[gnutls-devel] GnuTLS | Fix non-empty session id (TLS13_APPENDIX_D4) (!1350)
Read-only notification of GnuTLS library development activities
gnutls-devel at lists.gnutls.org
Thu Nov 19 16:38:40 CET 2020
Norbert Pocs commented on a discussion on lib/handshake.c: https://gitlab.com/gnutls/gnutls/-/merge_requests/1350#note_451038762
>
> #ifdef TLS13_APPENDIX_D4
> if (max_ver->tls13_sem &&
> - session->security_parameters.session_id_size == 0) {
> + session->internals.resumed_security_parameters.session_id_size == 0) {
>
> /* Under TLS1.3 we generate a random session ID to make
> * the TLS1.3 session look like a resumed TLS1.2 session */
> - ret = _gnutls_generate_session_id(session->security_parameters.
> + ret = _gnutls_generate_session_id(session->internals.resumed_security_parameters.
The `tlsext-decoding` passing now. (haven't pushed yet)
There will be problem with the `prf`, because the output keeps changing everytime. The session_id is generated randomly, therefore it can not be compared with a static value.
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/merge_requests/1350#note_451038762
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20201119/c53ca5ec/attachment-0001.html>
More information about the Gnutls-devel
mailing list