From dab6f09573742df94c4767663565aca3863f8173 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Bodo=20M=C3=B6ller?= Date: Sun, 20 Feb 2000 23:40:01 +0000 Subject: Workaround for irrelevant problem. --- ssl/s23_srvr.c | 23 ++++++++++++++++------- 1 file changed, 16 insertions(+), 7 deletions(-) (limited to 'ssl/s23_srvr.c') diff --git a/ssl/s23_srvr.c b/ssl/s23_srvr.c index 49320647e7..33634efdcb 100644 --- a/ssl/s23_srvr.c +++ b/ssl/s23_srvr.c @@ -189,9 +189,10 @@ end: int ssl23_get_client_hello(SSL *s) { char buf_space[11]; /* Request this many bytes in initial read. - * We can detect SSL 3.0/TLS 1.0 Client Hellos only - * when the following is in a single record - * (not guaranteed by protocol specs): + * We can detect SSL 3.0/TLS 1.0 Client Hellos + * ('type == 3') correctly only when the following + * is in a single record, which is not guaranteed by + * the protocol specification: * Byte Content * 0 type \ * 1/2 version > record header @@ -200,7 +201,6 @@ int ssl23_get_client_hello(SSL *s) * 6-8 length > Client Hello message * 9/10 client_version / */ -/* XXX */ char *buf= &(buf_space[0]); unsigned char *p,*d,*dd; unsigned int i; @@ -338,14 +338,23 @@ int ssl23_get_client_hello(SSL *s) else if ((p[0] == SSL3_RT_HANDSHAKE) && (p[1] == SSL3_VERSION_MAJOR) && (p[5] == SSL3_MT_CLIENT_HELLO) && - (p[9] == p[1])) + ((p[3] == 0 && p[4] < 5 /* silly record length? */) + || (p[9] == p[1]))) { /* * SSLv3 or tls1 header */ - /* we must look at client_version inside the client hello: */ - v[0]=p[9]; v[1]=p[10]; + v[0]=p[1]; /* major version */ + /* We must look at client_version inside the Client Hello message + * to get the correct minor version: */ + v[1]=p[10]; + /* However if we have only a pathologically small fragment of the + * Client Hello message, we simply use the version from the + * record header -- this is incorrect but unlikely to fail in + * practice */ + if (p[3] == 0 && p[4] < 6) + v[1]=p[2]; if (v[1] >= TLS1_VERSION_MINOR) { if (!(s->options & SSL_OP_NO_TLSv1)) -- cgit v1.2.3