mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-02 04:04:39 +02:00
Merge branch 'master' of github.com:cyassl/cyassl
This commit is contained in:
@@ -354,7 +354,7 @@ void client_test(void* args)
|
|||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
showPeer(ssl);
|
showPeer(ssl);
|
||||||
|
|
||||||
if (sendGET) {
|
if (sendGET) {
|
||||||
printf("SSL connect ok, sending GET...\n");
|
printf("SSL connect ok, sending GET...\n");
|
||||||
msgSz = 28;
|
msgSz = 28;
|
||||||
@@ -409,8 +409,20 @@ void client_test(void* args)
|
|||||||
CyaSSL_set_fd(sslResume, sockfd);
|
CyaSSL_set_fd(sslResume, sockfd);
|
||||||
CyaSSL_set_session(sslResume, session);
|
CyaSSL_set_session(sslResume, session);
|
||||||
|
|
||||||
showPeer(sslResume);
|
showPeer(sslResume);
|
||||||
if (CyaSSL_connect(sslResume) != SSL_SUCCESS) err_sys("SSL resume failed");
|
#ifdef NON_BLOCKING
|
||||||
|
tcp_set_nonblocking(&sockfd);
|
||||||
|
NonBlockingSSL_Connect(sslResume);
|
||||||
|
#else
|
||||||
|
#ifndef CYASSL_CALLBACKS
|
||||||
|
if (CyaSSL_connect(sslResume) != SSL_SUCCESS)
|
||||||
|
err_sys("SSL resume failed");
|
||||||
|
#else
|
||||||
|
timeout.tv_sec = 2;
|
||||||
|
timeout.tv_usec = 0;
|
||||||
|
NonBlockingSSL_Connect(ssl); /* will keep retrying on timeout */
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifdef OPENSSL_EXTRA
|
#ifdef OPENSSL_EXTRA
|
||||||
if (CyaSSL_session_reused(sslResume))
|
if (CyaSSL_session_reused(sslResume))
|
||||||
@@ -422,6 +434,15 @@ void client_test(void* args)
|
|||||||
if (CyaSSL_write(sslResume, resumeMsg, resumeSz) != resumeSz)
|
if (CyaSSL_write(sslResume, resumeMsg, resumeSz) != resumeSz)
|
||||||
err_sys("SSL_write failed");
|
err_sys("SSL_write failed");
|
||||||
|
|
||||||
|
#ifdef NON_BLOCKING
|
||||||
|
/* need to give server a chance to bounce a message back to client */
|
||||||
|
#ifdef USE_WINDOWS_API
|
||||||
|
Sleep(500);
|
||||||
|
#else
|
||||||
|
sleep(1);
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
input = CyaSSL_read(sslResume, reply, sizeof(reply));
|
input = CyaSSL_read(sslResume, reply, sizeof(reply));
|
||||||
if (input > 0) {
|
if (input > 0) {
|
||||||
reply[input] = 0;
|
reply[input] = 0;
|
||||||
|
11
src/ssl.c
11
src/ssl.c
@@ -2254,7 +2254,10 @@ int CyaSSL_set_cipher_list(CYASSL* ssl, const char* list)
|
|||||||
neededState = ssl->options.resuming ? SERVER_FINISHED_COMPLETE :
|
neededState = ssl->options.resuming ? SERVER_FINISHED_COMPLETE :
|
||||||
SERVER_HELLODONE_COMPLETE;
|
SERVER_HELLODONE_COMPLETE;
|
||||||
#ifdef CYASSL_DTLS
|
#ifdef CYASSL_DTLS
|
||||||
if (ssl->options.dtls && !ssl->options.resuming)
|
/* In DTLS, when resuming, we can go straight to FINISHED,
|
||||||
|
* or do a cookie exchange and then skip to FINISHED, assume
|
||||||
|
* we need the cookie exchange first. */
|
||||||
|
if (ssl->options.dtls)
|
||||||
neededState = SERVER_HELLOVERIFYREQUEST_COMPLETE;
|
neededState = SERVER_HELLOVERIFYREQUEST_COMPLETE;
|
||||||
#endif
|
#endif
|
||||||
/* get response */
|
/* get response */
|
||||||
@@ -2281,7 +2284,7 @@ int CyaSSL_set_cipher_list(CYASSL* ssl, const char* list)
|
|||||||
return SSL_SUCCESS;
|
return SSL_SUCCESS;
|
||||||
|
|
||||||
#ifdef CYASSL_DTLS
|
#ifdef CYASSL_DTLS
|
||||||
if (ssl->options.dtls && !ssl->options.resuming) {
|
if (ssl->options.dtls) {
|
||||||
/* re-init hashes, exclude first hello and verify request */
|
/* re-init hashes, exclude first hello and verify request */
|
||||||
InitMd5(&ssl->hashMd5);
|
InitMd5(&ssl->hashMd5);
|
||||||
InitSha(&ssl->hashSha);
|
InitSha(&ssl->hashSha);
|
||||||
@@ -2501,7 +2504,7 @@ int CyaSSL_set_cipher_list(CYASSL* ssl, const char* list)
|
|||||||
|
|
||||||
case ACCEPT_CLIENT_HELLO_DONE :
|
case ACCEPT_CLIENT_HELLO_DONE :
|
||||||
#ifdef CYASSL_DTLS
|
#ifdef CYASSL_DTLS
|
||||||
if (ssl->options.dtls && !ssl->options.resuming)
|
if (ssl->options.dtls)
|
||||||
if ( (ssl->error = SendHelloVerifyRequest(ssl)) != 0) {
|
if ( (ssl->error = SendHelloVerifyRequest(ssl)) != 0) {
|
||||||
CYASSL_ERROR(ssl->error);
|
CYASSL_ERROR(ssl->error);
|
||||||
return SSL_FATAL_ERROR;
|
return SSL_FATAL_ERROR;
|
||||||
@@ -2512,7 +2515,7 @@ int CyaSSL_set_cipher_list(CYASSL* ssl, const char* list)
|
|||||||
|
|
||||||
case HELLO_VERIFY_SENT:
|
case HELLO_VERIFY_SENT:
|
||||||
#ifdef CYASSL_DTLS
|
#ifdef CYASSL_DTLS
|
||||||
if (ssl->options.dtls && !ssl->options.resuming) {
|
if (ssl->options.dtls) {
|
||||||
ssl->options.clientState = NULL_STATE; /* get again */
|
ssl->options.clientState = NULL_STATE; /* get again */
|
||||||
/* re-init hashes, exclude first hello and verify request */
|
/* re-init hashes, exclude first hello and verify request */
|
||||||
InitMd5(&ssl->hashMd5);
|
InitMd5(&ssl->hashMd5);
|
||||||
|
Reference in New Issue
Block a user