(int)taglen, NULL) <= 0
|| EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_CCM_SET_IV_FIXED,
(int)ivlen, iv) <= 0
- /*
- * TODO(RECLAYER): Why do we defer setting the key until here?
- * why not in the initial EVP_DecryptInit_ex() call?
- */
|| !EVP_DecryptInit_ex(ciph_ctx, NULL, NULL, key, NULL)) {
ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
return OSSL_RECORD_RETURN_FATAL;
seq = rl->sequence;
if (rl->isdtls) {
- /* TODO(RECLAYER): FIXME */
- /* DTLS does not support pipelining */
unsigned char dtlsseq[8], *p = dtlsseq;
s2n(rl->epoch, p);
}
if (rl->isdtls) {
- /* TODO(RECLAYER): FIX ME */
unsigned char dtlsseq[8], *p = dtlsseq;
s2n(rl->epoch, p);
do {
rr = &sc->rlayer.tlsrecs[sc->rlayer.num_recs];
- /* TODO(RECLAYER): Check HANDLE_RLAYER_RETURN for DTLS */
ret = HANDLE_RLAYER_RETURN(sc,
sc->rrlmethod->read_record(sc->rrl, &rr->rechandle,
&rr->version, &rr->type,
* If we got a retry or success then *ret is already correct,
* otherwise we need to convert the return value.
*/
- /*
- * TODO(RECLAYER): What does a non fatal err that isn't a retry even
- * mean???
- */
if (ret == OSSL_RECORD_RETURN_NON_FATAL_ERR || ret == OSSL_RECORD_RETURN_EOF)
ret = 0;
else if (ret < OSSL_RECORD_RETURN_NON_FATAL_ERR)