IETF QUIC TLS decryption error with key update
When an IETF QUIC connection performs a TLS key update and at the same time switches to using a new DCID, wireshark stops decrypting any further packets.
Steps to reproduce
The quant keyupdate runs on https://interop.seemann.io/ exemplify the bug.
What is the current bug behavior?
TLS decryption fails after the keyupdate/DCID change.
What is the expected correct behavior?
TLS decryption should continue.
Sample capture file
Packet number 23 in the trace does not decode. It is the second short-header packet sent from the client; the first short-header packet was coalesced behind a handshake packet (number 10 in the trace). Packet number 23 is sent to a DCID that was taken from the preferred_address transport parameter the server sent, and it also updates the key phase.