-
Notifications
You must be signed in to change notification settings - Fork 851
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AEAD payload length check #2591
AEAD payload length check #2591
Conversation
19d1d77
to
ec6a45b
Compare
A question is what to do with the
|
There was generally a controversy around the
Therefore I think it should be possible to kinda repurpose this option for something else, and this way:
|
BTW |
Codecov Report
@@ Coverage Diff @@
## master #2591 +/- ##
==========================================
+ Coverage 66.35% 66.36% +0.01%
==========================================
Files 99 99
Lines 19822 19826 +4
==========================================
+ Hits 13153 13158 +5
+ Misses 6669 6668 -1
📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more |
If AES-GCM is enabled, 16 bytes of the payload are occupied for the authentication tag.
Hence the payload size must be properly validated when submitted to the SND buffer.
Once a connection is established and the MTU value is negotiated (minimum of the two), this value is used to determine the maximum allowed payload size. Thus any payload exceeding the value is not allowed to be sent.
Also fixes #2589.
Also fixes
CSndBuffer::addBufferFromFile(..)
: wrong usage ofiPktLen
.Example Test Case 01