@@ -3149,7 +3149,7 @@ int test_tls13_warning_alert_is_fatal(void)
31493149}
31503150
31513151/* Test that an unknown extension in a TLS 1.3 server-to-client message is
3152- * rejected with unsupported_extension (RFC 8446 § 4.2). The client MUST abort
3152+ * rejected with unsupported_extension (RFC 8446 4.2). The client MUST abort
31533153 * the handshake when it receives an extension it did not advertise.
31543154 */
31553155 int test_tls13_unknown_ext_rejected (void )
@@ -3166,9 +3166,9 @@ int test_tls13_warning_alert_is_fatal(void)
31663166 * (TLS 1.3), and an extra unknown extension type 0xFABC.
31673167 *
31683168 * The base HRR (from test_tls13_same_ch) extended with 4 bytes:
3169- * extensions length: 6 → 10 (0x00,0x0a)
3170- * handshake body length: 46 → 50 (0x00,0x00,0x32)
3171- * record body length: 50 → 54 (0x00,0x36)
3169+ * extensions length: 6 -> 10 (0x00,0x0a)
3170+ * handshake body length: 46 -> 50 (0x00,0x00,0x32)
3171+ * record body length: 50 -> 54 (0x00,0x36)
31723172 * appended: 0xfa,0xbc,0x00,0x00 (unknown type, zero-length value)
31733173 */
31743174 static const unsigned char hrr_unknown_ext [] = {
@@ -3206,7 +3206,7 @@ int test_tls13_warning_alert_is_fatal(void)
32063206 ExpectIntEQ (test_memio_inject_message (& test_ctx , 1 ,
32073207 (const char * )hrr_unknown_ext , sizeof (hrr_unknown_ext )), 0 );
32083208
3209- /* RFC 8446 § 4.2: the client MUST abort with unsupported_extension. */
3209+ /* RFC 8446 4.2: the client MUST abort with unsupported_extension. */
32103210 ExpectIntEQ (wolfSSL_connect (ssl_c ), -1 );
32113211 ExpectIntEQ (wolfSSL_get_error (ssl_c , -1 ),
32123212 WC_NO_ERR_TRACE (UNSUPPORTED_EXTENSION ));
0 commit comments