Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

quic: update deps for quic draft 29 #34033

Closed
wants to merge 13 commits into from

Commits on Jun 23, 2020

  1. deps: update ngtcp2

    jasnell committed Jun 23, 2020
    Copy the full SHA
    6fe4c7e View commit details
    Browse the repository at this point in the history
  2. deps: update nghttp3

    jasnell committed Jun 23, 2020
    Copy the full SHA
    41c4687 View commit details
    Browse the repository at this point in the history
  3. deps: cherry-pick akamai/openssl/commit/a6282c566d88db11300c82abc3c84…

    …a4e2e9ea568
    
    Original Commit Message:
    
      Some cleanup for the main QUIC changes
    
      Try to reduce unneeded whitespace changes and wrap new code to 80 columns.
      Reword documentation to attempt to improve clarity.
      Add some more sanity checks and clarifying comments to the code.
      Update referenced I-D versions.
    kaduk authored and jasnell committed Jun 23, 2020
    Copy the full SHA
    b872671 View commit details
    Browse the repository at this point in the history
  4. deps: cherry-pick akamai/openssl/commit/d5a13ca6e29f3ff85c731770ab0ee…

    …2f2487bf8b3
    
    Original Commit Message:
    
      Prevent KeyUpdate for QUIC
    
      QUIC does not use the TLS KeyUpdate message/mechanism, and indeed
      it is an error to generate or receive such a message.  Add the
      necessary checks (noting that the check for receipt should be
      redundant since SSL_provide_quic_data() is the only way to provide
      input to the TLS layer for a QUIC connection).
    kaduk authored and jasnell committed Jun 23, 2020
    Copy the full SHA
    c8ad923 View commit details
    Browse the repository at this point in the history
  5. deps: cherry-pick akamai/openssl/commit/a5a08cb8050bb69120e833456e355…

    …f482e392456
    
    Original Commit Message:
    
      Test KeyUpdate rejection
    
      For now, just test that we don't generate any, since we don't really
      expose the mechanics for encrypting one and the QUIC API is not
      integrated into the TLSProxy setup.
    kaduk authored and jasnell committed Jun 23, 2020
    Copy the full SHA
    31acd40 View commit details
    Browse the repository at this point in the history
  6. deps: cherry-pick akamai/openssl/commit/bf4b08ecfbb7a26ca4b0b9ecaee3b…

    …31d18d7bda9
    
    Original Commit Message:
    
      Fix out-of-bounds read when TLS msg is split up into multiple chunks
    
      Previously, SSL_provide_quic_data tried to handle this kind of
      situation, but it failed when the length of input data is less than
      SSL3_HM_HEADER_LENGTH.  If that happens, the code might get wrong
      message length by reading value from out-of-bounds region.
    tatsuhiro-t authored and jasnell committed Jun 23, 2020
    Copy the full SHA
    7540e94 View commit details
    Browse the repository at this point in the history
  7. Copy the full SHA
    1e9ff34 View commit details
    Browse the repository at this point in the history
  8. deps: temporary fixup for ngtcp2 to build on windows

    The ngtcp2 update uses a gcc builtin that is not available under
    _MSC_VER. This floats a patch to fix it.
    
    Upstream PR: ngtcp2/ngtcp2#247
    jasnell committed Jun 23, 2020
    Copy the full SHA
    aed5f87 View commit details
    Browse the repository at this point in the history
  9. Copy the full SHA
    594844f View commit details
    Browse the repository at this point in the history

Commits on Jun 24, 2020

  1. Copy the full SHA
    db4fc01 View commit details
    Browse the repository at this point in the history
  2. Copy the full SHA
    26138a4 View commit details
    Browse the repository at this point in the history
  3. quic: temporarily skip quic-ipv6only test

    The dual stack support is currently broken as the QuicSocket endpoints
    are not properly accounting for all cases. Needs to be investigated
    further.
    jasnell committed Jun 24, 2020
    Copy the full SHA
    5aaa9c1 View commit details
    Browse the repository at this point in the history
  4. Copy the full SHA
    7d2a6dc View commit details
    Browse the repository at this point in the history