Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
dab6f095
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
1 年多 前同步成功
通知
10
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
dab6f095
编写于
2月 20, 2000
作者:
B
Bodo Möller
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Workaround for irrelevant problem.
上级
45206340
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
16 addition
and
7 deletion
+16
-7
ssl/s23_srvr.c
ssl/s23_srvr.c
+16
-7
未找到文件。
ssl/s23_srvr.c
浏览文件 @
dab6f095
...
@@ -189,9 +189,10 @@ end:
...
@@ -189,9 +189,10 @@ end:
int
ssl23_get_client_hello
(
SSL
*
s
)
int
ssl23_get_client_hello
(
SSL
*
s
)
{
{
char
buf_space
[
11
];
/* Request this many bytes in initial read.
char
buf_space
[
11
];
/* Request this many bytes in initial read.
* We can detect SSL 3.0/TLS 1.0 Client Hellos only
* We can detect SSL 3.0/TLS 1.0 Client Hellos
* when the following is in a single record
* ('type == 3') correctly only when the following
* (not guaranteed by protocol specs):
* is in a single record, which is not guaranteed by
* the protocol specification:
* Byte Content
* Byte Content
* 0 type \
* 0 type \
* 1/2 version > record header
* 1/2 version > record header
...
@@ -200,7 +201,6 @@ int ssl23_get_client_hello(SSL *s)
...
@@ -200,7 +201,6 @@ int ssl23_get_client_hello(SSL *s)
* 6-8 length > Client Hello message
* 6-8 length > Client Hello message
* 9/10 client_version /
* 9/10 client_version /
*/
*/
/* XXX */
char
*
buf
=
&
(
buf_space
[
0
]);
char
*
buf
=
&
(
buf_space
[
0
]);
unsigned
char
*
p
,
*
d
,
*
dd
;
unsigned
char
*
p
,
*
d
,
*
dd
;
unsigned
int
i
;
unsigned
int
i
;
...
@@ -338,14 +338,23 @@ int ssl23_get_client_hello(SSL *s)
...
@@ -338,14 +338,23 @@ int ssl23_get_client_hello(SSL *s)
else
if
((
p
[
0
]
==
SSL3_RT_HANDSHAKE
)
&&
else
if
((
p
[
0
]
==
SSL3_RT_HANDSHAKE
)
&&
(
p
[
1
]
==
SSL3_VERSION_MAJOR
)
&&
(
p
[
1
]
==
SSL3_VERSION_MAJOR
)
&&
(
p
[
5
]
==
SSL3_MT_CLIENT_HELLO
)
&&
(
p
[
5
]
==
SSL3_MT_CLIENT_HELLO
)
&&
(
p
[
9
]
==
p
[
1
]))
((
p
[
3
]
==
0
&&
p
[
4
]
<
5
/* silly record length? */
)
||
(
p
[
9
]
==
p
[
1
])))
{
{
/*
/*
* SSLv3 or tls1 header
* SSLv3 or tls1 header
*/
*/
/* we must look at client_version inside the client hello: */
v
[
0
]
=
p
[
1
];
/* major version */
v
[
0
]
=
p
[
9
];
v
[
1
]
=
p
[
10
];
/* We must look at client_version inside the Client Hello message
* to get the correct minor version: */
v
[
1
]
=
p
[
10
];
/* However if we have only a pathologically small fragment of the
* Client Hello message, we simply use the version from the
* record header -- this is incorrect but unlikely to fail in
* practice */
if
(
p
[
3
]
==
0
&&
p
[
4
]
<
6
)
v
[
1
]
=
p
[
2
];
if
(
v
[
1
]
>=
TLS1_VERSION_MINOR
)
if
(
v
[
1
]
>=
TLS1_VERSION_MINOR
)
{
{
if
(
!
(
s
->
options
&
SSL_OP_NO_TLSv1
))
if
(
!
(
s
->
options
&
SSL_OP_NO_TLSv1
))
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录