Path to this page:
Subject: CVS commit: pkgsrc/net/ngtcp2
From: Adam Ciarcinski
Date: 2025-02-21 17:23:11
Message id: 20250221162311.A9D71FBE0@cvs.NetBSD.org
Log Message:
ngtcp2: updated to 1.11.0
1.11.0
Generate periodic fuzzing coverage reports
Remove len parameter from ngtcp2_pkt_hd_init
Remove ineffective use of NGTCP2_PKT_FLAG_NONE
Revert "Do not extend app-limited period"
Cosmetic cleanup
C99 designated initializers
ngtcp2_gaptr: Assert !ngtcp2_ksl_it_end
fuzz: Exercise memory allocation failures
fuzz: Exercise callback failures
tests: Fix uninitialized variable reference
Fix uninitialized connection close frame_type
Bump munit
Update doc
clang-format
C++ designated initializers
fuzz: Decode transport parameters from raw fuzzed data
fuzz: Send stream data
ngtcp2_ringbuf_full: Add const qualifier to rb
fuzz: Don't free data encoded in STREAM frame
fuzz: Add missing callbacks
Extract code around Destination Connection ID to ngtcp2_dcidtr
fuzz: Exercise ngtcp2_conn_handle_expiry()
Deal with very large ack_delay
fuzz: Exercise ngtcp2_conn_initiate_migration()
fuzz: Exercise extending max offsets
Avoid limiting CWND during path validation
fuzz: Set negotiated version before setting remote transport params
Add ngtcp2_pv_set_fallback
Fix ngtcp2_conn_get_active_dcid for zero-length DCID
Remove redundant ngtcp2_dcid_set_path call
Add const qualifier as we did in conn_get_loss_time_and_pktns
Rename NGTCP2_PV_FLAG_FALLBACK_ON_FAILURE to NGTCP2_PV_FLAG_FALLBACK_PRESENT
examples: nullptr
Rename persistent_congestion_started_ts to handshake_confirmed_ts
picotls: Reset AEAD IV on decryption failure
crypto/picotls: clang-format
Allocate ACK frame buffer on stack
Move fields required to make ACK to ngtcp2_acktr
Avoid buffering padding bytes
Revert "Avoid buffering padding bytes"
The minimum valid QUIC packet length is 21
Avoid buffering padding bytes, take 2
Amend 1502
BBR update
Update BBR
Adjust pacing timer
Pacing adjustment followup
Pay compensation as much as possible
ngtcp2_rst: Ignore packets that are sent before reset
interop: Enable connectionmigration
Fix server side preferred address migration
Check remote disable_active_migration
Ignore packet from handshake local addr after preferred address migration
ngtcp2_conn_read_pkt accepts NULL ngtcp2_pkt_info
tests: Refactor ngtcp2_conn setup functions
Refactor test_ngtcp2_conn_send_initial_token
ngtcp2_acktr: Add tests
Fix wrong condition for DATA_BLOCKED frame transmission
Remove ngtcp2_vec_new and ngtcp2_vec_del
Add tests
Remove redundant DATA_BLOCKED and STREAM_DATA_BLOCKED frames
Add test to verify cancelling retransmission
Add test_ngtcp2_conn_submit_new_token
Remove unused funcs
ngtcp2_ksl: Remove ineffective ksl_node_set_key
Add ngtcp2_addr_test
Revert "ngtcp2_ksl: Remove ineffective ksl_node_set_key"
Use ngtcp2_addr_empty
ngtcp2_ksl: Add a test to cover edge case
ngtcp2_transport_params_decode: Add test case for empty input
Require application to provide sane ngtcp2_sockaddr
tests: Make remote transport parameters configurable
Rename ngtcp2_addr_compare to ngtcp2_addr_cmp
bbr: Use SRTT after the first RTT sample becomes available
tests: Refactor tests to use conn_options
Revise version negotiation tests in less intrusive way
Add tests
Add test to check that packet with reserved version is discarded
Fix cast
examples/server: Rework connection handling
Fix assertion error due to overlapping 0 length frames
fuzz: Deal with NGTCP2_WRITE_STREAM_FLAG_MORE
Doc: fix reference to ngtcp2_conn_get_0rtt_crypto_ctx
Bump boringssl
Bump wolfSSL to v5.7.6-stable
Bump aws-lc to v1.46.1
Bump picotls
Fix uninitialized ngtcp2_dcid.flags
Files: