Skip to content

DTLS downgrade bug fixes#6668

Merged
SparkiDev merged 4 commits intowolfSSL:masterfrom
julek-wolfssl:zd/16515
Aug 3, 2023
Merged

DTLS downgrade bug fixes#6668
SparkiDev merged 4 commits intowolfSSL:masterfrom
julek-wolfssl:zd/16515

Conversation

@julek-wolfssl
Copy link
Copy Markdown
Member

  • DtlsShouldDrop: don't ignore app data sent before a SCR handshake
  • Require HAVE_SECURE_RENEGOTIATION for API that perform SCR (not just indication)
  • Add logging prefixes to api.c client and server

@julek-wolfssl julek-wolfssl self-assigned this Aug 1, 2023
@julek-wolfssl julek-wolfssl force-pushed the zd/16515 branch 2 times, most recently from 9d27092 to c6b871b Compare August 2, 2023 09:55
@julek-wolfssl
Copy link
Copy Markdown
Member Author

retest this please

@julek-wolfssl julek-wolfssl marked this pull request as ready for review August 3, 2023 13:00
@JacobBarthelmeh
Copy link
Copy Markdown
Contributor

ZD16515?

Copy link
Copy Markdown
Contributor

@JacobBarthelmeh JacobBarthelmeh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, would like a second review though where this impacts TLS 1.3 and not only DTLS 1.3 (https://github.com/wolfSSL/wolfssl/pull/6668/files#diff-927d62a3fce45ef1b7d9ba70df049ab4dc21ea53fc2491b5c006fc96c5af680eR11920)

@julek-wolfssl
Copy link
Copy Markdown
Member Author

Yes this addresses an issue found while working on ZD16515.

@SparkiDev SparkiDev merged commit 71f9162 into wolfSSL:master Aug 3, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants