Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crypto: expose negotiated_cipher_suite in the hadshake data #2001

Merged
merged 1 commit into from
Oct 25, 2024

Conversation

BiagioFesta
Copy link
Contributor

@BiagioFesta BiagioFesta commented Oct 4, 2024

As title.

I am not totally convinced by that .expect("cipher is negotiated").

It makes sense to me: as AFAIK reaching that point always implies the cipher is negotiated, but I might have missed a edge scenario

quinn-proto/src/crypto/rustls.rs Show resolved Hide resolved
@djc
Copy link
Member

djc commented Oct 4, 2024

I am not totally convinced by that .expect("cipher is negotiated").

It makes to me, as AFIK reaching that point always implies the cipher is negotiated, but I might have missed a edge scenario

Once got_handshake_data is set to true, the inner TLS session is !is_handshaking() so this should be fine.

@djc djc requested a review from Ralith October 25, 2024 07:28
quinn-proto/src/crypto/rustls.rs Show resolved Hide resolved
quinn-proto/src/crypto/rustls.rs Outdated Show resolved Hide resolved
@Ralith Ralith added this pull request to the merge queue Oct 25, 2024
@Ralith
Copy link
Collaborator

Ralith commented Oct 25, 2024

Note this is technically a breaking change, since HandshakeData is exhaustive. Shouldn't be disruptive, though.

Merged via the queue into quinn-rs:main with commit a5d9bd1 Oct 25, 2024
14 checks passed
@BiagioFesta BiagioFesta deleted the wip/bfesta/hsd-cipher-info branch November 8, 2024 06:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants