On Fri, 25 Oct 2024 23:44:50 GMT, Artur Barashev <abaras...@openjdk.org> wrote:
>> 1. If we got through the `bb.remaining() <= tagSize` arm, we're not going to >> be encrypted. I think we are safe here. >> 2. I would dump the alert level (fatal/warning) + reason. >> 3. `bb` size definitely needs to be checked. e.g. if `bb.remaining() == 0`, >> the `bb.position() + 1` will IOOBE. > > - Alert level is ignored in TLSv1.3, but we can sure include it it as well > - Why are we not sure that alert is plaintext? If alert is not a plaintext > then contentType will be 23 and we throw BadPaddingException as we should > - About the bb size: the upstream code > (SSLEngineInputRecord/SSLSocketInputRecord) actually makes sure those bytes > are present. The above `if (contentType == > ContentType.CHANGE_CIPHER_SPEC.id)` code also doesn't include the bb size > check. For example, there is a man-in-the-middle message. ------------- PR Review Comment: https://git.openjdk.org/jdk/pull/21043#discussion_r1817700298