-
-
Notifications
You must be signed in to change notification settings - Fork 15.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handshake failed on netty 4.1.21 running under Android 5.0 #7758
Comments
@MarkVilkel yes I think so... let me check |
Motivation: Android 5.0 sometimes not correctly update the bytesConsumed of the SSLEngineResult when consuming data from the input ByteBuffer. This will lead to handshake failures. Modifications: Add a workaround for Android 5.0 Result: Be able to use netty on Android 5.0 by fixing #7758 .
@MarkVilkel #7761 PTAL if this fixed it |
Motivation: Android 5.0 sometimes not correctly update the bytesConsumed of the SSLEngineResult when consuming data from the input ByteBuffer. This will lead to handshake failures. Modifications: Add a workaround for Android 5.0 Result: Be able to use netty on Android 5.0 by fixing #7758 .
@normanmaurer thank you for a quick fix. |
@MarkVilkel do you see this problem with a Android 5.0 client talking SSL with a Netty server eg. standalone java app, or using Netty inside an Android application on 5.0? |
@johnou we have an android application with netty client inside it connecting to netty transport server. Problem appeared only on Android 5.0 |
Motivation: Android 5.0 sometimes not correctly update the bytesConsumed of the SSLEngineResult when consuming data from the input ByteBuffer. This will lead to handshake failures. Modifications: Add a workaround for Android 5.0 Result: Be able to use netty on Android 5.0 by fixing #7758 .
Hi!
I've got an exception on Android 5.0 with netty 4.1.21:
So Android app is unable to establish ssl connection.
I have had the same error when we were using mina library, however I've solved it by adding:
like it was suggested by Internets in org.apache.mina.filter.support.SSLHandler.unwrap0() method:
As I understand this is Android problem, described here https://issuetracker.google.com/issues/37017560
But we still have clients using Android 5.0, so we can not just ignore them.
Is not it possible to have such workaround in netty?
The text was updated successfully, but these errors were encountered: