Home
last modified time | relevance | path

Searched refs:packet (Results 1 – 25 of 53) sorted by relevance

123

/openssl/doc/designs/quic-design/
H A Ddemuxer.md12 - multiple QUIC packets in an UDP packet handling as packet coalescing
24 - optionally trigger sending stateless reset packets if a received packet
33 - server side packet handling for unsupported version packets:
34 - trigger sending version negotiation packets if the server receives a packet
38 - packet handling on server for well-formed packets with supported versions
40 - if the packet is a well-formed Initial packet, trigger the creation of a
42 - if the packet is a well-formed 0RTT packet, mark the packet to be
43 buffered for short period of time (as Initial packet might arrive late)
46 - discard any other packet with unknown connection IDs
H A Dquic-ackm.md12 - Providing information on the largest unacked packet number so that packet
50 for a given packet number space.
72 /* QUIC packet number spaces. */
83 /* QUIC packet number representation. */
119 payload of the packet, but provides metadata about the packet which is relevant
134 /* The packet number of the transmitted packet. */
157 * into a packet number space.
223 /* The packet number of the received packet. */
231 * into a packet number space.
477 This gets the largest unacknowledged packet number in the given packet number
[all …]
H A Dquic-fifm.md98 - Which stream IDs had a FIN bit set in the packet.
108 again if the packet was lost).
163 * packet. They may be used for any purpose.
210 * a packet. pn_space is a QUIC_PN_SPACE_* value.
288 in each packet, via a linked list of `QUIC_CFQ_ITEM`s.
324 /* Linked list of CFQ items in this packet. */
367 * Releases the TXPIM packet, returning it to the pool.
374 /* Appends a chunk to the packet. The structure is copied. */
479 is desired, and if so adds it to the packet.
484 it places in a packet, it:
[all …]
H A Dtx-packetiser.md121 sent and schedules them into a packet.
171 allowed to send in a packet.
320 marking for the packet to qualify for it. For example, a packet with an ACK
430 can be sent in a single packet.
493 packet of room for stream data.
512 portion of the packet to each stream.
515 streams exceeds the Streams Budget for the packet, try to fill the packet
588 packet.
651 frame sent in an Initial packet, etc.
678 ### Restricting packet sizes
[all …]
H A Dglossary.md38 another QUIC packet which is to be coalesced with one or more previous QUIC
40 left for another packet payload.
45 **DCID:** Destination Connection ID. Found in most QUIC packet headers.
76 **Key Phase:** Key phase bit in QUIC packet headers. See RFC 9000.
89 connection if found in the DCID field of an incoming packet. See also RCID.
99 is also the maximum size of a single QUIC packet if we place only one packet in
105 packet, but we may need to add PADDING frames to the final packet added to a
113 **MinPPL:** The minimum number of bytes which must be placed into a packet
141 **PN:** Packet number. Most QUIC packet types have a packet number (PN); see RFC
238 **RXKU:** RX key update. The detected condition whereby a received packet
[all …]
H A Dconnection-state-machine.md100 - a Version Negotiation packet (invalid, ignored);
101 - a Retry packet (invalid, ignored);
106 Initial packet to the server and received at least one valid Initial packet
335 <td>(packet processed, no change)</td>
350 <td>(packet processed if EL is not dropped)</td>
360 <td>(packet processed, no change)</td>
378 <td>(packet processed, no change)</td>
394 <td>(packet processed, no change)</td>
508 retransmission of a Version Negotiation packet.
553 processed encrypted packet from the server.
[all …]
H A Dstream-receive-buffers.md38 decrypted QUIC packet that stores the actual frame.
59 This sets the limit on unprocessed quic packet data `length` in bytes that
69 eventually triggers release of stored unprocessed packet(s).
101 data frames. Each list item holds a pointer to the received packet
102 wrapper for refcounting and proper release of the received packet
123 would have to keep the packet data for all these frames which would
131 somehow limit the allocated packet buffer size, it is defined as sum
133 The packet buffer will contain much more data than just the stream frames
135 to limit the memory occupied by packet buffers.
138 decrypted packet buffer once we reach a limit on unprocessed decrypted
H A Drx-depacketizer.md4 This component takes a QUIC packet and parses the frames contained therein,
30 The RX depacketizer receives a packet from the QUIC Read Record Layer, and
56 ### Read and process a packet
69 This uses the `ossl_qrx_read_pkt()` packet reading function from
73 packet reception time)
79 - The packet number (`packet->packet_number`)
80 - The packet receive time (`received`)
81 - The packet space, which is always:
82 - `QUIC_PN_SPACE_INITIAL` when `packet->packet_type == pkt_initial`
83 - `QUIC_PN_SPACE_HANDSHAKE` when `packet->packet_type == pkt_handshake`
[all …]
H A Ddebugging.md18 - By comparison, packet capture stores all packets in their entirety.
23 packet capture cannot directly tell you when an implementation deems a packet
83 To use PCAP you can use any standard packet capture tool, such as Wireshark or
86 **Using Wireshark.** Once you have obtained a packet capture as a standard
