summaryrefslogtreecommitdiff
path: root/lib/sslv2_compat.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2015-12-14 14:34:04 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2015-12-14 15:11:46 +0100
commitf5174e5c83298d19ab2348d58a1b462ca95f4a9a (patch)
tree7128ae08cec65721d1e32e191efc5dd6dda74d1c /lib/sslv2_compat.c
parentda7edadb6ff6e440b38c7343cb4e447b7b22db9e (diff)
downloadgnutls-f5174e5c83298d19ab2348d58a1b462ca95f4a9a.tar.gz
handshake: when receiving a TLS version which is too low fail
That is, don't treat all unsupported version as being to high. Treat versions which are not known and lower than the highest as a protocol error. Resolves #42
Diffstat (limited to 'lib/sslv2_compat.c')
-rw-r--r--lib/sslv2_compat.c12
1 files changed, 7 insertions, 5 deletions
diff --git a/lib/sslv2_compat.c b/lib/sslv2_compat.c
index 8a717d3835..f742a098d8 100644
--- a/lib/sslv2_compat.c
+++ b/lib/sslv2_compat.c
@@ -94,7 +94,7 @@ _gnutls_read_client_hello_v2(gnutls_session_t session, uint8_t * data,
int ret = 0, sret = 0;
uint16_t sizeOfSuites;
gnutls_protocol_t adv_version;
- uint8_t rnd[GNUTLS_RANDOM_SIZE];
+ uint8_t rnd[GNUTLS_RANDOM_SIZE], major, minor;
int len = datalen;
uint16_t challenge;
uint8_t session_id[GNUTLS_MAX_SESSION_ID_SIZE];
@@ -105,11 +105,13 @@ _gnutls_read_client_hello_v2(gnutls_session_t session, uint8_t * data,
("HSK[%p]: SSL 2.0 Hello: Client's version: %d.%d\n", session,
data[pos], data[pos + 1]);
- set_adv_version(session, data[pos], data[pos + 1]);
+ major = data[pos];
+ minor = data[pos + 1];
+ set_adv_version(session, major, minor);
- adv_version = _gnutls_version_get(data[pos], data[pos + 1]);
+ adv_version = _gnutls_version_get(major, minor);
- ret = _gnutls_negotiate_version(session, adv_version);
+ ret = _gnutls_negotiate_version(session, adv_version, major, minor);
if (ret < 0) {
gnutls_assert();
return ret;
@@ -144,7 +146,7 @@ _gnutls_read_client_hello_v2(gnutls_session_t session, uint8_t * data,
/* call the user hello callback
*/
- ret = _gnutls_user_hello_func(session, adv_version);
+ ret = _gnutls_user_hello_func(session, adv_version, major, minor);
if (ret < 0) {
if (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED) {
sret = GNUTLS_E_INT_RET_0;