Loading ssl/ssl_locl.h +1 −1 Original line number Diff line number Diff line Loading @@ -1633,7 +1633,7 @@ typedef struct raw_extension_st { typedef struct { unsigned int isv2; unsigned int version; unsigned int legacy_version; unsigned char random[SSL3_RANDOM_SIZE]; size_t session_id_len; unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; Loading ssl/statem/statem_lib.c +1 −1 Original line number Diff line number Diff line Loading @@ -992,7 +992,7 @@ int ssl_choose_server_version(SSL *s, CLIENTHELLO_MSG *hello) * handle version. */ int server_version = s->method->version; int client_version = hello->version; int client_version = hello->legacy_version; const version_info *vent; const version_info *table; int disabled = 0; Loading ssl/statem/statem_srvr.c +6 −6 Original line number Diff line number Diff line Loading @@ -939,7 +939,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) } } if (!PACKET_get_net_2(pkt, &clienthello.version)) { if (!PACKET_get_net_2(pkt, &clienthello.legacy_version)) { al = SSL_AD_DECODE_ERROR; SSLerr(SSL_F_TLS_PROCESS_CLIENT_HELLO, SSL_R_LENGTH_TOO_SHORT); goto err; Loading Loading @@ -1082,8 +1082,8 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) /* Choose the version */ if (clienthello.isv2) { if (clienthello.version == SSL2_VERSION || (clienthello.version & 0xff00) if (clienthello.legacy_version == SSL2_VERSION || (clienthello.legacy_version & 0xff00) != (SSL3_VERSION_MAJOR << 8)) { /* * This is real SSLv2 or something complete unknown. We don't Loading @@ -1093,7 +1093,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) goto err; } /* SSLv3/TLS */ s->client_version = clienthello.version; s->client_version = clienthello.legacy_version; } /* * Do SSL/TLS version negotiation if applicable. For DTLS we just check Loading @@ -1102,7 +1102,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) if (!SSL_IS_DTLS(s)) { protverr = ssl_choose_server_version(s, &clienthello); } else if (s->method->version != DTLS_ANY_VERSION && DTLS_VERSION_LT((int)clienthello.version, s->version)) { DTLS_VERSION_LT((int)clienthello.legacy_version, s->version)) { protverr = SSL_R_VERSION_TOO_LOW; } else { protverr = 0; Loading @@ -1112,7 +1112,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) SSLerr(SSL_F_TLS_PROCESS_CLIENT_HELLO, protverr); if ((!s->enc_write_ctx && !s->write_hash)) { /* like ssl3_get_record, send alert using remote version number */ s->version = s->client_version = clienthello.version; s->version = s->client_version = clienthello.legacy_version; } al = SSL_AD_PROTOCOL_VERSION; goto f_err; Loading Loading
ssl/ssl_locl.h +1 −1 Original line number Diff line number Diff line Loading @@ -1633,7 +1633,7 @@ typedef struct raw_extension_st { typedef struct { unsigned int isv2; unsigned int version; unsigned int legacy_version; unsigned char random[SSL3_RANDOM_SIZE]; size_t session_id_len; unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH]; Loading
ssl/statem/statem_lib.c +1 −1 Original line number Diff line number Diff line Loading @@ -992,7 +992,7 @@ int ssl_choose_server_version(SSL *s, CLIENTHELLO_MSG *hello) * handle version. */ int server_version = s->method->version; int client_version = hello->version; int client_version = hello->legacy_version; const version_info *vent; const version_info *table; int disabled = 0; Loading
ssl/statem/statem_srvr.c +6 −6 Original line number Diff line number Diff line Loading @@ -939,7 +939,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) } } if (!PACKET_get_net_2(pkt, &clienthello.version)) { if (!PACKET_get_net_2(pkt, &clienthello.legacy_version)) { al = SSL_AD_DECODE_ERROR; SSLerr(SSL_F_TLS_PROCESS_CLIENT_HELLO, SSL_R_LENGTH_TOO_SHORT); goto err; Loading Loading @@ -1082,8 +1082,8 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) /* Choose the version */ if (clienthello.isv2) { if (clienthello.version == SSL2_VERSION || (clienthello.version & 0xff00) if (clienthello.legacy_version == SSL2_VERSION || (clienthello.legacy_version & 0xff00) != (SSL3_VERSION_MAJOR << 8)) { /* * This is real SSLv2 or something complete unknown. We don't Loading @@ -1093,7 +1093,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) goto err; } /* SSLv3/TLS */ s->client_version = clienthello.version; s->client_version = clienthello.legacy_version; } /* * Do SSL/TLS version negotiation if applicable. For DTLS we just check Loading @@ -1102,7 +1102,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) if (!SSL_IS_DTLS(s)) { protverr = ssl_choose_server_version(s, &clienthello); } else if (s->method->version != DTLS_ANY_VERSION && DTLS_VERSION_LT((int)clienthello.version, s->version)) { DTLS_VERSION_LT((int)clienthello.legacy_version, s->version)) { protverr = SSL_R_VERSION_TOO_LOW; } else { protverr = 0; Loading @@ -1112,7 +1112,7 @@ MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt) SSLerr(SSL_F_TLS_PROCESS_CLIENT_HELLO, protverr); if ((!s->enc_write_ctx && !s->write_hash)) { /* like ssl3_get_record, send alert using remote version number */ s->version = s->client_version = clienthello.version; s->version = s->client_version = clienthello.legacy_version; } al = SSL_AD_PROTOCOL_VERSION; goto f_err; Loading