aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/rsa/rsa_ssl.c
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>2000-07-29 18:50:41 +0000
committerBodo Möller <bodo@openssl.org>2000-07-29 18:50:41 +0000
commit37569e64e8012014a4b027d896da6c6cdf372507 (patch)
tree5a9b45aaab90f88ef9770f6d896e81f2fd6e7066 /crypto/rsa/rsa_ssl.c
parenta657546f9c376f4b7ba4dce14649598fb1a38de5 (diff)
downloadopenssl-37569e64e8012014a4b027d896da6c6cdf372507.tar.gz
Fix SSL 2.0 rollback checking: The previous implementation of the
test was never triggered due to an off-by-one error. In s23_clnt.c, don't use special rollback-attack detection padding (RSA_SSLV23_PADDING) if SSL 2.0 is the only protocol enabled in the client; similarly, in s23_srvr.c, don't do the rollback check if SSL 2.0 is the only protocol enabled in the server.
Diffstat (limited to 'crypto/rsa/rsa_ssl.c')
-rw-r--r--crypto/rsa/rsa_ssl.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa/rsa_ssl.c b/crypto/rsa/rsa_ssl.c
index 81a857c813..482f4a8273 100644
--- a/crypto/rsa/rsa_ssl.c
+++ b/crypto/rsa/rsa_ssl.c
@@ -134,7 +134,7 @@ int RSA_padding_check_SSLv23(unsigned char *to, int tlen, unsigned char *from,
{
if (p[k] != 0x03) break;
}
- if (k == 0)
+ if (k == -1)
{
RSAerr(RSA_F_RSA_PADDING_CHECK_SSLV23,RSA_R_SSLV3_ROLLBACK_ATTACK);
return(-1);