RFR: 8331682: Slow networks/Impatient clients can potentially send unencrypted TLSv1.3 alerts that won't parse on the server [v3]
Artur Barashev
duke at openjdk.org
Fri Sep 20 20:59:36 UTC 2024
On Fri, 20 Sep 2024 19:04:32 GMT, Bernd <duke at openjdk.org> wrote:
>> Artur Barashev has updated the pull request incrementally with one additional commit since the last revision:
>>
>> Add assertions. Add the final server wrap
>
> test/jdk/javax/net/ssl/TLSv13/SSLEngineNoServerHelloClientShutdown.java line 96:
>
>> 94: // won't generate BUFFER_OVERFLOWS.
>> 95: //
>> 96: // We'll use a mix of direct and indirect ByteBuffers for
>
> Same here, no tutorial?
Not sure I understand
> test/jdk/javax/net/ssl/TLSv13/SSLEngineNoServerHelloClientShutdown.java line 114:
>
>> 112:
>> 113: //
>> 114: // Protected methods could be used to customize the test case.
>
> Template comment can be removed
Done
-------------
PR Review Comment: https://git.openjdk.org/jdk/pull/21043#discussion_r1769248245
PR Review Comment: https://git.openjdk.org/jdk/pull/21043#discussion_r1769247434
More information about the security-dev
mailing list