Don't generate a MAC when using KTLS.
The kernel will generate the MAC when transmitting the frame. Doing so here causes the MAC to be included as part of the plain text that the kernel MACs and encrypts. Note that this path is not taken when using stitched cipher suites. Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/10045)
This commit is contained in:
parent
1ca50aa975
commit
f059e4cc43
1 changed files with 1 additions and 1 deletions
|
@ -986,7 +986,7 @@ int do_ssl3_write(SSL *s, int type, const unsigned char *buf,
|
|||
* in the wb->buf
|
||||
*/
|
||||
|
||||
if (!SSL_WRITE_ETM(s) && mac_size != 0) {
|
||||
if (!BIO_get_ktls_send(s->wbio) && !SSL_WRITE_ETM(s) && mac_size != 0) {
|
||||
unsigned char *mac;
|
||||
|
||||
if (!WPACKET_allocate_bytes(thispkt, mac_size, &mac)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue