Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix failing test_dtls_frag_ch #7914

Merged
merged 1 commit into from
Sep 5, 2024
Merged

Conversation

julek-wolfssl
Copy link
Member

  • Add option to disable ECH
  • InitSuites: clean up DTLS paths
  • wolfSSL_parse_cipher_list: remove WOLFSSL_MAX_SUITE_SZ setting
  • wolfSSL_parse_cipher_list: add rationale for keeping ciphersuites
  • test_dtls_frag_ch: ECH and ciphersuites were pushing the ClientHello message over the fragmentation limit. Disabling ECH and limiting ciphersuites fixes the test.

@julek-wolfssl julek-wolfssl self-assigned this Aug 28, 2024
@julek-wolfssl julek-wolfssl linked an issue Aug 28, 2024 that may be closed by this pull request
@douzzer douzzer assigned julek-wolfssl and unassigned wolfSSL-Bot Aug 29, 2024
- Add option to disable ECH
- InitSuites: clean up DTLS paths
- wolfSSL_parse_cipher_list: remove WOLFSSL_MAX_SUITE_SZ setting
- wolfSSL_parse_cipher_list: add rationale for keeping ciphersuites
- test_dtls_frag_ch: ECH and ciphersuites were pushing the ClientHello message over the fragmentation limit. Disabling ECH and limiting ciphersuites fixes the test.
@douzzer douzzer merged commit a3fea48 into wolfSSL:master Sep 5, 2024
133 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Bug]: DTLS fragmentation is broken
3 participants