nit: Update references to draft-ietf-tls-subcerts.

Change-Id: Ica6ea6eaff1849c7ee42be671b22006fe3ee5ff4
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/35444
Reviewed-by: Adam Langley <agl@google.com>
Commit-Queue: Adam Langley <agl@google.com>
This commit is contained in:
Christopher Patton 2019-04-01 15:39:04 -04:00 committed by CQ bot account: commit-bot@chromium.org
parent a4af5f85bd
commit be9953accf
2 changed files with 2 additions and 2 deletions

View File

@ -1392,7 +1392,7 @@ struct DC {
static UniquePtr<DC> Parse(CRYPTO_BUFFER *in, uint8_t *out_alert);
// raw is the delegated credential encoded as specified in draft-ietf-tls-
// subcerts-02.
// subcerts-03.
UniquePtr<CRYPTO_BUFFER> raw;
// expected_cert_verify_algorithm is the signature scheme of the DC public

View File

@ -2717,7 +2717,7 @@ static bool ext_delegated_credential_parse_clienthello(SSL_HANDSHAKE *hs,
assert(TLSEXT_TYPE_delegated_credential == 0xff02);
// TODO: Check that the extension is empty.
//
// As of draft-02, the client sends an empty extension in order indicate
// As of draft-03, the client sends an empty extension in order indicate
// support for delegated credentials. This could change, however, since the
// spec is not yet finalized. This assertion is here to remind us to enforce
// this check once the extension ID is assigned.