Marten Seemann
f7e05c3158
drop Initial packets that have a too short Destination Connection ID
2018-06-16 21:15:46 +07:00
Marten Seemann
3e03055a7d
use varint packet numbers in IETF QUIC headers
2018-06-06 16:07:47 +02:00
Marten Seemann
d7dee33bc7
change the source connection ID when creating a new IETF QUIC session
2018-05-30 21:37:05 +08:00
Marten Seemann
733e2e952b
use callbacks for signaling the session status
...
Instead of exposing a session.handshakeStatus() <-chan error, it's
easier to pass a callback to the session which is called when the
handshake is done.
The removeConnectionID callback is in preparation for IETF QUIC, where a
connection can have multiple connection IDs over its lifetime.
2018-05-29 21:27:08 +08:00
Marten Seemann
372463db49
don't pass the client's version to the header parser
2018-05-21 11:27:15 +08:00
Marten Seemann
a7f550ae0f
set the payload length on Long Headers when packing packets
2018-04-23 17:41:07 +09:00
Marten Seemann
fae32101a0
use different source and destination connection IDs
2018-04-23 15:23:01 +09:00
Marten Seemann
52d31dd7ef
implement the new header format
...
Currently, we're only sending and accepting packets with matching source
and destination connection IDs.
2018-04-19 13:46:54 +09:00
Marten Seemann
1a035a265c
change the type of Connection ID to byte slice
2018-04-18 22:41:24 +09:00
Marten Seemann
948eef3e42
create a logger interface and use it everywhere
2018-04-04 13:03:28 +07:00
Marten Seemann
be066e825c
privatize the frame parsing functions
2018-03-25 18:07:49 +02:00
Marten Seemann
51b6ff0af5
only accept one TLS sessions for the same connection ID
2018-02-06 12:44:06 +08:00
Marten Seemann
d671cf134c
don't force clients to use tls.Config.InsecureSkipVerify when using mint
...
mint recently implemented certificate verification.
This reverts commit d76f5a839c
.
2018-02-02 08:18:29 +08:00
Marten Seemann
d76f5a839c
force clients to set tls.Config.InsecureSkipVerify when using mint
...
mint doesn't verify the certificate chain. This change forces users of
quic-go to acknowledge mint's insecure behavior by explicitely setting
InsecureSkipVerify.
2018-01-26 21:31:44 +11:00
Marten Seemann
32d440728c
send CONNECTION_CLOSEs from the stateless server
...
If an error occurs after a packet was successfully unpacked, we should
send a CONNECTION_CLOSE.
2018-01-09 17:17:54 +07:00
Marten Seemann
ef89e7aa17
drop Initial packets that don't fulfill the min size requirement
2017-12-08 12:37:04 +07:00
Marten Seemann
25a6dc9654
implement stateless handling of Initial packets for the TLS server
2017-12-08 08:45:54 +07:00