127 the packet capture file is opened. This avoids the need to have a centralised
128 key log file and ensures that the key log for a specific packet capture is
130 to distribute a packet capture file publicly, for example for educational
134 after taking a packet capture (note that `tls` should be specified below
H A Dquic-fault-injector.md89 Multiple packets may be held within a single datagram, and each packet may
90 itself contain multiple frames. A packet gets protected via an AEAD encryption
94 An example test might insert an unrecognised frame type into a QUIC packet to
118 be invoked after each packet has been constructed but before protection has
119 been applied to it. The header for the packet will be pointed to by `hdrin` and
136 packet in a single datagram. Fault Injector based tests may need to inject
139 An example test might modify an encrypted packet to confirm that the AEAD
265 * wants to resize the packet (either to add new data to it, or to truncate it).
274 * Prepend frame data into a packet. To be called from a packet_plain_listener
359 /* The packet payload data */
[all …]
H A Dcongestion-control.md21 controllers to implement packet pacing.
H A Dquic-connID-retire.md13 * use more than the just latest CID for packet transmission
/openssl/util/perl/TLSProxy/
H A DRecord.pm67 my $packet = shift;
76 while (length ($packet) > 0) {
92 $seqhi, $seqmi, $seqlo, $len) = unpack('Cnnnnnn', $packet);
96 ($content_type, $version, $len) = unpack('Cnn', $packet);
99 if (length($packet) < $record_hdr_len + ($len // 0)) {
100 print "Partial data : ".length($packet)." bytes\n";
101 $partial = $packet;
105 my $data = substr($packet, $record_hdr_len, $len);
169 $packet = substr($packet, $record_hdr_len + $len);
H A DProxy.pm491 my ($self, $server, $packet) = @_;
508 print "Packet length = ".length($packet)."\n";
514 $self->{partial}[$server].$packet,
541 $packet = "";
543 $packet .= $record->reconstruct_record($server);
546 print "Forwarded packet length = ".length($packet)."\n\n";
548 return $packet;
/openssl/ssl/record/methods/
H A Ddtls_meth.c125 rr->input = &(rl->packet[DTLS1_RT_HEADER_LENGTH]); in dtls_process_record()
300 rdata->packet = rl->packet; in dtls_rlayer_buffer_record()
307 rl->packet = NULL; in dtls_rlayer_buffer_record()
339 rl->packet = rdata->packet; in dtls_copy_rlayer_record()
345 memcpy(&(rl->sequence[2]), &(rdata->packet[5]), 6); in dtls_copy_rlayer_record()
428 p = rl->packet; in dtls_get_more_records()
445 rl->msg_callback(0, rr->rec_version, SSL3_RT_HEADER, rl->packet, DTLS1_RT_HEADER_LENGTH, in dtls_get_more_records()
602 ret &= BIO_write_ex(rl->next, rdata->packet, rdata->packet_length, in dtls_free()
H A Dtls_common.c286 rl->packet = NULL; in tls_release_read_buffer()
325 rl->packet = rb->buf + rb->offset; in tls_default_read_n()
330 if (!ossl_assert(rl->packet != NULL)) { in tls_default_read_n()
342 if (rl->packet != pkt && clearold == 1) { in tls_default_read_n()
343 memmove(pkt, rl->packet, len + left); in tls_default_read_n()
344 rl->packet = pkt; in tls_default_read_n()
592 p = rl->packet; in tls_get_more_records()
704 thisrr->input = &(rl->packet[SSL2_RT_HEADER_LENGTH]); in tls_get_more_records()
706 thisrr->input = &(rl->packet[SSL3_RT_HEADER_LENGTH]); in tls_get_more_records()
H A Dtlsany_meth.c66 p = rl->packet; in tls_validate_record_header()
H A Drecmethod_local.h269 unsigned char *packet; member
376 unsigned char *packet; member
/openssl/doc/man3/
H A DSSL_inject_net_dgram.pod28 describing the remote and local UDP endpoint addresses for the packet. Though
29 the injected packet was not actually received from the network directly by
30 OpenSSL, the packet will be processed as though the received datagram had the
H A DDTLS_set_timer_cb.pod21 called by DTLS for every new DTLS packet that is sent.
H A DSSL_read_early_data.pod258 buffer outgoing TCP data if a TCP packet has already been sent which we have not
260 transmitted if enough data to fill an entire TCP packet is accumulated, or if
262 first TCP packet along with any data from the first call to
264 single TCP packet, or if there are more calls to SSL_write_early_data() then
266 buffered by the OS and not sent until an ACK is received for the first packet
/openssl/ssl/
H A Dbuild.info25 # For shared builds we need to include the libcrypto packet.c and quic_vlint.c
28 ../crypto/packet.c ../crypto/quic_vlint.c ../crypto/time.c
/openssl/fuzz/
H A Dfuzz_introspector_exclusion.config12 packet.c
/openssl/doc/internal/man7/
H A DDERlib.pod27 I<pkt> is the packet context used, and I<tag> should be the
35 DER writers are based in L<WPACKET(3)>, a generic packet writing
/openssl/apps/
H A Ds_client.c2622 const unsigned char *packet = (const unsigned char *)sbuf; in s_client_main() local
2625 bytes = BIO_read(sbio, (void *)packet, BUFSIZZ); in s_client_main()
2633 } else if (bytes != (4 + packet[0] + in s_client_main()
2634 (packet[1] << 8) + in s_client_main()
2635 (packet[2] << 16))) { in s_client_main()
2639 } else if (packet[4] != 0xA) { in s_client_main()
2651 } else if (packet[pos++] == '\0') { in s_client_main()
2664 if (packet[pos++] != '\0') { /* verify filler */ in s_client_main()
2671 if (!((packet[pos] + (packet[pos + 1] << 8)) & ssl_flg)) { in s_client_main()

Completed in 76 milliseconds

123