Marten Seemann
|
ab2b26a5cb
|
add the unparam linter
|
2019-09-17 13:44:05 +07:00 |
|
Marten Seemann
|
de3e1a3de5
|
log the cipher suite
|
2019-09-07 11:47:21 +07:00 |
|
Marten Seemann
|
33b74fca79
|
use the new qtls SetWriteKey and SetReadKey interface
|
2019-09-07 11:36:06 +07:00 |
|
Marten Seemann
|
63c079e234
|
move header protection to a separate struct
|
2019-09-07 11:32:48 +07:00 |
|
Marten Seemann
|
e224768e46
|
fix deadlock when the crypto setup is closed while qtls writes messages
|
2019-08-31 11:59:44 +07:00 |
|
Marten Seemann
|
c52a28cec1
|
explicitly trigger sending of session tickets
|
2019-07-05 20:53:25 +07:00 |
|
Marten Seemann
|
6bf42558f3
|
receive the encryption level for key updates from qtls
|
2019-07-05 10:36:53 +07:00 |
|
Marten Seemann
|
a3878d99c9
|
drop old keys 3 PTOs after a key update
|
2019-06-30 17:36:09 +07:00 |
|
Marten Seemann
|
0333f424bb
|
Merge pull request #1959 from lucas-clemente/optimize-crypto-packet-sending
optimize sending of crypto packets
|
2019-06-29 00:03:12 +08:00 |
|
Marten Seemann
|
a09c045324
|
initiate a key update after sending / receiving 100000 packets
|
2019-06-27 10:54:54 +08:00 |
|
Marten Seemann
|
73d5d83a1d
|
pass the largest acked 1-RTT packet number to the crypto setup
|
2019-06-27 07:42:19 +08:00 |
|
Marten Seemann
|
acba7d4e77
|
return ErrKeysDropped when sealer keys were already dropped
|
2019-06-25 13:38:11 +08:00 |
|
Marten Seemann
|
4e1f18e833
|
avoid unnecessary initializations of heaper protectors on key updates
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
ca8b7ddeef
|
add logging to the updatable AEAD
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
c522bcc683
|
return a defined error when the AEAD cannot open a packet
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
d3ca8db521
|
refactor initialization of AEADs
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
0dd5a0b91f
|
introduce a separate AEAD for short header crypto
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
598628d05b
|
use separate opener interfaces for long and short header packets
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
b2d3ef691e
|
use separate sealer interfaces for long and short header packets
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
c503769bcd
|
use separate functions per encryption level to get sealers
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
d4d3f09ee3
|
use separate functions per encryption level to get openers
|
2019-06-22 20:01:18 +08:00 |
|
Marten Seemann
|
17634d2fe5
|
error when receiving a post-handshake message with wrong encryption level
|
2019-06-02 14:10:51 +08:00 |
|
Marten Seemann
|
6888eb8593
|
return an error when handling the NewSessionTicket failed
|
2019-06-01 13:01:49 +08:00 |
|
Marten Seemann
|
e361d3c5cd
|
use a callback to signal completion of the handshake
|
2019-05-31 19:13:41 +08:00 |
|
Marten Seemann
|
4fd6a7cc99
|
use a struct to pass callbacks from the session to the crypto setup
|
2019-05-31 19:00:10 +08:00 |
|
Marten Seemann
|
743868159f
|
use a callback to pass handshake errors to the session
|
2019-05-31 18:35:37 +08:00 |
|
Marten Seemann
|
ed69ae2ce0
|
Merge pull request #1940 from lucas-clemente/unexpected-handshake-messages
fix crash when receiving unexpected handshake messages
|
2019-05-31 18:14:29 +08:00 |
|
Marten Seemann
|
73bd91a093
|
fix crash when receiving unexpected handshake message
|
2019-05-31 18:04:44 +08:00 |
|
Marten Seemann
|
5d4a47a3f3
|
return a crypto error when receiving unexpected handshake messages
|
2019-05-31 17:57:07 +08:00 |
|
Marten Seemann
|
0be4ee197f
|
fix race condition in crypto setup when sending a HelloRetryRequest
|
2019-05-31 01:57:58 +08:00 |
|
Marten Seemann
|
a4989c3d9c
|
drop Initial and Handshake keys when receiving the first 1-RTT ACK
|
2019-05-30 14:19:26 +08:00 |
|
Marten Seemann
|
9ffbd662c1
|
fix race condition when accessing the encryption level in crypto setup
|
2019-04-02 00:13:22 +09:00 |
|
Marten Seemann
|
e9f7f87063
|
remove two stray TODOs from the crypto setup
|
2019-04-01 12:04:19 +09:00 |
|
Marten Seemann
|
2adf923ee6
|
process the NewSessionTicket TLS message
|
2019-04-01 11:45:20 +09:00 |
|
Marten Seemann
|
da4b3e3176
|
pass a conn to qtls that returns the remote address
|
2019-04-01 11:45:20 +09:00 |
|
Marten Seemann
|
9ddf9129cf
|
move generation of qtls.Config to a separate file, add tests
|
2019-04-01 11:41:06 +09:00 |
|
Marten Seemann
|
09574a6653
|
expose the tls.ConnectionState
|
2019-03-31 23:56:24 +09:00 |
|
Marten Seemann
|
d44c81de7a
|
remove verification of version negotiation
|
2019-03-23 11:26:20 +01:00 |
|
Marten Seemann
|
f103919bf1
|
fix handling of HelloRetryRequests
|
2019-03-14 16:47:09 +09:00 |
|
Marten Seemann
|
5b27076a4c
|
return the local TLS error, but don't send it on the wire
|
2019-03-08 18:02:43 +09:00 |
|
Marten Seemann
|
ae12852e4c
|
add a message to crypto errors
The string representation varies depending on the message:
* if there's no message, the TLS alert is used
* if there's a message, it is used instead
|
2019-03-08 18:02:43 +09:00 |
|
Marten Seemann
|
373db3c153
|
send the correct error code for crypto errors
|
2019-03-08 18:02:43 +09:00 |
|
Marten Seemann
|
9c09e84765
|
use IETF QUIC transport error codes
|
2019-03-06 13:43:18 +09:00 |
|
Marten Seemann
|
59e9142426
|
retrieve the TLS alert from qtls when the handshake fails
|
2019-03-02 08:56:42 +09:00 |
|
Marten Seemann
|
d82a60c835
|
copy the GetConfigForClient callback when creating the qtls.Config
|
2019-02-22 14:34:28 +08:00 |
|
Marten Seemann
|
500717066e
|
use (a modified version of) the standard library TLS implementation
|
2019-02-22 13:33:56 +08:00 |
|
Marten Seemann
|
b24b8e6926
|
implement sending of post-handshake crypto messages
|
2019-02-06 23:05:43 +08:00 |
|
Marten Seemann
|
17f4ebad64
|
handle Retry packets in the session
|
2019-02-04 15:38:47 +08:00 |
|
Marten Seemann
|
2712626e66
|
move processing of transport parameters to the session
|
2019-02-02 09:24:37 +08:00 |
|
Marten Seemann
|
a95b7c2868
|
refactor how transport parameters are passed from the extension handler
|
2019-02-02 09:24:37 +08:00 |
|