return true;
}
+bool
+dco_check_pull_options(int msglevel, const struct options *o)
+{
+ if (!o->use_peer_id)
+ {
+ msg(msglevel, "OPTIONS IMPORT: Server did not request DATA_V2 packet "
+ "format required for data channel offload");
+ return false;
+ }
+ return true;
+}
+
#endif /* defined(ENABLE_DCO) */
*/
bool dco_check_option_conflict(int msglevel, const struct options *o);
+/**
+ * Check whether any of the options pushed by the server is not supported by
+ * our current dco implementation. If so print a warning at warning level
+ * for the first conflicting option found and return false.
+ *
+ * @param msglevel the msg level to use to print the warnings
+ * @param o the options struct that hold the options
+ * @return true if no conflict was detected, false otherwise
+ */
+bool dco_check_pull_options(int msglevel, const struct options *o);
+
/**
* Initialize the DCO context
*
return false;
}
+static inline bool
+dco_check_pull_options(int msglevel, const struct options *o)
+{
+ return false;
+}
+
static inline bool
ovpn_dco_init(int mode, dco_context_t *dco)
{
}
}
+ /* Check if pushed options are compatible with DCO, if enabled */
+ if (dco_enabled(&c->options)
+ && !dco_check_pull_options(D_PUSH_ERRORS, &c->options))
+ {
+ msg(D_PUSH_ERRORS, "OPTIONS ERROR: pushed options are incompatible with "
+ "data channel offload. Use --disable-dco to connect to this server");
+ return false;
+ }
+
return true;
}