Commit Graph

503 Commits

Author SHA1 Message Date
George Wang aa3b438a67 Release 4.0.8 2024-03-12 17:46:16 -04:00
George Wang f416a13afe Release 4.0.7 2024-02-28 19:05:41 -05:00
George Wang 851b0b0a57 update README. 2024-02-27 14:18:19 -05:00
George Wang e8a78e300e Update docker build. 2024-02-27 14:17:30 -05:00
George Wang c8cb6aa3e2 Release 4.0.6 2024-02-23 18:40:48 -05:00
George Wang 9c877a4177 Release 4.0.5 2024-02-07 12:32:13 -05:00
George Wang 515f453556 Release 4.0.4 2024-01-09 17:42:07 -05:00
George Wang 46c448d865 Release 4.0.4 2024-01-08 22:43:47 -05:00
Sijie Yang 9d9cde9734
Add `-A` option to specify congestion control algorithm for tools (#487) 2024-01-04 18:51:24 -05:00
George Wang 612a868772 Update cirrus-ci freebsd image from 12.1 to 13.2. 2024-01-04 13:13:11 -05:00
George Wang 0fa020998c remove html_sytle = /default.css . 2024-01-04 12:44:59 -05:00
George Wang 80738b914b explicitly load sphinx_rtd_theme module. 2024-01-04 12:40:56 -05:00
George Wang f15fcff5d4 add "sphinx_rtd_theme" extension. 2024-01-04 12:27:15 -05:00
George Wang 5ed1d4cab5 explicitly set html_theme = "sphinx_rtd_theme" 2024-01-04 11:59:56 -05:00
George Wang 422496a10c add .readthedocs.yaml 2024-01-04 11:40:06 -05:00
George Wang 1163af9c41 Release 4.0.3 2023-12-26 10:23:22 -05:00
George Wang a18ccca39e Release 4.0.2 2023-12-19 22:48:06 -05:00
Mickael Cerisier b81a3fb15f
Fix spam of ping network frames. (#478)
After some time without activity (only keepalive), the ping frame was send in loop.
2023-10-07 10:04:01 -04:00
wangfuyu 95bc8f9663
Fix handshake hole assert failed and coredump (#479)
Co-authored-by: wangfuyu <ivanfywang@gmail.com>
2023-10-07 10:02:56 -04:00
Saigut 8890b98bb0
Update http_client.c (#474)
Add the '-B Header bypass' parameter description in the Usage of http_client
2023-09-04 08:48:03 -04:00
Hadi Frohar c7dfaca894
prepare next advisory tick debug only when debug is enabled (#472)
Co-authored-by: hadif <hadif@checkpoint.com>
2023-08-09 17:56:33 -04:00
Hadi Frohar 836b0deadb
fix freeing frame before handling (#463)
Co-authored-by: hadif <hadif@checkpoint.com>
2023-06-23 12:20:30 -04:00
Hadi Frohar cdb206d29f
HTTP/1.1 conversion host name fix (#466)
Co-authored-by: hadif <hadif@checkpoint.com>
2023-05-31 16:45:24 -04:00
George Wang 8fb7e2c02c Release 4.0.1 2023-05-31 16:37:47 -04:00
George Wang 1b113d192f Release 4.0.1 2023-05-18 23:33:51 -04:00
George Wang e6987284fd Release 4.0.1 2023-05-15 14:17:23 -04:00
George Wang 2fb39e3567 Release 4.0.1 2023-05-15 00:27:34 -04:00
George Wang 3586b1e691 Release 4.0.0 2023-03-14 16:23:18 -04:00
George Wang fbde61944b Release 4.0.0 2023-03-14 16:15:17 -04:00
George Wang 3db190c9cc Release 4.0.0 2023-03-14 14:16:13 -04:00
LiteSpeed Tech 5d469f6494
Update README.md 2023-03-14 14:06:12 -04:00
George Wang 5cf9266173 Release 4.0.0 2023-03-14 14:04:18 -04:00
George Wang 79880b469a Release 4.0.0 2023-03-14 13:29:13 -04:00
George Wang b373fe5220 Release 3.3.1 2023-01-26 11:19:06 -05:00
Kent Ross 839893419c
Fix: do not use private openssl function to copy cert chain (#449)
Re: https://bugs.chromium.org/p/boringssl/issues/detail?id=558#c1

Since a recent change that puts boringssl's public API more in line with OpenSSL, there is a constness mismatch in the function type of `copy_X509` that may cause compilation failures.

