From 533aa48b14f3a10346d25039a7dbc28b36cc5350 Mon Sep 17 00:00:00 2001 From: JacobBarthelmeh Date: Fri, 31 May 2024 16:52:31 -0600 Subject: [PATCH] adjust macro guards around get max fragment --- src/ssl_sess.c | 2 ++ wolfssl/internal.h | 2 +- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/src/ssl_sess.c b/src/ssl_sess.c index f2f4baaf1..0d5178c66 100644 --- a/src/ssl_sess.c +++ b/src/ssl_sess.c @@ -747,6 +747,7 @@ long wolfSSL_CTX_set_session_cache_mode(WOLFSSL_CTX* ctx, long mode) } #ifdef OPENSSL_EXTRA +#ifdef HAVE_MAX_FRAGMENT /* return the max fragment size set when handshake was negotiated */ uint8_t wolfSSL_SESSION_get_max_fragment_length(WOLFSSL_SESSION* session) { @@ -756,6 +757,7 @@ uint8_t wolfSSL_SESSION_get_max_fragment_length(WOLFSSL_SESSION* session) return session->mfl; } +#endif /* Get the session cache mode for CTX diff --git a/wolfssl/internal.h b/wolfssl/internal.h index 7213016ea..fa0c26070 100644 --- a/wolfssl/internal.h +++ b/wolfssl/internal.h @@ -4433,7 +4433,7 @@ struct WOLFSSL_SESSION { #ifdef HAVE_EX_DATA WOLFSSL_CRYPTO_EX_DATA ex_data; #endif -#ifdef OPENSSL_EXTRA +#ifdef HAVE_MAX_FRAGMENT byte mfl; /* max fragment length negotiated i.e. * WOLFSSL_MFL_2_8 (6) */ #endif