- 37d4ae1 In QUIC client with TLS versions, delay retransmission of 0-RTT packets until 1-RTT keys are available. by renjietang · 4 years, 10 months ago
- ac52a86 Add support for accepting 0-RTT in TlsServerHandshaker by nharper · 4 years, 10 months ago
- 5ab78c8 Add port field to ProofVerifier::VerifyCertChain by nharper · 4 years, 10 months ago
- e7b2cd8 For IETF QUIC client, Retransmit 0-RTT packets with 1-RTT key when 0-RTT is rejected. by renjietang · 4 years, 10 months ago
- ce663db Establish encryption on IETF QUIC client when 0-RTT key is available. by renjietang · 4 years, 10 months ago
- 2c4d833 Refactor TlsHandshaker interactions with the session's config by dschinazi · 4 years, 10 months ago
- 8aff71f In QUIC, when TLS 0-rtt is rejected, disable early data in all cached session tickets that are associated with that server. by renjietang · 4 years, 11 months ago
- d25cd65 Handle 0-RTT in TlsClientHandshaker by nharper · 4 years, 11 months ago
- 8b78f88 Allow TLS early data in non-IETF QUIC versions. by nharper · 4 years, 11 months ago
- 631f160 Add transport parameters to QuicConnectionDebugVisitor by dschinazi · 4 years, 11 months ago
- 7e51f6b Replace legacy Google-specific parameter with individual parameters by dschinazi · 4 years, 11 months ago
- bfc15ea In quic, avoid infinite loop in onhandshakepacketsent if discarding initial key causes connection close (and yet another handshake packet gets sent). client only, not protected. by fayang · 4 years, 11 months ago
- 1a391de Plumb HTTP/3 settings for client side 0-rtt setup. by renjietang · 5 years ago
- 92346b6 Let TlsClientHandshaker handle connection close during config negotiation. by renjietang · 5 years ago
- 4ff9ceb Set up session config from 0-rtt transport parameters. by renjietang · 5 years ago
- c31106b Modify QuicConfig::ProcessTranportParameters() to support client side 0-rtt resumption. by renjietang · 5 years ago
- e0f979c Require on-the-wire SNI to pass IsValidSNI check by nharper · 5 years ago
- a6a85a8 gfe-relnote: In QUIC with TLS, do not proceed in SetWriteSecret if connection has been closed. Protected by gfe2_reloadable_flag_quic_notify_handshaker_on_connection_close. by fayang · 5 years ago
- b5e1d5b gfe-relnote: Deprecate gfe2_restart_flag_quic_send_settings_on_write_key_available. by fayang · 5 years ago
- 44ae4e9 gfe-relnote: Let QUIC client drops initial key when a handshake packet has been sent. protected by existing gfe2_reloadable_flag_quic_enable_version_draft_25_v3 and gfe2_reloadable_flag_quic_enable_version_draft_27. by fayang · 5 years ago
- b5c6935 Make transport_params in SessionCache a const reference, because it should always be present. by renjietang · 5 years ago
- bcc066a In TlsClientHandshaker, only insert data into cache if all required states are present. by renjietang · 5 years ago
- be646e5 Check for nullptr before calling OnProofVerifyDetailsAvailable by nharper · 5 years ago
- 28e3a76 Upon receiving SETTINGS for a QuicSpdyClientSession, serialize the frame and cache it in tls_client_handshaker. by renjietang · 5 years ago
- aaaf1a4 Make PSK handshake fail with QUIC+TLS by dschinazi · 5 years ago
- 9b3cba4 Check for nullptr before calling OnProofVerifyDetailsAvailable by nharper · 5 years ago
- f21e385 Add code path to store application states in TlsClientHandshaker. by renjietang · 5 years ago
- cc12f43 store received TransportParamters in TlsClientHandshaker so that it could later be stored into the session cache. by renjietang · 5 years ago
- 0cc1b10 Modify QuicResumptionState and SessionCache to support multiple TLS sessions. by renjietang · 5 years ago
- a45ee8a gfe-relnote: In QUIC, send H3 SETTINGs once 1-RTT write key is available (instead of both keys are available). Protected by gfe2_restart_flag_quic_send_settings_on_write_key_available. by fayang · 5 years ago
- d18bfb9 gfe-relnote: Stop using SetDefaultEncryptionLevel in TLS handshake. Instead, use OnOneRttKeysAvailable. Refactor only, no functional change expected, not protected. by fayang · 5 years ago
- 7b8f0c7 Add support for draft-27 by dschinazi · 5 years ago
- 87df0d0 Change QuicStream::CloseConnectionWithDetails() to QuicStream::OnUnrecoverableError. by renjietang · 5 years ago
- bd33b62 Change name of TLS handshaker's delegate_ member to handshaker_delegate_. by renjietang · 5 years ago
- 4084fc9 Add methods to QuicCryptoClientStreamBase to replace num_sent_client_hellos by nharper · 5 years ago
- 2f2915d gfe-relnote: In QUIC, add OnOneRttPacketAckowledged to TLS handshaker, and this is used to allow client mark handshake confirmed when handshake done frame is not supported. Not affecting prod, not protected. by fayang · 5 years ago
