Verify that we have a sensible message len and fail if not
authorMatt Caswell <matt@openssl.org>
Mon, 1 Dec 2014 11:10:38 +0000 (11:10 +0000)
committerMatt Caswell <matt@openssl.org>
Wed, 3 Dec 2014 09:32:48 +0000 (09:32 +0000)
commit8454d3f924bb642665679353dee983f7d325f714
tree6efddd34f04bf1ea2886789ce64c2f4c2307b9c7
parent5004c22c25af92358eaab4ac515686d096a0f84c
Verify that we have a sensible message len and fail if not
RT#3592 provides an instance where the OPENSSL_assert that this commit
replaces can be hit. I was able to recreate this issue by forcing the
underlying BIO to misbehave and come back with very small mtu values. This
happens the second time around the while loop after we have detected that the
MTU has been exceeded following the call to dtls1_write_bytes.

Reviewed-by: Tim Hudson <tjh@openssl.org>
(cherry picked from commit cf75017bfd60333ff65edf9840001cd2c49870a3)
ssl/d1_both.c