aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_messages.h
diff options
context:
space:
mode:
authorlloyd <[email protected]>2012-03-23 12:44:58 +0000
committerlloyd <[email protected]>2012-03-23 12:44:58 +0000
commitafcd29c599e1e27b674df4f630a665c095b0ff44 (patch)
treeb10bd7332009a446e796094db1cb2247bce0739b /src/tls/tls_messages.h
parent16d6b8ccfcf6cfac5d654df6790f6d87226e8e17 (diff)
Include the curves and sig algos list in a session resumption client
hello. Also include a full list of ciphersuites, ensuring that our original session ciphersuite is in the list regardless of policy (maybe it would be better to just not resume in that case, though?). Otherwise, if the server doesn't remember our session (or the session ticket key), it might not be capable of negotiating using the single ciphersuite we sent due to lack of information (allowed curves was a particular issue here). Including the full ciphersuite list also allows for rengotiating the ciphersuite if, for instance, the session can't be resumed because the server used to have an RSA cert but has since replaced it with an ECDSA cert.
Diffstat (limited to 'src/tls/tls_messages.h')
-rw-r--r--src/tls/tls_messages.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/tls/tls_messages.h b/src/tls/tls_messages.h
index 78cb6f714..7312d8bb1 100644
--- a/src/tls/tls_messages.h
+++ b/src/tls/tls_messages.h
@@ -124,6 +124,7 @@ class Client_Hello : public Handshake_Message
Client_Hello(Record_Writer& writer,
Handshake_Hash& hash,
+ const Policy& policy,
RandomNumberGenerator& rng,
const Session& resumed_session,
bool next_protocol = false);