As it turns out, the function we are using there (`sk_deep_copy`) is documented as a private API. We could use `sk_X509_deep_copy`, casting away the const in `copy_X509` to increment the refcount, but the existing function `X509_chain_up_ref` does exactly what we want here.
2023-01-19 17:33:24 -05:00
George Wang b340210fcf Release 3.3.0 2023-01-04 15:30:57 -05:00
George Wang 48365d5741 Release 3.3.0 2023-01-04 15:21:42 -05:00
wangfuyu b5efa50a5a
m) optimize new conn logic (#443)
1) on_new_conn only be called after handshake_ok
2) on_conn_closed only be called by ietf_full_conn_ci_destroy

Co-authored-by: wangfuyu <ivanfywang@gmail.com>
2022-12-14 11:30:34 -05:00
linsichen206 850b0a3d10
fix potential memory leak (#441)
Co-authored-by: linsc <linsc@wangus.com>
2022-12-07 14:23:43 -05:00
linsichen206 0fdfb125d7
fix memory leak when gquic handshake (#438)
Co-authored-by: linsc <linsc@wangus.com>
2022-11-27 10:34:18 -05:00
linsichen206 1a4edfcdc6
fix memory leak when gquic50 decrypt packet (#430)
* fix memory leak when gquic50 decrypt packet
fix a suspicious memory leak in gquic and iquic

* drop some redundant checking.

Co-authored-by: linsc <linsc@wangus.com>
2022-11-18 09:21:43 -05:00
wangfuyu 755143fe4a
Fix: http_server might not send MAX_STREAMS to increase limits if client cancel stream prematurely. (#435)
RFC9000 3.5.
A STOP_SENDING frame requests that the receiving endpoint send a RESET_STREAM frame. An endpoint that receives a STOP_SENDING frame MUST send a RESET_STREAM frame if the stream is in the "Ready" or "Send" state. If the stream is in the "Data Sent" state, the endpoint MAY defer sending the RESET_STREAM frame until the packets containing outstanding data are acknowledged or declared lost. If any outstanding data is declared lost, the endpoint SHOULD send a RESET_STREAM frame instead of retransmitting the data.

RFC9000 19.4. RESET_Frames
An endpoint uses a RESET_STREAM frame (type=0x04) to abruptly terminate the sending part of a stream.

Co-authored-by: wangfuyu <wangfuyu@gmail.com>
2022-11-17 21:34:57 -05:00
Simon Karan G 05698c94dc
fix typo (#429)
squic_engine_settings -> lsquic_engine_settings
2022-11-03 10:56:42 -04:00
George Wang 3bbf683f25 Release 3.2.0 2022-10-20 12:02:57 -04:00
George Wang 0e32849de5 Release 3.2.0 2022-10-20 11:47:58 -04:00
George Wang a5347f2374 Merge branch 'master' of github.com:litespeedtech/lsquic 2022-10-19 18:35:42 -04:00
George Wang 4702105acb Update ls-qpack to v2.5.0 2022-10-19 18:34:53 -04:00
wangfuyu def7d956d6
m) Fix: http1x memory leak (#427)
[Reproduce]
  http_client send GET/POST request with large headers(val_len > 256Bytes) to http_server, like:
    http_client -H quic.test.com -s ${SERVER_ADDR}:${SERVER_PORT} -p "/test/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" -o version=h3 -n 1 -r 100 -R 100

Co-authored-by: wangfuyu <ivanfywang@gmail.com>
2022-10-13 08:34:04 -04:00
wangfuyu 8391f907f4
m) Fix: packet_in pool memory leak (#426)
[Reproduce]
       http_client POST large body request to http_server, like:
          http_client -H quic.test.com -s ${SERVER_ADDR}:${SERVER_PORT} -p /1KB_char.txt -M POST -P /test/quic-data/html/10KB_char.txt -o version=h3 -n 100 -r 50000000 -R 500 -w 10 -K

[Notes]
      [RFC5116 AEAD] Section 5.1
       An authentication tag with a length of 16 octets (128bits) is used.

      [RFC9001 QUIC-TLS] Section 5.3
       These cipher suites have a 16-byte authentication tag and
       produce an output 16 bytes larger than their input.

Co-authored-by: wangfuyu <ivanfywang@gmail.com>
2022-10-12 16:21:29 -04:00
M-BELLAHCENE 108c4e7629
fix useless getopt.h check (#424)
* link fix when using lsquic in a cpp project

* Update CMakeLists.txt

* Fix getopt.h error when not needed

Co-authored-by: MBellahcene <moussa.bellahcene@4d.com>
2022-09-29 09:15:30 -04:00