Fix flaky BadRSAClientKeyExchange-1 test.
Sometimes BadRSAClientKeyExchange-1 fails with DATA_TOO_LARGE_FOR_MODULUS if the corruption brings the ciphertext above the RSA modulus. Ensure this does not happen. Change-Id: I0d8ea6887dfcab946fdf5d38f5b196f5a927c4a9 Reviewed-on: https://boringssl-review.googlesource.com/6731 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
423488557c
commit
f28dd64d43
@ -165,7 +165,9 @@ func (ka *rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello
|
||||
return nil, nil, err
|
||||
}
|
||||
if bad == RSABadValueCorrupt {
|
||||
encrypted[0] ^= 1
|
||||
encrypted[len(encrypted)-1] ^= 1
|
||||
// Clear the high byte to ensure |encrypted| is still below the RSA modulus.
|
||||
encrypted[0] = 0
|
||||
}
|
||||
ckx := new(clientKeyExchangeMsg)
|
||||
if clientHello.vers != VersionSSL30 {
|
||||
|
Loading…
Reference in New Issue
Block a user