7723dd9
Support old DTLS version for compatibility with CISCO AnyConnect.
7723dd9
Index: openssl/ssl/d1_clnt.c
7723dd9
RCS File: /v/openssl/cvs/openssl/ssl/d1_clnt.c,v
7723dd9
rcsdiff -q -kk '-r1.3.2.15' '-r1.3.2.16' -u '/v/openssl/cvs/openssl/ssl/d1_clnt.c,v' 2>/dev/null
7723dd9
--- openssl/ssl/d1_clnt.c 2009/04/14 15:20:47 1.3.2.15
7723dd9
+++ openssl/ssl/d1_clnt.c 2009/04/19 18:08:11 1.3.2.16
7723dd9
@@ -130,7 +130,7 @@
7723dd9
 
7723dd9
 static SSL_METHOD *dtls1_get_client_method(int ver)
7723dd9
 	{
7723dd9
-	if (ver == DTLS1_VERSION)
7723dd9
+	if (ver == DTLS1_VERSION || ver == DTLS1_BAD_VER)
7723dd9
 		return(DTLSv1_client_method());
7723dd9
 	else
7723dd9
 		return(NULL);
7723dd9
@@ -181,7 +181,8 @@
7723dd9
 			s->server=0;
7723dd9
 			if (cb != NULL) cb(s,SSL_CB_HANDSHAKE_START,1);
7723dd9
 
7723dd9
-			if ((s->version & 0xff00 ) != (DTLS1_VERSION & 0xff00))
7723dd9
+			if ((s->version & 0xff00 ) != (DTLS1_VERSION & 0xff00) &&
7723dd9
+			    (s->version & 0xff00 ) != (DTLS1_BAD_VER & 0xff00))
7723dd9
 				{
7723dd9
 				SSLerr(SSL_F_DTLS1_CONNECT, ERR_R_INTERNAL_ERROR);
7723dd9
 				ret = -1;
7723dd9
Index: openssl/ssl/d1_lib.c
7723dd9
RCS File: /v/openssl/cvs/openssl/ssl/d1_lib.c,v
7723dd9
rcsdiff -q -kk '-r1.1.2.7' '-r1.1.2.8' -u '/v/openssl/cvs/openssl/ssl/d1_lib.c,v' 2>/dev/null
7723dd9
--- openssl/ssl/d1_lib.c 2009/04/02 22:34:59 1.1.2.7
7723dd9
+++ openssl/ssl/d1_lib.c 2009/04/19 18:08:11 1.1.2.8
7723dd9
@@ -198,7 +198,10 @@
7723dd9
 void dtls1_clear(SSL *s)
7723dd9
 	{
7723dd9
 	ssl3_clear(s);
7723dd9
-	s->version=DTLS1_VERSION;
7723dd9
+	if (s->options & SSL_OP_CISCO_ANYCONNECT)
7723dd9
+		s->version=DTLS1_BAD_VER;
7723dd9
+	else
7723dd9
+		s->version=DTLS1_VERSION;
7723dd9
 	}
7723dd9
 
7723dd9
 /*
7723dd9
Index: openssl/ssl/d1_pkt.c
7723dd9
RCS File: /v/openssl/cvs/openssl/ssl/d1_pkt.c,v
7723dd9
rcsdiff -q -kk '-r1.4.2.15' '-r1.4.2.16' -u '/v/openssl/cvs/openssl/ssl/d1_pkt.c,v' 2>/dev/null
7723dd9
--- openssl/ssl/d1_pkt.c 2009/04/02 22:34:59 1.4.2.15
7723dd9
+++ openssl/ssl/d1_pkt.c 2009/04/19 18:08:12 1.4.2.16
7723dd9
@@ -1024,15 +1024,17 @@
7723dd9
 	if (rr->type == SSL3_RT_CHANGE_CIPHER_SPEC)
7723dd9
 		{
7723dd9
 		struct ccs_header_st ccs_hdr;
7723dd9
+		int ccs_hdr_len = DTLS1_CCS_HEADER_LENGTH;
7723dd9
 
