3505ea6700
Four patches are not being applied due to failures in the build and/or applying them: - openssl-1.1.1-fips.patch - openssl-1.1.1-fips-post-rand.patch - openssl-1.1.1-evp-kdf.patch - openssl-1.1.1-ssh-kdf.patch Mind that fips related patches were not applied in the previously version either. Resolves: rhbz#1740772 Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
15 lines
682 B
Diff
15 lines
682 B
Diff
Do not return failure when setting version bound on fixed protocol
|
|
version method.
|
|
diff -up openssl-1.1.1-pre8/ssl/statem/statem_lib.c.ignore-bound openssl-1.1.1-pre8/ssl/statem/statem_lib.c
|
|
--- openssl-1.1.1-pre8/ssl/statem/statem_lib.c.ignore-bound 2018-06-20 16:48:13.000000000 +0200
|
|
+++ openssl-1.1.1-pre8/ssl/statem/statem_lib.c 2018-08-13 11:07:52.826304045 +0200
|
|
@@ -1595,7 +1595,7 @@ int ssl_set_version_bound(int method_ver
|
|
* methods are not subject to controls that disable individual protocol
|
|
* versions.
|
|
*/
|
|
- return 0;
|
|
+ return 1;
|
|
|
|
case TLS_ANY_VERSION:
|
|
if (version < SSL3_VERSION || version > TLS_MAX_VERSION)
|