forked from wolfSSL/wolfssl
Fixed server side case for DH agree issue with QAT hardware where agreeSz is not set. Fix to allow QAT start failure to continue (this is useful since only one process can use hardware with default QAT configuration).
This commit is contained in:
@ -18191,6 +18191,7 @@ int SendClientKeyExchange(WOLFSSL* ssl)
|
||||
ssl->buffers.sig.buffer, &ssl->buffers.sig.length,
|
||||
args->encSecret, &args->encSz);
|
||||
|
||||
/* set the max agree result size */
|
||||
ssl->arrays->preMasterSz = ENCRYPT_LEN;
|
||||
break;
|
||||
}
|
||||
@ -23336,6 +23337,9 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
||||
ssl->buffers.serverDH_P.length,
|
||||
ssl->buffers.serverDH_G.buffer,
|
||||
ssl->buffers.serverDH_G.length);
|
||||
|
||||
/* set the max agree result size */
|
||||
ssl->arrays->preMasterSz = ENCRYPT_LEN;
|
||||
break;
|
||||
}
|
||||
#endif /* !NO_DH */
|
||||
|
@ -80,7 +80,7 @@ int wolfCrypt_Init(void)
|
||||
ret = wolfAsync_HardwareStart();
|
||||
if (ret != 0) {
|
||||
WOLFSSL_MSG("Async hardware start failed");
|
||||
return ret;
|
||||
/* don't return failure, allow operation to continue */
|
||||
}
|
||||
#endif
|
||||
|
||||
|
Reference in New Issue
Block a user