Topic: Documented wolfSSL embedded ssl bug fix from old forums
1.
panpipi
[Avatar]
2006-09-22 16:27:10 UTC
Hi,
It seems that I found a serious bug in yaSSL C library.
When my client calls SSL_Write() with a long msg of length 13173 bytes, the peer server has problem in SSL_Read() to decoding the long msg because the long msg actually arrives at server in 3 pieces.
It seems SSL_read should buffer msgs till complete SSL packet arrives before it goes on decoding.
Please help look into this problem if it is one.
Thanks.
Peter
2.
touskaProject Admin
[Avatar]
2006-09-22 19:10:02 UTC
Yes, that's right. wolfSSL should buffer incomplete messages like yaSSL does, I'll fix this.
Thanks for the report.
3.
panpipi
[Avatar]
2006-09-22 21:03:24 UTC
Hi,
It is great. Thanks for the prompt response!
By the way, most functions in the library need some self-protection, eg. verifying input SSL* parameter not null, verifying that incompatible methods parameter of SSL_CTX_new() on either side won't cause core dump. I ignorantly set my SSL server to use TLSv1_client_method() which caused the server to crash in SSL_Accept() or MD5Update().
Peter