From 0457df83d47e4ae20498077a77a26ea34d6d1398 Mon Sep 17 00:00:00 2001 From: John Safranek Date: Tue, 3 Jan 2017 14:35:31 -0800 Subject: [PATCH] Multicast 1. When setting the key data, use same keys for server and client sides of the different keys. This feels a little kludgey, and won't work when using separate senders and listeners who may use unicast messages. But this works for the all peers are multicast senders case. --- src/keys.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/src/keys.c b/src/keys.c index d38e1c070..17281665f 100644 --- a/src/keys.c +++ b/src/keys.c @@ -3045,7 +3045,7 @@ int SetKeysSide(WOLFSSL* ssl, enum encrypt_side side) /* TLS can call too */ int StoreKeys(WOLFSSL* ssl, const byte* keyData, int side) { - int sz, i = 0; + int sz, i = 0, haveMcast = 0; Keys* keys = &ssl->keys; #ifdef HAVE_SECURE_RENEGOTIATION @@ -3056,6 +3056,10 @@ int StoreKeys(WOLFSSL* ssl, const byte* keyData, int side) } #endif /* HAVE_SECURE_RENEGOTIATION */ +#ifdef WOLFSSL_MULTICAST + haveMcast = ssl->options.haveMcast; +#endif + if (ssl->specs.cipher_type != aead) { sz = ssl->specs.hash_size; if (side & PROVISION_CLIENT) {