提交 7538cb82 编写于 作者: D Dr. Stephen Henson

remove ancient SSLeay bug workaround

Reviewed-by: NMatt Caswell <matt@openssl.org>
上级 3e166c13
...@@ -364,7 +364,8 @@ typedef int (*custom_ext_parse_cb) (SSL *s, unsigned int ext_type, ...@@ -364,7 +364,8 @@ typedef int (*custom_ext_parse_cb) (SSL *s, unsigned int ext_type,
# define SSL_OP_TLSEXT_PADDING 0x00000010U # define SSL_OP_TLSEXT_PADDING 0x00000010U
# define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020U # define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020U
# define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040U # define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040U
# define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080U /* Ancient SSLeay version, retained for compatibility */
# define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x0
# define SSL_OP_TLS_D5_BUG 0x00000100U # define SSL_OP_TLS_D5_BUG 0x00000100U
/* Removed from OpenSSL 1.1.0 */ /* Removed from OpenSSL 1.1.0 */
# define SSL_OP_TLS_BLOCK_PADDING_BUG 0x0U # define SSL_OP_TLS_BLOCK_PADDING_BUG 0x0U
......
...@@ -2421,14 +2421,9 @@ MSG_PROCESS_RETURN tls_process_client_key_exchange(SSL *s, PACKET *pkt) ...@@ -2421,14 +2421,9 @@ MSG_PROCESS_RETURN tls_process_client_key_exchange(SSL *s, PACKET *pkt)
i = 0; i = 0;
} }
if (PACKET_remaining(pkt) != i) { if (PACKET_remaining(pkt) != i) {
if (!(s->options & SSL_OP_SSLEAY_080_CLIENT_DH_BUG)) { SSLerr(SSL_F_TLS_PROCESS_CLIENT_KEY_EXCHANGE,
SSLerr(SSL_F_TLS_PROCESS_CLIENT_KEY_EXCHANGE, SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG);
SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG); goto err;
goto err;
} else {
*pkt = bookmark;
i = PACKET_remaining(pkt);
}
} }
if (alg_k & SSL_kDHr) if (alg_k & SSL_kDHr)
idx = SSL_PKEY_DH_RSA; idx = SSL_PKEY_DH_RSA;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册