summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_handshake.c
diff options
context:
space:
mode:
authortb <>2020-03-06 16:36:47 +0000
committertb <>2020-03-06 16:36:47 +0000
commit3be36c8843a332517575048813c2cda232e68351 (patch)
treef194956f6cc45bdd486f4e083b6e524918c304a6 /src/lib/libssl/tls13_handshake.c
parentb45fe405c275184a592f345ffae87ebe84f526c9 (diff)
downloadopenbsd-3be36c8843a332517575048813c2cda232e68351.tar.gz
openbsd-3be36c8843a332517575048813c2cda232e68351.tar.bz2
openbsd-3be36c8843a332517575048813c2cda232e68351.zip
RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello for
TLSv1.1 or below, it should check whether the server's random value contains the magic downgrade protection cookie and in that case abort the handshake with an illegal parameter alert. ok inoguchi, jsing
Diffstat (limited to 'src/lib/libssl/tls13_handshake.c')
0 files changed, 0 insertions, 0 deletions