437bb0ce2929c816fee4e942ec5cb6db6a6b9bf622680188ebb0d4" <32> "b652e69033f71686aa01cbc79155866e264c9f33f45aa16b0dfa10a222e3a669" <33> "22" <34> ), </s>
===========below chunk 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_alpn(self): # offset: 1 ], ) self.assertEqual( hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE] ) self.assertEqual(hello.server_name, "cloudflare-quic.com") self.assertEqual( hello.signature_algorithms, [ tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.ECDSA_SECP384R1_SHA384, tls.SignatureAlgorithm.ECDSA_SECP521R1_SHA512, tls.SignatureAlgorithm.ED25519, tls.SignatureAlgorithm.ED448, tls.SignatureAlgorithm.RSA_PSS_PSS_SHA256, tls.SignatureAlgorithm.RSA_PSS_PSS_SHA384, tls.SignatureAlgorithm.RSA_PSS_PSS_SHA512, tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA384, tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA512, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA384, tls.SignatureAlgorithm.RSA_PKCS1_SHA512, ], ) self.assertEqual( hello.supported_groups, [ tls.Group.SECP256R1, tls.Group.X25519, tls.Group.SECP384R1, tls.Group.SECP521R1, ], ) self.assertEqual(hello.supported_versions, [tls.TLS_VERSION_1_3]) # serialize buf = Buffer(1000) push_client_hello(buf, hello) self.assertEqual(len(buf.data), len(load("tls_client_hello_</s> ===========below chunk 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_alpn(self): # offset: 2 <s>_hello(buf, hello) self.assertEqual(len(buf.data), len(load("tls_client_hello_with_alpn.bin"))) ===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello(self): buf = Buffer(data=load("tls_client_hello.bin")) hello = pull_client_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), ) self.assertEqual( hello.cipher_suites, [ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], ) + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) # extensions self.assertEqual(hello.alpn_protocols, None) self.assertEqual( hello.key_share, [ ( tls.Group.SECP256R1, binascii.unhexlify( "047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8" "93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a</s> ===========changed ref 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello(self): # offset: 1 <s>73d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15" "b0" ), ) ], ) self.assertEqual( hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE] ) self.assertEqual(hello.server_name, None) self.assertEqual( hello.signature_algorithms, [ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], ) self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1]) self.assertEqual( hello.supported_versions, [ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], ) self.assertEqual( hello.other_extensions, [ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], )
tests.test_tls/TlsTest.test_pull_client_hello_with_sni
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<11>:<add> hello.legacy_session_id, <del> hello.session_id, <24>:<add> self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) <del> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL])
# module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_sni(self): <0> buf = Buffer(data=load("tls_client_hello_with_sni.bin")) <1> hello = pull_client_hello(buf) <2> self.assertTrue(buf.eof()) <3> <4> self.assertEqual( <5> hello.random, <6> binascii.unhexlify( <7> "987d8934140b0a42cc5545071f3f9f7f61963d7b6404eb674c8dbe513604346b" <8> ), <9> ) <10> self.assertEqual( <11> hello.session_id, <12> binascii.unhexlify( <13> "26b19bdd30dbf751015a3a16e13bd59002dfe420b799d2a5cd5e11b8fa7bcb66" <14> ), <15> ) <16> self.assertEqual( <17> hello.cipher_suites, <18> [ <19> tls.CipherSuite.AES_256_GCM_SHA384, <20> tls.CipherSuite.AES_128_GCM_SHA256, <21> tls.CipherSuite.CHACHA20_POLY1305_SHA256, <22> ], <23> ) <24> self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) <25> <26> # extensions <27> self.assertEqual(hello.alpn_protocols, None) <28> self.assertEqual( <29> hello.key_share, <30> [ <31> ( <32> tls.Group.SECP256R1, <33> binascii.unhexlify( <34> "04b62d70f907c814cd65d0f73b8b991f06b70c77153f548410a191d2b19764a2" <35> "ecc06065a480efa9e1f10c8da6e737d5bfc04be3f</s>
===========below chunk 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_sni(self): # offset: 1 "40" ), ) ], ) self.assertEqual( hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE] ) self.assertEqual(hello.server_name, "cloudflare-quic.com") self.assertEqual( hello.signature_algorithms, [ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], ) self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1]) self.assertEqual( hello.supported_versions, [ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], ) self.assertEqual( hello.other_extensions, [ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], ) # serialize buf = Buffer(1000) push_client_hello(buf, hello) self.assertEqual(buf.data, load("tls_client_hello_with_sni.bin")) ===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.test_tls CLIENT_QUIC_TRANSPORT_PARAMETERS = binascii.unhexlify( b"ff0000110031000500048010000000060004801000000007000480100000000" b"4000481000000000100024258000800024064000a00010a" ) at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello(self): buf = Buffer(data=load("tls_client_hello.bin")) hello = pull_client_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), ) self.assertEqual( hello.cipher_suites, [ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], ) + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) # extensions self.assertEqual(hello.alpn_protocols, None) self.assertEqual( hello.key_share, [ ( tls.Group.SECP256R1, binascii.unhexlify( "047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8" "93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a</s> ===========changed ref 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello(self): # offset: 1 <s>73d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15" "b0" ), ) ], ) self.assertEqual( hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE] ) self.assertEqual(hello.server_name, None) self.assertEqual( hello.signature_algorithms, [ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], ) self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1]) self.assertEqual( hello.supported_versions, [ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], ) self.assertEqual( hello.other_extensions, [ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], )
tests.test_tls/TlsTest.test_push_client_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<4>:<add> legacy_session_id=binascii.unhexlify( <del> session_id=binascii.unhexlify( <12>:<add> legacy_compression_methods=[tls.CompressionMethod.NULL], <del> compression_methods=[tls.CompressionMethod.NULL],
# module: tests.test_tls class TlsTest(TestCase): def test_push_client_hello(self): <0> hello = ClientHello( <1> random=binascii.unhexlify( <2> "18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5" <3> ), <4> session_id=binascii.unhexlify( <5> "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" <6> ), <7> cipher_suites=[ <8> tls.CipherSuite.AES_256_GCM_SHA384, <9> tls.CipherSuite.AES_128_GCM_SHA256, <10> tls.CipherSuite.CHACHA20_POLY1305_SHA256, <11> ], <12> compression_methods=[tls.CompressionMethod.NULL], <13> key_share=[ <14> ( <15> tls.Group.SECP256R1, <16> binascii.unhexlify( <17> "047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8" <18> "93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15" <19> "b0" <20> ), <21> ) <22> ], <23> psk_key_exchange_modes=[tls.PskKeyExchangeMode.PSK_DHE_KE], <24> signature_algorithms=[ <25> tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, <26> tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, <27> tls.SignatureAlgorithm.RSA_PKCS1_SHA256, <28> tls.SignatureAlgorithm.RSA_PKCS1_SHA1, <29> </s>
===========below chunk 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_push_client_hello(self): # offset: 1 supported_groups=[tls.Group.SECP256R1], supported_versions=[ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], other_extensions=[ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], ) buf = Buffer(1000) push_client_hello(buf, hello) self.assertEqual(buf.data, load("tls_client_hello.bin")) ===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.test_tls CLIENT_QUIC_TRANSPORT_PARAMETERS = binascii.unhexlify( b"ff0000110031000500048010000000060004801000000007000480100000000" b"4000481000000000100024258000800024064000a00010a" ) at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_sni(self): buf = Buffer(data=load("tls_client_hello_with_sni.bin")) hello = pull_client_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "987d8934140b0a42cc5545071f3f9f7f61963d7b6404eb674c8dbe513604346b" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "26b19bdd30dbf751015a3a16e13bd59002dfe420b799d2a5cd5e11b8fa7bcb66" ), ) self.assertEqual( hello.cipher_suites, [ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], ) + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) # extensions self.assertEqual(hello.alpn_protocols, None) self.assertEqual( hello.key_share, [ ( tls.Group.SECP256R1, binascii.unhexlify( "04b62d70f907c814cd65d0f73b8b991f06b70c77153f548410a191d2b19764a2" "ecc06065a480efa9e1f10c8da6e737d5bfc04be3</s> ===========changed ref 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_sni(self): # offset: 1 <s> "ecc06065a480efa9e1f10c8da6e737d5bfc04be3f773e20a0c997f51b5621280" "40" ), ) ], ) self.assertEqual( hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE] ) self.assertEqual(hello.server_name, "cloudflare-quic.com") self.assertEqual( hello.signature_algorithms, [ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], ) self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1]) self.assertEqual( hello.supported_versions, [ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], ) self.assertEqual( hello.other_extensions, [ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], ) # serialize buf = Buffer(1000) push_client_hello(buf, hello) self.assertEqual(buf.data, load("tls_client_hello_ ===========changed ref 2=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello(self): buf = Buffer(data=load("tls_client_hello.bin")) hello = pull_client_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), ) self.assertEqual( hello.cipher_suites, [ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], ) + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) # extensions self.assertEqual(hello.alpn_protocols, None) self.assertEqual( hello.key_share, [ ( tls.Group.SECP256R1, binascii.unhexlify( "047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8" "93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a</s>
tests.test_tls/TlsTest.test_pull_server_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<11>:<add> hello.legacy_session_id, <del> hello.session_id,
# module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello(self): <0> buf = Buffer(data=load("tls_server_hello.bin")) <1> hello = pull_server_hello(buf) <2> self.assertTrue(buf.eof()) <3> <4> self.assertEqual( <5> hello.random, <6> binascii.unhexlify( <7> "ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280" <8> ), <9> ) <10> self.assertEqual( <11> hello.session_id, <12> binascii.unhexlify( <13> "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" <14> ), <15> ) <16> self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384) <17> self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL) <18> self.assertEqual( <19> hello.key_share, <20> ( <21> tls.Group.SECP256R1, <22> binascii.unhexlify( <23> "048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189" <24> "5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf" <25> "b2" <26> ), <27> ), <28> ) <29> self.assertEqual(hello.pre_shared_key, None) <30> self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3) <31>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_push_client_hello(self): hello = ClientHello( random=binascii.unhexlify( "18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5" ), + legacy_session_id=binascii.unhexlify( - session_id=binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), cipher_suites=[ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], + legacy_compression_methods=[tls.CompressionMethod.NULL], - compression_methods=[tls.CompressionMethod.NULL], key_share=[ ( tls.Group.SECP256R1, binascii.unhexlify( "047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8" "93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15" "b0" ), ) ], psk_key_exchange_modes=[tls.PskKeyExchangeMode.PSK_DHE_KE], signature_algorithms=[ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_</s> ===========changed ref 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_push_client_hello(self): # offset: 1 <s>SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], supported_groups=[tls.Group.SECP256R1], supported_versions=[ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], other_extensions=[ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], ) buf = Buffer(1000) push_client_hello(buf, hello) self.assertEqual(buf.data, load("tls_client_hello.bin")) ===========changed ref 2=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_sni(self): buf = Buffer(data=load("tls_client_hello_with_sni.bin")) hello = pull_client_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "987d8934140b0a42cc5545071f3f9f7f61963d7b6404eb674c8dbe513604346b" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "26b19bdd30dbf751015a3a16e13bd59002dfe420b799d2a5cd5e11b8fa7bcb66" ), ) self.assertEqual( hello.cipher_suites, [ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], ) + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) # extensions self.assertEqual(hello.alpn_protocols, None) self.assertEqual( hello.key_share, [ ( tls.Group.SECP256R1, binascii.unhexlify( "04b62d70f907c814cd65d0f73b8b991f06b70c77153f548410a191d2b19764a2" "ecc06065a480efa9e1f10c8da6e737d5bfc04be3</s> ===========changed ref 3=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_sni(self): # offset: 1 <s> "ecc06065a480efa9e1f10c8da6e737d5bfc04be3f773e20a0c997f51b5621280" "40" ), ) ], ) self.assertEqual( hello.psk_key_exchange_modes, [tls.PskKeyExchangeMode.PSK_DHE_KE] ) self.assertEqual(hello.server_name, "cloudflare-quic.com") self.assertEqual( hello.signature_algorithms, [ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], ) self.assertEqual(hello.supported_groups, [tls.Group.SECP256R1]) self.assertEqual( hello.supported_versions, [ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], ) self.assertEqual( hello.other_extensions, [ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], ) # serialize buf = Buffer(1000) push_client_hello(buf, hello) self.assertEqual(buf.data, load("tls_client_hello_
tests.test_tls/TlsTest.test_pull_server_hello_with_psk
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<11>:<add> hello.legacy_session_id, <del> hello.session_id,
# module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello_with_psk(self): <0> buf = Buffer(data=load("tls_server_hello_with_psk.bin")) <1> hello = pull_server_hello(buf) <2> self.assertTrue(buf.eof()) <3> <4> self.assertEqual( <5> hello.random, <6> binascii.unhexlify( <7> "ccbaaf04fc1bd5143b2cc6b97520cf37d91470dbfc8127131a7bf0f941e3a137" <8> ), <9> ) <10> self.assertEqual( <11> hello.session_id, <12> binascii.unhexlify( <13> "9483e7e895d0f4cec17086b0849601c0632662cd764e828f2f892f4c4b7771b0" <14> ), <15> ) <16> self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384) <17> self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL) <18> self.assertEqual( <19> hello.key_share, <20> ( <21> tls.Group.SECP256R1, <22> binascii.unhexlify( <23> "0485d7cecbebfc548fc657bf51b8e8da842a4056b164a27f7702ca318c16e488" <24> "18b6409593b15c6649d6f459387a53128b164178adc840179aad01d36ce95d62" <25> "76" <26> ), <27> ), <28> ) <29> self.assertEqual(hello.pre_shared_key, 0) <30> self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3) <31> <32> # serialize <33> buf = Buffer(1000) </s>
===========below chunk 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello_with_psk(self): # offset: 1 self.assertEqual(buf.data, load("tls_server_hello_with_psk.bin")) ===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello(self): buf = Buffer(data=load("tls_server_hello.bin")) hello = pull_server_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), ) self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384) self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL) self.assertEqual( hello.key_share, ( tls.Group.SECP256R1, binascii.unhexlify( "048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189" "5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf" "b2" ), ), ) self.assertEqual(hello.pre_shared_key, None) self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3) ===========changed ref 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_push_client_hello(self): hello = ClientHello( random=binascii.unhexlify( "18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5" ), + legacy_session_id=binascii.unhexlify( - session_id=binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), cipher_suites=[ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], + legacy_compression_methods=[tls.CompressionMethod.NULL], - compression_methods=[tls.CompressionMethod.NULL], key_share=[ ( tls.Group.SECP256R1, binascii.unhexlify( "047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8" "93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15" "b0" ), ) ], psk_key_exchange_modes=[tls.PskKeyExchangeMode.PSK_DHE_KE], signature_algorithms=[ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_</s> ===========changed ref 2=========== # module: tests.test_tls class TlsTest(TestCase): def test_push_client_hello(self): # offset: 1 <s>SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], supported_groups=[tls.Group.SECP256R1], supported_versions=[ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], other_extensions=[ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], ) buf = Buffer(1000) push_client_hello(buf, hello) self.assertEqual(buf.data, load("tls_client_hello.bin")) ===========changed ref 3=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_client_hello_with_sni(self): buf = Buffer(data=load("tls_client_hello_with_sni.bin")) hello = pull_client_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "987d8934140b0a42cc5545071f3f9f7f61963d7b6404eb674c8dbe513604346b" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "26b19bdd30dbf751015a3a16e13bd59002dfe420b799d2a5cd5e11b8fa7bcb66" ), ) self.assertEqual( hello.cipher_suites, [ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], ) + self.assertEqual(hello.legacy_compression_methods, [tls.CompressionMethod.NULL]) - self.assertEqual(hello.compression_methods, [tls.CompressionMethod.NULL]) # extensions self.assertEqual(hello.alpn_protocols, None) self.assertEqual( hello.key_share, [ ( tls.Group.SECP256R1, binascii.unhexlify( "04b62d70f907c814cd65d0f73b8b991f06b70c77153f548410a191d2b19764a2" "ecc06065a480efa9e1f10c8da6e737d5bfc04be3</s>
tests.test_tls/TlsTest.test_pull_server_hello_with_unknown_extension
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<10>:<add> legacy_session_id=binascii.unhexlify( <del> session_id=binascii.unhexlify(
# module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello_with_unknown_extension(self): <0> buf = Buffer(data=load("tls_server_hello_with_unknown_extension.bin")) <1> hello = pull_server_hello(buf) <2> self.assertTrue(buf.eof()) <3> <4> self.assertEqual( <5> hello, <6> ServerHello( <7> random=binascii.unhexlify( <8> "ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280" <9> ), <10> session_id=binascii.unhexlify( <11> "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" <12> ), <13> cipher_suite=tls.CipherSuite.AES_256_GCM_SHA384, <14> compression_method=tls.CompressionMethod.NULL, <15> key_share=( <16> tls.Group.SECP256R1, <17> binascii.unhexlify( <18> "048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189" <19> "5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf" <20> "b2" <21> ), <22> ), <23> supported_version=tls.TLS_VERSION_1_3, <24> other_extensions=[(12345, b"foo")], <25> ), <26> ) <27> <28> # serialize <29> buf = Buffer(1000) <30> push_server_hello(buf, hello) <31> self.assertEqual(buf.data, load("tls_server_hello_with_unknown_extension.bin"))</s>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello(self): buf = Buffer(data=load("tls_server_hello.bin")) hello = pull_server_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), ) self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384) self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL) self.assertEqual( hello.key_share, ( tls.Group.SECP256R1, binascii.unhexlify( "048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189" "5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf" "b2" ), ), ) self.assertEqual(hello.pre_shared_key, None) self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3) ===========changed ref 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello_with_psk(self): buf = Buffer(data=load("tls_server_hello_with_psk.bin")) hello = pull_server_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "ccbaaf04fc1bd5143b2cc6b97520cf37d91470dbfc8127131a7bf0f941e3a137" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "9483e7e895d0f4cec17086b0849601c0632662cd764e828f2f892f4c4b7771b0" ), ) self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384) self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL) self.assertEqual( hello.key_share, ( tls.Group.SECP256R1, binascii.unhexlify( "0485d7cecbebfc548fc657bf51b8e8da842a4056b164a27f7702ca318c16e488" "18b6409593b15c6649d6f459387a53128b164178adc840179aad01d36ce95d62" "76" ), ), ) self.assertEqual(hello.pre_shared_key, 0) self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3) # serialize buf = Buffer(1000) push_server_hello(buf, hello) self.assertEqual(buf.data,</s> ===========changed ref 2=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello_with_psk(self): # offset: 1 <s> buf = Buffer(1000) push_server_hello(buf, hello) self.assertEqual(buf.data, load("tls_server_hello_with_psk.bin")) ===========changed ref 3=========== # module: tests.test_tls class TlsTest(TestCase): def test_push_client_hello(self): hello = ClientHello( random=binascii.unhexlify( "18b2b23bf3e44b5d52ccfe7aecbc5ff14eadc3d349fabf804d71f165ae76e7d5" ), + legacy_session_id=binascii.unhexlify( - session_id=binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), cipher_suites=[ tls.CipherSuite.AES_256_GCM_SHA384, tls.CipherSuite.AES_128_GCM_SHA256, tls.CipherSuite.CHACHA20_POLY1305_SHA256, ], + legacy_compression_methods=[tls.CompressionMethod.NULL], - compression_methods=[tls.CompressionMethod.NULL], key_share=[ ( tls.Group.SECP256R1, binascii.unhexlify( "047bfea344467535054263b75def60cffa82405a211b68d1eb8d1d944e67aef8" "93c7665a5473d032cfaf22a73da28eb4aacae0017ed12557b5791f98a1e84f15" "b0" ), ) ], psk_key_exchange_modes=[tls.PskKeyExchangeMode.PSK_DHE_KE], signature_algorithms=[ tls.SignatureAlgorithm.RSA_PSS_RSAE_SHA256, tls.SignatureAlgorithm.ECDSA_SECP256R1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_</s> ===========changed ref 4=========== # module: tests.test_tls class TlsTest(TestCase): def test_push_client_hello(self): # offset: 1 <s>SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA256, tls.SignatureAlgorithm.RSA_PKCS1_SHA1, ], supported_groups=[tls.Group.SECP256R1], supported_versions=[ tls.TLS_VERSION_1_3, tls.TLS_VERSION_1_3_DRAFT_28, tls.TLS_VERSION_1_3_DRAFT_27, tls.TLS_VERSION_1_3_DRAFT_26, ], other_extensions=[ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, CLIENT_QUIC_TRANSPORT_PARAMETERS, ) ], ) buf = Buffer(1000) push_client_hello(buf, hello) self.assertEqual(buf.data, load("tls_client_hello.bin"))
tests.test_tls/TlsTest.test_push_server_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<4>:<add> legacy_session_id=binascii.unhexlify( <del> session_id=binascii.unhexlify(
# module: tests.test_tls class TlsTest(TestCase): def test_push_server_hello(self): <0> hello = ServerHello( <1> random=binascii.unhexlify( <2> "ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280" <3> ), <4> session_id=binascii.unhexlify( <5> "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" <6> ), <7> cipher_suite=tls.CipherSuite.AES_256_GCM_SHA384, <8> compression_method=tls.CompressionMethod.NULL, <9> key_share=( <10> tls.Group.SECP256R1, <11> binascii.unhexlify( <12> "048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189" <13> "5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf" <14> "b2" <15> ), <16> ), <17> supported_version=tls.TLS_VERSION_1_3, <18> ) <19> <20> buf = Buffer(1000) <21> push_server_hello(buf, hello) <22> self.assertEqual(buf.data, load("tls_server_hello.bin")) <23>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello_with_unknown_extension(self): buf = Buffer(data=load("tls_server_hello_with_unknown_extension.bin")) hello = pull_server_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello, ServerHello( random=binascii.unhexlify( "ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280" ), + legacy_session_id=binascii.unhexlify( - session_id=binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), cipher_suite=tls.CipherSuite.AES_256_GCM_SHA384, compression_method=tls.CompressionMethod.NULL, key_share=( tls.Group.SECP256R1, binascii.unhexlify( "048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189" "5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf" "b2" ), ), supported_version=tls.TLS_VERSION_1_3, other_extensions=[(12345, b"foo")], ), ) # serialize buf = Buffer(1000) push_server_hello(buf, hello) self.assertEqual(buf.data, load("tls_server_hello_with_unknown_extension.bin")) ===========changed ref 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello(self): buf = Buffer(data=load("tls_server_hello.bin")) hello = pull_server_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), ) self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384) self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL) self.assertEqual( hello.key_share, ( tls.Group.SECP256R1, binascii.unhexlify( "048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189" "5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf" "b2" ), ), ) self.assertEqual(hello.pre_shared_key, None) self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3) ===========changed ref 2=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello_with_psk(self): buf = Buffer(data=load("tls_server_hello_with_psk.bin")) hello = pull_server_hello(buf) self.assertTrue(buf.eof()) self.assertEqual( hello.random, binascii.unhexlify( "ccbaaf04fc1bd5143b2cc6b97520cf37d91470dbfc8127131a7bf0f941e3a137" ), ) self.assertEqual( + hello.legacy_session_id, - hello.session_id, binascii.unhexlify( "9483e7e895d0f4cec17086b0849601c0632662cd764e828f2f892f4c4b7771b0" ), ) self.assertEqual(hello.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384) self.assertEqual(hello.compression_method, tls.CompressionMethod.NULL) self.assertEqual( hello.key_share, ( tls.Group.SECP256R1, binascii.unhexlify( "0485d7cecbebfc548fc657bf51b8e8da842a4056b164a27f7702ca318c16e488" "18b6409593b15c6649d6f459387a53128b164178adc840179aad01d36ce95d62" "76" ), ), ) self.assertEqual(hello.pre_shared_key, 0) self.assertEqual(hello.supported_version, tls.TLS_VERSION_1_3) # serialize buf = Buffer(1000) push_server_hello(buf, hello) self.assertEqual(buf.data,</s> ===========changed ref 3=========== # module: tests.test_tls class TlsTest(TestCase): def test_pull_server_hello_with_psk(self): # offset: 1 <s> buf = Buffer(1000) push_server_hello(buf, hello) self.assertEqual(buf.data, load("tls_server_hello_with_psk.bin"))
aioquic.tls/pull_client_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<3>:<del> client_random = buf.pull_bytes(32) <6>:<add> random=buf.pull_bytes(32), <del> random=client_random, <7>:<add> legacy_session_id=pull_opaque(buf, 1), <del> session_id=pull_opaque(buf, 1), <9>:<add> legacy_compression_methods=pull_list(buf, 1, buf.pull_uint8), <del> compression_methods=pull_list(buf, 1, buf.pull_uint8),
# module: aioquic.tls def pull_client_hello(buf: Buffer) -> ClientHello: <0> assert buf.pull_uint8() == HandshakeType.CLIENT_HELLO <1> with pull_block(buf, 3): <2> assert buf.pull_uint16() == TLS_VERSION_1_2 <3> client_random = buf.pull_bytes(32) <4> <5> hello = ClientHello( <6> random=client_random, <7> session_id=pull_opaque(buf, 1), <8> cipher_suites=pull_list(buf, 2, buf.pull_uint16), <9> compression_methods=pull_list(buf, 1, buf.pull_uint8), <10> ) <11> <12> # extensions <13> after_psk = False <14> <15> def pull_extension() -> None: <16> # pre_shared_key MUST be last <17> nonlocal after_psk <18> assert not after_psk <19> <20> extension_type = buf.pull_uint16() <21> extension_length = buf.pull_uint16() <22> if extension_type == ExtensionType.KEY_SHARE: <23> hello.key_share = pull_list(buf, 2, partial(pull_key_share, buf)) <24> elif extension_type == ExtensionType.SUPPORTED_VERSIONS: <25> hello.supported_versions = pull_list(buf, 1, buf.pull_uint16) <26> elif extension_type == ExtensionType.SIGNATURE_ALGORITHMS: <27> hello.signature_algorithms = pull_list(buf, 2, buf.pull_uint16) <28> elif extension_type == ExtensionType.SUPPORTED_GROUPS: <29> hello.supported_groups = pull_list(buf, 2, buf.pull_uint16) <30> elif extension_type == ExtensionType.PSK_KEY_EXCHANGE_MODES: <31> hello.psk_key_exchange_modes = pull_list(buf, 1, buf.pull_uint8) <32> elif extension_type == ExtensionType.SERVER_NAME: <33> with pull_block(buf, 2): <34> assert buf.pull</s>
===========below chunk 0=========== # module: aioquic.tls def pull_client_hello(buf: Buffer) -> ClientHello: # offset: 1 hello.server_name = pull_opaque(buf, 2).decode("ascii") elif extension_type == ExtensionType.ALPN: hello.alpn_protocols = pull_list( buf, 2, partial(pull_alpn_protocol, buf) ) elif extension_type == ExtensionType.EARLY_DATA: hello.early_data = True elif extension_type == ExtensionType.PRE_SHARED_KEY: hello.pre_shared_key = OfferedPsks( identities=pull_list(buf, 2, partial(pull_psk_identity, buf)), binders=pull_list(buf, 2, partial(pull_psk_binder, buf)), ) after_psk = True else: hello.other_extensions.append( (extension_type, buf.pull_bytes(extension_length)) ) pull_list(buf, 2, pull_extension) return hello ===========unchanged ref 0=========== at: aioquic.tls TLS_VERSION_1_2 = 0x0303 ExtensionType(x: Union[str, bytes, bytearray], base: int) ExtensionType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) HandshakeType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) HandshakeType(x: Union[str, bytes, bytearray], base: int) pull_block(buf: Buffer, capacity: int) -> Generator pull_list(buf: Buffer, capacity: int, func: Callable[[], T]) -> List[T] pull_opaque(buf: Buffer, capacity: int) -> bytes pull_key_share(buf: Buffer) -> KeyShareEntry pull_alpn_protocol(buf: Buffer) -> str pull_psk_identity(buf: Buffer) -> PskIdentity pull_psk_binder(buf: Buffer) -> bytes OfferedPsks(identities: List[PskIdentity], binders: List[bytes]) ClientHello(random: bytes, legacy_session_id: bytes, cipher_suites: List[int], legacy_compression_methods: List[int], alpn_protocols: Optional[List[str]]=None, early_data: bool=False, key_share: Optional[List[KeyShareEntry]]=None, pre_shared_key: Optional[OfferedPsks]=None, psk_key_exchange_modes: Optional[List[int]]=None, server_name: Optional[str]=None, signature_algorithms: Optional[List[int]]=None, supported_groups: Optional[List[int]]=None, supported_versions: Optional[List[int]]=None, other_extensions: List[Extension]=field(default_factory=list)) at: aioquic.tls.ClientHello random: bytes legacy_session_id: bytes cipher_suites: List[int] legacy_compression_methods: List[int] ===========unchanged ref 1=========== alpn_protocols: Optional[List[str]] = None early_data: bool = False key_share: Optional[List[KeyShareEntry]] = None pre_shared_key: Optional[OfferedPsks] = None psk_key_exchange_modes: Optional[List[int]] = None server_name: Optional[str] = None signature_algorithms: Optional[List[int]] = None supported_groups: Optional[List[int]] = None supported_versions: Optional[List[int]] = None other_extensions: List[Extension] = field(default_factory=list) at: aioquic.tls.OfferedPsks identities: List[PskIdentity] binders: List[bytes] at: functools partial(func: Callable[..., _T], *args: Any, **kwargs: Any) partial(func, *args, **keywords, /) -> function with partial application() ===========changed ref 0=========== # module: aioquic.tls @dataclass class ClientHello: random: bytes + legacy_session_id: bytes - session_id: bytes cipher_suites: List[int] + legacy_compression_methods: List[int] - compression_methods: List[int] # extensions alpn_protocols: Optional[List[str]] = None early_data: bool = False key_share: Optional[List[KeyShareEntry]] = None pre_shared_key: Optional[OfferedPsks] = None psk_key_exchange_modes: Optional[List[int]] = None server_name: Optional[str] = None signature_algorithms: Optional[List[int]] = None supported_groups: Optional[List[int]] = None supported_versions: Optional[List[int]] = None other_extensions: List[Extension] = field(default_factory=list) ===========changed ref 1=========== # module: tests.test_tls class TlsTest(TestCase): def test_push_server_hello(self): hello = ServerHello( random=binascii.unhexlify( "ada85271d19680c615ea7336519e3fdf6f1e26f3b1075ee1de96ffa8884e8280" ), + legacy_session_id=binascii.unhexlify( - session_id=binascii.unhexlify( "9aee82a2d186c1cb32a329d9dcfe004a1a438ad0485a53c6bfcf55c132a23235" ), cipher_suite=tls.CipherSuite.AES_256_GCM_SHA384, compression_method=tls.CompressionMethod.NULL, key_share=( tls.Group.SECP256R1, binascii.unhexlify( "048b27d0282242d84b7fcc02a9c4f13eca0329e3c7029aa34a33794e6e7ba189" "5cca1c503bf0378ac6937c354912116ff3251026bca1958d7f387316c83ae6cf" "b2" ), ), supported_version=tls.TLS_VERSION_1_3, ) buf = Buffer(1000) push_server_hello(buf, hello) self.assertEqual(buf.data, load("tls_server_hello.bin"))
aioquic.tls/push_client_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<4>:<add> push_opaque(buf, 1, hello.legacy_session_id) <del> push_opaque(buf, 1, hello.session_id) <6>:<add> push_list(buf, 1, buf.push_uint8, hello.legacy_compression_methods) <del> push_list(buf, 1, buf.push_uint8, hello.compression_methods)
# module: aioquic.tls def push_client_hello(buf: Buffer, hello: ClientHello) -> None: <0> buf.push_uint8(HandshakeType.CLIENT_HELLO) <1> with push_block(buf, 3): <2> buf.push_uint16(TLS_VERSION_1_2) <3> buf.push_bytes(hello.random) <4> push_opaque(buf, 1, hello.session_id) <5> push_list(buf, 2, buf.push_uint16, hello.cipher_suites) <6> push_list(buf, 1, buf.push_uint8, hello.compression_methods) <7> <8> # extensions <9> with push_block(buf, 2): <10> with push_extension(buf, ExtensionType.KEY_SHARE): <11> push_list(buf, 2, partial(push_key_share, buf), hello.key_share) <12> <13> with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS): <14> push_list(buf, 1, buf.push_uint16, hello.supported_versions) <15> <16> with push_extension(buf, ExtensionType.SIGNATURE_ALGORITHMS): <17> push_list(buf, 2, buf.push_uint16, hello.signature_algorithms) <18> <19> with push_extension(buf, ExtensionType.SUPPORTED_GROUPS): <20> push_list(buf, 2, buf.push_uint16, hello.supported_groups) <21> <22> if hello.psk_key_exchange_modes is not None: <23> with push_extension(buf, ExtensionType.PSK_KEY_EXCHANGE_MODES): <24> push_list(buf, 1, buf.push_uint8, hello.psk_key_exchange_modes) <25> <26> if hello.server_name is not None: <27> with push_extension(buf, ExtensionType.SERVER_NAME): <28> with push_block(buf, 2): <29> buf.push_uint8(0) <30> push_opaque(buf, 2, hello.server_name.encode("ascii")) <31> <32> if</s>
===========below chunk 0=========== # module: aioquic.tls def push_client_hello(buf: Buffer, hello: ClientHello) -> None: # offset: 1 with push_extension(buf, ExtensionType.ALPN): push_list( buf, 2, partial(push_alpn_protocol, buf), hello.alpn_protocols ) for extension_type, extension_value in hello.other_extensions: with push_extension(buf, extension_type): buf.push_bytes(extension_value) if hello.early_data: with push_extension(buf, ExtensionType.EARLY_DATA): pass # pre_shared_key MUST be last if hello.pre_shared_key is not None: with push_extension(buf, ExtensionType.PRE_SHARED_KEY): push_list( buf, 2, partial(push_psk_identity, buf), hello.pre_shared_key.identities, ) push_list( buf, 2, partial(push_psk_binder, buf), hello.pre_shared_key.binders, ) ===========unchanged ref 0=========== at: aioquic.tls TLS_VERSION_1_2 = 0x0303 ExtensionType(x: Union[str, bytes, bytearray], base: int) ExtensionType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) HandshakeType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) HandshakeType(x: Union[str, bytes, bytearray], base: int) push_block(buf: Buffer, capacity: int) -> Generator push_list(buf: Buffer, capacity: int, func: Callable[[T], None], values: Sequence[T]) -> None push_opaque(buf: Buffer, capacity: int, value: bytes) -> None push_extension(buf: Buffer, extension_type: int) -> Generator push_key_share(buf: Buffer, value: KeyShareEntry) -> None push_alpn_protocol(buf: Buffer, protocol: str) -> None push_psk_identity(buf: Buffer, entry: PskIdentity) -> None push_psk_binder(buf: Buffer, binder: bytes) -> None at: aioquic.tls.ClientHello random: bytes legacy_session_id: bytes cipher_suites: List[int] legacy_compression_methods: List[int] alpn_protocols: Optional[List[str]] = None early_data: bool = False key_share: Optional[List[KeyShareEntry]] = None pre_shared_key: Optional[OfferedPsks] = None psk_key_exchange_modes: Optional[List[int]] = None server_name: Optional[str] = None signature_algorithms: Optional[List[int]] = None supported_groups: Optional[List[int]] = None supported_versions: Optional[List[int]] = None other_extensions: List[Extension] = field(default_factory=list) ===========unchanged ref 1=========== at: aioquic.tls.OfferedPsks identities: List[PskIdentity] binders: List[bytes] at: functools partial(func: Callable[..., _T], *args: Any, **kwargs: Any) partial(func, *args, **keywords, /) -> function with partial application() ===========changed ref 0=========== # module: aioquic.tls @dataclass class ClientHello: random: bytes + legacy_session_id: bytes - session_id: bytes cipher_suites: List[int] + legacy_compression_methods: List[int] - compression_methods: List[int] # extensions alpn_protocols: Optional[List[str]] = None early_data: bool = False key_share: Optional[List[KeyShareEntry]] = None pre_shared_key: Optional[OfferedPsks] = None psk_key_exchange_modes: Optional[List[int]] = None server_name: Optional[str] = None signature_algorithms: Optional[List[int]] = None supported_groups: Optional[List[int]] = None supported_versions: Optional[List[int]] = None other_extensions: List[Extension] = field(default_factory=list) ===========changed ref 1=========== # module: aioquic.tls def pull_client_hello(buf: Buffer) -> ClientHello: assert buf.pull_uint8() == HandshakeType.CLIENT_HELLO with pull_block(buf, 3): assert buf.pull_uint16() == TLS_VERSION_1_2 - client_random = buf.pull_bytes(32) hello = ClientHello( + random=buf.pull_bytes(32), - random=client_random, + legacy_session_id=pull_opaque(buf, 1), - session_id=pull_opaque(buf, 1), cipher_suites=pull_list(buf, 2, buf.pull_uint16), + legacy_compression_methods=pull_list(buf, 1, buf.pull_uint8), - compression_methods=pull_list(buf, 1, buf.pull_uint8), ) # extensions after_psk = False def pull_extension() -> None: # pre_shared_key MUST be last nonlocal after_psk assert not after_psk extension_type = buf.pull_uint16() extension_length = buf.pull_uint16() if extension_type == ExtensionType.KEY_SHARE: hello.key_share = pull_list(buf, 2, partial(pull_key_share, buf)) elif extension_type == ExtensionType.SUPPORTED_VERSIONS: hello.supported_versions = pull_list(buf, 1, buf.pull_uint16) elif extension_type == ExtensionType.SIGNATURE_ALGORITHMS: hello.signature_algorithms = pull_list(buf, 2, buf.pull_uint16) elif extension_type == ExtensionType.SUPPORTED_GROUPS: hello.supported_groups = pull_list(buf, 2, buf.pull_uint16) elif extension_type == ExtensionType.PSK_KEY_EXCHANGE_MODES: hello.psk_key_exchange_modes = pull_list(buf, 1, buf.pull_uint8) elif extension_type ==</s> ===========changed ref 2=========== # module: aioquic.tls def pull_client_hello(buf: Buffer) -> ClientHello: # offset: 1 <s>k_key_exchange_modes = pull_list(buf, 1, buf.pull_uint8) elif extension_type == ExtensionType.SERVER_NAME: with pull_block(buf, 2): assert buf.pull_uint8() == 0 hello.server_name = pull_opaque(buf, 2).decode("ascii") elif extension_type == ExtensionType.ALPN: hello.alpn_protocols = pull_list( buf, 2, partial(pull_alpn_protocol, buf) ) elif extension_type == ExtensionType.EARLY_DATA: hello.early_data = True elif extension_type == ExtensionType.PRE_SHARED_KEY: hello.pre_shared_key = OfferedPsks( identities=pull_list(buf, 2, partial(pull_psk_identity, buf)), binders=pull_list(buf, 2, partial(pull_psk_binder, buf)), ) after_psk = True else: hello.other_extensions.append( (extension_type, buf.pull_bytes(extension_length)) ) pull_list(buf, 2, pull_extension) return hello
aioquic.tls/pull_server_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<3>:<del> server_random = buf.pull_bytes(32) <6>:<add> random=buf.pull_bytes(32), <del> random=server_random, <7>:<add> legacy_session_id=pull_opaque(buf, 1), <del> session_id=pull_opaque(buf, 1),
# module: aioquic.tls def pull_server_hello(buf: Buffer) -> ServerHello: <0> assert buf.pull_uint8() == HandshakeType.SERVER_HELLO <1> with pull_block(buf, 3): <2> assert buf.pull_uint16() == TLS_VERSION_1_2 <3> server_random = buf.pull_bytes(32) <4> <5> hello = ServerHello( <6> random=server_random, <7> session_id=pull_opaque(buf, 1), <8> cipher_suite=buf.pull_uint16(), <9> compression_method=buf.pull_uint8(), <10> ) <11> <12> # extensions <13> def pull_extension() -> None: <14> extension_type = buf.pull_uint16() <15> extension_length = buf.pull_uint16() <16> if extension_type == ExtensionType.SUPPORTED_VERSIONS: <17> hello.supported_version = buf.pull_uint16() <18> elif extension_type == ExtensionType.KEY_SHARE: <19> hello.key_share = pull_key_share(buf) <20> elif extension_type == ExtensionType.PRE_SHARED_KEY: <21> hello.pre_shared_key = buf.pull_uint16() <22> else: <23> hello.other_extensions.append( <24> (extension_type, buf.pull_bytes(extension_length)) <25> ) <26> <27> pull_list(buf, 2, pull_extension) <28> <29> return hello <30>
===========unchanged ref 0=========== at: aioquic.tls TLS_VERSION_1_2 = 0x0303 ExtensionType(x: Union[str, bytes, bytearray], base: int) ExtensionType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) HandshakeType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) HandshakeType(x: Union[str, bytes, bytearray], base: int) pull_block(buf: Buffer, capacity: int) -> Generator pull_list(buf: Buffer, capacity: int, func: Callable[[], T]) -> List[T] pull_opaque(buf: Buffer, capacity: int) -> bytes pull_key_share(buf: Buffer) -> KeyShareEntry ServerHello(random: bytes, legacy_session_id: bytes, cipher_suite: int, compression_method: int, key_share: Optional[KeyShareEntry]=None, pre_shared_key: Optional[int]=None, supported_version: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list)) at: aioquic.tls.ServerHello random: bytes legacy_session_id: bytes cipher_suite: int compression_method: int key_share: Optional[KeyShareEntry] = None pre_shared_key: Optional[int] = None supported_version: Optional[int] = None other_extensions: List[Tuple[int, bytes]] = field(default_factory=list) ===========changed ref 0=========== # module: aioquic.tls @dataclass class ServerHello: random: bytes + legacy_session_id: bytes - session_id: bytes cipher_suite: int compression_method: int # extensions key_share: Optional[KeyShareEntry] = None pre_shared_key: Optional[int] = None supported_version: Optional[int] = None other_extensions: List[Tuple[int, bytes]] = field(default_factory=list) ===========changed ref 1=========== # module: aioquic.tls @dataclass class ClientHello: random: bytes + legacy_session_id: bytes - session_id: bytes cipher_suites: List[int] + legacy_compression_methods: List[int] - compression_methods: List[int] # extensions alpn_protocols: Optional[List[str]] = None early_data: bool = False key_share: Optional[List[KeyShareEntry]] = None pre_shared_key: Optional[OfferedPsks] = None psk_key_exchange_modes: Optional[List[int]] = None server_name: Optional[str] = None signature_algorithms: Optional[List[int]] = None supported_groups: Optional[List[int]] = None supported_versions: Optional[List[int]] = None other_extensions: List[Extension] = field(default_factory=list) ===========changed ref 2=========== # module: aioquic.tls def push_client_hello(buf: Buffer, hello: ClientHello) -> None: buf.push_uint8(HandshakeType.CLIENT_HELLO) with push_block(buf, 3): buf.push_uint16(TLS_VERSION_1_2) buf.push_bytes(hello.random) + push_opaque(buf, 1, hello.legacy_session_id) - push_opaque(buf, 1, hello.session_id) push_list(buf, 2, buf.push_uint16, hello.cipher_suites) + push_list(buf, 1, buf.push_uint8, hello.legacy_compression_methods) - push_list(buf, 1, buf.push_uint8, hello.compression_methods) # extensions with push_block(buf, 2): with push_extension(buf, ExtensionType.KEY_SHARE): push_list(buf, 2, partial(push_key_share, buf), hello.key_share) with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS): push_list(buf, 1, buf.push_uint16, hello.supported_versions) with push_extension(buf, ExtensionType.SIGNATURE_ALGORITHMS): push_list(buf, 2, buf.push_uint16, hello.signature_algorithms) with push_extension(buf, ExtensionType.SUPPORTED_GROUPS): push_list(buf, 2, buf.push_uint16, hello.supported_groups) if hello.psk_key_exchange_modes is not None: with push_extension(buf, ExtensionType.PSK_KEY_EXCHANGE_MODES): push_list(buf, 1, buf.push_uint8, hello.psk_key_exchange_modes) if hello.server_name is not None: with push_extension(buf, ExtensionType.SERVER_NAME): with push_block(buf, 2): buf.push_uint8(0) push_opaque(buf, 2,</s> ===========changed ref 3=========== # module: aioquic.tls def push_client_hello(buf: Buffer, hello: ClientHello) -> None: # offset: 1 <s> push_block(buf, 2): buf.push_uint8(0) push_opaque(buf, 2, hello.server_name.encode("ascii")) if hello.alpn_protocols is not None: with push_extension(buf, ExtensionType.ALPN): push_list( buf, 2, partial(push_alpn_protocol, buf), hello.alpn_protocols ) for extension_type, extension_value in hello.other_extensions: with push_extension(buf, extension_type): buf.push_bytes(extension_value) if hello.early_data: with push_extension(buf, ExtensionType.EARLY_DATA): pass # pre_shared_key MUST be last if hello.pre_shared_key is not None: with push_extension(buf, ExtensionType.PRE_SHARED_KEY): push_list( buf, 2, partial(push_psk_identity, buf), hello.pre_shared_key.identities, ) push_list( buf, 2, partial(push_psk_binder, buf), hello.pre_shared_key.binders, )
aioquic.tls/push_server_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<5>:<add> push_opaque(buf, 1, hello.legacy_session_id) <del> push_opaque(buf, 1, hello.session_id)
# module: aioquic.tls def push_server_hello(buf: Buffer, hello: ServerHello) -> None: <0> buf.push_uint8(HandshakeType.SERVER_HELLO) <1> with push_block(buf, 3): <2> buf.push_uint16(TLS_VERSION_1_2) <3> buf.push_bytes(hello.random) <4> <5> push_opaque(buf, 1, hello.session_id) <6> buf.push_uint16(hello.cipher_suite) <7> buf.push_uint8(hello.compression_method) <8> <9> # extensions <10> with push_block(buf, 2): <11> if hello.supported_version is not None: <12> with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS): <13> buf.push_uint16(hello.supported_version) <14> <15> if hello.key_share is not None: <16> with push_extension(buf, ExtensionType.KEY_SHARE): <17> push_key_share(buf, hello.key_share) <18> <19> if hello.pre_shared_key is not None: <20> with push_extension(buf, ExtensionType.PRE_SHARED_KEY): <21> buf.push_uint16(hello.pre_shared_key) <22> <23> for extension_type, extension_value in hello.other_extensions: <24> with push_extension(buf, extension_type): <25> buf.push_bytes(extension_value) <26>
===========unchanged ref 0=========== at: aioquic.tls TLS_VERSION_1_2 = 0x0303 ExtensionType(x: Union[str, bytes, bytearray], base: int) ExtensionType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) push_block(buf: Buffer, capacity: int) -> Generator push_opaque(buf: Buffer, capacity: int, value: bytes) -> None push_extension(buf: Buffer, extension_type: int) -> Generator push_key_share(buf: Buffer, value: KeyShareEntry) -> None at: aioquic.tls.ServerHello random: bytes legacy_session_id: bytes cipher_suite: int compression_method: int key_share: Optional[KeyShareEntry] = None pre_shared_key: Optional[int] = None supported_version: Optional[int] = None other_extensions: List[Tuple[int, bytes]] = field(default_factory=list) ===========changed ref 0=========== # module: aioquic.tls @dataclass class ServerHello: random: bytes + legacy_session_id: bytes - session_id: bytes cipher_suite: int compression_method: int # extensions key_share: Optional[KeyShareEntry] = None pre_shared_key: Optional[int] = None supported_version: Optional[int] = None other_extensions: List[Tuple[int, bytes]] = field(default_factory=list) ===========changed ref 1=========== # module: aioquic.tls def pull_server_hello(buf: Buffer) -> ServerHello: assert buf.pull_uint8() == HandshakeType.SERVER_HELLO with pull_block(buf, 3): assert buf.pull_uint16() == TLS_VERSION_1_2 - server_random = buf.pull_bytes(32) hello = ServerHello( + random=buf.pull_bytes(32), - random=server_random, + legacy_session_id=pull_opaque(buf, 1), - session_id=pull_opaque(buf, 1), cipher_suite=buf.pull_uint16(), compression_method=buf.pull_uint8(), ) # extensions def pull_extension() -> None: extension_type = buf.pull_uint16() extension_length = buf.pull_uint16() if extension_type == ExtensionType.SUPPORTED_VERSIONS: hello.supported_version = buf.pull_uint16() elif extension_type == ExtensionType.KEY_SHARE: hello.key_share = pull_key_share(buf) elif extension_type == ExtensionType.PRE_SHARED_KEY: hello.pre_shared_key = buf.pull_uint16() else: hello.other_extensions.append( (extension_type, buf.pull_bytes(extension_length)) ) pull_list(buf, 2, pull_extension) return hello ===========changed ref 2=========== # module: aioquic.tls @dataclass class ClientHello: random: bytes + legacy_session_id: bytes - session_id: bytes cipher_suites: List[int] + legacy_compression_methods: List[int] - compression_methods: List[int] # extensions alpn_protocols: Optional[List[str]] = None early_data: bool = False key_share: Optional[List[KeyShareEntry]] = None pre_shared_key: Optional[OfferedPsks] = None psk_key_exchange_modes: Optional[List[int]] = None server_name: Optional[str] = None signature_algorithms: Optional[List[int]] = None supported_groups: Optional[List[int]] = None supported_versions: Optional[List[int]] = None other_extensions: List[Extension] = field(default_factory=list) ===========changed ref 3=========== # module: aioquic.tls def push_client_hello(buf: Buffer, hello: ClientHello) -> None: buf.push_uint8(HandshakeType.CLIENT_HELLO) with push_block(buf, 3): buf.push_uint16(TLS_VERSION_1_2) buf.push_bytes(hello.random) + push_opaque(buf, 1, hello.legacy_session_id) - push_opaque(buf, 1, hello.session_id) push_list(buf, 2, buf.push_uint16, hello.cipher_suites) + push_list(buf, 1, buf.push_uint8, hello.legacy_compression_methods) - push_list(buf, 1, buf.push_uint8, hello.compression_methods) # extensions with push_block(buf, 2): with push_extension(buf, ExtensionType.KEY_SHARE): push_list(buf, 2, partial(push_key_share, buf), hello.key_share) with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS): push_list(buf, 1, buf.push_uint16, hello.supported_versions) with push_extension(buf, ExtensionType.SIGNATURE_ALGORITHMS): push_list(buf, 2, buf.push_uint16, hello.signature_algorithms) with push_extension(buf, ExtensionType.SUPPORTED_GROUPS): push_list(buf, 2, buf.push_uint16, hello.supported_groups) if hello.psk_key_exchange_modes is not None: with push_extension(buf, ExtensionType.PSK_KEY_EXCHANGE_MODES): push_list(buf, 1, buf.push_uint8, hello.psk_key_exchange_modes) if hello.server_name is not None: with push_extension(buf, ExtensionType.SERVER_NAME): with push_block(buf, 2): buf.push_uint8(0) push_opaque(buf, 2,</s> ===========changed ref 4=========== # module: aioquic.tls def push_client_hello(buf: Buffer, hello: ClientHello) -> None: # offset: 1 <s> push_block(buf, 2): buf.push_uint8(0) push_opaque(buf, 2, hello.server_name.encode("ascii")) if hello.alpn_protocols is not None: with push_extension(buf, ExtensionType.ALPN): push_list( buf, 2, partial(push_alpn_protocol, buf), hello.alpn_protocols ) for extension_type, extension_value in hello.other_extensions: with push_extension(buf, extension_type): buf.push_bytes(extension_value) if hello.early_data: with push_extension(buf, ExtensionType.EARLY_DATA): pass # pre_shared_key MUST be last if hello.pre_shared_key is not None: with push_extension(buf, ExtensionType.PRE_SHARED_KEY): push_list( buf, 2, partial(push_psk_identity, buf), hello.pre_shared_key.identities, ) push_list( buf, 2, partial(push_psk_binder, buf), hello.pre_shared_key.binders, )
aioquic.tls/Context.__init__
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<s> is_client: bool, alpn_protocols: Optional[List[str]] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): <0> # configuration <1> self._alpn_protocols = alpn_protocols <2> self._cadata = cadata <3> self._cafile = cafile <4> self._capath = capath <5> self.certificate: Optional[x509.Certificate] = None <6> self.certificate_chain: List[x509.Certificate] = [] <7> self.certificate_private_key: Optional[ <8> Union[dsa.DSAPrivateKey, ec.EllipticCurvePrivateKey, rsa.RSAPrivateKey] <9> ] = None <10> self.handshake_extensions: List[Extension] = [] <11> self._max_early_data = max_early_data <12> self.session_ticket: Optional[SessionTicket] = None <13> self._server_name = server_name <14> if verify_mode is not None: <15> self._verify_mode = verify_mode <16> else: <17> self._verify_mode = ssl.CERT_REQUIRED if is_client else ssl.CERT_NONE <18> <19> # callbacks <20> self.alpn_cb: Optional[AlpnHandler] = None <21> self.get_session_ticket_cb: Optional[SessionTicketFetcher] = None <22> self.new_session_ticket_cb: Optional[SessionTicketHandler] = None <23> self.update_traffic_key_cb: Callable[ <24> [Direction, Epoch, CipherSuite, bytes], None <25> ] = lambda d, e, c, s: None <26> <27> # supported parameters <28> self._cipher_suites = [ <29> CipherSuite.AES_256_GCM_</s>
===========below chunk 0=========== <s>: bool, alpn_protocols: Optional[List[str]] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): # offset: 1 CipherSuite.AES_128_GCM_SHA256, CipherSuite.CHACHA20_POLY1305_SHA256, ] self._compression_methods: List[int] = [CompressionMethod.NULL] self._psk_key_exchange_modes: List[int] = [PskKeyExchangeMode.PSK_DHE_KE] self._signature_algorithms: List[int] = [ SignatureAlgorithm.RSA_PSS_RSAE_SHA256, SignatureAlgorithm.ECDSA_SECP256R1_SHA256, SignatureAlgorithm.RSA_PKCS1_SHA256, SignatureAlgorithm.RSA_PKCS1_SHA1, ] self._supported_groups = [Group.SECP256R1] if default_backend().x25519_supported(): self._supported_groups.append(Group.X25519) if default_backend().x448_supported(): self._supported_groups.append(Group.X448) self._supported_versions = [TLS_VERSION_1_3] # state self.alpn_negotiated: Optional[str] = None self.early_data_accepted = False self.key_schedule: Optional[KeySchedule] = None self.received_extensions: Optional[List[Extension]] = None self._key_schedule_psk: Optional[KeySchedule] = None self._key_schedule_proxy: Optional[KeyScheduleProxy] = None self._new_session_ticket: Optional[NewSessionTicket] = None self._peer_certificate: Optional[</s> ===========below chunk 1=========== <s>: bool, alpn_protocols: Optional[List[str]] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): # offset: 2 <s> = None self._new_session_ticket: Optional[NewSessionTicket] = None self._peer_certificate: Optional[x509.Certificate] = None self._peer_certificate_chain: List[x509.Certificate] = [] self._receive_buffer = b"" self._session_resumed = False self._enc_key: Optional[bytes] = None self._dec_key: Optional[bytes] = None self.__logger = logger self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None self._x448_private_key: Optional[x448.X448PrivateKey] = None if is_client: self.client_random = os.urandom(32) self.session_id = os.urandom(32) self.state = State.CLIENT_HANDSHAKE_START else: self.client_random = None self.session_id = None self.state = State.SERVER_EXPECT_CLIENT_HELLO ===========unchanged ref 0=========== at: aioquic.tls TLS_VERSION_1_3 = 0x0304 Direction() Epoch() State() CipherSuite(x: Union[str, bytes, bytearray], base: int) CipherSuite(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) CompressionMethod(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) CompressionMethod(x: Union[str, bytes, bytearray], base: int) Group(x: Union[str, bytes, bytearray], base: int) Group(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) PskKeyExchangeMode(x: Union[str, bytes, bytearray], base: int) PskKeyExchangeMode(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) SignatureAlgorithm(x: Union[str, bytes, bytearray], base: int) SignatureAlgorithm(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) Extension = Tuple[int, bytes] NewSessionTicket(ticket_lifetime: int=0, ticket_age_add: int=0, ticket_nonce: bytes=b"", ticket: bytes=b"", max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list)) KeySchedule(cipher_suite: CipherSuite) KeyScheduleProxy(cipher_suites: List[CipherSuite]) SessionTicket(age_add: int, cipher_suite: CipherSuite, not_valid_after: datetime.datetime, not_valid_before: datetime.datetime, resumption_secret: bytes, server_name: str, ticket: bytes, max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list)) AlpnHandler = Callable[[str], None] ===========unchanged ref 1=========== SessionTicketFetcher = Callable[[bytes], Optional[SessionTicket]] SessionTicketHandler = Callable[[SessionTicket], None] at: aioquic.tls.Context._client_handle_certificate self._peer_certificate = x509.load_der_x509_certificate( certificate.certificates[0][0], backend=default_backend() ) self._peer_certificate_chain = [ x509.load_der_x509_certificate( certificate.certificates[i][0], backend=default_backend() ) for i in range(1, len(certificate.certificates)) ] at: aioquic.tls.Context._client_handle_encrypted_extensions self.alpn_negotiated = encrypted_extensions.alpn_protocol self.early_data_accepted = encrypted_extensions.early_data self.received_extensions = encrypted_extensions.other_extensions at: aioquic.tls.Context._client_handle_finished self._enc_key = next_enc_key at: aioquic.tls.Context._client_handle_hello self.key_schedule = self._key_schedule_psk self.key_schedule = self._key_schedule_proxy.select(cipher_suite) self._session_resumed = True self._key_schedule_psk = None self._key_schedule_proxy = None at: aioquic.tls.Context._client_send_hello self._ec_private_key = ec.generate_private_key( GROUP_TO_CURVE[Group.SECP256R1](), default_backend() ) self._x25519_private_key = x25519.X25519PrivateKey.generate() self._x448_private_key = x448.X448PrivateKey.generate() self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite) self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites)
aioquic.tls/Context._client_send_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<28>:<add> legacy_session_id=self.legacy_session_id, <del> session_id=self.session_id, <30>:<add> legacy_compression_methods=self._legacy_compression_methods, <del> compression_methods=self._compression_methods,
# module: aioquic.tls class Context: def _client_send_hello(self, output_buf: Buffer) -> None: <0> key_share: List[KeyShareEntry] = [] <1> supported_groups: List[int] = [] <2> <3> for group in self._supported_groups: <4> if group == Group.SECP256R1: <5> self._ec_private_key = ec.generate_private_key( <6> GROUP_TO_CURVE[Group.SECP256R1](), default_backend() <7> ) <8> key_share.append(encode_public_key(self._ec_private_key.public_key())) <9> supported_groups.append(Group.SECP256R1) <10> elif group == Group.X25519: <11> self._x25519_private_key = x25519.X25519PrivateKey.generate() <12> key_share.append( <13> encode_public_key(self._x25519_private_key.public_key()) <14> ) <15> supported_groups.append(Group.X25519) <16> elif group == Group.X448: <17> self._x448_private_key = x448.X448PrivateKey.generate() <18> key_share.append(encode_public_key(self._x448_private_key.public_key())) <19> supported_groups.append(Group.X448) <20> elif group == Group.GREASE: <21> key_share.append((Group.GREASE, b"\x00")) <22> supported_groups.append(Group.GREASE) <23> <24> assert len(key_share), "no key share entries" <25> <26> hello = ClientHello( <27> random=self.client_random, <28> session_id=self.session_id, <29> cipher_suites=[int(x) for x in self._cipher_suites], <30> compression_methods=self._compression_methods, <31> alpn_protocols=self._alpn_protocols, <32> key_share=key_share, <33> psk_key_</s>
===========below chunk 0=========== # module: aioquic.tls class Context: def _client_send_hello(self, output_buf: Buffer) -> None: # offset: 1 if (self.session_ticket or self.new_session_ticket_cb is not None) else None, server_name=self._server_name, signature_algorithms=self._signature_algorithms, supported_groups=supported_groups, supported_versions=self._supported_versions, other_extensions=self.handshake_extensions, ) # PSK if self.session_ticket and self.session_ticket.is_valid: self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite) self._key_schedule_psk.extract(self.session_ticket.resumption_secret) binder_key = self._key_schedule_psk.derive_secret(b"res binder") binder_length = self._key_schedule_psk.algorithm.digest_size # update hello if self.session_ticket.max_early_data_size is not None: hello.early_data = True hello.pre_shared_key = OfferedPsks( identities=[ (self.session_ticket.ticket, self.session_ticket.obfuscated_age) ], binders=[bytes(binder_length)], ) # serialize hello without binder tmp_buf = Buffer(capacity=1024) push_client_hello(tmp_buf, hello) # calculate binder hash_offset = tmp_buf.tell() - binder_length - 3 self._key_schedule_psk.update_hash(tmp_buf.data_slice(0, hash_offset)) binder = self._key_schedule_psk.finished_verify_data(binder_key) hello.pre_shared_key.binders[0] = binder self._key_schedule_psk.update_hash( tmp_buf.data_slice(hash_offset, hash_offset</s> ===========below chunk 1=========== # module: aioquic.tls class Context: def _client_send_hello(self, output_buf: Buffer) -> None: # offset: 2 <s> self._key_schedule_psk.update_hash( tmp_buf.data_slice(hash_offset, hash_offset + 3) + binder ) # calculate early data key if hello.early_data: early_key = self._key_schedule_psk.derive_secret(b"c e traffic") self.update_traffic_key_cb( Direction.ENCRYPT, Epoch.ZERO_RTT, self._key_schedule_psk.cipher_suite, early_key, ) self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites) self._key_schedule_proxy.extract(None) with push_message(self._key_schedule_proxy, output_buf): push_client_hello(output_buf, hello) self._set_state(State.CLIENT_EXPECT_SERVER_HELLO) ===========unchanged ref 0=========== at: aioquic.tls Direction() Epoch() State() Group(x: Union[str, bytes, bytearray], base: int) Group(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) OfferedPsks(identities: List[PskIdentity], binders: List[bytes]) ClientHello(random: bytes, legacy_session_id: bytes, cipher_suites: List[int], legacy_compression_methods: List[int], alpn_protocols: Optional[List[str]]=None, early_data: bool=False, key_share: Optional[List[KeyShareEntry]]=None, pre_shared_key: Optional[OfferedPsks]=None, psk_key_exchange_modes: Optional[List[int]]=None, server_name: Optional[str]=None, signature_algorithms: Optional[List[int]]=None, supported_groups: Optional[List[int]]=None, supported_versions: Optional[List[int]]=None, other_extensions: List[Extension]=field(default_factory=list)) push_client_hello(buf: Buffer, hello: ClientHello) -> None KeySchedule(cipher_suite: CipherSuite) KeyScheduleProxy(cipher_suites: List[CipherSuite]) GROUP_TO_CURVE: Dict = { Group.SECP256R1: ec.SECP256R1, Group.SECP384R1: ec.SECP384R1, Group.SECP521R1: ec.SECP521R1, } encode_public_key(public_key: Union[ ec.EllipticCurvePublicKey, x25519.X25519PublicKey, x448.X448PublicKey ]) -> KeyShareEntry push_message(key_schedule: Union[KeySchedule, KeyScheduleProxy], buf: Buffer) -> Generator at: aioquic.tls.ClientHello early_data: bool = False pre_shared_key: Optional[OfferedPsks] = None ===========unchanged ref 1=========== at: aioquic.tls.Context _set_state(state: State) -> None at: aioquic.tls.Context.__init__ self._alpn_protocols = alpn_protocols self.handshake_extensions: List[Extension] = [] self.session_ticket: Optional[SessionTicket] = None self._server_name = server_name self.new_session_ticket_cb: Optional[SessionTicketHandler] = None self.update_traffic_key_cb: Callable[ [Direction, Epoch, CipherSuite, bytes], None ] = lambda d, e, c, s: None self._cipher_suites = [ CipherSuite.AES_256_GCM_SHA384, CipherSuite.AES_128_GCM_SHA256, CipherSuite.CHACHA20_POLY1305_SHA256, ] self._legacy_compression_methods: List[int] = [CompressionMethod.NULL] self._psk_key_exchange_modes: List[int] = [PskKeyExchangeMode.PSK_DHE_KE] self._signature_algorithms: List[int] = [ SignatureAlgorithm.RSA_PSS_RSAE_SHA256, SignatureAlgorithm.ECDSA_SECP256R1_SHA256, SignatureAlgorithm.RSA_PKCS1_SHA256, SignatureAlgorithm.RSA_PKCS1_SHA1, ] self._supported_groups = [Group.SECP256R1] self._supported_versions = [TLS_VERSION_1_3] self._key_schedule_psk: Optional[KeySchedule] = None self._key_schedule_proxy: Optional[KeyScheduleProxy] = None self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None self._x448_private_key: Optional[x448.X448PrivateKey] = None
aioquic.tls/Context._client_handle_hello
Modified
aiortc~aioquic
341caf8988c9a808f81a2050a580cccc0bf597e7
[tls] rename ClientHello / ServerHello attributes to match spec
<7>:<add> assert peer_hello.compression_method in self._legacy_compression_methods <del> assert peer_hello.compression_method in self._compression_methods
# module: aioquic.tls class Context: def _client_handle_hello(self, input_buf: Buffer, output_buf: Buffer) -> None: <0> peer_hello = pull_server_hello(input_buf) <1> <2> cipher_suite = negotiate( <3> self._cipher_suites, <4> [peer_hello.cipher_suite], <5> AlertHandshakeFailure("Unsupported cipher suite"), <6> ) <7> assert peer_hello.compression_method in self._compression_methods <8> assert peer_hello.supported_version in self._supported_versions <9> <10> # select key schedule <11> if peer_hello.pre_shared_key is not None: <12> if ( <13> self._key_schedule_psk is None <14> or peer_hello.pre_shared_key != 0 <15> or cipher_suite != self._key_schedule_psk.cipher_suite <16> ): <17> raise AlertIllegalParameter <18> self.key_schedule = self._key_schedule_psk <19> self._session_resumed = True <20> else: <21> self.key_schedule = self._key_schedule_proxy.select(cipher_suite) <22> self._key_schedule_psk = None <23> self._key_schedule_proxy = None <24> <25> # perform key exchange <26> peer_public_key = decode_public_key(peer_hello.key_share) <27> shared_key: Optional[bytes] = None <28> if ( <29> isinstance(peer_public_key, x25519.X25519PublicKey) <30> and self._x25519_private_key is not None <31> ): <32> shared_key = self._x25519_private_key.exchange(peer_public_key) <33> elif ( <34> isinstance(peer_public_key, x448.X448PublicKey) <35> and self._x448_private_key is not None <36> ): <37> shared_key = self._x448_private_key.exchange(peer_public_key) <38> elif ( <39> isinstance(peer_public_key</s>
===========below chunk 0=========== # module: aioquic.tls class Context: def _client_handle_hello(self, input_buf: Buffer, output_buf: Buffer) -> None: # offset: 1 and self._ec_private_key is not None and self._ec_private_key.public_key().curve.__class__ == peer_public_key.curve.__class__ ): shared_key = self._ec_private_key.exchange(ec.ECDH(), peer_public_key) assert shared_key is not None self.key_schedule.update_hash(input_buf.data) self.key_schedule.extract(shared_key) self._setup_traffic_protection( Direction.DECRYPT, Epoch.HANDSHAKE, b"s hs traffic" ) self._set_state(State.CLIENT_EXPECT_ENCRYPTED_EXTENSIONS) ===========unchanged ref 0=========== at: aioquic.tls AlertHandshakeFailure(*args: object) AlertIllegalParameter(*args: object) Direction() Epoch() State() decode_public_key(key_share: KeyShareEntry) -> Union[ec.EllipticCurvePublicKey, x25519.X25519PublicKey, x448.X448PublicKey, None] negotiate(supported: List[T], offered: Optional[List[Any]], exc: Optional[Alert]=None) -> T at: aioquic.tls.Context _setup_traffic_protection(direction: Direction, epoch: Epoch, label: bytes) -> None _set_state(state: State) -> None at: aioquic.tls.Context.__init__ self._cipher_suites = [ CipherSuite.AES_256_GCM_SHA384, CipherSuite.AES_128_GCM_SHA256, CipherSuite.CHACHA20_POLY1305_SHA256, ] self._legacy_compression_methods: List[int] = [CompressionMethod.NULL] self._supported_versions = [TLS_VERSION_1_3] self.key_schedule: Optional[KeySchedule] = None self._key_schedule_psk: Optional[KeySchedule] = None self._key_schedule_proxy: Optional[KeyScheduleProxy] = None self._session_resumed = False self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None self._x448_private_key: Optional[x448.X448PrivateKey] = None at: aioquic.tls.Context._client_handle_hello peer_hello = pull_server_hello(input_buf) ===========unchanged ref 1=========== at: aioquic.tls.Context._client_send_hello self._ec_private_key = ec.generate_private_key( GROUP_TO_CURVE[Group.SECP256R1](), default_backend() ) self._x25519_private_key = x25519.X25519PrivateKey.generate() self._x448_private_key = x448.X448PrivateKey.generate() self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite) self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites) at: aioquic.tls.Context._server_handle_hello self.key_schedule = KeySchedule(cipher_suite) self._session_resumed = True self._x25519_private_key = x25519.X25519PrivateKey.generate() self._x448_private_key = x448.X448PrivateKey.generate() self._ec_private_key = ec.generate_private_key( GROUP_TO_CURVE[key_share[0]](), default_backend() ) at: aioquic.tls.KeySchedule extract(key_material: Optional[bytes]=None) -> None update_hash(data: bytes) -> None at: aioquic.tls.KeySchedule.__init__ self.cipher_suite = cipher_suite at: aioquic.tls.KeyScheduleProxy select(cipher_suite: CipherSuite) -> KeySchedule at: aioquic.tls.ServerHello cipher_suite: int compression_method: int key_share: Optional[KeyShareEntry] = None pre_shared_key: Optional[int] = None supported_version: Optional[int] = None ===========changed ref 0=========== # module: aioquic.tls @dataclass class ServerHello: random: bytes + legacy_session_id: bytes - session_id: bytes cipher_suite: int compression_method: int # extensions key_share: Optional[KeyShareEntry] = None pre_shared_key: Optional[int] = None supported_version: Optional[int] = None other_extensions: List[Tuple[int, bytes]] = field(default_factory=list) ===========changed ref 1=========== # module: aioquic.tls def push_server_hello(buf: Buffer, hello: ServerHello) -> None: buf.push_uint8(HandshakeType.SERVER_HELLO) with push_block(buf, 3): buf.push_uint16(TLS_VERSION_1_2) buf.push_bytes(hello.random) + push_opaque(buf, 1, hello.legacy_session_id) - push_opaque(buf, 1, hello.session_id) buf.push_uint16(hello.cipher_suite) buf.push_uint8(hello.compression_method) # extensions with push_block(buf, 2): if hello.supported_version is not None: with push_extension(buf, ExtensionType.SUPPORTED_VERSIONS): buf.push_uint16(hello.supported_version) if hello.key_share is not None: with push_extension(buf, ExtensionType.KEY_SHARE): push_key_share(buf, hello.key_share) if hello.pre_shared_key is not None: with push_extension(buf, ExtensionType.PRE_SHARED_KEY): buf.push_uint16(hello.pre_shared_key) for extension_type, extension_value in hello.other_extensions: with push_extension(buf, extension_type): buf.push_bytes(extension_value) ===========changed ref 2=========== # module: aioquic.tls def pull_server_hello(buf: Buffer) -> ServerHello: assert buf.pull_uint8() == HandshakeType.SERVER_HELLO with pull_block(buf, 3): assert buf.pull_uint16() == TLS_VERSION_1_2 - server_random = buf.pull_bytes(32) hello = ServerHello( + random=buf.pull_bytes(32), - random=server_random, + legacy_session_id=pull_opaque(buf, 1), - session_id=pull_opaque(buf, 1), cipher_suite=buf.pull_uint16(), compression_method=buf.pull_uint8(), ) # extensions def pull_extension() -> None: extension_type = buf.pull_uint16() extension_length = buf.pull_uint16() if extension_type == ExtensionType.SUPPORTED_VERSIONS: hello.supported_version = buf.pull_uint16() elif extension_type == ExtensionType.KEY_SHARE: hello.key_share = pull_key_share(buf) elif extension_type == ExtensionType.PRE_SHARED_KEY: hello.pre_shared_key = buf.pull_uint16() else: hello.other_extensions.append( (extension_type, buf.pull_bytes(extension_length)) ) pull_list(buf, 2, pull_extension) return hello
tests.test_connection/QuicConnectionTest.test_connect_with_loss_1
Modified
aiortc~aioquic
a15b779532737f0f06bf7d6cdfecc73b010c4926
[tls] send an empty legacy_session_id in ClientHello
<37>:<add> self.assertEqual(datagram_sizes(items), [1280, 1030]) <del> self.assertEqual(datagram_sizes(items), [1280, 1062])
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): <0> """ <1> Check connection is established even in the client's INITIAL is lost. <2> """ <3> <4> def datagram_sizes(items): <5> return [len(x[0]) for x in items] <6> <7> client_configuration = QuicConfiguration(is_client=True) <8> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) <9> <10> client = QuicConnection(configuration=client_configuration) <11> client._ack_delay = 0 <12> <13> server_configuration = QuicConfiguration(is_client=False) <14> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) <15> <16> server = QuicConnection(configuration=server_configuration) <17> server._ack_delay = 0 <18> <19> # client sends INITIAL <20> now = 0.0 <21> client.connect(SERVER_ADDR, now=now) <22> items = client.datagrams_to_send(now=now) <23> self.assertEqual(datagram_sizes(items), [1280]) <24> self.assertEqual(client.get_timer(), 1.0) <25> <26> # INITIAL is lost <27> now = 1.0 <28> client.handle_timer(now=now) <29> items = client.datagrams_to_send(now=now) <30> self.assertEqual(datagram_sizes(items), [1280]) <31> self.assertEqual(client.get_timer(), 3.0) <32> <33> # server receives INITIAL, sends INITIAL + HANDSHAKE <34> now = 1.1 <35> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) <36> items = server.datagrams_to_send(now=now) <37> self.assertEqual(datagram_sizes(items), [1280, 1062]) <38> self.assertEqual(server.get_timer(), 2.1) <39> self.assertEqual</s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): # offset: 1 self.assertEqual(len(server._loss.spaces[1].sent_packets), 2) self.assertEqual(type(server.next_event()), events.ProtocolNegotiated) self.assertIsNone(server.next_event()) # handshake continues normally now = 1.2 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) client.receive_datagram(items[1][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [376]) self.assertAlmostEqual(client.get_timer(), 1.825) self.assertEqual(type(client.next_event()), events.ProtocolNegotiated) self.assertEqual(type(client.next_event()), events.HandshakeCompleted) self.assertEqual(type(client.next_event()), events.ConnectionIdIssued) now = 1.3 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [229]) self.assertAlmostEqual(server.get_timer(), 1.825) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 0) self.assertEqual(type(server.next_event()), events.HandshakeCompleted) self.assertEqual(type(server.next_event()), events.ConnectionIdIssued) now = 1.4 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual</s> ===========below chunk 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): # offset: 2 <s>ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32]) self.assertAlmostEqual(client.get_timer(), 61.4) # idle timeout ===========unchanged ref 0=========== at: tests.test_connection CLIENT_ADDR = ("1.2.3.4", 1234) SERVER_ADDR = ("2.3.4.5", 4433) at: tests.utils SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem") SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertIsNone(obj: Any, msg: Any=...) -> None assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None
tests.test_connection/QuicConnectionTest.test_connect_with_loss_2
Modified
aiortc~aioquic
a15b779532737f0f06bf7d6cdfecc73b010c4926
[tls] send an empty legacy_session_id in ClientHello
<26>:<add> self.assertEqual(datagram_sizes(items), [1280, 1030]) <del> self.assertEqual(datagram_sizes(items), [1280, 1062])
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_2(self): <0> def datagram_sizes(items): <1> return [len(x[0]) for x in items] <2> <3> client_configuration = QuicConfiguration(is_client=True) <4> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) <5> <6> client = QuicConnection(configuration=client_configuration) <7> client._ack_delay = 0 <8> <9> server_configuration = QuicConfiguration(is_client=False) <10> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) <11> <12> server = QuicConnection(configuration=server_configuration) <13> server._ack_delay = 0 <14> <15> # client sends INITIAL <16> now = 0.0 <17> client.connect(SERVER_ADDR, now=now) <18> items = client.datagrams_to_send(now=now) <19> self.assertEqual(datagram_sizes(items), [1280]) <20> self.assertEqual(client.get_timer(), 1.0) <21> <22> # server receives INITIAL, sends INITIAL + HANDSHAKE but second datagram is lost <23> now = 0.1 <24> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) <25> items = server.datagrams_to_send(now=now) <26> self.assertEqual(datagram_sizes(items), [1280, 1062]) <27> self.assertEqual(server.get_timer(), 1.1) <28> self.assertEqual(len(server._loss.spaces[0].sent_packets), 1) <29> self.assertEqual(len(server._loss.spaces[1].sent_packets), 2) <30> <31> # client only receives first datagram and sends ACKS <32> now = 0.2 <33> client.receive_datagram(items[0][0], SERVER_ADDR, now=now) <34> items = client.datagrams_to_send(now=</s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_2(self): # offset: 1 self.assertEqual(datagram_sizes(items), [97]) self.assertAlmostEqual(client.get_timer(), 0.625) self.assertEqual(type(client.next_event()), events.ProtocolNegotiated) self.assertIsNone(client.next_event()) # client PTO - HANDSHAKE PING now = client.get_timer() # ~0.625 client.handle_timer(now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [44]) self.assertAlmostEqual(client.get_timer(), 1.875) # server receives PING, discards INITIAL and sends ACK now = 0.725 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [48]) self.assertAlmostEqual(server.get_timer(), 1.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 3) self.assertEqual(type(server.next_event()), events.ProtocolNegotiated) self.assertIsNone(server.next_event()) # ACKs are lost, server retransmits HANDSHAKE now = server.get_timer() server.handle_timer(now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280, 854]) self.assertAlmostEqual(server.get_timer(), 3.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) </s> ===========below chunk 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_2(self): # offset: 2 <s>(), 3.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 3) self.assertIsNone(server.next_event()) # handshake continues normally now = 1.2 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) client.receive_datagram(items[1][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [329]) self.assertAlmostEqual(client.get_timer(), 2.45) self.assertEqual(type(client.next_event()), events.HandshakeCompleted) self.assertEqual(type(client.next_event()), events.ConnectionIdIssued) now = 1.3 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [229]) self.assertAlmostEqual(server.get_timer(), 1.925) self.assertEqual(type(server.next_event()), events.HandshakeCompleted) self.assertEqual(type(server.next_event()), events.ConnectionIdIssued) now = 1.4 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32]) self.assertAlmostEqual(client.get_timer(), 61.4) ===========unchanged ref 0=========== at: tests.test_connection CLIENT_ADDR = ("1.2.3.4", 1234) SERVER_ADDR = ("2.3.4.5", 4433) at: tests.utils SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem") SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertIsNone(obj: Any, msg: Any=...) -> None assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): """ Check connection is established even in the client's INITIAL is lost. """ def datagram_sizes(items): return [len(x[0]) for x in items] client_configuration = QuicConfiguration(is_client=True) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration) client._ack_delay = 0 server_configuration = QuicConfiguration(is_client=False) server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) server = QuicConnection(configuration=server_configuration) server._ack_delay = 0 # client sends INITIAL now = 0.0 client.connect(SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 1.0) # INITIAL is lost now = 1.0 client.handle_timer(now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 3.0) # server receives INITIAL, sends INITIAL + HANDSHAKE now = 1.1 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) + self.assertEqual(datagram_sizes(items), [1280, 1030]) - self.assertEqual(datagram_sizes(items), [1280, 1062]) self.assertEqual(server.get_timer(), 2.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)</s>
tests.test_connection/QuicConnectionTest.test_connect_with_loss_3
Modified
aiortc~aioquic
a15b779532737f0f06bf7d6cdfecc73b010c4926
[tls] send an empty legacy_session_id in ClientHello
<26>:<add> self.assertEqual(datagram_sizes(items), [1280, 1030]) <del> self.assertEqual(datagram_sizes(items), [1280, 1062])
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_3(self): <0> def datagram_sizes(items): <1> return [len(x[0]) for x in items] <2> <3> client_configuration = QuicConfiguration(is_client=True) <4> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) <5> <6> client = QuicConnection(configuration=client_configuration) <7> client._ack_delay = 0 <8> <9> server_configuration = QuicConfiguration(is_client=False) <10> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) <11> <12> server = QuicConnection(configuration=server_configuration) <13> server._ack_delay = 0 <14> <15> # client sends INITIAL <16> now = 0.0 <17> client.connect(SERVER_ADDR, now=now) <18> items = client.datagrams_to_send(now=now) <19> self.assertEqual(datagram_sizes(items), [1280]) <20> self.assertEqual(client.get_timer(), 1.0) <21> <22> # server receives INITIAL, sends INITIAL + HANDSHAKE <23> now = 0.1 <24> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) <25> items = server.datagrams_to_send(now=now) <26> self.assertEqual(datagram_sizes(items), [1280, 1062]) <27> self.assertEqual(server.get_timer(), 1.1) <28> self.assertEqual(len(server._loss.spaces[0].sent_packets), 1) <29> self.assertEqual(len(server._loss.spaces[1].sent_packets), 2) <30> <31> # client receives INITIAL + HANDSHAKE <32> now = 0.2 <33> client.receive_datagram(items[0][0], SERVER_ADDR, now=now) <34> client.receive_datagram(items[1][0], SERVER_ADDR, now=now) <35> </s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_3(self): # offset: 1 self.assertEqual(datagram_sizes(items), [376]) self.assertAlmostEqual(client.get_timer(), 0.825) self.assertEqual(type(client.next_event()), events.ProtocolNegotiated) self.assertEqual(type(client.next_event()), events.HandshakeCompleted) self.assertEqual(type(client.next_event()), events.ConnectionIdIssued) # server completes handshake now = 0.3 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [229]) self.assertAlmostEqual(server.get_timer(), 0.825) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 0) self.assertEqual(type(server.next_event()), events.ProtocolNegotiated) self.assertEqual(type(server.next_event()), events.HandshakeCompleted) self.assertEqual(type(server.next_event()), events.ConnectionIdIssued) # server PTO - 1-RTT PING now = 0.825 server.handle_timer(now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [29]) self.assertAlmostEqual(server.get_timer(), 1.875) # client receives PING, sends ACK now = 0.9 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32</s> ===========below chunk 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_3(self): # offset: 2 <s> client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32]) self.assertAlmostEqual(client.get_timer(), 0.825) # server receives ACK, retransmits HANDSHAKE_DONE now = 1.0 self.assertFalse(server._handshake_done_pending) server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) self.assertTrue(server._handshake_done_pending) items = server.datagrams_to_send(now=now) self.assertFalse(server._handshake_done_pending) self.assertEqual(datagram_sizes(items), [224]) ===========unchanged ref 0=========== at: tests.test_connection CLIENT_ADDR = ("1.2.3.4", 1234) SERVER_ADDR = ("2.3.4.5", 4433) at: tests.utils SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem") SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None assertFalse(expr: Any, msg: Any=...) -> None assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): """ Check connection is established even in the client's INITIAL is lost. """ def datagram_sizes(items): return [len(x[0]) for x in items] client_configuration = QuicConfiguration(is_client=True) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration) client._ack_delay = 0 server_configuration = QuicConfiguration(is_client=False) server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) server = QuicConnection(configuration=server_configuration) server._ack_delay = 0 # client sends INITIAL now = 0.0 client.connect(SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 1.0) # INITIAL is lost now = 1.0 client.handle_timer(now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 3.0) # server receives INITIAL, sends INITIAL + HANDSHAKE now = 1.1 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) + self.assertEqual(datagram_sizes(items), [1280, 1030]) - self.assertEqual(datagram_sizes(items), [1280, 1062]) self.assertEqual(server.get_timer(), 2.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)</s>
tests.test_tls/ContextTest._handshake
Modified
aiortc~aioquic
a15b779532737f0f06bf7d6cdfecc73b010c4926
[tls] send an empty legacy_session_id in ClientHello
<5>:<add> self.assertGreaterEqual(len(server_input), 181) <del> self.assertGreaterEqual(len(server_input), 213)
