mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-04 04:32:24 -05:00 
			
		
		
		
	Move size-check for DTLS record header with CID to DTLS-only branch
This commit is contained in:
		
							parent
							
								
									2fddd3765e
								
							
						
					
					
						commit
						e538d8287e
					
				@ -4924,6 +4924,18 @@ static int ssl_parse_record_header( mbedtls_ssl_context *ssl )
 | 
				
			|||||||
         * fixed in the configuration. */
 | 
					         * fixed in the configuration. */
 | 
				
			||||||
        ssl->in_len = ssl->in_cid + ssl->conf->cid_len;
 | 
					        ssl->in_len = ssl->in_cid + ssl->conf->cid_len;
 | 
				
			||||||
        ssl->in_iv  = ssl->in_msg = ssl->in_len + 2;
 | 
					        ssl->in_iv  = ssl->in_msg = ssl->in_len + 2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					        /* Now that the total length of the record header is known, ensure
 | 
				
			||||||
 | 
					         * that the current datagram is large enough to hold it.
 | 
				
			||||||
 | 
					         * This would fail, for example, if we received a datagram of
 | 
				
			||||||
 | 
					         * size 13 + n Bytes where n is less than the size of incoming CIDs.
 | 
				
			||||||
 | 
					         */
 | 
				
			||||||
 | 
					        ret = mbedtls_ssl_fetch_input( ssl, mbedtls_ssl_in_hdr_len( ssl ) );
 | 
				
			||||||
 | 
					        if( ret != 0 )
 | 
				
			||||||
 | 
					        {
 | 
				
			||||||
 | 
					            MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_fetch_input", ret );
 | 
				
			||||||
 | 
					            return( ret );
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
    else
 | 
					    else
 | 
				
			||||||
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
 | 
					#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
 | 
				
			||||||
@ -4955,16 +4967,6 @@ static int ssl_parse_record_header( mbedtls_ssl_context *ssl )
 | 
				
			|||||||
        return( MBEDTLS_ERR_SSL_INVALID_RECORD );
 | 
					        return( MBEDTLS_ERR_SSL_INVALID_RECORD );
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    /* Now that the total length of the record header is known, ensure
 | 
					 | 
				
			||||||
     * that the current datagram is large enough to hold it.
 | 
					 | 
				
			||||||
     * This would fail, for example, if we received a datagram of
 | 
					 | 
				
			||||||
     * size 13 + n Bytes where n is less than the size of incoming CIDs. */
 | 
					 | 
				
			||||||
    ret = mbedtls_ssl_fetch_input( ssl, mbedtls_ssl_in_hdr_len( ssl ) );
 | 
					 | 
				
			||||||
    if( ret != 0 )
 | 
					 | 
				
			||||||
    {
 | 
					 | 
				
			||||||
        MBEDTLS_SSL_DEBUG_RET( 1, "mbedtls_ssl_fetch_input", ret );
 | 
					 | 
				
			||||||
        return( ret );
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
    MBEDTLS_SSL_DEBUG_BUF( 4, "input record header", ssl->in_hdr, mbedtls_ssl_in_hdr_len( ssl ) );
 | 
					    MBEDTLS_SSL_DEBUG_BUF( 4, "input record header", ssl->in_hdr, mbedtls_ssl_in_hdr_len( ssl ) );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    /* Parse and validate record length
 | 
					    /* Parse and validate record length
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user