mirror of
https://github.com/adulau/ssldump.git
synced 2024-11-22 01:17:04 +00:00
use macro to check if cipher is AEAD
This commit is contained in:
parent
6d136a5547
commit
32b343791a
3 changed files with 5 additions and 5 deletions
|
@ -142,7 +142,7 @@ int ssl_create_rec_decoder(dp,cs,mk,sk,iv)
|
||||||
This is necessary for AEAD ciphers, because we must wait to fully initialize the cipher
|
This is necessary for AEAD ciphers, because we must wait to fully initialize the cipher
|
||||||
in order to include the implicit IV
|
in order to include the implicit IV
|
||||||
*/
|
*/
|
||||||
if(cs->enc==0x3b || cs->enc==0x3c){
|
if(IS_AEAD_CIPHER(cs)){
|
||||||
sk=NULL;
|
sk=NULL;
|
||||||
iv=NULL;
|
iv=NULL;
|
||||||
}
|
}
|
||||||
|
@ -208,8 +208,7 @@ int ssl_decode_rec_data(ssl,d,ct,version,in,inl,out,outl)
|
||||||
UCHAR *mac,*iv,aead_tag[13],aead_nonce[12];
|
UCHAR *mac,*iv,aead_tag[13],aead_nonce[12];
|
||||||
|
|
||||||
CRDUMP("Ciphertext",in,inl);
|
CRDUMP("Ciphertext",in,inl);
|
||||||
|
if(IS_AEAD_CIPHER(d->cs)){
|
||||||
if(d->cs->enc==0x3b || d->cs->enc==0x3c){
|
|
||||||
memcpy(aead_nonce,d->implicit_iv->data,d->implicit_iv->len);
|
memcpy(aead_nonce,d->implicit_iv->data,d->implicit_iv->len);
|
||||||
memcpy(aead_nonce+d->implicit_iv->len,in,12-d->implicit_iv->len);
|
memcpy(aead_nonce+d->implicit_iv->len,in,12-d->implicit_iv->len);
|
||||||
in+=12-d->implicit_iv->len;
|
in+=12-d->implicit_iv->len;
|
||||||
|
|
|
@ -55,5 +55,6 @@ int ssl_create_rec_decoder PROTO_LIST((ssl_rec_decoder **dp,
|
||||||
int ssl_decode_rec_data PROTO_LIST((ssl_obj *ssl,ssl_rec_decoder *d,
|
int ssl_decode_rec_data PROTO_LIST((ssl_obj *ssl,ssl_rec_decoder *d,
|
||||||
int ct,int version,UCHAR *in,int inl,UCHAR *out,int *outl));
|
int ct,int version,UCHAR *in,int inl,UCHAR *out,int *outl));
|
||||||
|
|
||||||
|
#define IS_AEAD_CIPHER(cs) (cs->enc==0x3b||cs->enc==0x3c)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
|
@ -889,7 +889,7 @@ static int ssl_generate_keying_material(ssl,d)
|
||||||
/* Compute the key block. First figure out how much data
|
/* Compute the key block. First figure out how much data
|
||||||
we need*/
|
we need*/
|
||||||
/* Ideally find a cleaner way to check for AEAD cipher */
|
/* Ideally find a cleaner way to check for AEAD cipher */
|
||||||
needed=(ssl->cs->enc!=0x3b && ssl->cs->enc!=0x3c)?ssl->cs->dig_len*2:0;
|
needed=!IS_AEAD_CIPHER(ssl->cs)?ssl->cs->dig_len*2:0;
|
||||||
needed+=ssl->cs->bits / 4;
|
needed+=ssl->cs->bits / 4;
|
||||||
if(ssl->cs->block>1) needed+=ssl->cs->block*2;
|
if(ssl->cs->block>1) needed+=ssl->cs->block*2;
|
||||||
|
|
||||||
|
@ -902,7 +902,7 @@ static int ssl_generate_keying_material(ssl,d)
|
||||||
|
|
||||||
ptr=key_block->data;
|
ptr=key_block->data;
|
||||||
/* Ideally find a cleaner way to check for AEAD cipher */
|
/* Ideally find a cleaner way to check for AEAD cipher */
|
||||||
if(ssl->cs->enc!=0x3b && ssl->cs->enc!=0x3c){
|
if(!IS_AEAD_CIPHER(ssl->cs)){
|
||||||
c_mk=ptr; ptr+=ssl->cs->dig_len;
|
c_mk=ptr; ptr+=ssl->cs->dig_len;
|
||||||
s_mk=ptr; ptr+=ssl->cs->dig_len;
|
s_mk=ptr; ptr+=ssl->cs->dig_len;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue