You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When a CRYPTO frame contains data which results in us discarding packet protection keys for a number space, we should verify that we don't have any excess buffered crypto data.
For example, if we receive CRYPTO frames in the Initial space containing bytes 0-100 and 101-200, and the 0-100 segment causes us to drop packet protection keys for the Initial space, the excess data (bytes 101-200) is erroneous and should result in the connection being closed.
(SImplest option here might be to avoid providing data to the TLS stack if we've got any gaps in the CRYPTO stream, and then let the TLS layer complain about receiving too much data.)
The text was updated successfully, but these errors were encountered:
When a CRYPTO frame contains data which results in us discarding packet protection keys for a number space, we should verify that we don't have any excess buffered crypto data.
For example, if we receive CRYPTO frames in the Initial space containing bytes 0-100 and 101-200, and the 0-100 segment causes us to drop packet protection keys for the Initial space, the excess data (bytes 101-200) is erroneous and should result in the connection being closed.
(SImplest option here might be to avoid providing data to the TLS stack if we've got any gaps in the CRYPTO stream, and then let the TLS layer complain about receiving too much data.)
The text was updated successfully, but these errors were encountered: