Gaukas Wang
4973374ea5
sync: quic-go 0.42.0
...
Signed-off-by: Gaukas Wang <i@gaukas.wang>
2024-04-23 22:34:55 -06:00
Gaukas Wang
95575f5fe7
break: update repo url [ci skip]
...
uTLS is not yet bumped to the new version, so this commit breaks the dependencies relationship by getting rid of the local replace.
2023-08-03 18:58:52 -06:00
Marten Seemann
469a6153b6
use a synchronous API for the crypto setup ( #3939 )
2023-07-21 10:00:42 -07:00
Marten Seemann
3d89e545d3
use the new crypto/tls QUIC Transport ( #3860 )
2023-07-01 11:15:00 -07:00
Marten Seemann
58cedf7a4f
rename module, adjust import paths to quic-go/quic-go ( #3680 )
2023-01-21 19:53:57 -08:00
Marten Seemann
43bde14cf7
implement generic Min and Max functions
2022-08-10 14:59:05 +02:00
Marten Seemann
f10d4bd8f7
add key derivation paths for QUIC v2
2022-05-25 16:12:09 +02:00
Marten Seemann
95334202c5
fix decoding of packet numbers in different packet number spaces
...
When QUIC abandoned the "stream 0" design, it introduced separate
packet number spaces for packets with different encryption levels.
Packet number compression now also works per packet number space.
The current code doesn't lead to any problems if the peer starts sending
with packet number 0, as we only exchange a few packets in the Initial
and the Handshake packet number space and there's nothing to compress.
It might lead to problems if the peer starts with a large packet number
in one space (which is allowed by the spec), and then starts with a
small packet number in another packet number space.
2020-12-03 23:35:27 +07:00
Marten Seemann
977dbc828c
move all dependencies on qtls to a separate package
2020-08-18 14:26:23 +07:00
Marten Seemann
6bb11abcd7
use the optimized HKDF-Expand-Label everywhere
2020-04-09 08:33:59 +07:00
Marten Seemann
f61f251fce
implement correct dropping of Initial keys
2019-11-04 13:33:17 +07:00
Marten Seemann
cc9fa055a6
rename the sealer to longHeaderSealer for consistency
2019-11-04 11:31:20 +07:00
Marten Seemann
33b74fca79
use the new qtls SetWriteKey and SetReadKey interface
2019-09-07 11:36:06 +07:00
Marten Seemann
63c079e234
move header protection to a separate struct
2019-09-07 11:32:48 +07:00
Marten Seemann
4e1f18e833
avoid unnecessary initializations of heaper protectors on key updates
2019-06-22 20:01:18 +08:00
Marten Seemann
c522bcc683
return a defined error when the AEAD cannot open a packet
2019-06-22 20:01:18 +08:00
Marten Seemann
d3ca8db521
refactor initialization of AEADs
2019-06-22 20:01:18 +08:00
Marten Seemann
0dd5a0b91f
introduce a separate AEAD for short header crypto
2019-06-22 20:01:18 +08:00
Marten Seemann
598628d05b
use separate opener interfaces for long and short header packets
2019-06-22 20:01:18 +08:00
Marten Seemann
b2d3ef691e
use separate sealer interfaces for long and short header packets
2019-06-22 20:01:18 +08:00
Marten Seemann
b4356d7348
fix nonce usage in the AEAD, use the AEAD provided by qtls for Initials
2019-01-07 09:04:03 +07:00
Marten Seemann
177c81610b
rename packet number encryption to header encryption
2019-01-05 18:00:22 +07:00
Marten Seemann
538b84b78d
use the IV when sealing and opening
2018-12-29 16:11:27 +07:00
Marten Seemann
5a68ba0a02
implement header encrytion and decryption for sealers and openers
2018-12-14 16:46:40 +06:30
Marten Seemann
82508f1562
use tls-tris instead of mint
2018-10-26 16:18:49 +07:00