/openssl/doc/designs/quic-design/ |
H A D | demuxer.md | 12 - multiple QUIC packets in an UDP packet handling as packet coalescing 24 - optionally trigger sending stateless reset packets if a received packet 33 - server side packet handling for unsupported version packets: 34 - trigger sending version negotiation packets if the server receives a packet 38 - packet handling on server for well-formed packets with supported versions 40 - if the packet is a well-formed Initial packet, trigger the creation of a 42 - if the packet is a well-formed 0RTT packet, mark the packet to be 43 buffered for short period of time (as Initial packet might arrive late) 46 - discard any other packet with unknown connection IDs
|
H A D | quic-ackm.md | 12 - Providing information on the largest unacked packet number so that packet 50 for a given packet number space. 72 /* QUIC packet number spaces. */ 83 /* QUIC packet number representation. */ 119 payload of the packet, but provides metadata about the packet which is relevant 134 /* The packet number of the transmitted packet. */ 157 * into a packet number space. 223 /* The packet number of the received packet. */ 231 * into a packet number space. 477 This gets the largest unacknowledged packet number in the given packet number [all …]
|
H A D | quic-fifm.md | 98 - Which stream IDs had a FIN bit set in the packet. 108 again if the packet was lost). 163 * packet. They may be used for any purpose. 210 * a packet. pn_space is a QUIC_PN_SPACE_* value. 288 in each packet, via a linked list of `QUIC_CFQ_ITEM`s. 324 /* Linked list of CFQ items in this packet. */ 367 * Releases the TXPIM packet, returning it to the pool. 374 /* Appends a chunk to the packet. The structure is copied. */ 479 is desired, and if so adds it to the packet. 484 it places in a packet, it: [all …]
|
H A D | tx-packetiser.md | 121 sent and schedules them into a packet. 171 allowed to send in a packet. 320 marking for the packet to qualify for it. For example, a packet with an ACK 430 can be sent in a single packet. 493 packet of room for stream data. 512 portion of the packet to each stream. 515 streams exceeds the Streams Budget for the packet, try to fill the packet 588 packet. 651 frame sent in an Initial packet, etc. 678 ### Restricting packet sizes [all …]
|
H A D | glossary.md | 38 another QUIC packet which is to be coalesced with one or more previous QUIC 40 left for another packet payload. 45 **DCID:** Destination Connection ID. Found in most QUIC packet headers. 76 **Key Phase:** Key phase bit in QUIC packet headers. See RFC 9000. 89 connection if found in the DCID field of an incoming packet. See also RCID. 99 is also the maximum size of a single QUIC packet if we place only one packet in 105 packet, but we may need to add PADDING frames to the final packet added to a 113 **MinPPL:** The minimum number of bytes which must be placed into a packet 141 **PN:** Packet number. Most QUIC packet types have a packet number (PN); see RFC 238 **RXKU:** RX key update. The detected condition whereby a received packet [all …]
|
H A D | connection-state-machine.md | 100 - a Version Negotiation packet (invalid, ignored); 101 - a Retry packet (invalid, ignored); 106 Initial packet to the server and received at least one valid Initial packet 335 <td>(packet processed, no change)</td> 350 <td>(packet processed if EL is not dropped)</td> 360 <td>(packet processed, no change)</td> 378 <td>(packet processed, no change)</td> 394 <td>(packet processed, no change)</td> 508 retransmission of a Version Negotiation packet. 553 processed encrypted packet from the server. [all …]
|
H A D | stream-receive-buffers.md | 38 decrypted QUIC packet that stores the actual frame. 59 This sets the limit on unprocessed quic packet data `length` in bytes that 69 eventually triggers release of stored unprocessed packet(s). 101 data frames. Each list item holds a pointer to the received packet 102 wrapper for refcounting and proper release of the received packet 123 would have to keep the packet data for all these frames which would 131 somehow limit the allocated packet buffer size, it is defined as sum 133 The packet buffer will contain much more data than just the stream frames 135 to limit the memory occupied by packet buffers. 138 decrypted packet buffer once we reach a limit on unprocessed decrypted
|
H A D | rx-depacketizer.md | 4 This component takes a QUIC packet and parses the frames contained therein, 30 The RX depacketizer receives a packet from the QUIC Read Record Layer, and 56 ### Read and process a packet 69 This uses the `ossl_qrx_read_pkt()` packet reading function from 73 packet reception time) 79 - The packet number (`packet->packet_number`) 80 - The packet receive time (`received`) 81 - The packet space, which is always: 82 - `QUIC_PN_SPACE_INITIAL` when `packet->packet_type == pkt_initial` 83 - `QUIC_PN_SPACE_HANDSHAKE` when `packet->packet_type == pkt_handshake` [all …]
|
H A D | debugging.md | 18 - By comparison, packet capture stores all packets in their entirety. 23 packet capture cannot directly tell you when an implementation deems a packet 83 To use PCAP you can use any standard packet capture tool, such as Wireshark or 86 **Using Wireshark.** Once you have obtained a packet capture as a standard 127 the packet capture file is opened. This avoids the need to have a centralised 128 key log file and ensures that the key log for a specific packet capture is 130 to distribute a packet capture file publicly, for example for educational 134 after taking a packet capture (note that `tls` should be specified below
|
H A D | quic-fault-injector.md | 89 Multiple packets may be held within a single datagram, and each packet may 90 itself contain multiple frames. A packet gets protected via an AEAD encryption 94 An example test might insert an unrecognised frame type into a QUIC packet to 118 be invoked after each packet has been constructed but before protection has 119 been applied to it. The header for the packet will be pointed to by `hdrin` and 136 packet in a single datagram. Fault Injector based tests may need to inject 139 An example test might modify an encrypted packet to confirm that the AEAD 265 * wants to resize the packet (either to add new data to it, or to truncate it). 274 * Prepend frame data into a packet. To be called from a packet_plain_listener 359 /* The packet payload data */ [all …]
|
H A D | congestion-control.md | 21 controllers to implement packet pacing.
|
H A D | quic-connID-retire.md | 13 * use more than the just latest CID for packet transmission
|
/openssl/util/perl/TLSProxy/ |
H A D | Record.pm | 67 my $packet = shift; 76 while (length ($packet) > 0) { 92 $seqhi, $seqmi, $seqlo, $len) = unpack('Cnnnnnn', $packet); 96 ($content_type, $version, $len) = unpack('Cnn', $packet); 99 if (length($packet) < $record_hdr_len + ($len // 0)) { 100 print "Partial data : ".length($packet)." bytes\n"; 101 $partial = $packet; 105 my $data = substr($packet, $record_hdr_len, $len); 169 $packet = substr($packet, $record_hdr_len + $len);
|
H A D | Proxy.pm | 497 my ($self, $server, $packet) = @_; 514 print "Packet length = ".length($packet)."\n"; 520 $self->{partial}[$server].$packet, 547 $packet = ""; 549 $packet .= $record->reconstruct_record($server); 552 print "Forwarded packet length = ".length($packet)."\n\n"; 554 return $packet;
|
/openssl/ssl/record/methods/ |
H A D | dtls_meth.c | 125 rr->input = &(rl->packet[DTLS1_RT_HEADER_LENGTH]); in dtls_process_record() 300 rdata->packet = rl->packet; in dtls_rlayer_buffer_record() 307 rl->packet = NULL; in dtls_rlayer_buffer_record() 339 rl->packet = rdata->packet; in dtls_copy_rlayer_record() 345 memcpy(&(rl->sequence[2]), &(rdata->packet[5]), 6); in dtls_copy_rlayer_record() 428 p = rl->packet; in dtls_get_more_records() 445 rl->msg_callback(0, rr->rec_version, SSL3_RT_HEADER, rl->packet, DTLS1_RT_HEADER_LENGTH, in dtls_get_more_records() 602 ret &= BIO_write_ex(rl->next, rdata->packet, rdata->packet_length, in dtls_free()
|
H A D | tls_common.c | 286 rl->packet = NULL; in tls_release_read_buffer() 325 rl->packet = rb->buf + rb->offset; in tls_default_read_n() 330 if (!ossl_assert(rl->packet != NULL)) { in tls_default_read_n() 342 if (rl->packet != pkt && clearold == 1) { in tls_default_read_n() 343 memmove(pkt, rl->packet, len + left); in tls_default_read_n() 344 rl->packet = pkt; in tls_default_read_n() 592 p = rl->packet; in tls_get_more_records() 704 thisrr->input = &(rl->packet[SSL2_RT_HEADER_LENGTH]); in tls_get_more_records() 706 thisrr->input = &(rl->packet[SSL3_RT_HEADER_LENGTH]); in tls_get_more_records()
|
H A D | tlsany_meth.c | 66 p = rl->packet; in tls_validate_record_header()
|
H A D | recmethod_local.h | 269 unsigned char *packet; member 376 unsigned char *packet; member
|
/openssl/doc/man3/ |
H A D | SSL_inject_net_dgram.pod | 28 describing the remote and local UDP endpoint addresses for the packet. Though 29 the injected packet was not actually received from the network directly by 30 OpenSSL, the packet will be processed as though the received datagram had the
|
H A D | DTLS_set_timer_cb.pod | 21 called by DTLS for every new DTLS packet that is sent.
|
H A D | SSL_read_early_data.pod | 258 buffer outgoing TCP data if a TCP packet has already been sent which we have not 260 transmitted if enough data to fill an entire TCP packet is accumulated, or if 262 first TCP packet along with any data from the first call to 264 single TCP packet, or if there are more calls to SSL_write_early_data() then 266 buffered by the OS and not sent until an ACK is received for the first packet
|
/openssl/ssl/ |
H A D | build.info | 25 # For shared builds we need to include the libcrypto packet.c and quic_vlint.c 28 ../crypto/packet.c ../crypto/quic_vlint.c ../crypto/time.c
|
/openssl/fuzz/ |
H A D | fuzz_introspector_exclusion.config | 12 packet.c
|
/openssl/doc/internal/man7/ |
H A D | DERlib.pod | 27 I<pkt> is the packet context used, and I<tag> should be the 35 DER writers are based in L<WPACKET(3)>, a generic packet writing
|
/openssl/apps/ |
H A D | s_client.c | 2622 const unsigned char *packet = (const unsigned char *)sbuf; in s_client_main() local 2625 bytes = BIO_read(sbio, (void *)packet, BUFSIZZ); in s_client_main() 2633 } else if (bytes != (4 + packet[0] + in s_client_main() 2634 (packet[1] << 8) + in s_client_main() 2635 (packet[2] << 16))) { in s_client_main() 2639 } else if (packet[4] != 0xA) { in s_client_main() 2651 } else if (packet[pos++] == '\0') { in s_client_main() 2664 if (packet[pos++] != '\0') { /* verify filler */ in s_client_main() 2671 if (!((packet[pos] + (packet[pos + 1] << 8)) & ssl_flg)) { in s_client_main()
|