提交 a9052bed 编写于 作者: M Matt Caswell

Update DTLSv1_listen documentation

Make it clear that if we are unable to get hold of the peer address then
*peer is cleared and the family set to AF_UNSPEC.
Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
上级 ce0865d8
...@@ -44,9 +44,11 @@ When a ClientHello is received that contains a cookie that has been verified, ...@@ -44,9 +44,11 @@ When a ClientHello is received that contains a cookie that has been verified,
then DTLSv1_listen() will return with the B<ssl> parameter updated into a state then DTLSv1_listen() will return with the B<ssl> parameter updated into a state
where the handshake can be continued by a call to (for example) SSL_accept(). where the handshake can be continued by a call to (for example) SSL_accept().
Additionally the B<BIO_ADDR> pointed to by B<peer> will be filled in with Additionally the B<BIO_ADDR> pointed to by B<peer> will be filled in with
details of the peer that sent the ClientHello. Typically user code is expected details of the peer that sent the ClientHello. If the underlying BIO is unable
to "connect" the underlying socket to the peer and continue the handshake in a to obtain the B<BIO_ADDR> of the peer (for example because the BIO does not
connected state. support this), then B<*peer> will be cleared and the family set to AF_UNSPEC.
Typically user code is expected to "connect" the underlying socket to the peer
and continue the handshake in a connected state.
Prior to calling DTLSv1_listen() user code must ensure that cookie generation Prior to calling DTLSv1_listen() user code must ensure that cookie generation
and verification callbacks have been set up using and verification callbacks have been set up using
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册