/* DNSSEC_EOK */0 ? len : 0;
}
-void quic_event_close_connection(struct pl_quic_conn_sess_data *conn,
- struct session2 *session)
-{
- if (!session || !conn)
- return;
-
- while (session->transport.type != SESSION2_TRANSPORT_IO) {
- session = session->transport.parent;
- }
-
- session2_event(session, PROTOLAYER_EVENT_DISCONNECT, conn);
-}
-
ssize_t send_version_negotiation(struct wire_buf *dest, ngtcp2_version_cid dec_cids,
ngtcp2_cid dcid, ngtcp2_cid scid)
{
#define MAX_QUIC_FRAME_SIZE 65536
#define QUIC_MAX_SEND_PER_RECV 4
-#define QUIC_CONN_IDLE_TIMEOUT (30 * NGTCP2_SECONDS)
-#define QUIC_HS_IDLE_TIMEOUT (30 * NGTCP2_SECONDS)
+#define QUIC_CONN_IDLE_TIMEOUT (3 * NGTCP2_SECONDS)
+#define QUIC_HS_IDLE_TIMEOUT (3 * NGTCP2_SECONDS)
/* HACK adjust pointer of conn->streams head so it points to
* struct pl_quic_stream_sess_data, this is hacky */
uint64_t quic_timestamp(void);
bool kr_quic_conn_timeout(struct pl_quic_conn_sess_data *conn, uint64_t *now);
void init_random_cid(ngtcp2_cid *cid, size_t len);
-void quic_event_close_connection(struct pl_quic_conn_sess_data *conn,
- struct session2 *session);
ssize_t send_version_negotiation(struct wire_buf *dest, ngtcp2_version_cid dec_cids,
ngtcp2_cid dcid, ngtcp2_cid scid);