Closed nicho2 closed 2 years ago
Bonjour nicho2!
And thank you for your report. As you probably noticed, master is unreleased and Windows is still unsupported in the latest released version. Moreover, although the error message your report is different, this can be reproduced with #41 on master and I would prefer if you could keep the discussion there.
Finally, I have also tried to reduce the size of the buffers but that did not help. I do, however, accept patches.
in my case, i have replace in tls.pyx
in accept method: data, address = self._socket.recvfrom(1, _socket.MSG_PEEK) by data, address = self._socket.recvfrom(1024, _socket.MSG_PEEK)
C'est possible!
I am currently a bit short of time but I should be able to check your fix next week. You cannot imagine how much time I have already spent on that bug! It might as well be something trivial.
Cheers!
The tests are indeed green with your fix. Thank you again!
I am submitting a …
Description
I have : -1- Download-mbedTLS.PS1 (version 2.16.9) -2- Install-mbedTLS.PS1 -3- launch python setup.py install (my python version is 3.7.8 all seems OK
I try DTLS example (DTLS client and server)
Current behavior
when the client try to do handshake, the server give an exception:
Traceback (most recent call last): File "", line 1, in
File "src\mbedtls\tls.pyx", line 1557, in mbedtls.tls.TLSWrappedSocket.accept
OSError: [WinError 10040] Un message envoyé sur un socket datagramme était plus volumineux que le tampon de messages interne ou qu’une autre limite réseau ou bien le tampon utilisé pour recevoir un datagramme était plus petit que le datagramme lui-même
it's at the moment where the server receive the "client hello" def accept(self): if self.type == _socket.SOCK_STREAM: conn, address = self._socket.accept() else: data, address = self._socket.recvfrom(1, _socket.MSG_PEEK)
Expected behavior
No exception
Steps to reproduce
1.Run server 2.Run client
Minimal demo of the problem
code server :
-- code client
Other information