1. 37d4ae1 In QUIC client with TLS versions, delay retransmission of 0-RTT packets until 1-RTT keys are available. by renjietang · 4 years, 10 months ago
  2. ac52a86 Add support for accepting 0-RTT in TlsServerHandshaker by nharper · 4 years, 10 months ago
  3. 5ab78c8 Add port field to ProofVerifier::VerifyCertChain by nharper · 4 years, 10 months ago
  4. e7b2cd8 For IETF QUIC client, Retransmit 0-RTT packets with 1-RTT key when 0-RTT is rejected. by renjietang · 4 years, 10 months ago
  5. ce663db Establish encryption on IETF QUIC client when 0-RTT key is available. by renjietang · 4 years, 10 months ago
  6. 2c4d833 Refactor TlsHandshaker interactions with the session's config by dschinazi · 4 years, 10 months ago
  7. 8aff71f In QUIC, when TLS 0-rtt is rejected, disable early data in all cached session tickets that are associated with that server. by renjietang · 4 years, 11 months ago
  8. d25cd65 Handle 0-RTT in TlsClientHandshaker by nharper · 4 years, 11 months ago
  9. 8b78f88 Allow TLS early data in non-IETF QUIC versions. by nharper · 4 years, 11 months ago
  10. 631f160 Add transport parameters to QuicConnectionDebugVisitor by dschinazi · 4 years, 11 months ago
  11. 7e51f6b Replace legacy Google-specific parameter with individual parameters by dschinazi · 4 years, 11 months ago
  12. bfc15ea In quic, avoid infinite loop in onhandshakepacketsent if discarding initial key causes connection close (and yet another handshake packet gets sent). client only, not protected. by fayang · 4 years, 11 months ago
  13. 1a391de Plumb HTTP/3 settings for client side 0-rtt setup. by renjietang · 5 years ago
  14. 92346b6 Let TlsClientHandshaker handle connection close during config negotiation. by renjietang · 5 years ago
  15. 4ff9ceb Set up session config from 0-rtt transport parameters. by renjietang · 5 years ago
  16. c31106b Modify QuicConfig::ProcessTranportParameters() to support client side 0-rtt resumption. by renjietang · 5 years ago
  17. e0f979c Require on-the-wire SNI to pass IsValidSNI check by nharper · 5 years ago
  18. a6a85a8 gfe-relnote: In QUIC with TLS, do not proceed in SetWriteSecret if connection has been closed. Protected by gfe2_reloadable_flag_quic_notify_handshaker_on_connection_close. by fayang · 5 years ago
  19. b5e1d5b gfe-relnote: Deprecate gfe2_restart_flag_quic_send_settings_on_write_key_available. by fayang · 5 years ago
  20. 44ae4e9 gfe-relnote: Let QUIC client drops initial key when a handshake packet has been sent. protected by existing gfe2_reloadable_flag_quic_enable_version_draft_25_v3 and gfe2_reloadable_flag_quic_enable_version_draft_27. by fayang · 5 years ago
  21. b5c6935 Make transport_params in SessionCache a const reference, because it should always be present. by renjietang · 5 years ago
  22. bcc066a In TlsClientHandshaker, only insert data into cache if all required states are present. by renjietang · 5 years ago
  23. be646e5 Check for nullptr before calling OnProofVerifyDetailsAvailable by nharper · 5 years ago
  24. 28e3a76 Upon receiving SETTINGS for a QuicSpdyClientSession, serialize the frame and cache it in tls_client_handshaker. by renjietang · 5 years ago
  25. aaaf1a4 Make PSK handshake fail with QUIC+TLS by dschinazi · 5 years ago
  26. 9b3cba4 Check for nullptr before calling OnProofVerifyDetailsAvailable by nharper · 5 years ago
  27. f21e385 Add code path to store application states in TlsClientHandshaker. by renjietang · 5 years ago
  28. cc12f43 store received TransportParamters in TlsClientHandshaker so that it could later be stored into the session cache. by renjietang · 5 years ago
  29. 0cc1b10 Modify QuicResumptionState and SessionCache to support multiple TLS sessions. by renjietang · 5 years ago
  30. a45ee8a gfe-relnote: In QUIC, send H3 SETTINGs once 1-RTT write key is available (instead of both keys are available). Protected by gfe2_restart_flag_quic_send_settings_on_write_key_available. by fayang · 5 years ago
  31. d18bfb9 gfe-relnote: Stop using SetDefaultEncryptionLevel in TLS handshake. Instead, use OnOneRttKeysAvailable. Refactor only, no functional change expected, not protected. by fayang · 5 years ago
  32. 7b8f0c7 Add support for draft-27 by dschinazi · 5 years ago
  33. 87df0d0 Change QuicStream::CloseConnectionWithDetails() to QuicStream::OnUnrecoverableError. by renjietang · 5 years ago
  34. bd33b62 Change name of TLS handshaker's delegate_ member to handshaker_delegate_. by renjietang · 5 years ago
  35. 4084fc9 Add methods to QuicCryptoClientStreamBase to replace num_sent_client_hellos by nharper · 5 years ago
  36. 2f2915d gfe-relnote: In QUIC, add OnOneRttPacketAckowledged to TLS handshaker, and this is used to allow client mark handshake confirmed when handshake done frame is not supported. Not affecting prod, not protected. by fayang · 5 years ago
  37. 0106294 gfe-relnote: In QUIC version T099, implement HANDSHAKE_DONE frame to drive the handshake to confirmation on the client side. Not used in prod yet. by fayang · 5 years ago
  38. f579b5e Refactor TlsServerHandshaker to implement QuicCryptoServerStreamBase directly by nharper · 5 years ago
  39. 80d3b17 Remove unused SSL_CTX* argument from TlsHandshaker c'tor by nharper · 5 years ago
  40. 9a863cf gfe-relnote: In QUIC, implement GetHandshakeState() in various handshakers. Not used yet, not protected. by fayang · 5 years ago
  41. 685367a gfe-relnote: In QUIC, rename handshake_confirmed in handshaker to one_rtt_keys_available to make it clearer and more informative. Renaming only, not protected. by fayang · 5 years ago
  42. 9001a96 gfe-relnote: Call SetDefaultEncryptionLevel after setting crypto_negotiated_params in TlsServerHandshaker and TlsClientHandshaker. Protected by disabled QUIC versions. by rch · 5 years ago
  43. cf0bfcf Use quiche string libraries in third_party/quic/core by dmcardle · 5 years ago
  44. 0f51d2e gfe-relnote: Allow no SNI in TLS QUIC handshake, protected by quic_enable_version_t0XX flags by nharper · 5 years ago
  45. d58736d gfe-relnote: Use HandshakerDelegateInterface in QUIC handshakers. Abstract keys installation, keys discarding, default encryption level change and mark handshake complete to HandshakerDelegateInterface. Protected by gfe2_reloadable_flag_quic_use_handshaker_delegate. by fayang · 5 years ago
  46. df7a77b gfe-relnote: Add SessionCache to TlsClientHandshaker, protected by reloadable flag quic_supports_tls_handshake by nharper · 5 years ago
  47. 0270396 Add IsResumption method to QUIC client handshakers by nharper · 5 years ago
  48. 18d5d24 gfe-relnote: Swap order of operations in TlsClientHandshaker::FinishHandshake. Protected by --quic_supports_tls_handshake by nharper · 5 years ago
  49. e158186 Remove unused CreateSslCtx methods from TlsHandshaker classes by nharper · 5 years ago
  50. d0dd47c Remove redundant calls to QuicSession::NeuterUnencryptedData(). by renjietang · 5 years ago
  51. 8f75992 gfe-relnote: Expose properties of TLS connection in quic::CryptoNegotiatedParameters. Protected by quic_supports_tls_handshake. by nharper · 5 years ago
  52. 40bdf53 Call ProofHandler::OnProofVerifyDetailsAvailable in TLS handshake in QUIC by nharper · 5 years ago
  53. ad7424f Implement QUIC ALPN selection on the server side. by vasilvv · 6 years ago
  54. 4724c9c Support session-specific ALPNs for clients, and specifying multiple ALPNs. by vasilvv · 6 years ago
  55. 486a8a9 Limit the amount of incoming crypto data that will be buffered. by nharper · 6 years ago
  56. bd79392 gfe-relnote: In TLS client handshaker, call OnHandshakeComplete when handshake is finished. Protected by existing FLAGS_quic_supports_tls_handshake. by fayang · 6 years ago
  57. ea71d6f Rename ENCRYPTION_REESTABLISHED to ENCRYPTION_ESTABLISHED as ENCRRYPTION_FIRST_ESTABLISHED has been removed. by renjietang · 6 years ago
  58. 8a72e4f gfe-relnote: Call QuicSession::OnCryptoHandshakeEvent in TLS handshake. Protected by quic_supports_tls_handshake. by nharper · 6 years ago
  59. 9145364 Make QUIC enforce ALPN when using TLS handshake by dschinazi · 6 years ago
  60. 6c84c14 Introduce IsConnectionIdLengthValidForVersion by dschinazi · 6 years ago
  61. 5c03085 Fix replacing connection IDs when initial crypters are in use by dschinazi · 6 years ago
  62. 24e7ae8 Fix QUIC version used when computing ALPN by dschinazi · 6 years ago
  63. 17d4242 Fix QUIC warnings in preparation for enabling them by dschinazi · 6 years ago
  64. 6ebe83b Refactor TlsHandshaker classes by nharper · 6 years ago
  65. 6153bc7 gfe-relnote: Remove client-side support for Channel ID from QUIC. Not flag protected. by nharper · 6 years ago
  66. 38c190b Add arguments to ProofVerifier::VerifyCertChain for stapled OCSP response and SignedCertificateTimestampList. by QUICHE team · 6 years ago
  67. 6cf4d2a Update QUIC transport parameters to draft 20 by dschinazi · 6 years ago
  68. 546cc45 Add new methods to QuicFramer for controlling decrypters by zhongyi · 6 years ago
  69. 9e84364 Automated g4 rollback of changelist 242988047. by zhongyi · 6 years ago
  70. d4b308e Add new methods to QuicFramer for controlling decrypters by dschinazi · 6 years ago
  71. a396ef6 Internal QUICHE change by ianswett · 6 years ago
  72. fbda215 Add new methods to QuicFramer for controlling decrypters by nharper · 6 years ago
  73. 35e749e Add ALPN to QUIC when using TLS by dschinazi · 6 years ago
  74. d1967a2 Gracefully handle missing Google-specific transport parameters when using TLS by dschinazi · 6 years ago
  75. 6987b4a Rename ENCRYPTION_NONE to ENCRYPTION_INITIAL by QUICHE team · 6 years ago
  76. 872e7a3 Remove QuicString wrapper for std::string by vasilvv · 6 years ago
  77. c48c871 Replace QuicString with std::string, pass 1 by vasilvv · 6 years ago
  78. a6ef0a6 Project import generated by Copybara. by QUICHE team · 6 years ago