]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
EAP-TLS server: Send final TLS message for resumed session with TLS 1.3
authorJouni Malinen <quic_jouni@quicinc.com>
Mon, 2 May 2022 13:19:06 +0000 (16:19 +0300)
committerJouni Malinen <j@w1.fi>
Mon, 2 May 2022 14:16:44 +0000 (17:16 +0300)
The final message with NewSessionTicket and ApplicationData(0x00) was
already generated, but that was not sent out due the session considered
to be already completed. Fix this by actually sending out that message
to allow the peer to receive the new session ticket and protected
success indication when using resuming a session with TLS 1.3.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
src/eap_server/eap_server_tls.c

index 6681c1afac22655d5c16a13c4f87f844600eb52c..443c293ce6586bd5eba771286577399bf0b929a8 100644 (file)
@@ -306,6 +306,14 @@ static void eap_tls_process(struct eap_sm *sm, void *priv,
 
        wpa_printf(MSG_DEBUG,
                   "EAP-TLS: Resuming previous session");
+
+       if (data->ssl.tls_v13 && data->ssl.tls_out) {
+               wpa_hexdump_buf(MSG_DEBUG,
+                               "EAP-TLS: Additional data to be sent for TLS 1.3",
+                               data->ssl.tls_out);
+               return;
+       }
+
        eap_tls_state(data, SUCCESS);
        tls_connection_set_success_data_resumed(data->ssl.conn);
        /* TODO: Cache serial number with session and update EAP user