TLS: Don't assert on zero length handshake fragment
The fragment functions will work with a zero length fragment, which might happen if a record length is zero in a malformed packet and a reassembly is in progress. It is not by itself a fatal error (and could actually work, even though non-compliant.) There is already a tls.record.length.invalid expert info added by ssl_check_record_length for this case. Related to #17890.
This commit is contained in:
parent
69daf2e339
commit
b025c45cf3
|
@ -2253,8 +2253,6 @@ save_tls_handshake_fragment(packet_info *pinfo, guint8 curr_layer_num_tls,
|
|||
{
|
||||
// Full handshake messages should not be saved.
|
||||
DISSECTOR_ASSERT(!(frag_offset == 0 && is_last));
|
||||
// Fragment data must be non-empty.
|
||||
DISSECTOR_ASSERT(frag_len != 0);
|
||||
// 0 is a special value indicating no reassembly in progress.
|
||||
DISSECTOR_ASSERT(reassembly_id != 0);
|
||||
|
||||
|
|
Loading…
Reference in New Issue