[Pkg-openssl-changes] r556 - in openssl/trunk/debian: . patches
Kurt Roeckx
kroeckx at alioth.debian.org
Sat Mar 31 16:36:31 UTC 2012
Author: kroeckx
Date: 2012-03-31 16:36:31 +0000 (Sat, 31 Mar 2012)
New Revision: 556
Added:
openssl/trunk/debian/patches/tls1.2_client_algorithms.patch
Modified:
openssl/trunk/debian/changelog
openssl/trunk/debian/patches/series
Log:
use client version when deciding whether to send supported signature
algorithms extension
Modified: openssl/trunk/debian/changelog
===================================================================
--- openssl/trunk/debian/changelog 2012-03-31 16:33:52 UTC (rev 555)
+++ openssl/trunk/debian/changelog 2012-03-31 16:36:31 UTC (rev 556)
@@ -1,8 +1,10 @@
openssl (1.0.1-3) unstable; urgency=high
* Fix crash in vpaes (Closes: #665836)
+ * use client version when deciding whether to send supported signature
+ algorithms extension
- -- Kurt Roeckx <kurt at roeckx.be> Sat, 31 Mar 2012 18:28:50 +0200
+ -- Kurt Roeckx <kurt at roeckx.be> Sat, 31 Mar 2012 18:35:59 +0200
openssl (1.0.1-2) unstable; urgency=low
Modified: openssl/trunk/debian/patches/series
===================================================================
--- openssl/trunk/debian/patches/series 2012-03-31 16:33:52 UTC (rev 555)
+++ openssl/trunk/debian/patches/series 2012-03-31 16:36:31 UTC (rev 556)
@@ -31,3 +31,5 @@
c_rehash-multi.patch
no_ssl2.patch
vpaes-x86.patch
+tls1.2_client_algorithms.patch
+
Added: openssl/trunk/debian/patches/tls1.2_client_algorithms.patch
===================================================================
--- openssl/trunk/debian/patches/tls1.2_client_algorithms.patch (rev 0)
+++ openssl/trunk/debian/patches/tls1.2_client_algorithms.patch 2012-03-31 16:36:31 UTC (rev 556)
@@ -0,0 +1,13 @@
+diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
+index 57d1107..27c8e34 100644
+--- a/ssl/t1_lib.c
++++ b/ssl/t1_lib.c
+@@ -544,7 +544,7 @@ unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *p, unsigned cha
+ }
+ skip_ext:
+
+- if (TLS1_get_version(s) >= TLS1_2_VERSION)
++ if (TLS1_get_client_version(s) >= TLS1_2_VERSION)
+ {
+ if ((size_t)(limit - ret) < sizeof(tls12_sigalgs) + 6)
+ return NULL;
More information about the Pkg-openssl-changes
mailing list