ssl/[d1|s3]_pkt.c: harmomize orig_len handling.
authorAndy Polyakov <appro@openssl.org>
Thu, 7 Feb 2013 21:47:05 +0000 (22:47 +0100)
committerAndy Polyakov <appro@openssl.org>
Thu, 7 Feb 2013 21:47:05 +0000 (22:47 +0100)
ssl/d1_pkt.c
ssl/s3_pkt.c

index b0302a74d44f5fa5007136f5d6460f24f6d227f4..0bf87be6d21000f19ae070f1d836a7920ca4f10f 100644 (file)
@@ -410,7 +410,6 @@ dtls1_process_record(SSL *s)
 
        /* decrypt in place in 'rr->input' */
        rr->data=rr->input;
-       orig_len=rr->length;
 
        enc_err = s->method->ssl3_enc->enc(s,0);
        /* enc_err is:
@@ -442,6 +441,9 @@ printf("\n");
                mac_size=EVP_MD_CTX_size(s->read_hash);
                OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE);
 
+               /* kludge: *_cbc_remove_padding passes padding length in rr->type */
+               orig_len = rr->length+((unsigned int)rr->type>>8);
+
                /* orig_len is the length of the record before any padding was
                 * removed. This is public information, as is the MAC in use,
                 * therefore we can safely process the record in a different
index bf8da9843ea5839b16fc0d00abea604350678ead..804291e27c32b9190dd68c99b8a60acfd64683c7 100644 (file)
@@ -398,7 +398,6 @@ fprintf(stderr, "Record type=%d, Length=%d\n", rr->type, rr->length);
 
        /* decrypt in place in 'rr->input' */
        rr->data=rr->input;
-       orig_len=rr->length;
 
        enc_err = s->method->ssl3_enc->enc(s,0);
        /* enc_err is:
@@ -429,6 +428,9 @@ printf("\n");
                mac_size=EVP_MD_CTX_size(s->read_hash);
                OPENSSL_assert(mac_size <= EVP_MAX_MD_SIZE);
 
+               /* kludge: *_cbc_remove_padding passes padding length in rr->type */
+               orig_len = rr->length+((unsigned int)rr->type>>8);
+
                /* orig_len is the length of the record before any padding was
                 * removed. This is public information, as is the MAC in use,
                 * therefore we can safely process the record in a different