aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMatt Caswell <matt@openssl.org>2017-03-21 13:48:52 +0000
committerMatt Caswell <matt@openssl.org>2017-04-26 16:42:29 +0100
commit3348fc7e8940b66ab4545a618ba87a63fb677a79 (patch)
tree32dcb162cd8cecdd9b2df7ba2a5e56cfd12cc950
parentb6e3250671654e0344127be9dd49b3fb4a82f94b (diff)
downloadopenssl-3348fc7e8940b66ab4545a618ba87a63fb677a79.tar.gz
Remove TLS1.3 TODO around testing for session id length
TLSv1.3 will do the same thing as TLSv1.2 with tickets with regards to session ids, i.e. it will create a synthetic session id when the session is established, so it is reasonable to check the session id length, even in TLSv1.3. Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3008)
-rw-r--r--ssl/statem/statem_clnt.c1
1 files changed, 0 insertions, 1 deletions
diff --git a/ssl/statem/statem_clnt.c b/ssl/statem/statem_clnt.c
index 8c4c83954d..a580431aa1 100644
--- a/ssl/statem/statem_clnt.c
+++ b/ssl/statem/statem_clnt.c
@@ -2442,7 +2442,6 @@ MSG_PROCESS_RETURN tls_process_new_session_ticket(SSL *s, PACKET *pkt)
if (ticklen == 0)
return MSG_PROCESS_CONTINUE_READING;
- /* TODO(TLS1.3): Is this a suitable test for TLS1.3? */
if (s->session->session_id_length > 0) {
int i = s->session_ctx->session_cache_mode;
SSL_SESSION *new_sess;