• Bug#1106788: unblock: ktls-utils/1.0.0-1 (8/10)

    From Ben Hutchings@1:229/2 to All on Thu May 29 22:40:01 2025
    [continued from previous message]

    + conn->errcode = errno;
    + return tlshd_log_error("socket recvmsg error %d", errno);
    + }
    + tlshd_log_debug("> Handshake RECV: %u %u", msg->len, msg->level);
    + ret = quic_handshake_crypto_data(conn, msg->level, msg->data, msg->len);
    + if (ret) {
    + conn->errcode = -ret;
    + return;
    + }
    + }
    +
    + msg = conn->send_list;
    + while (msg) {
    + tlshd_log_debug("< Handshake SEND: %u %u", msg->len, msg->level);
    + ret = quic_handshake_sendmsg(sockfd, msg);
    + if (ret < 0) {
    + conn->errcode = errno;
    + return tlshd_log_error("socket sendmsg error %d", errno);
    + }
    + conn->send_list = msg->next;
    + free(msg);
    + msg = conn->send_list;
    + }
    + }
    +
    + tlshd_quic_recv_session_ticket(conn);
    +}
    +#endif
    diff -Nru ktls-utils-0.11/src/tlshd/server.c ktls-utils-1.0.0/src/tlshd/server.c
    --- ktls-utils-0.11/src/tlshd/server.c 2024-06-14 16:54:21.000000000 +0200
    +++ ktls-utils-1.0.0/src/tlshd/server.c 2025-05-05 19:58:55.000000000 +0200
    @@ -2,6 +2,7 @@
    * Perform a TLSv1.3 server-side handshake.
    *
    * Copyright (c) 2023 Oracle and/or its affiliates.
    + * Copyright (c) 2024 Red Hat, Inc.
    *
    * ktls-utils is free software; you can redistribute it and/or
    * modify it under the terms of the GNU General Public License as
    @@ -128,6 +129,7 @@
    /**
    * tlshd_server_x509_verify_function - Verify remote's x.509 certificate
    * @session: session in the midst of a handshake
    + * @parms: handshake parameters
    *
    * A return value of %GNUTLS_E_SUCCESS indicates that the TLS session
    * has been allowed to continue. tlshd either sets the peerid array if
    @@ -139,17 +141,15 @@
    * A return value of %GNUTLS_E_CERTIFICATE_ERROR means that certificate
    * verification failed. The server sends an ALERT to the client.
    */
    -static int tlshd_server_x509_verify_function(gnutls_session_t ses