Fix TLS 1.3 seal logic. Check against the write encryption state, not the read state. Change-Id: Ib3d8e02800e37bd089ef02c67a0b7e5dc009b1a5 Reviewed-on: https://boringssl-review.googlesource.com/8330 Reviewed-by: Nick Harper <nharper@chromium.org> Reviewed-by: David Benjamin <davidben@google.com>
diff --git a/ssl/tls_record.c b/ssl/tls_record.c index e1553e3..f1e866f 100644 --- a/ssl/tls_record.c +++ b/ssl/tls_record.c
@@ -360,7 +360,7 @@ /* TLS 1.3 hides the actual record type inside the encrypted data. */ if (ssl->s3->have_version && ssl3_protocol_version(ssl) >= TLS1_3_VERSION && - ssl->s3->aead_read_ctx != NULL) { + ssl->s3->aead_write_ctx != NULL) { size_t padding = SSL3_RT_HEADER_LENGTH + 1; if (in_len > in_len + padding || max_out < in_len + padding) {