added psk session callback
This commit is contained in:
parent
385e0bedaa
commit
0e40293798
@ -2923,6 +2923,13 @@ THREAD_RETURN WOLFSSL_THREAD client_test(void* args)
|
|||||||
err_sys("unable to get SSL object");
|
err_sys("unable to get SSL object");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#ifndef NO_PSK
|
||||||
|
if (usePsk) {
|
||||||
|
#if defined(OPENSSL_EXTRA) && defined(WOLFSSL_TLS13) && defined(TEST_PSK_USE_SESSION)
|
||||||
|
SSL_set_psk_use_session_callback(ssl, my_psk_use_session_cb);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifndef NO_CERTS
|
#ifndef NO_CERTS
|
||||||
if (useClientCert && loadCertKeyIntoSSLObj){
|
if (useClientCert && loadCertKeyIntoSSLObj){
|
||||||
|
86
src/ssl.c
86
src/ssl.c
@ -14687,7 +14687,38 @@ int wolfSSL_set_compression(WOLFSSL* ssl)
|
|||||||
ssl->options.haveStaticECC, ssl->options.haveAnon,
|
ssl->options.haveStaticECC, ssl->options.haveAnon,
|
||||||
ssl->options.side);
|
ssl->options.side);
|
||||||
}
|
}
|
||||||
|
#ifdef OPENSSL_EXTRA
|
||||||
|
/**
|
||||||
|
* set call back function for psk session use
|
||||||
|
* @param ssl a pointer to WOLFSSL structure
|
||||||
|
* @param cb a function pointer to wc_psk_use_session_cb
|
||||||
|
* @return none
|
||||||
|
*/
|
||||||
|
void wolfSSL_set_psk_use_session_callback(WOLFSSL* ssl,
|
||||||
|
wc_psk_use_session_cb_func cb)
|
||||||
|
{
|
||||||
|
byte haveRSA = 1;
|
||||||
|
int keySz = 0;
|
||||||
|
|
||||||
|
WOLFSSL_ENTER("wolfSSL_set_psk_use_session_callback");
|
||||||
|
|
||||||
|
ssl->options.havePSK = 1;
|
||||||
|
ssl->options.session_psk_cb = cb;
|
||||||
|
|
||||||
|
#ifdef NO_RSA
|
||||||
|
haveRSA = 0;
|
||||||
|
#endif
|
||||||
|
#ifndef NO_CERTS
|
||||||
|
keySz = ssl->buffers.keySz;
|
||||||
|
#endif
|
||||||
|
InitSuites(ssl->suites, ssl->version, keySz, haveRSA, TRUE,
|
||||||
|
ssl->options.haveDH, ssl->options.haveNTRU,
|
||||||
|
ssl->options.haveECDSAsig, ssl->options.haveECC,
|
||||||
|
ssl->options.haveStaticECC, ssl->options.haveAnon,
|
||||||
|
ssl->options.side);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
void wolfSSL_CTX_set_psk_server_callback(WOLFSSL_CTX* ctx,
|
void wolfSSL_CTX_set_psk_server_callback(WOLFSSL_CTX* ctx,
|
||||||
wc_psk_server_callback cb)
|
wc_psk_server_callback cb)
|
||||||
{
|
{
|
||||||
@ -22095,6 +22126,28 @@ void wolfSSL_SESSION_free(WOLFSSL_SESSION* session)
|
|||||||
FreeSession(session, 0);
|
FreeSession(session, 0);
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
/**
|
||||||
|
* set cipher to WOLFSSL_SESSION from WOLFSSL_CIPHER
|
||||||
|
* @param session a pointer to WOLFSSL_SESSION structure
|
||||||
|
* @param cipher a function pointer to WOLFSSL_CIPHER
|
||||||
|
* @return WOLFSSL_SUCCESS on success, otherwise WOLFSSL_FAILURE
|
||||||
|
*/
|
||||||
|
int wolfSSL_SESSION_set_cipher(WOLFSSL_SESSION* session,
|
||||||
|
const WOLFSSL_CIPHER* cipher)
|
||||||
|
{
|
||||||
|
WOLFSSL_ENTER("wolfSSL_SESSION_set_cipher");
|
||||||
|
|
||||||
|
/* sanity check */
|
||||||
|
if (session == NULL || cipher == NULL) {
