[openssl-commits] [openssl] OpenSSL_1_1_0-stable update

Kurt Roeckx kurt at openssl.org
Fri May 26 09:32:46 UTC 2017


The branch OpenSSL_1_1_0-stable has been updated
       via  ef66b8cb5efbc2dfbc2dc64f35a34c023b96e4c1 (commit)
      from  0efb6d94cdc3bc10a30206b95c0621f399e0cc79 (commit)


- Log -----------------------------------------------------------------
commit ef66b8cb5efbc2dfbc2dc64f35a34c023b96e4c1
Author: Todd Short <tshort at akamai.com>
Date:   Mon May 22 11:24:59 2017 -0400

    Fix inconsistent check of UNSAFE_LEGACY_RENEGOTIATION
    
    The check for SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION is
    inconsistent. Most places check SSL->options, one place is checking
    SSL_CTX->options; fix that.
    
    Reviewed-by: Matt Caswell <matt at openssl.org>
    Reviewed-by: Kurt Roeckx <kurt at roeckx.be>
    GH: #3523
    (cherry picked from commit dffdcc773ac0a294b1ce620131cb8d7401da9408)

-----------------------------------------------------------------------

Summary of changes:
 ssl/record/rec_layer_s3.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/ssl/record/rec_layer_s3.c b/ssl/record/rec_layer_s3.c
index c533bbd..5945d18 100644
--- a/ssl/record/rec_layer_s3.c
+++ b/ssl/record/rec_layer_s3.c
@@ -1332,7 +1332,7 @@ int ssl3_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf,
         (s->rlayer.handshake_fragment_len >= 4) &&
         (s->rlayer.handshake_fragment[0] == SSL3_MT_CLIENT_HELLO) &&
         (s->session != NULL) && (s->session->cipher != NULL) &&
-        !(s->ctx->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION)) {
+        !(s->options & SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION)) {
         SSL3_RECORD_set_length(rr, 0);
         SSL3_RECORD_set_read(rr);
         ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_NO_RENEGOTIATION);


More information about the openssl-commits mailing list