mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-03 20:54:41 +02:00
do session conversion dance
This commit is contained in:
@@ -751,6 +751,7 @@ long wolfSSL_CTX_set_session_cache_mode(WOLFSSL_CTX* ctx, long mode)
|
||||
/* return the max fragment size set when handshake was negotiated */
|
||||
uint8_t wolfSSL_SESSION_get_max_fragment_length(WOLFSSL_SESSION* session)
|
||||
{
|
||||
session = ClientSessionToSession(session);
|
||||
if (session == NULL) {
|
||||
return 0;
|
||||
}
|
||||
@@ -3908,6 +3909,10 @@ static int wolfSSL_DupSessionEx(const WOLFSSL_SESSION* input,
|
||||
}
|
||||
ticBuff = NULL;
|
||||
|
||||
#ifdef HAVE_MAX_FRAGMENT
|
||||
output->mfl = input->mfl;
|
||||
#endif
|
||||
|
||||
#if defined(WOLFSSL_TLS13) && defined(WOLFSSL_TICKET_NONCE_MALLOC) && \
|
||||
(!defined(HAVE_FIPS) || (defined(FIPS_VERSION_GE) && FIPS_VERSION_GE(5,3)))
|
||||
if (preallocUsed != NULL)
|
||||
|
@@ -2988,8 +2988,9 @@ static int TLSX_MFL_Parse(WOLFSSL* ssl, const byte* input, word16 length,
|
||||
WOLFSSL_ERROR_VERBOSE(UNKNOWN_MAX_FRAG_LEN_E);
|
||||
return UNKNOWN_MAX_FRAG_LEN_E;
|
||||
}
|
||||
if (ssl->session != NULL)
|
||||
if (ssl->session != NULL) {
|
||||
ssl->session->mfl = *input;
|
||||
}
|
||||
|
||||
#ifndef NO_WOLFSSL_SERVER
|
||||
if (isRequest) {
|
||||
|
Reference in New Issue
Block a user