RFR: 8331682: Slow networks/Impatient clients can potentially send unencrypted TLSv1.3 alerts that won't parse on the server [v3]

Artur Barashev duke at openjdk.org
Fri Sep 20 20:59:36 UTC 2024


On Fri, 20 Sep 2024 19:04:32 GMT, Bernd <duke at openjdk.org> wrote:

>> Artur Barashev has updated the pull request incrementally with one additional commit since the last revision:
>> 
>>   Add assertions. Add the final server wrap
>
> test/jdk/javax/net/ssl/TLSv13/SSLEngineNoServerHelloClientShutdown.java line 96:
> 
>> 94:         // won't generate BUFFER_OVERFLOWS.
>> 95:         //
>> 96:         // We'll use a mix of direct and indirect ByteBuffers for
> 
> Same here, no tutorial?

Not sure I understand

> test/jdk/javax/net/ssl/TLSv13/SSLEngineNoServerHelloClientShutdown.java line 114:
> 
>> 112: 
>> 113:     //
>> 114:     // Protected methods could be used to customize the test case.
> 
> Template comment can be removed

Done

-------------

PR Review Comment: https://git.openjdk.org/jdk/pull/21043#discussion_r1769248245
PR Review Comment: https://git.openjdk.org/jdk/pull/21043#discussion_r1769247434


More information about the security-dev mailing list