summaryrefslogtreecommitdiff
path: root/lib/handshake-tls13.c
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@redhat.com>2019-03-01 11:15:47 +0100
committerNikos Mavrogiannopoulos <nmav@redhat.com>2019-03-20 10:52:19 +0100
commitc6754cf52ecfb655f04707cef0d4c2d41e1c9587 (patch)
tree57bf3acab86116da136087c9e936087b5fd5d286 /lib/handshake-tls13.c
parentf82ffe2b3031072ad1bfdf589e945263a1696e3f (diff)
downloadgnutls-c6754cf52ecfb655f04707cef0d4c2d41e1c9587.tar.gz
handshake: increase the default number of tickets we send to 2tmp-increase-nr-of-tickets
This makes it easier for clients which perform multiple connections to the server to use the tickets sent by a default server. That's because 2 tickets allow for 2 new connections (if one is using each ticket once as recommended), which in turn lead to 4 new and so on. Resolves: #596 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Diffstat (limited to 'lib/handshake-tls13.c')
-rw-r--r--lib/handshake-tls13.c8
1 files changed, 3 insertions, 5 deletions
diff --git a/lib/handshake-tls13.c b/lib/handshake-tls13.c
index 30a45986a7..33ed3afa3b 100644
--- a/lib/handshake-tls13.c
+++ b/lib/handshake-tls13.c
@@ -362,8 +362,6 @@ static int generate_hs_traffic_keys(gnutls_session_t session)
return 0;
}
-#define TICKETS_TO_SEND 1
-
/*
* _gnutls13_handshake_server
* This function does the server stuff of the handshake protocol.
@@ -510,7 +508,7 @@ int _gnutls13_handshake_server(gnutls_session_t session)
_gnutls_set_resumed_parameters(session);
if (session->internals.hsk_flags & HSK_EARLY_START_USED) {
- ret = _gnutls13_send_session_ticket(session, TICKETS_TO_SEND,
+ ret = _gnutls13_send_session_ticket(session, TLS13_TICKETS_TO_SEND,
AGAIN(STATE109));
STATE = STATE109;
@@ -566,7 +564,7 @@ int _gnutls13_handshake_server(gnutls_session_t session)
FALLTHROUGH;
case STATE115:
if (!(session->internals.hsk_flags & (HSK_TLS13_TICKET_SENT|HSK_EARLY_START_USED))) {
- ret = _gnutls13_send_session_ticket(session, TICKETS_TO_SEND,
+ ret = _gnutls13_send_session_ticket(session, TLS13_TICKETS_TO_SEND,
AGAIN(STATE115));
STATE = STATE115;
IMED_RET("send session ticket", ret, 0);
@@ -738,7 +736,7 @@ _gnutls13_recv_async_handshake(gnutls_session_t session)
*
* Sends a fresh session ticket to the peer. This is relevant only
* in server side under TLS1.3. This function may also return %GNUTLS_E_AGAIN
- * or %GNUTLS_E_INTERRUPTED.
+ * or %GNUTLS_E_INTERRUPTED and in that case it must be called again.
*
* Returns: %GNUTLS_E_SUCCESS on success, or a negative error code.
**/