|
@@ -1071,6 +1071,7 @@ void Packet::armor(const void *key,bool encryptPayload,bool extendedArmor,const
|
|
|
}
|
|
|
}
|
|
|
|
|
|
+ /* NOTE: this is currently only ever used with NONE encryption for HELLO packets. */
|
|
|
if (extendedArmor) {
|
|
|
ECC::Pair ephemeralKeyPair = ECC::generate();
|
|
|
uint8_t ephemeralSymmetric[32];
|
|
@@ -1088,9 +1089,10 @@ void Packet::armor(const void *key,bool encryptPayload,bool extendedArmor,const
|
|
|
bool Packet::dearmor(const void *key,const AES aesKeys[2],const Identity &identity)
|
|
|
{
|
|
|
uint8_t *const data = reinterpret_cast<uint8_t *>(unsafeData());
|
|
|
+ const unsigned int cs = cipher();
|
|
|
|
|
|
- if (extendedArmor()) {
|
|
|
- if (size() < ZT_ECC_EPHEMERAL_PUBLIC_KEY_LEN) {
|
|
|
+ if (extendedArmor() && (cs == ZT_PROTO_CIPHER_SUITE__C25519_POLY1305_NONE)) {
|
|
|
+ if (size() < (ZT_PACKET_IDX_VERB + 1 + ZT_ECC_EPHEMERAL_PUBLIC_KEY_LEN)) {
|
|
|
return false;
|
|
|
}
|
|
|
uint8_t ephemeralSymmetric[32];
|
|
@@ -1112,7 +1114,6 @@ bool Packet::dearmor(const void *key,const AES aesKeys[2],const Identity &identi
|
|
|
|
|
|
const unsigned int payloadLen = size() - ZT_PACKET_IDX_VERB;
|
|
|
unsigned char *const payload = data + ZT_PACKET_IDX_VERB;
|
|
|
- const unsigned int cs = cipher();
|
|
|
|
|
|
if (cs == ZT_PROTO_CIPHER_SUITE__AES_GMAC_SIV) {
|
|
|
if (aesKeys) {
|