summaryrefslogtreecommitdiffstats
path: root/crypto/rsa
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>2008-07-18 00:11:53 +0200
committerBodo Möller <bodo@openssl.org>2008-07-18 00:11:53 +0200
commit5b331ab77af1a510b97ea57845bfbac1a5db415f (patch)
tree9fd494267f61230ba19215603e6d3e89ff59945b /crypto/rsa
parentmem_dbg.c: avoid compiler warnings. (diff)
downloadopenssl-5b331ab77af1a510b97ea57845bfbac1a5db415f.tar.xz
openssl-5b331ab77af1a510b97ea57845bfbac1a5db415f.zip
We should check the eight bytes starting at p[-9] for rollback attack
detection, or the probability for an erroneous RSA_R_SSLV3_ROLLBACK_ATTACK will be larger than necessary. PR: 1695
Diffstat (limited to 'crypto/rsa')
-rw-r--r--crypto/rsa/rsa_ssl.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa/rsa_ssl.c b/crypto/rsa/rsa_ssl.c
index ea72629494..cfeff15bc9 100644
--- a/crypto/rsa/rsa_ssl.c
+++ b/crypto/rsa/rsa_ssl.c
@@ -130,7 +130,7 @@ int RSA_padding_check_SSLv23(unsigned char *to, int tlen,
RSAerr(RSA_F_RSA_PADDING_CHECK_SSLV23,RSA_R_NULL_BEFORE_BLOCK_MISSING);
return(-1);
}
- for (k= -8; k<0; k++)
+ for (k = -9; k<-1; k++)
{
if (p[k] != 0x03) break;
}