> Le 21 janv. 2019 à 19:07, Dirkjan Bussink <d.buss...@gmail.com> a écrit :
> 
> Hi Manu,
> 
>> On 21 Jan 2019, at 09:49, Emmanuel Hocdet <m...@gandi.net> wrote:
>> 
>> Boringssl does not have SSL_OP_NO_RENEGOTIATION and need KeyUpdate to work.
>> As workaround, SSL_OP_NO_RENEGOTIATION could be set to 0 in openssl-compat.h.
> 
> Hmm, then we will need a different #define though since we can’t rely own the 
> constant not being defined in that case to disable the logic. We would need a 
> separate way to detect this then. Is there a good example of this or should I 
> change the logic then to version checks instead? And how about LibreSSL in 
> that case?
> 
> Does BoringSSL need any of the logic in the first place? There’s not really 
> versions of it, so is the target there always current master or something 
> else? 
> 


No need to change, SSL_OP_NO_RENEGOTIATION is now in Boringssl, thanks Adam, 
and renegotiation is disabled by default.
For LibreSSL, no TLSv1.3, no SSL_OP_NO_RENEGOTIATION.

++
Manu




Reply via email to