Fix return code for truncated DTLS fragment.
authorAdam Langley <agl@imperialviolet.org>
Fri, 6 Jun 2014 21:44:20 +0000 (14:44 -0700)
committerMatt Caswell <matt@openssl.org>
Wed, 6 Aug 2014 21:02:00 +0000 (22:02 +0100)
commitfc15c440498f815e384f496c5913fe1db9f69a28
tree49e7f2169fefe5e32ddaf60a8a44b3109aba892d
parent445598b35e16090b676bb168807da06518658b34
Fix return code for truncated DTLS fragment.

Previously, a truncated DTLS fragment in
|dtls1_process_out_of_seq_message| would cause *ok to be cleared, but
the return value would still be the number of bytes read. This would
cause |dtls1_get_message| not to consider it an error and it would
continue processing as normal until the calling function noticed that
*ok was zero.

I can't see an exploit here because |dtls1_get_message| uses
|s->init_num| as the length, which will always be zero from what I can
see.

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Emilia Käsper <emilia@openssl.org>
ssl/d1_both.c