mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
80c455d5ae
During a DTLS handshake we may need to periodically handle timeouts in the DTLS timer to ensure retransmits due to lost packets are performed. However, one peer will always complete a handshake before the other. The DTLS timer stops once the handshake has finished so any handshake messages lost after that point will not automatically get retransmitted simply by calling DTLSv1_handle_timeout(). However attempting an SSL_read implies a DTLSv1_handle_timeout() and additionally will process records received from the peer. If those records are themselves retransmits then we know that the peer has not completed its handshake yet and a retransmit of our final flight automatically occurs. Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/8047)
57 lines
2.1 KiB
C
57 lines
2.1 KiB
C
/*
|
|
* Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#ifndef HEADER_SSLTESTLIB_H
|
|
# define HEADER_SSLTESTLIB_H
|
|
|
|
# include <openssl/ssl.h>
|
|
|
|
int create_ssl_ctx_pair(const SSL_METHOD *sm, const SSL_METHOD *cm,
|
|
int min_proto_version, int max_proto_version,
|
|
SSL_CTX **sctx, SSL_CTX **cctx, char *certfile,
|
|
char *privkeyfile);
|
|
int create_ssl_objects(SSL_CTX *serverctx, SSL_CTX *clientctx, SSL **sssl,
|
|
SSL **cssl, BIO *s_to_c_fbio, BIO *c_to_s_fbio);
|
|
int create_bare_ssl_connection(SSL *serverssl, SSL *clientssl, int want,
|
|
int read);
|
|
int create_ssl_objects2(SSL_CTX *serverctx, SSL_CTX *clientctx, SSL **sssl,
|
|
SSL **cssl, int sfd, int cfd);
|
|
int create_test_sockets(int *cfd, int *sfd);
|
|
int create_ssl_connection(SSL *serverssl, SSL *clientssl, int want);
|
|
void shutdown_ssl_connection(SSL *serverssl, SSL *clientssl);
|
|
|
|
/* Note: Not thread safe! */
|
|
const BIO_METHOD *bio_f_tls_dump_filter(void);
|
|
void bio_f_tls_dump_filter_free(void);
|
|
|
|
const BIO_METHOD *bio_s_mempacket_test(void);
|
|
void bio_s_mempacket_test_free(void);
|
|
|
|
/* Packet types - value 0 is reserved */
|
|
#define INJECT_PACKET 1
|
|
#define INJECT_PACKET_IGNORE_REC_SEQ 2
|
|
|
|
/*
|
|
* Mempacket BIO ctrls. We make them large enough to not clash with standard BIO
|
|
* ctrl codes.
|
|
*/
|
|
#define MEMPACKET_CTRL_SET_DROP_EPOCH (1 << 15)
|
|
#define MEMPACKET_CTRL_SET_DROP_REC (2 << 15)
|
|
#define MEMPACKET_CTRL_GET_DROP_REC (3 << 15)
|
|
#define MEMPACKET_CTRL_SET_DUPLICATE_REC (4 << 15)
|
|
|
|
int mempacket_test_inject(BIO *bio, const char *in, int inl, int pktnum,
|
|
int type);
|
|
|
|
typedef struct mempacket_st MEMPACKET;
|
|
|
|
DEFINE_STACK_OF(MEMPACKET)
|
|
|
|
#endif /* HEADER_SSLTESTLIB_H */
|