# module: tests.test_tls class ContextTest(TestCase): def _handshake(self, client, server): <0> # send client hello <1> client_buf = create_buffers() <2> client.handle_message(b"", client_buf) <3> self.assertEqual(client.state, State.CLIENT_EXPECT_SERVER_HELLO) <4> server_input = merge_buffers(client_buf) <5> self.assertGreaterEqual(len(server_input), 213) <6> self.assertLessEqual(len(server_input), 358) <7> reset_buffers(client_buf) <8> <9> # handle client hello <10> # send server hello, encrypted extensions, certificate, certificate verify, finished, (session ticket) <11> server_buf = create_buffers() <12> server.handle_message(server_input, server_buf) <13> self.assertEqual(server.state, State.SERVER_EXPECT_FINISHED) <14> client_input = merge_buffers(server_buf) <15> self.assertGreaterEqual(len(client_input), 600) <16> self.assertLessEqual(len(client_input), 2316) <17> <18> reset_buffers(server_buf) <19> <20> # handle server hello, encrypted extensions, certificate, certificate verify, finished, (session ticket) <21> # send finished <22> client.handle_message(client_input, client_buf) <23> self.assertEqual(client.state, State.CLIENT_POST_HANDSHAKE) <24> server_input = merge_buffers(client_buf) <25> self.assertEqual(len(server_input), 52) <26> reset_buffers(client_buf) <27> <28> # handle finished <29> server.handle_message(server_input, server_buf) <30> self.assertEqual(server.state, State.SERVER_POST_HANDSHAKE) <31> client_input = merge_buffers(server_buf) <32> self.assertEqual(len(client_input), 0) <33> <34> # check keys match <35> self.assertEqual(client._dec_key, server._enc_</s>
===========below chunk 0=========== # module: tests.test_tls class ContextTest(TestCase): def _handshake(self, client, server): # offset: 1 self.assertEqual(client._enc_key, server._dec_key) # check cipher suite self.assertEqual( client.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384 ) self.assertEqual( server.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384 ) ===========unchanged ref 0=========== at: tests.test_tls create_buffers() merge_buffers(buffers) reset_buffers(buffers) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertGreaterEqual(a: Any, b: Any, msg: Any=...) -> None assertLessEqual(a: Any, b: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): """ Check connection is established even in the client's INITIAL is lost. """ def datagram_sizes(items): return [len(x[0]) for x in items] client_configuration = QuicConfiguration(is_client=True) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration) client._ack_delay = 0 server_configuration = QuicConfiguration(is_client=False) server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) server = QuicConnection(configuration=server_configuration) server._ack_delay = 0 # client sends INITIAL now = 0.0 client.connect(SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 1.0) # INITIAL is lost now = 1.0 client.handle_timer(now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 3.0) # server receives INITIAL, sends INITIAL + HANDSHAKE now = 1.1 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) + self.assertEqual(datagram_sizes(items), [1280, 1030]) - self.assertEqual(datagram_sizes(items), [1280, 1062]) self.assertEqual(server.get_timer(), 2.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 1)</s> ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): # offset: 1 <s>_timer(), 2.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 1) self.assertEqual(len(server._loss.spaces[1].sent_packets), 2) self.assertEqual(type(server.next_event()), events.ProtocolNegotiated) self.assertIsNone(server.next_event()) # handshake continues normally now = 1.2 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) client.receive_datagram(items[1][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [376]) self.assertAlmostEqual(client.get_timer(), 1.825) self.assertEqual(type(client.next_event()), events.ProtocolNegotiated) self.assertEqual(type(client.next_event()), events.HandshakeCompleted) self.assertEqual(type(client.next_event()), events.ConnectionIdIssued) now = 1.3 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [229]) self.assertAlmostEqual(server.get_timer(), 1.825) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 0) self.assertEqual(type(server.next_event()), events.HandshakeCompleted) self.assertEqual(type(server.next_event</s> ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): # offset: 2 <s> events.ConnectionIdIssued) now = 1.4 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32]) self.assertAlmostEqual(client.get_timer(), 61.4) # idle timeout ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_3(self): def datagram_sizes(items): return [len(x[0]) for x in items] client_configuration = QuicConfiguration(is_client=True) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration) client._ack_delay = 0 server_configuration = QuicConfiguration(is_client=False) server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) server = QuicConnection(configuration=server_configuration) server._ack_delay = 0 # client sends INITIAL now = 0.0 client.connect(SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 1.0) # server receives INITIAL, sends INITIAL + HANDSHAKE now = 0.1 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) + self.assertEqual(datagram_sizes(items), [1280, 1030]) - self.assertEqual(datagram_sizes(items), [1280, 1062]) self.assertEqual(server.get_timer(), 1.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 1) self.assertEqual(len(server._loss.spaces[1].sent_packets), 2) # client receives INITIAL + HANDSHAKE now = 0.2 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) client.receive_datagram(items[1][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(</s>
aioquic.tls/Context.__init__
Modified
aiortc~aioquic
a15b779532737f0f06bf7d6cdfecc73b010c4926
[tls] send an empty legacy_session_id in ClientHello
<s> is_client: bool, alpn_protocols: Optional[List[str]] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): <0> # configuration <1> self._alpn_protocols = alpn_protocols <2> self._cadata = cadata <3> self._cafile = cafile <4> self._capath = capath <5> self.certificate: Optional[x509.Certificate] = None <6> self.certificate_chain: List[x509.Certificate] = [] <7> self.certificate_private_key: Optional[ <8> Union[dsa.DSAPrivateKey, ec.EllipticCurvePrivateKey, rsa.RSAPrivateKey] <9> ] = None <10> self.handshake_extensions: List[Extension] = [] <11> self._max_early_data = max_early_data <12> self.session_ticket: Optional[SessionTicket] = None <13> self._server_name = server_name <14> if verify_mode is not None: <15> self._verify_mode = verify_mode <16> else: <17> self._verify_mode = ssl.CERT_REQUIRED if is_client else ssl.CERT_NONE <18> <19> # callbacks <20> self.alpn_cb: Optional[AlpnHandler] = None <21> self.get_session_ticket_cb: Optional[SessionTicketFetcher] = None <22> self.new_session_ticket_cb: Optional[SessionTicketHandler] = None <23> self.update_traffic_key_cb: Callable[ <24> [Direction, Epoch, CipherSuite, bytes], None <25> ] = lambda d, e, c, s: None <26> <27> # supported parameters <28> self._cipher_suites = [ <29> CipherSuite.AES_256_GCM_</s>
===========below chunk 0=========== <s>: bool, alpn_protocols: Optional[List[str]] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): # offset: 1 CipherSuite.AES_128_GCM_SHA256, CipherSuite.CHACHA20_POLY1305_SHA256, ] self._legacy_compression_methods: List[int] = [CompressionMethod.NULL] self._psk_key_exchange_modes: List[int] = [PskKeyExchangeMode.PSK_DHE_KE] self._signature_algorithms: List[int] = [ SignatureAlgorithm.RSA_PSS_RSAE_SHA256, SignatureAlgorithm.ECDSA_SECP256R1_SHA256, SignatureAlgorithm.RSA_PKCS1_SHA256, SignatureAlgorithm.RSA_PKCS1_SHA1, ] self._supported_groups = [Group.SECP256R1] if default_backend().x25519_supported(): self._supported_groups.append(Group.X25519) if default_backend().x448_supported(): self._supported_groups.append(Group.X448) self._supported_versions = [TLS_VERSION_1_3] # state self.alpn_negotiated: Optional[str] = None self.early_data_accepted = False self.key_schedule: Optional[KeySchedule] = None self.received_extensions: Optional[List[Extension]] = None self._key_schedule_psk: Optional[KeySchedule] = None self._key_schedule_proxy: Optional[KeyScheduleProxy] = None self._new_session_ticket: Optional[NewSessionTicket] = None self._peer_certificate:</s> ===========below chunk 1=========== <s>: bool, alpn_protocols: Optional[List[str]] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): # offset: 2 <s>Proxy] = None self._new_session_ticket: Optional[NewSessionTicket] = None self._peer_certificate: Optional[x509.Certificate] = None self._peer_certificate_chain: List[x509.Certificate] = [] self._receive_buffer = b"" self._session_resumed = False self._enc_key: Optional[bytes] = None self._dec_key: Optional[bytes] = None self.__logger = logger self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None self._x448_private_key: Optional[x448.X448PrivateKey] = None if is_client: self.client_random = os.urandom(32) self.legacy_session_id = os.urandom(32) self.state = State.CLIENT_HANDSHAKE_START else: self.client_random = None self.legacy_session_id = None self.state = State.SERVER_EXPECT_CLIENT_HELLO ===========unchanged ref 0=========== at: aioquic.tls TLS_VERSION_1_3 = 0x0304 Direction() Epoch() State() CipherSuite(x: Union[str, bytes, bytearray], base: int) CipherSuite(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) CompressionMethod(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) CompressionMethod(x: Union[str, bytes, bytearray], base: int) Group(x: Union[str, bytes, bytearray], base: int) Group(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) PskKeyExchangeMode(x: Union[str, bytes, bytearray], base: int) PskKeyExchangeMode(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) SignatureAlgorithm(x: Union[str, bytes, bytearray], base: int) SignatureAlgorithm(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) Extension = Tuple[int, bytes] NewSessionTicket(ticket_lifetime: int=0, ticket_age_add: int=0, ticket_nonce: bytes=b"", ticket: bytes=b"", max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list)) KeySchedule(cipher_suite: CipherSuite) KeyScheduleProxy(cipher_suites: List[CipherSuite]) SessionTicket(age_add: int, cipher_suite: CipherSuite, not_valid_after: datetime.datetime, not_valid_before: datetime.datetime, resumption_secret: bytes, server_name: str, ticket: bytes, max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list)) AlpnHandler = Callable[[str], None] ===========unchanged ref 1=========== SessionTicketFetcher = Callable[[bytes], Optional[SessionTicket]] SessionTicketHandler = Callable[[SessionTicket], None] at: aioquic.tls.Context._client_handle_certificate self._peer_certificate = x509.load_der_x509_certificate( certificate.certificates[0][0], backend=default_backend() ) self._peer_certificate_chain = [ x509.load_der_x509_certificate( certificate.certificates[i][0], backend=default_backend() ) for i in range(1, len(certificate.certificates)) ] at: aioquic.tls.Context._client_handle_encrypted_extensions self.alpn_negotiated = encrypted_extensions.alpn_protocol self.early_data_accepted = encrypted_extensions.early_data self.received_extensions = encrypted_extensions.other_extensions at: aioquic.tls.Context._client_handle_finished self._enc_key = next_enc_key at: aioquic.tls.Context._client_handle_hello self.key_schedule = self._key_schedule_psk self.key_schedule = self._key_schedule_proxy.select(cipher_suite) self._session_resumed = True self._key_schedule_psk = None self._key_schedule_proxy = None at: aioquic.tls.Context._client_send_hello self._ec_private_key = ec.generate_private_key( GROUP_TO_CURVE[Group.SECP256R1](), default_backend() ) self._x25519_private_key = x25519.X25519PrivateKey.generate() self._x448_private_key = x448.X448PrivateKey.generate() self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite) self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites)
aioquic.tls/SessionTicket.obfuscated_age
Modified
aiortc~aioquic
50ef21f79dfc75af5dbb7342f224c9cc3cd61010
Properly calculate Session Ticket's obfuscated age
<0>:<add> age = int((utcnow() - self.not_valid_before).total_seconds() * 1000) <del> age = int((utcnow() - self.not_valid_before).total_seconds())
# module: aioquic.tls # callback types @dataclass class SessionTicket: @property def obfuscated_age(self) -> int: <0> age = int((utcnow() - self.not_valid_before).total_seconds()) <1> return (age + self.age_add) % (1 << 32) <2>
===========unchanged ref 0=========== at: aioquic.tls utcnow = datetime.datetime.utcnow at: aioquic.tls.SessionTicket age_add: int cipher_suite: CipherSuite not_valid_after: datetime.datetime not_valid_before: datetime.datetime resumption_secret: bytes server_name: str ticket: bytes max_early_data_size: Optional[int] = None other_extensions: List[Tuple[int, bytes]] = field(default_factory=list) at: datetime.timedelta __slots__ = '_days', '_seconds', '_microseconds', '_hashcode' total_seconds() -> float __radd__ = __add__ __rmul__ = __mul__
aioquic.quic.connection/QuicConnection._parse_transport_parameters
Modified
aiortc~aioquic
4efe45750250b50c99ea11cd0f408e502422f32f
[connection] validate remote active_connection_id_limit
<0>:<add> """ <add> Parse and apply remote transport parameters. <add> <add> `from_session_ticket` is `True` when restoring saved transport parameters, <add> and `False` when handling received transport parameters. <add> """ <add> <28>:<add> if ( <add> quic_transport_parameters.active_connection_id_limit is not None <add> and quic_transport_parameters.active_connection_id_limit < 2 <add> ): <add> raise QuicConnectionError( <add> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <add> frame_type=QuicFrameType.CRYPTO, <add> reason_phrase="active_connection_id_limit must be no less than 2", <add> )
# module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: <0> quic_transport_parameters = pull_quic_transport_parameters( <1> Buffer(data=data), protocol_version=self._version <2> ) <3> <4> # log event <5> if self._quic_logger is not None and not from_session_ticket: <6> self._quic_logger.log_event( <7> category="transport", <8> event="parameters_set", <9> data=self._quic_logger.encode_transport_parameters( <10> owner="remote", parameters=quic_transport_parameters <11> ), <12> ) <13> <14> # validate remote parameters <15> if ( <16> self._is_client <17> and not from_session_ticket <18> and ( <19> quic_transport_parameters.original_connection_id <20> != self._original_connection_id <21> ) <22> ): <23> raise QuicConnectionError( <24> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <25> frame_type=QuicFrameType.CRYPTO, <26> reason_phrase="original_connection_id does not match", <27> ) <28> <29> # store remote parameters <30> if quic_transport_parameters.ack_delay_exponent is not None: <31> self._remote_ack_delay_exponent = self._remote_ack_delay_exponent <32> if quic_transport_parameters.active_connection_id_limit is not None: <33> self._remote_active_connection_id_limit = ( <34> quic_transport_parameters.active_connection_id_limit <35> ) <36> if quic_transport_parameters.idle_timeout is not None: <37> self._remote_idle_timeout = quic_transport_parameters.idle_timeout / 1000.0 <38> if quic_transport_parameters.max_ack_delay is not None: <39> self._loss.max_ack_delay = quic</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========unchanged ref 0=========== at: aioquic.quic.connection QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str) at: aioquic.quic.connection.QuicConnection.__init__ self._is_client = configuration.is_client self._original_connection_id = original_connection_id self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=logger_connection_id ) self._remote_ack_delay_exponent = 3 self._remote_active_connection_id_limit = 0 self._remote_idle_timeout = 0.0 # seconds self._version: Optional[int] = None at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None at: aioquic.quic.connection.QuicConnection.connect self._version = self._configuration.supported_versions[0] at: aioquic.quic.connection.QuicConnection.receive_datagram self._version = QuicProtocolVersion(header.version) self._version = QuicProtocolVersion(max(common)) self._original_connection_id = self._peer_cid ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_parse_transport_parameters(self): + client = create_standalone_client(self) + + buf = Buffer(capacity=32) + push_quic_transport_parameters( + buf, + QuicTransportParameters(), + protocol_version=QuicProtocolVersion.DRAFT_27, + ) + client._parse_transport_parameters(buf.data) + ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): + client = create_standalone_client(self) + + for active_connection_id_limit in [0, 1]: + buf = Buffer(capacity=32) + push_quic_transport_parameters( + buf, + QuicTransportParameters(active_connection_id_limit=active_connection_id_limit), + protocol_version=QuicProtocolVersion.DRAFT_27, + ) + with self.assertRaises(QuicConnectionError) as cm: + client._parse_transport_parameters(buf.data) + self.assertEqual(cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR) + self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) + self.assertEqual(cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2") +
aioquic.quic.connection/QuicConnection._parse_transport_parameters
Modified
aiortc~aioquic
86a54f3822e43db15c5661e6560182fc92317aa1
[connection] do not use some remembered transport parameters
<46>:<add> if not from_session_ticket: <add> if quic_transport_parameters.ack_delay_exponent is not None: <del> if quic_
# module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: <0> """ <1> Parse and apply remote transport parameters. <2> <3> `from_session_ticket` is `True` when restoring saved transport parameters, <4> and `False` when handling received transport parameters. <5> """ <6> <7> quic_transport_parameters = pull_quic_transport_parameters( <8> Buffer(data=data), protocol_version=self._version <9> ) <10> <11> # log event <12> if self._quic_logger is not None and not from_session_ticket: <13> self._quic_logger.log_event( <14> category="transport", <15> event="parameters_set", <16> data=self._quic_logger.encode_transport_parameters( <17> owner="remote", parameters=quic_transport_parameters <18> ), <19> ) <20> <21> # validate remote parameters <22> if ( <23> self._is_client <24> and not from_session_ticket <25> and ( <26> quic_transport_parameters.original_connection_id <27> != self._original_connection_id <28> ) <29> ): <30> raise QuicConnectionError( <31> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <32> frame_type=QuicFrameType.CRYPTO, <33> reason_phrase="original_connection_id does not match", <34> ) <35> if ( <36> quic_transport_parameters.active_connection_id_limit is not None <37> and quic_transport_parameters.active_connection_id_limit < 2 <38> ): <39> raise QuicConnectionError( <40> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <41> frame_type=QuicFrameType.CRYPTO, <42> reason_phrase="active_connection_id_limit must be no less than 2", <43> ) <44> <45> # store remote parameters <46> if quic_</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) if quic_transport_parameters.idle_timeout is not None: self._remote_idle_timeout = quic_transport_parameters.idle_timeout / 1000.0 if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = quic_transport_parameters.max_ack_delay / 1000.0 self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========unchanged ref 0=========== at: aioquic.quic.connection QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str) at: aioquic.quic.connection.QuicConnection.__init__ self._is_client = configuration.is_client self._original_connection_id = original_connection_id self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=logger_connection_id ) self._remote_ack_delay_exponent = 3 self._remote_active_connection_id_limit = 0 self._remote_idle_timeout = 0.0 # seconds self._remote_max_datagram_frame_size: Optional[int] = None self._version: Optional[int] = None self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None at: aioquic.quic.connection.QuicConnection.connect self._version = self._configuration.supported_versions[0] at: aioquic.quic.connection.QuicConnection.receive_datagram self._version = QuicProtocolVersion(header.version) self._version = QuicProtocolVersion(max(common)) self._original_connection_id = self._peer_cid
aioquic.quic.connection/QuicConnection.datagrams_to_send
Modified
aiortc~aioquic
b9adb51db62a73e60c0ea784925654159a28a2df
[connection] convert CONNECTION_CLOSE of type 0x1D to 0x1C
<36>:<add> epoch=epoch,
# module: aioquic.quic.connection class QuicConnection: def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]: <0> """ <1> Return a list of `(data, addr)` tuples of datagrams which need to be <2> sent, and the network address to which they need to be sent. <3> <4> After calling this method call :meth:`get_timer` to know when the next <5> timer needs to be set. <6> <7> :param now: The current time. <8> """ <9> network_path = self._network_paths[0] <10> <11> if self._state in END_STATES: <12> return [] <13> <14> # build datagrams <15> builder = QuicPacketBuilder( <16> host_cid=self.host_cid, <17> is_client=self._is_client, <18> packet_number=self._packet_number, <19> peer_cid=self._peer_cid, <20> peer_token=self._peer_token, <21> quic_logger=self._quic_logger, <22> spin_bit=self._spin_bit, <23> version=self._version, <24> ) <25> if self._close_pending: <26> for epoch, packet_type in ( <27> (tls.Epoch.ONE_RTT, PACKET_TYPE_ONE_RTT), <28> (tls.Epoch.HANDSHAKE, PACKET_TYPE_HANDSHAKE), <29> (tls.Epoch.INITIAL, PACKET_TYPE_INITIAL), <30> ): <31> crypto = self._cryptos[epoch] <32> if crypto.send.is_valid(): <33> builder.start_packet(packet_type, crypto) <34> self._write_connection_close_frame( <35> builder=builder, <36> error_code=self._close_event.error_code, <37> frame_type=self._close_event.frame_type, <38> reason_phrase=self._close_event.reason_phrase, <39> ) <40> self._close_pending = False <41> </s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]: # offset: 1 self._close_begin(is_initiator=True, now=now) else: # congestion control builder.max_flight_bytes = ( self._loss.congestion_window - self._loss.bytes_in_flight ) if self._probe_pending and builder.max_flight_bytes < PACKET_MAX_SIZE: builder.max_flight_bytes = PACKET_MAX_SIZE # limit data on un-validated network paths if not network_path.is_validated: builder.max_total_bytes = ( network_path.bytes_received * 3 - network_path.bytes_sent ) try: if not self._handshake_confirmed: for epoch in [tls.Epoch.INITIAL, tls.Epoch.HANDSHAKE]: self._write_handshake(builder, epoch, now) self._write_application(builder, network_path, now) except QuicPacketBuilderStop: pass datagrams, packets = builder.flush() if datagrams: self._packet_number = builder.packet_number # register packets sent_handshake = False for packet in packets: packet.sent_time = now self._loss.on_packet_sent( packet=packet, space=self._spaces[packet.epoch] ) if packet.epoch == tls.Epoch.HANDSHAKE: sent_handshake = True # log packet if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="packet_sent", data={ "packet_type": self._quic_logger.packet_type( packet.packet_type ), "header": { "packet_number": str(packet.packet_number),</s> ===========below chunk 1=========== # module: aioquic.quic.connection class QuicConnection: def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]: # offset: 2 <s> packet.packet_type ), "header": { "packet_number": str(packet.packet_number), "packet_size": packet.sent_bytes, "scid": dump_cid(self.host_cid) if is_long_header(packet.packet_type) else "", "dcid": dump_cid(self._peer_cid), }, "frames": packet.quic_logger_frames, }, ) # check if we can discard initial keys if sent_handshake and self._is_client: self._discard_epoch(tls.Epoch.INITIAL) # return datagrams to send and the destination network address ret = [] for datagram in datagrams: byte_length = len(datagram) network_path.bytes_sent += byte_length ret.append((datagram, network_path.addr)) if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="datagrams_sent", data={"byte_length": byte_length, "count": 1}, ) return ret ===========unchanged ref 0=========== at: aioquic.quic.connection NetworkAddress = Any dump_cid(cid: bytes) -> str END_STATES = frozenset( [ QuicConnectionState.CLOSING, QuicConnectionState.DRAINING, QuicConnectionState.TERMINATED, ] ) at: aioquic.quic.connection.QuicConnection _close_begin(is_initiator: bool, now: float) -> None _discard_epoch(epoch: tls.Epoch) -> None _write_application(builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float) -> None _write_handshake(builder: QuicPacketBuilder, epoch: tls.Epoch, now: float) -> None _write_connection_close_frame(builder: QuicPacketBuilder, epoch: tls.Epoch, error_code: int, frame_type: Optional[int], reason_phrase: str) -> None _write_connection_close_frame(self, builder: QuicPacketBuilder, epoch: tls.Epoch, error_code: int, frame_type: Optional[int], reason_phrase: str) -> None at: aioquic.quic.connection.QuicConnection.__init__ self._is_client = configuration.is_client self._close_event: Optional[events.ConnectionTerminated] = None self._cryptos: Dict[tls.Epoch, CryptoPair] = {} self._handshake_confirmed = False self.host_cid = self._host_cids[0].cid self._network_paths: List[QuicNetworkPath] = [] self._packet_number = 0 self._peer_cid = os.urandom(configuration.connection_id_length) self._peer_token = b"" self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=logger_connection_id ) ===========unchanged ref 1=========== self._spaces: Dict[tls.Epoch, QuicPacketSpace] = {} self._spin_bit = False self._state = QuicConnectionState.FIRSTFLIGHT self._version: Optional[int] = None self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) self._close_pending = False self._probe_pending = False at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None at: aioquic.quic.connection.QuicConnection._handle_connection_close_frame self._close_event = events.ConnectionTerminated( error_code=error_code, frame_type=frame_type, reason_phrase=reason_phrase ) at: aioquic.quic.connection.QuicConnection._handle_crypto_frame self._handshake_confirmed = True at: aioquic.quic.connection.QuicConnection._handle_handshake_done_frame self._handshake_confirmed = True at: aioquic.quic.connection.QuicConnection._initialize self._cryptos = { tls.Epoch.INITIAL: CryptoPair(), tls.Epoch.ZERO_RTT: CryptoPair(), tls.Epoch.HANDSHAKE: CryptoPair(), tls.Epoch.ONE_RTT: CryptoPair(), } self._spaces = { tls.Epoch.INITIAL: QuicPacketSpace(), tls.Epoch.HANDSHAKE: QuicPacketSpace(), tls.Epoch.ONE_RTT: QuicPacketSpace(), } self._packet_number = 0 at: aioquic.quic.connection.QuicConnection._send_probe self._probe_pending = True at: aioquic.quic.connection.QuicConnection._set_state self._state = state
aioquic.quic.connection/QuicConnection._write_connection_close_frame
Modified
aiortc~aioquic
b9adb51db62a73e60c0ea784925654159a28a2df
[connection] convert CONNECTION_CLOSE of type 0x1D to 0x1C
<0>:<add> # convert application-level close to transport-level close in early stages <add> if frame_type is None and epoch in (tls.Epoch.INITIAL, tls.Epoch.HANDSHAKE): <add> error_code = QuicErrorCode.APPLICATION_ERROR <add> frame_type = QuicFrameType.PADDING <add> reason_phrase = "" <add>
# module: aioquic.quic.connection class QuicConnection: def _write_connection_close_frame( self, builder: QuicPacketBuilder, + epoch: tls.Epoch, error_code: int, frame_type: Optional[int], reason_phrase: str, ) -> None: <0> reason_bytes = reason_phrase.encode("utf8") <1> reason_length = len(reason_bytes) <2> <3> if frame_type is None: <4> buf = builder.start_frame( <5> QuicFrameType.APPLICATION_CLOSE, <6> capacity=APPLICATION_CLOSE_FRAME_CAPACITY + reason_length, <7> ) <8> buf.push_uint_var(error_code) <9> buf.push_uint_var(reason_length) <10> buf.push_bytes(reason_bytes) <11> else: <12> buf = builder.start_frame( <13> QuicFrameType.TRANSPORT_CLOSE, <14> capacity=TRANSPORT_CLOSE_FRAME_CAPACITY + reason_length, <15> ) <16> buf.push_uint_var(error_code) <17> buf.push_uint_var(frame_type) <18> buf.push_uint_var(reason_length) <19> buf.push_bytes(reason_bytes) <20> <21> # log frame <22> if self._quic_logger is not None: <23> builder.quic_logger_frames.append( <24> self._quic_logger.encode_connection_close_frame( <25> error_code=error_code, <26> frame_type=frame_type, <27> reason_phrase=reason_phrase, <28> ) <29> ) <30>
===========unchanged ref 0=========== at: aioquic.quic.connection APPLICATION_CLOSE_FRAME_CAPACITY = 1 + 8 + 8 # + reason length TRANSPORT_CLOSE_FRAME_CAPACITY = 1 + 8 + 8 + 8 # + reason length ===========changed ref 0=========== # module: aioquic.quic.packet class QuicErrorCode(IntEnum): NO_ERROR = 0x0 INTERNAL_ERROR = 0x1 SERVER_BUSY = 0x2 FLOW_CONTROL_ERROR = 0x3 STREAM_LIMIT_ERROR = 0x4 STREAM_STATE_ERROR = 0x5 FINAL_SIZE_ERROR = 0x6 FRAME_ENCODING_ERROR = 0x7 TRANSPORT_PARAMETER_ERROR = 0x8 CONNECTION_ID_LIMIT_ERROR = 0x9 PROTOCOL_VIOLATION = 0xA INVALID_TOKEN = 0xB + APPLICATION_ERROR = 0xC CRYPTO_BUFFER_EXCEEDED = 0xD CRYPTO_ERROR = 0x100 ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_write_connection_close_early(self): + client = create_standalone_client(self) + + builder = QuicPacketBuilder( + host_cid=client.host_cid, + is_client=True, + peer_cid=client._peer_cid, + version=client._version, + ) + crypto = CryptoPair() + crypto.setup_initial(client.host_cid, is_client=True, version=client._version) + builder.start_packet(PACKET_TYPE_INITIAL, crypto) + client._write_connection_close_frame( + builder=builder, + epoch=tls.Epoch.INITIAL, + error_code=123, + frame_type=None, + reason_phrase="some reason", + ) + + self.assertEqual( + builder.quic_logger_frames, + [ + { + "error_code": QuicErrorCode.APPLICATION_ERROR, + "error_space": "transport", + "frame_type": "connection_close", + "raw_error_code": QuicErrorCode.APPLICATION_ERROR, + "reason": "", + "trigger_frame_type": QuicFrameType.PADDING, + } + ], + ) + ===========changed ref 2=========== # module: aioquic.quic.connection class QuicConnection: def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]: """ Return a list of `(data, addr)` tuples of datagrams which need to be sent, and the network address to which they need to be sent. After calling this method call :meth:`get_timer` to know when the next timer needs to be set. :param now: The current time. """ network_path = self._network_paths[0] if self._state in END_STATES: return [] # build datagrams builder = QuicPacketBuilder( host_cid=self.host_cid, is_client=self._is_client, packet_number=self._packet_number, peer_cid=self._peer_cid, peer_token=self._peer_token, quic_logger=self._quic_logger, spin_bit=self._spin_bit, version=self._version, ) if self._close_pending: for epoch, packet_type in ( (tls.Epoch.ONE_RTT, PACKET_TYPE_ONE_RTT), (tls.Epoch.HANDSHAKE, PACKET_TYPE_HANDSHAKE), (tls.Epoch.INITIAL, PACKET_TYPE_INITIAL), ): crypto = self._cryptos[epoch] if crypto.send.is_valid(): builder.start_packet(packet_type, crypto) self._write_connection_close_frame( builder=builder, + epoch=epoch, error_code=self._close_event.error_code, frame_type=self._close_event.frame_type, reason_phrase=self._close_event.reason_phrase, ) self._close_pending = False break self._close_begin(is_initiator=True, now=now) else: # congestion control builder.</s> ===========changed ref 3=========== # module: aioquic.quic.connection class QuicConnection: def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]: # offset: 1 <s>close_begin(is_initiator=True, now=now) else: # congestion control builder.max_flight_bytes = ( self._loss.congestion_window - self._loss.bytes_in_flight ) if self._probe_pending and builder.max_flight_bytes < PACKET_MAX_SIZE: builder.max_flight_bytes = PACKET_MAX_SIZE # limit data on un-validated network paths if not network_path.is_validated: builder.max_total_bytes = ( network_path.bytes_received * 3 - network_path.bytes_sent ) try: if not self._handshake_confirmed: for epoch in [tls.Epoch.INITIAL, tls.Epoch.HANDSHAKE]: self._write_handshake(builder, epoch, now) self._write_application(builder, network_path, now) except QuicPacketBuilderStop: pass datagrams, packets = builder.flush() if datagrams: self._packet_number = builder.packet_number # register packets sent_handshake = False for packet in packets: packet.sent_time = now self._loss.on_packet_sent( packet=packet, space=self._spaces[packet.epoch] ) if packet.epoch == tls.Epoch.HANDSHAKE: sent_handshake = True # log packet if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="packet_sent", data={ "packet_type": self._quic_logger.packet_type( </s> ===========changed ref 4=========== # module: aioquic.quic.connection class QuicConnection: def datagrams_to_send(self, now: float) -> List[Tuple[bytes, NetworkAddress]]: # offset: 2 <s>packet_type ), "header": { "packet_number": str(packet.packet_number), "packet_size": packet.sent_bytes, "scid": dump_cid(self.host_cid) if is_long_header(packet.packet_type) else "", "dcid": dump_cid(self._peer_cid), }, "frames": packet.quic_logger_frames, }, ) # check if we can discard initial keys if sent_handshake and self._is_client: self._discard_epoch(tls.Epoch.INITIAL) # return datagrams to send and the destination network address ret = [] for datagram in datagrams: byte_length = len(datagram) network_path.bytes_sent += byte_length ret.append((datagram, network_path.addr)) if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="datagrams_sent", data={"byte_length": byte_length, "count": 1}, ) return ret
tests.test_packet/ParamsTest.test_params
Modified
aiortc~aioquic
acf5133b0a3c5e02a5fce79a806e6522a2baae2d
[parameters] rename 'max_packet_size' to 'max_udp_payload_size'
<15>:<add> max_udp_payload_size=2020, <del> max_packet_size=2020,
# module: tests.test_packet class ParamsTest(TestCase): def test_params(self): <0> data = binascii.unhexlify( <1> "010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff" <2> "a05048000ffff06048000ffff0801060a01030b0119" <3> ) <4> <5> # parse <6> buf = Buffer(data=data) <7> params = pull_quic_transport_parameters( <8> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <9> ) <10> self.assertEqual( <11> params, <12> QuicTransportParameters( <13> idle_timeout=10000, <14> stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", <15> max_packet_size=2020, <16> initial_max_data=393210, <17> initial_max_stream_data_bidi_local=65535, <18> initial_max_stream_data_bidi_remote=65535, <19> initial_max_stream_data_uni=None, <20> initial_max_streams_bidi=6, <21> initial_max_streams_uni=None, <22> ack_delay_exponent=3, <23> max_ack_delay=25, <24> ), <25> ) <26> <27> # serialize <28> buf = Buffer(capacity=len(data)) <29> push_quic_transport_parameters( <30> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 <31> ) <32> self.assertEqual(len(buf.data), len(data)) <33>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.test_packet.ParamsTest maxDiff = None at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: aioquic.quic.packet PARAMS = { 0: ("original_connection_id", bytes), 1: ("idle_timeout", int), 2: ("stateless_reset_token", bytes), + 3: ("max_udp_payload_size", int), - 3: ("max_packet_size", int), 4: ("initial_max_data", int), 5: ("initial_max_stream_data_bidi_local", int), 6: ("initial_max_stream_data_bidi_remote", int), 7: ("initial_max_stream_data_uni", int), 8: ("initial_max_streams_bidi", int), 9: ("initial_max_streams_uni", int), 10: ("ack_delay_exponent", int), 11: ("max_ack_delay", int), 12: ("disable_active_migration", bool), 13: ("preferred_address", QuicPreferredAddress), 14: ("active_connection_id_limit", int), 32: ("max_datagram_frame_size", int), 3127: ("quantum_readiness", bytes), } ===========changed ref 1=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: original_connection_id: Optional[bytes] = None idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None + max_udp_payload_size: Optional[int] = None - max_packet_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None
tests.test_packet/ParamsTest.test_params_legacy
Modified
aiortc~aioquic
acf5133b0a3c5e02a5fce79a806e6522a2baae2d
[parameters] rename 'max_packet_size' to 'max_udp_payload_size'
<16>:<add> max_udp_payload_size=2020, <del> max_packet_size=2020,
# module: tests.test_packet class ParamsTest(TestCase): def test_params_legacy(self): <0> data = binascii.unhexlify( <1> "004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026" <2> "710000600048000ffff000500048000ffff000400048005fffa000a00010300" <3> "0b0001190003000247e4" <4> ) <5> <6> # parse <7> buf = Buffer(data=data) <8> params = pull_quic_transport_parameters( <9> buf, protocol_version=QuicProtocolVersion.DRAFT_25 <10> ) <11> self.assertEqual( <12> params, <13> QuicTransportParameters( <14> idle_timeout=10000, <15> stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", <16> max_packet_size=2020, <17> initial_max_data=393210, <18> initial_max_stream_data_bidi_local=65535, <19> initial_max_stream_data_bidi_remote=65535, <20> initial_max_stream_data_uni=None, <21> initial_max_streams_bidi=6, <22> initial_max_streams_uni=None, <23> ack_delay_exponent=3, <24> max_ack_delay=25, <25> ), <26> ) <27> <28> # serialize <29> buf = Buffer(capacity=len(data)) <30> push_quic_transport_parameters( <31> buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 <32> ) <33> self.assertEqual(len(buf.data), len(data)) <34>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params(self): data = binascii.unhexlify( "010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff" "a05048000ffff06048000ffff0801060a01030b0119" ) # parse buf = Buffer(data=data) params = pull_quic_transport_parameters( buf, protocol_version=QuicProtocolVersion.DRAFT_27 ) self.assertEqual( params, QuicTransportParameters( idle_timeout=10000, stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", + max_udp_payload_size=2020, - max_packet_size=2020, initial_max_data=393210, initial_max_stream_data_bidi_local=65535, initial_max_stream_data_bidi_remote=65535, initial_max_stream_data_uni=None, initial_max_streams_bidi=6, initial_max_streams_uni=None, ack_delay_exponent=3, max_ack_delay=25, ), ) # serialize buf = Buffer(capacity=len(data)) push_quic_transport_parameters( buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 ) self.assertEqual(len(buf.data), len(data)) ===========changed ref 1=========== # module: aioquic.quic.packet PARAMS = { 0: ("original_connection_id", bytes), 1: ("idle_timeout", int), 2: ("stateless_reset_token", bytes), + 3: ("max_udp_payload_size", int), - 3: ("max_packet_size", int), 4: ("initial_max_data", int), 5: ("initial_max_stream_data_bidi_local", int), 6: ("initial_max_stream_data_bidi_remote", int), 7: ("initial_max_stream_data_uni", int), 8: ("initial_max_streams_bidi", int), 9: ("initial_max_streams_uni", int), 10: ("ack_delay_exponent", int), 11: ("max_ack_delay", int), 12: ("disable_active_migration", bool), 13: ("preferred_address", QuicPreferredAddress), 14: ("active_connection_id_limit", int), 32: ("max_datagram_frame_size", int), 3127: ("quantum_readiness", bytes), } ===========changed ref 2=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: original_connection_id: Optional[bytes] = None idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None + max_udp_payload_size: Optional[int] = None - max_packet_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None
tests.test_packet/ParamsTest.test_params_unknown_legacy
Modified
aiortc~aioquic
acf5133b0a3c5e02a5fce79a806e6522a2baae2d
[parameters] rename 'max_packet_size' to 'max_udp_payload_size'
<18>:<add> max_udp_payload_size=4096, <del> max_packet_size=4096,
# module: tests.test_packet class ParamsTest(TestCase): def test_params_unknown_legacy(self): <0> # fb.mvfst.net sends a proprietary parameter 65280 <1> data = binascii.unhexlify( <2> "006400050004800104000006000480010400000700048001040000040004801" <3> "0000000080008c0000000ffffffff00090008c0000000ffffffff0001000480" <4> "00ea60000a00010300030002500000020010616161616262626263636363646" <5> "46464ff00000100" <6> ) <7> <8> # parse <9> buf = Buffer(data=data) <10> params = pull_quic_transport_parameters( <11> buf, protocol_version=QuicProtocolVersion.DRAFT_25 <12> ) <13> self.assertEqual( <14> params, <15> QuicTransportParameters( <16> idle_timeout=60000, <17> stateless_reset_token=b"aaaabbbbccccdddd", <18> max_packet_size=4096, <19> initial_max_data=1048576, <20> initial_max_stream_data_bidi_local=66560, <21> initial_max_stream_data_bidi_remote=66560, <22> initial_max_stream_data_uni=66560, <23> initial_max_streams_bidi=4294967295, <24> initial_max_streams_uni=4294967295, <25> ack_delay_exponent=3, <26> ), <27> ) <28>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params_legacy(self): data = binascii.unhexlify( "004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026" "710000600048000ffff000500048000ffff000400048005fffa000a00010300" "0b0001190003000247e4" ) # parse buf = Buffer(data=data) params = pull_quic_transport_parameters( buf, protocol_version=QuicProtocolVersion.DRAFT_25 ) self.assertEqual( params, QuicTransportParameters( idle_timeout=10000, stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", + max_udp_payload_size=2020, - max_packet_size=2020, initial_max_data=393210, initial_max_stream_data_bidi_local=65535, initial_max_stream_data_bidi_remote=65535, initial_max_stream_data_uni=None, initial_max_streams_bidi=6, initial_max_streams_uni=None, ack_delay_exponent=3, max_ack_delay=25, ), ) # serialize buf = Buffer(capacity=len(data)) push_quic_transport_parameters( buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 ) self.assertEqual(len(buf.data), len(data)) ===========changed ref 1=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params(self): data = binascii.unhexlify( "010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff" "a05048000ffff06048000ffff0801060a01030b0119" ) # parse buf = Buffer(data=data) params = pull_quic_transport_parameters( buf, protocol_version=QuicProtocolVersion.DRAFT_27 ) self.assertEqual( params, QuicTransportParameters( idle_timeout=10000, stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", + max_udp_payload_size=2020, - max_packet_size=2020, initial_max_data=393210, initial_max_stream_data_bidi_local=65535, initial_max_stream_data_bidi_remote=65535, initial_max_stream_data_uni=None, initial_max_streams_bidi=6, initial_max_streams_uni=None, ack_delay_exponent=3, max_ack_delay=25, ), ) # serialize buf = Buffer(capacity=len(data)) push_quic_transport_parameters( buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 ) self.assertEqual(len(buf.data), len(data)) ===========changed ref 2=========== # module: aioquic.quic.packet PARAMS = { 0: ("original_connection_id", bytes), 1: ("idle_timeout", int), 2: ("stateless_reset_token", bytes), + 3: ("max_udp_payload_size", int), - 3: ("max_packet_size", int), 4: ("initial_max_data", int), 5: ("initial_max_stream_data_bidi_local", int), 6: ("initial_max_stream_data_bidi_remote", int), 7: ("initial_max_stream_data_uni", int), 8: ("initial_max_streams_bidi", int), 9: ("initial_max_streams_uni", int), 10: ("ack_delay_exponent", int), 11: ("max_ack_delay", int), 12: ("disable_active_migration", bool), 13: ("preferred_address", QuicPreferredAddress), 14: ("active_connection_id_limit", int), 32: ("max_datagram_frame_size", int), 3127: ("quantum_readiness", bytes), } ===========changed ref 3=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: original_connection_id: Optional[bytes] = None idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None + max_udp_payload_size: Optional[int] = None - max_packet_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None
tests.test_packet/ParamsTest.test_params
Modified
aiortc~aioquic
e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1
[parameters] rename 'idle_timeout' to 'max_idle_timeout'
<13>:<add> max_idle_timeout=10000, <del> idle_timeout=10000,
# module: tests.test_packet class ParamsTest(TestCase): def test_params(self): <0> data = binascii.unhexlify( <1> "010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff" <2> "a05048000ffff06048000ffff0801060a01030b0119" <3> ) <4> <5> # parse <6> buf = Buffer(data=data) <7> params = pull_quic_transport_parameters( <8> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <9> ) <10> self.assertEqual( <11> params, <12> QuicTransportParameters( <13> idle_timeout=10000, <14> stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", <15> max_udp_payload_size=2020, <16> initial_max_data=393210, <17> initial_max_stream_data_bidi_local=65535, <18> initial_max_stream_data_bidi_remote=65535, <19> initial_max_stream_data_uni=None, <20> initial_max_streams_bidi=6, <21> initial_max_streams_uni=None, <22> ack_delay_exponent=3, <23> max_ack_delay=25, <24> ), <25> ) <26> <27> # serialize <28> buf = Buffer(capacity=len(data)) <29> push_quic_transport_parameters( <30> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 <31> ) <32> self.assertEqual(len(buf.data), len(data)) <33>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.test_packet.ParamsTest maxDiff = None at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: aioquic.quic.packet PARAMS = { 0: ("original_connection_id", bytes), + 1: ("max_idle_timeout", int), - 1: ("idle_timeout", int), 2: ("stateless_reset_token", bytes), 3: ("max_udp_payload_size", int), 4: ("initial_max_data", int), 5: ("initial_max_stream_data_bidi_local", int), 6: ("initial_max_stream_data_bidi_remote", int), 7: ("initial_max_stream_data_uni", int), 8: ("initial_max_streams_bidi", int), 9: ("initial_max_streams_uni", int), 10: ("ack_delay_exponent", int), 11: ("max_ack_delay", int), 12: ("disable_active_migration", bool), 13: ("preferred_address", QuicPreferredAddress), 14: ("active_connection_id_limit", int), 32: ("max_datagram_frame_size", int), 3127: ("quantum_readiness", bytes), } ===========changed ref 1=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: original_connection_id: Optional[bytes] = None + max_idle_timeout: Optional[int] = None - idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None
tests.test_packet/ParamsTest.test_params_legacy
