Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DTLS 1.3: Fix and check uses of SSL3_HM_HEADER_LENGTH for dtls connections #24430

Draft
wants to merge 1 commit into
base: feature/dtls-1.3
Choose a base branch
from

Conversation

fwh-dc
Copy link
Contributor

@fwh-dc fwh-dc commented May 17, 2024

No description provided.

@fwh-dc fwh-dc changed the title Fix and check uses of SSL3_HM_HEADER_LENGTH for dtls connections DTLS 1.3: Fix and check uses of SSL3_HM_HEADER_LENGTH for dtls connections May 17, 2024
|| !WPACKET_put_bytes_u16(&hrrpkt, TLS1_2_VERSION)
if (!ssl_set_handshake_header(s, &hrrpkt, SSL3_MT_SERVER_HELLO)
/* ServerHello msg start*/
|| !WPACKET_put_bytes_u16(&hrrpkt, version1_2)
|| !WPACKET_memcpy(&hrrpkt, hrrrandom, SSL3_RANDOM_SIZE)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@t8m @mattcaswell I'd appreciate your input on how to set the sequence number and fragment offset/length fields for dtls here.

@fwh-dc fwh-dc marked this pull request as draft May 17, 2024 11:58
@mattcaswell mattcaswell added this to the DTLS-1.3 milestone May 31, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants