mirror of
https://github.com/facebookincubator/mvfst.git
synced 2025-12-03 03:40:56 +03:00
Don't use old max packet size for 0rtt.
Summary: This is a bug, for 0rtt, even if the can ignore flag is set, we shouldn't trust the old max packet size. If it has changed then the peer will fail to decrypt anything. There are open questions here around the PMTU we use for the handshake/0rtt, but let's just punt on those for now. Reviewed By: udippant, xttjsn Differential Revision: D23641082 fbshipit-source-id: aba93713091805e9498ab2c14b24bccf18192c02
This commit is contained in:
committed by
Facebook GitHub Bot
parent
0e1f6a26d7
commit
36bef91503
@@ -61,7 +61,7 @@ TEST_F(ClientStateMachineTest, TestUpdateTransportParamsFromCachedEarlyParams) {
|
||||
|
||||
updateTransportParamsFromCachedEarlyParams(*client_, kParams);
|
||||
EXPECT_EQ(client_->peerIdleTimeout, idleTimeout);
|
||||
EXPECT_EQ(client_->udpSendPacketLen, maxRecvPacketSize);
|
||||
EXPECT_NE(client_->udpSendPacketLen, maxRecvPacketSize);
|
||||
EXPECT_EQ(client_->flowControlState.peerAdvertisedMaxOffset, initialMaxData);
|
||||
EXPECT_EQ(
|
||||
client_->flowControlState.peerAdvertisedInitialMaxStreamOffsetBidiLocal,
|
||||
|
||||
Reference in New Issue
Block a user