summary refs log tree commit diff
path: root/crypto/src/tls/TlsClientProtocol.cs
diff options
context:
space:
mode:
authorPeter Dettman <peter.dettman@bouncycastle.org>2023-06-28 16:29:22 +0700
committerPeter Dettman <peter.dettman@bouncycastle.org>2023-06-28 16:29:22 +0700
commit1cc412daaa874b80b79599bd71c53fc315bb9ac7 (patch)
tree034e63fba5ad4bd5fce16264e10fe9668d13c5db /crypto/src/tls/TlsClientProtocol.cs
parentFix renegotiation after resumption handshakes (diff)
downloadBouncyCastle.NET-ed25519-1cc412daaa874b80b79599bd71c53fc315bb9ac7.tar.xz
Add TlsClient.ShouldUseCompatibilityMode
Diffstat (limited to 'crypto/src/tls/TlsClientProtocol.cs')
-rw-r--r--crypto/src/tls/TlsClientProtocol.cs2
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/src/tls/TlsClientProtocol.cs b/crypto/src/tls/TlsClientProtocol.cs
index 8e31fa6c8..99d088622 100644
--- a/crypto/src/tls/TlsClientProtocol.cs
+++ b/crypto/src/tls/TlsClientProtocol.cs
@@ -1694,7 +1694,7 @@ namespace Org.BouncyCastle.Tls
                  * RFC 8446 4.2.1. In compatibility mode [..], this field MUST be non-empty, so a client
                  * not offering a pre-TLS 1.3 session MUST generate a new 32-byte value.
                  */
-                if (legacy_session_id.Length < 1)
+                if (legacy_session_id.Length < 1 && TlsUtilities.ShouldUseCompatibilityMode(m_tlsClient))
                 {
                     legacy_session_id = m_tlsClientContext.NonceGenerator.GenerateNonce(32);
                 }