|
||||||
|
WOLFSSL_MSG("bad argument");
|
||||||
|
return WOLFSSL_FAILURE;
|
||||||
|
}
|
||||||
|
session->cipherSuite0 = cipher->cipherSuite0;
|
||||||
|
session->cipherSuite = cipher->cipherSuite;
|
||||||
|
|
||||||
|
WOLFSSL_LEAVE("wolfSSL_SESSION_set_cipher", WOLFSSL_SUCCESS);
|
||||||
|
return WOLFSSL_SUCCESS;
|
||||||
|
}
|
||||||
#endif /* OPENSSL_EXTRA || HAVE_EXT_CACHE */
|
#endif /* OPENSSL_EXTRA || HAVE_EXT_CACHE */
|
||||||
|
|
||||||
|
|
||||||
@ -22330,19 +22383,18 @@ word32 wolfSSL_CIPHER_get_id(const WOLFSSL_CIPHER* cipher)
|
|||||||
|
|
||||||
const WOLFSSL_CIPHER* wolfSSL_get_cipher_by_value(word16 value)
|
const WOLFSSL_CIPHER* wolfSSL_get_cipher_by_value(word16 value)
|
||||||
{
|
{
|
||||||
const WOLFSSL_CIPHER* cipher = NULL;
|
WOLFSSL_CIPHER* cipher = NULL;
|
||||||
byte cipherSuite0, cipherSuite;
|
|
||||||
WOLFSSL_ENTER("SSL_get_cipher_by_value");
|
WOLFSSL_ENTER("SSL_get_cipher_by_value");
|
||||||
|
|
||||||
/* extract cipher id information */
|
cipher = (WOLFSSL_CIPHER*)XMALLOC(sizeof(WOLFSSL_CIPHER), NULL,
|
||||||
cipherSuite = (value & 0xFF);
|
DYNAMIC_TYPE_OPENSSL);
|
||||||
cipherSuite0 = ((value >> 8) & 0xFF);
|
if (cipher != NULL) {
|
||||||
|
/* extract cipher id information */
|
||||||
|
cipher->cipherSuite = (value & 0xFF);
|
||||||
|
cipher->cipherSuite0 = ((value >> 8) & 0xFF);
|
||||||
|
}
|
||||||
|
|
||||||
/* TODO: lookup by cipherSuite0 / cipherSuite */
|
return (const WOLFSSL_CIPHER*)cipher;
|
||||||
(void)cipherSuite0;
|
|
||||||
(void)cipherSuite;
|
|
||||||
|
|
||||||
return cipher;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -55860,21 +55912,7 @@ int wolfSSL_CTX_get_security_level(const WOLFSSL_CTX* ctx)
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef NO_WOLFSSL_STUB
|
|
||||||
|
|
||||||
/**
|
|
||||||
* set call back function for psk session use
|
|
||||||
* @param ssl a pointer to WOLFSSL structure
|
|
||||||
* @return none
|
|
||||||
*/
|
|
||||||
void wolfSSL_set_psk_use_session_callback(WOLFSSL* ssl,
|
|
||||||
wc_psk_use_session_cb_func cb)
|
|
||||||
{
|
|
||||||
WOLFSSL_STUB("wolfSSL_set_psk_use_session_callback");
|
|
||||||
(void)ssl;
|
|
||||||
(void)cb;
|
|
||||||
}
|
|
||||||
#endif /* NO_WOLFSSL_STUB */
|
|
||||||
/**
|
/**
|
||||||
* Determine whether a WOLFSSL_SESSION object can be used for resumption
|
* Determine whether a WOLFSSL_SESSION object can be used for resumption
|
||||||
* @param s a pointer to WOLFSSL_SESSION structure
|
* @param s a pointer to WOLFSSL_SESSION structure
|
||||||
|
82
src/tls13.c
82
src/tls13.c
@ -2607,6 +2607,48 @@ static byte helloRetryRequestRandom[] = {
|
|||||||
|
|
||||||
#ifndef NO_WOLFSSL_CLIENT
|
#ifndef NO_WOLFSSL_CLIENT
|
||||||
#if defined(HAVE_SESSION_TICKET) || !defined(NO_PSK)
|
#if defined(HAVE_SESSION_TICKET) || !defined(NO_PSK)
|
||||||
|
#ifdef OPENSSL_EXTRA
|
||||||
|
/**
|
||||||
|
* convert mac algorithm to WOLFSSL_EVP_MD
|
||||||
|
* @param mac_alg mac algorithm
|
||||||
|
* @return const WOLFSSL_EVP_MD on sucessful, otherwise NULL
|
||||||
|
*/
|
||||||
|
static const WOLFSSL_EVP_MD* ssl_handshake_md(const byte mac_alg)
|
||||||
|
{
|
||||||
|
switch(mac_alg) {
|
||||||
|
case no_mac:
|
||||||
|
#ifndef NO_MD5
|
||||||
|
case md5_mac:
|
||||||
|
return wolfSSL_EVP_md5();
|
||||||
|
#endif
|
||||||
|
#ifndef NO_SHA
|
||||||
|
case sha_mac:
|
||||||
|
return wolfSSL_EVP_sha1();
|
||||||
|
#endif
|
||||||
|
#ifdef WOLFSSL_SHA224
|
||||||
|
case sha224_mac:
|
||||||
|
return wolfSSL_EVP_sha224();
|
||||||
|
#endif
|
||||||
|
case sha256_mac:
|
||||||
|
return wolfSSL_EVP_sha256();
|
||||||
|
#ifdef WOLFSSL_SHA384
|
||||||
|
case sha384_mac:
|
||||||
|
return wolfSSL_EVP_sha384();
|
||||||
|
#endif
|
||||||
|
#ifdef WOLFSSL_SHA512
|
||||||
|
case sha512_mac:
|
||||||
|
return wolfSSL_EVP_sha512();
|
||||||
|
#endif
|
||||||
|
case rmd_mac:
|
||||||
|
case blake2b_mac:
|
||||||
|
WOLFSSL_MSG("no suitable EVP_MD");
|
||||||
|
return NULL;
|
||||||
|
default:
|
||||||
|
WOLFSSL_MSG("Unknown mac algorithm");
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
/* Setup pre-shared key based on the details in the extension data.
|
/* Setup pre-shared key based on the details in the extension data.
|
||||||
*
|
*
|
||||||
* ssl SSL/TLS object.
|
* ssl SSL/TLS object.
|
||||||
@ -2652,9 +2694,32 @@ static int SetupPskKey(WOLFSSL* ssl, PreSharedKey* psk)
|
|||||||
const char* cipherName = NULL;
|
const char* cipherName = NULL;
|
||||||
byte cipherSuite0 = TLS13_BYTE, cipherSuite = WOLFSSL_DEF_PSK_CIPHER;
|
byte cipherSuite0 = TLS13_BYTE, cipherSuite = WOLFSSL_DEF_PSK_CIPHER;
|
||||||
int cipherSuiteFlags = WOLFSSL_CIPHER_SUITE_FLAG_NONE;
|
int cipherSuiteFlags = WOLFSSL_CIPHER_SUITE_FLAG_NONE;
|
||||||
|
|
||||||
|
#ifdef OPENSSL_EXTRA
|
||||||
|
const unsigned char* id = NULL;
|
||||||
|
size_t idlen = 0;
|
||||||
|
WOLFSSL_SESSION* psksession = NULL;
|
||||||
|
const WOLFSSL_EVP_MD* handshake_md = NULL;
|
||||||
|
|
||||||
|
if (ssl->msgsReceived.got_hello_retry_request >= 1) {
|
||||||
|
handshake_md = ssl_handshake_md(ssl->specs.mac_algorithm);
|
||||||
|
}
|
||||||
|
|
||||||
/* Get the pre-shared key. */
|
/* Get the pre-shared key. */
|
||||||
if (ssl->options.client_psk_tls13_cb != NULL) {
|
if (ssl->options.session_psk_cb != NULL &&
|
||||||
|
(!ssl->options.session_psk_cb(ssl, handshake_md,
|
||||||
|
&id, &idlen, &psksession))) {
|
||||||
|
wolfSSL_SESSION_free(psksession);
|
||||||
|
WOLFSSL_MSG("psk session callback failed");
|
||||||
|
return PSK_KEY_ERROR;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (psksession == NULL &&
|
||||||
|
#else
|
||||||
|
/* Get the pre-shared key. */
|
||||||
|
if (
|
||||||
|
#endif
|
||||||
|
ssl->options.client_psk_tls13_cb != NULL) {
|
||||||
ssl->arrays->psk_keySz = ssl->options.client_psk_tls13_cb(ssl,
|
ssl->arrays->psk_keySz = ssl->options.client_psk_tls13_cb(ssl,
|
||||||
(char *)psk->identity, ssl->arrays->client_identity,
|
(char *)psk->identity, ssl->arrays->client_identity,
|
||||||
MAX_PSK_ID_LEN, ssl->arrays->psk_key, MAX_PSK_KEY_LEN,
|
MAX_PSK_ID_LEN, ssl->arrays->psk_key, MAX_PSK_KEY_LEN,
|
||||||
