mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-08-03 20:54:41 +02:00
Address code review
This commit is contained in:
@@ -12793,7 +12793,7 @@ int wolfSSL_DTLS_SetCookieSecret(WOLFSSL* ssl,
|
|||||||
|
|
||||||
#endif /* NO_WOLFSSL_SERVER */
|
#endif /* NO_WOLFSSL_SERVER */
|
||||||
|
|
||||||
#ifdef WOLFSSL_DTLS
|
#if defined(WOLFSSL_DTLS) && !defined(NO_WOLFSSL_SERVER)
|
||||||
int wolfSSL_SetChGoodCb(WOLFSSL* ssl, ClientHelloGoodCb cb, void* user_ctx)
|
int wolfSSL_SetChGoodCb(WOLFSSL* ssl, ClientHelloGoodCb cb, void* user_ctx)
|
||||||
{
|
{
|
||||||
WOLFSSL_ENTER("wolfSSL_SetChGoodCb");
|
WOLFSSL_ENTER("wolfSSL_SetChGoodCb");
|
||||||
|
@@ -6169,9 +6169,10 @@ static int TLSX_Cookie_Parse(WOLFSSL* ssl, const byte* input, word16 length,
|
|||||||
extension = TLSX_Find(ssl->extensions, TLSX_COOKIE);
|
extension = TLSX_Find(ssl->extensions, TLSX_COOKIE);
|
||||||
if (extension == NULL) {
|
if (extension == NULL) {
|
||||||
#ifdef WOLFSSL_DTLS13
|
#ifdef WOLFSSL_DTLS13
|
||||||
if (ssl->options.dtls)
|
if (ssl->options.dtls && IsAtLeastTLSv1_3(ssl->version))
|
||||||
/* TODO: Should we allow a ClientHello with a valid cookie even if
|
/* Allow a cookie extension with DTLS 1.3 because it is possible
|
||||||
* the cookie wasn't sent by this WOLFSSL object? */
|
* that a different SSL instance sent the cookie but we are now
|
||||||
|
* receiving it. */
|
||||||
return TLSX_Cookie_Use(ssl, input + idx, len, NULL, 0, 0);
|
return TLSX_Cookie_Use(ssl, input + idx, len, NULL, 0, 0);
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
|
Reference in New Issue
Block a user