Skip to content

Commit

Permalink
proto: rename Plain types to Protected
Browse files Browse the repository at this point in the history
  • Loading branch information
djc committed May 22, 2024
1 parent ee1c0fd commit 6c9c252
Show file tree
Hide file tree
Showing 3 changed files with 20 additions and 20 deletions.
4 changes: 2 additions & 2 deletions quinn-proto/src/endpoint.rs
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ use crate::{
frame,
packet::{
FixedLengthConnectionIdParser, Header, InitialHeader, InitialPacket, Packet,
PacketDecodeError, PacketNumber, PartialDecode, PlainInitialHeader,
PacketDecodeError, PacketNumber, PartialDecode, ProtectedInitialHeader,
},
shared::{
ConnectionEvent, ConnectionEventInner, ConnectionId, DatagramConnectionEvent, EcnCodepoint,
Expand Down Expand Up @@ -684,7 +684,7 @@ impl Endpoint {
/// Check if we should refuse a connection attempt regardless of the packet's contents
fn early_validate_first_packet(
&mut self,
header: &PlainInitialHeader,
header: &ProtectedInitialHeader,
) -> Result<(), TransportError> {
let config = &self.server_config.as_ref().unwrap();
if self.cids_exhausted() || self.incoming_buffers.len() >= config.max_incoming {
Expand Down
2 changes: 1 addition & 1 deletion quinn-proto/src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ pub use crate::endpoint::{
mod packet;
pub use packet::{
ConnectionIdParser, FixedLengthConnectionIdParser, LongType, PacketDecodeError, PartialDecode,
PlainHeader, PlainInitialHeader,
ProtectedHeader, ProtectedInitialHeader,
};

mod shared;
Expand Down
34 changes: 17 additions & 17 deletions quinn-proto/src/packet.rs
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ use crate::{
#[cfg_attr(test, derive(Clone))]
#[derive(Debug)]
pub struct PartialDecode {
plain_header: PlainHeader,
plain_header: ProtectedHeader,
buf: io::Cursor<BytesMut>,
}

Expand All @@ -38,7 +38,7 @@ impl PartialDecode {
) -> Result<(Self, Option<BytesMut>), PacketDecodeError> {
let mut buf = io::Cursor::new(bytes);
let plain_header =
PlainHeader::decode(&mut buf, cid_parser, supported_versions, grease_quic_bit)?;
ProtectedHeader::decode(&mut buf, cid_parser, supported_versions, grease_quic_bit)?;
let dgram_len = buf.get_ref().len();
let packet_len = plain_header
.payload_len()
Expand All @@ -61,20 +61,20 @@ impl PartialDecode {
self.buf.get_ref()
}

pub(crate) fn initial_header(&self) -> Option<&PlainInitialHeader> {
pub(crate) fn initial_header(&self) -> Option<&ProtectedInitialHeader> {
self.plain_header.as_initial()
}

pub(crate) fn has_long_header(&self) -> bool {
!matches!(self.plain_header, PlainHeader::Short { .. })
!matches!(self.plain_header, ProtectedHeader::Short { .. })
}

pub(crate) fn is_initial(&self) -> bool {
self.space() == Some(SpaceId::Initial)
}

pub(crate) fn space(&self) -> Option<SpaceId> {
use self::PlainHeader::*;
use self::ProtectedHeader::*;
match self.plain_header {
Initial { .. } => Some(SpaceId::Initial),
Long {
Expand All @@ -92,7 +92,7 @@ impl PartialDecode {

pub(crate) fn is_0rtt(&self) -> bool {
match self.plain_header {
PlainHeader::Long { ty, .. } => ty == LongType::ZeroRtt,
ProtectedHeader::Long { ty, .. } => ty == LongType::ZeroRtt,
_ => false,
}
}
Expand All @@ -112,13 +112,13 @@ impl PartialDecode {
self,
header_crypto: Option<&dyn crypto::HeaderKey>,
) -> Result<Packet, PacketDecodeError> {
use self::PlainHeader::*;
use self::ProtectedHeader::*;
let Self {
plain_header,
mut buf,
} = self;

if let Initial(PlainInitialHeader {
if let Initial(ProtectedInitialHeader {
dst_cid,
src_cid,
token_pos,
Expand Down Expand Up @@ -490,9 +490,9 @@ impl PartialEncode {

/// Plain packet header
#[derive(Clone, Debug)]
pub enum PlainHeader {
pub enum ProtectedHeader {
/// An Initial packet header
Initial(PlainInitialHeader),
Initial(ProtectedInitialHeader),
/// A Long packet header, as used during the handshake
Long {
/// Type of the Long header packet
Expand Down Expand Up @@ -533,8 +533,8 @@ pub enum PlainHeader {
},
}

impl PlainHeader {
fn as_initial(&self) -> Option<&PlainInitialHeader> {
impl ProtectedHeader {
fn as_initial(&self) -> Option<&ProtectedInitialHeader> {
match self {
Self::Initial(x) => Some(x),
_ => None,
Expand All @@ -543,7 +543,7 @@ impl PlainHeader {

/// The destination Connection ID of the packet
pub fn dst_cid(&self) -> &ConnectionId {
use self::PlainHeader::*;
use self::ProtectedHeader::*;
match self {
Initial(header) => &header.dst_cid,
Long { dst_cid, .. } => dst_cid,
Expand All @@ -554,9 +554,9 @@ impl PlainHeader {
}

fn payload_len(&self) -> Option<u64> {
use self::PlainHeader::*;
use self::ProtectedHeader::*;
match self {
Initial(PlainInitialHeader { len, .. }) | Long { len, .. } => Some(*len),
Initial(ProtectedInitialHeader { len, .. }) | Long { len, .. } => Some(*len),
_ => None,
}
}
Expand Down Expand Up @@ -615,7 +615,7 @@ impl PlainHeader {
buf.advance(token_len);

let len = buf.get_var()?;
Ok(Self::Initial(PlainInitialHeader {
Ok(Self::Initial(ProtectedInitialHeader {
dst_cid,
src_cid,
token_pos: token_start..token_start + token_len,
Expand All @@ -642,7 +642,7 @@ impl PlainHeader {

/// Header of an Initial packet, before decryption
#[derive(Clone, Debug)]
pub struct PlainInitialHeader {
pub struct ProtectedInitialHeader {
/// Destination Connection ID
pub dst_cid: ConnectionId,
/// Source Connection ID
Expand Down

0 comments on commit 6c9c252

Please sign in to comment.