forked from wolfSSL/wolfssl
@@ -3229,6 +3229,8 @@ static int TLSX_SessionTicket_Parse(WOLFSSL* ssl, byte* input, word16 length,
|
|||||||
{
|
{
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
|
|
||||||
|
(void) input; /* avoid unused parameter if NO_WOLFSSL_SERVER defined */
|
||||||
|
|
||||||
if (!isRequest) {
|
if (!isRequest) {
|
||||||
/* client side */
|
/* client side */
|
||||||
if (length != 0)
|
if (length != 0)
|
||||||
|
@@ -1527,7 +1527,7 @@ struct WOLFSSL_CERT_MANAGER {
|
|||||||
#endif
|
#endif
|
||||||
WOLFSSL_CRL* crl; /* CRL checker */
|
WOLFSSL_CRL* crl; /* CRL checker */
|
||||||
WOLFSSL_OCSP* ocsp; /* OCSP checker */
|
WOLFSSL_OCSP* ocsp; /* OCSP checker */
|
||||||
#if !defined(NO_WOLFSSL_SEVER) && (defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
|
#if !defined(NO_WOLFSSL_SERVER) && (defined(HAVE_CERTIFICATE_STATUS_REQUEST) \
|
||||||
|| defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2))
|
|| defined(HAVE_CERTIFICATE_STATUS_REQUEST_V2))
|
||||||
WOLFSSL_OCSP* ocsp_stapling; /* OCSP checker for OCSP stapling */
|
WOLFSSL_OCSP* ocsp_stapling; /* OCSP checker for OCSP stapling */
|
||||||
#endif
|
#endif
|
||||||
@@ -2004,7 +2004,7 @@ struct WOLFSSL_CTX {
|
|||||||
OcspRequest* chainOcspRequest[MAX_CHAIN_DEPTH];
|
OcspRequest* chainOcspRequest[MAX_CHAIN_DEPTH];
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
#if defined(HAVE_SESSION_TICKET) && !defined(NO_WOLFSSL_SEVER)
|
#if defined(HAVE_SESSION_TICKET) && !defined(NO_WOLFSSL_SERVER)
|
||||||
SessionTicketEncCb ticketEncCb; /* enc/dec session ticket Cb */
|
SessionTicketEncCb ticketEncCb; /* enc/dec session ticket Cb */
|
||||||
void* ticketEncCtx; /* session encrypt context */
|
void* ticketEncCtx; /* session encrypt context */
|
||||||
int ticketHint; /* ticket hint in seconds */
|
int ticketHint; /* ticket hint in seconds */
|
||||||
|
Reference in New Issue
Block a user