QUIC CONFORMANCE: RFC 9000 s. 12.5: Ensure CFQ can not be used to send disallowed...
authorHugo Landau <hlandau@openssl.org>
Tue, 6 Jun 2023 15:25:11 +0000 (16:25 +0100)
committerPauli <pauli@openssl.org>
Sun, 16 Jul 2023 22:17:57 +0000 (08:17 +1000)
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21135)

ssl/quic/quic_txp.c

index 18e0c507bae9bd588500d71beb835d665d1b729c..38812b2a333b0262833ba1204161ea53f7bd5b95 100644 (file)
@@ -656,7 +656,7 @@ static const struct archetype_data archetypes[QUIC_ENC_LEVEL_NUM][TX_PACKETISER_
             /*allow_stream_rel                =*/ 0,
             /*allow_conn_fc                   =*/ 0,
             /*allow_conn_close                =*/ 1,
-            /*allow_cfq_other                 =*/ 1,
+            /*allow_cfq_other                 =*/ 0,
             /*allow_new_token                 =*/ 0,
             /*allow_force_ack_eliciting       =*/ 1,
         },
@@ -693,7 +693,7 @@ static const struct archetype_data archetypes[QUIC_ENC_LEVEL_NUM][TX_PACKETISER_
             /*allow_stream_rel                =*/ 0,
             /*allow_conn_fc                   =*/ 0,
             /*allow_conn_close                =*/ 1,
-            /*allow_cfq_other                 =*/ 1,
+            /*allow_cfq_other                 =*/ 0,
             /*allow_new_token                 =*/ 0,
             /*allow_force_ack_eliciting       =*/ 1,
         },