7723dd9
 		dtls1_get_ccs_header(rr->data, &ccs_hdr);
7723dd9
 
7723dd9
 		/* 'Change Cipher Spec' is just a single byte, so we know
7723dd9
 		 * exactly what the record payload has to look like */
7723dd9
 		/* XDTLS: check that epoch is consistent */
7723dd9
-		if (	(s->client_version == DTLS1_BAD_VER && rr->length != 3) ||
7723dd9
-			(s->client_version != DTLS1_BAD_VER && rr->length != DTLS1_CCS_HEADER_LENGTH) || 
7723dd9
-			(rr->off != 0) || (rr->data[0] != SSL3_MT_CCS))
7723dd9
+		if (s->client_version == DTLS1_BAD_VER || s->version == DTLS1_BAD_VER)
7723dd9
+			ccs_hdr_len = 3;
7723dd9
+
7723dd9
+		if ((rr->length != ccs_hdr_len) || (rr->off != 0) || (rr->data[0] != SSL3_MT_CCS))
7723dd9
 			{
7723dd9
 			i=SSL_AD_ILLEGAL_PARAMETER;
7723dd9
 			SSLerr(SSL_F_DTLS1_READ_BYTES,SSL_R_BAD_CHANGE_CIPHER_SPEC);
7723dd9
@@ -1358,7 +1360,7 @@
7723dd9
 #if 0
7723dd9
 	/* 'create_empty_fragment' is true only when this function calls itself */
7723dd9
 	if (!clear && !create_empty_fragment && !s->s3->empty_fragment_done
7723dd9
-		&& SSL_version(s) != DTLS1_VERSION)
7723dd9
+	    && SSL_version(s) != DTLS1_VERSION && SSL_version(s) != DTLS1_BAD_VER)
7723dd9
 		{
7723dd9
 		/* countermeasure against known-IV weakness in CBC ciphersuites
7723dd9
 		 * (see http://www.openssl.org/~bodo/tls-cbc.txt) 
7723dd9
Index: openssl/ssl/s3_clnt.c
7723dd9
RCS File: /v/openssl/cvs/openssl/ssl/s3_clnt.c,v
7723dd9
rcsdiff -q -kk '-r1.88.2.21' '-r1.88.2.22' -u '/v/openssl/cvs/openssl/ssl/s3_clnt.c,v' 2>/dev/null
7723dd9
--- openssl/ssl/s3_clnt.c 2009/02/14 21:50:14 1.88.2.21
7723dd9
+++ openssl/ssl/s3_clnt.c 2009/04/19 18:08:12 1.88.2.22
7723dd9
@@ -708,7 +708,7 @@
7723dd9
 
7723dd9
 	if (!ok) return((int)n);
7723dd9
 
7723dd9
-	if ( SSL_version(s) == DTLS1_VERSION)
7723dd9
+	if ( SSL_version(s) == DTLS1_VERSION || SSL_version(s) == DTLS1_BAD_VER)
7723dd9
 		{
7723dd9
 		if ( s->s3->tmp.message_type == DTLS1_MT_HELLO_VERIFY_REQUEST)
7723dd9
 			{
7723dd9
Index: openssl/ssl/ssl.h
7723dd9
RCS File: /v/openssl/cvs/openssl/ssl/ssl.h,v
7723dd9
rcsdiff -q -kk '-r1.161.2.21' '-r1.161.2.22' -u '/v/openssl/cvs/openssl/ssl/ssl.h,v' 2>/dev/null
7723dd9
--- openssl/ssl/ssl.h 2008/08/13 19:44:44 1.161.2.21
7723dd9
+++ openssl/ssl/ssl.h 2009/04/19 18:08:12 1.161.2.22
7723dd9
@@ -510,6 +510,8 @@
7723dd9
 #define SSL_OP_COOKIE_EXCHANGE              0x00002000L
7723dd9
 /* Don't use RFC4507 ticket extension */
7723dd9
 #define SSL_OP_NO_TICKET	            0x00004000L
7723dd9
+/* Use Cisco's "speshul" version of DTLS_BAD_VER (as client)  */
7723dd9
+#define SSL_OP_CISCO_ANYCONNECT		    0x00008000L
7723dd9
 
