Skip to content

Commit 30db6f2

Browse files
marten-seemanngopherbot
authored andcommitted
crypto/tls: fix cipher suite check when doing 0-RTT resumption
Change-Id: Ia50898308b80149f862457f9cd9f1123da4e6b6f Reviewed-on: https://go-review.googlesource.com/c/go/+/498215 Reviewed-by: Filippo Valsorda <[email protected]> Reviewed-by: Macrombi Lux <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Damien Neil <[email protected]> Auto-Submit: Filippo Valsorda <[email protected]> Reviewed-by: Michael Knyszek <[email protected]> Run-TryBot: Filippo Valsorda <[email protected]>
1 parent 41bd7f5 commit 30db6f2

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/crypto/tls/handshake_client.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -376,7 +376,7 @@ func (c *Conn) loadSession(hello *clientHelloMsg) (
376376
if c.quic != nil && session.EarlyData {
377377
// For 0-RTT, the cipher suite has to match exactly, and we need to be
378378
// offering the same ALPN.
379-
if mutualCipherSuite(hello.cipherSuites, session.cipherSuite) != nil {
379+
if mutualCipherSuiteTLS13(hello.cipherSuites, session.cipherSuite) != nil {
380380
for _, alpn := range hello.alpnProtocols {
381381
if alpn == session.alpnProtocol {
382382
hello.earlyData = true

0 commit comments

Comments
 (0)