go-libp2p
go-libp2p copied to clipboard
libp2p implementation in Go
It won't save any roundtrips, but a few bytes during the first flight, and we don't need to verify the certificate chain again.
We should be able to support using OpenSSL to perform the actual encryption/decryption. See https://godoc.org/github.com/libp2p/go-openssl#Client and https://godoc.org/github.com/libp2p/go-openssl#Server. Motivation: OpenSSL is faster and has better side-channel protection. Requirement: This feature should...
We want to be able to send "early data" in our handshake message payloads, so that we can advertise supported stream multiplexers without adding round-trip negotiations after the handshake completes....
This is a long-term "nice to have" feature. It would be nice to be able to opt-in to dumping session keys to aid in debugging. Opting in shouldn't be possible...
See https://github.com/libp2p/go-libp2p-quic-transport/pull/63#issue-284337030 and https://github.com/libp2p/go-libp2p-quic-transport/pull/63#discussion_r310583866.
Inspired by @vyzo’s and @aarshkshah1992’s recent approach of adding a value to a `context.Context` to signal if a stream should be opened via a relay, I'm wondering if a similar...
We'll need to: 1. Store session keys in the peerstore. 2. Make sure to _remove_ them when they're used (to prevent replay). 3. Enable session resumption. 4. Somehow give the...
We can fail the handshake earlier by hooking into the `GetConfigForClient` callback of the `tls.Config`. This would require us to not save the peer ID in the `holePunching` map, and...
``` === RUN TestNegotiationCancel basic_host_test.go:761: Error Trace: basic_host_test.go:264 basic_host_test.go:761 Error: Received unexpected error: context deadline exceeded Test: TestNegotiationCancel --- FAIL: TestNegotiationCancel (5.33s)
``` === RUN TestLinearDecayOverwrite decay_test.go:167: Error Trace: decay_test.go:167 Error: Not equal: expected: 500 actual : 1000 Test: TestLinearDecayOverwrite