Topic: Documented wolfSSL embedded ssl bug fix from old forums

1.
      panpipi

      [Avatar]
      2006-09-22 16:27:10 UTC
      Hi,

      It seems that I found a serious bug in yaSSL C library.

      When my client calls SSL_Write() with a long msg of length 13173 bytes, the peer server has problem in SSL_Read() to decoding the long msg because the long msg actually arrives at server in 3 pieces.

      It seems SSL_read should buffer msgs till complete SSL packet arrives before it goes on decoding.

      Please help look into this problem if it is one.

      Thanks.

      Peter
   2.
      touskaProject Admin

      [Avatar]
      2006-09-22 19:10:02 UTC
      Yes, that's right. wolfSSL should buffer incomplete messages like yaSSL does, I'll fix this.

      Thanks for the report.
   3.
      panpipi

      [Avatar]
      2006-09-22 21:03:24 UTC
      Hi,

      It is great. Thanks for the prompt response!

      By the way, most functions in the library need some self-protection, eg. verifying input SSL* parameter not null, verifying that incompatible methods parameter of SSL_CTX_new() on either side won't cause core dump. I ignorantly set my SSL server to use TLSv1_client_method() which caused the server to crash in SSL_Accept() or MD5Update().

      Peter

Share