-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Fix dissection of TLS communication with NULL Cipher. #1986
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report
@@ Coverage Diff @@
## master #1986 +/- ##
=========================================
- Coverage 85.87% 84.37% -1.5%
=========================================
Files 187 187
Lines 43007 43007
=========================================
- Hits 36933 36288 -645
- Misses 6074 6719 +645
|
It would be great if you could add a unit test for that. For instance a packet to dissect. See the .uts files in test/. The format is custom (historic reasons), but quite self explicit 😄 |
Yeah I'm woring on UT. |
The Travis tests didn't because it's a draft. |
a211881
to
4182fb3
Compare
a13c347
to
076c355
Compare
8abee7d
to
cfbc067
Compare
Due to invalid handling of TLS record length, fields (MSG and MAC) were incorrectly interpreted in packets encrypted with NULL Cipher.
cfbc067
to
31ec77b
Compare
@gpotter2 is anything else which needs to be addressed? Could you please consider approving the change? |
Looks okay to me, though I'm not familiar enough with TLS to confirm it won't break anything. |
I had another look at this. The fix you've done seems wrong. The code clearly says the |
@gpotter2 thanks for the feedback. |
I am suite unsure that this is a correst fix.
|
Due to invalid handling of TLS record length, fields (MSG and MAC) were
incorrectly interpreted in packets encrypted with NULL Cipher.
fixes #1976