diff options
author | Bodo Möller <bodo@openssl.org> | 2000-07-29 18:50:41 +0000 |
---|---|---|
committer | Bodo Möller <bodo@openssl.org> | 2000-07-29 18:50:41 +0000 |
commit | 37569e64e8012014a4b027d896da6c6cdf372507 (patch) | |
tree | 5a9b45aaab90f88ef9770f6d896e81f2fd6e7066 /crypto/rsa/rsa_ssl.c | |
parent | a657546f9c376f4b7ba4dce14649598fb1a38de5 (diff) |
Fix SSL 2.0 rollback checking: The previous implementation of the
test was never triggered due to an off-by-one error.
In s23_clnt.c, don't use special rollback-attack detection padding
(RSA_SSLV23_PADDING) if SSL 2.0 is the only protocol enabled in the
client; similarly, in s23_srvr.c, don't do the rollback check if
SSL 2.0 is the only protocol enabled in the server.
Diffstat (limited to 'crypto/rsa/rsa_ssl.c')
-rw-r--r-- | crypto/rsa/rsa_ssl.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa/rsa_ssl.c b/crypto/rsa/rsa_ssl.c index 81a857c813..482f4a8273 100644 --- a/crypto/rsa/rsa_ssl.c +++ b/crypto/rsa/rsa_ssl.c @@ -134,7 +134,7 @@ int RSA_padding_check_SSLv23(unsigned char *to, int tlen, unsigned char *from, { if (p[k] != 0x03) break; } - if (k == 0) + if (k == -1) { RSAerr(RSA_F_RSA_PADDING_CHECK_SSLV23,RSA_R_SSLV3_ROLLBACK_ATTACK); return(-1); |