summaryrefslogtreecommitdiffstats
path: root/ssl
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2010-12-02 22:36:51 +0000
committersimon <simon@FreeBSD.org>2010-12-02 22:36:51 +0000
commitae03beb758270fb19d741c93f7bfde88a6635612 (patch)
treeb5613f06a47ca8522264b520b04a27a5fa0ff300 /ssl
parent94e5505da619159032deac31ce95e6677cb94508 (diff)
downloadFreeBSD-src-ae03beb758270fb19d741c93f7bfde88a6635612.zip
FreeBSD-src-ae03beb758270fb19d741c93f7bfde88a6635612.tar.gz
Import OpenSSL 0.9.8q.
Diffstat (limited to 'ssl')
-rw-r--r--ssl/s3_clnt.c3
-rw-r--r--ssl/s3_srvr.c5
2 files changed, 8 insertions, 0 deletions
diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c
index f0995b9..a7cb7a1 100644
--- a/ssl/s3_clnt.c
+++ b/ssl/s3_clnt.c
@@ -814,8 +814,11 @@ int ssl3_get_server_hello(SSL *s)
s->session->cipher_id = s->session->cipher->id;
if (s->hit && (s->session->cipher_id != c->id))
{
+/* Workaround is now obsolete */
+#if 0
if (!(s->options &
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG))
+#endif
{
al=SSL_AD_ILLEGAL_PARAMETER;
SSLerr(SSL_F_SSL3_GET_SERVER_HELLO,SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED);
diff --git a/ssl/s3_srvr.c b/ssl/s3_srvr.c
index e696450..e2d570f 100644
--- a/ssl/s3_srvr.c
+++ b/ssl/s3_srvr.c
@@ -927,6 +927,10 @@ int ssl3_get_client_hello(SSL *s)
break;
}
}
+/* Disabled because it can be used in a ciphersuite downgrade
+ * attack: CVE-2010-4180.
+ */
+#if 0
if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1))
{
/* Special case as client bug workaround: the previously used cipher may
@@ -941,6 +945,7 @@ int ssl3_get_client_hello(SSL *s)
j = 1;
}
}
+#endif
if (j == 0)
{
/* we need to have the cipher in the cipher
OpenPOWER on IntegriCloud