You need to sign in or sign up before continuing.
- May 03, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- May 01, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Apr 29, 2020
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
- Apr 26, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Apr 24, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Apr 19, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Apr 04, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Apr 02, 2020
-
-
Tatsuhiro Tsujikawa authored
Round up cwnd left to the maximum UDP packet size to avoid small packet.
-
- Mar 29, 2020
-
-
Tatsuhiro Tsujikawa authored
This commit separates key installation function into 2 and let TLS stack install rx and tx keys separately for handshake and 1RTT keys. This change is aligned to the new BoringSSL API and GnuTLS API. I expect that OpenSSL will follow this change. It also removes side argument from crypto API if it can be inferred by ngtcp2_conn_is_server.
-
- Mar 24, 2020
-
-
Tatsuhiro Tsujikawa authored
Fixes #224
-
- Mar 22, 2020
-
-
Tatsuhiro Tsujikawa authored
This commit adds special handling for the very first Initial packet which is corrupted and discarded. If server receives such packet, it has to drop connection silently without sending any CONNECTION_CLOSE. Then valid packet might come later. Keeping connection state is harmful because corrupted packet has wrong SCID, which drops later valid packet because mismatched SCID. New error code NGTCP2_ERR_DROP_CONN is added which tells server application to drop connection silently.
-
- Mar 14, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Mar 12, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Mar 08, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Mar 03, 2020
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
Remove conn and user_data from encrypt/decrypt/hp_mask callbacks so that they can be used without conn.
-
- Feb 28, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Feb 16, 2020
-
-
Tatsuhiro Tsujikawa authored
Bring back the processing of Handshake packets. Doing so can reset idle timer and reset PTO count which is useful to deal with packet loss during handshake.
-
- Feb 08, 2020
-
-
Tatsuhiro Tsujikawa authored
Now server can perform path validation without chaining DCID if a remote peer does not change DCID as per spec.
-
- Jan 29, 2020
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
Coalesces Initial and Handshake from server on probe. Include occasional PING in non-ACK eliciting packets.
-
- Jan 28, 2020
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
Major rework of loss detection mechanism. It turned out getting it done is very hard.
-
- Jan 26, 2020
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
- Jan 25, 2020
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
It now defaults to 2 and includes CID exchanged during handshake.
-
- Jan 23, 2020
-
-
Tatsuhiro Tsujikawa authored
The changed semantics will be implemented in the later commits.
-
- Jan 09, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Jan 05, 2020
-
-
Tatsuhiro Tsujikawa authored
-
- Dec 18, 2019
-
-
Tatsuhiro Tsujikawa authored
-
- Nov 30, 2019
-
-
Amir Livneh authored
write_single_frame_pkt() returns a packet length greater than the number of bytes it writes to the buffer. The returned length reflects a fake AEAD overhead, while this extra overhead is never written. As a result, ngtcp2_verify_stateless_reset_token() uses initialized data when reading the end of the packet. This causes noise when using a memory sanitizer.
-
- Nov 20, 2019
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-