diff options
author | Theo Buehler <tb@cvs.openbsd.org> | 2020-03-06 16:36:48 +0000 |
---|---|---|
committer | Theo Buehler <tb@cvs.openbsd.org> | 2020-03-06 16:36:48 +0000 |
commit | d7033684835fbe673f22522f38a247f53b908aa9 (patch) | |
tree | 0287b5f44a44309a11b5f31ac2f6d467c196df9a /usr.sbin/ospf6d/carp.c | |
parent | b2100ee1ba26f1417a0d9d51264215fa4327265b (diff) |
RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello for
TLSv1.1 or below, it should check whether the server's random value
contains the magic downgrade protection cookie and in that case abort
the handshake with an illegal parameter alert.
ok inoguchi, jsing
Diffstat (limited to 'usr.sbin/ospf6d/carp.c')
0 files changed, 0 insertions, 0 deletions