From 45d6a15ae97fce06d50a5b33d403a44c39d89ff8 Mon Sep 17 00:00:00 2001 From: "Dr. Stephen Henson" Date: Tue, 16 Feb 2010 14:20:40 +0000 Subject: PR: 2171 Submitted by: Tomas Mraz Since SSLv2 doesn't support renegotiation at all don't reject it if legacy renegotiation isn't enabled. Also can now use SSL2 compatible client hello because RFC5746 supports it. --- ssl/s23_clnt.c | 3 --- 1 file changed, 3 deletions(-) (limited to 'ssl/s23_clnt.c') diff --git a/ssl/s23_clnt.c b/ssl/s23_clnt.c index 53e080ee8e..c4d8bf2eb3 100644 --- a/ssl/s23_clnt.c +++ b/ssl/s23_clnt.c @@ -305,9 +305,6 @@ static int ssl23_client_hello(SSL *s) ssl2_compat = 0; if (s->tlsext_status_type != -1) ssl2_compat = 0; - if (!(s->ctx->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION)) - ssl2_compat = 0; - #ifdef TLSEXT_TYPE_opaque_prf_input if (s->ctx->tlsext_opaque_prf_input_callback != 0 || s->tlsext_opaque_prf_input != NULL) ssl2_compat = 0; -- cgit v1.2.3