56d280da2f
While the sanity check isn't insane (one should arrange for sessions to be invalidated once client auth settings change, and a sid_ctx is one way to do it), this check lives in a poor place to enforce configuration mistakes. To be effective, it needs to happen at the start of the handshake, independent of the ClientHello from the peer. But the benefit this check gives is low compared to the trouble it will be to continually maintain this difference from OpenSSL (our own ssl_test and bssl_shim forget to set a dummy sid_ctx). Instead, remove it so we don't have to duplicate it across TLS 1.2 and TLS 1.3. Also so we don't have weird failures which only manifest once a resuming client connects. Change-Id: Ia7f88711701afde5e26b7782c2264ce78dccc89b Reviewed-on: https://boringssl-review.googlesource.com/9112 Reviewed-by: Adam Langley <agl@google.com> Commit-Queue: Adam Langley <agl@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> |
||
---|---|---|
.. | ||
test | ||
CMakeLists.txt | ||
custom_extensions.c | ||
d1_both.c | ||
d1_lib.c | ||
d1_pkt.c | ||
d1_srtp.c | ||
dtls_method.c | ||
dtls_record.c | ||
handshake_client.c | ||
handshake_server.c | ||
internal.h | ||
s3_both.c | ||
s3_enc.c | ||
s3_lib.c | ||
s3_pkt.c | ||
ssl_aead_ctx.c | ||
ssl_asn1.c | ||
ssl_buffer.c | ||
ssl_cert.c | ||
ssl_cipher.c | ||
ssl_ecdh.c | ||
ssl_file.c | ||
ssl_lib.c | ||
ssl_rsa.c | ||
ssl_session.c | ||
ssl_stat.c | ||
ssl_test.cc | ||
t1_enc.c | ||
t1_lib.c | ||
tls13_both.c | ||
tls13_client.c | ||
tls13_enc.c | ||
tls13_server.c | ||
tls_method.c | ||
tls_record.c |