account for DTLS extra header size when reading msg from pool

This commit is contained in:
Jacob Barthelmeh 2021-12-27 16:52:09 -07:00
parent 930cc053d5
commit 05a19c852b
4 changed files with 7 additions and 0 deletions

View File

@ -68,6 +68,7 @@ Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
* Fix for build with OPENSSL_EXTRA and NO_WOLFSSL_STUB both defined
* Use page aligned memory with ECDSA signing and KCAPI
* Skip expired sessions for TLS 1.3 rather than turning off the resume behavior
* Fix for DTLS handling dropped or retransmitted messages
### Improvements/Optimizations
###### Build Options and Warnings

1
README
View File

@ -147,6 +147,7 @@ Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
* Fix for build with OPENSSL_EXTRA and NO_WOLFSSL_STUB both defined
* Use page aligned memory with ECDSA signing and KCAPI
* Skip expired sessions for TLS 1.3 rather than turning off the resume behavior
* Fix for DTLS handling dropped or retransmitted messages
### Improvements/Optimizations
###### Build Options and Warnings

View File

@ -148,6 +148,7 @@ Release 5.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
* Fix for build with OPENSSL_EXTRA and NO_WOLFSSL_STUB both defined
* Use page aligned memory with ECDSA signing and KCAPI
* Skip expired sessions for TLS 1.3 rather than turning off the resume behavior
* Fix for DTLS handling dropped or retransmitted messages
### Improvements/Optimizations
###### Build Options and Warnings

View File

@ -8224,6 +8224,10 @@ int DtlsMsgPoolSend(WOLFSSL* ssl, int sendOnlyFirstPacket)
#endif
/* add back in header space from saved pool size */
sendSz += DTLS_HANDSHAKE_EXTRA;
sendSz += DTLS_RECORD_EXTRA;
if ((ret = CheckAvailableSize(ssl, sendSz)) != 0) {
WOLFSSL_ERROR(ret);
return ret;