Hanno Becker 37ae952923 Move dropping of unexpected AD records to after record decryption
With the introduction of the CID extension, the record content type
may change during decryption; we must therefore re-consider every
record content type check that happens before decryption, and either
move or duplicate it to ensure it also applies to records whose
real content type is only revealed during decryption.

This commit does this for the silent dropping of unexpected
ApplicationData records in DTLS. Previously, this was caught
in ssl_parse_record_header(), returning
MBEDTLS_ERR_SSL_UNEXPECTED_RECORD which in ssl_get_next_record()
would lead to silent skipping of the record.

When using CID, this check wouldn't trigger e.g. when delayed
encrypted ApplicationData records come on a CID-based connection
during a renegotiation.

This commit moves the check to mbedtls_ssl_handle_message_type()
and returns MBEDTLS_ERR_SSL_NON_FATAL if it triggers, which leads
so silent skipover in the caller mbedtls_ssl_read_record().
2019-06-03 16:07:50 +01:00
..
2019-02-19 17:59:00 +00:00
2019-04-02 10:07:28 -07:00
2019-04-02 10:07:28 -07:00
2019-02-19 17:59:00 +00:00
2019-02-19 17:59:00 +00:00
2019-04-30 16:47:36 +01:00
2019-02-19 17:59:00 +00:00
2019-05-23 03:01:35 -04:00
2015-09-04 14:21:07 +02:00
2019-02-05 05:09:05 -05:00
2015-09-04 14:21:07 +02:00
2019-02-19 17:59:00 +00:00
2019-02-19 17:59:00 +00:00
2019-06-03 14:42:08 +01:00