Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
N
nghttp2
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Libraries
nghttp2
Commits
66eba46c
Commit
66eba46c
authored
Nov 24, 2017
by
Tatsuhiro Tsujikawa
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
fixup! nghttpx: Send nghttpx-0rtt-uniq header if request is replayable
parent
abcdca91
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
7 additions
and
6 deletions
+7
-6
src/shrpx_connection.cc
src/shrpx_connection.cc
+2
-2
src/shrpx_tls.cc
src/shrpx_tls.cc
+5
-4
No files found.
src/shrpx_connection.cc
View file @
66eba46c
...
...
@@ -442,7 +442,7 @@ int Connection::tls_handshake() {
rv
=
SSL_read_early_data
(
tls
.
ssl
,
buf
.
data
(),
buf
.
size
(),
&
nread
);
if
(
rv
==
SSL_READ_EARLY_DATA_ERROR
)
{
if
(
SSL_get_error
(
tls
.
ssl
,
rv
)
==
SSL_ERROR_WANT_
EARLY
)
{
if
(
SSL_get_error
(
tls
.
ssl
,
rv
)
==
SSL_ERROR_WANT_
CLIENT_HELLO_CB
)
{
if
(
LOG_ENABLED
(
INFO
))
{
LOG
(
INFO
)
<<
"tls: early_cb returns negative return value; handshake "
...
...
@@ -510,7 +510,7 @@ int Connection::tls_handshake() {
break
;
case
SSL_ERROR_WANT_WRITE
:
#if OPENSSL_1_1_1_API
case
SSL_ERROR_WANT_
EARLY
:
case
SSL_ERROR_WANT_
CLIENT_HELLO_CB
:
#endif // OPENSSL_1_1_1_API
break
;
case
SSL_ERROR_SSL
:
...
...
src/shrpx_tls.cc
View file @
66eba46c
...
...
@@ -550,15 +550,16 @@ int early_cb(SSL *ssl, int *al, void *arg) {
const
unsigned
char
*
ext
;
size_t
extlen
;
if
(
!
SSL_
early
_get0_ext
(
conn
->
tls
.
ssl
,
TLSEXT_TYPE_early_data
,
&
ext
,
&
extlen
))
{
if
(
!
SSL_
client_hello
_get0_ext
(
conn
->
tls
.
ssl
,
TLSEXT_TYPE_early_data
,
&
ext
,
&
extlen
))
{
if
(
LOG_ENABLED
(
INFO
))
{
LOG
(
INFO
)
<<
"early_data extension does not exist"
;
}
return
1
;
}
if
(
!
SSL_early_get0_ext
(
conn
->
tls
.
ssl
,
TLSEXT_TYPE_psk
,
&
ext
,
&
extlen
))
{
if
(
!
SSL_client_hello_get0_ext
(
conn
->
tls
.
ssl
,
TLSEXT_TYPE_psk
,
&
ext
,
&
extlen
))
{
if
(
LOG_ENABLED
(
INFO
))
{
LOG
(
INFO
)
<<
"pre_shared_key extension does not exist"
;
}
...
...
@@ -1019,7 +1020,7 @@ SSL_CTX *create_ssl_context(const char *private_key_file, const char *cert_file,
SSL_CTX_set_info_callback
(
ssl_ctx
,
info_callback
);
#if OPENSSL_1_1_1_API
SSL_CTX_set_
early
_cb
(
ssl_ctx
,
early_cb
,
nullptr
);
SSL_CTX_set_
client_hello
_cb
(
ssl_ctx
,
early_cb
,
nullptr
);
#endif // OPENSSL_1_1_1_API
#ifdef OPENSSL_IS_BORINGSSL
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment