The final message with NewSessionTicket and ApplicationData(0x00) was
already generated, but that was not sent out due the session considered
to be already completed. Fix this by actually sending out that message
to allow the peer to receive the new session ticket and protected
success indication when using resuming a session with TLS 1.3.
Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
wpa_printf(MSG_DEBUG,
"EAP-TLS: Resuming previous session");
+
+ if (data->ssl.tls_v13 && data->ssl.tls_out) {
+ wpa_hexdump_buf(MSG_DEBUG,
+ "EAP-TLS: Additional data to be sent for TLS 1.3",
+ data->ssl.tls_out);
+ return;
+ }
+
eap_tls_state(data, SUCCESS);
tls_connection_set_success_data_resumed(data->ssl.conn);
/* TODO: Cache serial number with session and update EAP user