520e1220bb
TLS 1.3 deployment is currently blocked by buggy middleboxes throughout the ecosystem. As an experiment to better understand these bugs and the problems they are causing, implement TLS 1.3 variants with alternate encodings. These are still the same protocol, only encoded slightly differently. We will use what we learn from these experiments to guide the TLS 1.3 deployment strategy and proposals to the IETF, if any. These experiments only target the basic 1-RTT TLS 1.3 handshake. Based on what we learn from this experiment, we may try future variations to explore 0-RTT and HelloRetryRequest. When enabled, the server supports all TLS 1.3 variants while the client is configured to use a particular variant. Change-Id: I532411d1abc41314dc76acce0246879b754b4c61 Reviewed-on: https://boringssl-review.googlesource.com/17327 Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> |
||
---|---|---|
.. | ||
args.cc | ||
ciphers.cc | ||
client.cc | ||
CMakeLists.txt | ||
const.cc | ||
digest.cc | ||
file.cc | ||
generate_ed25519.cc | ||
genrsa.cc | ||
internal.h | ||
pkcs12.cc | ||
rand.cc | ||
server.cc | ||
sign.cc | ||
speed.cc | ||
tool.cc | ||
transport_common.cc | ||
transport_common.h |