diff options
author | lloyd <[email protected]> | 2012-03-23 12:44:58 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2012-03-23 12:44:58 +0000 |
commit | afcd29c599e1e27b674df4f630a665c095b0ff44 (patch) | |
tree | b10bd7332009a446e796094db1cb2247bce0739b /src/tls/tls_messages.h | |
parent | 16d6b8ccfcf6cfac5d654df6790f6d87226e8e17 (diff) |
Include the curves and sig algos list in a session resumption client
hello. Also include a full list of ciphersuites, ensuring that our
original session ciphersuite is in the list regardless of policy
(maybe it would be better to just not resume in that case, though?).
Otherwise, if the server doesn't remember our session (or the session
ticket key), it might not be capable of negotiating using the single
ciphersuite we sent due to lack of information (allowed curves was a
particular issue here). Including the full ciphersuite list also
allows for rengotiating the ciphersuite if, for instance, the session
can't be resumed because the server used to have an RSA cert but has
since replaced it with an ECDSA cert.
Diffstat (limited to 'src/tls/tls_messages.h')
-rw-r--r-- | src/tls/tls_messages.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/tls/tls_messages.h b/src/tls/tls_messages.h index 78cb6f714..7312d8bb1 100644 --- a/src/tls/tls_messages.h +++ b/src/tls/tls_messages.h @@ -124,6 +124,7 @@ class Client_Hello : public Handshake_Message Client_Hello(Record_Writer& writer, Handshake_Hash& hash, + const Policy& policy, RandomNumberGenerator& rng, const Session& resumed_session, bool next_protocol = false); |