summaryrefslogtreecommitdiffstats
path: root/test/ssl_test_ctx.h
diff options
context:
space:
mode:
authorMichael Tuexen <tuexen@fh-muenster.de>2018-12-26 12:44:53 +0100
committerMatt Caswell <matt@openssl.org>2019-02-01 12:57:19 +0100
commit09d62b336d9e2a11b330d45d4f0f3f37cbb0d674 (patch)
tree15525fb485d6460fe0197194ffac5bed06f7a8b7 /test/ssl_test_ctx.h
parentpoly1305/asm/poly1305-ppc.pl: add vector base 2^26 implementation. (diff)
downloadopenssl-09d62b336d9e2a11b330d45d4f0f3f37cbb0d674.tar.xz
openssl-09d62b336d9e2a11b330d45d4f0f3f37cbb0d674.zip
Fix end-point shared secret for DTLS/SCTP
When computing the end-point shared secret, don't take the terminating NULL character into account. Please note that this fix breaks interoperability with older versions of OpenSSL, which are not fixed. Fixes #7956 Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/7957)
Diffstat (limited to '')
-rw-r--r--test/ssl_test_ctx.h4
1 files changed, 4 insertions, 0 deletions
diff --git a/test/ssl_test_ctx.h b/test/ssl_test_ctx.h
index 8fa3af0a50..3a21ac52d9 100644
--- a/test/ssl_test_ctx.h
+++ b/test/ssl_test_ctx.h
@@ -214,6 +214,10 @@ typedef struct {
STACK_OF(X509_NAME) *expected_client_ca_names;
/* Whether to use SCTP for the transport */
int use_sctp;
+ /* Enable SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG on client side */
+ int enable_client_sctp_label_bug;
+ /* Enable SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG on server side */
+ int enable_server_sctp_label_bug;
/* Whether to expect a session id from the server */
ssl_session_id_t session_id_expected;
char *expected_cipher;