Modified
aiortc~aioquic
e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1
[parameters] rename 'idle_timeout' to 'max_idle_timeout'
<14>:<add> max_idle_timeout=10000, <del> idle_timeout=10000,
# module: tests.test_packet class ParamsTest(TestCase): def test_params_legacy(self): <0> data = binascii.unhexlify( <1> "004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026" <2> "710000600048000ffff000500048000ffff000400048005fffa000a00010300" <3> "0b0001190003000247e4" <4> ) <5> <6> # parse <7> buf = Buffer(data=data) <8> params = pull_quic_transport_parameters( <9> buf, protocol_version=QuicProtocolVersion.DRAFT_25 <10> ) <11> self.assertEqual( <12> params, <13> QuicTransportParameters( <14> idle_timeout=10000, <15> stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", <16> max_udp_payload_size=2020, <17> initial_max_data=393210, <18> initial_max_stream_data_bidi_local=65535, <19> initial_max_stream_data_bidi_remote=65535, <20> initial_max_stream_data_uni=None, <21> initial_max_streams_bidi=6, <22> initial_max_streams_uni=None, <23> ack_delay_exponent=3, <24> max_ack_delay=25, <25> ), <26> ) <27> <28> # serialize <29> buf = Buffer(capacity=len(data)) <30> push_quic_transport_parameters( <31> buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 <32> ) <33> self.assertEqual(len(buf.data), len(data)) <34>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params(self): data = binascii.unhexlify( "010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff" "a05048000ffff06048000ffff0801060a01030b0119" ) # parse buf = Buffer(data=data) params = pull_quic_transport_parameters( buf, protocol_version=QuicProtocolVersion.DRAFT_27 ) self.assertEqual( params, QuicTransportParameters( + max_idle_timeout=10000, - idle_timeout=10000, stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", max_udp_payload_size=2020, initial_max_data=393210, initial_max_stream_data_bidi_local=65535, initial_max_stream_data_bidi_remote=65535, initial_max_stream_data_uni=None, initial_max_streams_bidi=6, initial_max_streams_uni=None, ack_delay_exponent=3, max_ack_delay=25, ), ) # serialize buf = Buffer(capacity=len(data)) push_quic_transport_parameters( buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 ) self.assertEqual(len(buf.data), len(data)) ===========changed ref 1=========== # module: aioquic.quic.packet PARAMS = { 0: ("original_connection_id", bytes), + 1: ("max_idle_timeout", int), - 1: ("idle_timeout", int), 2: ("stateless_reset_token", bytes), 3: ("max_udp_payload_size", int), 4: ("initial_max_data", int), 5: ("initial_max_stream_data_bidi_local", int), 6: ("initial_max_stream_data_bidi_remote", int), 7: ("initial_max_stream_data_uni", int), 8: ("initial_max_streams_bidi", int), 9: ("initial_max_streams_uni", int), 10: ("ack_delay_exponent", int), 11: ("max_ack_delay", int), 12: ("disable_active_migration", bool), 13: ("preferred_address", QuicPreferredAddress), 14: ("active_connection_id_limit", int), 32: ("max_datagram_frame_size", int), 3127: ("quantum_readiness", bytes), } ===========changed ref 2=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: original_connection_id: Optional[bytes] = None + max_idle_timeout: Optional[int] = None - idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None
tests.test_packet/ParamsTest.test_params_unknown_legacy
Modified
aiortc~aioquic
e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1
[parameters] rename 'idle_timeout' to 'max_idle_timeout'
<16>:<add> max_idle_timeout=60000, <del> idle_timeout=60000,
# module: tests.test_packet class ParamsTest(TestCase): def test_params_unknown_legacy(self): <0> # fb.mvfst.net sends a proprietary parameter 65280 <1> data = binascii.unhexlify( <2> "006400050004800104000006000480010400000700048001040000040004801" <3> "0000000080008c0000000ffffffff00090008c0000000ffffffff0001000480" <4> "00ea60000a00010300030002500000020010616161616262626263636363646" <5> "46464ff00000100" <6> ) <7> <8> # parse <9> buf = Buffer(data=data) <10> params = pull_quic_transport_parameters( <11> buf, protocol_version=QuicProtocolVersion.DRAFT_25 <12> ) <13> self.assertEqual( <14> params, <15> QuicTransportParameters( <16> idle_timeout=60000, <17> stateless_reset_token=b"aaaabbbbccccdddd", <18> max_udp_payload_size=4096, <19> initial_max_data=1048576, <20> initial_max_stream_data_bidi_local=66560, <21> initial_max_stream_data_bidi_remote=66560, <22> initial_max_stream_data_uni=66560, <23> initial_max_streams_bidi=4294967295, <24> initial_max_streams_uni=4294967295, <25> ack_delay_exponent=3, <26> ), <27> ) <28>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params_legacy(self): data = binascii.unhexlify( "004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026" "710000600048000ffff000500048000ffff000400048005fffa000a00010300" "0b0001190003000247e4" ) # parse buf = Buffer(data=data) params = pull_quic_transport_parameters( buf, protocol_version=QuicProtocolVersion.DRAFT_25 ) self.assertEqual( params, QuicTransportParameters( + max_idle_timeout=10000, - idle_timeout=10000, stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", max_udp_payload_size=2020, initial_max_data=393210, initial_max_stream_data_bidi_local=65535, initial_max_stream_data_bidi_remote=65535, initial_max_stream_data_uni=None, initial_max_streams_bidi=6, initial_max_streams_uni=None, ack_delay_exponent=3, max_ack_delay=25, ), ) # serialize buf = Buffer(capacity=len(data)) push_quic_transport_parameters( buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 ) self.assertEqual(len(buf.data), len(data)) ===========changed ref 1=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params(self): data = binascii.unhexlify( "010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff" "a05048000ffff06048000ffff0801060a01030b0119" ) # parse buf = Buffer(data=data) params = pull_quic_transport_parameters( buf, protocol_version=QuicProtocolVersion.DRAFT_27 ) self.assertEqual( params, QuicTransportParameters( + max_idle_timeout=10000, - idle_timeout=10000, stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", max_udp_payload_size=2020, initial_max_data=393210, initial_max_stream_data_bidi_local=65535, initial_max_stream_data_bidi_remote=65535, initial_max_stream_data_uni=None, initial_max_streams_bidi=6, initial_max_streams_uni=None, ack_delay_exponent=3, max_ack_delay=25, ), ) # serialize buf = Buffer(capacity=len(data)) push_quic_transport_parameters( buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 ) self.assertEqual(len(buf.data), len(data)) ===========changed ref 2=========== # module: aioquic.quic.packet PARAMS = { 0: ("original_connection_id", bytes), + 1: ("max_idle_timeout", int), - 1: ("idle_timeout", int), 2: ("stateless_reset_token", bytes), 3: ("max_udp_payload_size", int), 4: ("initial_max_data", int), 5: ("initial_max_stream_data_bidi_local", int), 6: ("initial_max_stream_data_bidi_remote", int), 7: ("initial_max_stream_data_uni", int), 8: ("initial_max_streams_bidi", int), 9: ("initial_max_streams_uni", int), 10: ("ack_delay_exponent", int), 11: ("max_ack_delay", int), 12: ("disable_active_migration", bool), 13: ("preferred_address", QuicPreferredAddress), 14: ("active_connection_id_limit", int), 32: ("max_datagram_frame_size", int), 3127: ("quantum_readiness", bytes), } ===========changed ref 3=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: original_connection_id: Optional[bytes] = None + max_idle_timeout: Optional[int] = None - idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None
aioquic.quic.connection/QuicConnection._parse_transport_parameters
Modified
aiortc~aioquic
e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1
[parameters] rename 'idle_timeout' to 'max_idle_timeout'
# module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: <0> """ <1> Parse and apply remote transport parameters. <2> <3> `from_session_ticket` is `True` when restoring saved transport parameters, <4> and `False` when handling received transport parameters. <5> """ <6> <7> quic_transport_parameters = pull_quic_transport_parameters( <8> Buffer(data=data), protocol_version=self._version <9> ) <10> <11> # log event <12> if self._quic_logger is not None and not from_session_ticket: <13> self._quic_logger.log_event( <14> category="transport", <15> event="parameters_set", <16> data=self._quic_logger.encode_transport_parameters( <17> owner="remote", parameters=quic_transport_parameters <18> ), <19> ) <20> <21> # validate remote parameters <22> if ( <23> self._is_client <24> and not from_session_ticket <25> and ( <26> quic_transport_parameters.original_connection_id <27> != self._original_connection_id <28> ) <29> ): <30> raise QuicConnectionError( <31> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <32> frame_type=QuicFrameType.CRYPTO, <33> reason_phrase="original_connection_id does not match", <34> ) <35> if ( <36> quic_transport_parameters.active_connection_id_limit is not None <37> and quic_transport_parameters.active_connection_id_limit < 2 <38> ): <39> raise QuicConnectionError( <40> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <41> frame_type=QuicFrameType.CRYPTO, <42> reason_phrase="active_connection_id_limit must be no less than 2", <43> ) <44> <45> # store remote parameters <46> if not from_</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 if quic_transport_parameters.ack_delay_exponent is not None: self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = ( quic_transport_parameters.max_ack_delay / 1000.0 ) if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) if quic_transport_parameters.idle_timeout is not None: self._remote_idle_timeout = quic_transport_parameters.idle_timeout / 1000.0 self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========unchanged ref 0=========== at: aioquic.quic.connection QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str) at: aioquic.quic.connection.QuicConnection.__init__ self._is_client = configuration.is_client self._original_connection_id = original_connection_id self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=logger_connection_id ) self._remote_ack_delay_exponent = 3 self._remote_active_connection_id_limit = 0 self._remote_max_idle_timeout = 0.0 # seconds self._remote_max_datagram_frame_size: Optional[int] = None self._version: Optional[int] = None self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None at: aioquic.quic.connection.QuicConnection.connect self._version = self._configuration.supported_versions[0] at: aioquic.quic.connection.QuicConnection.receive_datagram self._version = QuicProtocolVersion(header.version) self._version = QuicProtocolVersion(max(common)) self._original_connection_id = self._peer_cid ===========changed ref 0=========== # module: aioquic.quic.packet PARAMS = { 0: ("original_connection_id", bytes), + 1: ("max_idle_timeout", int), - 1: ("idle_timeout", int), 2: ("stateless_reset_token", bytes), 3: ("max_udp_payload_size", int), 4: ("initial_max_data", int), 5: ("initial_max_stream_data_bidi_local", int), 6: ("initial_max_stream_data_bidi_remote", int), 7: ("initial_max_stream_data_uni", int), 8: ("initial_max_streams_bidi", int), 9: ("initial_max_streams_uni", int), 10: ("ack_delay_exponent", int), 11: ("max_ack_delay", int), 12: ("disable_active_migration", bool), 13: ("preferred_address", QuicPreferredAddress), 14: ("active_connection_id_limit", int), 32: ("max_datagram_frame_size", int), 3127: ("quantum_readiness", bytes), } ===========changed ref 1=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: original_connection_id: Optional[bytes] = None + max_idle_timeout: Optional[int] = None - idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None ===========changed ref 2=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params_unknown_legacy(self): # fb.mvfst.net sends a proprietary parameter 65280 data = binascii.unhexlify( "006400050004800104000006000480010400000700048001040000040004801" "0000000080008c0000000ffffffff00090008c0000000ffffffff0001000480" "00ea60000a00010300030002500000020010616161616262626263636363646" "46464ff00000100" ) # parse buf = Buffer(data=data) params = pull_quic_transport_parameters( buf, protocol_version=QuicProtocolVersion.DRAFT_25 ) self.assertEqual( params, QuicTransportParameters( + max_idle_timeout=60000, - idle_timeout=60000, stateless_reset_token=b"aaaabbbbccccdddd", max_udp_payload_size=4096, initial_max_data=1048576, initial_max_stream_data_bidi_local=66560, initial_max_stream_data_bidi_remote=66560, initial_max_stream_data_uni=66560, initial_max_streams_bidi=4294967295, initial_max_streams_uni=4294967295, ack_delay_exponent=3, ), )
aioquic.quic.connection/QuicConnection._serialize_transport_parameters
Modified
aiortc~aioquic
e41ff3ea2a7f5f9bfdb0468dbe4787d89e0fafa1
[parameters] rename 'idle_timeout' to 'max_idle_timeout'
<3>:<add> max_idle_timeout=int(self._configuration.idle_timeout * 1000), <del> idle_timeout=int(self._configuration.idle_timeout * 1000),
# module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: <0> quic_transport_parameters = QuicTransportParameters( <1> ack_delay_exponent=self._local_ack_delay_exponent, <2> active_connection_id_limit=self._local_active_connection_id_limit, <3> idle_timeout=int(self._configuration.idle_timeout * 1000), <4> initial_max_data=self._local_max_data, <5> initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local, <6> initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote, <7> initial_max_stream_data_uni=self._local_max_stream_data_uni, <8> initial_max_streams_bidi=self._local_max_streams_bidi, <9> initial_max_streams_uni=self._local_max_streams_uni, <10> max_ack_delay=25, <11> max_datagram_frame_size=self._configuration.max_datagram_frame_size, <12> quantum_readiness=b"Q" * 1200 <13> if self._configuration.quantum_readiness_test <14> else None, <15> ) <16> if not self._is_client: <17> quic_transport_parameters.original_connection_id = ( <18> self._original_connection_id <19> ) <20> <21> # log event <22> if self._quic_logger is not None: <23> self._quic_logger.log_event( <24> category="transport", <25> event="parameters_set", <26> data=self._quic_logger.encode_transport_parameters( <27> owner="local", parameters=quic_transport_parameters <28> ), <29> ) <30> <31> buf = Buffer(capacity=3 * PACKET_MAX_SIZE) <32> push_quic_transport_parameters( <33> buf, qu</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: # offset: 1 ) return buf.data ===========unchanged ref 0=========== at: aioquic.quic.connection.QuicConnection.__init__ self._configuration = configuration self._is_client = configuration.is_client self._local_ack_delay_exponent = 3 self._local_active_connection_id_limit = 8 self._local_max_data = configuration.max_data self._local_max_stream_data_bidi_local = configuration.max_stream_data self._local_max_stream_data_bidi_remote = configuration.max_stream_data self._local_max_stream_data_uni = configuration.max_stream_data self._local_max_streams_bidi = 128 self._local_max_streams_uni = 128 self._original_connection_id = original_connection_id self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=logger_connection_id ) self._version: Optional[int] = None at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None at: aioquic.quic.connection.QuicConnection._parse_transport_parameters value = getattr(quic_transport_parameters, "initial_" + param) at: aioquic.quic.connection.QuicConnection._write_connection_limits self._local_max_data *= 2 at: aioquic.quic.connection.QuicConnection.connect self._version = self._configuration.supported_versions[0] at: aioquic.quic.connection.QuicConnection.receive_datagram self._version = QuicProtocolVersion(header.version) self._version = QuicProtocolVersion(max(common)) self._original_connection_id = self._peer_cid ===========changed ref 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: """ Parse and apply remote transport parameters. `from_session_ticket` is `True` when restoring saved transport parameters, and `False` when handling received transport parameters. """ quic_transport_parameters = pull_quic_transport_parameters( Buffer(data=data), protocol_version=self._version ) # log event if self._quic_logger is not None and not from_session_ticket: self._quic_logger.log_event( category="transport", event="parameters_set", data=self._quic_logger.encode_transport_parameters( owner="remote", parameters=quic_transport_parameters ), ) # validate remote parameters if ( self._is_client and not from_session_ticket and ( quic_transport_parameters.original_connection_id != self._original_connection_id ) ): raise QuicConnectionError( error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, frame_type=QuicFrameType.CRYPTO, reason_phrase="original_connection_id does not match", ) if ( quic_transport_parameters.active_connection_id_limit is not None and quic_transport_parameters.active_connection_id_limit < 2 ): raise QuicConnectionError( error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, frame_type=QuicFrameType.CRYPTO, reason_phrase="active_connection_id_limit must be no less than 2", ) # store remote parameters if not from_session_ticket: if quic_transport_parameters.ack_delay_exponent is not None: self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if</s> ===========changed ref 1=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 <s>_exponent is not None: self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = ( quic_transport_parameters.max_ack_delay / 1000.0 ) if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) + if quic_transport_parameters.max_idle_timeout is not None: - if quic_transport_parameters.idle_timeout is not None: + self._remote_max_idle_timeout = ( + quic_transport_parameters.max_idle_timeout / 1000.0 - self._remote_idle_timeout = quic_transport_parameters.idle_timeout / 1000.0 + ) self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========changed ref 2=========== # module: aioquic.quic.packet PARAMS = { 0: ("original_connection_id", bytes), + 1: ("max_idle_timeout", int), - 1: ("idle_timeout", int), 2: ("stateless_reset_token", bytes), 3: ("max_udp_payload_size", int), 4: ("initial_max_data", int), 5: ("initial_max_stream_data_bidi_local", int), 6: ("initial_max_stream_data_bidi_remote", int), 7: ("initial_max_stream_data_uni", int), 8: ("initial_max_streams_bidi", int), 9: ("initial_max_streams_uni", int), 10: ("ack_delay_exponent", int), 11: ("max_ack_delay", int), 12: ("disable_active_migration", bool), 13: ("preferred_address", QuicPreferredAddress), 14: ("active_connection_id_limit", int), 32: ("max_datagram_frame_size", int), 3127: ("quantum_readiness", bytes), }
tests.test_connection/client_and_server
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<15>:<add> server = QuicConnection( <add> configuration=server_configuration, <add> original_destination_connection_id=client.original_destination_connection_id, <add> **server_kwargs <add> ) <del> server = QuicConnection(configuration=server_configuration, **server_kwargs)
# module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): <0> client_configuration = QuicConfiguration( <1> is_client=True, quic_logger=QuicLogger(), **client_options <2> ) <3> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) <4> <5> client = QuicConnection(configuration=client_configuration, **client_kwargs) <6> client._ack_delay = 0 <7> disable_packet_pacing(client) <8> client_patch(client) <9> <10> server_configuration = QuicConfiguration( <11> is_client=False, quic_logger=QuicLogger(), **server_options <12> ) <13> server_configuration.load_cert_chain(server_certfile, server_keyfile) <14> <15> server = QuicConnection(configuration=server_configuration, **server_kwargs) <16> server._ack_delay = 0 <17> disable_packet_pacing(server) <18> server_patch(server) <19> <20> # perform handshake <21> if handshake: <22> client.connect(SERVER_ADDR, now=time.time()) <23> for i in range(3): <24> roundtrip(client, server) <25> <26> yield client, server <27> <28> # close <29> client.close() <30> server.close() <31>
===========unchanged ref 0=========== at: contextlib contextmanager(func: Callable[..., Iterator[_T]]) -> Callable[..., _GeneratorContextManager[_T]] at: tests.test_connection SERVER_ADDR = ("2.3.4.5", 4433) disable_packet_pacing(connection) roundtrip(sender, receiver) at: tests.utils SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem") SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") at: time time() -> float ===========changed ref 0=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: + original_destination_connection_id: Optional[bytes] = None - original_connection_id: Optional[bytes] = None max_idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None + initial_source_connection_id: Optional[bytes] = None + retry_source_connection_id: Optional[bytes] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None ===========changed ref 1=========== # module: aioquic.quic.packet PARAMS = { + 0x00: ("original_destination_connection_id", bytes), - 0: ("original_connection_id", bytes), + 0x01: ("max_idle_timeout", int), - 1: ("max_idle_timeout", int), + 0x02: ("stateless_reset_token", bytes), - 2: ("stateless_reset_token", bytes), + 0x03: ("max_udp_payload_size", int), - 3: ("max_udp_payload_size", int), + 0x04: ("initial_max_data", int), - 4: ("initial_max_data", int), + 0x05: ("initial_max_stream_data_bidi_local", int), - 5: ("initial_max_stream_data_bidi_local", int), + 0x06: ("initial_max_stream_data_bidi_remote", int), - 6: ("initial_max_stream_data_bidi_remote", int), + 0x07: ("initial_max_stream_data_uni", int), - 7: ("initial_max_stream_data_uni", int), + 0x08: ("initial_max_streams_bidi", int), - 8: ("initial_max_streams_bidi", int), + 0x09: ("initial_max_streams_uni", int), - 9: ("initial_max_streams_uni", int), + 0x0A: ("ack_delay_exponent", int), - 10: ("ack_delay_exponent", int), + 0x0B: ("max_ack_delay", int), - 11: ("max_ack_delay", int), + 0x0C: ("disable_active_migration", bool), - 12: ("disable_active_migration", bool), + 0x0D: ("preferred_address", QuicPreferredAddress), - 13: ("preferred_address", QuicPreferredAddress), + 0x0E: ("active_connection</s> ===========changed ref 2=========== # module: aioquic.quic.packet # offset: 1 <s>PreferredAddress), - 13: ("preferred_address", QuicPreferredAddress), + 0x0E: ("active_connection_id_limit", int), - 14: ("active_connection_id_limit", int), + 0x0F: ("initial_source_connection_id", bytes), + 0x10: ("retry_source_connection_id", bytes), + # extensions + 0x0020: ("max_datagram_frame_size", int), - 32: ("max_datagram_frame_size", int), + 0x0C37: ("quantum_readiness", bytes), - 3127: ("quantum_readiness", bytes), }
tests.test_connection/QuicConnectionTest.test_connect_with_loss_1
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<16>:<add> server = QuicConnection( <add> configuration=server_configuration, <del> server = QuicConnection(configuration=server_configuration) <17>:<add> original_destination_connection_id=client.original_destination_connection_id, <add> ) <37>:<add> self.assertEqual(datagram_sizes(items), [1280, 1050]) <del> self.assertEqual(datagram_sizes(items), [1280, 1030])
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): <0> """ <1> Check connection is established even in the client's INITIAL is lost. <2> """ <3> <4> def datagram_sizes(items): <5> return [len(x[0]) for x in items] <6> <7> client_configuration = QuicConfiguration(is_client=True) <8> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) <9> <10> client = QuicConnection(configuration=client_configuration) <11> client._ack_delay = 0 <12> <13> server_configuration = QuicConfiguration(is_client=False) <14> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) <15> <16> server = QuicConnection(configuration=server_configuration) <17> server._ack_delay = 0 <18> <19> # client sends INITIAL <20> now = 0.0 <21> client.connect(SERVER_ADDR, now=now) <22> items = client.datagrams_to_send(now=now) <23> self.assertEqual(datagram_sizes(items), [1280]) <24> self.assertEqual(client.get_timer(), 1.0) <25> <26> # INITIAL is lost <27> now = 1.0 <28> client.handle_timer(now=now) <29> items = client.datagrams_to_send(now=now) <30> self.assertEqual(datagram_sizes(items), [1280]) <31> self.assertEqual(client.get_timer(), 3.0) <32> <33> # server receives INITIAL, sends INITIAL + HANDSHAKE <34> now = 1.1 <35> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) <36> items = server.datagrams_to_send(now=now) <37> self.assertEqual(datagram_sizes(items), [1280, 1030]) <38> self.assertEqual(server.get_timer(), 2.1) <39> self.assertEqual</s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): # offset: 1 self.assertEqual(len(server._loss.spaces[1].sent_packets), 2) self.assertEqual(type(server.next_event()), events.ProtocolNegotiated) self.assertIsNone(server.next_event()) # handshake continues normally now = 1.2 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) client.receive_datagram(items[1][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [376]) self.assertAlmostEqual(client.get_timer(), 1.825) self.assertEqual(type(client.next_event()), events.ProtocolNegotiated) self.assertEqual(type(client.next_event()), events.HandshakeCompleted) self.assertEqual(type(client.next_event()), events.ConnectionIdIssued) now = 1.3 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [229]) self.assertAlmostEqual(server.get_timer(), 1.825) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 0) self.assertEqual(type(server.next_event()), events.HandshakeCompleted) self.assertEqual(type(server.next_event()), events.ConnectionIdIssued) now = 1.4 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual</s> ===========below chunk 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): # offset: 2 <s>ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32]) self.assertAlmostEqual(client.get_timer(), 61.4) # idle timeout ===========unchanged ref 0=========== at: tests.test_connection CLIENT_ADDR = ("1.2.3.4", 1234) SERVER_ADDR = ("2.3.4.5", 4433) at: tests.utils SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem") SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertIsNone(obj: Any, msg: Any=...) -> None assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None ===========changed ref 0=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=client.original_destination_connection_id, + **server_kwargs + ) - server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close() ===========changed ref 1=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: + original_destination_connection_id: Optional[bytes] = None - original_connection_id: Optional[bytes] = None max_idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None + initial_source_connection_id: Optional[bytes] = None + retry_source_connection_id: Optional[bytes] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None
tests.test_connection/QuicConnectionTest.test_connect_with_loss_2
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<12>:<add> server = QuicConnection( <add> configuration=server_configuration, <del> server = QuicConnection(configuration=server_configuration) <13>:<add> original_destination_connection_id=client.original_destination_connection_id, <add> ) <26>:<add> self.assertEqual(datagram_sizes(items), [1280, 1050]) <del> self.assertEqual(datagram_sizes(items), [1280, 1030])
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_2(self): <0> def datagram_sizes(items): <1> return [len(x[0]) for x in items] <2> <3> client_configuration = QuicConfiguration(is_client=True) <4> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) <5> <6> client = QuicConnection(configuration=client_configuration) <7> client._ack_delay = 0 <8> <9> server_configuration = QuicConfiguration(is_client=False) <10> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) <11> <12> server = QuicConnection(configuration=server_configuration) <13> server._ack_delay = 0 <14> <15> # client sends INITIAL <16> now = 0.0 <17> client.connect(SERVER_ADDR, now=now) <18> items = client.datagrams_to_send(now=now) <19> self.assertEqual(datagram_sizes(items), [1280]) <20> self.assertEqual(client.get_timer(), 1.0) <21> <22> # server receives INITIAL, sends INITIAL + HANDSHAKE but second datagram is lost <23> now = 0.1 <24> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) <25> items = server.datagrams_to_send(now=now) <26> self.assertEqual(datagram_sizes(items), [1280, 1030]) <27> self.assertEqual(server.get_timer(), 1.1) <28> self.assertEqual(len(server._loss.spaces[0].sent_packets), 1) <29> self.assertEqual(len(server._loss.spaces[1].sent_packets), 2) <30> <31> # client only receives first datagram and sends ACKS <32> now = 0.2 <33> client.receive_datagram(items[0][0], SERVER_ADDR, now=now) <34> items = client.datagrams_to_send(now=</s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_2(self): # offset: 1 self.assertEqual(datagram_sizes(items), [97]) self.assertAlmostEqual(client.get_timer(), 0.625) self.assertEqual(type(client.next_event()), events.ProtocolNegotiated) self.assertIsNone(client.next_event()) # client PTO - HANDSHAKE PING now = client.get_timer() # ~0.625 client.handle_timer(now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [44]) self.assertAlmostEqual(client.get_timer(), 1.875) # server receives PING, discards INITIAL and sends ACK now = 0.725 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [48]) self.assertAlmostEqual(server.get_timer(), 1.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 3) self.assertEqual(type(server.next_event()), events.ProtocolNegotiated) self.assertIsNone(server.next_event()) # ACKs are lost, server retransmits HANDSHAKE now = server.get_timer() server.handle_timer(now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280, 854]) self.assertAlmostEqual(server.get_timer(), 3.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) </s> ===========below chunk 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_2(self): # offset: 2 <s>(), 3.1) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 3) self.assertIsNone(server.next_event()) # handshake continues normally now = 1.2 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) client.receive_datagram(items[1][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [329]) self.assertAlmostEqual(client.get_timer(), 2.45) self.assertEqual(type(client.next_event()), events.HandshakeCompleted) self.assertEqual(type(client.next_event()), events.ConnectionIdIssued) now = 1.3 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [229]) self.assertAlmostEqual(server.get_timer(), 1.925) self.assertEqual(type(server.next_event()), events.HandshakeCompleted) self.assertEqual(type(server.next_event()), events.ConnectionIdIssued) now = 1.4 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32]) self.assertAlmostEqual(client.get_timer(), 61.4) ===========unchanged ref 0=========== at: tests.test_connection CLIENT_ADDR = ("1.2.3.4", 1234) SERVER_ADDR = ("2.3.4.5", 4433) at: tests.utils SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem") SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertIsNone(obj: Any, msg: Any=...) -> None assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None ===========changed ref 0=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=client.original_destination_connection_id, + **server_kwargs + ) - server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close()
tests.test_connection/QuicConnectionTest.test_connect_with_loss_3
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<12>:<add> server = QuicConnection( <add> configuration=server_configuration, <del> server = QuicConnection(configuration=server_configuration) <13>:<add> original_destination_connection_id=client.original_destination_connection_id, <add> ) <26>:<add> self.assertEqual(datagram_sizes(items), [1280, 1050]) <del> self.assertEqual(datagram_sizes(items), [1280, 1030])
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_3(self): <0> def datagram_sizes(items): <1> return [len(x[0]) for x in items] <2> <3> client_configuration = QuicConfiguration(is_client=True) <4> client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) <5> <6> client = QuicConnection(configuration=client_configuration) <7> client._ack_delay = 0 <8> <9> server_configuration = QuicConfiguration(is_client=False) <10> server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) <11> <12> server = QuicConnection(configuration=server_configuration) <13> server._ack_delay = 0 <14> <15> # client sends INITIAL <16> now = 0.0 <17> client.connect(SERVER_ADDR, now=now) <18> items = client.datagrams_to_send(now=now) <19> self.assertEqual(datagram_sizes(items), [1280]) <20> self.assertEqual(client.get_timer(), 1.0) <21> <22> # server receives INITIAL, sends INITIAL + HANDSHAKE <23> now = 0.1 <24> server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) <25> items = server.datagrams_to_send(now=now) <26> self.assertEqual(datagram_sizes(items), [1280, 1030]) <27> self.assertEqual(server.get_timer(), 1.1) <28> self.assertEqual(len(server._loss.spaces[0].sent_packets), 1) <29> self.assertEqual(len(server._loss.spaces[1].sent_packets), 2) <30> <31> # client receives INITIAL + HANDSHAKE <32> now = 0.2 <33> client.receive_datagram(items[0][0], SERVER_ADDR, now=now) <34> client.receive_datagram(items[1][0], SERVER_ADDR, now=now) <35> </s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_3(self): # offset: 1 self.assertEqual(datagram_sizes(items), [376]) self.assertAlmostEqual(client.get_timer(), 0.825) self.assertEqual(type(client.next_event()), events.ProtocolNegotiated) self.assertEqual(type(client.next_event()), events.HandshakeCompleted) self.assertEqual(type(client.next_event()), events.ConnectionIdIssued) # server completes handshake now = 0.3 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [229]) self.assertAlmostEqual(server.get_timer(), 0.825) self.assertEqual(len(server._loss.spaces[0].sent_packets), 0) self.assertEqual(len(server._loss.spaces[1].sent_packets), 0) self.assertEqual(type(server.next_event()), events.ProtocolNegotiated) self.assertEqual(type(server.next_event()), events.HandshakeCompleted) self.assertEqual(type(server.next_event()), events.ConnectionIdIssued) # server PTO - 1-RTT PING now = 0.825 server.handle_timer(now=now) items = server.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [29]) self.assertAlmostEqual(server.get_timer(), 1.875) # client receives PING, sends ACK now = 0.9 client.receive_datagram(items[0][0], SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32</s> ===========below chunk 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_3(self): # offset: 2 <s> client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [32]) self.assertAlmostEqual(client.get_timer(), 0.825) # server receives ACK, retransmits HANDSHAKE_DONE now = 1.0 self.assertFalse(server._handshake_done_pending) server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) self.assertTrue(server._handshake_done_pending) items = server.datagrams_to_send(now=now) self.assertFalse(server._handshake_done_pending) self.assertEqual(datagram_sizes(items), [224]) ===========unchanged ref 0=========== at: tests.test_connection CLIENT_ADDR = ("1.2.3.4", 1234) SERVER_ADDR = ("2.3.4.5", 4433) at: tests.utils SERVER_CACERTFILE = os.path.join(os.path.dirname(__file__), "pycacert.pem") SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None assertFalse(expr: Any, msg: Any=...) -> None assertAlmostEqual(first: float, second: float, places: Optional[int]=..., msg: Any=..., delta: Optional[float]=...) -> None assertAlmostEqual(first: datetime.datetime, second: datetime.datetime, places: Optional[int]=..., msg: Any=..., delta: Optional[datetime.timedelta]=...) -> None ===========changed ref 0=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=client.original_destination_connection_id, + **server_kwargs + ) - server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close() ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_connect_with_loss_1(self): """ Check connection is established even in the client's INITIAL is lost. """ def datagram_sizes(items): return [len(x[0]) for x in items] client_configuration = QuicConfiguration(is_client=True) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration) client._ack_delay = 0 server_configuration = QuicConfiguration(is_client=False) server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) + server = QuicConnection( + configuration=server_configuration, - server = QuicConnection(configuration=server_configuration) + original_destination_connection_id=client.original_destination_connection_id, + ) server._ack_delay = 0 # client sends INITIAL now = 0.0 client.connect(SERVER_ADDR, now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 1.0) # INITIAL is lost now = 1.0 client.handle_timer(now=now) items = client.datagrams_to_send(now=now) self.assertEqual(datagram_sizes(items), [1280]) self.assertEqual(client.get_timer(), 3.0) # server receives INITIAL, sends INITIAL + HANDSHAKE now = 1.1 server.receive_datagram(items[0][0], CLIENT_ADDR, now=now) items = server.datagrams_to_send(now=now) + self.assertEqual(datagram_sizes(items), [1280, 1050]) - self.assertEqual(datagram_sizes(items), [1280</s>
tests.test_connection/QuicConnectionTest.test_parse_transport_parameters
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<5>:<add> QuicTransportParameters( <del> QuicTransportParameters(), <6>:<add> original_destination_connection_id=client.original_destination_connection_id <add> ),
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): <0> client = create_standalone_client(self) <1> <2> buf = Buffer(capacity=32) <3> push_quic_transport_parameters( <4> buf, <5> QuicTransportParameters(), <6> protocol_version=QuicProtocolVersion.DRAFT_27, <7> ) <8> client._parse_transport_parameters(buf.data) <9>
===========unchanged ref 0=========== at: tests.test_connection create_standalone_client(self, **client_options) ===========changed ref 0=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: + original_destination_connection_id: Optional[bytes] = None - original_connection_id: Optional[bytes] = None max_idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None + initial_source_connection_id: Optional[bytes] = None + retry_source_connection_id: Optional[bytes] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None ===========changed ref 1=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=client.original_destination_connection_id, + **server_kwargs + ) - server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close() ===========changed ref 2=========== # module: aioquic.quic.packet PARAMS = { + 0x00: ("original_destination_connection_id", bytes), - 0: ("original_connection_id", bytes), + 0x01: ("max_idle_timeout", int), - 1: ("max_idle_timeout", int), + 0x02: ("stateless_reset_token", bytes), - 2: ("stateless_reset_token", bytes), + 0x03: ("max_udp_payload_size", int), - 3: ("max_udp_payload_size", int), + 0x04: ("initial_max_data", int), - 4: ("initial_max_data", int), + 0x05: ("initial_max_stream_data_bidi_local", int), - 5: ("initial_max_stream_data_bidi_local", int), + 0x06: ("initial_max_stream_data_bidi_remote", int), - 6: ("initial_max_stream_data_bidi_remote", int), + 0x07: ("initial_max_stream_data_uni", int), - 7: ("initial_max_stream_data_uni", int), + 0x08: ("initial_max_streams_bidi", int), - 8: ("initial_max_streams_bidi", int), + 0x09: ("initial_max_streams_uni", int), - 9: ("initial_max_streams_uni", int), + 0x0A: ("ack_delay_exponent", int), - 10: ("ack_delay_exponent", int), + 0x0B: ("max_ack_delay", int), - 11: ("max_ack_delay", int), + 0x0C: ("disable_active_migration", bool), - 12: ("disable_active_migration", bool), + 0x0D: ("preferred_address", QuicPreferredAddress), - 13: ("preferred_address", QuicPreferredAddress), + 0x0E: ("active_connection</s> ===========changed ref 3=========== # module: aioquic.quic.packet # offset: 1 <s>PreferredAddress), - 13: ("preferred_address", QuicPreferredAddress), + 0x0E: ("active_connection_id_limit", int), - 14: ("active_connection_id_limit", int), + 0x0F: ("initial_source_connection_id", bytes), + 0x10: ("retry_source_connection_id", bytes), + # extensions + 0x0020: ("max_datagram_frame_size", int), - 32: ("max_datagram_frame_size", int), + 0x0C37: ("quantum_readiness", bytes), - 3127: ("quantum_readiness", bytes), }
tests.test_connection/QuicConnectionTest.test_parse_transport_parameters_with_bad_active_connection_id_limit
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<7>:<add> active_connection_id_limit=active_connection_id_limit, <del> active_connection_id_limit=active_connection_id_limit <8>:<add> original_destination_connection_id=client.original_destination_connection_id,
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): <0> client = create_standalone_client(self) <1> <2> for active_connection_id_limit in [0, 1]: <3> buf = Buffer(capacity=32) <4> push_quic_transport_parameters( <5> buf, <6> QuicTransportParameters( <7> active_connection_id_limit=active_connection_id_limit <8> ), <9> protocol_version=QuicProtocolVersion.DRAFT_27, <10> ) <11> with self.assertRaises(QuicConnectionError) as cm: <12> client._parse_transport_parameters(buf.data) <13> self.assertEqual( <14> cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR <15> ) <16> self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) <17> self.assertEqual( <18> cm.exception.reason_phrase, <19> "active_connection_id_limit must be no less than 2", <20> ) <21>
===========unchanged ref 0=========== at: tests.test_connection create_standalone_client(self, **client_options) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None at: unittest.case._AssertRaisesContext.__exit__ self.exception = exc_value.with_traceback(None) ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, + QuicTransportParameters( - QuicTransportParameters(), + original_destination_connection_id=client.original_destination_connection_id + ), protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 1=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: + original_destination_connection_id: Optional[bytes] = None - original_connection_id: Optional[bytes] = None max_idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None + initial_source_connection_id: Optional[bytes] = None + retry_source_connection_id: Optional[bytes] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None ===========changed ref 2=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=client.original_destination_connection_id, + **server_kwargs + ) - server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close() ===========changed ref 3=========== # module: aioquic.quic.packet PARAMS = { + 0x00: ("original_destination_connection_id", bytes), - 0: ("original_connection_id", bytes), + 0x01: ("max_idle_timeout", int), - 1: ("max_idle_timeout", int), + 0x02: ("stateless_reset_token", bytes), - 2: ("stateless_reset_token", bytes), + 0x03: ("max_udp_payload_size", int), - 3: ("max_udp_payload_size", int), + 0x04: ("initial_max_data", int), - 4: ("initial_max_data", int), + 0x05: ("initial_max_stream_data_bidi_local", int), - 5: ("initial_max_stream_data_bidi_local", int), + 0x06: ("initial_max_stream_data_bidi_remote", int), - 6: ("initial_max_stream_data_bidi_remote", int), + 0x07: ("initial_max_stream_data_uni", int), - 7: ("initial_max_stream_data_uni", int), + 0x08: ("initial_max_streams_bidi", int), - 8: ("initial_max_streams_bidi", int), + 0x09: ("initial_max_streams_uni", int), - 9: ("initial_max_streams_uni", int), + 0x0A: ("ack_delay_exponent", int), - 10: ("ack_delay_exponent", int), + 0x0B: ("max_ack_delay", int), - 11: ("max_ack_delay", int), + 0x0C: ("disable_active_migration", bool), - 12: ("disable_active_migration", bool), + 0x0D: ("preferred_address", QuicPreferredAddress), - 13: ("preferred_address", QuicPreferredAddress), + 0x0E: ("active_connection</s> ===========changed ref 4=========== # module: aioquic.quic.packet # offset: 1 <s>PreferredAddress), - 13: ("preferred_address", QuicPreferredAddress), + 0x0E: ("active_connection_id_limit", int), - 14: ("active_connection_id_limit", int), + 0x0F: ("initial_source_connection_id", bytes), + 0x10: ("retry_source_connection_id", bytes), + # extensions + 0x0020: ("max_datagram_frame_size", int), - 32: ("max_datagram_frame_size", int), + 0x0C37: ("quantum_readiness", bytes), - 3127: ("quantum_readiness", bytes), }
tests.test_retry/QuicRetryTokenHandlerTest.test_retry_token
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<1>:<add> original_destination_connection_id = b"\x08\x07\x06\05\x04\x03\x02\x01" <del> cid = b"\x08\x07\x06\05\x04\x03\x02\x01" <2>:<add> retry_source_connection_id = b"abcdefgh" <6>:<add> token = handler.create_token( <del> token = handler.create_token(addr, cid) <7>:<add> addr, original_destination_connection_id, retry_source_connection_id <add> ) <10>:<add> self.assertEqual( <add> handler.validate_token(addr, token), <del> self.assertEqual(handler.validate_token(addr, token), cid) <11>:<add> (original_destination_connection_id, retry_source_connection_id), <add> )
# module: tests.test_retry class QuicRetryTokenHandlerTest(TestCase): def test_retry_token(self): <0> addr = ("127.0.0.1", 1234) <1> cid = b"\x08\x07\x06\05\x04\x03\x02\x01" <2> <3> handler = QuicRetryTokenHandler() <4> <5> # create token <6> token = handler.create_token(addr, cid) <7> self.assertIsNotNone(token) <8> <9> # validate token - ok <10> self.assertEqual(handler.validate_token(addr, token), cid) <11> <12> # validate token - empty <13> with self.assertRaises(ValueError) as cm: <14> handler.validate_token(addr, b"") <15> self.assertEqual( <16> str(cm.exception), "Ciphertext length must be equal to key size." <17> ) <18> <19> # validate token - wrong address <20> with self.assertRaises(ValueError) as cm: <21> handler.validate_token(("1.2.3.4", 12345), token) <22> self.assertEqual(str(cm.exception), "Remote address does not match.") <23>
===========unchanged ref 0=========== at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertIsNotNone(obj: Any, msg: Any=...) -> None assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None at: unittest.case._AssertRaisesContext.__exit__ self.exception = exc_value.with_traceback(None) ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, + QuicTransportParameters( - QuicTransportParameters(), + original_destination_connection_id=client.original_destination_connection_id + ), protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( + active_connection_id_limit=active_connection_id_limit, - active_connection_id_limit=active_connection_id_limit + original_destination_connection_id=client.original_destination_connection_id, ), protocol_version=QuicProtocolVersion.DRAFT_27, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 2=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: + original_destination_connection_id: Optional[bytes] = None - original_connection_id: Optional[bytes] = None max_idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None + initial_source_connection_id: Optional[bytes] = None + retry_source_connection_id: Optional[bytes] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None ===========changed ref 3=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=client.original_destination_connection_id, + **server_kwargs + ) - server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close() ===========changed ref 4=========== # module: aioquic.quic.packet PARAMS = { + 0x00: ("original_destination_connection_id", bytes), - 0: ("original_connection_id", bytes), + 0x01: ("max_idle_timeout", int), - 1: ("max_idle_timeout", int), + 0x02: ("stateless_reset_token", bytes), - 2: ("stateless_reset_token", bytes), + 0x03: ("max_udp_payload_size", int), - 3: ("max_udp_payload_size", int), + 0x04: ("initial_max_data", int), - 4: ("initial_max_data", int), + 0x05: ("initial_max_stream_data_bidi_local", int), - 5: ("initial_max_stream_data_bidi_local", int), + 0x06: ("initial_max_stream_data_bidi_remote", int), - 6: ("initial_max_stream_data_bidi_remote", int), + 0x07: ("initial_max_stream_data_uni", int), - 7: ("initial_max_stream_data_uni", int), + 0x08: ("initial_max_streams_bidi", int), - 8: ("initial_max_streams_bidi", int), + 0x09: ("initial_max_streams_uni", int), - 9: ("initial_max_streams_uni", int), + 0x0A: ("ack_delay_exponent", int), - 10: ("ack_delay_exponent", int), + 0x0B: ("max_ack_delay", int), - 11: ("max_ack_delay", int), + 0x0C: ("disable_active_migration", bool), - 12: ("disable_active_migration", bool), + 0x0D: ("preferred_address", QuicPreferredAddress), - 13: ("preferred_address", QuicPreferredAddress), + 0x0E: ("active_connection</s>
aioquic.quic.retry/QuicRetryTokenHandler.create_token
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<0>:<add> retry_message = ( <add> encode_address(addr) <add> + b"|" <add> + original_destination_connection_id <add> + b"|" <add> + retry_source_connection_id <add> ) <del> retry_message = encode_address(addr) + b"|" + destination_cid
# module: aioquic.quic.retry class QuicRetryTokenHandler: + def create_token( + self, + addr: NetworkAddress, + original_destination_connection_id: bytes, + retry_source_connection_id: bytes, + ) -> bytes: - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes: <0> retry_message = encode_address(addr) + b"|" + destination_cid <1> return self._key.public_key().encrypt( <2> retry_message, <3> padding.OAEP( <4> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None <5> ), <6> ) <7>
===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, + QuicTransportParameters( - QuicTransportParameters(), + original_destination_connection_id=client.original_destination_connection_id + ), protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 1=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id( + self, + ): + """ + If the server's transport parameters do not have the correct + original_destination_connection_id the connection fail. + """ + + def create_protocol(*args, **kwargs): + protocol = QuicConnectionProtocol(*args, **kwargs) + protocol._quic._original_destination_connection_id = None + return protocol + + run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) + with self.assertRaises(ConnectionError): + run(self.run_client()) + ===========changed ref 2=========== # module: tests.test_asyncio class HighLevelTest(TestCase): - def test_connect_and_serve_with_stateless_retry_bad_original_connection_id(self): - """ - If the server's transport parameters do not have the correct - original_connection_id the connection fail. - """ - - def create_protocol(*args, **kwargs): - protocol = QuicConnectionProtocol(*args, **kwargs) - protocol._quic._original_connection_id = None - return protocol - - run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) - with self.assertRaises(ConnectionError): - run(self.run_client()) - ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( + active_connection_id_limit=active_connection_id_limit, - active_connection_id_limit=active_connection_id_limit + original_destination_connection_id=client.original_destination_connection_id, ), protocol_version=QuicProtocolVersion.DRAFT_27, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 4=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: + original_destination_connection_id: Optional[bytes] = None - original_connection_id: Optional[bytes] = None max_idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None + initial_source_connection_id: Optional[bytes] = None + retry_source_connection_id: Optional[bytes] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None ===========changed ref 5=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=client.original_destination_connection_id, + **server_kwargs + ) - server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close()
aioquic.quic.retry/QuicRetryTokenHandler.validate_token
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<6>:<add> ( <add> encoded_addr, <add> original_destination_connection_id, <add> retry_source_connection_id, <add> ) = retry_message.split(b"|", maxsplit=2) <del> encoded_addr, original_connection_id = retry_message.split(b"|", maxsplit=1) <9>:<add> return original_destination_connection_id, retry_source_connection_id <del> return original_connection_id
# module: aioquic.quic.retry class QuicRetryTokenHandler: + def validate_token(self, addr: NetworkAddress, token: bytes) -> Tuple[bytes, bytes]: - def validate_token(self, addr: NetworkAddress, token: bytes) -> bytes: <0> retry_message = self._key.decrypt( <1> token, <2> padding.OAEP( <3> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None <4> ), <5> ) <6> encoded_addr, original_connection_id = retry_message.split(b"|", maxsplit=1) <7> if encoded_addr != encode_address(addr): <8> raise ValueError("Remote address does not match.") <9> return original_connection_id <10>
===========unchanged ref 0=========== at: aioquic.quic.retry.QuicRetryTokenHandler.__init__ self._key = rsa.generate_private_key( public_exponent=65537, key_size=1024, backend=default_backend() ) at: aioquic.quic.retry.QuicRetryTokenHandler.create_token retry_message = ( encode_address(addr) + b"|" + original_destination_connection_id + b"|" + retry_source_connection_id ) ===========changed ref 0=========== # module: aioquic.quic.retry class QuicRetryTokenHandler: + def create_token( + self, + addr: NetworkAddress, + original_destination_connection_id: bytes, + retry_source_connection_id: bytes, + ) -> bytes: - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes: + retry_message = ( + encode_address(addr) + + b"|" + + original_destination_connection_id + + b"|" + + retry_source_connection_id + ) - retry_message = encode_address(addr) + b"|" + destination_cid return self._key.public_key().encrypt( retry_message, padding.OAEP( mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None ), ) ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, + QuicTransportParameters( - QuicTransportParameters(), + original_destination_connection_id=client.original_destination_connection_id + ), protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 2=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id( + self, + ): + """ + If the server's transport parameters do not have the correct + original_destination_connection_id the connection fail. + """ + + def create_protocol(*args, **kwargs): + protocol = QuicConnectionProtocol(*args, **kwargs) + protocol._quic._original_destination_connection_id = None + return protocol + + run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) + with self.assertRaises(ConnectionError): + run(self.run_client()) + ===========changed ref 3=========== # module: tests.test_asyncio class HighLevelTest(TestCase): - def test_connect_and_serve_with_stateless_retry_bad_original_connection_id(self): - """ - If the server's transport parameters do not have the correct - original_connection_id the connection fail. - """ - - def create_protocol(*args, **kwargs): - protocol = QuicConnectionProtocol(*args, **kwargs) - protocol._quic._original_connection_id = None - return protocol - - run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) - with self.assertRaises(ConnectionError): - run(self.run_client()) - ===========changed ref 4=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( + active_connection_id_limit=active_connection_id_limit, - active_connection_id_limit=active_connection_id_limit + original_destination_connection_id=client.original_destination_connection_id, ), protocol_version=QuicProtocolVersion.DRAFT_27, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 5=========== # module: aioquic.quic.packet @dataclass class QuicTransportParameters: + original_destination_connection_id: Optional[bytes] = None - original_connection_id: Optional[bytes] = None max_idle_timeout: Optional[int] = None stateless_reset_token: Optional[bytes] = None max_udp_payload_size: Optional[int] = None initial_max_data: Optional[int] = None initial_max_stream_data_bidi_local: Optional[int] = None initial_max_stream_data_bidi_remote: Optional[int] = None initial_max_stream_data_uni: Optional[int] = None initial_max_streams_bidi: Optional[int] = None initial_max_streams_uni: Optional[int] = None ack_delay_exponent: Optional[int] = None max_ack_delay: Optional[int] = None disable_active_migration: Optional[bool] = False preferred_address: Optional[QuicPreferredAddress] = None active_connection_id_limit: Optional[int] = None + initial_source_connection_id: Optional[bytes] = None + retry_source_connection_id: Optional[bytes] = None max_datagram_frame_size: Optional[int] = None quantum_readiness: Optional[bytes] = None ===========changed ref 6=========== # module: tests.test_connection @contextlib.contextmanager def client_and_server( client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None, ): client_configuration = QuicConfiguration( is_client=True, quic_logger=QuicLogger(), **client_options ) client_configuration.load_verify_locations(cafile=SERVER_CACERTFILE) client = QuicConnection(configuration=client_configuration, **client_kwargs) client._ack_delay = 0 disable_packet_pacing(client) client_patch(client) server_configuration = QuicConfiguration( is_client=False, quic_logger=QuicLogger(), **server_options ) server_configuration.load_cert_chain(server_certfile, server_keyfile) + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=client.original_destination_connection_id, + **server_kwargs + ) - server = QuicConnection(configuration=server_configuration, **server_kwargs) server._ack_delay = 0 disable_packet_pacing(server) server_patch(server) # perform handshake if handshake: client.connect(SERVER_ADDR, now=time.time()) for i in range(3): roundtrip(client, server) yield client, server # close client.close() server.close()
aioquic.quic.connection/QuicConnection._parse_transport_parameters
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<26>:<add> quic_transport_parameters.original_destination_connection_id <del> quic_transport_parameters.original_connection_id <27>:<add> != self._original_destination_connection_id <del> != self._original_connection_id <33>:<add> reason_phrase="original_destination_connection_id does not match", <del> reason_phrase="original_connection_id does not match",
# module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: <0> """ <1> Parse and apply remote transport parameters. <2> <3> `from_session_ticket` is `True` when restoring saved transport parameters, <4> and `False` when handling received transport parameters. <5> """ <6> <7> quic_transport_parameters = pull_quic_transport_parameters( <8> Buffer(data=data), protocol_version=self._version <9> ) <10> <11> # log event <12> if self._quic_logger is not None and not from_session_ticket: <13> self._quic_logger.log_event( <14> category="transport", <15> event="parameters_set", <16> data=self._quic_logger.encode_transport_parameters( <17> owner="remote", parameters=quic_transport_parameters <18> ), <19> ) <20> <21> # validate remote parameters <22> if ( <23> self._is_client <24> and not from_session_ticket <25> and ( <26> quic_transport_parameters.original_connection_id <27> != self._original_connection_id <28> ) <29> ): <30> raise QuicConnectionError( <31> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <32> frame_type=QuicFrameType.CRYPTO, <33> reason_phrase="original_connection_id does not match", <34> ) <35> if ( <36> quic_transport_parameters.active_connection_id_limit is not None <37> and quic_transport_parameters.active_connection_id_limit < 2 <38> ): <39> raise QuicConnectionError( <40> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <41> frame_type=QuicFrameType.CRYPTO, <42> reason_phrase="active_connection_id_limit must be no less than 2", <43> ) <44> <45> # store remote parameters <46> if not from_</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 if quic_transport_parameters.ack_delay_exponent is not None: self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = ( quic_transport_parameters.max_ack_delay / 1000.0 ) if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) if quic_transport_parameters.max_idle_timeout is not None: self._remote_max_idle_timeout = ( quic_transport_parameters.max_idle_timeout / 1000.0 ) self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========unchanged ref 0=========== at: aioquic.quic.connection QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str) QuicConnectionId(cid: bytes, sequence_number: int, stateless_reset_token: bytes=b"", was_sent: bool=False) at: aioquic.quic.connection.QuicConnection.__init__ self._configuration = configuration self._is_client = configuration.is_client self._crypto_buffers: Dict[tls.Epoch, Buffer] = {} self._crypto_streams: Dict[tls.Epoch, QuicStream] = {} self._host_cids = [ QuicConnectionId( cid=os.urandom(configuration.connection_id_length), sequence_number=0, stateless_reset_token=os.urandom(16), was_sent=True, ) ] self._host_cid_seq = 1 self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=self._original_destination_connection_id, ) self._remote_ack_delay_exponent = 3 self._remote_active_connection_id_limit = 0 self._version: Optional[int] = None self._original_destination_connection_id = self._peer_cid self._original_destination_connection_id = ( original_destination_connection_id ) self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) self._probe_pending = False at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None ===========unchanged ref 1=========== at: aioquic.quic.connection.QuicConnection._initialize self._crypto_buffers = { tls.Epoch.INITIAL: Buffer(capacity=CRYPTO_BUFFER_SIZE), tls.Epoch.HANDSHAKE: Buffer(capacity=CRYPTO_BUFFER_SIZE), tls.Epoch.ONE_RTT: Buffer(capacity=CRYPTO_BUFFER_SIZE), } self._crypto_streams = { tls.Epoch.INITIAL: QuicStream(), tls.Epoch.HANDSHAKE: QuicStream(), tls.Epoch.ONE_RTT: QuicStream(), } at: aioquic.quic.connection.QuicConnection._write_application self._probe_pending = False at: aioquic.quic.connection.QuicConnection._write_handshake self._probe_pending = False at: aioquic.quic.connection.QuicConnection.connect self._version = self._configuration.supported_versions[0] at: aioquic.quic.connection.QuicConnection.receive_datagram self._version = QuicProtocolVersion(header.version) self._version = QuicProtocolVersion(max(common)) self._original_destination_connection_id = self._peer_cid at: aioquic.quic.connection.QuicConnectionId cid: bytes sequence_number: int stateless_reset_token: bytes = b"" was_sent: bool = False at: os urandom(size: int, /) -> bytes ===========changed ref 0=========== # module: aioquic.quic.connection class QuicConnection: + @property + def original_destination_connection_id(self) -> bytes: + return self._original_destination_connection_id + ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, + QuicTransportParameters( - QuicTransportParameters(), + original_destination_connection_id=client.original_destination_connection_id + ), protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 2=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id( + self, + ): + """ + If the server's transport parameters do not have the correct + original_destination_connection_id the connection fail. + """ + + def create_protocol(*args, **kwargs): + protocol = QuicConnectionProtocol(*args, **kwargs) + protocol._quic._original_destination_connection_id = None + return protocol + + run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) + with self.assertRaises(ConnectionError): + run(self.run_client()) + ===========changed ref 3=========== # module: aioquic.quic.retry class QuicRetryTokenHandler: + def create_token( + self, + addr: NetworkAddress, + original_destination_connection_id: bytes, + retry_source_connection_id: bytes, + ) -> bytes: - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes: + retry_message = ( + encode_address(addr) + + b"|" + + original_destination_connection_id + + b"|" + + retry_source_connection_id + ) - retry_message = encode_address(addr) + b"|" + destination_cid return self._key.public_key().encrypt( retry_message, padding.OAEP( mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None ), )
aioquic.quic.connection/QuicConnection._serialize_transport_parameters
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<10>:<add> initial_source_connection_id=self._local_initial_source_connection_id, <17>:<add> quic_transport_parameters.original_destination_connection_id = ( <del> quic_transport_parameters.original_connection_id = ( <18>:<add> self._original_destination_connection_id <del> self._original_connection_id <19>:<add> ) <add> quic_transport_parameters.retry_source_connection_id = ( <add> self._retry_source_connection_id
# module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: <0> quic_transport_parameters = QuicTransportParameters( <1> ack_delay_exponent=self._local_ack_delay_exponent, <2> active_connection_id_limit=self._local_active_connection_id_limit, <3> max_idle_timeout=int(self._configuration.idle_timeout * 1000), <4> initial_max_data=self._local_max_data, <5> initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local, <6> initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote, <7> initial_max_stream_data_uni=self._local_max_stream_data_uni, <8> initial_max_streams_bidi=self._local_max_streams_bidi, <9> initial_max_streams_uni=self._local_max_streams_uni, <10> max_ack_delay=25, <11> max_datagram_frame_size=self._configuration.max_datagram_frame_size, <12> quantum_readiness=b"Q" * 1200 <13> if self._configuration.quantum_readiness_test <14> else None, <15> ) <16> if not self._is_client: <17> quic_transport_parameters.original_connection_id = ( <18> self._original_connection_id <19> ) <20> <21> # log event <22> if self._quic_logger is not None: <23> self._quic_logger.log_event( <24> category="transport", <25> event="parameters_set", <26> data=self._quic_logger.encode_transport_parameters( <27> owner="local", parameters=quic_transport_parameters <28> ), <29> ) <30> <31> buf = Buffer(capacity=3 * PACKET_MAX_SIZE) <32> push_quic_transport_parameters( <33> buf</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: # offset: 1 ) return buf.data ===========unchanged ref 0=========== at: aioquic.quic.connection.QuicConnection.__init__ self._configuration = configuration self._is_client = configuration.is_client self._local_ack_delay_exponent = 3 self._local_active_connection_id_limit = 8 self._local_initial_source_connection_id = self._host_cids[0].cid self._local_max_data = configuration.max_data self._local_max_stream_data_bidi_local = configuration.max_stream_data self._local_max_stream_data_bidi_remote = configuration.max_stream_data self._local_max_stream_data_uni = configuration.max_stream_data self._local_max_streams_bidi = 128 self._local_max_streams_uni = 128 self._remote_max_datagram_frame_size: Optional[int] = None at: aioquic.quic.connection.QuicConnection._parse_transport_parameters quic_transport_parameters = pull_quic_transport_parameters( Buffer(data=data), protocol_version=self._version ) at: aioquic.quic.connection.QuicConnection._write_connection_limits self._local_max_data *= 2 ===========changed ref 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: """ Parse and apply remote transport parameters. `from_session_ticket` is `True` when restoring saved transport parameters, and `False` when handling received transport parameters. """ quic_transport_parameters = pull_quic_transport_parameters( Buffer(data=data), protocol_version=self._version ) # log event if self._quic_logger is not None and not from_session_ticket: self._quic_logger.log_event( category="transport", event="parameters_set", data=self._quic_logger.encode_transport_parameters( owner="remote", parameters=quic_transport_parameters ), ) # validate remote parameters if ( self._is_client and not from_session_ticket and ( + quic_transport_parameters.original_destination_connection_id - quic_transport_parameters.original_connection_id + != self._original_destination_connection_id - != self._original_connection_id ) ): raise QuicConnectionError( error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, frame_type=QuicFrameType.CRYPTO, + reason_phrase="original_destination_connection_id does not match", - reason_phrase="original_connection_id does not match", ) if ( quic_transport_parameters.active_connection_id_limit is not None and quic_transport_parameters.active_connection_id_limit < 2 ): raise QuicConnectionError( error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, frame_type=QuicFrameType.CRYPTO, reason_phrase="active_connection_id_limit must be no less than 2", ) # store remote parameters </s> ===========changed ref 1=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 <s> reason_phrase="active_connection_id_limit must be no less than 2", ) # store remote parameters if not from_session_ticket: if quic_transport_parameters.ack_delay_exponent is not None: self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = ( quic_transport_parameters.max_ack_delay / 1000.0 ) if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) if quic_transport_parameters.max_idle_timeout is not None: self._remote_max_idle_timeout = ( quic_transport_parameters.max_idle_timeout / 1000.0 ) self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========changed ref 2=========== # module: aioquic.quic.connection class QuicConnection: + @property + def original_destination_connection_id(self) -> bytes: + return self._original_destination_connection_id + ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, + QuicTransportParameters( - QuicTransportParameters(), + original_destination_connection_id=client.original_destination_connection_id + ), protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 4=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id( + self, + ): + """ + If the server's transport parameters do not have the correct + original_destination_connection_id the connection fail. + """ + + def create_protocol(*args, **kwargs): + protocol = QuicConnectionProtocol(*args, **kwargs) + protocol._quic._original_destination_connection_id = None + return protocol + + run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) + with self.assertRaises(ConnectionError): + run(self.run_client()) + ===========changed ref 5=========== # module: aioquic.quic.retry class QuicRetryTokenHandler: + def create_token( + self, + addr: NetworkAddress, + original_destination_connection_id: bytes, + retry_source_connection_id: bytes, + ) -> bytes: - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes: + retry_message = ( + encode_address(addr) + + b"|" + + original_destination_connection_id + + b"|" + + retry_source_connection_id + ) - retry_message = encode_address(addr) + b"|" + destination_cid return self._key.public_key().encrypt( retry_message, padding.OAEP( mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None ), )
aioquic.asyncio.server/QuicServer.datagram_received
Modified
aiortc~aioquic
92b8e68c2fdf6ba43a38a705c24a2663ec4079f2
[parameters] add support for new transport parameters
<26>:<add> original_destination_connection_id: Optional[bytes] = None <del> original_connection_id: Optional[bytes] = None <27>:<add> retry_source_connection_id: Optional[bytes] = None <36>:<add> source_cid = os.urandom(8) <39>:<add> source_cid=source_cid, <del> source_cid=os.urandom(8), <43>:<add> addr, header.destination_cid, source_cid <del> addr, header.destination_cid <52>:<del> original_connection_id =
# module: aioquic.asyncio.server class QuicServer(asyncio.DatagramProtocol): def datagram_received(self, data: Union[bytes, Text], addr: NetworkAddress) -> None: <0> data = cast(bytes, data) <1> buf = Buffer(data=data) <2> <3> try: <4> header = pull_quic_header( <5> buf, host_cid_length=self._configuration.connection_id_length <6> ) <7> except ValueError: <8> return <9> <10> # version negotiation <11> if ( <12> header.version is not None <13> and header.version not in self._configuration.supported_versions <14> ): <15> self._transport.sendto( <16> encode_quic_version_negotiation( <17> source_cid=header.destination_cid, <18> destination_cid=header.source_cid, <19> supported_versions=self._configuration.supported_versions, <20> ), <21> addr, <22> ) <23> return <24> <25> protocol = self._protocols.get(header.destination_cid, None) <26> original_connection_id: Optional[bytes] = None <27> if ( <28> protocol is None <29> and len(data) >= 1200 <30> and header.packet_type == PACKET_TYPE_INITIAL <31> ): <32> # stateless retry <33> if self._retry is not None: <34> if not header.token: <35> # create a retry token <36> self._transport.sendto( <37> encode_quic_retry( <38> version=header.version, <39> source_cid=os.urandom(8), <40> destination_cid=header.source_cid, <41> original_destination_cid=header.destination_cid, <42> retry_token=self._retry.create_token( <43> addr, header.destination_cid <44> ), <45> ), <46> addr, <47> ) <48> return <49> else: <50> # validate retry token <51> try: <52> original_connection_id =</s>
===========below chunk 0=========== # module: aioquic.asyncio.server class QuicServer(asyncio.DatagramProtocol): def datagram_received(self, data: Union[bytes, Text], addr: NetworkAddress) -> None: # offset: 1 addr, header.token ) except ValueError: return # create new connection connection = QuicConnection( configuration=self._configuration, logger_connection_id=original_connection_id or header.destination_cid, original_connection_id=original_connection_id, session_ticket_fetcher=self._session_ticket_fetcher, session_ticket_handler=self._session_ticket_handler, ) protocol = self._create_protocol( connection, stream_handler=self._stream_handler ) protocol.connection_made(self._transport) # register callbacks protocol._connection_id_issued_handler = partial( self._connection_id_issued, protocol=protocol ) protocol._connection_id_retired_handler = partial( self._connection_id_retired, protocol=protocol ) protocol._connection_terminated_handler = partial( self._connection_terminated, protocol=protocol ) self._protocols[header.destination_cid] = protocol self._protocols[connection.host_cid] = protocol if protocol is not None: protocol.datagram_received(data, addr) ===========unchanged ref 0=========== at: aioquic.asyncio.server.QuicServer _connection_id_issued(cid: bytes, protocol: QuicConnectionProtocol) _connection_id_retired(cid: bytes, protocol: QuicConnectionProtocol) -> None _connection_terminated(protocol: QuicConnectionProtocol) at: aioquic.asyncio.server.QuicServer.__init__ self._configuration = configuration self._create_protocol = create_protocol self._protocols: Dict[bytes, QuicConnectionProtocol] = {} self._session_ticket_fetcher = session_ticket_fetcher self._session_ticket_handler = session_ticket_handler self._transport: Optional[asyncio.DatagramTransport] = None self._stream_handler = stream_handler self._retry = QuicRetryTokenHandler() self._retry = None at: aioquic.asyncio.server.QuicServer.connection_made self._transport = cast(asyncio.DatagramTransport, transport) at: asyncio.protocols.DatagramProtocol __slots__ = () datagram_received(self, data: bytes, addr: Tuple[str, int]) -> None at: asyncio.transports.DatagramTransport __slots__ = () sendto(data: Any, addr: Optional[_Address]=...) -> None at: functools partial(func: Callable[..., _T], *args: Any, **kwargs: Any) partial(func, *args, **keywords, /) -> function with partial application() at: os urandom(size: int, /) -> bytes at: typing cast(typ: Type[_T], val: Any) -> _T cast(typ: str, val: Any) -> Any cast(typ: object, val: Any) -> Any Text = str ===========unchanged ref 1=========== at: typing.Mapping get(key: _KT, default: Union[_VT_co, _T]) -> Union[_VT_co, _T] get(key: _KT) -> Optional[_VT_co] ===========changed ref 0=========== # module: aioquic.quic.connection class QuicConnection: + @property + def original_destination_connection_id(self) -> bytes: + return self._original_destination_connection_id + ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, + QuicTransportParameters( - QuicTransportParameters(), + original_destination_connection_id=client.original_destination_connection_id + ), protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 2=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_and_serve_with_stateless_retry_bad_original_destination_connection_id( + self, + ): + """ + If the server's transport parameters do not have the correct + original_destination_connection_id the connection fail. + """ + + def create_protocol(*args, **kwargs): + protocol = QuicConnectionProtocol(*args, **kwargs) + protocol._quic._original_destination_connection_id = None + return protocol + + run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) + with self.assertRaises(ConnectionError): + run(self.run_client()) + ===========changed ref 3=========== # module: aioquic.quic.retry class QuicRetryTokenHandler: + def create_token( + self, + addr: NetworkAddress, + original_destination_connection_id: bytes, + retry_source_connection_id: bytes, + ) -> bytes: - def create_token(self, addr: NetworkAddress, destination_cid: bytes) -> bytes: + retry_message = ( + encode_address(addr) + + b"|" + + original_destination_connection_id + + b"|" + + retry_source_connection_id + ) - retry_message = encode_address(addr) + b"|" + destination_cid return self._key.public_key().encrypt( retry_message, padding.OAEP( mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None ), ) ===========changed ref 4=========== # module: tests.test_asyncio class HighLevelTest(TestCase): - def test_connect_and_serve_with_stateless_retry_bad_original_connection_id(self): - """ - If the server's transport parameters do not have the correct - original_connection_id the connection fail. - """ - - def create_protocol(*args, **kwargs): - protocol = QuicConnectionProtocol(*args, **kwargs) - protocol._quic._original_connection_id = None - return protocol - - run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) - with self.assertRaises(ConnectionError): - run(self.run_client()) - ===========changed ref 5=========== # module: aioquic.quic.retry class QuicRetryTokenHandler: + def validate_token(self, addr: NetworkAddress, token: bytes) -> Tuple[bytes, bytes]: - def validate_token(self, addr: NetworkAddress, token: bytes) -> bytes: retry_message = self._key.decrypt( token, padding.OAEP( mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None ), ) + ( + encoded_addr, + original_destination_connection_id, + retry_source_connection_id, + ) = retry_message.split(b"|", maxsplit=2) - encoded_addr, original_connection_id = retry_message.split(b"|", maxsplit=1) if encoded_addr != encode_address(addr): raise ValueError("Remote address does not match.") + return original_destination_connection_id, retry_source_connection_id - return original_connection_id
tests.test_connection/QuicConnectionTest.test_parse_transport_parameters
Modified
aiortc~aioquic
5ee5dd9c9fa65bd086e79a4cd85c52ad439eb0d2
Advertise draft-28 support
<8>:<add> protocol_version=QuicProtocolVersion.DRAFT_28, <del> protocol_version=QuicProtocolVersion.DRAFT_27,
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): <0> client = create_standalone_client(self) <1> <2> buf = Buffer(capacity=32) <3> push_quic_transport_parameters( <4> buf, <5> QuicTransportParameters( <6> original_destination_connection_id=client.original_destination_connection_id <7> ), <8> protocol_version=QuicProtocolVersion.DRAFT_27, <9> ) <10> client._parse_transport_parameters(buf.data) <11>
===========unchanged ref 0=========== at: tests.test_connection create_standalone_client(self, **client_options) ===========changed ref 0=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 DRAFT_25 = 0xFF000019 DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B + DRAFT_28 = 0xFF00001C
tests.test_connection/QuicConnectionTest.test_parse_transport_parameters_with_bad_active_connection_id_limit
Modified
aiortc~aioquic
5ee5dd9c9fa65bd086e79a4cd85c52ad439eb0d2
Advertise draft-28 support
<10>:<add> protocol_version=QuicProtocolVersion.DRAFT_28, <del> protocol_version=QuicProtocolVersion.DRAFT_27,
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): <0> client = create_standalone_client(self) <1> <2> for active_connection_id_limit in [0, 1]: <3> buf = Buffer(capacity=32) <4> push_quic_transport_parameters( <5> buf, <6> QuicTransportParameters( <7> active_connection_id_limit=active_connection_id_limit, <8> original_destination_connection_id=client.original_destination_connection_id, <9> ), <10> protocol_version=QuicProtocolVersion.DRAFT_27, <11> ) <12> with self.assertRaises(QuicConnectionError) as cm: <13> client._parse_transport_parameters(buf.data) <14> self.assertEqual( <15> cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR <16> ) <17> self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) <18> self.assertEqual( <19> cm.exception.reason_phrase, <20> "active_connection_id_limit must be no less than 2", <21> ) <22>
===========unchanged ref 0=========== at: tests.test_connection create_standalone_client(self, **client_options) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None at: unittest.case._AssertRaisesContext.__exit__ self.exception = exc_value.with_traceback(None) ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), + protocol_version=QuicProtocolVersion.DRAFT_28, - protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 1=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 DRAFT_25 = 0xFF000019 DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B + DRAFT_28 = 0xFF00001C
tests.test_packet_builder/create_builder
Modified
aiortc~aioquic
5ee5dd9c9fa65bd086e79a4cd85c52ad439eb0d2
Advertise draft-28 support
<7>:<add> version=QuicProtocolVersion.DRAFT_28, <del> version=QuicProtocolVersion.DRAFT_25,
# module: tests.test_packet_builder def create_builder(is_client=False): <0> return QuicPacketBuilder( <1> host_cid=bytes(8), <2> is_client=is_client, <3> packet_number=0, <4> peer_cid=bytes(8), <5> peer_token=b"", <6> spin_bit=False, <7> version=QuicProtocolVersion.DRAFT_25, <8> ) <9>
===========changed ref 0=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 DRAFT_25 = 0xFF000019 DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B + DRAFT_28 = 0xFF00001C ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), + protocol_version=QuicProtocolVersion.DRAFT_28, - protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, ), + protocol_version=QuicProtocolVersion.DRAFT_28, - protocol_version=QuicProtocolVersion.DRAFT_27, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 3=========== # module: aioquic.quic.configuration @dataclass class QuicConfiguration: """ A QUIC configuration. """ alpn_protocols: Optional[List[str]] = None """ A list of supported ALPN protocols. """ connection_id_length: int = 8 """ The length in bytes of local connection IDs. """ idle_timeout: float = 60.0 """ The idle timeout in seconds. The connection is terminated if nothing is received for the given duration. """ is_client: bool = True """ Whether this is the client side of the QUIC connection. """ max_data: int = 1048576 """ Connection-wide flow control limit. """ max_stream_data: int = 1048576 """ Per-stream flow control limit. """ quic_logger: Optional[QuicLogger] = None """ The :class:`~aioquic.quic.logger.QuicLogger` instance to log events to. """ secrets_log_file: TextIO = None """ A file-like object in which to log traffic secrets. This is useful to analyze traffic captures with Wireshark. """ server_name: Optional[str] = None """ The server name to send during the TLS handshake the Server Name Indication. .. note:: This is only used by clients. """ session_ticket: Optional[SessionTicket] = None """ The TLS session ticket which should be used for session resumption. """ cadata: Optional[bytes] = None cafile: Optional[str] = None capath: Optional[str] = None certificate: Any = None certificate_chain: List[Any] = field(default_factory=list) max_datagram_frame_size: Optional[int] = None private_key: Any = None quantum_readiness_test: bool = False supported_versions: List</s> ===========changed ref 4=========== # module: aioquic.quic.configuration @dataclass class QuicConfiguration: # offset: 1 <s> None private_key: Any = None quantum_readiness_test: bool = False supported_versions: List[int] = field( default_factory=lambda: [ + QuicProtocolVersion.DRAFT_28, QuicProtocolVersion.DRAFT_27, QuicProtocolVersion.DRAFT_26, QuicProtocolVersion.DRAFT_25, ] ) verify_mode: Optional[int] = None
tests.test_packet_builder/create_crypto
Modified
aiortc~aioquic
5ee5dd9c9fa65bd086e79a4cd85c52ad439eb0d2
Advertise draft-28 support
<1>:<add> crypto.setup_initial(bytes(8), is_client=True, version=QuicProtocolVersion.DRAFT_28) <del> crypto.setup_initial(bytes(8), is_client=True, version=QuicProtocolVersion.DRAFT_25)
# module: tests.test_packet_builder def create_crypto(): <0> crypto = CryptoPair() <1> crypto.setup_initial(bytes(8), is_client=True, version=QuicProtocolVersion.DRAFT_25) <2> return crypto <3>
===========changed ref 0=========== # module: tests.test_packet_builder def create_builder(is_client=False): return QuicPacketBuilder( host_cid=bytes(8), is_client=is_client, packet_number=0, peer_cid=bytes(8), peer_token=b"", spin_bit=False, + version=QuicProtocolVersion.DRAFT_28, - version=QuicProtocolVersion.DRAFT_25, ) ===========changed ref 1=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 DRAFT_25 = 0xFF000019 DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B + DRAFT_28 = 0xFF00001C ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), + protocol_version=QuicProtocolVersion.DRAFT_28, - protocol_version=QuicProtocolVersion.DRAFT_27, ) client._parse_transport_parameters(buf.data) ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, ), + protocol_version=QuicProtocolVersion.DRAFT_28, - protocol_version=QuicProtocolVersion.DRAFT_27, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 4=========== # module: aioquic.quic.configuration @dataclass class QuicConfiguration: """ A QUIC configuration. """ alpn_protocols: Optional[List[str]] = None """ A list of supported ALPN protocols. """ connection_id_length: int = 8 """ The length in bytes of local connection IDs. """ idle_timeout: float = 60.0 """ The idle timeout in seconds. The connection is terminated if nothing is received for the given duration. """ is_client: bool = True """ Whether this is the client side of the QUIC connection. """ max_data: int = 1048576 """ Connection-wide flow control limit. """ max_stream_data: int = 1048576 """ Per-stream flow control limit. """ quic_logger: Optional[QuicLogger] = None """ The :class:`~aioquic.quic.logger.QuicLogger` instance to log events to. """ secrets_log_file: TextIO = None """ A file-like object in which to log traffic secrets. This is useful to analyze traffic captures with Wireshark. """ server_name: Optional[str] = None """ The server name to send during the TLS handshake the Server Name Indication. .. note:: This is only used by clients. """ session_ticket: Optional[SessionTicket] = None """ The TLS session ticket which should be used for session resumption. """ cadata: Optional[bytes] = None cafile: Optional[str] = None capath: Optional[str] = None certificate: Any = None certificate_chain: List[Any] = field(default_factory=list) max_datagram_frame_size: Optional[int] = None private_key: Any = None quantum_readiness_test: bool = False supported_versions: List</s> ===========changed ref 5=========== # module: aioquic.quic.configuration @dataclass class QuicConfiguration: # offset: 1 <s> None private_key: Any = None quantum_readiness_test: bool = False supported_versions: List[int] = field( default_factory=lambda: [ + QuicProtocolVersion.DRAFT_28, QuicProtocolVersion.DRAFT_27, QuicProtocolVersion.DRAFT_26, QuicProtocolVersion.DRAFT_25, ] ) verify_mode: Optional[int] = None
aioquic.quic.packet/pull_quic_transport_parameters
