[tor-commits] [flashproxy/js] Don't apply_mask when we don't need to.

dcf at torproject.org dcf at torproject.org
Sat Apr 7 12:16:54 UTC 2012


commit 0c99f3dd9fab26a421bf30d9224c0839b9d93b6c
Author: David Fifield <david at bamsoftware.com>
Date:   Sat Apr 7 04:36:50 2012 -0700

    Don't apply_mask when we don't need to.
---
 connector.py |    7 +++++--
 1 files changed, 5 insertions(+), 2 deletions(-)

diff --git a/connector.py b/connector.py
index 1689c33..9c725be 100755
--- a/connector.py
+++ b/connector.py
@@ -219,14 +219,17 @@ class WebSocketDecoder(object):
                 # "The server MUST close the connection upon receiving a frame
                 # that is not masked."
                 raise self.MaskingError("Got unmasked payload from client")
-            mask_key = "\x00\x00\x00\x00"
+            mask_key = None
 
         if payload_len > self.MAX_MESSAGE_LENGTH:
             raise ValueError("Refusing to buffer payload of %d bytes" % payload_len)
 
         if len(self.buf) < offset + payload_len:
             return None
-        payload = apply_mask(self.buf[offset:offset+payload_len], mask_key)
+        if mask_key:
+            payload = apply_mask(self.buf[offset:offset+payload_len], mask_key)
+        else:
+            payload = self.buf[offset:offset+payload_len]
         self.buf = self.buf[offset+payload_len:]
 
         frame = WebSocketFrame()





More information about the tor-commits mailing list