mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 11:17:29 +02:00
Multicast
1. When setting the key data, use same keys for server and client sides of the different keys. This feels a little kludgey, and won't work when using separate senders and listeners who may use unicast messages. But this works for the all peers are multicast senders case.
This commit is contained in:
@ -3045,7 +3045,7 @@ int SetKeysSide(WOLFSSL* ssl, enum encrypt_side side)
|
||||
/* TLS can call too */
|
||||
int StoreKeys(WOLFSSL* ssl, const byte* keyData, int side)
|
||||
{
|
||||
int sz, i = 0;
|
||||
int sz, i = 0, haveMcast = 0;
|
||||
Keys* keys = &ssl->keys;
|
||||
|
||||
#ifdef HAVE_SECURE_RENEGOTIATION
|
||||
@ -3056,6 +3056,10 @@ int StoreKeys(WOLFSSL* ssl, const byte* keyData, int side)
|
||||
}
|
||||
#endif /* HAVE_SECURE_RENEGOTIATION */
|
||||
|
||||
#ifdef WOLFSSL_MULTICAST
|
||||
haveMcast = ssl->options.haveMcast;
|
||||
#endif
|
||||
|
||||
if (ssl->specs.cipher_type != aead) {
|
||||
sz = ssl->specs.hash_size;
|
||||
if (side & PROVISION_CLIENT) {
|
||||
|
Reference in New Issue
Block a user