forked from wolfSSL/wolfssl
add wolfSSLSessionIsSetup so the user can check if
a session ticket has been sent by the server
This commit is contained in:
@@ -47152,6 +47152,7 @@ static int test_wolfSSL_SESSION(void)
|
|||||||
|
|
||||||
ExpectPtrNE((sess = wolfSSL_get1_session(ssl)), NULL); /* ref count 1 */
|
ExpectPtrNE((sess = wolfSSL_get1_session(ssl)), NULL); /* ref count 1 */
|
||||||
ExpectPtrNE((sess_copy = wolfSSL_get1_session(ssl)), NULL); /* ref count 2 */
|
ExpectPtrNE((sess_copy = wolfSSL_get1_session(ssl)), NULL); /* ref count 2 */
|
||||||
|
ExpectIntEQ(wolfSSLSessionIsSetup(sess), 1);
|
||||||
#ifdef HAVE_EXT_CACHE
|
#ifdef HAVE_EXT_CACHE
|
||||||
ExpectPtrEq(sess, sess_copy); /* they should be the same pointer but without
|
ExpectPtrEq(sess, sess_copy); /* they should be the same pointer but without
|
||||||
* HAVE_EXT_CACHE we get new objects each time */
|
* HAVE_EXT_CACHE we get new objects each time */
|
||||||
|
@@ -1691,6 +1691,7 @@ WOLFSSL_API const char* wolfSSL_SESSION_CIPHER_get_name(const WOLFSSL_SESSION*
|
|||||||
WOLFSSL_API const char* wolfSSL_get_cipher(WOLFSSL* ssl);
|
WOLFSSL_API const char* wolfSSL_get_cipher(WOLFSSL* ssl);
|
||||||
WOLFSSL_API void wolfSSL_sk_CIPHER_free(WOLF_STACK_OF(WOLFSSL_CIPHER)* sk);
|
WOLFSSL_API void wolfSSL_sk_CIPHER_free(WOLF_STACK_OF(WOLFSSL_CIPHER)* sk);
|
||||||
WOLFSSL_API WOLFSSL_SESSION* wolfSSL_get1_session(WOLFSSL* ssl);
|
WOLFSSL_API WOLFSSL_SESSION* wolfSSL_get1_session(WOLFSSL* ssl);
|
||||||
|
WOLFSSL_API int wolfSSLSessionIsSetup(WOLFSSL_SESSION* session);
|
||||||
|
|
||||||
WOLFSSL_API WOLFSSL_X509* wolfSSL_X509_new(void);
|
WOLFSSL_API WOLFSSL_X509* wolfSSL_X509_new(void);
|
||||||
WOLFSSL_API WOLFSSL_X509* wolfSSL_X509_new_ex(void* heap);
|
WOLFSSL_API WOLFSSL_X509* wolfSSL_X509_new_ex(void* heap);
|
||||||
|
Reference in New Issue
Block a user