diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/tls13_client.c | 18 |
1 files changed, 17 insertions, 1 deletions
diff --git a/src/lib/libssl/tls13_client.c b/src/lib/libssl/tls13_client.c index cab113b8c3..477cca2e04 100644 --- a/src/lib/libssl/tls13_client.c +++ b/src/lib/libssl/tls13_client.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls13_client.c,v 1.30 2020/01/23 06:15:44 beck Exp $ */ | 1 | /* $OpenBSD: tls13_client.c,v 1.31 2020/01/23 07:30:55 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -285,6 +285,22 @@ tls13_server_hello_process(struct tls13_ctx *ctx, CBS *cbs) | |||
| 285 | goto err; | 285 | goto err; |
| 286 | 286 | ||
| 287 | if (tls13_server_hello_is_legacy(cbs)) { | 287 | if (tls13_server_hello_is_legacy(cbs)) { |
| 288 | /* | ||
| 289 | * RFC 8446 section 4.1.3, We must not downgrade if | ||
| 290 | * the server random value contains the TLS 1.2 or 1.1 | ||
| 291 | * magical value. | ||
| 292 | */ | ||
| 293 | if (!CBS_skip(&server_random, CBS_len(&server_random) - | ||
| 294 | sizeof(tls13_downgrade_12))) | ||
| 295 | goto err; | ||
| 296 | if (CBS_mem_equal(&server_random, tls13_downgrade_12, | ||
| 297 | sizeof(tls13_downgrade_12)) || | ||
| 298 | CBS_mem_equal(&server_random, tls13_downgrade_11, | ||
| 299 | sizeof(tls13_downgrade_11))) { | ||
| 300 | ctx->alert = SSL_AD_ILLEGAL_PARAMETER; | ||
| 301 | goto err; | ||
| 302 | } | ||
| 303 | |||
| 288 | if (!CBS_skip(cbs, CBS_len(cbs))) | 304 | if (!CBS_skip(cbs, CBS_len(cbs))) |
| 289 | goto err; | 305 | goto err; |
| 290 | return tls13_use_legacy_client(ctx); | 306 | return tls13_use_legacy_client(ctx); |
