!LIST_ISEMPTY(&qel->pktns->tx.frms);
}
+/* Return 1 if <qc> connection may probe the Initial packet number space, 0 if not.
+ * This is not the case if the remote peer address is not validated and if
+ * it cannot send at least QUIC_INITIAL_PACKET_MINLEN bytes.
+ */
+static inline int qc_may_probe_ipktns(struct quic_conn *qc)
+{
+ return quic_peer_validated_addr(qc) ||
+ quic_may_send_bytes(qc) >= QUIC_INITIAL_PACKET_MINLEN;
+}
+
+
#endif /* USE_QUIC */
#endif /* _PROTO_QUIC_TLS_H */
int qc_prep_hpkts(struct quic_conn *qc, struct buffer *buf, struct list *qels);
int qc_send_ppkts(struct buffer *buf, struct ssl_sock_ctx *ctx);
-int qc_may_probe_ipktns(struct quic_conn *qc);
int qc_send_app_pkts(struct quic_conn *qc, struct list *frms);
int qc_dgrams_retransmit(struct quic_conn *qc);
int qc_notify_send(struct quic_conn *qc);
return ret;
}
-/* Return 1 if <qc> connection may probe the Initial packet number space, 0 if not.
- * This is not the case if the remote peer address is not validated and if
- * it cannot send at least QUIC_INITIAL_PACKET_MINLEN bytes.
- */
-int qc_may_probe_ipktns(struct quic_conn *qc)
-{
- return quic_peer_validated_addr(qc) ||
- quic_may_send_bytes(qc) >= QUIC_INITIAL_PACKET_MINLEN;
-}
-
/*
* Send a Version Negotiation packet on response to <pkt> on socket <fd> to
* address <addr>.