From: Dr. Stephen Henson Date: Fri, 22 Jul 2016 14:55:38 +0000 (+0100) Subject: Send alert for bad DH CKE X-Git-Tag: OpenSSL_1_1_0-pre6~117 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=31a7d80d0ddb9dddde45c112316057a83e743c15;p=oweals%2Fopenssl.git Send alert for bad DH CKE RT#4511 Reviewed-by: Matt Caswell --- diff --git a/ssl/statem/statem_srvr.c b/ssl/statem/statem_srvr.c index e56d79121d..b7f2a0fe2d 100644 --- a/ssl/statem/statem_srvr.c +++ b/ssl/statem/statem_srvr.c @@ -2269,17 +2269,12 @@ static int tls_process_cke_dhe(SSL *s, PACKET *pkt, int *al) EVP_PKEY *ckey = NULL; int ret = 0; - if (!PACKET_get_net_2(pkt, &i)) { + if (!PACKET_get_net_2(pkt, &i) || PACKET_remaining(pkt) != i) { *al = SSL_AD_HANDSHAKE_FAILURE; SSLerr(SSL_F_TLS_PROCESS_CKE_DHE, SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG); goto err; } - if (PACKET_remaining(pkt) != i) { - SSLerr(SSL_F_TLS_PROCESS_CKE_DHE, - SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG); - goto err; - } skey = s->s3->tmp.pkey; if (skey == NULL) { *al = SSL_AD_HANDSHAKE_FAILURE;