“…2) P 20 ends with any other byte value: in this case, at least two bytes of "padding" are removed, the next 20 bytes are interpreted as a MAC tag T , and the remaining bytes of plaintext are taken as the record R. Because the starting message length, at 320 bytes, is long enough to allow for the removal of 256 bytes of padding and a 20-byte MAC whilst still leaving 5 www.gnu.org/software/gnutls/ 6 In fact, since the attack only involves plaintexts which are correctly padded, it will work for any correct decryption algorithm. a non-null record, no length sanity tests will fail.…”