Hi,
good news, I got this working - but it requires either openssl 1.0.0d
with patches from http://sctp.fh-muenster.de/dtls-patches.html - I think
the Sequence Numbers (#2555) should be enough - or OpenSSL CVS, some of
the dtls patches got merged recently :).
I set a flag on the session in t
On 07/24/2011 03:55 AM, Michael Tuexen wrote:
On Jul 24, 2011, at 12:40 AM, com...@gmx.ch wrote:
I got some code which uses nonblocking dtls via self fed bios.
You are supposed to call DTLSv1_listen() to handle the front state...
#define DTLSv1_listen(ssl, peer) \
SSL_ctrl(ssl,DTLS_CTR
On Jul 24, 2011, at 12:40 AM, com...@gmx.ch wrote:
> Hi,
>
>
> I got some code which uses nonblocking dtls via self fed bios.
> If a unknown session comes up, I create a new session, feed/drain the
> sessions bios from/to the wire until SSL_accept returns success.
>
> Now, I added DTLS cookies
Hi,
I got some code which uses nonblocking dtls via self fed bios.
If a unknown session comes up, I create a new session, feed/drain the
sessions bios from/to the wire until SSL_accept returns success.
Now, I added DTLS cookies.
I expected SSL_accept to return an error if a ClientHello packet