You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -1284,7 +1297,13 @@ static int ch_on_transport_params(const unsigned char *params,
}
/* Must match SCID of first Initial packet from server. */
- if (!ossl_quic_conn_id_eq(&ch->init_scid, &cid)) {
+ if (cid.id_len != 0 && !ossl_quic_conn_id_eq(&ch->init_scid, &cid)) {
reason = TP_REASON_EXPECTED_VALUE("INITIAL_SCID");
goto malformed;
}
t8m has asked about it during the code review here.
I agree the change above is kind of a workaround which allows handshake to complete when application is connecting using QUIC object created by SSL_new_from_listener()
I'm also attaching a wireshark dump which shows yet another difference.quic.pcapng.gz
Not the first connection from client to localhost:4444, the initial packet carries DCID only.
the connection where server uses SSL connection object created by SSL_new_from_listener() (packet 52) carries DCID as well SCID. This might be related to the thing I'm hunting for.
The text was updated successfully, but these errors were encountered:
This is related to this change here:
t8m has asked about it during the code review here.
I agree the change above is kind of a workaround which allows handshake to complete when application is connecting using QUIC object created by
SSL_new_from_listener()
I'm also attaching a wireshark dump which shows yet another difference.quic.pcapng.gz
Not the first connection from client to localhost:4444, the initial packet carries DCID only.
the connection where server uses SSL connection object created by SSL_new_from_listener() (packet 52) carries DCID as well SCID. This might be related to the thing I'm hunting for.
The text was updated successfully, but these errors were encountered: