summaryrefslogtreecommitdiff
path: root/lib/handshake.h
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2017-09-28 07:47:40 +0200
committerNikos Mavrogiannopoulos <nmav@redhat.com>2018-02-19 15:29:35 +0100
commit03a46184d1d54796e05d39ed5b98012b9a6c46b5 (patch)
tree35789b6170b2cacca09159b184ea110caa54b0b7 /lib/handshake.h
parent066b7d2631d4e57c3468dc51eaf9bc4c7c576ce7 (diff)
downloadgnutls-03a46184d1d54796e05d39ed5b98012b9a6c46b5.tar.gz
handshake: only attempt to detect downgrade attacks if TLS1.3 is supported
Otherwise, connections under TLS 1.2 may fail, even if client never enabled TLS 1.3 support. Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'lib/handshake.h')
-rw-r--r--lib/handshake.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/handshake.h b/lib/handshake.h
index 0e63ee39b4..b491ba1e51 100644
--- a/lib/handshake.h
+++ b/lib/handshake.h
@@ -61,7 +61,7 @@ int _gnutls_recv_handshake(gnutls_session_t session,
gnutls_handshake_description_t type,
unsigned int optional, gnutls_buffer_st * buf);
int _gnutls_generate_session_id(uint8_t * session_id, uint8_t * len);
-int _gnutls_set_server_random(gnutls_session_t session, int version, uint8_t * rnd);
+int _gnutls_gen_server_random(gnutls_session_t session, int version);
int _gnutls_set_client_random(gnutls_session_t session, uint8_t * rnd);
int _gnutls_find_pk_algos_in_ciphersuites(uint8_t * data, int datalen);