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<1>:<del> <2>:<del> if protocol_version < QuicProtocolVersion.DRAFT_27: <3>:<del> with pull_block(buf, 2) as length: <4>:<del> end = buf.tell() + length <5>:<del> while buf.tell() < end: <6>:<del> param_id = buf.pull_uint16() <7>:<del> param_len = buf.pull_uint16() <8>:<del> param_start = buf.tell() <9>:<del> if param_id in PARAMS: <10>:<del> # parse known parameter <11>:<del> param_name, param_type = PARAMS[param_id] <12>:<del> if param_type == int: <13>:<del> setattr(params, param_name, buf.pull_uint_var()) <14>:<del> elif param_type == bytes: <15>:<del> setattr(params, param_name, buf.pull_bytes(param_len)) <16>:<del> elif param_type == QuicPreferredAddress: <17>:<del> setattr(params, param_name, pull_quic_preferred_address(buf)) <18>:<del> else: <19>:<del> setattr(params, param_name, True) <20>:<del> else: <21>:<del> # skip unknown parameter <22>:<del> buf.pull_bytes(param_len) <23>:<del> assert buf.tell() == param_start + param_len <24>:<del> else: <25>:<add> while not buf.eof(): <del> while not buf.eof(): <26>:<add> param_id = buf.pull_uint_var() <del> param_id = buf.pull_uint_var() <27>:<add> param_len = buf.pull_uint_var() <del> param_len = buf.pull_uint_var() <28>:<add> param_start = buf.tell() <del> param_start = buf.tell() <29>:<add> if param_id in PARAMS: <del> if param_id in PARAMS: <30>:<add> # parse known parameter <del> # parse known parameter <31>:<add> param_name, param_type = PARAMS[param_id] <del> param_name, param_type = PARAMS[param_id] <32>:<add> if param_type == int: <del> if param_type == int: <33>:<add> setattr(params, param_name, buf.pull_uint_var()) <del> setattr(params, param_name, buf.pull_uint_var()) <34>:<add> elif param_type == bytes: <del> elif param_type == bytes: <35>:<add> setattr(params, param_name, buf.pull_bytes(param_len)) <del> setattr(params, param_name, buf.pull_
# module: aioquic.quic.packet - def pull_quic_transport_parameters( - buf: Buffer, protocol_version: int - ) -> QuicTransportParameters: + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters: <0> params = QuicTransportParameters() <1> <2> if protocol_version < QuicProtocolVersion.DRAFT_27: <3> with pull_block(buf, 2) as length: <4> end = buf.tell() + length <5> while buf.tell() < end: <6> param_id = buf.pull_uint16() <7> param_len = buf.pull_uint16() <8> param_start = buf.tell() <9> if param_id in PARAMS: <10> # parse known parameter <11> param_name, param_type = PARAMS[param_id] <12> if param_type == int: <13> setattr(params, param_name, buf.pull_uint_var()) <14> elif param_type == bytes: <15> setattr(params, param_name, buf.pull_bytes(param_len)) <16> elif param_type == QuicPreferredAddress: <17> setattr(params, param_name, pull_quic_preferred_address(buf)) <18> else: <19> setattr(params, param_name, True) <20> else: <21> # skip unknown parameter <22> buf.pull_bytes(param_len) <23> assert buf.tell() == param_start + param_len <24> else: <25> while not buf.eof(): <26> param_id = buf.pull_uint_var() <27> param_len = buf.pull_uint_var() <28> param_start = buf.tell() <29> if param_id in PARAMS: <30> # parse known parameter <31> param_name, param_type = PARAMS[param_id] <32> if param_type == int: <33> setattr(params, param_name, buf.pull_uint_var()) <34> elif param_type == bytes: <35> setattr(params, param_name, buf.pull_</s>
===========below chunk 0=========== # module: aioquic.quic.packet - def pull_quic_transport_parameters( - buf: Buffer, protocol_version: int - ) -> QuicTransportParameters: + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters: # offset: 1 elif param_type == QuicPreferredAddress: setattr(params, param_name, pull_quic_preferred_address(buf)) else: setattr(params, param_name, True) else: # skip unknown parameter buf.pull_bytes(param_len) assert buf.tell() == param_start + param_len return params ===========unchanged ref 0=========== at: aioquic.quic.packet QuicPreferredAddress(ipv4_address: Optional[Tuple[str, int]], ipv6_address: Optional[Tuple[str, int]], connection_id: bytes, stateless_reset_token: bytes) QuicTransportParameters(original_destination_connection_id: Optional[bytes]=None, max_idle_timeout: Optional[int]=None, stateless_reset_token: Optional[bytes]=None, max_udp_payload_size: Optional[int]=None, initial_max_data: Optional[int]=None, initial_max_stream_data_bidi_local: Optional[int]=None, initial_max_stream_data_bidi_remote: Optional[int]=None, initial_max_stream_data_uni: Optional[int]=None, initial_max_streams_bidi: Optional[int]=None, initial_max_streams_uni: Optional[int]=None, ack_delay_exponent: Optional[int]=None, max_ack_delay: Optional[int]=None, disable_active_migration: Optional[bool]=False, preferred_address: Optional[QuicPreferredAddress]=None, active_connection_id_limit: Optional[int]=None, initial_source_connection_id: Optional[bytes]=None, retry_source_connection_id: Optional[bytes]=None, max_datagram_frame_size: Optional[int]=None, quantum_readiness: Optional[bytes]=None) ===========unchanged ref 1=========== PARAMS = { 0x00: ("original_destination_connection_id", bytes), 0x01: ("max_idle_timeout", int), 0x02: ("stateless_reset_token", bytes), 0x03: ("max_udp_payload_size", int), 0x04: ("initial_max_data", int), 0x05: ("initial_max_stream_data_bidi_local", int), 0x06: ("initial_max_stream_data_bidi_remote", int), 0x07: ("initial_max_stream_data_uni", int), 0x08: ("initial_max_streams_bidi", int), 0x09: ("initial_max_streams_uni", int), 0x0A: ("ack_delay_exponent", int), 0x0B: ("max_ack_delay", int), 0x0C: ("disable_active_migration", bool), 0x0D: ("preferred_address", QuicPreferredAddress), 0x0E: ("active_connection_id_limit", int), 0x0F: ("initial_source_connection_id", bytes), 0x10: ("retry_source_connection_id", bytes), # extensions 0x0020: ("max_datagram_frame_size", int), 0x0C37: ("quantum_readiness", bytes), } pull_quic_preferred_address(buf: Buffer) -> QuicPreferredAddress push_quic_preferred_address(buf: Buffer, preferred_address: QuicPreferredAddress) -> None at: aioquic.quic.packet.QuicFrameType STOP_SENDING = 0x05 CRYPTO = 0x06 NEW_TOKEN = 0x07 STREAM_BASE = 0x08 MAX_DATA = 0x10 MAX_STREAM_DATA = 0x11 MAX_STREAMS_BIDI = 0x12 MAX_STREAMS_UNI = 0x13 DATA_BLOCKED = 0x14 ===========unchanged ref 2=========== STREAM_DATA_BLOCKED = 0x15 STREAMS_BLOCKED_BIDI = 0x16 STREAMS_BLOCKED_UNI = 0x17 NEW_CONNECTION_ID = 0x18 RETIRE_CONNECTION_ID = 0x19 PATH_CHALLENGE = 0x1A PATH_RESPONSE = 0x1B TRANSPORT_CLOSE = 0x1C APPLICATION_CLOSE = 0x1D HANDSHAKE_DONE = 0x1E DATAGRAM = 0x30 DATAGRAM_WITH_LENGTH = 0x31 at: aioquic.quic.packet.pull_quic_transport_parameters params = QuicTransportParameters() at: enum IntEnum(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) IntEnum(x: Union[str, bytes, bytearray], base: int) ===========changed ref 0=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C
aioquic.quic.packet/push_quic_transport_parameters
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<0>:<del> if protocol_version < QuicProtocolVersion.DRAFT_27: <1>:<del> with push_block(buf, 2): <2>:<del> for param_id, (param_name, param_type) in PARAMS.items(): <3>:<del> param_value = getattr(params, param_name) <4>:<del> if param_value is not None and param_value is not False: <5>:<del> buf.push_uint16(param_id) <6>:<del> with push_block(buf, 2): <7>:<del> if param_type == int: <8>:<del> buf.push_uint_var(param_value) <9>:<del> elif param_type == bytes: <10>:<del> buf.push_bytes(param_value) <11>:<del> elif param_type == QuicPreferredAddress: <12>:<del> push_quic_preferred_address(buf, param_value) <13>:<del> else: <14>:<add> for param_id, (param_name, param_type) in PARAMS.items(): <del> for param_id, (param_name, param_type) in PARAMS.items(): <15>:<add> param_value = getattr(params, param_name) <del> param_value = getattr(params, param_name) <16>:<add> if param_value is not None and param_value is not False: <del> if param_value is not None and param_value is not False: <17>:<add> param_buf = Buffer(capacity=65536) <del> param_buf = Buffer(capacity=65536) <18>:<add> if param_type == int: <del> if param_type == int: <19>:<add> param_buf.push_uint_var(param_value) <del> param_buf.push_uint_var(param_value) <20>:<add> elif param_type == bytes: <del> elif param_type == bytes: <21>:<add> param_buf.push_bytes(param_value) <del> param_buf.push_bytes(param_value) <22>:<add> elif param_type == QuicPreferredAddress: <del> elif param_type == QuicPreferredAddress: <23>:<add> push_quic_preferred_address(param_buf, param_value) <del> push_quic_preferred_address(param_buf, param_value) <24>:<add> buf.push_uint_var(param_id) <del> buf.push_uint_var(param_id) <25>:<add> buf.push_uint_var(param_buf.tell()) <del> buf.push_uint_var(param_buf.tell()) <26>:<add> buf.push_bytes(param_buf.data)
# module: aioquic.quic.packet def push_quic_transport_parameters( + buf: Buffer, params: QuicTransportParameters - buf: Buffer, params: QuicTransportParameters, protocol_version: int ) -> None: <0> if protocol_version < QuicProtocolVersion.DRAFT_27: <1> with push_block(buf, 2): <2> for param_id, (param_name, param_type) in PARAMS.items(): <3> param_value = getattr(params, param_name) <4> if param_value is not None and param_value is not False: <5> buf.push_uint16(param_id) <6> with push_block(buf, 2): <7> if param_type == int: <8> buf.push_uint_var(param_value) <9> elif param_type == bytes: <10> buf.push_bytes(param_value) <11> elif param_type == QuicPreferredAddress: <12> push_quic_preferred_address(buf, param_value) <13> else: <14> for param_id, (param_name, param_type) in PARAMS.items(): <15> param_value = getattr(params, param_name) <16> if param_value is not None and param_value is not False: <17> param_buf = Buffer(capacity=65536) <18> if param_type == int: <19> param_buf.push_uint_var(param_value) <20> elif param_type == bytes: <21> param_buf.push_bytes(param_value) <22> elif param_type == QuicPreferredAddress: <23> push_quic_preferred_address(param_buf, param_value) <24> buf.push_uint_var(param_id) <25> buf.push_uint_var(param_buf.tell()) <26> buf.push_bytes(param_buf.data) <27>
===========unchanged ref 0=========== at: aioquic.quic.packet QuicFrameType(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) QuicFrameType(x: Union[str, bytes, bytearray], base: int) ===========changed ref 0=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 1=========== # module: aioquic.quic.packet - def pull_quic_transport_parameters( - buf: Buffer, protocol_version: int - ) -> QuicTransportParameters: + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters: params = QuicTransportParameters() - - if protocol_version < QuicProtocolVersion.DRAFT_27: - with pull_block(buf, 2) as length: - end = buf.tell() + length - while buf.tell() < end: - param_id = buf.pull_uint16() - param_len = buf.pull_uint16() - param_start = buf.tell() - if param_id in PARAMS: - # parse known parameter - param_name, param_type = PARAMS[param_id] - if param_type == int: - setattr(params, param_name, buf.pull_uint_var()) - elif param_type == bytes: - setattr(params, param_name, buf.pull_bytes(param_len)) - elif param_type == QuicPreferredAddress: - setattr(params, param_name, pull_quic_preferred_address(buf)) - else: - setattr(params, param_name, True) - else: - # skip unknown parameter - buf.pull_bytes(param_len) - assert buf.tell() == param_start + param_len - else: + while not buf.eof(): - while not buf.eof(): + param_id = buf.pull_uint_var() - param_id = buf.pull_uint_var() + param_len = buf.pull_uint_var() - param_len = buf.pull_uint_var() + param_start = buf.tell() - param_start = buf.tell() + if param_id in PARAMS: - if param_id in PARAMS: + # parse known parameter - # parse known parameter + param</s> ===========changed ref 2=========== # module: aioquic.quic.packet - def pull_quic_transport_parameters( - buf: Buffer, protocol_version: int - ) -> QuicTransportParameters: + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters: # offset: 1 <s>: - if param_id in PARAMS: + # parse known parameter - # parse known parameter + param_name, param_type = PARAMS[param_id] - param_name, param_type = PARAMS[param_id] + if param_type == int: - if param_type == int: + setattr(params, param_name, buf.pull_uint_var()) - setattr(params, param_name, buf.pull_uint_var()) + elif param_type == bytes: - elif param_type == bytes: + setattr(params, param_name, buf.pull_bytes(param_len)) - setattr(params, param_name, buf.pull_bytes(param_len)) + elif param_type == QuicPreferredAddress: - elif param_type == QuicPreferredAddress: + setattr(params, param_name, pull_quic_preferred_address(buf)) - setattr(params, param_name, pull_quic_preferred_address(buf)) - else: - setattr(params, param_name, True) else: + setattr(params, param_name, True) + else: + # skip unknown parameter - # skip unknown parameter + buf.pull_bytes(param_len) - buf.pull_bytes(param_len) + assert buf.tell() == param_start + param_len - assert buf.tell() == param_start + param_len return params
tests.test_connection/QuicConnectionTest.test_parse_transport_parameters
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<8>:<del> protocol_version=QuicProtocolVersion.DRAFT_28,
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): <0> client = create_standalone_client(self) <1> <2> buf = Buffer(capacity=32) <3> push_quic_transport_parameters( <4> buf, <5> QuicTransportParameters( <6> original_destination_connection_id=client.original_destination_connection_id <7> ), <8> protocol_version=QuicProtocolVersion.DRAFT_28, <9> ) <10> client._parse_transport_parameters(buf.data) <11>
===========unchanged ref 0=========== at: tests.test_connection create_standalone_client(self, **client_options) ===========changed ref 0=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 1=========== # module: aioquic.quic.packet def push_quic_transport_parameters( + buf: Buffer, params: QuicTransportParameters - buf: Buffer, params: QuicTransportParameters, protocol_version: int ) -> None: - if protocol_version < QuicProtocolVersion.DRAFT_27: - with push_block(buf, 2): - for param_id, (param_name, param_type) in PARAMS.items(): - param_value = getattr(params, param_name) - if param_value is not None and param_value is not False: - buf.push_uint16(param_id) - with push_block(buf, 2): - if param_type == int: - buf.push_uint_var(param_value) - elif param_type == bytes: - buf.push_bytes(param_value) - elif param_type == QuicPreferredAddress: - push_quic_preferred_address(buf, param_value) - else: + for param_id, (param_name, param_type) in PARAMS.items(): - for param_id, (param_name, param_type) in PARAMS.items(): + param_value = getattr(params, param_name) - param_value = getattr(params, param_name) + if param_value is not None and param_value is not False: - if param_value is not None and param_value is not False: + param_buf = Buffer(capacity=65536) - param_buf = Buffer(capacity=65536) + if param_type == int: - if param_type == int: + param_buf.push_uint_var(param_value) - param_buf.push_uint_var(param_value) + elif param_type == bytes: - elif param_type == bytes: + param_buf.push_bytes(param_value) - param_buf.push_bytes(param_value) + elif param_type == QuicPreferred</s> ===========changed ref 2=========== # module: aioquic.quic.packet def push_quic_transport_parameters( + buf: Buffer, params: QuicTransportParameters - buf: Buffer, params: QuicTransportParameters, protocol_version: int ) -> None: # offset: 1 <s>param_value) - param_buf.push_bytes(param_value) + elif param_type == QuicPreferredAddress: - elif param_type == QuicPreferredAddress: + push_quic_preferred_address(param_buf, param_value) - push_quic_preferred_address(param_buf, param_value) + buf.push_uint_var(param_id) - buf.push_uint_var(param_id) + buf.push_uint_var(param_buf.tell()) - buf.push_uint_var(param_buf.tell()) + buf.push_bytes(param_buf.data) - buf.push_bytes(param_buf.data) ===========changed ref 3=========== # module: aioquic.quic.packet - def pull_quic_transport_parameters( - buf: Buffer, protocol_version: int - ) -> QuicTransportParameters: + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters: params = QuicTransportParameters() - - if protocol_version < QuicProtocolVersion.DRAFT_27: - with pull_block(buf, 2) as length: - end = buf.tell() + length - while buf.tell() < end: - param_id = buf.pull_uint16() - param_len = buf.pull_uint16() - param_start = buf.tell() - if param_id in PARAMS: - # parse known parameter - param_name, param_type = PARAMS[param_id] - if param_type == int: - setattr(params, param_name, buf.pull_uint_var()) - elif param_type == bytes: - setattr(params, param_name, buf.pull_bytes(param_len)) - elif param_type == QuicPreferredAddress: - setattr(params, param_name, pull_quic_preferred_address(buf)) - else: - setattr(params, param_name, True) - else: - # skip unknown parameter - buf.pull_bytes(param_len) - assert buf.tell() == param_start + param_len - else: + while not buf.eof(): - while not buf.eof(): + param_id = buf.pull_uint_var() - param_id = buf.pull_uint_var() + param_len = buf.pull_uint_var() - param_len = buf.pull_uint_var() + param_start = buf.tell() - param_start = buf.tell() + if param_id in PARAMS: - if param_id in PARAMS: + # parse known parameter - # parse known parameter + param</s> ===========changed ref 4=========== # module: aioquic.quic.packet - def pull_quic_transport_parameters( - buf: Buffer, protocol_version: int - ) -> QuicTransportParameters: + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters: # offset: 1 <s>: - if param_id in PARAMS: + # parse known parameter - # parse known parameter + param_name, param_type = PARAMS[param_id] - param_name, param_type = PARAMS[param_id] + if param_type == int: - if param_type == int: + setattr(params, param_name, buf.pull_uint_var()) - setattr(params, param_name, buf.pull_uint_var()) + elif param_type == bytes: - elif param_type == bytes: + setattr(params, param_name, buf.pull_bytes(param_len)) - setattr(params, param_name, buf.pull_bytes(param_len)) + elif param_type == QuicPreferredAddress: - elif param_type == QuicPreferredAddress: + setattr(params, param_name, pull_quic_preferred_address(buf)) - setattr(params, param_name, pull_quic_preferred_address(buf)) - else: - setattr(params, param_name, True) else: + setattr(params, param_name, True) + else: + # skip unknown parameter - # skip unknown parameter + buf.pull_bytes(param_len) - buf.pull_bytes(param_len) + assert buf.tell() == param_start + param_len - assert buf.tell() == param_start + param_len return params
tests.test_connection/QuicConnectionTest.test_parse_transport_parameters_with_bad_active_connection_id_limit
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<10>:<del> protocol_version=QuicProtocolVersion.DRAFT_28,
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): <0> client = create_standalone_client(self) <1> <2> for active_connection_id_limit in [0, 1]: <3> buf = Buffer(capacity=32) <4> push_quic_transport_parameters( <5> buf, <6> QuicTransportParameters( <7> active_connection_id_limit=active_connection_id_limit, <8> original_destination_connection_id=client.original_destination_connection_id, <9> ), <10> protocol_version=QuicProtocolVersion.DRAFT_28, <11> ) <12> with self.assertRaises(QuicConnectionError) as cm: <13> client._parse_transport_parameters(buf.data) <14> self.assertEqual( <15> cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR <16> ) <17> self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) <18> self.assertEqual( <19> cm.exception.reason_phrase, <20> "active_connection_id_limit must be no less than 2", <21> ) <22>
===========unchanged ref 0=========== at: tests.test_connection create_standalone_client(self, **client_options) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None at: unittest.case._AssertRaisesContext.__exit__ self.exception = exc_value.with_traceback(None) ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) client._parse_transport_parameters(buf.data) ===========changed ref 1=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 2=========== # module: aioquic.quic.packet def push_quic_transport_parameters( + buf: Buffer, params: QuicTransportParameters - buf: Buffer, params: QuicTransportParameters, protocol_version: int ) -> None: - if protocol_version < QuicProtocolVersion.DRAFT_27: - with push_block(buf, 2): - for param_id, (param_name, param_type) in PARAMS.items(): - param_value = getattr(params, param_name) - if param_value is not None and param_value is not False: - buf.push_uint16(param_id) - with push_block(buf, 2): - if param_type == int: - buf.push_uint_var(param_value) - elif param_type == bytes: - buf.push_bytes(param_value) - elif param_type == QuicPreferredAddress: - push_quic_preferred_address(buf, param_value) - else: + for param_id, (param_name, param_type) in PARAMS.items(): - for param_id, (param_name, param_type) in PARAMS.items(): + param_value = getattr(params, param_name) - param_value = getattr(params, param_name) + if param_value is not None and param_value is not False: - if param_value is not None and param_value is not False: + param_buf = Buffer(capacity=65536) - param_buf = Buffer(capacity=65536) + if param_type == int: - if param_type == int: + param_buf.push_uint_var(param_value) - param_buf.push_uint_var(param_value) + elif param_type == bytes: - elif param_type == bytes: + param_buf.push_bytes(param_value) - param_buf.push_bytes(param_value) + elif param_type == QuicPreferred</s> ===========changed ref 3=========== # module: aioquic.quic.packet def push_quic_transport_parameters( + buf: Buffer, params: QuicTransportParameters - buf: Buffer, params: QuicTransportParameters, protocol_version: int ) -> None: # offset: 1 <s>param_value) - param_buf.push_bytes(param_value) + elif param_type == QuicPreferredAddress: - elif param_type == QuicPreferredAddress: + push_quic_preferred_address(param_buf, param_value) - push_quic_preferred_address(param_buf, param_value) + buf.push_uint_var(param_id) - buf.push_uint_var(param_id) + buf.push_uint_var(param_buf.tell()) - buf.push_uint_var(param_buf.tell()) + buf.push_bytes(param_buf.data) - buf.push_bytes(param_buf.data) ===========changed ref 4=========== # module: aioquic.quic.packet - def pull_quic_transport_parameters( - buf: Buffer, protocol_version: int - ) -> QuicTransportParameters: + def pull_quic_transport_parameters(buf: Buffer) -> QuicTransportParameters: params = QuicTransportParameters() - - if protocol_version < QuicProtocolVersion.DRAFT_27: - with pull_block(buf, 2) as length: - end = buf.tell() + length - while buf.tell() < end: - param_id = buf.pull_uint16() - param_len = buf.pull_uint16() - param_start = buf.tell() - if param_id in PARAMS: - # parse known parameter - param_name, param_type = PARAMS[param_id] - if param_type == int: - setattr(params, param_name, buf.pull_uint_var()) - elif param_type == bytes: - setattr(params, param_name, buf.pull_bytes(param_len)) - elif param_type == QuicPreferredAddress: - setattr(params, param_name, pull_quic_preferred_address(buf)) - else: - setattr(params, param_name, True) - else: - # skip unknown parameter - buf.pull_bytes(param_len) - assert buf.tell() == param_start + param_len - else: + while not buf.eof(): - while not buf.eof(): + param_id = buf.pull_uint_var() - param_id = buf.pull_uint_var() + param_len = buf.pull_uint_var() - param_len = buf.pull_uint_var() + param_start = buf.tell() - param_start = buf.tell() + if param_id in PARAMS: - if param_id in PARAMS: + # parse known parameter - # parse known parameter + param</s>
aioquic.quic.connection/QuicConnection._parse_transport_parameters
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<7>:<add> quic_transport_parameters = pull_quic_transport_parameters(Buffer(data=data)) <del> quic_transport_parameters = pull_quic_transport_parameters( <8>:<del> Buffer(data=data), protocol_version=self._version <9>:<del> )
# module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: <0> """ <1> Parse and apply remote transport parameters. <2> <3> `from_session_ticket` is `True` when restoring saved transport parameters, <4> and `False` when handling received transport parameters. <5> """ <6> <7> quic_transport_parameters = pull_quic_transport_parameters( <8> Buffer(data=data), protocol_version=self._version <9> ) <10> <11> # log event <12> if self._quic_logger is not None and not from_session_ticket: <13> self._quic_logger.log_event( <14> category="transport", <15> event="parameters_set", <16> data=self._quic_logger.encode_transport_parameters( <17> owner="remote", parameters=quic_transport_parameters <18> ), <19> ) <20> <21> # validate remote parameters <22> if ( <23> self._is_client <24> and not from_session_ticket <25> and ( <26> quic_transport_parameters.original_destination_connection_id <27> != self._original_destination_connection_id <28> ) <29> ): <30> raise QuicConnectionError( <31> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <32> frame_type=QuicFrameType.CRYPTO, <33> reason_phrase="original_destination_connection_id does not match", <34> ) <35> if ( <36> quic_transport_parameters.active_connection_id_limit is not None <37> and quic_transport_parameters.active_connection_id_limit < 2 <38> ): <39> raise QuicConnectionError( <40> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <41> frame_type=QuicFrameType.CRYPTO, <42> reason_phrase="active_connection_id_limit must be no less than 2", <43> ) <44> <45> # store remote parameters </s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 if quic_transport_parameters.ack_delay_exponent is not None: self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = ( quic_transport_parameters.max_ack_delay / 1000.0 ) if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) if quic_transport_parameters.max_idle_timeout is not None: self._remote_max_idle_timeout = ( quic_transport_parameters.max_idle_timeout / 1000.0 ) self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========unchanged ref 0=========== at: aioquic.quic.connection QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str) at: aioquic.quic.connection.QuicConnection.__init__ self._is_client = configuration.is_client self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=self._original_destination_connection_id, ) self._remote_ack_delay_exponent = 3 self._remote_active_connection_id_limit = 0 self._remote_max_idle_timeout = 0.0 # seconds self._remote_max_datagram_frame_size: Optional[int] = None self._original_destination_connection_id = self._peer_cid self._original_destination_connection_id = ( original_destination_connection_id ) self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None at: aioquic.quic.connection.QuicConnection.receive_datagram self._original_destination_connection_id = self._peer_cid ===========changed ref 0=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) client._parse_transport_parameters(buf.data) ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 3=========== # module: aioquic.quic.configuration @dataclass class QuicConfiguration: """ A QUIC configuration. """ alpn_protocols: Optional[List[str]] = None """ A list of supported ALPN protocols. """ connection_id_length: int = 8 """ The length in bytes of local connection IDs. """ idle_timeout: float = 60.0 """ The idle timeout in seconds. The connection is terminated if nothing is received for the given duration. """ is_client: bool = True """ Whether this is the client side of the QUIC connection. """ max_data: int = 1048576 """ Connection-wide flow control limit. """ max_stream_data: int = 1048576 """ Per-stream flow control limit. """ quic_logger: Optional[QuicLogger] = None """ The :class:`~aioquic.quic.logger.QuicLogger` instance to log events to. """ secrets_log_file: TextIO = None """ A file-like object in which to log traffic secrets. This is useful to analyze traffic captures with Wireshark. """ server_name: Optional[str] = None """ The server name to send during the TLS handshake the Server Name Indication. .. note:: This is only used by clients. """ session_ticket: Optional[SessionTicket] = None """ The TLS session ticket which should be used for session resumption. """ cadata: Optional[bytes] = None cafile: Optional[str] = None capath: Optional[str] = None certificate: Any = None certificate_chain: List[Any] = field(default_factory=list) max_datagram_frame_size: Optional[int] = None private_key: Any = None quantum_readiness_test: bool = False supported_versions: List</s> ===========changed ref 4=========== # module: aioquic.quic.configuration @dataclass class QuicConfiguration: # offset: 1 <s> None private_key: Any = None quantum_readiness_test: bool = False supported_versions: List[int] = field( default_factory=lambda: [ QuicProtocolVersion.DRAFT_28, QuicProtocolVersion.DRAFT_27, - QuicProtocolVersion.DRAFT_26, - QuicProtocolVersion.DRAFT_25, ] ) verify_mode: Optional[int] = None
aioquic.quic.connection/QuicConnection._serialize_transport_parameters
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
# module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: <0> quic_transport_parameters = QuicTransportParameters( <1> ack_delay_exponent=self._local_ack_delay_exponent, <2> active_connection_id_limit=self._local_active_connection_id_limit, <3> max_idle_timeout=int(self._configuration.idle_timeout * 1000), <4> initial_max_data=self._local_max_data, <5> initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local, <6> initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote, <7> initial_max_stream_data_uni=self._local_max_stream_data_uni, <8> initial_max_streams_bidi=self._local_max_streams_bidi, <9> initial_max_streams_uni=self._local_max_streams_uni, <10> initial_source_connection_id=self._local_initial_source_connection_id, <11> max_ack_delay=25, <12> max_datagram_frame_size=self._configuration.max_datagram_frame_size, <13> quantum_readiness=b"Q" * 1200 <14> if self._configuration.quantum_readiness_test <15> else None, <16> ) <17> if not self._is_client: <18> quic_transport_parameters.original_destination_connection_id = ( <19> self._original_destination_connection_id <20> ) <21> quic_transport_parameters.retry_source_connection_id = ( <22> self._retry_source_connection_id <23> ) <24> <25> # log event <26> if self._quic_logger is not None: <27> self._quic_logger.log_event( <28> category="transport", <29> event="parameters_set", <30> data=self._quic_logger.encode_transport_</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: # offset: 1 owner="local", parameters=quic_transport_parameters ), ) buf = Buffer(capacity=3 * PACKET_MAX_SIZE) push_quic_transport_parameters( buf, quic_transport_parameters, protocol_version=self._version ) return buf.data ===========unchanged ref 0=========== at: aioquic.quic.connection QuicConnectionState() at: aioquic.quic.connection.QuicConnection.__init__ self._configuration = configuration self._is_client = configuration.is_client self._local_ack_delay_exponent = 3 self._local_active_connection_id_limit = 8 self._local_initial_source_connection_id = self._host_cids[0].cid self._local_max_data = configuration.max_data self._local_max_stream_data_bidi_local = configuration.max_stream_data self._local_max_stream_data_bidi_remote = configuration.max_stream_data self._local_max_stream_data_uni = configuration.max_stream_data self._local_max_streams_bidi = 128 self._local_max_streams_uni = 128 self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=self._original_destination_connection_id, ) self._retry_source_connection_id = retry_source_connection_id self._state = QuicConnectionState.FIRSTFLIGHT self._original_destination_connection_id = self._peer_cid self._original_destination_connection_id = ( original_destination_connection_id ) self._logger = QuicConnectionAdapter( logger, {"id": dump_cid(self._original_destination_connection_id)} ) at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None ===========unchanged ref 1=========== at: aioquic.quic.connection.QuicConnection._serialize_transport_parameters quic_transport_parameters = QuicTransportParameters( ack_delay_exponent=self._local_ack_delay_exponent, active_connection_id_limit=self._local_active_connection_id_limit, max_idle_timeout=int(self._configuration.idle_timeout * 1000), initial_max_data=self._local_max_data, initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local, initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote, initial_max_stream_data_uni=self._local_max_stream_data_uni, initial_max_streams_bidi=self._local_max_streams_bidi, initial_max_streams_uni=self._local_max_streams_uni, initial_source_connection_id=self._local_initial_source_connection_id, max_ack_delay=25, max_datagram_frame_size=self._configuration.max_datagram_frame_size, quantum_readiness=b"Q" * 1200 if self._configuration.quantum_readiness_test else None, ) at: aioquic.quic.connection.QuicConnection._write_connection_limits self._local_max_data *= 2 at: aioquic.quic.connection.QuicConnection.receive_datagram self._original_destination_connection_id = self._peer_cid at: logging.LoggerAdapter logger: Logger extra: Mapping[str, Any] debug(msg: Any, *args: Any, exc_info: _ExcInfoType=..., stack_info: bool=..., extra: Optional[Dict[str, Any]]=..., **kwargs: Any) -> None ===========changed ref 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: """ Parse and apply remote transport parameters. `from_session_ticket` is `True` when restoring saved transport parameters, and `False` when handling received transport parameters. """ + quic_transport_parameters = pull_quic_transport_parameters(Buffer(data=data)) - quic_transport_parameters = pull_quic_transport_parameters( - Buffer(data=data), protocol_version=self._version - ) # log event if self._quic_logger is not None and not from_session_ticket: self._quic_logger.log_event( category="transport", event="parameters_set", data=self._quic_logger.encode_transport_parameters( owner="remote", parameters=quic_transport_parameters ), ) # validate remote parameters if ( self._is_client and not from_session_ticket and ( quic_transport_parameters.original_destination_connection_id != self._original_destination_connection_id ) ): raise QuicConnectionError( error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, frame_type=QuicFrameType.CRYPTO, reason_phrase="original_destination_connection_id does not match", ) if ( quic_transport_parameters.active_connection_id_limit is not None and quic_transport_parameters.active_connection_id_limit < 2 ): raise QuicConnectionError( error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, frame_type=QuicFrameType.CRYPTO, reason_phrase="active_connection_id_limit must be no less than 2", ) # store remote parameters if not from_session_ticket: if quic_transport_parameters</s> ===========changed ref 1=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 <s>", ) # store remote parameters if not from_session_ticket: if quic_transport_parameters.ack_delay_exponent is not None: self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = ( quic_transport_parameters.max_ack_delay / 1000.0 ) if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) if quic_transport_parameters.max_idle_timeout is not None: self._remote_max_idle_timeout = ( quic_transport_parameters.max_idle_timeout / 1000.0 ) self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value)
tests.test_packet/PacketTest.test_pull_initial_client
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<3>:<add> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) <del> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)
# module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_client(self): <0> buf = Buffer(data=load("initial_client.bin")) <1> header = pull_quic_header(buf, host_cid_length=8) <2> self.assertTrue(header.is_long_header) <3> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) <4> self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) <5> self.assertEqual(header.destination_cid, binascii.unhexlify("858b39368b8e3c6e")) <6> self.assertEqual(header.source_cid, b"") <7> self.assertEqual(header.token, b"") <8> self.assertEqual(header.integrity_tag, b"") <9> self.assertEqual(header.rest_length, 1262) <10> self.assertEqual(buf.tell(), 18) <11>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) client._parse_transport_parameters(buf.data) ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 3=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: quic_transport_parameters = QuicTransportParameters( ack_delay_exponent=self._local_ack_delay_exponent, active_connection_id_limit=self._local_active_connection_id_limit, max_idle_timeout=int(self._configuration.idle_timeout * 1000), initial_max_data=self._local_max_data, initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local, initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote, initial_max_stream_data_uni=self._local_max_stream_data_uni, initial_max_streams_bidi=self._local_max_streams_bidi, initial_max_streams_uni=self._local_max_streams_uni, initial_source_connection_id=self._local_initial_source_connection_id, max_ack_delay=25, max_datagram_frame_size=self._configuration.max_datagram_frame_size, quantum_readiness=b"Q" * 1200 if self._configuration.quantum_readiness_test else None, ) if not self._is_client: quic_transport_parameters.original_destination_connection_id = ( self._original_destination_connection_id ) quic_transport_parameters.retry_source_connection_id = ( self._retry_source_connection_id ) # log event if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="parameters_set", data=self._quic_logger.encode_transport_parameters( owner="local", parameters=quic_transport_parameters ), ) buf = Buffer(capacity</s> ===========changed ref 4=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: # offset: 1 <s>( owner="local", parameters=quic_transport_parameters ), ) buf = Buffer(capacity=3 * PACKET_MAX_SIZE) - push_quic_transport_parameters( - buf, quic_transport_parameters, protocol_version=self._version - ) + push_quic_transport_parameters(buf, quic_transport_parameters) return buf.data ===========changed ref 5=========== # module: aioquic.quic.configuration @dataclass class QuicConfiguration: """ A QUIC configuration. """ alpn_protocols: Optional[List[str]] = None """ A list of supported ALPN protocols. """ connection_id_length: int = 8 """ The length in bytes of local connection IDs. """ idle_timeout: float = 60.0 """ The idle timeout in seconds. The connection is terminated if nothing is received for the given duration. """ is_client: bool = True """ Whether this is the client side of the QUIC connection. """ max_data: int = 1048576 """ Connection-wide flow control limit. """ max_stream_data: int = 1048576 """ Per-stream flow control limit. """ quic_logger: Optional[QuicLogger] = None """ The :class:`~aioquic.quic.logger.QuicLogger` instance to log events to. """ secrets_log_file: TextIO = None """ A file-like object in which to log traffic secrets. This is useful to analyze traffic captures with Wireshark. """ server_name: Optional[str] = None """ The server name to send during the TLS handshake the Server Name Indication. .. note:: This is only used by clients. """ session_ticket: Optional[SessionTicket] = None """ The TLS session ticket which should be used for session resumption. """ cadata: Optional[bytes] = None cafile: Optional[str] = None capath: Optional[str] = None certificate: Any = None certificate_chain: List[Any] = field(default_factory=list) max_datagram_frame_size: Optional[int] = None private_key: Any = None quantum_readiness_test: bool = False supported_versions: List</s> ===========changed ref 6=========== # module: aioquic.quic.configuration @dataclass class QuicConfiguration: # offset: 1 <s> None private_key: Any = None quantum_readiness_test: bool = False supported_versions: List[int] = field( default_factory=lambda: [ QuicProtocolVersion.DRAFT_28, QuicProtocolVersion.DRAFT_27, - QuicProtocolVersion.DRAFT_26, - QuicProtocolVersion.DRAFT_25, ] ) verify_mode: Optional[int] = None
tests.test_packet/PacketTest.test_pull_initial_server
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<3>:<add> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) <del> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25)
# module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_server(self): <0> buf = Buffer(data=load("initial_server.bin")) <1> header = pull_quic_header(buf, host_cid_length=8) <2> self.assertTrue(header.is_long_header) <3> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) <4> self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) <5> self.assertEqual(header.destination_cid, b"") <6> self.assertEqual(header.source_cid, binascii.unhexlify("195c68344e28d479")) <7> self.assertEqual(header.token, b"") <8> self.assertEqual(header.integrity_tag, b"") <9> self.assertEqual(header.rest_length, 184) <10> self.assertEqual(buf.tell(), 18) <11>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_client(self): buf = Buffer(data=load("initial_client.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, binascii.unhexlify("858b39368b8e3c6e")) self.assertEqual(header.source_cid, b"") self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 1262) self.assertEqual(buf.tell(), 18) ===========changed ref 1=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) client._parse_transport_parameters(buf.data) ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 4=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: quic_transport_parameters = QuicTransportParameters( ack_delay_exponent=self._local_ack_delay_exponent, active_connection_id_limit=self._local_active_connection_id_limit, max_idle_timeout=int(self._configuration.idle_timeout * 1000), initial_max_data=self._local_max_data, initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local, initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote, initial_max_stream_data_uni=self._local_max_stream_data_uni, initial_max_streams_bidi=self._local_max_streams_bidi, initial_max_streams_uni=self._local_max_streams_uni, initial_source_connection_id=self._local_initial_source_connection_id, max_ack_delay=25, max_datagram_frame_size=self._configuration.max_datagram_frame_size, quantum_readiness=b"Q" * 1200 if self._configuration.quantum_readiness_test else None, ) if not self._is_client: quic_transport_parameters.original_destination_connection_id = ( self._original_destination_connection_id ) quic_transport_parameters.retry_source_connection_id = ( self._retry_source_connection_id ) # log event if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="parameters_set", data=self._quic_logger.encode_transport_parameters( owner="local", parameters=quic_transport_parameters ), ) buf = Buffer(capacity</s> ===========changed ref 5=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: # offset: 1 <s>( owner="local", parameters=quic_transport_parameters ), ) buf = Buffer(capacity=3 * PACKET_MAX_SIZE) - push_quic_transport_parameters( - buf, quic_transport_parameters, protocol_version=self._version - ) + push_quic_transport_parameters(buf, quic_transport_parameters) return buf.data
tests.test_packet/PacketTest.test_pull_retry
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<0>:<add> original_destination_cid = binascii.unhexlify("fbbd219b7363b64b") <add> <add> data = load("retry.bin") <del> buf = Buffer(data=load("retry.bin")) <1>:<add> buf = Buffer(data=data) <3>:<add> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) <del> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) <19>:<add> header.integrity_tag, binascii.unhexlify("f15154a271f10139ef6b129033ac38ae") <del> header.integrity_tag, binascii.unhexlify("e1a3c80c797ea401c08fc9c342a2d90d") <26>:<del> get_retry_integrity_tag( <27>:<del> buf.data_slice(0, 109), binascii.unhexlify("fbbd219b7363b64b"), <28>:<del> ), <29>:<add> get_retry_integrity_tag(buf.data_slice(0, 109), original_destination_cid,),
