diff options
author | Michael Tuexen <tuexen@fh-muenster.de> | 2018-12-26 12:44:53 +0100 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2019-02-01 12:57:19 +0100 |
commit | 09d62b336d9e2a11b330d45d4f0f3f37cbb0d674 (patch) | |
tree | 15525fb485d6460fe0197194ffac5bed06f7a8b7 /test/ssl_test_ctx.h | |
parent | poly1305/asm/poly1305-ppc.pl: add vector base 2^26 implementation. (diff) | |
download | openssl-09d62b336d9e2a11b330d45d4f0f3f37cbb0d674.tar.xz openssl-09d62b336d9e2a11b330d45d4f0f3f37cbb0d674.zip |
Fix end-point shared secret for DTLS/SCTP
When computing the end-point shared secret, don't take the
terminating NULL character into account.
Please note that this fix breaks interoperability with older
versions of OpenSSL, which are not fixed.
Fixes #7956
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7957)
Diffstat (limited to '')
-rw-r--r-- | test/ssl_test_ctx.h | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/test/ssl_test_ctx.h b/test/ssl_test_ctx.h index 8fa3af0a50..3a21ac52d9 100644 --- a/test/ssl_test_ctx.h +++ b/test/ssl_test_ctx.h @@ -214,6 +214,10 @@ typedef struct { STACK_OF(X509_NAME) *expected_client_ca_names; /* Whether to use SCTP for the transport */ int use_sctp; + /* Enable SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG on client side */ + int enable_client_sctp_label_bug; + /* Enable SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG on server side */ + int enable_server_sctp_label_bug; /* Whether to expect a session id from the server */ ssl_session_id_t session_id_expected; char *expected_cipher; |