Skip to content

Commit

Permalink
unacknowledged CRYPTO data
Browse files Browse the repository at this point in the history
  • Loading branch information
martinthomson committed Jul 14, 2019
1 parent 795a4d9 commit 7ec9757
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions draft-ietf-quic-recovery.md
Original file line number Diff line number Diff line change
Expand Up @@ -538,12 +538,12 @@ sender MUST retransmit unacknowledged cryptographic handshake data. The sender
MUST NOT declare in-flight crypto packets as lost when the crypto timer expires.

If the handshake is complete, but not confirmed (see Section 4.1.1 and Section
4.1.2 of {{QUIC-TLS}}), in addition to sending unacknowledged crytographic
handshake data, endpoints SHOULD send an ack-eliciting 1-RTT packet. This can
be coalesced with Handshake packets, even if there is sufficient unacknowledged
cryptographic handshake data outstanding to consume the entire PMTU. Sending an
ack-eliciting 1-RTT packet provides a peer with the opportunity to confirm the
handshake and allow all state associated with Handshake packets to be discarded.
4.1.2 of {{QUIC-TLS}}), in addition to sending unacknowledged CRYPTO data,
endpoints SHOULD send an ack-eliciting 1-RTT packet. This can be coalesced with
Handshake packets, even if there is sufficient unacknowledged cryptographic
handshake data outstanding to consume the entire PMTU. Sending an ack-eliciting
1-RTT packet provides a peer with the opportunity to confirm the handshake and
allow all state associated with Handshake packets to be discarded.

On each consecutive expiration of the crypto timer without receiving an
acknowledgement for a new packet, the sender MUST double the crypto
Expand Down

0 comments on commit 7ec9757

Please sign in to comment.