forked from wolfSSL/wolfssl
Code review
This commit is contained in:
@@ -16121,16 +16121,16 @@ static int DoHandShakeMsgType(WOLFSSL* ssl, byte* input, word32* inOutIdx,
|
|||||||
* server is resuming a session by the subsequent handshake
|
* server is resuming a session by the subsequent handshake
|
||||||
* messages.
|
* messages.
|
||||||
*/
|
*/
|
||||||
if (ssl->session->sessionIDSz != 0) {
|
|
||||||
#ifndef WOLFSSL_WPAS
|
#ifndef WOLFSSL_WPAS
|
||||||
|
if (ssl->session->sessionIDSz != 0) {
|
||||||
/* Fatal error. Only try to send an alert. RFC 5246 does not
|
/* Fatal error. Only try to send an alert. RFC 5246 does not
|
||||||
* allow for reverting back to a full handshake after the
|
* allow for reverting back to a full handshake after the
|
||||||
* server has indicated the intention to do a resumption. */
|
* server has indicated the intention to do a resumption. */
|
||||||
(void)SendAlert(ssl, alert_fatal, unexpected_message);
|
(void)SendAlert(ssl, alert_fatal, unexpected_message);
|
||||||
WOLFSSL_ERROR_VERBOSE(OUT_OF_ORDER_E);
|
WOLFSSL_ERROR_VERBOSE(OUT_OF_ORDER_E);
|
||||||
return OUT_OF_ORDER_E;
|
return OUT_OF_ORDER_E;
|
||||||
#endif
|
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
/* This can occur when ssl->sessionSecretCb is set. EAP-FAST
|
/* This can occur when ssl->sessionSecretCb is set. EAP-FAST
|
||||||
* (RFC 4851) allows for detecting server session resumption
|
* (RFC 4851) allows for detecting server session resumption
|
||||||
* based on the msg received after the ServerHello. */
|
* based on the msg received after the ServerHello. */
|
||||||
|
Reference in New Issue
Block a user