Dear all,
the attached patch solves the reported issue. With the attached patch all tests
in
the test directory pass using openssl configured with sctp support.
Tested on Ubuntu 14.04 and Mac OS X.
Best regards
Michael
BIO_dgram_is_sctp.patch
Description: Binary data
This patch ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest consumes the sequence number 0. The subsequent
ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
be 1 if a HelloRequest was
This patch ensures that
* A HelloRequest is retransmitted if not responded by a ClientHello
* The HelloRequest consumes the sequence number 0. The subsequent
ServerHello uses the sequence number 1.
* The client also expects the sequence number of the ServerHello to
be 1 if a HelloRequest was
On Aug 11, 2013, at 3:33 PM, The default queue via RT r...@openssl.org wrote:
Greetings,
This message has been automatically generated in response to the
creation of a trouble ticket regarding:
[openssl.org #3041[PATCH] DTLS message_sequence number wrong in
rehandshake ServerHello
The attached patch fixes 1.0.0-stable and 1.0.1-stable such that
BIO_new_accept(8080)
will bind an IPv4 or IPv6 socket, which depends on the system.
stable-0.9.8 would use an IPv4 socket.
BIO_new_accept(::8080)
will bind an IPv6 socket.
BIO_new_accept(*:8080)
will bind an IPv4 socket.
Best
Here is an updated patch which compiles without warnings on gcc 4.4.
It only patches the applications and requires the updated patch
for #2069.
Best regards
Michael
appsv6.patch
Description: Binary data
On Sep 23, 2009, at 8:39 AM, The default queue via RT wrote:
Greetings,
This
Here is an updated patch. It uses the union pattern to deal with
sockaddr_storage. It compiles without warnings on gcc 4.4.
Best regards
Michael
dtlsv6.patch
Description: Binary data
On Oct 3, 2009, at 10:44 AM, The default queue via RT wrote:
Greetings,
This message has been
This patch fixes an warning on platforms not defining OPENSSL_USE_IPV6.
Best regards
Michael
appsv6.patch
Description: Binary data
On Sep 23, 2009, at 8:39 AM, The default queue via RT wrote:
Greetings,
This message has been automatically generated in response to the
creation of a
Dear all,
this patch fixes the address handling in the DTLS code to support
IPv6.
Best regards
Michael
dtlsv6.patch
Description: Binary data
Hi Arkadiusz,
by looking at the OpenSSL code I think it supports some
legacy platforms which have very limited support. So I
prefer not to break them and this is done most easily by
by not touching the code for platforms not defining
OPENSSL_USE_IPV6.
For OpenSSH thinks might be different, I do
This patch adds support for IPv6 for s_client and s_server and
fixes the IPv6 handling for DTLS.
s_server will listen on IPv4 and IPv6 as default. When using -4
as an argument, it will listen only on IPv4, when using -6 as
an argument, it will listen only on IPv6.
The client will use IPv4 as
Dear all,
the attached patch fixes the handling of error cases:
* For dgram bios use always BIO_dgram_should_retry() instead
of BIO_scok_should_retry().
* ENOTCONN is a fatal error.
* EMSGSIZE is a fatal error, not related to path MTU.
Thanks to Daniel Mentz, who pointed out the incorrect
I'm also working on IPv6 support (also for the openssl s_client and
s_server apps). I use code like
#if OPENSSL_USE_IPV6
struct sockaddr_storage server, client;
#else
struct sockaddr_in server, client;
#endif
This should be portable.
Best regards
Michael
On Sep 18, 2009, at
Hi Robin,
the problem is that the variable LIBDIR is not set. The
attached patch fixes the problem.
Best regards
Michael
Makefile.org.patch
Description: Binary data
On Aug 23, 2009, at 3:22 PM, Robin Seggelmann via RT wrote:
When configuring OpenSSL with ./config shared
errors from that code path to the user.
So I changed that check to an assertion. An updated patch is
attached.
Thanks for testing the patch.
Best regards
Michael
fragmentation1.patch
Description: Binary data
On Aug 13, 2009, at 12:34 PM, Daniel Mentz wrote:
Michael Tuexen via RT wrote
Dear all,
the attached patch fixes a bug where a single user message
was distributed over multiple DTLS records.
Best regards
Michael
fragmentation.patch
Description: Binary data
When using s_client and s_server with DTLS and the -msg arg,
the message types are not printed.
This fixes adds support in the corresponding callback for
printing DTLS message types.
s_cb.c.patch
Description: Binary data
Dear all,
I agree with Daniel that reading a record from multiple UDP packets
is a bug. I need some time to figure out if the proposed fix is the
right one.
Robin is on holiday for two weeks.
Best regards
Michael
On Jul 8, 2009, at 10:15 PM, Daniel Mentz wrote:
ssl3_read_n() was conceived to
Dear all,
I have looked at the patch provided by Daniel. All suggested changes are
OK, but there are two additional things which should be fixed:
1. In ssl3_read_n() the argument max is overwritten before used.
2. If additional data is behind a valid DTLS record in the UDP packet,
it is
Dear all,
please find attached a patch which adds support for ECDHE and PSK
support for DTLS as requested by Stephen.
The diff is against openssl-1.0.0-beta2.
Stephen: Please let me know if you have any issues with the patch.
Best regards
Michael
dtls.patch
Description: Binary data
On
Dear all,
please find attached in in-lined an updated version of the patch
for the path MTU detection.
The library stores the maximum DTLS packet size and converts to
that when using the example programs which run only over IPv4
and UDP.
On Linux the path MTU infrastructure is used, which is
21 matches
Mail list logo