[PATCH] SSL: guard use of SSL_R_BLOCK_CIPHER_PAD_IS_WRONG

Piotr Sikora piotr at cloudflare.com
Thu Jun 18 10:39:37 UTC 2015


# HG changeset patch
# User Piotr Sikora <piotr at cloudflare.com>
# Date 1434623802 25200
#      Thu Jun 18 03:36:42 2015 -0700
# Node ID 2cf1105061a2e952865f81ffad560c5e9b0843fa
# Parent  c3ec43580a48114dfd28186f43e773fcfe211337
SSL: guard use of SSL_R_BLOCK_CIPHER_PAD_IS_WRONG.

It has been removed from BoringSSL.

Signed-off-by: Piotr Sikora <piotr at cloudflare.com>

diff -r c3ec43580a48 -r 2cf1105061a2 src/event/ngx_event_openssl.c
--- a/src/event/ngx_event_openssl.c	Wed Jun 17 17:57:34 2015 +0300
+++ b/src/event/ngx_event_openssl.c	Thu Jun 18 03:36:42 2015 -0700
@@ -1905,7 +1905,9 @@ ngx_ssl_connection_error(ngx_connection_
 
             /* handshake failures */
         if (n == SSL_R_BAD_CHANGE_CIPHER_SPEC                        /*  103 */
+#ifdef SSL_R_BLOCK_CIPHER_PAD_IS_WRONG
             || n == SSL_R_BLOCK_CIPHER_PAD_IS_WRONG                  /*  129 */
+#endif
             || n == SSL_R_DIGEST_CHECK_FAILED                        /*  149 */
             || n == SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST              /*  151 */
             || n == SSL_R_EXCESSIVE_MESSAGE_SIZE                     /*  152 */



More information about the nginx-devel mailing list