Index: third_party/tlslite/tlslite/tlsconnection.py |
diff --git a/third_party/tlslite/tlslite/tlsconnection.py b/third_party/tlslite/tlslite/tlsconnection.py |
index 231ba15a28a8ae9e019f84510e53b96cb8e89d17..dfac274b6e939f631db5099046c9b8f89838b60a 100644 |
--- a/third_party/tlslite/tlslite/tlsconnection.py |
+++ b/third_party/tlslite/tlslite/tlsconnection.py |
@@ -981,8 +981,7 @@ |
masterSecret = calcMasterSecret(self.version, |
premasterSecret, |
clientRandom, |
- serverRandom, |
- b"", False) |
+ serverRandom) |
verifyBytes = self._calcSSLHandshakeHash(masterSecret, b"") |
elif self.version in ((3,1), (3,2)): |
verifyBytes = self._handshake_md5.digest() + \ |
@@ -1037,7 +1036,7 @@ |
cipherSuite, cipherImplementations, nextProto): |
masterSecret = calcMasterSecret(self.version, premasterSecret, |
- clientRandom, serverRandom, b"", False) |
+ clientRandom, serverRandom) |
self._calcPendingStates(cipherSuite, masterSecret, |
clientRandom, serverRandom, |
cipherImplementations) |
@@ -1327,9 +1326,6 @@ |
cipherSuite, CertificateType.x509, tackExt, |
nextProtos) |
serverHello.channel_id = clientHello.channel_id |
- serverHello.extended_master_secret = \ |
- clientHello.extended_master_secret and \ |
- settings.enableExtendedMasterSecret |
if clientHello.support_signed_cert_timestamps: |
serverHello.signed_cert_timestamps = signedCertTimestamps |
if clientHello.status_request: |
@@ -1387,8 +1383,7 @@ |
for result in self._serverFinished(premasterSecret, |
clientHello.random, serverHello.random, |
cipherSuite, settings.cipherImplementations, |
- nextProtos, clientHello.channel_id, |
- serverHello.extended_master_secret): |
+ nextProtos, clientHello.channel_id): |
if result in (0,1): yield result |
else: break |
masterSecret = result |
@@ -1528,9 +1523,6 @@ |
serverHello.create(self.version, getRandomBytes(32), |
session.sessionID, session.cipherSuite, |
CertificateType.x509, None, None) |
- serverHello.extended_master_secret = \ |
- clientHello.extended_master_secret and \ |
- settings.enableExtendedMasterSecret |
for result in self._sendMsg(serverHello): |
yield result |
@@ -1751,8 +1743,7 @@ |
if clientCertChain: |
if self.version == (3,0): |
masterSecret = calcMasterSecret(self.version, premasterSecret, |
- clientHello.random, serverHello.random, |
- b"", False) |
+ clientHello.random, serverHello.random) |
verifyBytes = self._calcSSLHandshakeHash(masterSecret, b"") |
elif self.version in ((3,1), (3,2)): |
verifyBytes = self._handshake_md5.digest() + \ |
@@ -1836,11 +1827,9 @@ |
def _serverFinished(self, premasterSecret, clientRandom, serverRandom, |
cipherSuite, cipherImplementations, nextProtos, |
- doingChannelID, useExtendedMasterSecret): |
+ doingChannelID): |
masterSecret = calcMasterSecret(self.version, premasterSecret, |
- clientRandom, serverRandom, |
- self._getHandshakeHash(), |
- useExtendedMasterSecret) |
+ clientRandom, serverRandom) |
#Calculate pending connection states |
self._calcPendingStates(cipherSuite, masterSecret, |