openssl/ssl
Matt Caswell aefb925647 Don't attempt to send fragments > max_send_fragment in DTLS
We were allocating the write buffer based on the size of max_send_fragment,
but ignoring it when writing data. We should fragment handshake messages
if they exceed max_send_fragment and reject application data writes that
are too large.

Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3286)
2017-04-25 11:13:39 +01:00
..
record Don't attempt to send fragments > max_send_fragment in DTLS 2017-04-25 11:13:39 +01:00
statem Don't attempt to send fragments > max_send_fragment in DTLS 2017-04-25 11:13:39 +01:00
bio_ssl.c
build.info Move ssl/t1_ext.c to ssl/statem/extensions_cust.c 2017-04-07 13:41:04 +01:00
d1_lib.c
d1_msg.c Remove special case code for SCTP reneg handling 2017-04-25 11:13:39 +01:00
d1_srtp.c
methods.c
packet_locl.h
packet.c
pqueue.c
s3_cbc.c
s3_enc.c
s3_lib.c Remove ECDH(E) ciphers from SSLv3 2017-04-11 13:25:19 -04:00
s3_msg.c
ssl_asn1.c ASN.1: adapt our use of INTxx et al by making them explicitely embedded 2017-04-13 10:23:31 +02:00
ssl_cert.c Ignore dups in X509_STORE_add_* 2017-04-20 15:33:42 -04:00
ssl_ciph.c
ssl_conf.c SSL_CONF support for certificate_authorities 2017-04-03 23:47:21 +01:00
ssl_err.c Don't attempt to send fragments > max_send_fragment in DTLS 2017-04-25 11:13:39 +01:00
ssl_init.c
ssl_lib.c Don't fail the connection in SSLv3 if server selects ECDHE 2017-04-24 16:15:40 +01:00
ssl_locl.h Don't fail the connection in SSLv3 if server selects ECDHE 2017-04-24 16:15:40 +01:00
ssl_mcnf.c
ssl_rsa.c Create an ENDPOINT enum type for use internally 2017-04-07 13:41:04 +01:00
ssl_sess.c Move the extensions context codes into the public API 2017-04-07 13:41:04 +01:00
ssl_stat.c
ssl_txt.c
ssl_utst.c
t1_enc.c
t1_lib.c Don't fail the connection in SSLv3 if server selects ECDHE 2017-04-24 16:15:40 +01:00
t1_trce.c
tls13_enc.c Fix minor compiler issues. 2017-04-19 12:51:08 -04:00
tls_srp.c