diff options
author | tb <> | 2020-05-09 16:43:05 +0000 |
---|---|---|
committer | tb <> | 2020-05-09 16:43:05 +0000 |
commit | 5f9e50161ad02213ce0e8e216933bde0efc8bc02 (patch) | |
tree | b490ec08313675814e5201e93eb75bdb10cac539 /src/lib/libssl/tls13_internal.h | |
parent | 99c3d9d6560601ac170c9657a01cf72bd69cfe63 (diff) | |
download | openbsd-5f9e50161ad02213ce0e8e216933bde0efc8bc02.tar.gz openbsd-5f9e50161ad02213ce0e8e216933bde0efc8bc02.tar.bz2 openbsd-5f9e50161ad02213ce0e8e216933bde0efc8bc02.zip |
Send dummy ChangeCipherSpec messages from the TLSv1.3 server
If the client has requested middle box compatibility mode by sending
a non-empty legacy_session_id, the server must send a dummy CCS right
after its first handshake message. This means right after ServerHello
or HelloRetryRequest.
ok jsing
Diffstat (limited to 'src/lib/libssl/tls13_internal.h')
-rw-r--r-- | src/lib/libssl/tls13_internal.h | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/src/lib/libssl/tls13_internal.h b/src/lib/libssl/tls13_internal.h index 438423aaff..e3aaf634c3 100644 --- a/src/lib/libssl/tls13_internal.h +++ b/src/lib/libssl/tls13_internal.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: tls13_internal.h,v 1.70 2020/05/09 15:47:11 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_internal.h,v 1.71 2020/05/09 16:43:05 tb Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2018 Bob Beck <beck@openbsd.org> | 3 | * Copyright (c) 2018 Bob Beck <beck@openbsd.org> |
4 | * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> | 4 | * Copyright (c) 2018 Theo Buehler <tb@openbsd.org> |
@@ -323,6 +323,7 @@ int tls13_server_hello_send(struct tls13_ctx *ctx, CBB *cbb); | |||
323 | int tls13_server_hello_sent(struct tls13_ctx *ctx); | 323 | int tls13_server_hello_sent(struct tls13_ctx *ctx); |
324 | int tls13_server_hello_retry_request_recv(struct tls13_ctx *ctx, CBS *cbs); | 324 | int tls13_server_hello_retry_request_recv(struct tls13_ctx *ctx, CBS *cbs); |
325 | int tls13_server_hello_retry_request_send(struct tls13_ctx *ctx, CBB *cbb); | 325 | int tls13_server_hello_retry_request_send(struct tls13_ctx *ctx, CBB *cbb); |
326 | int tls13_server_hello_retry_request_sent(struct tls13_ctx *ctx); | ||
326 | int tls13_server_encrypted_extensions_recv(struct tls13_ctx *ctx, CBS *cbs); | 327 | int tls13_server_encrypted_extensions_recv(struct tls13_ctx *ctx, CBS *cbs); |
327 | int tls13_server_encrypted_extensions_send(struct tls13_ctx *ctx, CBB *cbb); | 328 | int tls13_server_encrypted_extensions_send(struct tls13_ctx *ctx, CBB *cbb); |
328 | int tls13_server_certificate_recv(struct tls13_ctx *ctx, CBS *cbs); | 329 | int tls13_server_certificate_recv(struct tls13_ctx *ctx, CBS *cbs); |