Skip to content

Check SNI/ALPN in TLS 1.2 stateful session ID resumption#10489

Open
holtrop-wolfssl wants to merge 1 commit into
wolfSSL:masterfrom
holtrop-wolfssl:zd21798
Open

Check SNI/ALPN in TLS 1.2 stateful session ID resumption#10489
holtrop-wolfssl wants to merge 1 commit into
wolfSSL:masterfrom
holtrop-wolfssl:zd21798

Conversation

@holtrop-wolfssl
Copy link
Copy Markdown
Contributor

Description

Fixes zd#21798

Testing

How did you test?

Checklist

  • added tests
  • updated/added doxygen
  • updated appropriate READMEs
  • Updated manual and documentation

@holtrop-wolfssl holtrop-wolfssl self-assigned this May 14, 2026
Copilot AI review requested due to automatic review settings May 14, 2026 19:49
@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 14, 2026

MemBrowse Memory Report

No memory changes detected for:

@holtrop-wolfssl
Copy link
Copy Markdown
Contributor Author

retest this please (build hung)

Copy link
Copy Markdown
Member

@julek-wolfssl julek-wolfssl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does this check get performed for TLS 1.3 already? If you extend it with stateless ticket support then that should also be tested in test_tls.c.

Comment thread src/internal.c
#if defined(HAVE_SESSION_TICKET) && \
(defined(HAVE_SNI) || defined(HAVE_ALPN))
/* Do not resume session if sniHash/alpnHash do not match. */
if (!ssl->options.useTicket) {
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why only do these checks on !ssl->options.useTicket? Some settings restore the session from the cache even when using tickets. If we want to do this check on stateless tickets we can add it to the InternalTicket struct.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants