Marten Seemann
|
080b61d271
|
only save transport parameters to session ticket when using 0-RTT
|
2020-01-17 10:50:27 +07:00 |
|
Marten Seemann
|
4ab4b8004a
|
Merge pull request #2274 from lucas-clemente/log-0-rtt-key-install
log when 0-RTT keys become available
|
2020-01-06 17:43:14 +07:00 |
|
Marten Seemann
|
a1840b3221
|
fix unmarshaling of transport parameters from session tickets
|
2020-01-02 15:12:32 +08:00 |
|
Marten Seemann
|
81831049c9
|
log when 0-RTT keys become available
|
2020-01-02 15:10:43 +08:00 |
|
Marten Seemann
|
052508e8c2
|
add a version to marshaled transport parameters in the session ticket
|
2020-01-01 18:04:02 +04:00 |
|
Marten Seemann
|
22abcfe6fb
|
drop 0-RTT write keys when receiving the 1-RTT keys
|
2020-01-01 18:04:02 +04:00 |
|
Marten Seemann
|
44aa12850e
|
restore the server's transport parameters from the session ticket
|
2020-01-01 18:04:02 +04:00 |
|
Marten Seemann
|
9b0a4a8813
|
move unmarshaling of the transport parameters to the crypto setup
|
2020-01-01 18:04:01 +04:00 |
|
Marten Seemann
|
c5f74595ca
|
receive 0-RTT sealers and openers from qtls when using 0-RTT
|
2019-12-30 18:39:21 +04:00 |
|
Marten Seemann
|
a9f4195fd0
|
check that transport params didn't change when accepting
|
2019-12-30 18:39:21 +04:00 |
|
Marten Seemann
|
12922bdec9
|
drop Handshake keys when receiving HANDSHAKE_DONE (as a client)
|
2019-12-06 10:29:48 +07:00 |
|
Marten Seemann
|
f7fd5d2848
|
drop Handshake keys as soon as the handshake completes (as a server)
|
2019-12-06 10:29:48 +07:00 |
|
Marten Seemann
|
d0a3eaa8a3
|
improve logging of handshake messages
|
2019-11-25 09:09:34 +07:00 |
|
Marten Seemann
|
3db60534cf
|
use a sentinel error when a sealer is not yet available
|
2019-11-12 11:27:30 +07:00 |
|
Marten Seemann
|
f61f251fce
|
implement correct dropping of Initial keys
|
2019-11-04 13:33:17 +07:00 |
|
Marten Seemann
|
416fe8364e
|
remove unused return value from session constructor
|
2019-10-27 15:35:34 +07:00 |
|
Marten Seemann
|
ab2b26a5cb
|
add the unparam linter
|
2019-09-17 13:44:05 +07:00 |
|
Marten Seemann
|
de3e1a3de5
|
log the cipher suite
|
2019-09-07 11:47:21 +07:00 |
|
Marten Seemann
|
33b74fca79
|
use the new qtls SetWriteKey and SetReadKey interface
|
2019-09-07 11:36:06 +07:00 |
|
Marten Seemann
|
63c079e234
|
move header protection to a separate struct
|
2019-09-07 11:32:48 +07:00 |
|
Marten Seemann
|
e224768e46
|
fix deadlock when the crypto setup is closed while qtls writes messages
|
2019-08-31 11:59:44 +07:00 |
|
Marten Seemann
|
c52a28cec1
|
explicitly trigger sending of session tickets
|
2019-07-05 20:53:25 +07:00 |
|
Marten Seemann
|
6bf42558f3
|
receive the encryption level for key updates from qtls
|
2019-07-05 10:36:53 +07:00 |
|
Marten Seemann
|
a3878d99c9
|
drop old keys 3 PTOs after a key update
|
2019-06-30 17:36:09 +07:00 |
|
Marten Seemann
|
0333f424bb
|
Merge pull request #1959 from lucas-clemente/optimize-crypto-packet-sending
optimize sending of crypto packets
|
2019-06-29 00:03:12 +08:00 |
|
Marten Seemann
|
a09c045324
|
initiate a key update after sending / receiving 100000 packets
|
2019-06-27 10:54:54 +08:00 |
|
Marten Seemann
|
73d5d83a1d
|
pass the largest acked 1-RTT packet number to the crypto setup
|
2019-06-27 07:42:19 +08:00 |
|
Marten Seemann
|
acba7d4e77
|
return ErrKeysDropped when sealer keys were already dropped
|
2019-06-25 13:38:11 +08:00 |
|
Marten Seemann
|
4e1f18e833
|
avoid unnecessary initializations of heaper protectors on key updates
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
ca8b7ddeef
|
add logging to the updatable AEAD
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
c522bcc683
|
return a defined error when the AEAD cannot open a packet
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
d3ca8db521
|
refactor initialization of AEADs
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
0dd5a0b91f
|
introduce a separate AEAD for short header crypto
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
598628d05b
|
use separate opener interfaces for long and short header packets
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
b2d3ef691e
|
use separate sealer interfaces for long and short header packets
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
c503769bcd
|
use separate functions per encryption level to get sealers
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
d4d3f09ee3
|
use separate functions per encryption level to get openers
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
17634d2fe5
|
error when receiving a post-handshake message with wrong encryption level
|
2019-06-02 14:10:51 +08:00 |
|
Marten Seemann
|
6888eb8593
|
return an error when handling the NewSessionTicket failed
|
2019-06-01 13:01:49 +08:00 |
|
Marten Seemann
|
e361d3c5cd
|
use a callback to signal completion of the handshake
|
2019-05-31 19:13:41 +08:00 |
|
Marten Seemann
|
4fd6a7cc99
|
use a struct to pass callbacks from the session to the crypto setup
|
2019-05-31 19:00:10 +08:00 |
|
Marten Seemann
|
743868159f
|
use a callback to pass handshake errors to the session
|
2019-05-31 18:35:37 +08:00 |
|
Marten Seemann
|
ed69ae2ce0
|
Merge pull request #1940 from lucas-clemente/unexpected-handshake-messages
fix crash when receiving unexpected handshake messages
|
2019-05-31 18:14:29 +08:00 |
|
Marten Seemann
|
73bd91a093
|
fix crash when receiving unexpected handshake message
|
2019-05-31 18:04:44 +08:00 |
|
Marten Seemann
|
5d4a47a3f3
|
return a crypto error when receiving unexpected handshake messages
|
2019-05-31 17:57:07 +08:00 |
|
Marten Seemann
|
0be4ee197f
|
fix race condition in crypto setup when sending a HelloRetryRequest
|
2019-05-31 01:57:58 +08:00 |
|
Marten Seemann
|
a4989c3d9c
|
drop Initial and Handshake keys when receiving the first 1-RTT ACK
|
2019-05-30 14:19:26 +08:00 |
|
Marten Seemann
|
9ffbd662c1
|
fix race condition when accessing the encryption level in crypto setup
|
2019-04-02 00:13:22 +09:00 |
|
Marten Seemann
|
e9f7f87063
|
remove two stray TODOs from the crypto setup
|
2019-04-01 12:04:19 +09:00 |
|
Marten Seemann
|
2adf923ee6
|
process the NewSessionTicket TLS message
|
2019-04-01 11:45:20 +09:00 |
|