7723dd9
 /* As server, disallow session resumption on renegotiation */
7723dd9
 #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION	0x00010000L
7723dd9
Index: openssl/ssl/ssl_lib.c
7723dd9
RCS File: /v/openssl/cvs/openssl/ssl/ssl_lib.c,v
7723dd9
rcsdiff -q -kk '-r1.133.2.16' '-r1.133.2.17' -u '/v/openssl/cvs/openssl/ssl/ssl_lib.c,v' 2>/dev/null
7723dd9
--- openssl/ssl/ssl_lib.c 2009/02/23 16:02:47 1.133.2.16
7723dd9
+++ openssl/ssl/ssl_lib.c 2009/04/19 18:08:12 1.133.2.17
7723dd9
@@ -995,7 +995,8 @@
7723dd9
 		s->max_cert_list=larg;
7723dd9
 		return(l);
7723dd9
 	case SSL_CTRL_SET_MTU:
7723dd9
-		if (SSL_version(s) == DTLS1_VERSION)
7723dd9
+		if (SSL_version(s) == DTLS1_VERSION ||
7723dd9
+		    SSL_version(s) == DTLS1_BAD_VER)
7723dd9
 			{
7723dd9
 			s->d1->mtu = larg;
7723dd9
 			return larg;
7723dd9
Index: openssl/ssl/ssl_sess.c
7723dd9
RCS File: /v/openssl/cvs/openssl/ssl/ssl_sess.c,v
7723dd9
rcsdiff -q -kk '-r1.51.2.9' '-r1.51.2.10' -u '/v/openssl/cvs/openssl/ssl/ssl_sess.c,v' 2>/dev/null
7723dd9
--- openssl/ssl/ssl_sess.c 2008/06/04 18:35:27 1.51.2.9
7723dd9
+++ openssl/ssl/ssl_sess.c 2009/04/19 18:08:12 1.51.2.10
7723dd9
@@ -211,6 +211,11 @@
7723dd9
 			ss->ssl_version=TLS1_VERSION;
7723dd9
 			ss->session_id_length=SSL3_SSL_SESSION_ID_LENGTH;
7723dd9
 			}
7723dd9
+		else if (s->version == DTLS1_BAD_VER)
7723dd9
+			{
7723dd9
+			ss->ssl_version=DTLS1_BAD_VER;
7723dd9
+			ss->session_id_length=SSL3_SSL_SESSION_ID_LENGTH;
7723dd9
+			}
7723dd9
 		else if (s->version == DTLS1_VERSION)
7723dd9
 			{
7723dd9
 			ss->ssl_version=DTLS1_VERSION;
7723dd9
Index: openssl/ssl/t1_enc.c
7723dd9
RCS File: /v/openssl/cvs/openssl/ssl/t1_enc.c,v
7723dd9
rcsdiff -q -kk '-r1.35.2.8' '-r1.35.2.9' -u '/v/openssl/cvs/openssl/ssl/t1_enc.c,v' 2>/dev/null
7723dd9
--- openssl/ssl/t1_enc.c 2009/01/05 14:43:07 1.35.2.8
7723dd9
+++ openssl/ssl/t1_enc.c 2009/04/19 18:08:12 1.35.2.9
7723dd9
@@ -765,10 +765,10 @@
7723dd9
 	HMAC_CTX_init(&hmac);
7723dd9
 	HMAC_Init_ex(&hmac,mac_sec,EVP_MD_size(hash),hash,NULL);
7723dd9
 
7723dd9
-	if (ssl->version == DTLS1_VERSION && ssl->client_version != DTLS1_BAD_VER)
7723dd9
+	if (ssl->version == DTLS1_BAD_VER ||
7723dd9
+	    (ssl->version == DTLS1_VERSION && ssl->client_version != DTLS1_BAD_VER))
7723dd9
 		{
7723dd9
 		unsigned char dtlsseq[8],*p=dtlsseq;
7723dd9
-
7723dd9
 		s2n(send?ssl->d1->w_epoch:ssl->d1->r_epoch, p);
7723dd9
 		memcpy (p,&seq[2],6);
7723dd9
 
7723dd9
@@ -793,7 +793,7 @@
7723dd9
 {unsigned int z; for (z=0; z<rec->length; z++) printf("%02X ",buf[z]); printf("\n"); }
7723dd9
 #endif
7723dd9
 
7723dd9
-	if ( SSL_version(ssl) != DTLS1_VERSION)
7723dd9
+	if ( SSL_version(ssl) != DTLS1_VERSION && SSL_version(ssl) != DTLS1_BAD_VER)
7723dd9
 		{
7723dd9
 		for (i=7; i>=0; i--)
7723dd9
 			{