Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TLS: improve check for unconsumed data on encryption level changes #4155

Merged
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 3 additions & 4 deletions draft-ietf-quic-tls.md
Original file line number Diff line number Diff line change
Expand Up @@ -441,10 +441,9 @@ network, it proceeds as follows:

- If the packet is from a new encryption level, it is saved for later processing
by TLS. Once TLS moves to receiving from this encryption level, saved data
can be provided to TLS. When providing data from any new encryption level to
TLS, if there is data from a previous encryption level that TLS has not
consumed, this MUST be treated as a connection error of type
PROTOCOL_VIOLATION.
can be provided to TLS. When TLS provides keys for a higher encryption level,
if there is data from a previous encryption level that TLS has not consumed,
this MUST be treated as a connection error of type PROTOCOL_VIOLATION.

Each time that TLS is provided with new data, new handshake bytes are requested
from TLS. TLS might not provide any bytes if the handshake messages it has
Expand Down