diff --git a/crypto/src/crypto/tls/AbstractTlsClient.cs b/crypto/src/crypto/tls/AbstractTlsClient.cs
index 9944b0b18..8b6e85af5 100644
--- a/crypto/src/crypto/tls/AbstractTlsClient.cs
+++ b/crypto/src/crypto/tls/AbstractTlsClient.cs
@@ -70,7 +70,7 @@ namespace Org.BouncyCastle.Crypto.Tls
public virtual bool IsFallback
{
/*
- * draft-bmoeller-tls-downgrade-scsv-02 4. [..] is meant for use by clients that repeat a
+ * draft-ietf-tls-downgrade-scsv-00 4. [..] is meant for use by clients that repeat a
* connection attempt with a downgraded protocol in order to avoid interoperability problems
* with legacy servers.
*/
diff --git a/crypto/src/crypto/tls/AbstractTlsServer.cs b/crypto/src/crypto/tls/AbstractTlsServer.cs
index 6cd9a881e..b0a5f0d52 100644
--- a/crypto/src/crypto/tls/AbstractTlsServer.cs
+++ b/crypto/src/crypto/tls/AbstractTlsServer.cs
@@ -113,7 +113,7 @@ namespace Org.BouncyCastle.Crypto.Tls
public virtual void NotifyFallback(bool isFallback)
{
/*
- * draft-bmoeller-tls-downgrade-scsv-02 3. If TLS_FALLBACK_SCSV appears in
+ * draft-ietf-tls-downgrade-scsv-00 3. If TLS_FALLBACK_SCSV appears in
* ClientHello.cipher_suites and the highest protocol version supported by the server is
* higher than the version indicated in ClientHello.client_version, the server MUST respond
* with an inappropriate_fallback alert.
diff --git a/crypto/src/crypto/tls/AlertDescription.cs b/crypto/src/crypto/tls/AlertDescription.cs
index ab6924567..49de60cea 100644
--- a/crypto/src/crypto/tls/AlertDescription.cs
+++ b/crypto/src/crypto/tls/AlertDescription.cs
@@ -215,7 +215,7 @@ namespace Org.BouncyCastle.Crypto.Tls
public const byte unknown_psk_identity = 115;
/*
- * draft-bmoeller-tls-downgrade-scsv-02
+ * draft-ietf-tls-downgrade-scsv-00
*/
/**
diff --git a/crypto/src/crypto/tls/CipherSuite.cs b/crypto/src/crypto/tls/CipherSuite.cs
index 540b5d18d..bff63c6b6 100644
--- a/crypto/src/crypto/tls/CipherSuite.cs
+++ b/crypto/src/crypto/tls/CipherSuite.cs
@@ -350,7 +350,7 @@ namespace Org.BouncyCastle.Crypto.Tls
public const int TLS_DHE_RSA_WITH_SALSA20_SHA1 = 0xE41F;
/*
- * draft-bmoeller-tls-downgrade-scsv-02
+ * draft-ietf-tls-downgrade-scsv-00
*/
public const int TLS_FALLBACK_SCSV = 0x5600;
diff --git a/crypto/src/crypto/tls/DtlsClientProtocol.cs b/crypto/src/crypto/tls/DtlsClientProtocol.cs
index ae6ebbce8..67c49f890 100644
--- a/crypto/src/crypto/tls/DtlsClientProtocol.cs
+++ b/crypto/src/crypto/tls/DtlsClientProtocol.cs
@@ -455,10 +455,10 @@ namespace Org.BouncyCastle.Crypto.Tls
}
/*
- * draft-bmoeller-tls-downgrade-scsv-02 4. If a client sends a
- * ClientHello.client_version containing a lower value than the latest (highest-valued)
- * version supported by the client, it SHOULD include the TLS_FALLBACK_SCSV cipher suite
- * value in ClientHello.cipher_suites.
+ * draft-ietf-tls-downgrade-scsv-00 4. If a client sends a ClientHello.client_version
+ * containing a lower value than the latest (highest-valued) version supported by the
+ * client, it SHOULD include the TLS_FALLBACK_SCSV cipher suite value in
+ * ClientHello.cipher_suites.
*/
if (fallback && !Arrays.Contains(state.offeredCipherSuites, CipherSuite.TLS_FALLBACK_SCSV))
{
diff --git a/crypto/src/crypto/tls/TlsClientProtocol.cs b/crypto/src/crypto/tls/TlsClientProtocol.cs
index ea8a1b2e4..19e7d71aa 100644
--- a/crypto/src/crypto/tls/TlsClientProtocol.cs
+++ b/crypto/src/crypto/tls/TlsClientProtocol.cs
@@ -863,10 +863,10 @@ namespace Org.BouncyCastle.Crypto.Tls
}
/*
- * draft-bmoeller-tls-downgrade-scsv-02 4. If a client sends a
- * ClientHello.client_version containing a lower value than the latest (highest-valued)
- * version supported by the client, it SHOULD include the TLS_FALLBACK_SCSV cipher suite
- * value in ClientHello.cipher_suites.
+ * draft-ietf-tls-downgrade-scsv-00 4. If a client sends a ClientHello.client_version
+ * containing a lower value than the latest (highest-valued) version supported by the
+ * client, it SHOULD include the TLS_FALLBACK_SCSV cipher suite value in
+ * ClientHello.cipher_suites.
*/
if (fallback && !Arrays.Contains(mOfferedCipherSuites, CipherSuite.TLS_FALLBACK_SCSV))
{
|