[PATCH] SSL: guard use of SSL_R_BLOCK_CIPHER_PAD_IS_WRONG
Piotr Sikora
piotr at cloudflare.com
Thu Jun 18 10:39:37 UTC 2015
# HG changeset patch
# User Piotr Sikora <piotr at cloudflare.com>
# Date 1434623802 25200
# Thu Jun 18 03:36:42 2015 -0700
# Node ID 2cf1105061a2e952865f81ffad560c5e9b0843fa
# Parent c3ec43580a48114dfd28186f43e773fcfe211337
SSL: guard use of SSL_R_BLOCK_CIPHER_PAD_IS_WRONG.
It has been removed from BoringSSL.
Signed-off-by: Piotr Sikora <piotr at cloudflare.com>
diff -r c3ec43580a48 -r 2cf1105061a2 src/event/ngx_event_openssl.c
--- a/src/event/ngx_event_openssl.c Wed Jun 17 17:57:34 2015 +0300
+++ b/src/event/ngx_event_openssl.c Thu Jun 18 03:36:42 2015 -0700
@@ -1905,7 +1905,9 @@ ngx_ssl_connection_error(ngx_connection_
/* handshake failures */
if (n == SSL_R_BAD_CHANGE_CIPHER_SPEC /* 103 */
+#ifdef SSL_R_BLOCK_CIPHER_PAD_IS_WRONG
|| n == SSL_R_BLOCK_CIPHER_PAD_IS_WRONG /* 129 */
+#endif
|| n == SSL_R_DIGEST_CHECK_FAILED /* 149 */
|| n == SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST /* 151 */
|| n == SSL_R_EXCESSIVE_MESSAGE_SIZE /* 152 */
More information about the nginx-devel
mailing list