*/
prefix = s->s3.need_empty_fragments
&& !clear
- && !s->s3.empty_fragment_done
&& templates[0].type == SSL3_RT_APPLICATION_DATA;
if (rl->numwpipes < numtempl + prefix) {
prefixtempl.type = SSL3_RT_APPLICATION_DATA;
wpinited = 1;
- /* TODO(RECLAYER): Do we actually need this? */
- s->s3.empty_fragment_done = 1;
-
wb = &rl->wbuf[0];
/* TODO(RECLAYER): This alignment calculation no longer seems right */
#if defined(SSL3_ALIGN_PAYLOAD) && SSL3_ALIGN_PAYLOAD!=0
if (++(rl->nextwbuf) < rl->numwpipes)
continue;
s->rwstate = SSL_NOTHING;
- /*
- * Next chunk of data should get another prepended empty fragment
- * in ciphersuites with known-IV weakness:
- */
- s->s3.empty_fragment_done = 0;
if (rl->nextwbuf == rl->numwpipes
&& (rl->mode & SSL_MODE_RELEASE_BUFFERS) != 0)
unsigned char client_random[SSL3_RANDOM_SIZE];
/* flags for countermeasure against known-IV weakness */
int need_empty_fragments;
- int empty_fragment_done;
/* used during startup, digest all incoming/outgoing packets */
BIO *handshake_buffer;
/*