if (!ossl_quic_wire_encode_transport_param_cid(&wpkt, QUIC_TPARAM_INITIAL_SCID,
&ch->cur_local_cid))
goto err;
+ if (ch->odcid.id_len != 0)
+ if (!ossl_quic_wire_encode_transport_param_cid(&wpkt,
+ QUIC_TPARAM_RETRY_SCID,
+ &ch->init_dcid))
+ goto err;
} else {
/* Client always uses an empty SCID. */
if (ossl_quic_wire_encode_transport_param_bytes(&wpkt, QUIC_TPARAM_INITIAL_SCID,
size_t buf_len;
};
-static const unsigned char retry_scid_1[8] = { 0 };
static const unsigned char disable_active_migration_1[] = {
0x00
TPARAM_CHECK_DROP(ORIG_DCID,
"ORIG_DCID was not sent but is required")
- TPARAM_CHECK_INJECT_A(RETRY_SCID, retry_scid_1,
- "RETRY_SCID sent when not performing a retry")
TPARAM_CHECK_DROP_INJECT_A(DISABLE_ACTIVE_MIGRATION, disable_active_migration_1,
"DISABLE_ACTIVE_MIGRATION is malformed")
TPARAM_CHECK_INJECT(UNKNOWN_1, NULL, 0,
Received Datagram
Length: 1200
Received Datagram
- Length: 234
+ Length: 244
Received Packet
Packet Type: Initial
Version: 0x00000001
Version: 0x00000001
Destination Conn Id: <zero length id>
Source Conn Id: 0x????????????????
- Payload length: 213
+ Payload length: 223
Packet Number: 0x00000001
Received Frame: Crypto
Offset: 0
Content Type = ApplicationData (23)
Length = 1022
Inner Content Type = Handshake (22)
- EncryptedExtensions, Length=88
- extensions, length = 86
- extension_type=UNKNOWN(57), length=67
+ EncryptedExtensions, Length=98
+ extensions, length = 96
+ extension_type=UNKNOWN(57), length=77
0000 - 0c 00 00 08 ?? ?? ?? ??-?? ?? ?? ?? 0f 08 ?? ....????????..?
- 000f - ?? ?? ?? ?? ?? ?? ?? 01-04 80 00 75 30 03 02 ???????....u0..
- 001e - 44 b0 0e 01 02 04 04 80-0c 00 00 05 04 80 08 D..............
- 002d - 00 00 06 04 80 08 00 00-07 04 80 08 00 00 08 ...............
- 003c - 02 40 64 09 02 40 64 .@d..@d
+ 000f - ?? ?? ?? ?? ?? ?? ?? 10-08 ?? ?? ?? ?? ?? ?? ???????????????
+ 001e - ?? ?? 01 04 80 00 75 30-03 02 44 b0 0e 01 02 ???????????????
+ 002d - 04 04 80 0c 00 00 05 04-80 08 00 00 06 04 80 ...............
+ 003c - 08 00 00 07 04 80 08 00-00 08 02 40 64 09 02 ???????????????
+ 004b - 40 64 ??
extension_type=application_layer_protocol_negotiation(16), length=11
ossltest
Received Frame: Crypto
Offset: 1022
- Len: 192
+ Len: 202
Received TLS Record
Header:
Version = TLS 1.2 (0x303)
Content Type = ApplicationData (23)
- Length = 192
+ Length = 202
Inner Content Type = Handshake (22)
CertificateVerify, Length=260
Signature Algorithm: rsa_pss_rsae_sha256 (0x0804)
Received Datagram
Length: 1200
Received Datagram
- Length: 234
+ Length: 244
Received Packet
Packet Type: Initial
Version: 0x00000001
Version: 0x00000001
Destination Conn Id: <zero length id>
Source Conn Id: 0x????????????????
- Payload length: 213
+ Payload length: 223
Packet Number: 0x00000001
Received Frame: Crypto
Offset: 0
Content Type = ApplicationData (23)
Length = 1022
Inner Content Type = Handshake (22)
- EncryptedExtensions, Length=88
- extensions, length = 86
- extension_type=UNKNOWN(57), length=67
+ EncryptedExtensions, Length=98
+ extensions, length = 96
+ extension_type=UNKNOWN(57), length=77
0000 - 0c 00 00 08 ?? ?? ?? ??-?? ?? ?? ?? 0f 08 ?? ....????????..?
- 000f - ?? ?? ?? ?? ?? ?? ?? 01-04 80 00 75 30 03 02 ???????....u0..
- 001e - 44 b0 0e 01 02 04 04 80-0c 00 00 05 04 80 08 D..............
- 002d - 00 00 06 04 80 08 00 00-07 04 80 08 00 00 08 ...............
- 003c - 02 40 64 09 02 40 64 .@d..@d
+ 000f - ?? ?? ?? ?? ?? ?? ?? 10-08 ?? ?? ?? ?? ?? ?? ???????..??????
+ 001e - ?? ?? 01 04 80 00 75 30-03 02 44 b0 0e 01 02 ??....??..?....
+ 002d - 04 04 80 0c 00 00 05 04-80 08 00 00 06 04 80 ...............
+ 003c - 08 00 00 07 04 80 08 00-00 08 02 40 64 09 02 ...........@d..
+ 004b - 40 64 @d
extension_type=application_layer_protocol_negotiation(16), length=11
ossltest
Received Frame: Crypto
Offset: 1022
- Len: 192
+ Len: 202
Received TLS Record
Header:
Version = TLS 1.2 (0x303)
Content Type = ApplicationData (23)
- Length = 192
+ Length = 202
Inner Content Type = Handshake (22)
CertificateVerify, Length=260
Signature Algorithm: rsa_pss_rsae_sha256 (0x0804)