Fixed fallback to full handshake when server rejects PAC-Opaque
authorJouni Malinen <j@w1.fi>
Tue, 15 Apr 2008 14:24:06 +0000 (17:24 +0300)
committerJouni Malinen <j@w1.fi>
Tue, 15 Apr 2008 14:24:06 +0000 (17:24 +0300)
commitfe2b7dda0265d81412292cda9d31edb2252482d9
tree2adac8e8901bc2d1a5a6ebbc5c162aec7d311554
parentd4092763cf386a3590d13240b4dad2162c7a0c2f
Fixed fallback to full handshake when server rejects PAC-Opaque

The TLS client changes in ssl3_get_server_hello() were based on the
pre-RFC 5077 version of OpenSSL and they hardcoded s->hit to 1 in case
PAC-Opaque was used. This prevented fallback to full TLS handshake in case
the server rejected PAC-Opaque in ClientHello. The fixed version simplifies
ssl3_get_server_hello() and uses the new RFC 5077 functionality in OpenSSL
(ssl3_check_finished) to allow the state machine handle start of
abbreviated handshake based on the used ticket.
patches/openssl-0.9.8g-tls-extensions.patch
wpa_supplicant/ChangeLog