-
Notifications
You must be signed in to change notification settings - Fork 160
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bring us closer to crypto/tls #148
Comments
I have take a look around Unexpose or move non-DTLS thingstype Closer (#183) ✔️It is a package internal utility. It would be better to be unexposed. func GenerateSelfSigned(), func SelfSign() (#183) ✔️They are for testing and not DTLS specific. It would be better to be unexposed or moved it to somewhere. func Fingerprint() (#185) ✔️
Interfacingtype Listener (#181) ✔️
|
Maybe better to move ID of the hash algorithm is TLS specific. Lines 11 to 13 in 0b80bd9
As a result of looking around the code, I think public APIs would be better to receive crypro.Hash and internally translate to hash ID.
|
@daenney @rumpelsepp @jkralik @Sean-Der I have created some PRs to make public APIs more closer to |
I noticed something in the Go 1.14 releases:
Might be nice if we provide these too. CipherSuites and InsecureCipherSuites should return a
|
This adds the CiperSuiteName function. It behaves exactly like the tls.CipherSuiteName function that's being added for Go 1.14. Relates to #148
As part of Go 1.14 the CipherSuites and InsecureCipherSuites functions got added to the TLS package, returning a slice of *tls.CipherSuite. Relates to #148
As part of Go 1.14 the CipherSuites and InsecureCipherSuites functions got added to the TLS package, returning a slice of *tls.CipherSuite. Relates to #148
This adds the CiperSuiteName function. It behaves exactly like the tls.CipherSuiteName function that's being added for Go 1.14. Relates to #148
As part of Go 1.14 the CipherSuites and InsecureCipherSuites functions got added to the TLS package, returning a slice of *tls.CipherSuite. Relates to #148
As part of Go 1.14 the CipherSuites and InsecureCipherSuites functions got added to the TLS package, returning a slice of *tls.CipherSuite. Relates to #148
As part of Go 1.14 the CipherSuites and InsecureCipherSuites functions got added to the TLS package, returning a slice of *tls.CipherSuite. Relates to #148
This adds the CiperSuiteName function. It behaves exactly like the tls.CipherSuiteName function that's being added for Go 1.14. Relates to #148
As part of Go 1.14 the CipherSuites and InsecureCipherSuites functions got added to the TLS package, returning a slice of *tls.CipherSuite. Relates to #148
This adds the CiperSuiteName function. It behaves exactly like the tls.CipherSuiteName function that's being added for Go 1.14. Relates to #148
As part of Go 1.14 the CipherSuites and InsecureCipherSuites functions got added to the TLS package, returning a slice of *tls.CipherSuite. Relates to #148
This adds the CiperSuiteName function. It behaves exactly like the tls.CipherSuiteName function that's being added for Go 1.14. Relates to #148
As part of Go 1.14 the CipherSuites and InsecureCipherSuites functions got added to the TLS package, returning a slice of *tls.CipherSuite. Relates to #148
I think this has been landed, isn't it? |
Sure looks like it 🎉. |
🎉 |
As part of v2 I'd like us to take some time and see if there's more of crypto/tls we can reuse. Mostly want to ensure we don't diverge from interafces and behaviour in crypto/tls unless mandated by the DTLS RFCs. This should help newcomers to immediately get started with pion/dtls as it's hopefully just swapping out crypto/tls for pion/dtls.
The text was updated successfully, but these errors were encountered: