aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_messages.h
diff options
context:
space:
mode:
authorlloyd <[email protected]>2012-03-23 17:17:05 +0000
committerlloyd <[email protected]>2012-03-23 17:17:05 +0000
commit9c67e7a9b20c87e6709346d75edaf951aa4c2eb5 (patch)
treee1ea1f5ad63dbfd4b311aaed6787c34d6c911c5e /src/tls/tls_messages.h
parent9208e05246aa3f3085a45f85e3c9f2844828f73e (diff)
Revert the session_ticket callback in credentials manager. If a PSK
manager is being used, it could be easily used for session tickets as well, and if it's not the generate-on-first-call technique is easy to write. Avoid offering the session ticket extension if we know we don't have a key. For one thing it will cause us to avoid using stateful sessions, but additionally OpenSSL 1.0.1 is very intolerant of empty NewSessionTicket messages so definitely worth avoiding when we can.
Diffstat (limited to 'src/tls/tls_messages.h')
-rw-r--r--src/tls/tls_messages.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/tls/tls_messages.h b/src/tls/tls_messages.h
index 7312d8bb1..2f8af5fd2 100644
--- a/src/tls/tls_messages.h
+++ b/src/tls/tls_messages.h
@@ -197,6 +197,7 @@ class Server_Hello : public Handshake_Message
const Client_Hello& other,
const std::vector<std::string>& available_cert_types,
const Policy& policies,
+ bool have_session_ticket_key,
bool client_has_secure_renegotiation,
const MemoryRegion<byte>& reneg_info,
bool client_has_npn,