Marten Seemann
870fbe7ab0
migrate to Ginkgo v2
2022-10-11 16:38:44 +04:00
Marten Seemann
f10d4bd8f7
add key derivation paths for QUIC v2
2022-05-25 16:12:09 +02:00
Marten Seemann
599d181316
use tls.CipherSuiteName, instead of wrapping it in the qtls package
2021-05-10 20:41:21 -07:00
Marten Seemann
95334202c5
fix decoding of packet numbers in different packet number spaces
...
When QUIC abandoned the "stream 0" design, it introduced separate
packet number spaces for packets with different encryption levels.
Packet number compression now also works per packet number space.
The current code doesn't lead to any problems if the peer starts sending
with packet number 0, as we only exchange a few packets in the Initial
and the Handshake packet number space and there's nothing to compress.
It might lead to problems if the peer starts with a large packet number
in one space (which is allowed by the spec), and then starts with a
small packet number in another packet number space.
2020-12-03 23:35:27 +07:00
Marten Seemann
977dbc828c
move all dependencies on qtls to a separate package
2020-08-18 14:26:23 +07:00
Marten Seemann
012e62112d
drop support for Go 1.13
2020-06-25 15:44:50 +07:00
Marten Seemann
97e191f3b4
update the ChaCha implementation, remove 0xffffffff workaround
2020-04-24 10:18:41 +07:00
Marten Seemann
3ac2fb3161
make quic-go build with both Go 1.13 and 1.14
2020-04-09 07:51:18 +07:00
Marten Seemann
114a790fd9
use the CipherSuiteName function exposed by qtls
...
This function was recently added to the standard library TLS
implementation.
2020-03-01 13:15:54 +07:00
Marten Seemann
f61f251fce
implement correct dropping of Initial keys
2019-11-04 13:33:17 +07:00
Marten Seemann
de3e1a3de5
log the cipher suite
2019-09-07 11:47:21 +07:00
Marten Seemann
fa89ec345a
add support for ChaCha20 header protection
2019-09-07 11:36:50 +07:00
Marten Seemann
33b74fca79
use the new qtls SetWriteKey and SetReadKey interface
2019-09-07 11:36:06 +07:00
Marten Seemann
63c079e234
move header protection to a separate struct
2019-09-07 11:32:48 +07:00
Marten Seemann
c522bcc683
return a defined error when the AEAD cannot open a packet
2019-06-22 20:01:18 +08:00
Marten Seemann
0dd5a0b91f
introduce a separate AEAD for short header crypto
2019-06-22 20:01:18 +08:00
Marten Seemann
598628d05b
use separate opener interfaces for long and short header packets
2019-06-22 20:01:18 +08:00
Marten Seemann
b2d3ef691e
use separate sealer interfaces for long and short header packets
2019-06-22 20:01:18 +08:00
Marten Seemann
b4356d7348
fix nonce usage in the AEAD, use the AEAD provided by qtls for Initials
2019-01-07 09:04:03 +07:00
Marten Seemann
5a68ba0a02
implement header encrytion and decryption for sealers and openers
2018-12-14 16:46:40 +06:30
Marten Seemann
82508f1562
use tls-tris instead of mint
2018-10-26 16:18:49 +07:00