Fix server-side KeyUpdates.
We sized the post-handshake message limit for the older zero-length KeyUpdate and forgot to update it when it got larger. Thanks to Matt Caswell for catching this. Change-Id: I7d2189479e9516fbfb6c195dfa367794d383582c Reviewed-on: https://boringssl-review.googlesource.com/13805 Reviewed-by: Steven Valdez <svaldez@google.com> Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
This commit is contained in:
parent
bc6ef7a83f
commit
7ebe61a585
@ -496,7 +496,7 @@ size_t ssl_max_handshake_message_len(const SSL *ssl) {
|
||||
if (ssl->server) {
|
||||
/* The largest acceptable post-handshake message for a server is a
|
||||
* KeyUpdate. We will never initiate post-handshake auth. */
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* Clients must accept NewSessionTicket and CertificateRequest, so allow the
|
||||
|
@ -2290,7 +2290,16 @@ func addBasicTests() {
|
||||
expectedError: ":WRONG_VERSION_NUMBER:",
|
||||
},
|
||||
{
|
||||
name: "KeyUpdate",
|
||||
name: "KeyUpdate-Client",
|
||||
config: Config{
|
||||
MaxVersion: VersionTLS13,
|
||||
},
|
||||
sendKeyUpdates: 1,
|
||||
keyUpdateRequest: keyUpdateNotRequested,
|
||||
},
|
||||
{
|
||||
testType: serverTest,
|
||||
name: "KeyUpdate-Server",
|
||||
config: Config{
|
||||
MaxVersion: VersionTLS13,
|
||||
},
|
||||
|
Loading…
Reference in New Issue
Block a user