Index: net/quic/crypto/quic_crypto_client_config.cc |
diff --git a/net/quic/crypto/quic_crypto_client_config.cc b/net/quic/crypto/quic_crypto_client_config.cc |
index 8d46239e2e56db570e81e56dad7eba153ad97303..b9b0bcd46fcfeec9fe1a7710e178eefde590c30e 100644 |
--- a/net/quic/crypto/quic_crypto_client_config.cc |
+++ b/net/quic/crypto/quic_crypto_client_config.cc |
@@ -773,32 +773,10 @@ QuicErrorCode QuicCryptoClientConfig::ProcessServerHello( |
string* error_details) { |
DCHECK(error_details != nullptr); |
- if (server_hello.tag() != kSHLO) { |
- *error_details = "Bad tag"; |
- return QUIC_INVALID_CRYPTO_MESSAGE_TYPE; |
- } |
- |
- const QuicTag* supported_version_tags; |
- size_t num_supported_versions; |
- |
- if (server_hello.GetTaglist(kVER, &supported_version_tags, |
- &num_supported_versions) != QUIC_NO_ERROR) { |
- *error_details = "server hello missing version list"; |
- return QUIC_INVALID_CRYPTO_MESSAGE_PARAMETER; |
- } |
- if (!negotiated_versions.empty()) { |
- bool mismatch = num_supported_versions != negotiated_versions.size(); |
- for (size_t i = 0; i < num_supported_versions && !mismatch; ++i) { |
- mismatch = QuicTagToQuicVersion(supported_version_tags[i]) != |
- negotiated_versions[i]; |
- } |
- // The server sent a list of supported versions, and the connection |
- // reports that there was a version negotiation during the handshake. |
- // Ensure that these two lists are identical. |
- if (mismatch) { |
- *error_details = "Downgrade attack detected"; |
- return QUIC_VERSION_NEGOTIATION_MISMATCH; |
- } |
+ QuicErrorCode valid = CryptoUtils::ValidateServerHello( |
+ server_hello, negotiated_versions, error_details); |
+ if (valid != QUIC_NO_ERROR) { |
+ return valid; |
} |
// Learn about updated source address tokens. |