Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

axTSL client_hello cipher verification failure (GIT8266O-269) #65

Open
wants to merge 1 commit into
base: 1.4.x
Choose a base branch
from

Conversation

mast
Copy link

@mast mast commented Sep 2, 2016

Fixed axTLS bug of wrong cipher extraction from client_hello during SSL handshake.
See issue #66 for detailed explanation.

@@ -150,7 +150,7 @@ static int ICACHE_FLASH_ATTR process_client_hello(SSL *ssl)

offset += id_len;
cs_len = (buf[offset]<<8) + buf[offset+1];
offset += 3; /* add 1 due to all cipher suites being 8 bit */
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

And this is wrong, as later in the code they check 16 bit ciphers. And since they missed high byte of the chiper, they check low byte of chiper + high byte of next cipher, which is wrong.

@CLAassistant
Copy link

CLAassistant commented Sep 14, 2019

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.


Max Stepanov seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account.
You have signed the CLA already but the status is still pending? Let us recheck it.

@github-actions github-actions bot changed the title axTSL client_hello cipher verification failure axTSL client_hello cipher verification failure (GIT8266O-269) Sep 14, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants