summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
diff options
context:
space:
mode:
authortb <>2020-06-24 07:28:38 +0000
committertb <>2020-06-24 07:28:38 +0000
commite462afaa4660571e2f70d975fc276c4bce2dc53b (patch)
tree7c1b63d3c778f27da58f18d0adf05a7f79a1e2cf /src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
parentb9d0670685c64a09052a51a08ac46fafd3580cc8 (diff)
downloadopenbsd-e462afaa4660571e2f70d975fc276c4bce2dc53b.tar.gz
openbsd-e462afaa4660571e2f70d975fc276c4bce2dc53b.tar.bz2
openbsd-e462afaa4660571e2f70d975fc276c4bce2dc53b.zip
Enforce restrictions for ClientHello extensions
RFC 8446 section 9.2 imposes some requirements on the extensions sent in the ClientHello: key_share and supported_groups must either both be present or both be absent. If no pre_shared_key was sent, the CH must contain both signature_algorithms and supported_groups. If either of these conditions is violated, servers must abort the handshake with a missing_extensions alert. Add a function that enforces this. If we are going to enforce that clients send an SNI, we can also do this in this function. Fixes failing test case in tlsfuzzer's test-tls13-keyshare-omitted.py ok beck inoguchi jsing
Diffstat (limited to 'src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py')
0 files changed, 0 insertions, 0 deletions