Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix Handshake Flow issues #3441

Merged
merged 3 commits into from
Jun 18, 2020
Merged

Fix Handshake Flow issues #3441

merged 3 commits into from
Jun 18, 2020

Conversation

jacobkeeler
Copy link
Contributor

Fixes #3440

This PR is ready for review.

Risk

This PR makes no API changes.

Testing Plan

Test against steps in #3440

Summary

Fix cases where establishing a secured service can hang indefinitely

Changelog

Bug Fixes
  • Fix PTU timeout check in external policy code
  • Add error code check for InternalError security messages received from the proxy

CLA

jacobkeeler and others added 3 commits June 16, 2020 11:07
When attempting to start an encrypted service, the mobile proxy would not receive a response if the PTU timed out. This is because the retry count is based on the number of OnSystemRequests received from the HMI. Since that number would never exceed the number of retries, `IsAllowedRetryCountExceeded` would never return false. This will now return false after the final retry times out.
If the proxy responds with NOT_SUPPORTED or SSL_INVALID_DATA, Core will mark the handshake as failed.
@jacobkeeler jacobkeeler merged commit baf63ca into develop Jun 18, 2020
@jacobkeeler jacobkeeler deleted the fix/handshake_flow_failures branch June 18, 2020 15:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants