SSL_renegotiate for DTLS client

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
2 messages Options
Reply | Threaded
Open this post in threaded view
|

SSL_renegotiate for DTLS client

yeniv
Going through the documentation of SSL_renegotiate, it says "For historical reasons, DTLS clients will not attempt to resume the session in the new handshake". The paragraph is about how OpenSSL client would handle a renegotiation request from the server.

Does this mean that the DLTS client on receiving a HelloRequest will always go for a full handshake and will not include the session id or ticket info that it has from the previous session?

Thanks,
Viney

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Reply | Threaded
Open this post in threaded view
|

Re: SSL_renegotiate for DTLS client

Matt Caswell-2


On 06/11/17 12:52, Viney Yadav wrote:
> Going through the documentation of SSL_renegotiate
> <https://www.openssl.org/docs/manmaster/man3/SSL_renegotiate.html>, it
> says "For historical reasons, DTLS clients will not attempt to resume
> the session in the new handshake". The paragraph is about how OpenSSL
> client would handle a renegotiation request from the server.
>
> Does this mean that the DLTS client on receiving a HelloRequest will
> always go for a full handshake and will not include the session id or
> ticket info that it has from the previous session?

Yes.

Matt

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users