forked from wolfSSL/wolfssl
Async Sniffer: Fix for decryption after second handshake
This commit is contained in:
@ -4692,6 +4692,7 @@ static int DecryptTls(WOLFSSL* ssl, byte* plain, const byte* input,
|
|||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
|
||||||
#ifdef WOLFSSL_ASYNC_CRYPT
|
#ifdef WOLFSSL_ASYNC_CRYPT
|
||||||
|
if (ssl->decrypt.state != CIPHER_STATE_BEGIN) {
|
||||||
ret = wolfSSL_AsyncPop(ssl, &ssl->decrypt.state);
|
ret = wolfSSL_AsyncPop(ssl, &ssl->decrypt.state);
|
||||||
if (ret != WC_NOT_PENDING_E) {
|
if (ret != WC_NOT_PENDING_E) {
|
||||||
/* check for still pending */
|
/* check for still pending */
|
||||||
@ -4702,6 +4703,7 @@ static int DecryptTls(WOLFSSL* ssl, byte* plain, const byte* input,
|
|||||||
|
|
||||||
/* let failures through so CIPHER_STATE_END logic is run */
|
/* let failures through so CIPHER_STATE_END logic is run */
|
||||||
}
|
}
|
||||||
|
}
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
{
|
{
|
||||||
|
Reference in New Issue
Block a user