Commit Graph

922 Commits

Author SHA1 Message Date
Marten Seemann
c809166cab update gomock, simplify script for generation mocks of private types 2020-01-26 12:53:41 +07:00
Marten Seemann
20e222b399 Merge pull request #2305 from lucas-clemente/update-retry-key
update Retry key and nonce to the values used in draft-25
2020-01-24 20:13:21 +07:00
Marten Seemann
5ee0c2c5cf Merge pull request #2306 from lucas-clemente/congestion-controller-packet-size
change the packet size the congestion controller uses
2020-01-24 20:12:05 +07:00
Marten Seemann
3446946217 add a unit test using the test vector from the draft 2020-01-24 10:20:23 +07:00
Marten Seemann
281fb1d0b8 use actually used datagram size for congestion controller calculations 2020-01-22 15:04:03 +07:00
Marten Seemann
d4de582fad rename defaultTCPMSS to maxDatagramSize 2020-01-22 14:54:05 +07:00
Marten Seemann
31e4691ffd move congestion controller related constants to the congestion package 2020-01-22 14:40:14 +07:00
Marten Seemann
52f9811046 update Retry key and nonce to the values used in draft-25 2020-01-22 10:51:32 +07:00
Marten Seemann
6f347233e2 update the name of the disable_active_migration transport parameter 2020-01-21 15:05:12 +07:00
Marten Seemann
5a566f2176 Merge pull request #2226 from lucas-clemente/retry-integrity
implement the retry integrity tag
2020-01-17 17:19:15 +07:00
Marten Seemann
3568c41343 Merge pull request #2302 from lucas-clemente/smaller-session-tickets
only save transport parameters to session ticket when using 0-RTT
2020-01-17 17:01:45 +07:00
Marten Seemann
3e469db631 protect the AEAD calculating the integrity tag by a mutex 2020-01-17 14:01:12 +07:00
Marten Seemann
7b10453af8 implement the Retry integrity tag 2020-01-17 13:42:57 +07:00
Marten Seemann
9ea9c7947f implement calculation of the retry integrity tag 2020-01-17 13:42:57 +07:00
Marten Seemann
080b61d271 only save transport parameters to session ticket when using 0-RTT 2020-01-17 10:50:27 +07:00
Marten Seemann
b1f8b8f25d increase the maximum congestion window to 10000 packets 2020-01-14 16:34:34 +07:00
Marten Seemann
4ab4b8004a Merge pull request #2274 from lucas-clemente/log-0-rtt-key-install
log when 0-RTT keys become available
2020-01-06 17:43:14 +07:00
Marten Seemann
a1840b3221 fix unmarshaling of transport parameters from session tickets 2020-01-02 15:12:32 +08:00
Marten Seemann
81831049c9 log when 0-RTT keys become available 2020-01-02 15:10:43 +08:00
Marten Seemann
052508e8c2 add a version to marshaled transport parameters in the session ticket 2020-01-01 18:04:02 +04:00
Marten Seemann
951477af92 queue 0-RTT packets for retransmission after receiving a Retry 2020-01-01 18:04:02 +04:00
Marten Seemann
22abcfe6fb drop 0-RTT write keys when receiving the 1-RTT keys 2020-01-01 18:04:02 +04:00
Marten Seemann
40a993e31c check that the client doesn't switch back to 0-RTT after sending 1-RTT 2020-01-01 18:04:02 +04:00
Marten Seemann
44aa12850e restore the server's transport parameters from the session ticket 2020-01-01 18:04:02 +04:00
Marten Seemann
1f8a47af02 implement a ClientSessionCache that can save application data 2020-01-01 18:04:02 +04:00
Marten Seemann
9b0a4a8813 move unmarshaling of the transport parameters to the crypto setup 2020-01-01 18:04:01 +04:00
Marten Seemann
c5f74595ca receive 0-RTT sealers and openers from qtls when using 0-RTT 2019-12-30 18:39:21 +04:00
Marten Seemann
a9f4195fd0 check that transport params didn't change when accepting 2019-12-30 18:39:21 +04:00
Marten Seemann
ed0f426943 implement marshalling of transport parameters for the session ticket
When using 0-RTT, the client will reuse the transport parameters from
the last session. The server therefore needs to make sure that the
transport parameters haven't been changed in the mean time. To do so, it
encodes the transport parameters into the session ticket.
2019-12-30 18:39:21 +04:00
Marten Seemann
0b65a0c75e don't drop Handshake keys when receiving an ACK for a 0-RTT packet 2019-12-30 18:39:21 +04:00
Marten Seemann
d6b50cf15a use the same packet number space for received 0-RTT and 1-RTT packets 2019-12-30 18:39:21 +04:00
Marten Seemann
b25b2f6921 use the same packet number space for sent 0-RTT and 1-RTT packets 2019-12-30 18:39:21 +04:00
Marten Seemann
b0c08b1bd0 implement rules for frame types in 0-RTT packets 2019-12-30 18:39:21 +04:00
Marten Seemann
b1fc984306 add a 0-RTT encryption level 2019-12-30 18:39:21 +04:00
Marten Seemann
5acdc55c61 Merge pull request #2252 from lucas-clemente/enforce-cid-limit
enfore the active_connection_id_limit
2019-12-18 10:12:14 +04:00
Marten Seemann
355156ac4e Merge pull request #2225 from lucas-clemente/handshake-done
implement the HANDSHAKE_DONE mechanism
2019-12-18 10:07:43 +04:00
Marten Seemann
2828fbc1af Merge pull request #2265 from lucas-clemente/max-idle-timeout
use the minimum of the peers' max_idle_timeout for the idle timeout
2019-12-18 10:05:33 +04:00
Marten Seemann
27549c5665 use the minimum of the two peers' max_idle_timeouts 2019-12-11 14:04:33 +04:00
Marten Seemann
be59be9ef1 use the parsed header length when unpacking packets 2019-12-09 15:42:37 +08:00
Marten Seemann
490d9ddab2 refactor parsing of headers with invalid reserved bits 2019-12-09 14:57:19 +08:00
Marten Seemann
12922bdec9 drop Handshake keys when receiving HANDSHAKE_DONE (as a client) 2019-12-06 10:29:48 +07:00
Marten Seemann
f7fd5d2848 drop Handshake keys as soon as the handshake completes (as a server) 2019-12-06 10:29:48 +07:00
Marten Seemann
556e5c5559 implement parsing and writing of the HANDSHAKE_DONE frame 2019-12-06 10:29:48 +07:00
Marten Seemann
f35a32989c enforce the active_connection_id_limit 2019-12-03 18:27:10 +07:00
Marten Seemann
02acf81ca1 remove the VERSION_NEGOTIATION_ERROR 2019-12-03 17:45:08 +07:00
Marten Seemann
d771650640 implement marshaling and unmarshaling of the preferred_address 2019-11-30 19:56:05 +07:00
Marten Seemann
7fbf5397df fix activeConnectionIDLimitParameterID variable name 2019-11-27 13:17:05 +07:00
Marten Seemann
1b063a47eb Merge pull request #2247 from lucas-clemente/improve-undecryptable-packet-logging
improve logging of undecryptable packets
2019-11-25 18:46:20 +07:00
Marten Seemann
78029adfb2 improve logging of undecryptable packets 2019-11-25 14:06:44 +07:00
Marten Seemann
d0a3eaa8a3 improve logging of handshake messages 2019-11-25 09:09:34 +07:00