mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
Fix TLS 1.2 session cache (#28)
Currently, SessionCache is not used for non-HelloGolang fingerprints, and this PR is what the fix would potentially look like. This is only for the TLS 1.2, support for TLS 1.3 PSK resumption cache remains a TODO. Fixes #27
This commit is contained in:
parent
f8425e69f7
commit
05163f8a36
1 changed files with 5 additions and 0 deletions
|
@ -427,6 +427,11 @@ func (uconn *UConn) ApplyPreset(p *ClientHelloSpec) error {
|
||||||
}
|
}
|
||||||
grease_extensions_seen += 1
|
grease_extensions_seen += 1
|
||||||
case *SessionTicketExtension:
|
case *SessionTicketExtension:
|
||||||
|
if session == nil && uconn.config.ClientSessionCache != nil {
|
||||||
|
cacheKey := clientSessionCacheKey(uconn.RemoteAddr(), uconn.config)
|
||||||
|
session, _ = uconn.config.ClientSessionCache.Get(cacheKey)
|
||||||
|
// TODO: use uconn.loadSession(hello.getPrivatePtr()) to support TLS 1.3 PSK-style resumption
|
||||||
|
}
|
||||||
err := uconn.SetSessionState(session)
|
err := uconn.SetSessionState(session)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue