diff options
author | Matt Caswell <matt@openssl.org> | 2023-08-07 16:53:24 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2023-08-15 14:41:31 +0100 |
commit | 644ef0bb696eeaf3572e858b2beeca17b0621a3f (patch) | |
tree | 4dcc77edac4bc6fa389bd592e489deea583d7ee6 /include | |
parent | 614c08c23999e39945b556851eabff157aef833f (diff) |
Add a test for receiving a post-handshake CertificateRequest
This should result in a QUIC PROTOCOL_VIOLATION
We also add tests for a post-handshake KeyUpdate, and a NewSessionTicket
with an invalid max_early_data value.
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21686)
Diffstat (limited to 'include')
-rw-r--r-- | include/internal/quic_tserver.h | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/include/internal/quic_tserver.h b/include/internal/quic_tserver.h index 90834b211c..45aea0abac 100644 --- a/include/internal/quic_tserver.h +++ b/include/internal/quic_tserver.h @@ -204,6 +204,13 @@ QUIC_CHANNEL *ossl_quic_tserver_get_channel(QUIC_TSERVER *srv); /* Send a TLS new session ticket */ int ossl_quic_tserver_new_ticket(QUIC_TSERVER *srv); +/* + * Set the max_early_data value to be sent in NewSessionTickets. Only the + * values 0 and 0xffffffff are valid for use in QUIC. + */ +int ossl_quic_tserver_set_max_early_data(QUIC_TSERVER *srv, + uint32_t max_early_data); + # endif #endif |