Fix BoGo HelloVerifyRequest version handling.
3c6a1ea674
switched what layer handled
the DTLS version mapping but forgot to correct the HelloVerifyRequest
logic to account for this.
Thanks to Jed Davis for noticing this.
Change-Id: I94ea18fc43a7ba15dd7250bfbcf44dbb3361b3ce
Reviewed-on: https://boringssl-review.googlesource.com/11984
Reviewed-by: David Benjamin <davidben@google.com>
This commit is contained in:
parent
4e41926774
commit
da4789e412
@ -346,7 +346,7 @@ NextCipherSuite:
|
||||
if c.isDTLS {
|
||||
helloVerifyRequest, ok := msg.(*helloVerifyRequestMsg)
|
||||
if ok {
|
||||
if helloVerifyRequest.vers != VersionTLS10 {
|
||||
if helloVerifyRequest.vers != versionToWire(VersionTLS10, c.isDTLS) {
|
||||
// Per RFC 6347, the version field in
|
||||
// HelloVerifyRequest SHOULD be always DTLS
|
||||
// 1.0. Enforce this for testing purposes.
|
||||
|
@ -158,7 +158,7 @@ func (hs *serverHandshakeState) readClientHello() error {
|
||||
// Per RFC 6347, the version field in HelloVerifyRequest SHOULD
|
||||
// be always DTLS 1.0
|
||||
helloVerifyRequest := &helloVerifyRequestMsg{
|
||||
vers: VersionTLS10,
|
||||
vers: versionToWire(VersionTLS10, c.isDTLS),
|
||||
cookie: make([]byte, 32),
|
||||
}
|
||||
if _, err := io.ReadFull(c.config.rand(), helloVerifyRequest.cookie); err != nil {
|
||||
|
Loading…
Reference in New Issue
Block a user