forked from wolfSSL/wolfssl
Server Side Renegotiation
1. Fix testing issue with a client using the SCSV cipher suite to indicate desire for renegotiation. 2. Add indication to both the server and client examples that the renegotiation was successful.
This commit is contained in:
@ -2780,6 +2780,9 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args)
|
||||
wolfSSL_CTX_free(ctx); ctx = NULL;
|
||||
err_sys("wolfSSL_Rehandshake failed");
|
||||
}
|
||||
else {
|
||||
printf("RENEGOTIATION SUCCESSFUL\n");
|
||||
}
|
||||
}
|
||||
}
|
||||
#endif /* HAVE_SECURE_RENEGOTIATION */
|
||||
|
@ -1995,7 +1995,9 @@ THREAD_RETURN WOLFSSL_THREAD server_test(void* args)
|
||||
} else {
|
||||
if (wolfSSL_Rehandshake(ssl) != WOLFSSL_SUCCESS) {
|
||||
printf("not doing secure renegotiation\n");
|
||||
|
||||
}
|
||||
else {
|
||||
printf("RENEGOTIATION SUCCESSFUL\n");
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -23667,6 +23667,7 @@ static int DoSessionTicket(WOLFSSL* ssl, const byte* input, word32* inOutIdx,
|
||||
ret = TLSX_AddEmptyRenegotiationInfo(&ssl->extensions);
|
||||
if (ret != WOLFSSL_SUCCESS)
|
||||
return ret;
|
||||
ssl->secure_renegotiation->enabled = 1;
|
||||
}
|
||||
#endif /* HAVE_SERVER_RENEGOTIATION_INFO */
|
||||
|
||||
|
Reference in New Issue
Block a user