diff options
author | Jack Lloyd <[email protected]> | 2016-01-03 18:27:44 -0500 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2016-01-03 18:27:44 -0500 |
commit | 2713825275950737441a063b8ea8df25981d53b1 (patch) | |
tree | 652ce64b676ab10f1a3161d92e9d398a2abf8298 /src/lib/tls/tls_server.cpp | |
parent | 4658f3094d652a012c29837910aef89788654b55 (diff) |
Add extended master secret extension (RFC 7627) to TLS
Interop tested with mbed TLS
Diffstat (limited to 'src/lib/tls/tls_server.cpp')
-rw-r--r-- | src/lib/tls/tls_server.cpp | 21 |
1 files changed, 20 insertions, 1 deletions
diff --git a/src/lib/tls/tls_server.cpp b/src/lib/tls/tls_server.cpp index 774827346..76db9ce6b 100644 --- a/src/lib/tls/tls_server.cpp +++ b/src/lib/tls/tls_server.cpp @@ -1,6 +1,6 @@ /* * TLS Server -* (C) 2004-2011,2012 Jack Lloyd +* (C) 2004-2011,2012,2016 Jack Lloyd * * Botan is released under the Simplified BSD License (see license.txt) */ @@ -98,6 +98,24 @@ bool check_for_resume(Session& session_info, return false; } + // Checking extended_master_secret on resume (RFC 7627 section 5.3) + if(client_hello->supports_extended_master_secret() != session_info.supports_extended_master_secret()) + { + if(!session_info.supports_extended_master_secret()) + { + return false; // force new handshake with extended master secret + } + else + { + /* + Client previously negotiated session with extended master secret, + but has now attempted to resume without the extension: abort + */ + throw TLS_Exception(Alert::HANDSHAKE_FAILURE, + "Client resumed extended ms session without sending extension"); + } + } + return true; } @@ -648,6 +666,7 @@ void Server::process_handshake_msg(const Handshake_State* active_state, state.server_hello()->compression_method(), SERVER, state.server_hello()->fragment_size(), + state.server_hello()->supports_extended_master_secret(), get_peer_cert_chain(state), std::vector<byte>(), Server_Information(state.client_hello()->sni_hostname()), |