Home
last modified time | relevance | path

Searched hist:d8bc0d06 (Results 1 – 5 of 5) sorted by relevance

/openbsd/regress/usr.sbin/syslogd/
H A Dargs-server-tls-error.pld8bc0d06 Fri Oct 16 22:46:45 GMT 2020 bluhm <bluhm@openbsd.org> With TLS 1.2 the step by step handshake created precise error
conditions. TLS 1.3 shortens the handshake, so some errors cannot
be reported properly to the other side. Instead the connection is
closed and the other side receives a SIGPIPE when it tries to write
the next TLS protocol message. Ignore this SIGPIPE signal in TLS
client and server and adapt error messages when grepping the log
files.
discussed with tb@ and jsing@
H A Dargs-client-tls-fake.pld8bc0d06 Fri Oct 16 22:46:45 GMT 2020 bluhm <bluhm@openbsd.org> With TLS 1.2 the step by step handshake created precise error
conditions. TLS 1.3 shortens the handshake, so some errors cannot
be reported properly to the other side. Instead the connection is
closed and the other side receives a SIGPIPE when it tries to write
the next TLS protocol message. Ignore this SIGPIPE signal in TLS
client and server and adapt error messages when grepping the log
files.
discussed with tb@ and jsing@
H A Dargs-tls-cafile-fake.pld8bc0d06 Fri Oct 16 22:46:45 GMT 2020 bluhm <bluhm@openbsd.org> With TLS 1.2 the step by step handshake created precise error
conditions. TLS 1.3 shortens the handshake, so some errors cannot
be reported properly to the other side. Instead the connection is
closed and the other side receives a SIGPIPE when it tries to write
the next TLS protocol message. Ignore this SIGPIPE signal in TLS
client and server and adapt error messages when grepping the log
files.
discussed with tb@ and jsing@
H A DServer.pmd8bc0d06 Fri Oct 16 22:46:45 GMT 2020 bluhm <bluhm@openbsd.org> With TLS 1.2 the step by step handshake created precise error
conditions. TLS 1.3 shortens the handshake, so some errors cannot
be reported properly to the other side. Instead the connection is
closed and the other side receives a SIGPIPE when it tries to write
the next TLS protocol message. Ignore this SIGPIPE signal in TLS
client and server and adapt error messages when grepping the log
files.
discussed with tb@ and jsing@
H A DClient.pmd8bc0d06 Fri Oct 16 22:46:45 GMT 2020 bluhm <bluhm@openbsd.org> With TLS 1.2 the step by step handshake created precise error
conditions. TLS 1.3 shortens the handshake, so some errors cannot
be reported properly to the other side. Instead the connection is
closed and the other side receives a SIGPIPE when it tries to write
the next TLS protocol message. Ignore this SIGPIPE signal in TLS
client and server and adapt error messages when grepping the log
files.
discussed with tb@ and jsing@