# module: tests.test_packet class PacketTest(TestCase): def test_pull_retry(self): <0> buf = Buffer(data=load("retry.bin")) <1> header = pull_quic_header(buf, host_cid_length=8) <2> self.assertTrue(header.is_long_header) <3> self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) <4> self.assertEqual(header.packet_type, PACKET_TYPE_RETRY) <5> self.assertEqual(header.destination_cid, binascii.unhexlify("e9d146d8d14cb28e")) <6> self.assertEqual( <7> header.source_cid, <8> binascii.unhexlify("0b0a205a648fcf82d85f128b67bbe08053e6"), <9> ) <10> self.assertEqual( <11> header.token, <12> binascii.unhexlify( <13> "44397a35d698393c134b08a932737859f446d3aadd00ed81540c8d8de172" <14> "906d3e7a111b503f9729b8928e7528f9a86a4581f9ebb4cb3b53c283661e" <15> "8530741a99192ee56914c5626998ec0f" <16> ), <17> ) <18> self.assertEqual( <19> header.integrity_tag, binascii.unhexlify("e1a3c80c797ea401c08fc9c342a2d90d") <20> ) <21> self.assertEqual(header.rest_length, 0) <22> self.assertEqual(buf.tell(), 125) <23> <24> # check integrity <25> self.assertEqual( <26> get_retry_integrity_tag( <27> buf.data_slice(0, 109), binascii.unhexlify("fbbd219b7363b64b"), <28> ), <29> header.</s>
===========below chunk 0=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_retry(self): # offset: 1 ) ===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None assertTrue(expr: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_server(self): buf = Buffer(data=load("initial_server.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, b"") self.assertEqual(header.source_cid, binascii.unhexlify("195c68344e28d479")) self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 184) self.assertEqual(buf.tell(), 18) ===========changed ref 1=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_client(self): buf = Buffer(data=load("initial_client.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, binascii.unhexlify("858b39368b8e3c6e")) self.assertEqual(header.source_cid, b"") self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 1262) self.assertEqual(buf.tell(), 18) ===========changed ref 2=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) client._parse_transport_parameters(buf.data) ===========changed ref 4=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 5=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: quic_transport_parameters = QuicTransportParameters( ack_delay_exponent=self._local_ack_delay_exponent, active_connection_id_limit=self._local_active_connection_id_limit, max_idle_timeout=int(self._configuration.idle_timeout * 1000), initial_max_data=self._local_max_data, initial_max_stream_data_bidi_local=self._local_max_stream_data_bidi_local, initial_max_stream_data_bidi_remote=self._local_max_stream_data_bidi_remote, initial_max_stream_data_uni=self._local_max_stream_data_uni, initial_max_streams_bidi=self._local_max_streams_bidi, initial_max_streams_uni=self._local_max_streams_uni, initial_source_connection_id=self._local_initial_source_connection_id, max_ack_delay=25, max_datagram_frame_size=self._configuration.max_datagram_frame_size, quantum_readiness=b"Q" * 1200 if self._configuration.quantum_readiness_test else None, ) if not self._is_client: quic_transport_parameters.original_destination_connection_id = ( self._original_destination_connection_id ) quic_transport_parameters.retry_source_connection_id = ( self._retry_source_connection_id ) # log event if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="parameters_set", data=self._quic_logger.encode_transport_parameters( owner="local", parameters=quic_transport_parameters ), ) buf = Buffer(capacity</s> ===========changed ref 6=========== # module: aioquic.quic.connection class QuicConnection: def _serialize_transport_parameters(self) -> bytes: # offset: 1 <s>( owner="local", parameters=quic_transport_parameters ), ) buf = Buffer(capacity=3 * PACKET_MAX_SIZE) - push_quic_transport_parameters( - buf, quic_transport_parameters, protocol_version=self._version - ) + push_quic_transport_parameters(buf, quic_transport_parameters) return buf.data
tests.test_packet/PacketTest.test_encode_quic_version_negotiation
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<3>:<add> supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28], <del> supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25],
# module: tests.test_packet class PacketTest(TestCase): def test_encode_quic_version_negotiation(self): <0> data = encode_quic_version_negotiation( <1> destination_cid=binascii.unhexlify("9aac5a49ba87a849"), <2> source_cid=binascii.unhexlify("f92f4336fa951ba1"), <3> supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25], <4> ) <5> self.assertEqual(data[1:], load("version_negotiation.bin")[1:]) <6>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.utils load(name) at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_server(self): buf = Buffer(data=load("initial_server.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, b"") self.assertEqual(header.source_cid, binascii.unhexlify("195c68344e28d479")) self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 184) self.assertEqual(buf.tell(), 18) ===========changed ref 1=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_client(self): buf = Buffer(data=load("initial_client.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, binascii.unhexlify("858b39368b8e3c6e")) self.assertEqual(header.source_cid, b"") self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 1262) self.assertEqual(buf.tell(), 18) ===========changed ref 2=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_retry(self): + original_destination_cid = binascii.unhexlify("fbbd219b7363b64b") + + data = load("retry.bin") - buf = Buffer(data=load("retry.bin")) + buf = Buffer(data=data) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_RETRY) self.assertEqual(header.destination_cid, binascii.unhexlify("e9d146d8d14cb28e")) self.assertEqual( header.source_cid, binascii.unhexlify("0b0a205a648fcf82d85f128b67bbe08053e6"), ) self.assertEqual( header.token, binascii.unhexlify( "44397a35d698393c134b08a932737859f446d3aadd00ed81540c8d8de172" "906d3e7a111b503f9729b8928e7528f9a86a4581f9ebb4cb3b53c283661e" "8530741a99192ee56914c5626998ec0f" ), ) self.assertEqual( + header.integrity_tag, binascii.unhexlify("f15154a271f10139ef6b129033ac38ae") - header.integrity_tag, binascii.unhexlify("e1a3c80c797ea401c08fc9c342a2d90d") ) self.assertEqual(header.rest_length</s> ===========changed ref 3=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_retry(self): # offset: 1 <s>ea401c08fc9c342a2d90d") ) self.assertEqual(header.rest_length, 0) self.assertEqual(buf.tell(), 125) # check integrity self.assertEqual( - get_retry_integrity_tag( - buf.data_slice(0, 109), binascii.unhexlify("fbbd219b7363b64b"), - ), + get_retry_integrity_tag(buf.data_slice(0, 109), original_destination_cid,), header.integrity_tag, ) ===========changed ref 4=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 5=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) client._parse_transport_parameters(buf.data) ===========changed ref 6=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", )
tests.test_packet/ParamsTest.test_params
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<7>:<add> params = pull_quic_transport_parameters(buf) <del> params = pull_quic_transport_parameters( <8>:<del> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <9>:<del> ) <29>:<add> push_quic_transport_parameters(buf, params) <del> push_quic_transport_parameters( <30>:<del> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 <31>:<del> )
# module: tests.test_packet class ParamsTest(TestCase): def test_params(self): <0> data = binascii.unhexlify( <1> "010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff" <2> "a05048000ffff06048000ffff0801060a01030b0119" <3> ) <4> <5> # parse <6> buf = Buffer(data=data) <7> params = pull_quic_transport_parameters( <8> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <9> ) <10> self.assertEqual( <11> params, <12> QuicTransportParameters( <13> max_idle_timeout=10000, <14> stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", <15> max_udp_payload_size=2020, <16> initial_max_data=393210, <17> initial_max_stream_data_bidi_local=65535, <18> initial_max_stream_data_bidi_remote=65535, <19> initial_max_stream_data_uni=None, <20> initial_max_streams_bidi=6, <21> initial_max_streams_uni=None, <22> ack_delay_exponent=3, <23> max_ack_delay=25, <24> ), <25> ) <26> <27> # serialize <28> buf = Buffer(capacity=len(data)) <29> push_quic_transport_parameters( <30> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 <31> ) <32> self.assertEqual(len(buf.data), len(data)) <33>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: tests.test_packet.ParamsTest maxDiff = None at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class PacketTest(TestCase): def test_encode_quic_version_negotiation(self): data = encode_quic_version_negotiation( destination_cid=binascii.unhexlify("9aac5a49ba87a849"), source_cid=binascii.unhexlify("f92f4336fa951ba1"), + supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28], - supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25], ) self.assertEqual(data[1:], load("version_negotiation.bin")[1:]) ===========changed ref 1=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_server(self): buf = Buffer(data=load("initial_server.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, b"") self.assertEqual(header.source_cid, binascii.unhexlify("195c68344e28d479")) self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 184) self.assertEqual(buf.tell(), 18) ===========changed ref 2=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_client(self): buf = Buffer(data=load("initial_client.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, binascii.unhexlify("858b39368b8e3c6e")) self.assertEqual(header.source_cid, b"") self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 1262) self.assertEqual(buf.tell(), 18) ===========changed ref 3=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_retry(self): + original_destination_cid = binascii.unhexlify("fbbd219b7363b64b") + + data = load("retry.bin") - buf = Buffer(data=load("retry.bin")) + buf = Buffer(data=data) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_RETRY) self.assertEqual(header.destination_cid, binascii.unhexlify("e9d146d8d14cb28e")) self.assertEqual( header.source_cid, binascii.unhexlify("0b0a205a648fcf82d85f128b67bbe08053e6"), ) self.assertEqual( header.token, binascii.unhexlify( "44397a35d698393c134b08a932737859f446d3aadd00ed81540c8d8de172" "906d3e7a111b503f9729b8928e7528f9a86a4581f9ebb4cb3b53c283661e" "8530741a99192ee56914c5626998ec0f" ), ) self.assertEqual( + header.integrity_tag, binascii.unhexlify("f15154a271f10139ef6b129033ac38ae") - header.integrity_tag, binascii.unhexlify("e1a3c80c797ea401c08fc9c342a2d90d") ) self.assertEqual(header.rest_length</s> ===========changed ref 4=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_retry(self): # offset: 1 <s>ea401c08fc9c342a2d90d") ) self.assertEqual(header.rest_length, 0) self.assertEqual(buf.tell(), 125) # check integrity self.assertEqual( - get_retry_integrity_tag( - buf.data_slice(0, 109), binascii.unhexlify("fbbd219b7363b64b"), - ), + get_retry_integrity_tag(buf.data_slice(0, 109), original_destination_cid,), header.integrity_tag, ) ===========changed ref 5=========== # module: aioquic.quic.packet class QuicProtocolVersion(IntEnum): NEGOTIATION = 0 - DRAFT_25 = 0xFF000019 - DRAFT_26 = 0xFF00001A DRAFT_27 = 0xFF00001B DRAFT_28 = 0xFF00001C ===========changed ref 6=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) client._parse_transport_parameters(buf.data) ===========changed ref 7=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: buf = Buffer(capacity=32) push_quic_transport_parameters( buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, ), - protocol_version=QuicProtocolVersion.DRAFT_28, ) with self.assertRaises(QuicConnectionError) as cm: client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", )
tests.test_packet/ParamsTest.test_params_disable_active_migration
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<4>:<add> params = pull_quic_transport_parameters(buf) <del> params = pull_quic_transport_parameters( <5>:<del> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <6>:<del> ) <11>:<add> push_quic_transport_parameters(buf, params) <del> push_quic_transport_parameters( <12>:<del> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 <13>:<del> )
# module: tests.test_packet class ParamsTest(TestCase): def test_params_disable_active_migration(self): <0> data = binascii.unhexlify("0c00") <1> <2> # parse <3> buf = Buffer(data=data) <4> params = pull_quic_transport_parameters( <5> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <6> ) <7> self.assertEqual(params, QuicTransportParameters(disable_active_migration=True)) <8> <9> # serialize <10> buf = Buffer(capacity=len(data)) <11> push_quic_transport_parameters( <12> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 <13> ) <14> self.assertEqual(buf.data, data) <15>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class PacketTest(TestCase): def test_encode_quic_version_negotiation(self): data = encode_quic_version_negotiation( destination_cid=binascii.unhexlify("9aac5a49ba87a849"), source_cid=binascii.unhexlify("f92f4336fa951ba1"), + supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28], - supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25], ) self.assertEqual(data[1:], load("version_negotiation.bin")[1:]) ===========changed ref 1=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_server(self): buf = Buffer(data=load("initial_server.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, b"") self.assertEqual(header.source_cid, binascii.unhexlify("195c68344e28d479")) self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 184) self.assertEqual(buf.tell(), 18) ===========changed ref 2=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_client(self): buf = Buffer(data=load("initial_client.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, binascii.unhexlify("858b39368b8e3c6e")) self.assertEqual(header.source_cid, b"") self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 1262) self.assertEqual(buf.tell(), 18) ===========changed ref 3=========== # module: tests.test_packet class ParamsTest(TestCase): - def test_params_legacy(self): - data = binascii.unhexlify( - "004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026" - "710000600048000ffff000500048000ffff000400048005fffa000a00010300" - "0b0001190003000247e4" - ) - - # parse - buf = Buffer(data=data) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual( - params, - QuicTransportParameters( - max_idle_timeout=10000, - stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", - max_udp_payload_size=2020, - initial_max_data=393210, - initial_max_stream_data_bidi_local=65535, - initial_max_stream_data_bidi_remote=65535, - initial_max_stream_data_uni=None, - initial_max_streams_bidi=6, - initial_max_streams_uni=None, - ack_delay_exponent=3, - max_ack_delay=25, - ), - ) - - # serialize - buf = Buffer(capacity=len(data)) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual(len(buf.data), len(data)) - ===========changed ref 4=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params(self): data = binascii.unhexlify( "010267100210cc2fd6e7d97a53ab5be85b28d75c8008030247e404048005fff" "a05048000ffff06048000ffff0801060a01030b0119" ) # parse buf = Buffer(data=data) + params = pull_quic_transport_parameters(buf) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_27 - ) self.assertEqual( params, QuicTransportParameters( max_idle_timeout=10000, stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", max_udp_payload_size=2020, initial_max_data=393210, initial_max_stream_data_bidi_local=65535, initial_max_stream_data_bidi_remote=65535, initial_max_stream_data_uni=None, initial_max_streams_bidi=6, initial_max_streams_uni=None, ack_delay_exponent=3, max_ack_delay=25, ), ) # serialize buf = Buffer(capacity=len(data)) + push_quic_transport_parameters(buf, params) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 - ) self.assertEqual(len(buf.data), len(data))
tests.test_packet/ParamsTest.test_params_preferred_address
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<7>:<add> params = pull_quic_transport_parameters(buf) <del> params = pull_quic_transport_parameters( <8>:<del> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <9>:<del> ) <24>:<add> push_quic_transport_parameters(buf, params) <del> push_quic_transport_parameters( <25>:<del> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 <26>:<del> )
# module: tests.test_packet class ParamsTest(TestCase): def test_params_preferred_address(self): <0> data = binascii.unhexlify( <1> "0d3b8ba27b8611532400890200000000f03c91fffe69a45411531262c4518d6" <2> "3013f0c287ed3573efa9095603746b2e02d45480ba6643e5c6e7d48ecb4" <3> ) <4> <5> # parse <6> buf = Buffer(data=data) <7> params = pull_quic_transport_parameters( <8> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <9> ) <10> self.assertEqual( <11> params, <12> QuicTransportParameters( <13> preferred_address=QuicPreferredAddress( <14> ipv4_address=("139.162.123.134", 4435), <15> ipv6_address=("2400:8902::f03c:91ff:fe69:a454", 4435), <16> connection_id=b"b\xc4Q\x8dc\x01?\x0c(~\xd3W>\xfa\x90\x95`7", <17> stateless_reset_token=b"F\xb2\xe0-EH\x0b\xa6d>\\n}H\xec\xb4", <18> ), <19> ), <20> ) <21> <22> # serialize <23> buf = Buffer(capacity=1000) <24> push_quic_transport_parameters( <25> buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 <26> ) <27> self.assertEqual(buf.data, data) <28>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class ParamsTest(TestCase): - def test_params_disable_active_migration_legacy(self): - data = binascii.unhexlify("0004000c0000") - - # parse - buf = Buffer(data=data) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual(params, QuicTransportParameters(disable_active_migration=True)) - - # serialize - buf = Buffer(capacity=len(data)) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual(buf.data, data) - ===========changed ref 1=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params_disable_active_migration(self): data = binascii.unhexlify("0c00") # parse buf = Buffer(data=data) + params = pull_quic_transport_parameters(buf) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_27 - ) self.assertEqual(params, QuicTransportParameters(disable_active_migration=True)) # serialize buf = Buffer(capacity=len(data)) + push_quic_transport_parameters(buf, params) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 - ) self.assertEqual(buf.data, data) ===========changed ref 2=========== # module: tests.test_packet class PacketTest(TestCase): def test_encode_quic_version_negotiation(self): data = encode_quic_version_negotiation( destination_cid=binascii.unhexlify("9aac5a49ba87a849"), source_cid=binascii.unhexlify("f92f4336fa951ba1"), + supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28], - supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25], ) self.assertEqual(data[1:], load("version_negotiation.bin")[1:]) ===========changed ref 3=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_server(self): buf = Buffer(data=load("initial_server.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, b"") self.assertEqual(header.source_cid, binascii.unhexlify("195c68344e28d479")) self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 184) self.assertEqual(buf.tell(), 18) ===========changed ref 4=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_client(self): buf = Buffer(data=load("initial_client.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, binascii.unhexlify("858b39368b8e3c6e")) self.assertEqual(header.source_cid, b"") self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 1262) self.assertEqual(buf.tell(), 18) ===========changed ref 5=========== # module: tests.test_packet class ParamsTest(TestCase): - def test_params_legacy(self): - data = binascii.unhexlify( - "004700020010cc2fd6e7d97a53ab5be85b28d75c80080008000106000100026" - "710000600048000ffff000500048000ffff000400048005fffa000a00010300" - "0b0001190003000247e4" - ) - - # parse - buf = Buffer(data=data) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual( - params, - QuicTransportParameters( - max_idle_timeout=10000, - stateless_reset_token=b"\xcc/\xd6\xe7\xd9zS\xab[\xe8[(\xd7\\\x80\x08", - max_udp_payload_size=2020, - initial_max_data=393210, - initial_max_stream_data_bidi_local=65535, - initial_max_stream_data_bidi_remote=65535, - initial_max_stream_data_uni=None, - initial_max_streams_bidi=6, - initial_max_streams_uni=None, - ack_delay_exponent=3, - max_ack_delay=25, - ), - ) - - # serialize - buf = Buffer(capacity=len(data)) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual(len(buf.data), len(data)) -
tests.test_packet/ParamsTest.test_params_unknown
Modified
aiortc~aioquic
fac2fdd03d55987358b574ad40a64b8c03791bc4
Drop support for draft-25 and draft-26
<4>:<add> params = pull_quic_transport_parameters(buf) <del> params = pull_quic_transport_parameters( <5>:<del> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <6>:<del> )
# module: tests.test_packet class ParamsTest(TestCase): def test_params_unknown(self): <0> data = binascii.unhexlify("8000ff000100") <1> <2> # parse <3> buf = Buffer(data=data) <4> params = pull_quic_transport_parameters( <5> buf, protocol_version=QuicProtocolVersion.DRAFT_27 <6> ) <7> self.assertEqual(params, QuicTransportParameters()) <8>
===========unchanged ref 0=========== at: binascii unhexlify(hexstr: _Ascii, /) -> bytes at: unittest.case.TestCase assertEqual(first: Any, second: Any, msg: Any=...) -> None ===========changed ref 0=========== # module: tests.test_packet class ParamsTest(TestCase): - def test_params_disable_active_migration_legacy(self): - data = binascii.unhexlify("0004000c0000") - - # parse - buf = Buffer(data=data) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual(params, QuicTransportParameters(disable_active_migration=True)) - - # serialize - buf = Buffer(capacity=len(data)) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual(buf.data, data) - ===========changed ref 1=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params_disable_active_migration(self): data = binascii.unhexlify("0c00") # parse buf = Buffer(data=data) + params = pull_quic_transport_parameters(buf) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_27 - ) self.assertEqual(params, QuicTransportParameters(disable_active_migration=True)) # serialize buf = Buffer(capacity=len(data)) + push_quic_transport_parameters(buf, params) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 - ) self.assertEqual(buf.data, data) ===========changed ref 2=========== # module: tests.test_packet class PacketTest(TestCase): def test_encode_quic_version_negotiation(self): data = encode_quic_version_negotiation( destination_cid=binascii.unhexlify("9aac5a49ba87a849"), source_cid=binascii.unhexlify("f92f4336fa951ba1"), + supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_28], - supported_versions=[0x45474716, QuicProtocolVersion.DRAFT_25], ) self.assertEqual(data[1:], load("version_negotiation.bin")[1:]) ===========changed ref 3=========== # module: tests.test_packet class ParamsTest(TestCase): - def test_params_preferred_address_legacy(self): - data = binascii.unhexlify( - "003f000d003b8ba27b8611532400890200000000f03c91fffe69a4541153126" - "2c4518d63013f0c287ed3573efa9095603746b2e02d45480ba6643e5c6e7d48" - "ecb4" - ) - - # parse - buf = Buffer(data=data) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual( - params, - QuicTransportParameters( - preferred_address=QuicPreferredAddress( - ipv4_address=("139.162.123.134", 4435), - ipv6_address=("2400:8902::f03c:91ff:fe69:a454", 4435), - connection_id=b"b\xc4Q\x8dc\x01?\x0c(~\xd3W>\xfa\x90\x95`7", - stateless_reset_token=b"F\xb2\xe0-EH\x0b\xa6d>\\n}H\xec\xb4", - ), - ), - ) - - # serialize - buf = Buffer(capacity=len(data)) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_25 - ) - self.assertEqual(buf.data, data) - ===========changed ref 4=========== # module: tests.test_packet class ParamsTest(TestCase): def test_params_preferred_address(self): data = binascii.unhexlify( "0d3b8ba27b8611532400890200000000f03c91fffe69a45411531262c4518d6" "3013f0c287ed3573efa9095603746b2e02d45480ba6643e5c6e7d48ecb4" ) # parse buf = Buffer(data=data) + params = pull_quic_transport_parameters(buf) - params = pull_quic_transport_parameters( - buf, protocol_version=QuicProtocolVersion.DRAFT_27 - ) self.assertEqual( params, QuicTransportParameters( preferred_address=QuicPreferredAddress( ipv4_address=("139.162.123.134", 4435), ipv6_address=("2400:8902::f03c:91ff:fe69:a454", 4435), connection_id=b"b\xc4Q\x8dc\x01?\x0c(~\xd3W>\xfa\x90\x95`7", stateless_reset_token=b"F\xb2\xe0-EH\x0b\xa6d>\\n}H\xec\xb4", ), ), ) # serialize buf = Buffer(capacity=1000) + push_quic_transport_parameters(buf, params) - push_quic_transport_parameters( - buf, params, protocol_version=QuicProtocolVersion.DRAFT_27 - ) self.assertEqual(buf.data, data) ===========changed ref 5=========== # module: tests.test_packet class PacketTest(TestCase): def test_pull_initial_server(self): buf = Buffer(data=load("initial_server.bin")) header = pull_quic_header(buf, host_cid_length=8) self.assertTrue(header.is_long_header) + self.assertEqual(header.version, QuicProtocolVersion.DRAFT_28) - self.assertEqual(header.version, QuicProtocolVersion.DRAFT_25) self.assertEqual(header.packet_type, PACKET_TYPE_INITIAL) self.assertEqual(header.destination_cid, b"") self.assertEqual(header.source_cid, binascii.unhexlify("195c68344e28d479")) self.assertEqual(header.token, b"") self.assertEqual(header.integrity_tag, b"") self.assertEqual(header.rest_length, 184) self.assertEqual(buf.tell(), 18)
aioquic.quic.connection/QuicConnection._parse_transport_parameters
Modified
aiortc~aioquic
c948332d6e0f56e8311c2cbf6908a1abb05a0c6b
[connection] validate retry_source_connection_id matches
<20>:<del> if ( <21>:<del> self._is_client <22>:<add> if not from_session_ticket: <del> and not from_session_ticket <23>:<add> if self._is_client and ( <del> and ( <26>:<add> ): <del> ) <27>:<del> ): <28>:<add> raise QuicConnectionError( <del> raise QuicConnectionError( <29>:<add> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <del> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <30>:<add> frame_type=QuicFrameType.CRYPTO, <del> frame_type=QuicFrameType.CRYPTO, <31>:<add> reason_phrase="original_destination_connection_id does not match", <del> reason_phrase="original_destination_connection_id does not match", <32>:<add> ) <add> if self._is_client and ( <add> quic_transport_parameters.retry_source_connection_id <add> != self._retry_source_connection_id <add> ): <del> ) <33>:<add> raise QuicConnectionError( <add> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <add> frame_type=QuicFrameType.CRYPTO, <add> reason_phrase="retry_source_connection_id does not match", <add> ) <add> if ( <del> if ( <34>:<add> quic_
# module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: <0> """ <1> Parse and apply remote transport parameters. <2> <3> `from_session_ticket` is `True` when restoring saved transport parameters, <4> and `False` when handling received transport parameters. <5> """ <6> <7> quic_transport_parameters = pull_quic_transport_parameters(Buffer(data=data)) <8> <9> # log event <10> if self._quic_logger is not None and not from_session_ticket: <11> self._quic_logger.log_event( <12> category="transport", <13> event="parameters_set", <14> data=self._quic_logger.encode_transport_parameters( <15> owner="remote", parameters=quic_transport_parameters <16> ), <17> ) <18> <19> # validate remote parameters <20> if ( <21> self._is_client <22> and not from_session_ticket <23> and ( <24> quic_transport_parameters.original_destination_connection_id <25> != self._original_destination_connection_id <26> ) <27> ): <28> raise QuicConnectionError( <29> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <30> frame_type=QuicFrameType.CRYPTO, <31> reason_phrase="original_destination_connection_id does not match", <32> ) <33> if ( <34> quic_transport_parameters.active_connection_id_limit is not None <35> and quic_transport_parameters.active_connection_id_limit < 2 <36> ): <37> raise QuicConnectionError( <38> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <39> frame_type=QuicFrameType.CRYPTO, <40> reason_phrase="active_connection_id_limit must be no less than 2", <41> ) <42> <43> # store remote parameters <44> if not from_session_ticket: <45> if</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = ( quic_transport_parameters.max_ack_delay / 1000.0 ) if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) if quic_transport_parameters.max_idle_timeout is not None: self._remote_max_idle_timeout = ( quic_transport_parameters.max_idle_timeout / 1000.0 ) self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========unchanged ref 0=========== at: aioquic.quic.connection QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str) at: aioquic.quic.connection.QuicConnection.__init__ self._is_client = configuration.is_client self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=self._original_destination_connection_id, ) self._remote_ack_delay_exponent = 3 self._remote_active_connection_id_limit = 0 self._remote_max_idle_timeout = 0.0 # seconds self._remote_max_datagram_frame_size: Optional[int] = None self._retry_source_connection_id = retry_source_connection_id self._original_destination_connection_id = self._peer_cid self._original_destination_connection_id = ( original_destination_connection_id ) self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None at: aioquic.quic.connection.QuicConnection.receive_datagram self._retry_source_connection_id = header.source_cid ===========changed ref 0=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + @patch("aioquic.quic.retry.QuicRetryTokenHandler.validate_token") + def test_connect_and_serve_with_stateless_retry_bad_token(self, mock_validate): + mock_validate.side_effect = ValueError("Decryption failed.") + + run(self.run_server(stateless_retry=True)) + with self.assertRaises(ConnectionError): + run( + self.run_client( + configuration=QuicConfiguration(is_client=True, idle_timeout=4.0), + ) + ) + ===========changed ref 1=========== # module: tests.test_asyncio class HighLevelTest(TestCase): - @patch("aioquic.quic.retry.QuicRetryTokenHandler.validate_token") - def test_connect_and_serve_with_stateless_retry_bad(self, mock_validate): - mock_validate.side_effect = ValueError("Decryption failed.") - - run(self.run_server(stateless_retry=True)) - with self.assertRaises(ConnectionError): - run( - self.run_client( - configuration=QuicConfiguration(is_client=True, idle_timeout=4.0), - ) - ) - ===========changed ref 2=========== # module: tests.test_asyncio class HighLevelTest(TestCase): + def test_connect_and_serve_with_stateless_retry_bad_retry_source_connection_id( + self, + ): + """ + If the server's transport parameters do not have the correct + retry_source_connection_id the connection must fail. + """ + + def create_protocol(*args, **kwargs): + protocol = QuicConnectionProtocol(*args, **kwargs) + protocol._quic._retry_source_connection_id = None + return protocol + + run(self.run_server(create_protocol=create_protocol, stateless_retry=True)) + with self.assertRaises(ConnectionError): + run(self.run_client()) + ===========changed ref 3=========== # module: aioquic.quic.connection class QuicConnection: def receive_datagram(self, data: bytes, addr: NetworkAddress, now: float) -> None: """ Handle an incoming datagram. After calling this method call :meth:`datagrams_to_send` to retrieve data which needs to be sent. :param data: The datagram which was received. :param addr: The network address from which the datagram was received. :param now: The current time. """ # stop handling packets when closing if self._state in END_STATES: return if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="datagrams_received", data={"byte_length": len(data), "count": 1}, ) buf = Buffer(data=data) while not buf.eof(): start_off = buf.tell() try: header = pull_quic_header( buf, host_cid_length=self._configuration.connection_id_length ) except ValueError: return # check destination CID matches destination_cid_seq: Optional[int] = None for connection_id in self._host_cids: if header.destination_cid == connection_id.cid: destination_cid_seq = connection_id.sequence_number break if self._is_client and destination_cid_seq is None: if self._quic_logger is not None: self._quic_logger.log_event( category="transport", event="packet_dropped", data={"trigger": "unknown_connection_id"}, ) return # check protocol version if ( self._is_client and self._state == QuicConnectionState.FIRSTFLIGHT and header.version == QuicProtocolVersion.NEGOTIATION ): # version negotiation versions = [] while not buf.eof():</s>
aioquic.quic.retry/QuicRetryTokenHandler.create_token
Modified
aiortc~aioquic
fbb3b5d771c61ff0fd012961ee05757bd7e69808
[server] rework retry token serialization / parsing
<0>:<del> retry_message = ( <1>:<del> encode_address(addr) <2>:<del> + b"|" <3>:<add> buf = Buffer(capacity=512) <add> push_opaque(buf, 1, encode_address(addr)) <add> push_opaque(buf, 1, original_destination_connection_id) <del> + original_destination_connection_id <4>:<del> + b"|" <5>:<add> push_opaque(buf, 1, retry_source_connection_id) <del> + retry_source_connection_id <6>:<del> ) <8>:<add> buf.data, <del> retry_message,
# module: aioquic.quic.retry class QuicRetryTokenHandler: def create_token( self, addr: NetworkAddress, original_destination_connection_id: bytes, retry_source_connection_id: bytes, ) -> bytes: <0> retry_message = ( <1> encode_address(addr) <2> + b"|" <3> + original_destination_connection_id <4> + b"|" <5> + retry_source_connection_id <6> ) <7> return self._key.public_key().encrypt( <8> retry_message, <9> padding.OAEP( <10> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None <11> ), <12> ) <13>
===========unchanged ref 0=========== at: aioquic.quic.retry encode_address(addr: NetworkAddress) -> bytes at: aioquic.quic.retry.QuicRetryTokenHandler.__init__ self._key = rsa.generate_private_key( public_exponent=65537, key_size=1024, backend=default_backend() )
aioquic.quic.retry/QuicRetryTokenHandler.validate_token
Modified
aiortc~aioquic
fbb3b5d771c61ff0fd012961ee05757bd7e69808
[server] rework retry token serialization / parsing
<0>:<add> buf = Buffer( <add> data=self._key.decrypt( <del> retry_message = self._key.decrypt( <1>:<add> token, <del> token, <2>:<add> padding.OAEP( <del> padding.OAEP( <3>:<add> mgf=padding.MGF1(hashes.SHA256()), <add> algorithm=hashes.SHA256(), <add> label=None, <add> ), <del> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None <4>:<add> ) <del> ), <6>:<del> ( <7>:<del> encoded_addr, <8>:<add> encoded_addr = pull_opaque(buf, 1) <add> original_destination_connection_id = pull_opaque(buf, 1) <del> original_destination_connection_id, <9>:<del> retry_source_connection_id, <10>:<del> ) = retry_message.split(b"|", maxsplit=2) <11>:<add> retry_source_connection_id = pull_opaque(buf, 1)
# module: aioquic.quic.retry class QuicRetryTokenHandler: def validate_token(self, addr: NetworkAddress, token: bytes) -> Tuple[bytes, bytes]: <0> retry_message = self._key.decrypt( <1> token, <2> padding.OAEP( <3> mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None <4> ), <5> ) <6> ( <7> encoded_addr, <8> original_destination_connection_id, <9> retry_source_connection_id, <10> ) = retry_message.split(b"|", maxsplit=2) <11> if encoded_addr != encode_address(addr): <12> raise ValueError("Remote address does not match.") <13> return original_destination_connection_id, retry_source_connection_id <14>
===========unchanged ref 0=========== at: aioquic.quic.retry encode_address(addr: NetworkAddress) -> bytes at: aioquic.quic.retry.QuicRetryTokenHandler.__init__ self._key = rsa.generate_private_key( public_exponent=65537, key_size=1024, backend=default_backend() ) ===========changed ref 0=========== # module: aioquic.quic.retry class QuicRetryTokenHandler: def create_token( self, addr: NetworkAddress, original_destination_connection_id: bytes, retry_source_connection_id: bytes, ) -> bytes: - retry_message = ( - encode_address(addr) - + b"|" + buf = Buffer(capacity=512) + push_opaque(buf, 1, encode_address(addr)) + push_opaque(buf, 1, original_destination_connection_id) - + original_destination_connection_id - + b"|" + push_opaque(buf, 1, retry_source_connection_id) - + retry_source_connection_id - ) return self._key.public_key().encrypt( + buf.data, - retry_message, padding.OAEP( mgf=padding.MGF1(hashes.SHA256()), algorithm=hashes.SHA256(), label=None ), )
tests.test_connection/QuicConnectionTest.test_parse_transport_parameters
Modified
aiortc~aioquic
e6d57d5332f7a4f37a6bced810d0db8401604645
[parameters] check server-only transport parameters
<2>:<del> buf = Buffer(capacity=32) <3>:<add> data = encode_transport_parameters( <del> push_quic_transport_parameters( <4>:<del> buf, <7>:<add> ) <del> ), <9>:<add> client._parse_transport_parameters(data) <del> client._parse_transport_parameters(buf.data)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): <0> client = create_standalone_client(self) <1> <2> buf = Buffer(capacity=32) <3> push_quic_transport_parameters( <4> buf, <5> QuicTransportParameters( <6> original_destination_connection_id=client.original_destination_connection_id <7> ), <8> ) <9> client._parse_transport_parameters(buf.data) <10>
===========unchanged ref 0=========== at: tests.test_connection create_standalone_client(self, **client_options) ===========changed ref 0=========== # module: tests.test_connection + def encode_transport_parameters(parameters: QuicTransportParameters) -> bytes: + buf = Buffer(capacity=512) + push_quic_transport_parameters(buf, parameters) + return buf.data +
tests.test_connection/QuicConnectionTest.test_parse_transport_parameters_with_bad_active_connection_id_limit
Modified
aiortc~aioquic
e6d57d5332f7a4f37a6bced810d0db8401604645
[parameters] check server-only transport parameters
<3>:<del> buf = Buffer(capacity=32) <4>:<add> data = encode_transport_parameters( <del> push_quic_transport_parameters( <5>:<del> buf, <9>:<add> ) <del> ), <12>:<add> client._parse_transport_parameters(data) <del> client._parse_transport_parameters(buf.data)
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): <0> client = create_standalone_client(self) <1> <2> for active_connection_id_limit in [0, 1]: <3> buf = Buffer(capacity=32) <4> push_quic_transport_parameters( <5> buf, <6> QuicTransportParameters( <7> active_connection_id_limit=active_connection_id_limit, <8> original_destination_connection_id=client.original_destination_connection_id, <9> ), <10> ) <11> with self.assertRaises(QuicConnectionError) as cm: <12> client._parse_transport_parameters(buf.data) <13> self.assertEqual( <14> cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR <15> ) <16> self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) <17> self.assertEqual( <18> cm.exception.reason_phrase, <19> "active_connection_id_limit must be no less than 2", <20> ) <21>
===========unchanged ref 0=========== at: tests.test_connection create_standalone_client(self, **client_options) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None at: unittest.case._AssertRaisesContext.__exit__ self.exception = exc_value.with_traceback(None) ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) - buf = Buffer(capacity=32) + data = encode_transport_parameters( - push_quic_transport_parameters( - buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id + ) - ), ) + client._parse_transport_parameters(data) - client._parse_transport_parameters(buf.data) ===========changed ref 1=========== # module: tests.test_connection + def encode_transport_parameters(parameters: QuicTransportParameters) -> bytes: + buf = Buffer(capacity=512) + push_quic_transport_parameters(buf, parameters) + return buf.data +
aioquic.quic.connection/QuicConnection._parse_transport_parameters
Modified
aiortc~aioquic
e6d57d5332f7a4f37a6bced810d0db8401604645
[parameters] check server-only transport parameters
<20>:<add> if not self._is_client: <add> for attr in [ <add> "original_destination_connection_id", <add> "preferred_address", <add> "retry_source_connection_id", <add> "stateless_reset_token", <add> ]: <add> if getattr(quic_transport_parameters, attr) is not None: <add> raise QuicConnectionError( <add> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <add> frame_type=QuicFrameType.CRYPTO, <add> reason_phrase="%s is not allowed for clients" % attr, <add> ) <add>
# module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: <0> """ <1> Parse and apply remote transport parameters. <2> <3> `from_session_ticket` is `True` when restoring saved transport parameters, <4> and `False` when handling received transport parameters. <5> """ <6> <7> quic_transport_parameters = pull_quic_transport_parameters(Buffer(data=data)) <8> <9> # log event <10> if self._quic_logger is not None and not from_session_ticket: <11> self._quic_logger.log_event( <12> category="transport", <13> event="parameters_set", <14> data=self._quic_logger.encode_transport_parameters( <15> owner="remote", parameters=quic_transport_parameters <16> ), <17> ) <18> <19> # validate remote parameters <20> if not from_session_ticket: <21> if self._is_client and ( <22> quic_transport_parameters.original_destination_connection_id <23> != self._original_destination_connection_id <24> ): <25> raise QuicConnectionError( <26> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <27> frame_type=QuicFrameType.CRYPTO, <28> reason_phrase="original_destination_connection_id does not match", <29> ) <30> if self._is_client and ( <31> quic_transport_parameters.retry_source_connection_id <32> != self._retry_source_connection_id <33> ): <34> raise QuicConnectionError( <35> error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, <36> frame_type=QuicFrameType.CRYPTO, <37> reason_phrase="retry_source_connection_id does not match", <38> ) <39> if ( <40> quic_transport_parameters.active_connection_id_limit is not None <41> and quic_transport_parameters.active_connection_id</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _parse_transport_parameters( self, data: bytes, from_session_ticket: bool = False ) -> None: # offset: 1 ): raise QuicConnectionError( error_code=QuicErrorCode.TRANSPORT_PARAMETER_ERROR, frame_type=QuicFrameType.CRYPTO, reason_phrase="active_connection_id_limit must be no less than 2", ) # store remote parameters if not from_session_ticket: if quic_transport_parameters.ack_delay_exponent is not None: self._remote_ack_delay_exponent = self._remote_ack_delay_exponent if quic_transport_parameters.max_ack_delay is not None: self._loss.max_ack_delay = ( quic_transport_parameters.max_ack_delay / 1000.0 ) if quic_transport_parameters.active_connection_id_limit is not None: self._remote_active_connection_id_limit = ( quic_transport_parameters.active_connection_id_limit ) if quic_transport_parameters.max_idle_timeout is not None: self._remote_max_idle_timeout = ( quic_transport_parameters.max_idle_timeout / 1000.0 ) self._remote_max_datagram_frame_size = ( quic_transport_parameters.max_datagram_frame_size ) for param in [ "max_data", "max_stream_data_bidi_local", "max_stream_data_bidi_remote", "max_stream_data_uni", "max_streams_bidi", "max_streams_uni", ]: value = getattr(quic_transport_parameters, "initial_" + param) if value is not None: setattr(self, "_remote_" + param, value) ===========unchanged ref 0=========== at: aioquic.quic.connection QuicConnectionError(error_code: int, frame_type: int, reason_phrase: str) at: aioquic.quic.connection.QuicConnection.__init__ self._is_client = configuration.is_client self._quic_logger: Optional[QuicLoggerTrace] = None self._quic_logger = configuration.quic_logger.start_trace( is_client=configuration.is_client, odcid=self._original_destination_connection_id, ) self._remote_ack_delay_exponent = 3 self._remote_active_connection_id_limit = 0 self._remote_max_idle_timeout = 0.0 # seconds self._retry_source_connection_id = retry_source_connection_id self._original_destination_connection_id = self._peer_cid self._original_destination_connection_id = ( original_destination_connection_id ) self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) at: aioquic.quic.connection.QuicConnection._close_end self._quic_logger = None at: aioquic.quic.connection.QuicConnection.receive_datagram self._retry_source_connection_id = header.source_cid ===========changed ref 0=========== # module: tests.test_connection + def encode_transport_parameters(parameters: QuicTransportParameters) -> bytes: + buf = Buffer(capacity=512) + push_quic_transport_parameters(buf, parameters) + return buf.data + ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters(self): client = create_standalone_client(self) - buf = Buffer(capacity=32) + data = encode_transport_parameters( - push_quic_transport_parameters( - buf, QuicTransportParameters( original_destination_connection_id=client.original_destination_connection_id + ) - ), ) + client._parse_transport_parameters(data) - client._parse_transport_parameters(buf.data) ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_parse_transport_parameters_with_bad_active_connection_id_limit(self): client = create_standalone_client(self) for active_connection_id_limit in [0, 1]: - buf = Buffer(capacity=32) + data = encode_transport_parameters( - push_quic_transport_parameters( - buf, QuicTransportParameters( active_connection_id_limit=active_connection_id_limit, original_destination_connection_id=client.original_destination_connection_id, + ) - ), ) with self.assertRaises(QuicConnectionError) as cm: + client._parse_transport_parameters(data) - client._parse_transport_parameters(buf.data) self.assertEqual( cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR ) self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) self.assertEqual( cm.exception.reason_phrase, "active_connection_id_limit must be no less than 2", ) ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_parse_transport_parameters_with_server_only_parameter(self): + server_configuration = QuicConfiguration( + is_client=False, quic_logger=QuicLogger() + ) + server_configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) + + server = QuicConnection( + configuration=server_configuration, + original_destination_connection_id=bytes(8), + ) + for active_connection_id_limit in [0, 1]: + data = encode_transport_parameters( + QuicTransportParameters( + active_connection_id_limit=active_connection_id_limit, + original_destination_connection_id=bytes(8), + ) + ) + with self.assertRaises(QuicConnectionError) as cm: + server._parse_transport_parameters(data) + self.assertEqual( + cm.exception.error_code, QuicErrorCode.TRANSPORT_PARAMETER_ERROR + ) + self.assertEqual(cm.exception.frame_type, QuicFrameType.CRYPTO) + self.assertEqual( + cm.exception.reason_phrase, + "original_destination_connection_id is not allowed for clients", + ) +
tests.test_tls/ContextTest.create_server
