#
e8014554 |
| 09-Nov-2023 |
Hugo Landau |
QUIC CHANNEL: Consolidate forward object declarations in a single header Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https:/
QUIC CHANNEL: Consolidate forward object declarations in a single header Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22674)
show more ...
|
#
fe26b6b4 |
| 30-Oct-2023 |
Neil Horman |
Fix quicserver binding when duplicate entries exist In testing the quic demos, I found that the quicserver refused to start for me, indicating an inability to bind a socket to listen on
Fix quicserver binding when duplicate entries exist In testing the quic demos, I found that the quicserver refused to start for me, indicating an inability to bind a socket to listen on The problem turned out to be that getaddrinfo on my system was returning multiple entries, due to the fact that /etc/host maps the localhost host name to both ipv4 (127.0.0.1) and ipv6 (::1), but returns the latter as an ipv4 mapped address (specifying family == AF_INET) It seems like the proper fix would be to modify the /etc/hosts file to not make that mapping, and indeed that works. However, since several distribution ship with this setup, it seems like it is worthwhile to manage it in the server code. its also that some other application may be bound to a given address/port leading to failure, which I think could be considered erroneous, as any failure for the full addrinfo list in quicserver would lead to a complete failure Fix this by modifying the create_dgram_bio function to count the number of sockets is successfully binds/listens on, skipping any failures, and only exit the application if the number of bound sockets is zero. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22559)
show more ...
|
#
ddf84fc4 |
| 30-Oct-2023 |
Matt Caswell |
Stop the quicserver if the handshake or receiving the request fails Previously we entered an infinite loop if these things failed. Reviewed-by: Paul Dale <pauli@openssl.org> Rev
Stop the quicserver if the handshake or receiving the request fails Previously we entered an infinite loop if these things failed. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Tomas Mraz <tomas@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22557)
show more ...
|
#
11b7d46f |
| 06-Sep-2023 |
Matt Caswell |
Return NULL if we fail to create a BIO in the demos/quicserver Strictly speaking the previous code was still correct since BIO_set_fd is tolerant of a NULL BIO. But this way is more clea
Return NULL if we fail to create a BIO in the demos/quicserver Strictly speaking the previous code was still correct since BIO_set_fd is tolerant of a NULL BIO. But this way is more clear. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21950)
show more ...
|
#
b12c07cf |
| 04-Sep-2023 |
Tomas Mraz |
quicserver.c: Fix build with no-ssl-trace Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org>
quicserver.c: Fix build with no-ssl-trace Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21958)
show more ...
|
#
bd3b026f |
| 25-Aug-2023 |
Hugo Landau |
Minor fix during rebase Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21815)
|
#
3bc38ba0 |
| 23-Aug-2023 |
Hugo Landau |
QUIC MULTISTREAM TEST: Test WAIT_PEER Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21
QUIC MULTISTREAM TEST: Test WAIT_PEER Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21815)
show more ...
|
#
f6225f4f |
| 14-Aug-2023 |
Matt Caswell |
Update quicserver to be able to handle multiple streams We extend quicserver so that it can handle multiple requests with an HTTP request on each one. If a uni-directional stream comes i
Update quicserver to be able to handle multiple streams We extend quicserver so that it can handle multiple requests with an HTTP request on each one. If a uni-directional stream comes in we create a uni-directional stream for the response Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21765)
show more ...
|
#
f430713c |
| 17-Aug-2023 |
Matt Caswell |
Add a -trace option to quicserver to enable tracing of the communication Trace output of the communication with the client is dumped to stderr if the -trace options is supplied
Add a -trace option to quicserver to enable tracing of the communication Trace output of the communication with the client is dumped to stderr if the -trace options is supplied Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21800)
show more ...
|
#
4dec9285 |
| 07-Aug-2023 |
Tomas Mraz |
quicserver.c: Use BIO_printf to stderr instead of plain printf Fixes #21623 Also do not build quicserver with no-stdio as it is a test utility and tests are disabled with no-std
quicserver.c: Use BIO_printf to stderr instead of plain printf Fixes #21623 Also do not build quicserver with no-stdio as it is a test utility and tests are disabled with no-stdio anyway. Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> (Merged from https://github.com/openssl/openssl/pull/21677)
show more ...
|
#
829eec9f |
| 28-Jul-2023 |
Matt Caswell |
Add the ability for tserver to use a pre-existing SSL_CTX Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/o
Add the ability for tserver to use a pre-existing SSL_CTX Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21591)
show more ...
|
#
747b51f4 |
| 27-Jul-2023 |
Matt Caswell |
Correctly keep track of where we are in the quicserver request buffer If the request comes in in multiple chunks properly keep tract of where we are. Reviewed-by: Tomas Mraz <to
Correctly keep track of where we are in the quicserver request buffer If the request comes in in multiple chunks properly keep tract of where we are. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21578)
show more ...
|
#
37f27b91 |
| 08-Jun-2023 |
Matt Caswell |
Add a test quicserver utility This QUIC server utility is intended for test purposes only and is expected to be replaced in a future version of OpenSSL by s_server. At that point it
Add a test quicserver utility This QUIC server utility is intended for test purposes only and is expected to be replaced in a future version of OpenSSL by s_server. At that point it will be removed. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Hugo Landau <hlandau@openssl.org> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/21204)
show more ...
|