summaryrefslogtreecommitdiff
path: root/usr.sbin/ospf6d/carp.c
diff options
context:
space:
mode:
authorTheo Buehler <tb@cvs.openbsd.org>2020-03-06 16:36:48 +0000
committerTheo Buehler <tb@cvs.openbsd.org>2020-03-06 16:36:48 +0000
commitd7033684835fbe673f22522f38a247f53b908aa9 (patch)
tree0287b5f44a44309a11b5f31ac2f6d467c196df9a /usr.sbin/ospf6d/carp.c
parentb2100ee1ba26f1417a0d9d51264215fa4327265b (diff)
RFC 8446, section 4.1.3: If a TLSv1.2 client receives a ServerHello for
TLSv1.1 or below, it should check whether the server's random value contains the magic downgrade protection cookie and in that case abort the handshake with an illegal parameter alert. ok inoguchi, jsing
Diffstat (limited to 'usr.sbin/ospf6d/carp.c')
0 files changed, 0 insertions, 0 deletions