Remove redundant length-0 checks for incoming unprotected records
This commit is contained in:
parent
31c3b14e37
commit
3be264e2c3
1 changed files with 1 additions and 2 deletions
|
@ -5027,8 +5027,7 @@ static int ssl_parse_record_header( mbedtls_ssl_context *ssl )
|
|||
/* Check length against bounds of the current transform and version */
|
||||
if( ssl->transform_in == NULL )
|
||||
{
|
||||
if( ssl->in_msglen < 1 ||
|
||||
ssl->in_msglen > MBEDTLS_SSL_IN_CONTENT_LEN )
|
||||
if( ssl->in_msglen > MBEDTLS_SSL_IN_CONTENT_LEN )
|
||||
{
|
||||
MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad message length" ) );
|
||||
return( MBEDTLS_ERR_SSL_INVALID_RECORD );
|
||||
|
|
Loading…
Reference in a new issue