Skip to content
GitLab
Projects
Groups
Snippets
Help
Loading...
Sign in
Toggle navigation
新注册的用户请输入邮箱并保存,随后登录邮箱激活账号。后续可直接使用邮箱登录!
Open sidebar
third_party
qtls-go1-16
Graph
develop
Switch branch/tag
You can move around the graph by using the arrow keys.
Begin with the selected commit
Created with Raphaël 2.2.0
13
Feb
3
Jan
13
Jul
feat: Update the chainmaket common to v3 --story=1012289
v1.2.0 develop
v1.2.0 develop
feat: Add the sm signature algorithm --story=1012641
v1.1.0 master
v1.1.0 master
use a prefix for client session cache keys
add callbacks to store and restore app data along a session state
don't use TLS 1.3 compatibility mode when using alternative record layer
delete the session ticket after attempting 0-RTT
reject 0-RTT when a different ALPN is chosen
encode the ALPN into the session ticket
add a field to the ConnectionState to tell if 0-RTT was used
add a callback to tell the client about rejection of 0-RTT
don't offer 0-RTT after a HelloRetryRequest
add Accept0RTT to Config callback to decide if 0-RTT should be accepted
add the option to encode application data into the session ticket
export the 0-RTT write key
abuse the nonce field of ClientSessionState to save max_early_data_size
export the 0-RTT read key
close connection if client attempts 0-RTT, but ticket didn't allow it
encode the max early data size into the session ticket
implement parsing of the early_data extension in the EncryptedExtensions
add a tls.Config.MaxEarlyData option to enable 0-RTT
accept TLS 1.3 cipher suites in Config.CipherSuites
introduce a function on the connection to generate a session ticket
add a config option to enforce selection of an application protocol
export Conn.HandlePostHandshakeMessage
reject Configs that set MaxVersion < 1.3 when using a record layer
enforce TLS 1.3 when using an alternative record layer
add alternative record layer config option, used by QUIC
export a constructor for the TLS 1.3 AES-GCM AEAD
implement sending and receiving extensions in the Encrypted Extensions
implement sending and receiving extensions in the Client Hello
introduce an extra config struct to get and receive extensions
export Alert
implement additional extensions for the ClientHello message
implement additional extensions for the Encrypted Extensions message
use a tls.Config and a tls.ClientHelloInfo
use tls.CertificateRequestInfo instead of redefining it
use a tls.ClientSessionCache and tls.ClientSessionState
use a tls.ConnectionState instead of redefining it
use tls.Certificate instead of redefining it
use tls.RenegotiationSupport instead of redefining it