summaryrefslogtreecommitdiff
path: root/.gitignore
diff options
context:
space:
mode:
authorDaiki Ueno <ueno@gnu.org>2021-01-24 07:34:24 +0100
committerDaiki Ueno <ueno@gnu.org>2021-02-04 09:25:00 +0100
commit05ee0d49fe93d8812ef220c7b830c4b3553ac4fd (patch)
treed3f18a66923a2f9a0331a5c0f455b0b94e09ae6b /.gitignore
parent5416fdc259d8df9b797d249f3e5d58789b2e2cf9 (diff)
downloadgnutls-05ee0d49fe93d8812ef220c7b830c4b3553ac4fd.tar.gz
handshake: TLS 1.3: don't generate session ID in resumption mode
The commit e0bb98e1f71f94691f600839ff748d3a9f469d3e revealed that the previous code always generated session ID in the TLS 1.3 middlebox compatibility mode even when the handshake is being resumed. This could cause a difference in PSK binder calculation if the server sends an HRR in the resumption handshake. Signed-off-by: Daiki Ueno <ueno@gnu.org>
Diffstat (limited to '.gitignore')
-rw-r--r--.gitignore1
1 files changed, 1 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index b721fee238..f473a6fd04 100644
--- a/.gitignore
+++ b/.gitignore
@@ -857,6 +857,7 @@ tests/tls13/change_cipher_spec
tests/tls13/cookie
tests/tls13/hello_random_value
tests/tls13/hello_retry_request
+tests/tls13/hello_retry_request_resume
tests/tls13/key_limits
tests/tls13/key_share
tests/tls13/key_update