bde00394f0
This is the only codepath where ssl->version can get a garbage value, which is a little concerning. Since, in all these cases, the peer is failing to connect and speaks so low a version we don't even accept it anymore, there is probably not much value in letting them distinguish protocol_version from a record-layer version number mismatch, where enforced (which will give a version-related error anyway). Should we get a decode_error or so just before version negotiation, we'd have this behavior already. Change-Id: I9b3e5685ab9c9ad32a7b7e3129363cd1d4cdaaf4 Reviewed-on: https://boringssl-review.googlesource.com/8420 Reviewed-by: Steven Valdez <svaldez@google.com> Reviewed-by: David Benjamin <davidben@google.com> |
||
---|---|---|
.. | ||
curve25519 | ||
newhope | ||
poly1305 | ||
alert.go | ||
cert.pem | ||
chacha20_poly1305_test.go | ||
chacha20_poly1305.go | ||
channel_id_key.pem | ||
cipher_suites.go | ||
common.go | ||
conn.go | ||
deterministic.go | ||
dtls.go | ||
ecdsa_cert.pem | ||
ecdsa_key.pem | ||
handshake_client.go | ||
handshake_messages.go | ||
handshake_server.go | ||
key_agreement.go | ||
key.pem | ||
packet_adapter.go | ||
prf.go | ||
recordingconn.go | ||
runner_test.go | ||
runner.go | ||
test_output.go | ||
ticket.go | ||
tls.go |