diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2017-09-28 07:47:40 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2018-02-19 15:29:35 +0100 |
commit | 03a46184d1d54796e05d39ed5b98012b9a6c46b5 (patch) | |
tree | 35789b6170b2cacca09159b184ea110caa54b0b7 /lib/handshake.h | |
parent | 066b7d2631d4e57c3468dc51eaf9bc4c7c576ce7 (diff) | |
download | gnutls-03a46184d1d54796e05d39ed5b98012b9a6c46b5.tar.gz |
handshake: only attempt to detect downgrade attacks if TLS1.3 is supported
Otherwise, connections under TLS 1.2 may fail, even if client never enabled
TLS 1.3 support.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
Diffstat (limited to 'lib/handshake.h')
-rw-r--r-- | lib/handshake.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/handshake.h b/lib/handshake.h index 0e63ee39b4..b491ba1e51 100644 --- a/lib/handshake.h +++ b/lib/handshake.h @@ -61,7 +61,7 @@ int _gnutls_recv_handshake(gnutls_session_t session, gnutls_handshake_description_t type, unsigned int optional, gnutls_buffer_st * buf); int _gnutls_generate_session_id(uint8_t * session_id, uint8_t * len); -int _gnutls_set_server_random(gnutls_session_t session, int version, uint8_t * rnd); +int _gnutls_gen_server_random(gnutls_session_t session, int version); int _gnutls_set_client_random(gnutls_session_t session, uint8_t * rnd); int _gnutls_find_pk_algos_in_ciphersuites(uint8_t * data, int datalen); |