summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_handshake.h
diff options
context:
space:
mode:
authortb <>2019-04-05 20:23:38 +0000
committertb <>2019-04-05 20:23:38 +0000
commit55bc1fb8c12e9ebee84e4f4cd679dc16b3000b2c (patch)
tree6f5b00fafa4585971679b89854e3ba9289deccf5 /src/lib/libssl/tls13_handshake.h
parentd81e0a2e2b99c3aa745b51cb8193793f267d2a22 (diff)
downloadopenbsd-55bc1fb8c12e9ebee84e4f4cd679dc16b3000b2c.tar.gz
openbsd-55bc1fb8c12e9ebee84e4f4cd679dc16b3000b2c.tar.bz2
openbsd-55bc1fb8c12e9ebee84e4f4cd679dc16b3000b2c.zip
By design, our state machine is a DAG contrary to the state machine in
the spec. To avoid the obvious loop in the RFC's state machine, we added a CLIENT_HELLO_RETRY state which is a second ClientHello with special rules. There is, however, no state to react to this second client hello. This adds a matching SERVER_HELLO_RETRY state to the handshakes table. This means in particular that the WITH_HRR state cannot be set in tls13_server_hello_recv(), so remove this now dead check. ok jsing
Diffstat (limited to 'src/lib/libssl/tls13_handshake.h')
-rw-r--r--src/lib/libssl/tls13_handshake.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/src/lib/libssl/tls13_handshake.h b/src/lib/libssl/tls13_handshake.h
index cbbec744d3..9910dab106 100644
--- a/src/lib/libssl/tls13_handshake.h
+++ b/src/lib/libssl/tls13_handshake.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_handshake.h,v 1.2 2019/01/20 22:36:19 tb Exp $ */ 1/* $OpenBSD: tls13_handshake.h,v 1.3 2019/04/05 20:23:38 tb Exp $ */
2/* 2/*
3 * Copyright (c) 2019 Theo Buehler <tb@openbsd.org> 3 * Copyright (c) 2019 Theo Buehler <tb@openbsd.org>
4 * 4 *
@@ -35,6 +35,7 @@ enum tls13_message_type {
35 CLIENT_HELLO, 35 CLIENT_HELLO,
36 SERVER_HELLO, 36 SERVER_HELLO,
37 CLIENT_HELLO_RETRY, 37 CLIENT_HELLO_RETRY,
38 SERVER_HELLO_RETRY,
38 SERVER_ENCRYPTED_EXTENSIONS, 39 SERVER_ENCRYPTED_EXTENSIONS,
39 SERVER_CERTIFICATE_REQUEST, 40 SERVER_CERTIFICATE_REQUEST,
40 SERVER_CERTIFICATE, 41 SERVER_CERTIFICATE,