diff options
-rw-r--r-- | crypto/src/crypto/tls/AbstractTlsClient.cs | 2 | ||||
-rw-r--r-- | crypto/src/crypto/tls/AbstractTlsServer.cs | 2 | ||||
-rw-r--r-- | crypto/src/crypto/tls/AlertDescription.cs | 2 | ||||
-rw-r--r-- | crypto/src/crypto/tls/CipherSuite.cs | 2 | ||||
-rw-r--r-- | crypto/src/crypto/tls/DtlsClientProtocol.cs | 8 | ||||
-rw-r--r-- | crypto/src/crypto/tls/TlsClientProtocol.cs | 8 |
6 files changed, 12 insertions, 12 deletions
diff --git a/crypto/src/crypto/tls/AbstractTlsClient.cs b/crypto/src/crypto/tls/AbstractTlsClient.cs index 9944b0b18..8b6e85af5 100644 --- a/crypto/src/crypto/tls/AbstractTlsClient.cs +++ b/crypto/src/crypto/tls/AbstractTlsClient.cs @@ -70,7 +70,7 @@ namespace Org.BouncyCastle.Crypto.Tls public virtual bool IsFallback { /* - * draft-bmoeller-tls-downgrade-scsv-02 4. [..] is meant for use by clients that repeat a + * draft-ietf-tls-downgrade-scsv-00 4. [..] is meant for use by clients that repeat a * connection attempt with a downgraded protocol in order to avoid interoperability problems * with legacy servers. */ diff --git a/crypto/src/crypto/tls/AbstractTlsServer.cs b/crypto/src/crypto/tls/AbstractTlsServer.cs index 6cd9a881e..b0a5f0d52 100644 --- a/crypto/src/crypto/tls/AbstractTlsServer.cs +++ b/crypto/src/crypto/tls/AbstractTlsServer.cs @@ -113,7 +113,7 @@ namespace Org.BouncyCastle.Crypto.Tls public virtual void NotifyFallback(bool isFallback) { /* - * draft-bmoeller-tls-downgrade-scsv-02 3. If TLS_FALLBACK_SCSV appears in + * draft-ietf-tls-downgrade-scsv-00 3. If TLS_FALLBACK_SCSV appears in * ClientHello.cipher_suites and the highest protocol version supported by the server is * higher than the version indicated in ClientHello.client_version, the server MUST respond * with an inappropriate_fallback alert. diff --git a/crypto/src/crypto/tls/AlertDescription.cs b/crypto/src/crypto/tls/AlertDescription.cs index ab6924567..49de60cea 100644 --- a/crypto/src/crypto/tls/AlertDescription.cs +++ b/crypto/src/crypto/tls/AlertDescription.cs @@ -215,7 +215,7 @@ namespace Org.BouncyCastle.Crypto.Tls public const byte unknown_psk_identity = 115; /* - * draft-bmoeller-tls-downgrade-scsv-02 + * draft-ietf-tls-downgrade-scsv-00 */ /** diff --git a/crypto/src/crypto/tls/CipherSuite.cs b/crypto/src/crypto/tls/CipherSuite.cs index 540b5d18d..bff63c6b6 100644 --- a/crypto/src/crypto/tls/CipherSuite.cs +++ b/crypto/src/crypto/tls/CipherSuite.cs @@ -350,7 +350,7 @@ namespace Org.BouncyCastle.Crypto.Tls public const int TLS_DHE_RSA_WITH_SALSA20_SHA1 = 0xE41F; /* - * draft-bmoeller-tls-downgrade-scsv-02 + * draft-ietf-tls-downgrade-scsv-00 */ public const int TLS_FALLBACK_SCSV = 0x5600; diff --git a/crypto/src/crypto/tls/DtlsClientProtocol.cs b/crypto/src/crypto/tls/DtlsClientProtocol.cs index ae6ebbce8..67c49f890 100644 --- a/crypto/src/crypto/tls/DtlsClientProtocol.cs +++ b/crypto/src/crypto/tls/DtlsClientProtocol.cs @@ -455,10 +455,10 @@ namespace Org.BouncyCastle.Crypto.Tls } /* - * draft-bmoeller-tls-downgrade-scsv-02 4. If a client sends a - * ClientHello.client_version containing a lower value than the latest (highest-valued) - * version supported by the client, it SHOULD include the TLS_FALLBACK_SCSV cipher suite - * value in ClientHello.cipher_suites. + * draft-ietf-tls-downgrade-scsv-00 4. If a client sends a ClientHello.client_version + * containing a lower value than the latest (highest-valued) version supported by the + * client, it SHOULD include the TLS_FALLBACK_SCSV cipher suite value in + * ClientHello.cipher_suites. */ if (fallback && !Arrays.Contains(state.offeredCipherSuites, CipherSuite.TLS_FALLBACK_SCSV)) { diff --git a/crypto/src/crypto/tls/TlsClientProtocol.cs b/crypto/src/crypto/tls/TlsClientProtocol.cs index ea8a1b2e4..19e7d71aa 100644 --- a/crypto/src/crypto/tls/TlsClientProtocol.cs +++ b/crypto/src/crypto/tls/TlsClientProtocol.cs @@ -863,10 +863,10 @@ namespace Org.BouncyCastle.Crypto.Tls } /* - * draft-bmoeller-tls-downgrade-scsv-02 4. If a client sends a - * ClientHello.client_version containing a lower value than the latest (highest-valued) - * version supported by the client, it SHOULD include the TLS_FALLBACK_SCSV cipher suite - * value in ClientHello.cipher_suites. + * draft-ietf-tls-downgrade-scsv-00 4. If a client sends a ClientHello.client_version + * containing a lower value than the latest (highest-valued) version supported by the + * client, it SHOULD include the TLS_FALLBACK_SCSV cipher suite value in + * ClientHello.cipher_suites. */ if (fallback && !Arrays.Contains(mOfferedCipherSuites, CipherSuite.TLS_FALLBACK_SCSV)) { |