- 0106294 gfe-relnote: In QUIC version T099, implement HANDSHAKE_DONE frame to drive the handshake to confirmation on the client side. Not used in prod yet. by fayang · 5 years ago
- f579b5e Refactor TlsServerHandshaker to implement QuicCryptoServerStreamBase directly by nharper · 5 years ago
- 80d3b17 Remove unused SSL_CTX* argument from TlsHandshaker c'tor by nharper · 5 years ago
- 9a863cf gfe-relnote: In QUIC, implement GetHandshakeState() in various handshakers. Not used yet, not protected. by fayang · 5 years ago
- 685367a gfe-relnote: In QUIC, rename handshake_confirmed in handshaker to one_rtt_keys_available to make it clearer and more informative. Renaming only, not protected. by fayang · 5 years ago
- 9001a96 gfe-relnote: Call SetDefaultEncryptionLevel after setting crypto_negotiated_params in TlsServerHandshaker and TlsClientHandshaker. Protected by disabled QUIC versions. by rch · 5 years ago
- cf0bfcf Use quiche string libraries in third_party/quic/core by dmcardle · 5 years ago
- 0f51d2e gfe-relnote: Allow no SNI in TLS QUIC handshake, protected by quic_enable_version_t0XX flags by nharper · 5 years ago
- d58736d gfe-relnote: Use HandshakerDelegateInterface in QUIC handshakers. Abstract keys installation, keys discarding, default encryption level change and mark handshake complete to HandshakerDelegateInterface. Protected by gfe2_reloadable_flag_quic_use_handshaker_delegate. by fayang · 5 years ago
- df7a77b gfe-relnote: Add SessionCache to TlsClientHandshaker, protected by reloadable flag quic_supports_tls_handshake by nharper · 5 years ago
- 0270396 Add IsResumption method to QUIC client handshakers by nharper · 5 years ago
- 18d5d24 gfe-relnote: Swap order of operations in TlsClientHandshaker::FinishHandshake. Protected by --quic_supports_tls_handshake by nharper · 5 years ago
- e158186 Remove unused CreateSslCtx methods from TlsHandshaker classes by nharper · 5 years ago
- d0dd47c Remove redundant calls to QuicSession::NeuterUnencryptedData(). by renjietang · 5 years ago
- 8f75992 gfe-relnote: Expose properties of TLS connection in quic::CryptoNegotiatedParameters. Protected by quic_supports_tls_handshake. by nharper · 5 years ago
- 40bdf53 Call ProofHandler::OnProofVerifyDetailsAvailable in TLS handshake in QUIC by nharper · 5 years ago
- ad7424f Implement QUIC ALPN selection on the server side. by vasilvv · 6 years ago
- 4724c9c Support session-specific ALPNs for clients, and specifying multiple ALPNs. by vasilvv · 6 years ago
- 486a8a9 Limit the amount of incoming crypto data that will be buffered. by nharper · 6 years ago
- bd79392 gfe-relnote: In TLS client handshaker, call OnHandshakeComplete when handshake is finished. Protected by existing FLAGS_quic_supports_tls_handshake. by fayang · 6 years ago
- ea71d6f Rename ENCRYPTION_REESTABLISHED to ENCRYPTION_ESTABLISHED as ENCRRYPTION_FIRST_ESTABLISHED has been removed. by renjietang · 6 years ago
- 8a72e4f gfe-relnote: Call QuicSession::OnCryptoHandshakeEvent in TLS handshake. Protected by quic_supports_tls_handshake. by nharper · 6 years ago
- 9145364 Make QUIC enforce ALPN when using TLS handshake by dschinazi · 6 years ago
- 6c84c14 Introduce IsConnectionIdLengthValidForVersion by dschinazi · 6 years ago
- 5c03085 Fix replacing connection IDs when initial crypters are in use by dschinazi · 6 years ago
- 24e7ae8 Fix QUIC version used when computing ALPN by dschinazi · 6 years ago
- 17d4242 Fix QUIC warnings in preparation for enabling them by dschinazi · 6 years ago
- 6ebe83b Refactor TlsHandshaker classes by nharper · 6 years ago
- 6153bc7 gfe-relnote: Remove client-side support for Channel ID from QUIC. Not flag protected. by nharper · 6 years ago
- 38c190b Add arguments to ProofVerifier::VerifyCertChain for stapled OCSP response and SignedCertificateTimestampList. by QUICHE team · 6 years ago
- 6cf4d2a Update QUIC transport parameters to draft 20 by dschinazi · 6 years ago
- 546cc45 Add new methods to QuicFramer for controlling decrypters by zhongyi · 6 years ago
- 9e84364 Automated g4 rollback of changelist 242988047. by zhongyi · 6 years ago
- d4b308e Add new methods to QuicFramer for controlling decrypters by dschinazi · 6 years ago
- a396ef6 Internal QUICHE change by ianswett · 6 years ago
- fbda215 Add new methods to QuicFramer for controlling decrypters by nharper · 6 years ago
- 35e749e Add ALPN to QUIC when using TLS by dschinazi · 6 years ago
- d1967a2 Gracefully handle missing Google-specific transport parameters when using TLS by dschinazi · 6 years ago
- 6987b4a Rename ENCRYPTION_NONE to ENCRYPTION_INITIAL by QUICHE team · 6 years ago
- 872e7a3 Remove QuicString wrapper for std::string by vasilvv · 6 years ago
- c48c871 Replace QuicString with std::string, pass 1 by vasilvv · 6 years ago
- a6ef0a6 Project import generated by Copybara. by QUICHE team · 6 years ago