• D
    Avoid KCI attack for GOST · 41b42807
    Dmitry Belyavsky 提交于
    Russian GOST ciphersuites are vulnerable to the KCI attack because they use
    long-term keys to establish the connection when ssl client authorization is
    on. This change brings the GOST implementation into line with the latest
    specs in order to avoid the attack. It should not break backwards
    compatibility.
    Reviewed-by: NRich Salz <rsalz@openssl.org>
    Reviewed-by: NMatt Caswell <matt@openssl.org>
    41b42807
statem_clnt.c 92.5 KB