From dee32247b958deff0af8773c12cac184999c7f3f Mon Sep 17 00:00:00 2001 From: Juliusz Sosinowicz Date: Wed, 2 Aug 2023 18:02:06 +0200 Subject: [PATCH] Code review --- src/internal.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/internal.c b/src/internal.c index 2c6269802..488db8b38 100644 --- a/src/internal.c +++ b/src/internal.c @@ -16121,16 +16121,16 @@ static int DoHandShakeMsgType(WOLFSSL* ssl, byte* input, word32* inOutIdx, * server is resuming a session by the subsequent handshake * messages. */ - if (ssl->session->sessionIDSz != 0) { #ifndef WOLFSSL_WPAS + if (ssl->session->sessionIDSz != 0) { /* Fatal error. Only try to send an alert. RFC 5246 does not * allow for reverting back to a full handshake after the * server has indicated the intention to do a resumption. */ (void)SendAlert(ssl, alert_fatal, unexpected_message); WOLFSSL_ERROR_VERBOSE(OUT_OF_ORDER_E); return OUT_OF_ORDER_E; -#endif } +#endif /* This can occur when ssl->sessionSecretCb is set. EAP-FAST * (RFC 4851) allows for detecting server session resumption * based on the msg received after the ServerHello. */