forked from wolfSSL/wolfssl
fixed jenkins failures part1
This commit is contained in:
@@ -2607,7 +2607,8 @@ static byte helloRetryRequestRandom[] = {
|
|||||||
|
|
||||||
#ifndef NO_WOLFSSL_CLIENT
|
#ifndef NO_WOLFSSL_CLIENT
|
||||||
#if defined(HAVE_SESSION_TICKET) || !defined(NO_PSK)
|
#if defined(HAVE_SESSION_TICKET) || !defined(NO_PSK)
|
||||||
#ifdef OPENSSL_EXTRA
|
#if defined(OPENSSL_EXTRA) && !defined(WOLFSSL_PSK_ONE_ID) && \
|
||||||
|
!defined(NO_PSK)
|
||||||
/**
|
/**
|
||||||
* convert mac algorithm to WOLFSSL_EVP_MD
|
* convert mac algorithm to WOLFSSL_EVP_MD
|
||||||
* @param mac_alg mac algorithm
|
* @param mac_alg mac algorithm
|
||||||
@@ -2737,7 +2738,7 @@ static int SetupPskKey(WOLFSSL* ssl, PreSharedKey* psk)
|
|||||||
return PSK_KEY_ERROR;
|
return PSK_KEY_ERROR;
|
||||||
}
|
}
|
||||||
|
|
||||||
ssl->arrays->psk_keySz = idlen;
|
ssl->arrays->psk_keySz = (word32)idlen;
|
||||||
XMEMCPY(ssl->arrays->psk_key, id, idlen);
|
XMEMCPY(ssl->arrays->psk_key, id, idlen);
|
||||||
cipherSuite0 = psksession->cipherSuite0;
|
cipherSuite0 = psksession->cipherSuite0;
|
||||||
cipherSuite = psksession->cipherSuite;
|
cipherSuite = psksession->cipherSuite;
|
||||||
|
@@ -3506,7 +3506,9 @@ typedef struct Options {
|
|||||||
#ifndef NO_PSK
|
#ifndef NO_PSK
|
||||||
wc_psk_client_callback client_psk_cb;
|
wc_psk_client_callback client_psk_cb;
|
||||||
wc_psk_server_callback server_psk_cb;
|
wc_psk_server_callback server_psk_cb;
|
||||||
|
#ifdef OPENSSL_EXTRA
|
||||||
wc_psk_use_session_cb_func session_psk_cb;
|
wc_psk_use_session_cb_func session_psk_cb;
|
||||||
|
#endif
|
||||||
#ifdef WOLFSSL_TLS13
|
#ifdef WOLFSSL_TLS13
|
||||||
wc_psk_client_tls13_callback client_psk_tls13_cb; /* client callback */
|
wc_psk_client_tls13_callback client_psk_tls13_cb; /* client callback */
|
||||||
wc_psk_server_tls13_callback server_psk_tls13_cb; /* server callback */
|
wc_psk_server_tls13_callback server_psk_tls13_cb; /* server callback */
|
||||||
|
Reference in New Issue
Block a user