summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_buffer.c
diff options
context:
space:
mode:
authortb <>2020-03-06 16:36:47 +0000
committertb <>2020-03-06 16:36:47 +0000
commit9ad7f732b50e06beb7ceecfd95ddf0814ae3fee2 (patch)
treef194956f6cc45bdd486f4e083b6e524918c304a6 /src/lib/libssl/tls13_buffer.c
parent6326e46ece7f938469b33d5f69c4d12688618e6e (diff)
downloadopenbsd-9ad7f732b50e06beb7ceecfd95ddf0814ae3fee2.tar.gz
openbsd-9ad7f732b50e06beb7ceecfd95ddf0814ae3fee2.tar.bz2
openbsd-9ad7f732b50e06beb7ceecfd95ddf0814ae3fee2.zip
RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello for
TLSv1.1 or below, it should check whether the server's random value contains the magic downgrade protection cookie and in that case abort the handshake with an illegal parameter alert. ok inoguchi, jsing
Diffstat (limited to 'src/lib/libssl/tls13_buffer.c')
0 files changed, 0 insertions, 0 deletions