From a5816a5ab99610201dcec57a0e02b883d9d32891 Mon Sep 17 00:00:00 2001 From: Matt Caswell Date: Tue, 7 Nov 2017 10:45:43 +0000 Subject: Implement session id TLSv1.3 middlebox compatibility mode Clients will send a "fake" session id and servers must echo it back. Reviewed-by: Ben Kaduk (Merged from https://github.com/openssl/openssl/pull/4701) --- crypto/err/openssl.txt | 1 + 1 file changed, 1 insertion(+) (limited to 'crypto') diff --git a/crypto/err/openssl.txt b/crypto/err/openssl.txt index 5c4ca2d6d0..4410314bc1 100644 --- a/crypto/err/openssl.txt +++ b/crypto/err/openssl.txt @@ -2463,6 +2463,7 @@ SSL_R_INVALID_MAX_EARLY_DATA:174:invalid max early data SSL_R_INVALID_NULL_CMD_NAME:385:invalid null cmd name SSL_R_INVALID_SEQUENCE_NUMBER:402:invalid sequence number SSL_R_INVALID_SERVERINFO_DATA:388:invalid serverinfo data +SSL_R_INVALID_SESSION_ID:232:invalid session id SSL_R_INVALID_SRP_USERNAME:357:invalid srp username SSL_R_INVALID_STATUS_RESPONSE:328:invalid status response SSL_R_INVALID_TICKET_KEYS_LENGTH:325:invalid ticket keys length -- cgit v1.2.3