Modified
aiortc~aioquic
a0e083ddd8780ed3ce3d38ca138a5fbf8a272caa
[tls] make it possible to specify cipher suites
<4>:<add> alpn_protocols=alpn_protocols, <add> is_client=False, <add> max_early_data=0xFFFFFFFF, <add> **kwargs <del> alpn_protocols=alpn_protocols, is_client=False, max_early_data=0xFFFFFFFF
# module: tests.test_tls class ContextTest(TestCase): + def create_server(self, alpn_protocols=None, **kwargs): - def create_server(self, alpn_protocols=None): <0> configuration = QuicConfiguration(is_client=False) <1> configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) <2> <3> server = Context( <4> alpn_protocols=alpn_protocols, is_client=False, max_early_data=0xFFFFFFFF <5> ) <6> server.certificate = configuration.certificate <7> server.certificate_private_key = configuration.private_key <8> server.handshake_extensions = [ <9> ( <10> tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, <11> SERVER_QUIC_TRANSPORT_PARAMETERS, <12> ) <13> ] <14> self.assertEqual(server.state, State.SERVER_EXPECT_CLIENT_HELLO) <15> return server <16>
===========unchanged ref 0=========== at: tests.test_tls SERVER_QUIC_TRANSPORT_PARAMETERS = binascii.unhexlify( b"ff00001104ff000011004500050004801000000006000480100000000700048" b"010000000040004810000000001000242580002001000000000000000000000" b"000000000000000800024064000a00010a" ) at: tests.utils SERVER_CERTFILE = os.path.join(os.path.dirname(__file__), "ssl_cert.pem") SERVER_KEYFILE = os.path.join(os.path.dirname(__file__), "ssl_key.pem") ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_connect_with_cipher_suite_aes256(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.AES_256_GCM_SHA384]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384 + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384 + ) + ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_connect_with_cipher_suite_aes128(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.AES_128_GCM_SHA256]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256 + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256 + ) + ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + @skipIf("chacha20" in SKIP_TESTS, "Skipping chacha20 tests") + def test_connect_with_cipher_suite_chacha20(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.CHACHA20_POLY1305_SHA256]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, + tls.CipherSuite.CHACHA20_POLY1305_SHA256, + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, + tls.CipherSuite.CHACHA20_POLY1305_SHA256, + ) +
tests.test_tls/ContextTest.test_server_unsupported_cipher_suite
Modified
aiortc~aioquic
a0e083ddd8780ed3ce3d38ca138a5fbf8a272caa
[tls] make it possible to specify cipher suites
<0>:<del> client = self.create_client() <1>:<add> client = self.create_client(cipher_suites=[tls.CipherSuite.AES_128_GCM_SHA256]) <del> client._cipher_suites = [tls.CipherSuite.AES_128_GCM_SHA256] <3>:<del> server = self.create_server() <4>:<add> server = self.create_server(cipher_suites=[tls.CipherSuite.AES_256_GCM_SHA384]) <del> server._cipher_suites = [tls.CipherSuite.AES_256_GCM_SHA384]
# module: tests.test_tls class ContextTest(TestCase): def test_server_unsupported_cipher_suite(self): <0> client = self.create_client() <1> client._cipher_suites = [tls.CipherSuite.AES_128_GCM_SHA256] <2> <3> server = self.create_server() <4> server._cipher_suites = [tls.CipherSuite.AES_256_GCM_SHA384] <5> <6> with self.assertRaises(tls.AlertHandshakeFailure) as cm: <7> self._server_fail_hello(client, server) <8> self.assertEqual(str(cm.exception), "No supported cipher suite") <9>
===========unchanged ref 0=========== at: tests.test_tls create_buffers() at: tests.test_tls.ContextTest create_client(alpn_protocols=None, cadata=None, cafile=SERVER_CACERTFILE, **kwargs) create_server(self, alpn_protocols=None, **kwargs) create_server(alpn_protocols=None, **kwargs) _server_fail_hello(client, server) at: tests.test_tls.ContextTest._server_fail_hello server_input = merge_buffers(client_buf) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None ===========changed ref 0=========== # module: tests.test_tls class ContextTest(TestCase): + def create_server(self, alpn_protocols=None, **kwargs): - def create_server(self, alpn_protocols=None): configuration = QuicConfiguration(is_client=False) configuration.load_cert_chain(SERVER_CERTFILE, SERVER_KEYFILE) server = Context( + alpn_protocols=alpn_protocols, + is_client=False, + max_early_data=0xFFFFFFFF, + **kwargs - alpn_protocols=alpn_protocols, is_client=False, max_early_data=0xFFFFFFFF ) server.certificate = configuration.certificate server.certificate_private_key = configuration.private_key server.handshake_extensions = [ ( tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, SERVER_QUIC_TRANSPORT_PARAMETERS, ) ] self.assertEqual(server.state, State.SERVER_EXPECT_CLIENT_HELLO) return server ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_connect_with_cipher_suite_aes256(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.AES_256_GCM_SHA384]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384 + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384 + ) + ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_connect_with_cipher_suite_aes128(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.AES_128_GCM_SHA256]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256 + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256 + ) + ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + @skipIf("chacha20" in SKIP_TESTS, "Skipping chacha20 tests") + def test_connect_with_cipher_suite_chacha20(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.CHACHA20_POLY1305_SHA256]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, + tls.CipherSuite.CHACHA20_POLY1305_SHA256, + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, + tls.CipherSuite.CHACHA20_POLY1305_SHA256, + ) +
aioquic.tls/Context.__init__
Modified
aiortc~aioquic
a0e083ddd8780ed3ce3d38ca138a5fbf8a272caa
[tls] make it possible to specify cipher suites
<28>:<add> if cipher_suites is not None: <add> self._cipher_suites = cipher_suites <add> else: <add> self._cipher_suites = [ <del> self._cipher_suites = [ <29>:<add> CipherSuite.AES_256_GCM_SHA384, <del> CipherSuite.AES_256_GCM_
<s>[str]] = None, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, + cipher_suites: Optional[List[CipherSuite]] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): <0> # configuration <1> self._alpn_protocols = alpn_protocols <2> self._cadata = cadata <3> self._cafile = cafile <4> self._capath = capath <5> self.certificate: Optional[x509.Certificate] = None <6> self.certificate_chain: List[x509.Certificate] = [] <7> self.certificate_private_key: Optional[ <8> Union[dsa.DSAPrivateKey, ec.EllipticCurvePrivateKey, rsa.RSAPrivateKey] <9> ] = None <10> self.handshake_extensions: List[Extension] = [] <11> self._max_early_data = max_early_data <12> self.session_ticket: Optional[SessionTicket] = None <13> self._server_name = server_name <14> if verify_mode is not None: <15> self._verify_mode = verify_mode <16> else: <17> self._verify_mode = ssl.CERT_REQUIRED if is_client else ssl.CERT_NONE <18> <19> # callbacks <20> self.alpn_cb: Optional[AlpnHandler] = None <21> self.get_session_ticket_cb: Optional[SessionTicketFetcher] = None <22> self.new_session_ticket_cb: Optional[SessionTicketHandler] = None <23> self.update_traffic_key_cb: Callable[ <24> [Direction, Epoch, CipherSuite, bytes], None <25> ] = lambda d, e, c, s: None <26> <27> # supported parameters <28> self._cipher_suites = [ <29> CipherSuite.AES_256_GCM_</s>
===========below chunk 0=========== <s>, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, + cipher_suites: Optional[List[CipherSuite]] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): # offset: 1 CipherSuite.AES_128_GCM_SHA256, CipherSuite.CHACHA20_POLY1305_SHA256, ] self._legacy_compression_methods: List[int] = [CompressionMethod.NULL] self._psk_key_exchange_modes: List[int] = [PskKeyExchangeMode.PSK_DHE_KE] self._signature_algorithms: List[int] = [ SignatureAlgorithm.RSA_PSS_RSAE_SHA256, SignatureAlgorithm.ECDSA_SECP256R1_SHA256, SignatureAlgorithm.RSA_PKCS1_SHA256, SignatureAlgorithm.RSA_PKCS1_SHA1, ] self._supported_groups = [Group.SECP256R1] if default_backend().x25519_supported(): self._supported_groups.append(Group.X25519) if default_backend().x448_supported(): self._supported_groups.append(Group.X448) self._supported_versions = [TLS_VERSION_1_3] # state self.alpn_negotiated: Optional[str] = None self.early_data_accepted = False self.key_schedule: Optional[KeySchedule] = None self.received_extensions: Optional[List[Extension]] = None self._key_schedule_psk: Optional[KeySchedule] = None self._key_schedule_proxy: Optional[KeyScheduleProxy] = None self._new_session_ticket: Optional[NewSessionTicket] = None self._peer_certificate:</s> ===========below chunk 1=========== <s>, cadata: Optional[bytes] = None, cafile: Optional[str] = None, capath: Optional[str] = None, + cipher_suites: Optional[List[CipherSuite]] = None, logger: Optional[Union[logging.Logger, logging.LoggerAdapter]] = None, max_early_data: Optional[int] = None, server_name: Optional[str] = None, verify_mode: Optional[int] = None, ): # offset: 2 <s>Proxy] = None self._new_session_ticket: Optional[NewSessionTicket] = None self._peer_certificate: Optional[x509.Certificate] = None self._peer_certificate_chain: List[x509.Certificate] = [] self._receive_buffer = b"" self._session_resumed = False self._enc_key: Optional[bytes] = None self._dec_key: Optional[bytes] = None self.__logger = logger self._ec_private_key: Optional[ec.EllipticCurvePrivateKey] = None self._x25519_private_key: Optional[x25519.X25519PrivateKey] = None self._x448_private_key: Optional[x448.X448PrivateKey] = None if is_client: self.client_random = os.urandom(32) self.legacy_session_id = b"" self.state = State.CLIENT_HANDSHAKE_START else: self.client_random = None self.legacy_session_id = None self.state = State.SERVER_EXPECT_CLIENT_HELLO ===========unchanged ref 0=========== at: aioquic.tls TLS_VERSION_1_3 = 0x0304 Direction() Epoch() State() CipherSuite(x: Union[str, bytes, bytearray], base: int) CipherSuite(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) CompressionMethod(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) CompressionMethod(x: Union[str, bytes, bytearray], base: int) Group(x: Union[str, bytes, bytearray], base: int) Group(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) PskKeyExchangeMode(x: Union[str, bytes, bytearray], base: int) PskKeyExchangeMode(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) SignatureAlgorithm(x: Union[str, bytes, bytearray], base: int) SignatureAlgorithm(x: Union[str, bytes, SupportsInt, _SupportsIndex, _SupportsTrunc]=...) Extension = Tuple[int, bytes] NewSessionTicket(ticket_lifetime: int=0, ticket_age_add: int=0, ticket_nonce: bytes=b"", ticket: bytes=b"", max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list)) KeySchedule(cipher_suite: CipherSuite) KeyScheduleProxy(cipher_suites: List[CipherSuite]) SessionTicket(age_add: int, cipher_suite: CipherSuite, not_valid_after: datetime.datetime, not_valid_before: datetime.datetime, resumption_secret: bytes, server_name: str, ticket: bytes, max_early_data_size: Optional[int]=None, other_extensions: List[Tuple[int, bytes]]=field(default_factory=list)) AlpnHandler = Callable[[str], None] ===========unchanged ref 1=========== SessionTicketFetcher = Callable[[bytes], Optional[SessionTicket]] SessionTicketHandler = Callable[[SessionTicket], None] at: aioquic.tls.Context._client_handle_certificate self._peer_certificate = x509.load_der_x509_certificate( certificate.certificates[0][0], backend=default_backend() ) self._peer_certificate_chain = [ x509.load_der_x509_certificate( certificate.certificates[i][0], backend=default_backend() ) for i in range(1, len(certificate.certificates)) ] at: aioquic.tls.Context._client_handle_encrypted_extensions self.alpn_negotiated = encrypted_extensions.alpn_protocol self.early_data_accepted = encrypted_extensions.early_data self.received_extensions = encrypted_extensions.other_extensions at: aioquic.tls.Context._client_handle_finished self._enc_key = next_enc_key at: aioquic.tls.Context._client_handle_hello self.key_schedule = self._key_schedule_psk self.key_schedule = self._key_schedule_proxy.select(cipher_suite) self._session_resumed = True self._key_schedule_psk = None self._key_schedule_proxy = None at: aioquic.tls.Context._client_send_hello self._ec_private_key = ec.generate_private_key( GROUP_TO_CURVE[Group.SECP256R1](), default_backend() ) self._x25519_private_key = x25519.X25519PrivateKey.generate() self._x448_private_key = x448.X448PrivateKey.generate() self._key_schedule_psk = KeySchedule(self.session_ticket.cipher_suite) self._key_schedule_proxy = KeyScheduleProxy(self._cipher_suites)
aioquic.quic.connection/QuicConnection._initialize
Modified
aiortc~aioquic
a0e083ddd8780ed3ce3d38ca138a5fbf8a272caa
[tls] make it possible to specify cipher suites
<6>:<add> cipher_suites=self.configuration.cipher_suites,
# module: aioquic.quic.connection class QuicConnection: def _initialize(self, peer_cid: bytes) -> None: <0> # TLS <1> self.tls = tls.Context( <2> alpn_protocols=self._configuration.alpn_protocols, <3> cadata=self._configuration.cadata, <4> cafile=self._configuration.cafile, <5> capath=self._configuration.capath, <6> is_client=self._is_client, <7> logger=self._logger, <8> max_early_data=None if self._is_client else MAX_EARLY_DATA, <9> server_name=self._configuration.server_name, <10> verify_mode=self._configuration.verify_mode, <11> ) <12> self.tls.certificate = self._configuration.certificate <13> self.tls.certificate_chain = self._configuration.certificate_chain <14> self.tls.certificate_private_key = self._configuration.private_key <15> self.tls.handshake_extensions = [ <16> ( <17> tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS, <18> self._serialize_transport_parameters(), <19> ) <20> ] <21> <22> # TLS session resumption <23> session_ticket = self._configuration.session_ticket <24> if ( <25> self._is_client <26> and session_ticket is not None <27> and session_ticket.is_valid <28> and session_ticket.server_name == self._configuration.server_name <29> ): <30> self.tls.session_ticket = self._configuration.session_ticket <31> <32> # parse saved QUIC transport parameters - for 0-RTT <33> if session_ticket.max_early_data_size == MAX_EARLY_DATA: <34> for ext_type, ext_data in session_ticket.other_extensions: <35> if ext_type == tls.ExtensionType.QUIC_TRANSPORT_PARAMETERS: <36> self._parse_transport_parameters( <37> ext_data, from_session_ticket=True <38> ) <39> break <40> </s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _initialize(self, peer_cid: bytes) -> None: # offset: 1 self.tls.alpn_cb = self._alpn_handler if self._session_ticket_fetcher is not None: self.tls.get_session_ticket_cb = self._session_ticket_fetcher if self._session_ticket_handler is not None: self.tls.new_session_ticket_cb = self._handle_session_ticket self.tls.update_traffic_key_cb = self._update_traffic_key # packet spaces self._cryptos = { tls.Epoch.INITIAL: CryptoPair(), tls.Epoch.ZERO_RTT: CryptoPair(), tls.Epoch.HANDSHAKE: CryptoPair(), tls.Epoch.ONE_RTT: CryptoPair(), } self._crypto_buffers = { tls.Epoch.INITIAL: Buffer(capacity=CRYPTO_BUFFER_SIZE), tls.Epoch.HANDSHAKE: Buffer(capacity=CRYPTO_BUFFER_SIZE), tls.Epoch.ONE_RTT: Buffer(capacity=CRYPTO_BUFFER_SIZE), } self._crypto_streams = { tls.Epoch.INITIAL: QuicStream(), tls.Epoch.HANDSHAKE: QuicStream(), tls.Epoch.ONE_RTT: QuicStream(), } self._spaces = { tls.Epoch.INITIAL: QuicPacketSpace(), tls.Epoch.HANDSHAKE: QuicPacketSpace(), tls.Epoch.ONE_RTT: QuicPacketSpace(), } self._cryptos[tls.Epoch.INITIAL].setup_initial( cid=peer_cid, is_client=self._is_client, version=self._version ) self._loss.spaces = list(self._spaces.values()) self._packet_number = 0 ===========unchanged ref 0=========== at: aioquic.quic.connection CRYPTO_BUFFER_SIZE = 16384 MAX_EARLY_DATA = 0xFFFFFFFF at: aioquic.quic.connection.QuicConnection _alpn_handler(alpn_protocol: str) -> None _handle_session_ticket(session_ticket: tls.SessionTicket) -> None _parse_transport_parameters(data: bytes, from_session_ticket: bool=False) -> None _serialize_transport_parameters() -> bytes _update_traffic_key(direction: tls.Direction, epoch: tls.Epoch, cipher_suite: tls.CipherSuite, secret: bytes) -> None at: aioquic.quic.connection.QuicConnection.__init__ self._configuration = configuration self._is_client = configuration.is_client self._cryptos: Dict[tls.Epoch, CryptoPair] = {} self._crypto_buffers: Dict[tls.Epoch, Buffer] = {} self._crypto_streams: Dict[tls.Epoch, QuicStream] = {} self._spaces: Dict[tls.Epoch, QuicPacketSpace] = {} self._version: Optional[int] = None self._logger = QuicConnectionAdapter( logger, {"id": dump_cid(self._original_destination_connection_id)} ) self._loss = QuicPacketRecovery( is_client_without_1rtt=self._is_client, quic_logger=self._quic_logger, send_probe=self._send_probe, ) self._session_ticket_fetcher = session_ticket_fetcher self._session_ticket_handler = session_ticket_handler at: aioquic.quic.connection.QuicConnection.connect self._version = self._configuration.supported_versions[0] at: aioquic.quic.connection.QuicConnection.receive_datagram self._version = QuicProtocolVersion(header.version) self._version = QuicProtocolVersion(max(common)) ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_connect_with_cipher_suite_aes256(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.AES_256_GCM_SHA384]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384 + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_256_GCM_SHA384 + ) + ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_connect_with_cipher_suite_aes128(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.AES_128_GCM_SHA256]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256 + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, tls.CipherSuite.AES_128_GCM_SHA256 + ) + ===========changed ref 2=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + @skipIf("chacha20" in SKIP_TESTS, "Skipping chacha20 tests") + def test_connect_with_cipher_suite_chacha20(self): + with client_and_server( + client_options={"cipher_suites": [tls.CipherSuite.CHACHA20_POLY1305_SHA256]} + ) as (client, server): + # check handshake completed + self.check_handshake(client=client, server=server) + + # check selected cipher suite + self.assertEqual( + client.tls.key_schedule.cipher_suite, + tls.CipherSuite.CHACHA20_POLY1305_SHA256, + ) + self.assertEqual( + server.tls.key_schedule.cipher_suite, + tls.CipherSuite.CHACHA20_POLY1305_SHA256, + ) + ===========changed ref 3=========== # module: tests.test_tls class ContextTest(TestCase): def test_server_unsupported_cipher_suite(self): - client = self.create_client() + client = self.create_client(cipher_suites=[tls.CipherSuite.AES_128_GCM_SHA256]) - client._cipher_suites = [tls.CipherSuite.AES_128_GCM_SHA256] - server = self.create_server() + server = self.create_server(cipher_suites=[tls.CipherSuite.AES_256_GCM_SHA384]) - server._cipher_suites = [tls.CipherSuite.AES_256_GCM_SHA384] with self.assertRaises(tls.AlertHandshakeFailure) as cm: self._server_fail_hello(client, server) self.assertEqual(str(cm.exception), "No supported cipher suite")
examples.http3_client/run
Modified
aiortc~aioquic
6f8e1e6ba163aba051a2baa9e93851cd5496f415
[http3 client] add --zero-rtt to send data before connection is up
<20>:<add> wait_connected=not zero_rtt,
# module: examples.http3_client def run( configuration: QuicConfiguration, urls: List[str], data: str, include: bool, output_dir: Optional[str], local_port: int, + zero_rtt: bool, ) -> None: <0> # parse URL <1> parsed = urlparse(urls[0]) <2> assert parsed.scheme in ( <3> "https", <4> "wss", <5> ), "Only https:// or wss:// URLs are supported." <6> if ":" in parsed.netloc: <7> host, port_str = parsed.netloc.split(":") <8> port = int(port_str) <9> else: <10> host = parsed.netloc <11> port = 443 <12> <13> async with connect( <14> host, <15> port, <16> configuration=configuration, <17> create_protocol=HttpClient, <18> session_ticket_handler=save_session_ticket, <19> local_port=local_port, <20> ) as client: <21> client = cast(HttpClient, client) <22> <23> if parsed.scheme == "wss": <24> ws = await client.websocket(urls[0], subprotocols=["chat", "superchat"]) <25> <26> # send some messages and receive reply <27> for i in range(2): <28> message = "Hello {}, WebSocket!".format(i) <29> print("> " + message) <30> await ws.send(message) <31> <32> message = await ws.recv() <33> print("< " + message) <34> <35> await ws.close() <36> else: <37> # perform request <38> coros = [ <39> perform_http_request( <40> client=client, <41> url=url, <42> data=data, <43> include=include, <44> output_dir=output_dir, <45> ) <46> for url in urls <47> ] <48> await asyncio.gather(*coros) <49>
===========unchanged ref 0=========== at: examples.http3_client HttpClient(*args, **kwargs) perform_http_request(client: HttpClient, url: str, data: str, include: bool, output_dir: Optional[str]) -> None save_session_ticket(ticket: SessionTicket) -> None at: typing cast(typ: Type[_T], val: Any) -> _T cast(typ: str, val: Any) -> Any cast(typ: object, val: Any) -> Any List = _alias(list, 1, inst=False, name='List') at: urllib.parse urlparse(url: str, scheme: Optional[str]=..., allow_fragments: bool=...) -> ParseResult urlparse(url: Optional[bytes], scheme: Optional[bytes]=..., allow_fragments: bool=...) -> ParseResultBytes
tests.test_connection/QuicConnectionTest.test_send_stream_data_peer_initiated
Modified
aiortc~aioquic
8a574f7a66add0808a227f59911895aa393a9d24
[streams] add an API to reset streams
<17>:<add> # client creates unidirectional stream <del> # client create unidirectional stream <21>:<add> # client tries to reset unknown stream <add> with self.assertRaises(ValueError) as cm: <add> client.reset_stream(4, QuicErrorCode.NO_ERROR) <add> self.assertEqual(str(cm.exception), "Cannot reset an unknown stream") <add> <add> # client tries to reset server-initiated unidirectional stream <add> with self.assertRaises(ValueError) as cm: <add> client.reset_stream(3, QuicErrorCode.NO_ERROR) <add> self.assertEqual( <add> str(cm.exception), "Cannot reset a peer-initiated unidirectional stream" <add> ) <add> <add> # client tries to send data on server-initiated unidirectional stream <del> # client tries to send data on server-initial unidirectional stream
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_stream_data_peer_initiated(self): <0> with client_and_server() as (client, server): <1> # server creates bidirectional stream <2> server.send_stream_data(1, b"hello") <3> self.assertEqual(roundtrip(server, client), (1, 1)) <4> <5> # server creates unidirectional stream <6> server.send_stream_data(3, b"hello") <7> self.assertEqual(roundtrip(server, client), (1, 1)) <8> <9> # client creates bidirectional stream <10> client.send_stream_data(0, b"hello") <11> self.assertEqual(roundtrip(client, server), (1, 1)) <12> <13> # client sends data on server-initiated bidirectional stream <14> client.send_stream_data(1, b"hello") <15> self.assertEqual(roundtrip(client, server), (1, 1)) <16> <17> # client create unidirectional stream <18> client.send_stream_data(2, b"hello") <19> self.assertEqual(roundtrip(client, server), (1, 1)) <20> <21> # client tries to send data on server-initial unidirectional stream <22> with self.assertRaises(ValueError) as cm: <23> client.send_stream_data(3, b"hello") <24> self.assertEqual( <25> str(cm.exception), <26> "Cannot send data on peer-initiated unidirectional stream", <27> ) <28> <29> # client tries to send data on unknown server-initiated bidirectional stream <30> with self.assertRaises(ValueError) as cm: <31> client.send_stream_data(5, b"hello") <32> self.assertEqual( <33> str(cm.exception), "Cannot send data on unknown peer-initiated stream" <34> ) <35>
===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) roundtrip(sender, receiver) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None at: unittest.case._AssertRaisesContext.__exit__ self.exception = exc_value.with_traceback(None) ===========changed ref 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_send_reset_stream(self): + with client_and_server() as (client, server): + # client creates bidirectional stream + client.send_stream_data(0, b"hello") + self.assertEqual(roundtrip(client, server), (1, 1)) + + # client resets stream + client.reset_stream(0, QuicErrorCode.NO_ERROR) + self.assertEqual(roundtrip(client, server), (1, 1)) +
aioquic.quic.stream/QuicStream.__init__
Modified
aiortc~aioquic
8a574f7a66add0808a227f59911895aa393a9d24
[streams] add an API to reset streams
<20>:<add> self._send_reset_error_code: Optional[int] = None <add> self._send_reset_pending = False
# module: aioquic.quic.stream class QuicStream: def __init__( self, stream_id: Optional[int] = None, max_stream_data_local: int = 0, max_stream_data_remote: int = 0, ) -> None: <0> self.is_blocked = False <1> self.max_stream_data_local = max_stream_data_local <2> self.max_stream_data_local_sent = max_stream_data_local <3> self.max_stream_data_remote = max_stream_data_remote <4> self.send_buffer_is_empty = True <5> <6> self._recv_buffer = bytearray() <7> self._recv_buffer_fin: Optional[int] = None <8> self._recv_buffer_start = 0 # the offset for the start of the buffer <9> self._recv_highest = 0 # the highest offset ever seen <10> self._recv_ranges = RangeSet() <11> <12> self._send_acked = RangeSet() <13> self._send_buffer = bytearray() <14> self._send_buffer_fin: Optional[int] = None <15> self._send_buffer_start = 0 # the offset for the start of the buffer <16> self._send_buffer_stop = 0 # the offset for the stop of the buffer <17> self._send_highest = 0 <18> self._send_pending = RangeSet() <19> self._send_pending_eof = False <20> <21> self.__stream_id = stream_id <22>
===========unchanged ref 0=========== at: aioquic.quic.stream.QuicStream._pull_data self._recv_buffer_start = r.stop at: aioquic.quic.stream.QuicStream.add_frame self._recv_buffer_fin = frame_end self._recv_highest = frame_end self._recv_buffer_start += count self._recv_buffer += bytearray(gap) at: aioquic.quic.stream.QuicStream.get_frame self._send_pending_eof = False self.send_buffer_is_empty = True self._send_highest = stop at: aioquic.quic.stream.QuicStream.get_reset_frame self._send_reset_pending = False at: aioquic.quic.stream.QuicStream.on_data_delivery self.send_buffer_is_empty = False self._send_buffer_start += size self._send_pending_eof = True at: aioquic.quic.stream.QuicStream.on_reset_delivery self._send_reset_pending = True at: aioquic.quic.stream.QuicStream.reset self._send_reset_error_code = error_code self._send_reset_pending = True at: aioquic.quic.stream.QuicStream.write self.send_buffer_is_empty = False self._send_buffer += data self._send_buffer_stop += size self._send_buffer_fin = self._send_buffer_stop self._send_pending_eof = True ===========changed ref 0=========== # module: aioquic.quic.packet + @dataclass + class QuicResetStreamFrame: + error_code: int + final_size: int + ===========changed ref 1=========== # module: tests.test_connection class QuicConnectionTest(TestCase): + def test_send_reset_stream(self): + with client_and_server() as (client, server): + # client creates bidirectional stream + client.send_stream_data(0, b"hello") + self.assertEqual(roundtrip(client, server), (1, 1)) + + # client resets stream + client.reset_stream(0, QuicErrorCode.NO_ERROR) + self.assertEqual(roundtrip(client, server), (1, 1)) + ===========changed ref 2=========== # module: tests.test_stream class QuicStreamTest(TestCase): + def test_send_reset(self): + stream = QuicStream() + + # reset is requested + stream.reset(QuicErrorCode.NO_ERROR) + self.assertTrue(stream.reset_pending) + + # reset is sent + reset = stream.get_reset_frame() + self.assertEqual(reset.error_code, QuicErrorCode.NO_ERROR) + self.assertEqual(reset.final_size, 0) + self.assertFalse(stream.reset_pending) + + # reset is lost + stream.on_reset_delivery(QuicDeliveryState.LOST) + self.assertTrue(stream.reset_pending) + ===========changed ref 3=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_stream_data_peer_initiated(self): with client_and_server() as (client, server): # server creates bidirectional stream server.send_stream_data(1, b"hello") self.assertEqual(roundtrip(server, client), (1, 1)) # server creates unidirectional stream server.send_stream_data(3, b"hello") self.assertEqual(roundtrip(server, client), (1, 1)) # client creates bidirectional stream client.send_stream_data(0, b"hello") self.assertEqual(roundtrip(client, server), (1, 1)) # client sends data on server-initiated bidirectional stream client.send_stream_data(1, b"hello") self.assertEqual(roundtrip(client, server), (1, 1)) + # client creates unidirectional stream - # client create unidirectional stream client.send_stream_data(2, b"hello") self.assertEqual(roundtrip(client, server), (1, 1)) + # client tries to reset unknown stream + with self.assertRaises(ValueError) as cm: + client.reset_stream(4, QuicErrorCode.NO_ERROR) + self.assertEqual(str(cm.exception), "Cannot reset an unknown stream") + + # client tries to reset server-initiated unidirectional stream + with self.assertRaises(ValueError) as cm: + client.reset_stream(3, QuicErrorCode.NO_ERROR) + self.assertEqual( + str(cm.exception), "Cannot reset a peer-initiated unidirectional stream" + ) + + # client tries to send data on server-initiated unidirectional stream - # client tries to send data on server-initial unidirectional stream with self.assertRaises(ValueError) as cm: client.send_stream_data(3, b"hello") self</s> ===========changed ref 4=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_stream_data_peer_initiated(self): # offset: 1 <s> self.assertRaises(ValueError) as cm: client.send_stream_data(3, b"hello") self.assertEqual( str(cm.exception), "Cannot send data on peer-initiated unidirectional stream", ) # client tries to send data on unknown server-initiated bidirectional stream with self.assertRaises(ValueError) as cm: client.send_stream_data(5, b"hello") self.assertEqual( str(cm.exception), "Cannot send data on unknown peer-initiated stream" )
aioquic.quic.connection/QuicConnection._write_application
Modified
aiortc~aioquic
8a574f7a66add0808a227f59911895aa393a9d24
[streams] add an API to reset streams
# module: aioquic.quic.connection class QuicConnection: def _write_application( self, builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float ) -> None: <0> crypto_stream: Optional[QuicStream] = None <1> if self._cryptos[tls.Epoch.ONE_RTT].send.is_valid(): <2> crypto = self._cryptos[tls.Epoch.ONE_RTT] <3> crypto_stream = self._crypto_streams[tls.Epoch.ONE_RTT] <4> packet_type = PACKET_TYPE_ONE_RTT <5> elif self._cryptos[tls.Epoch.ZERO_RTT].send.is_valid(): <6> crypto = self._cryptos[tls.Epoch.ZERO_RTT] <7> packet_type = PACKET_TYPE_ZERO_RTT <8> else: <9> return <10> space = self._spaces[tls.Epoch.ONE_RTT] <11> <12> while True: <13> # apply pacing, except if we have ACKs to send <14> if space.ack_at is None or space.ack_at >= now: <15> self._pacing_at = self._loss._pacer.next_send_time(now=now) <16> if self._pacing_at is not None: <17> break <18> builder.start_packet(packet_type, crypto) <19> <20> if self._handshake_complete: <21> # ACK <22> if space.ack_at is not None and space.ack_at <= now: <23> self._write_ack_frame(builder=builder, space=space, now=now) <24> <25> # HANDSHAKE_DONE <26> if self._handshake_done_pending: <27> self._write_handshake_done_frame(builder=builder) <28> self._handshake_done_pending = False <29> <30> # PATH CHALLENGE <31> if ( <32> not network_path.is_validated <33> and network_path.local_challenge is None <34> ): <35> challenge = os.ur</s>
===========below chunk 0=========== # module: aioquic.quic.connection class QuicConnection: def _write_application( self, builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float ) -> None: # offset: 1 self._write_path_challenge_frame( builder=builder, challenge=challenge ) network_path.local_challenge = challenge # PATH RESPONSE if network_path.remote_challenge is not None: self._write_path_response_frame( builder=builder, challenge=network_path.remote_challenge ) network_path.remote_challenge = None # NEW_CONNECTION_ID for connection_id in self._host_cids: if not connection_id.was_sent: self._write_new_connection_id_frame( builder=builder, connection_id=connection_id ) # RETIRE_CONNECTION_ID while self._retire_connection_ids: sequence_number = self._retire_connection_ids.pop(0) self._write_retire_connection_id_frame( builder=builder, sequence_number=sequence_number ) # STREAMS_BLOCKED if self._streams_blocked_pending: if self._streams_blocked_bidi: self._write_streams_blocked_frame( builder=builder, frame_type=QuicFrameType.STREAMS_BLOCKED_BIDI, limit=self._remote_max_streams_bidi, ) if self._streams_blocked_uni: self._write_streams_blocked_frame( builder=builder, frame_type=QuicFrameType.STREAMS_BLOCKED_UNI, limit=self._remote_max_streams_uni, ) self._streams_blocked_pending = False # MAX_DATA self._write_connection_limits(builder=builder, space=space) # stream-level limits for stream in self._streams.values(): self._write_stream_</s> ===========below chunk 1=========== # module: aioquic.quic.connection class QuicConnection: def _write_application( self, builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float ) -> None: # offset: 2 <s>=space) # stream-level limits for stream in self._streams.values(): self._write_stream_limits(builder=builder, space=space, stream=stream) # PING (user-request) if self._ping_pending: self._write_ping_frame(builder, self._ping_pending) self._ping_pending.clear() # PING (probe) if self._probe_pending: self._write_ping_frame(builder, comment="probe") self._probe_pending = False # CRYPTO if crypto_stream is not None and not crypto_stream.send_buffer_is_empty: self._write_crypto_frame( builder=builder, space=space, stream=crypto_stream ) # DATAGRAM while self._datagrams_pending: try: self._write_datagram_frame( builder=builder, data=self._datagrams_pending[0], frame_type=QuicFrameType.DATAGRAM_WITH_LENGTH, ) self._datagrams_pending.popleft() except QuicPacketBuilderStop: break # STREAM for stream in self._streams.values(): if not stream.is_blocked and not stream.send_buffer_is_empty: self._remote_max_data_used += self._write_stream_frame( builder=builder, space=space, stream=stream, max_offset=min( stream._send_highest + self._remote_max_data - self._remote_max_data_used, stream.max_stream_data_</s> ===========below chunk 2=========== # module: aioquic.quic.connection class QuicConnection: def _write_application( self, builder: QuicPacketBuilder, network_path: QuicNetworkPath, now: float ) -> None: # offset: 3 <s> ), ) if builder.packet_is_empty: break else: self._loss._pacer.update_after_send(now=now) ===========unchanged ref 0=========== at: aioquic.quic.connection SECRETS_LABELS = [ [ None, "QUIC_CLIENT_EARLY_TRAFFIC_SECRET", "QUIC_CLIENT_HANDSHAKE_TRAFFIC_SECRET", "QUIC_CLIENT_TRAFFIC_SECRET_0", ], [ None, None, "QUIC_SERVER_HANDSHAKE_TRAFFIC_SECRET", "QUIC_SERVER_TRAFFIC_SECRET_0", ], ] QuicNetworkPath(addr: NetworkAddress, bytes_received: int=0, bytes_sent: int=0, is_validated: bool=False, local_challenge: Optional[bytes]=None, remote_challenge: Optional[bytes]=None) at: aioquic.quic.connection.QuicConnection _write_ack_frame(builder: QuicPacketBuilder, space: QuicPacketSpace, now: float) -> None _write_connection_limits(builder: QuicPacketBuilder, space: QuicPacketSpace) -> None _write_crypto_frame(builder: QuicPacketBuilder, space: QuicPacketSpace, stream: QuicStream) -> bool _write_datagram_frame(builder: QuicPacketBuilder, data: bytes, frame_type: QuicFrameType) -> bool _write_handshake_done_frame(builder: QuicPacketBuilder) -> None _write_new_connection_id_frame(builder: QuicPacketBuilder, connection_id: QuicConnectionId) -> None _write_path_challenge_frame(builder: QuicPacketBuilder, challenge: bytes) -> None _write_path_response_frame(builder: QuicPacketBuilder, challenge: bytes) -> None _write_ping_frame(builder: QuicPacketBuilder, uids: List[int]=[], comment="") _write_retire_connection_id_frame(builder: QuicPacketBuilder, sequence_number: int) -> None
aioquic.quic.stream/QuicStream.write
Modified
aiortc~aioquic
2f334455123391843dc600cbaec3fbcb24e27372
[stream] assert write() is never called after reset()
<4>:<add> assert self._send_reset_error_code is None, "cannot call write() after reset()"
# module: aioquic.quic.stream class QuicStream: def write(self, data: bytes, end_stream: bool = False) -> None: <0> """ <1> Write some data bytes to the QUIC stream. <2> """ <3> assert self._send_buffer_fin is None, "cannot call write() after FIN" <4> size = len(data) <5> <6> if size: <7> self.send_buffer_is_empty = False <8> self._send_pending.add( <9> self._send_buffer_stop, self._send_buffer_stop + size <10> ) <11> self._send_buffer += data <12> self._send_buffer_stop += size <13> if end_stream: <14> self.send_buffer_is_empty = False <15> self._send_buffer_fin = self._send_buffer_stop <16> self._send_pending_eof = True <17>
===========unchanged ref 0=========== at: aioquic.quic.stream.QuicStream.__init__ self.send_buffer_is_empty = True self._send_buffer = bytearray() self._send_buffer_fin: Optional[int] = None self._send_buffer_stop = 0 # the offset for the stop of the buffer self._send_pending = RangeSet() self._send_reset_error_code: Optional[int] = None at: aioquic.quic.stream.QuicStream.get_frame self.send_buffer_is_empty = True at: aioquic.quic.stream.QuicStream.on_data_delivery self.send_buffer_is_empty = False at: aioquic.quic.stream.QuicStream.reset self._send_reset_error_code = error_code
tests.test_connection/QuicConnectionTest.test_send_stream_data_peer_initiated
Modified
aiortc~aioquic
dfbeb83cf95b2ff4e81bd534097ade2ae4bd5939
[streams] refactor local stream creation
<21>:<del> # client tries to reset unknown stream <22>:<del> with self.assertRaises(ValueError) as cm: <23>:<del> client.reset_stream(4, QuicErrorCode.NO_ERROR) <24>:<del> self.assertEqual(str(cm.exception), "Cannot reset an unknown stream") <25>:<del> <30>:<add> str(cm.exception), <add> "Cannot send data on peer-initiated unidirectional stream", <del> str(cm.exception), "Cannot reset a peer-initiated unidirectional stream" <31>:<add> ) <add> <add> # client tries to reset unknown server-initiated bidirectional stream <add> with self.assertRaises(ValueError) as cm: <add> client.reset_stream(5, QuicErrorCode.NO_ERROR) <add> self.assertEqual( <add> str(cm.exception), "Cannot send data on unknown peer-initiated stream"
# module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_stream_data_peer_initiated(self): <0> with client_and_server() as (client, server): <1> # server creates bidirectional stream <2> server.send_stream_data(1, b"hello") <3> self.assertEqual(roundtrip(server, client), (1, 1)) <4> <5> # server creates unidirectional stream <6> server.send_stream_data(3, b"hello") <7> self.assertEqual(roundtrip(server, client), (1, 1)) <8> <9> # client creates bidirectional stream <10> client.send_stream_data(0, b"hello") <11> self.assertEqual(roundtrip(client, server), (1, 1)) <12> <13> # client sends data on server-initiated bidirectional stream <14> client.send_stream_data(1, b"hello") <15> self.assertEqual(roundtrip(client, server), (1, 1)) <16> <17> # client creates unidirectional stream <18> client.send_stream_data(2, b"hello") <19> self.assertEqual(roundtrip(client, server), (1, 1)) <20> <21> # client tries to reset unknown stream <22> with self.assertRaises(ValueError) as cm: <23> client.reset_stream(4, QuicErrorCode.NO_ERROR) <24> self.assertEqual(str(cm.exception), "Cannot reset an unknown stream") <25> <26> # client tries to reset server-initiated unidirectional stream <27> with self.assertRaises(ValueError) as cm: <28> client.reset_stream(3, QuicErrorCode.NO_ERROR) <29> self.assertEqual( <30> str(cm.exception), "Cannot reset a peer-initiated unidirectional stream" <31> ) <32> <33> # client tries to send data on server-initiated unidirectional stream <34> with self.assertRaises(ValueError) as cm: <35> client.send_stream_data(3, b"hello") <36> self.assertEqual(</s>
===========below chunk 0=========== # module: tests.test_connection class QuicConnectionTest(TestCase): def test_send_stream_data_peer_initiated(self): # offset: 1 "Cannot send data on peer-initiated unidirectional stream", ) # client tries to send data on unknown server-initiated bidirectional stream with self.assertRaises(ValueError) as cm: client.send_stream_data(5, b"hello") self.assertEqual( str(cm.exception), "Cannot send data on unknown peer-initiated stream" ) ===========unchanged ref 0=========== at: tests.test_connection client_and_server(client_kwargs={}, client_options={}, client_patch=lambda x: None, handshake=True, server_kwargs={}, server_certfile=SERVER_CERTFILE, server_keyfile=SERVER_KEYFILE, server_options={}, server_patch=lambda x: None) roundtrip(sender, receiver) at: unittest.case.TestCase failureException: Type[BaseException] longMessage: bool maxDiff: Optional[int] _testMethodName: str _testMethodDoc: str assertEqual(first: Any, second: Any, msg: Any=...) -> None assertRaises(expected_exception: Union[Type[_E], Tuple[Type[_E], ...]], msg: Any=...) -> _AssertRaisesContext[_E] assertRaises(expected_exception: Union[Type[BaseException], Tuple[Type[BaseException], ...]], callable: Callable[..., Any], *args: Any, **kwargs: Any) -> None at: unittest.case._AssertRaisesContext.__exit__ self.exception = exc_value.with_traceback(None)