We should check the eight bytes starting at p[-9] for rollback attack
detection, or the probability for an erroneous RSA_R_SSLV3_ROLLBACK_ATTACK will be larger than necessary. PR: 1695
This commit is contained in:
parent
0b7545b239
commit
df1f7b4b02
1 changed files with 1 additions and 1 deletions
|
@ -130,7 +130,7 @@ int RSA_padding_check_SSLv23(unsigned char *to, int tlen,
|
|||
RSAerr(RSA_F_RSA_PADDING_CHECK_SSLV23,RSA_R_NULL_BEFORE_BLOCK_MISSING);
|
||||
return(-1);
|
||||
}
|
||||
for (k= -8; k<0; k++)
|
||||
for (k = -9; k<-1; k++)
|
||||
{
|
||||
if (p[k] != 0x03) break;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue