| Index: openssl/patches/paddingext.patch
|
| diff --git a/openssl/patches/paddingext.patch b/openssl/patches/paddingext.patch
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..fbc3d063cebcbc87efd3f3f2e9f04e3cf45bde6b
|
| --- /dev/null
|
| +++ b/openssl/patches/paddingext.patch
|
| @@ -0,0 +1,96 @@
|
| +From 61a9671951205d66382556b2502993ffc9201f59 Mon Sep 17 00:00:00 2001
|
| +From: Adam Langley <agl@chromium.org>
|
| +Date: Wed, 11 Dec 2013 16:25:17 -0500
|
| +Subject: [PATCH 57/57] Add padding extension.
|
| +
|
| +This change adds a padding extension, when needed, in order to work
|
| +around bugs in F5 terminators.
|
| +---
|
| + ssl/t1_lib.c | 20 ++++++++++++++++++++
|
| + ssl/tls1.h | 4 ++++
|
| + 2 files changed, 24 insertions(+)
|
| +
|
| +diff --git a/ssl/s23_clnt.c b/ssl/s23_clnt.c
|
| +index 47673e7..94e9692 100644
|
| +--- a/ssl/s23_clnt.c
|
| ++++ b/ssl/s23_clnt.c
|
| +@@ -466,7 +466,10 @@ static int ssl23_client_hello(SSL *s)
|
| + {
|
| + /* create Client Hello in SSL 3.0/TLS 1.0 format */
|
| +
|
| +- /* do the record header (5 bytes) and handshake message header (4 bytes) last */
|
| ++ /* do the record header (5 bytes) and handshake message
|
| ++ * header (4 bytes) last. Note: the code to add the
|
| ++ * padding extension in t1_lib.c depends on the size of
|
| ++ * this prefix. */
|
| + d = p = &(buf[9]);
|
| +
|
| + *(p++) = version_major;
|
| +diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c
|
| +index a657360..faa8d36 100644
|
| +--- a/ssl/s3_clnt.c
|
| ++++ b/ssl/s3_clnt.c
|
| +@@ -752,7 +752,9 @@ int ssl3_client_hello(SSL *s)
|
| + if (RAND_pseudo_bytes(p,SSL3_RANDOM_SIZE-4) <= 0)
|
| + goto err;
|
| +
|
| +- /* Do the message type and length last */
|
| ++ /* Do the message type and length last.
|
| ++ * Note: the code to add the padding extension in t1_lib.c
|
| ++ * depends on the size of this prefix. */
|
| + d=p= &(buf[4]);
|
| +
|
| + /* version indicates the negotiated version: for example from
|
| +diff --git a/ssl/t1_lib.c b/ssl/t1_lib.c
|
| +index 5578056..f9ad9d9 100644
|
| +--- a/ssl/t1_lib.c
|
| ++++ b/ssl/t1_lib.c
|
| +@@ -695,6 +695,31 @@ unsigned char *ssl_add_clienthello_tlsext(SSL *s, unsigned char *p, unsigned cha
|
| + }
|
| + #endif
|
| +
|
| ++ /* Add padding to workaround bugs in F5 terminators.
|
| ++ * See https://tools.ietf.org/html/draft-agl-tls-padding-02 */
|
| ++ {
|
| ++ int hlen = ret - (unsigned char *)s->init_buf->data;
|
| ++ /* The code in s23_clnt.c to build ClientHello messages includes the
|
| ++ * 5-byte record header in the buffer, while the code in s3_clnt.c does
|
| ++ * not. */
|
| ++ if (s->state == SSL23_ST_CW_CLNT_HELLO_A)
|
| ++ hlen -= 5;
|
| ++ if (hlen > 0xff && hlen < 0x200)
|
| ++ {
|
| ++ hlen = 0x200 - hlen;
|
| ++ if (hlen >= 4)
|
| ++ hlen -= 4;
|
| ++ else
|
| ++ hlen = 0;
|
| ++
|
| ++ s2n(TLSEXT_TYPE_padding, ret);
|
| ++ s2n(hlen, ret);
|
| ++ memset(ret, 0, hlen);
|
| ++ ret += hlen;
|
| ++ }
|
| ++ }
|
| ++
|
| ++
|
| + if ((extdatalen = ret-p-2)== 0)
|
| + return p;
|
| +
|
| +diff --git a/ssl/tls1.h b/ssl/tls1.h
|
| +index ecf5da7..df8f482 100644
|
| +--- a/ssl/tls1.h
|
| ++++ b/ssl/tls1.h
|
| +@@ -255,6 +255,10 @@ extern "C" {
|
| + #define TLSEXT_TYPE_channel_id 30031
|
| + #define TLSEXT_TYPE_channel_id_new 30032
|
| +
|
| ++/* See https://tools.ietf.org/html/draft-agl-tls-padding-02
|
| ++ * Number not yet IANA assigned. */
|
| ++#define TLSEXT_TYPE_padding 35655
|
| ++
|
| + /* NameType value from RFC 3546 */
|
| + #define TLSEXT_NAMETYPE_host_name 0
|
| + /* status request value from RFC 3546 */
|
| +--
|
| +1.8.5.1
|
|
|