Sortix nightly manual
This manual documents Sortix nightly, a development build that has not been officially released. You can instead view this document in the latest official manual.
NAME
SSL_CTX_set_max_early_data, SSL_set_max_early_data, SSL_SESSION_set_max_early_data, SSL_CTX_get_max_early_data, SSL_get_max_early_data, SSL_SESSION_get_max_early_data, SSL_write_early_data, SSL_read_early_data, SSL_get_early_data_status — transmit application data during the handshakeSYNOPSIS
#include <openssl/ssl.h>SSL_CTX_set_max_early_data(SSL_CTX *ctx, uint32_t max_bytes);
SSL_set_max_early_data(SSL *ssl, uint32_t max_bytes);
SSL_SESSION_set_max_early_data(SSL_SESSION *session, uint32_t max_bytes);
SSL_CTX_get_max_early_data(const SSL_CTX *ctx);
SSL_get_max_early_data(const SSL *ssl);
SSL_SESSION_get_max_early_data(const SSL_SESSION *session);
SSL_write_early_data(SSL *ssl, const void *buf, size_t len, size_t *written);
SSL_read_early_data(SSL *ssl, void *buf, size_t maxlen, size_t *readbytes);
SSL_get_early_data_status(const SSL *ssl);
DESCRIPTION
In LibreSSL, these functions have no effect. They are only provided because some application programs expect the API to be available when TLSv1.3 is supported. Using these functions is strongly discouraged because they provide marginal benefit in the first place even when implemented and used as designed, because they have absurdly complicated semantics, and because when they are used, inconspicuous oversights are likely to cause serious security vulnerabilities.RETURN VALUES
SSL_CTX_set_max_early_data(), SSL_set_max_early_data(), and SSL_SESSION_set_max_early_data() return 1 for success or 0 for failure. With LibreSSL, they always succeed.STANDARDS
RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3:- Section 2.3
- 0-RTT data
- Section 4.2.10
- Early Data Indication
- Section 8
- 0-RTT and Anti-Replay
- Appendix E.5
- Replay Attacks on 0-RTT