Matt Caswell
|
5627f9f217
|
Don't detect a downgrade where the server has a protocol version hole
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7013)
|
4 years ago |
Matt Caswell
|
3e7cb13dff
|
Test that a client protocol "hole" doesn't get detected as a downgrade
Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7013)
|
4 years ago |
Matt Caswell
|
9f22c52723
|
Turn on TLSv1.3 downgrade protection by default
Reviewed-by: Ben Kaduk <kaduk@mit.edu>
Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6741)
|
4 years ago |
Matt Caswell
|
9b287d53db
|
Add a test for TLSv1.3 fallback
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Richard Levitte <levitte@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6894)
|
4 years ago |
Matt Caswell
|
6738bf1417
|
Update copyright year
Reviewed-by: Richard Levitte <levitte@openssl.org>
|
5 years ago |
Richard Levitte
|
c5856878f7
|
Enable TLSProxy tests on Windows
Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
(Merged from https://github.com/openssl/openssl/pull/5094)
|
5 years ago |
Matt Caswell
|
b9647e34ff
|
Add a test for the TLSv1.3 downgrade mechanism
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/3022)
|
5 years ago |