diff options
Diffstat (limited to 'src/lib/libssl/tls13_client.c')
-rw-r--r-- | src/lib/libssl/tls13_client.c | 18 |
1 files changed, 17 insertions, 1 deletions
diff --git a/src/lib/libssl/tls13_client.c b/src/lib/libssl/tls13_client.c index cab113b8c3..477cca2e04 100644 --- a/src/lib/libssl/tls13_client.c +++ b/src/lib/libssl/tls13_client.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_client.c,v 1.30 2020/01/23 06:15:44 beck Exp $ */ | 1 | /* $OpenBSD: tls13_client.c,v 1.31 2020/01/23 07:30:55 beck Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -285,6 +285,22 @@ tls13_server_hello_process(struct tls13_ctx *ctx, CBS *cbs) | |||
285 | goto err; | 285 | goto err; |
286 | 286 | ||
287 | if (tls13_server_hello_is_legacy(cbs)) { | 287 | if (tls13_server_hello_is_legacy(cbs)) { |
288 | /* | ||
289 | * RFC 8446 section 4.1.3, We must not downgrade if | ||
290 | * the server random value contains the TLS 1.2 or 1.1 | ||
291 | * magical value. | ||
292 | */ | ||
293 | if (!CBS_skip(&server_random, CBS_len(&server_random) - | ||
294 | sizeof(tls13_downgrade_12))) | ||
295 | goto err; | ||
296 | if (CBS_mem_equal(&server_random, tls13_downgrade_12, | ||
297 | sizeof(tls13_downgrade_12)) || | ||
298 | CBS_mem_equal(&server_random, tls13_downgrade_11, | ||
299 | sizeof(tls13_downgrade_11))) { | ||
300 | ctx->alert = SSL_AD_ILLEGAL_PARAMETER; | ||
301 | goto err; | ||
302 | } | ||
303 | |||
288 | if (!CBS_skip(cbs, CBS_len(cbs))) | 304 | if (!CBS_skip(cbs, CBS_len(cbs))) |
289 | goto err; | 305 | goto err; |
290 | return tls13_use_legacy_client(ctx); | 306 | return tls13_use_legacy_client(ctx); |