]> git.ipfire.org Git - thirdparty/openssl.git/commit
Fix handling of max_fragment_length extension for PSK
authorFrederik Wedel-Heinen <frederik.wedel-heinen@dencrypt.dk>
Tue, 28 May 2024 11:59:44 +0000 (13:59 +0200)
committerTomas Mraz <tomas@openssl.org>
Thu, 20 Jun 2024 14:51:55 +0000 (16:51 +0200)
commit76c16b4383cc35e98a5c53ac8014182be41ab87b
tree1a336692a69200e052696d55cd534bdb9da14710
parent528a4f2ef15f76ecb68a7c716c84d3c2b5fb755f
Fix handling of max_fragment_length extension for PSK

A psk session was assumed to be a resumption which failed a check
when parsing the max_fragment_length extension hello from the client.

Relevant code from PR#18130 which was a suggested fix to the issue
was cherry-picked.

Fixes #18121

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/24513)

(cherry picked from commit fa495604516a610d988f02298c8d97a6ac4777bb)
include/openssl/tls1.h
ssl/ssl_sess.c
ssl/statem/extensions.c
ssl/statem/extensions_srvr.c
ssl/t1_lib.c