summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dsa/dsa.h
diff options
context:
space:
mode:
authorsthen <>2019-06-07 15:09:44 +0000
committersthen <>2019-06-07 15:09:44 +0000
commit0bf5879252bed3b1820cbb108739af35cb476d61 (patch)
treed2e3ede61e41cd4a9a8e09122af8a3aadcbe3e9b /src/lib/libcrypto/dsa/dsa.h
parent950be137865e7f7582b1486db4ef418b541a19ee (diff)
downloadopenbsd-0bf5879252bed3b1820cbb108739af35cb476d61.tar.gz
openbsd-0bf5879252bed3b1820cbb108739af35cb476d61.tar.bz2
openbsd-0bf5879252bed3b1820cbb108739af35cb476d61.zip
MFC libssl fix - rev 1.49 (commitid: DLpHk0vyoFEK0Baa)
--- Relax parsing of TLS key share extensions on the server. The RFC does not require X25519 and it also allows clients to send an empty key share when the want the server to select a group. The current behaviour results in handshake failures where the client supports TLS 1.3 and sends a TLS key share extension that does not contain X25519. --- (this fixes server side in some cases with TLS 1.3 clients with what would normally be unusual config - however triggered by recent Firefox packages on Fedora, https://bugzilla.redhat.com/show_bug.cgi?id=1713777)
Diffstat (limited to 'src/lib/libcrypto/dsa/dsa.h')
0 files changed, 0 insertions, 0 deletions