-
Notifications
You must be signed in to change notification settings - Fork 834
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: wolfSSL QUIC handshake failure #7390
Comments
Hey, Does this mean that instead of using the CCM mode, the CTR mode was always used? |
QUIC handshake is now failing in tests at ngtcp2 and curl CI. Easiest to reproduce probably in ngtcp2. Build https://github.com/ngtcp2/ngtcp2 as in the instructions with wolfssl and another tls lib (openssl-quictls or gnutls or boring). Run pytest:
You see that wolfssl can only connect if it is used in client and server. The problem seems to be cipher selection as in the logs you'll see ` pkt packet has incorrect reserved bits...pkt could not decrypt packet payload" |
#7477 will fix that. My previous commit was wrongly assuming what |
Contact Details
[email protected]
Version
all
Description
As reported in ngtcp2/ngtcp2#1193. Fixing the returned ciper in
wolfssl/src/quic.c
Line 997 in c768f76
from wolfSSL_EVP_aes_128_ctr to wolfSSL_EVP_aes_128_ccm fixes the assertion failure, but handshake still fails for some reason.
Reproduction steps
No response
Relevant log output
No response
The text was updated successfully, but these errors were encountered: