Chromium Code Reviews| Index: openssl/ssl/s3_clnt.c |
| diff --git a/openssl/ssl/s3_clnt.c b/openssl/ssl/s3_clnt.c |
| index d1b3224b1b27876f0135c03f90d794f5ad39e312..94fd9c8542897adb11bb1495c5ef3de82e1cece3 100644 |
| --- a/openssl/ssl/s3_clnt.c |
| +++ b/openssl/ssl/s3_clnt.c |
| @@ -583,6 +583,18 @@ int ssl3_connect(SSL *s) |
| #endif |
| s->s3->tmp.next_state=SSL3_ST_CR_FINISHED_A; |
| } |
| + if (s->s3->tlsext_channel_id_valid) |
|
wtc
2014/04/30 14:11:50
Adam: This seems to mean that if the original full
agl
2014/05/02 17:58:54
Yes.
|
| + { |
| + /* This is a non-resumption handshake. If it |
| + * involves ChannelID, then record the |
| + * handshake hashes at this point in the |
| + * session so that any resumption of this |
| + * session with ChannelID can sign those |
| + * hashes. */ |
| + ret = tls1_record_handshake_hashes_for_channel_id(s); |
|
haavardm
2014/04/28 20:26:15
Before I knew about the server patch, I calculated
wtc
2014/04/30 14:11:50
If SSL_get_finished returns the contents of the Fi
|
| + if (ret <= 0) |
| + goto end; |
| + } |
| } |
| s->init_num=0; |
| break; |