6292519c | 17-Nov-2022 |
Hugo Landau |
QUIC: Enable building with QUIC support disabled Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/open
QUIC: Enable building with QUIC support disabled Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
44019a69 | 17-Nov-2022 |
Hugo Landau |
QUIC: make update Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703) |
b940f943 | 17-Nov-2022 |
Hugo Landau |
QUIC: Temporarily disable front-end API tests Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl
QUIC: Temporarily disable front-end API tests Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
6a800198 | 17-Nov-2022 |
Hugo Landau |
QUIC: Remove RX depacketiser tests from QRL test suite These create significant coupling between the QRL tests and the RXDP. Moreover, the RXDP has no state of its own and is implemented
QUIC: Remove RX depacketiser tests from QRL test suite These create significant coupling between the QRL tests and the RXDP. Moreover, the RXDP has no state of its own and is implemented as part of the QUIC_CHANNEL, ergo it doesn't make that much sense to test it in isolation. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
03bacce8 | 17-Nov-2022 |
Hugo Landau |
QUIC Front-End I/O API: Wire up the SSL API functions Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl
QUIC Front-End I/O API: Wire up the SSL API functions Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
22d53c88 | 17-Nov-2022 |
Hugo Landau |
QUIC Front-End I/O API Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703) |
8c94cf38 | 17-Nov-2022 |
Hugo Landau |
internal/sockets.h: Add support for testing EINTR portably Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/op
internal/sockets.h: Add support for testing EINTR portably Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
198d97c1 | 17-Nov-2022 |
Hugo Landau |
QUIC: Add miscellaneous QUIC constants Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1
QUIC: Add miscellaneous QUIC constants Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
cbe7f586 | 17-Nov-2022 |
Hugo Landau |
QUIC Stream Mapper: CSM-related changes, stream limits handling Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.c
QUIC Stream Mapper: CSM-related changes, stream limits handling Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
3a37c923 | 17-Nov-2022 |
Hugo Landau |
QUIC: Complete the implementation of the RX depacketiser in terms of QUIC_CHANNEL Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged fro
QUIC: Complete the implementation of the RX depacketiser in terms of QUIC_CHANNEL Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
f538b421 | 17-Nov-2022 |
Hugo Landau |
QUIC_CHANNEL: Implementation Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703) |
69523214 | 17-Nov-2022 |
Hugo Landau |
QUIC: Add QUIC reactor Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703) |
68801bcb | 17-Nov-2022 |
Hugo Landau |
Add BIO poll descriptors Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703) |
4ed9e0a1 | 01-Nov-2022 |
Hugo Landau |
QUIC ACKM: Add function to get PTO Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703) |
27003aa6 | 01-Nov-2022 |
Hugo Landau |
QUIC RXDP: Remove non-actionable TODOs Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1
QUIC RXDP: Remove non-actionable TODOs Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
c572bed9 | 14-Nov-2022 |
Hugo Landau |
QUIC CSM: Documentation for new APIs Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/197
QUIC CSM: Documentation for new APIs Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
a64d8248 | 17-Nov-2022 |
Hugo Landau |
QUIC Transport Parameters: Add CID encoder/decoder, make ID optional Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://git
QUIC Transport Parameters: Add CID encoder/decoder, make ID optional Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
0f7b5cc9 | 03-Nov-2022 |
Hugo Landau |
QUIC RX: Refactor unsafe DCID consistency checking Previously, we enforced the requirement that the DCIDs be the same for all packets in a datagram by keeping a pointer to the first RXE
QUIC RX: Refactor unsafe DCID consistency checking Previously, we enforced the requirement that the DCIDs be the same for all packets in a datagram by keeping a pointer to the first RXE generated from a datagram. This is unsafe and could lead to a UAF if the first packet is malformed, meaning that no RXE ended up being generated from it. Keep track of the DCID directly instead, as we should enforce this correctly even if the first packet in a datagram is malformed (but has an intelligible header with a DCID and length). Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
7d7a8d41 | 02-Nov-2022 |
Hugo Landau |
Remove duplicate declaration Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703) |
16b220dd | 17-Nov-2022 |
Hugo Landau |
internal/sockets.h: Ensure errno.h included when necessary Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/op
internal/sockets.h: Ensure errno.h included when necessary Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
462d81dd | 17-Nov-2022 |
Hugo Landau |
QUIC Dummy Handshake Layer: Allow transport parameters to be set later Server mode not implemented yet. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <ma
QUIC Dummy Handshake Layer: Allow transport parameters to be set later Server mode not implemented yet. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
cda88baf | 31-Oct-2022 |
Hugo Landau |
QUIC TXP: Don't send STREAM frames until handshake is complete Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.co
QUIC TXP: Don't send STREAM frames until handshake is complete Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
df038685 | 31-Oct-2022 |
Hugo Landau |
QUIC TXP: Make discard_enc_level match documentation The documentation in the header file of the TXP stated that it is the caller's responsibility to also notify the QTX of a discarded E
QUIC TXP: Make discard_enc_level match documentation The documentation in the header file of the TXP stated that it is the caller's responsibility to also notify the QTX of a discarded EL. However, the implementation did not reflect this. Update the implementation to reflect the intended design. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
04e5226f | 31-Oct-2022 |
Hugo Landau |
QUIC TXP: Add a function to query if the TXP wants to generate a packet For use by QUIC CSM. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.
QUIC TXP: Add a function to query if the TXP wants to generate a packet For use by QUIC CSM. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|
b2c94b93 | 31-Oct-2022 |
Hugo Landau |
QUIC Record Layer: Allow INITIAL EL to be rekeyed Ordinarily we should not allow ELs to be rekeyed as it makes no sense to do so. However the INITIAL EL can need to be rekeyed if a conne
QUIC Record Layer: Allow INITIAL EL to be rekeyed Ordinarily we should not allow ELs to be rekeyed as it makes no sense to do so. However the INITIAL EL can need to be rekeyed if a connection retry occurs. Modify the QRL to allow this. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/19703)
show more ...
|