| Index: third_party/tlslite/patches/fallback_scsv.patch
|
| diff --git a/third_party/tlslite/patches/fallback_scsv.patch b/third_party/tlslite/patches/fallback_scsv.patch
|
| index 9a64f11b9d53df5caa0043d0bda107ebacc04137..8cd5f828896b623e1187deb82f89ae97abd1212e 100644
|
| --- a/third_party/tlslite/patches/fallback_scsv.patch
|
| +++ b/third_party/tlslite/patches/fallback_scsv.patch
|
| @@ -115,12 +115,13 @@ index 45b0bbb..bd92161 100755
|
| #Initialize acceptable cipher suites
|
| cipherSuites = []
|
| if verifierDB:
|
| -@@ -1280,6 +1289,13 @@ class TLSConnection(TLSRecordLayer):
|
| +@@ -1280,6 +1289,14 @@ class TLSConnection(TLSRecordLayer):
|
| elif clientHello.client_version > settings.maxVersion:
|
| self.version = settings.maxVersion
|
|
|
| + #Detect if the client performed an inappropriate fallback.
|
| + elif fallbackSCSV and clientHello.client_version < settings.maxVersion:
|
| ++ self.version = clientHello.client_version
|
| + if CipherSuite.TLS_FALLBACK_SCSV in clientHello.cipher_suites:
|
| + for result in self._sendError(\
|
| + AlertDescription.inappropriate_fallback):
|
|
|