summaryrefslogtreecommitdiff
path: root/src/lib/libssl/s3_lib.c
diff options
context:
space:
mode:
authortb <>2021-03-20 08:12:53 +0000
committertb <>2021-03-20 08:12:53 +0000
commit7e7e1b7c29681d7a4a8fa5c7d98cf17e2badd7c9 (patch)
treedffd18d5898d3aa2a961d751d7ca8e0932d98dd7 /src/lib/libssl/s3_lib.c
parentf142830c81fd386d266e92dc1608f87df6b5f2e5 (diff)
downloadopenbsd-7e7e1b7c29681d7a4a8fa5c7d98cf17e2badd7c9.tar.gz
openbsd-7e7e1b7c29681d7a4a8fa5c7d98cf17e2badd7c9.tar.bz2
openbsd-7e7e1b7c29681d7a4a8fa5c7d98cf17e2badd7c9.zip
Add new test-tls13-multiple-ccs-messages.py
This is a test that checks for NSS's CCS flood DoS CVE-2020-25648. The test script currently fails on LibreSSL and OpenSSL 1.1.1j because it sends invalid records with version 0x0300 instead of 0x0303. We have the ccs_seen logic corresponding to NSS's fix: https://hg.mozilla.org/projects/nss/rev/57bbefa793232586d27cee83e74411171e128361 but we do allow up to two CCS due to an interop issue with Fizz, so at least one of the tests will likey be broken once the record version is fixed.
Diffstat (limited to 'src/lib/libssl/s3_lib.c')
0 files changed, 0 insertions, 0 deletions