diff options
author | Roman Arutyunyan <arut@nginx.com> | 2020-03-23 15:32:24 +0300 |
---|---|---|
committer | Roman Arutyunyan <arut@nginx.com> | 2020-03-23 15:32:24 +0300 |
commit | 77a4c2d17221d355e1e520cdff8fd41aec0bf3ed (patch) | |
tree | f96eab1ec7ba21a774cff8999aabef8de121d6ff /src | |
parent | f4562d7ed904a0734cfe65d20921977aaf0ae088 (diff) | |
download | nginx-77a4c2d17221d355e1e520cdff8fd41aec0bf3ed.tar.gz nginx-77a4c2d17221d355e1e520cdff8fd41aec0bf3ed.zip |
Put zero in 'First ACK Range' when acknowledging one packet.
This fixes Chrome CONNECTION_ID_LIMIT_ERROR with the reason:
"Underflow with first ack block length 2 largest acked is 1".
Diffstat (limited to 'src')
-rw-r--r-- | src/event/ngx_event_quic_transport.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/event/ngx_event_quic_transport.c b/src/event/ngx_event_quic_transport.c index c1f2fc992..e15a267b3 100644 --- a/src/event/ngx_event_quic_transport.c +++ b/src/event/ngx_event_quic_transport.c @@ -1104,7 +1104,7 @@ ngx_quic_create_ack(u_char *p, ngx_quic_ack_frame_t *ack) len += ngx_quic_varint_len(ack->pn); len += ngx_quic_varint_len(0); len += ngx_quic_varint_len(0); - len += ngx_quic_varint_len(ack->pn); + len += ngx_quic_varint_len(0); return len; } @@ -1115,7 +1115,7 @@ ngx_quic_create_ack(u_char *p, ngx_quic_ack_frame_t *ack) ngx_quic_build_int(&p, ack->pn); ngx_quic_build_int(&p, 0); ngx_quic_build_int(&p, 0); - ngx_quic_build_int(&p, ack->pn); + ngx_quic_build_int(&p, 0); return p - start; } |