Make DTLS1_BAD_VER work with DTLS_client_method()
authorDavid Woodhouse <David.Woodhouse@intel.com>
Mon, 25 Jul 2016 17:03:27 +0000 (18:03 +0100)
committerMatt Caswell <matt@openssl.org>
Thu, 4 Aug 2016 19:56:24 +0000 (20:56 +0100)
commit032924c4b4104654ff8659b4701e4ab25872a12e
treea7b5757cae6a997fe0fbbbfce6117c4bcd41b0a7
parent387cf21345f981d3897f88a6479d8e60721c2c6b
Make DTLS1_BAD_VER work with DTLS_client_method()

DTLSv1_client_method() is deprecated, but it was the only way to obtain
DTLS1_BAD_VER support. The SSL_OP_CISCO_ANYCONNECT hack doesn't work with
DTLS_client_method(), and it's relatively non-trivial to make it work without
expanding the hack into lots of places.

So deprecate SSL_OP_CISCO_ANYCONNECT with DTLSv1_client_method(), and make
it work with SSL_CTX_set_{min,max}_proto_version(DTLS1_BAD_VER) instead.

Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
include/openssl/ssl.h
ssl/d1_lib.c
ssl/methods.c
ssl/record/rec_layer_d1.c
ssl/ssl_locl.h
ssl/statem/statem_lib.c