forked from pion/dtls
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Pion.DTLS to 2.2.6 #5
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This allows the client/server to chose which elliptic curves they wish to advertise, and in which order. Fixes pion#474
VerifyConnection, if not nil, is called after normal certificate verification/PSK and after VerifyPeerCertificate by either a TLS client or server. If it returns a non-nil error, the handshake is aborted and that error results. If normal verification fails then the handshake will abort before considering this callback. This callback will run for all connections regardless of InsecureSkipVerify or ClientAuth settings.
E2E fails with 1.19
The goal is to close the feature parity gap with stdlib's tls package. Co-authored-by: Rachel Chen <rachel@chens.email>
Generated by renovateBot
Generated by renovateBot
Generated by renovateBot
Generated by renovateBot
Update lint scripts and CI configs.
Generated by renovateBot
Generated by renovateBot
Generated by renovateBot
Generated by renovateBot
Generated by renovateBot
The API is expected to be called with a new cert pool. The deprecation has no suggested alternative.
Update lint scripts and CI configs.
Generated by renovateBot
Generated by renovateBot
Some SDPs emit uppercase hash names. This change makes the comparison case insensitive.
Update lint scripts and CI configs.
Generated by renovateBot
Update lint scripts and CI configs.
The old code caused compilation errors an was clearly not covered by any tests so far.
Update lint scripts and CI configs.
Use Go's built-in fuzzing tool instead of go-fuzz
Update github.com/pion/transport to v2
Generated by renovateBot
Generated by renovateBot
This is a common behavior for WebRTC Peer on browser stack where DoS resistance on DTLS level is redundant as this is built into ICE.
Generated by renovateBot
This fixes an out of bounds read when we're unmarshalling the Server Hello. This could cause us to panic.
This could cause us to panic when unmarshalling a Hello Verify request message.
This adds a fuzz test to cover the DTLS handshake. Co-Authored-By: Daniele Sluijters <daenney@users.noreply.github.com>
transport/v2 was a breaking change to that API
This is a security update.
This pulls in the transport update that resolves the x/net CVE-2022-41723 issue.
This pulls in the transport update that resolves the x/net CVE-2022-41723 issue.
Udp pulls in pion/transport which got an update due to CVE-2022-41723.
thiagownt
approved these changes
Mar 8, 2023
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
no look approval 🤞
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes a memory leak with deadlines: pion/transport#208
tested with k6 OK.
Last commit reduces the inbound size, which lead to much better tail latencies.