492c9aa90c
Historically, OpenSSL filled in a fake session ID for ticket-only client sessions. Conscrypt relies on this to implement some weird Java API where every session has an ID and may be queried out of the client session cache and, e.g., revoked that way. (Note that a correct client session cache is not keyed by session ID and indeed this allows one server to knock out another server's sessions by matching session IDs. But existing APIs are existing APIs.) For consistency between TLS 1.2 and TLS 1.3, as well as matching OpenSSL's TLS 1.3 implementation, do the same in TLS 1.3. Note this smooths over our cross-version resumption tests by allowing for something odd: it is now syntactically possible to resume a TLS 1.3 session at TLS 1.2. It doesn't matter either way, but now a different codepath rejects certain cases. Change-Id: I9caf4f0c3b2e2e24ae25752826d47bce77e65616 Reviewed-on: https://boringssl-review.googlesource.com/31525 Reviewed-by: Steven Valdez <svaldez@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> |
||
---|---|---|
.. | ||
test | ||
bio_ssl.cc | ||
CMakeLists.txt | ||
d1_both.cc | ||
d1_lib.cc | ||
d1_pkt.cc | ||
d1_srtp.cc | ||
dtls_method.cc | ||
dtls_record.cc | ||
handoff.cc | ||
handshake_client.cc | ||
handshake_server.cc | ||
handshake.cc | ||
internal.h | ||
s3_both.cc | ||
s3_lib.cc | ||
s3_pkt.cc | ||
span_test.cc | ||
ssl_aead_ctx.cc | ||
ssl_asn1.cc | ||
ssl_buffer.cc | ||
ssl_cert.cc | ||
ssl_cipher.cc | ||
ssl_file.cc | ||
ssl_key_share.cc | ||
ssl_lib.cc | ||
ssl_privkey.cc | ||
ssl_session.cc | ||
ssl_stat.cc | ||
ssl_test.cc | ||
ssl_transcript.cc | ||
ssl_versions.cc | ||
ssl_x509.cc | ||
t1_enc.cc | ||
t1_lib.cc | ||
tls13_both.cc | ||
tls13_client.cc | ||
tls13_enc.cc | ||
tls13_server.cc | ||
tls_method.cc | ||
tls_record.cc |