#
b6461792 |
| 20-Mar-2024 |
Richard Levitte |
Copyright year updates Reviewed-by: Neil Horman <nhorman@openssl.org> Release: yes (cherry picked from commit 0ce7d1f355c1240653e320a3f6f8109c1f05f8c0) Reviewed-by: Hugo Lan
Copyright year updates Reviewed-by: Neil Horman <nhorman@openssl.org> Release: yes (cherry picked from commit 0ce7d1f355c1240653e320a3f6f8109c1f05f8c0) Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24034)
show more ...
|
#
285a76bd |
| 08-Sep-2023 |
Hugo Landau |
QLOG: Wiring: QUIC QRX: Report the datagram ID from the DEMUX Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.
QLOG: Wiring: QUIC QRX: Report the datagram ID from the DEMUX Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22037)
show more ...
|
#
b71046b4 |
| 08-Dec-2023 |
Hugo Landau |
Minor updates Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22674)
|
#
ef95d8dd |
| 09-Nov-2023 |
Hugo Landau |
QUIC QRX: Remove legacy DEMUX-QRX routing code Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openss
QUIC QRX: Remove legacy DEMUX-QRX routing code Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22674)
show more ...
|
#
d743afe7 |
| 09-Nov-2023 |
Hugo Landau |
QUIC DEMUX: Allow parsed DCID to be learnt in default packet handler Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://git
QUIC DEMUX: Allow parsed DCID to be learnt in default packet handler Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22674)
show more ...
|
#
86e11b1e |
| 20-Oct-2023 |
Matt Caswell |
When requeueing deferred URXEs retain the order If a URXE cannot be processed yet then we add it to the urx_deferred list. Later, when they can be processed, we requeue them in the urx_p
When requeueing deferred URXEs retain the order If a URXE cannot be processed yet then we add it to the urx_deferred list. Later, when they can be processed, we requeue them in the urx_pending list. We must not reverse the order when doing so. We want to process the URXEs in the order that they were received. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Todd Short <todd.short@me.com> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22452)
show more ...
|
#
1f8a8c1d |
| 12-Oct-2023 |
Matt Caswell |
Fix a use-after-free in qrx_proces_pkt When calling qrx_relocate_buffer, both the rxe and the pointer to the token may be changing locations. We have to use a temporary copy of the token
Fix a use-after-free in qrx_proces_pkt When calling qrx_relocate_buffer, both the rxe and the pointer to the token may be changing locations. We have to use a temporary copy of the token pointer to avoid referencing the old location of the rxe. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22368)
show more ...
|
#
5415383d |
| 06-Oct-2023 |
Matt Caswell |
Don't encrypt/decrypt packet data during fuzzing Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/op
Don't encrypt/decrypt packet data during fuzzing Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22368)
show more ...
|
#
da1c088f |
| 07-Sep-2023 |
Matt Caswell |
Copyright year updates Reviewed-by: Richard Levitte <levitte@openssl.org> Release: yes
|
#
413a427c |
| 17-Aug-2023 |
Hugo Landau |
QUIC QRX: Initialise all RXE fields properly for non-encrypted packets Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://g
QUIC QRX: Initialise all RXE fields properly for non-encrypted packets Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21764)
show more ...
|
#
89b0948e |
| 28-Jul-2023 |
Hugo Landau |
QUIC CHANNEL: Tune RXFC default parameters Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pu
QUIC CHANNEL: Tune RXFC default parameters Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21565)
show more ...
|
#
b538ae4f |
| 27-Jul-2023 |
Hugo Landau |
QUIC QRX: Handle negative IV length values correctly (coverity) Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.c
QUIC QRX: Handle negative IV length values correctly (coverity) Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21565)
show more ...
|
#
2a6f1f2f |
| 25-Jul-2023 |
Hugo Landau |
QUIC QRX: Don't process 1-RTT packets until handshake is complete Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github
QUIC QRX: Don't process 1-RTT packets until handshake is complete Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21547)
show more ...
|
#
0c1cc36b |
| 25-Jul-2023 |
Hugo Landau |
QUIC QRX: Enforce PN monotonicity with key updates Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/op
QUIC QRX: Enforce PN monotonicity with key updates Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21547)
show more ...
|
#
d11b901b |
| 18-Jul-2023 |
Pauli |
trivial code nit Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21429)
|
#
dfe5e7fa |
| 06-Jun-2023 |
Hugo Landau |
QUIC CONFORMANCE: RFC 9000 s. 12.3: PN duplicate suppression Make sure PN duplicate suppression is side-channel safe by doing the duplicate test after AEAD verification. Reviewe
QUIC CONFORMANCE: RFC 9000 s. 12.3: PN duplicate suppression Make sure PN duplicate suppression is side-channel safe by doing the duplicate test after AEAD verification. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21135)
show more ...
|
#
692a3cab |
| 12-Jun-2023 |
Hugo Landau |
QUIC: Minor fixups Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github
QUIC: Minor fixups Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21029)
show more ...
|
#
754d2282 |
| 23-May-2023 |
Hugo Landau |
QUIC RX: Support reporting the key epoch a packet was received with This is needed to support key update validation on the receive side. Reviewed-by: Tomas Mraz <tomas@openssl.org>
QUIC RX: Support reporting the key epoch a packet was received with This is needed to support key update validation on the receive side. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21029)
show more ...
|
#
256eee3f |
| 23-May-2023 |
Hugo Landau |
QUIC RX: Refactor key update callback to provide PN Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org
QUIC RX: Refactor key update callback to provide PN Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21029)
show more ...
|
#
c2786c8e |
| 22-May-2023 |
Matt Caswell |
Rename msg_callback_s to msg_callback_ssl for greater clarity Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.c
Rename msg_callback_s to msg_callback_ssl for greater clarity Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20914)
show more ...
|
#
5cf99b40 |
| 18-May-2023 |
Matt Caswell |
Create setter functions for the msg_callback and msg_callback_arg We create setter functions for the msg_callback and msg_callback_arg so that these values can be properly propagated to
Create setter functions for the msg_callback and msg_callback_arg We create setter functions for the msg_callback and msg_callback_arg so that these values can be properly propagated to the QRX/QTX/TXP even after the channel has been created. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20914)
show more ...
|
#
e8528c95 |
| 05-May-2023 |
Matt Caswell |
Enable tracing of packets that have been sent Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/opens
Enable tracing of packets that have been sent Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20914)
show more ...
|
#
70f0ea28 |
| 04-May-2023 |
Matt Caswell |
Support trace for QUIC Frames Extend the existing QUIC tracing capability for frames. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org>
Support trace for QUIC Frames Extend the existing QUIC tracing capability for frames. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20914)
show more ...
|
#
2a35a1be |
| 04-May-2023 |
Matt Caswell |
Support trace for QUIC Packets We enable SSL_trace support for when we receive QUIC Packets. This is called after header protection is removed, but before the packet is decrypted.
Support trace for QUIC Packets We enable SSL_trace support for when we receive QUIC Packets. This is called after header protection is removed, but before the packet is decrypted. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20914)
show more ...
|
#
45aac107 |
| 02-May-2023 |
Matt Caswell |
Support trace for QUIC datagrams Extend SSL_trace so that it knows how to dump information about the receipt of a QUIC datagram. Reviewed-by: Tomas Mraz <tomas@openssl.org>
Support trace for QUIC datagrams Extend SSL_trace so that it knows how to dump information about the receipt of a QUIC datagram. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/20914)
show more ...
|