@ -2665,6 +2730,21 @@ static int SetupPskKey(WOLFSSL* ssl, PreSharedKey* psk)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
|
#ifdef OPENSSL_EXTRA
|
||||||
|
if (psksession != NULL) {
|
||||||
|
if (idlen > MAX_PSK_KEY_LEN) {
|
||||||
|
WOLFSSL_MSG("psk key length is too long");
|
||||||
|
return PSK_KEY_ERROR;
|
||||||
|
}
|
||||||
|
|
||||||
|
ssl->arrays->psk_keySz = idlen;
|
||||||
|
XMEMCPY(ssl->arrays->psk_key, id, idlen);
|
||||||
|
cipherSuite0 = psksession->cipherSuite0;
|
||||||
|
cipherSuite = psksession->cipherSuite;
|
||||||
|
/* no need anymore */
|
||||||
|
wolfSSL_SESSION_free(psksession);
|
||||||
|
} else
|
||||||
|
#endif
|
||||||
ssl->arrays->psk_keySz = ssl->options.client_psk_cb(ssl,
|
ssl->arrays->psk_keySz = ssl->options.client_psk_cb(ssl,
|
||||||
(char *)psk->identity, ssl->arrays->client_identity,
|
(char *)psk->identity, ssl->arrays->client_identity,
|
||||||
MAX_PSK_ID_LEN, ssl->arrays->psk_key, MAX_PSK_KEY_LEN);
|
MAX_PSK_ID_LEN, ssl->arrays->psk_key, MAX_PSK_KEY_LEN);
|
||||||
|
@ -42873,7 +42873,6 @@ static void test_wolfSSL_set_psk_use_session_callback(void)
|
|||||||
ssl = SSL_new(ctx);
|
ssl = SSL_new(ctx);
|
||||||
AssertNotNull(ssl);
|
AssertNotNull(ssl);
|
||||||
|
|
||||||
/* STUB */
|
|
||||||
SSL_set_psk_use_session_callback(ssl,
|
SSL_set_psk_use_session_callback(ssl,
|
||||||
my_psk_use_session_cb);
|
my_psk_use_session_cb);
|
||||||
AssertTrue(1);
|
AssertTrue(1);
|
||||||
|
@ -3506,6 +3506,7 @@ typedef struct Options {
|
|||||||
#ifndef NO_PSK
|
#ifndef NO_PSK
|
||||||
wc_psk_client_callback client_psk_cb;
|
wc_psk_client_callback client_psk_cb;
|
||||||
wc_psk_server_callback server_psk_cb;
|
wc_psk_server_callback server_psk_cb;
|
||||||
|
wc_psk_use_session_cb_func session_psk_cb;
|
||||||
#ifdef WOLFSSL_TLS13
|
#ifdef WOLFSSL_TLS13
|
||||||
wc_psk_client_tls13_callback client_psk_tls13_cb; /* client callback */
|
wc_psk_client_tls13_callback client_psk_tls13_cb; /* client callback */
|
||||||
wc_psk_server_tls13_callback server_psk_tls13_cb; /* server callback */
|
wc_psk_server_tls13_callback server_psk_tls13_cb; /* server callback */
|
||||||
|
@ -331,6 +331,7 @@ typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS;
|
|||||||
#define SSL_SESSION_up_ref wolfSSL_SESSION_up_ref
|
#define SSL_SESSION_up_ref wolfSSL_SESSION_up_ref
|
||||||
#define SSL_SESSION_dup wolfSSL_SESSION_dup
|
#define SSL_SESSION_dup wolfSSL_SESSION_dup
|
||||||
#define SSL_SESSION_free wolfSSL_SESSION_free
|
#define SSL_SESSION_free wolfSSL_SESSION_free
|
||||||
|
#define SSL_SESSION_set_cipher wolfSSL_SESSION_set_cipher
|
||||||
#define SSL_is_init_finished wolfSSL_is_init_finished
|
#define SSL_is_init_finished wolfSSL_is_init_finished
|
||||||
|
|
||||||
#define SSL_get_version wolfSSL_get_version
|
#define SSL_get_version wolfSSL_get_version
|
||||||
|
@ -1312,6 +1312,8 @@ WOLFSSL_API int wolfSSL_SESSION_up_ref(WOLFSSL_SESSION* session);
|
|||||||
WOLFSSL_API WOLFSSL_SESSION* wolfSSL_SESSION_dup(WOLFSSL_SESSION* session);
|
WOLFSSL_API WOLFSSL_SESSION* wolfSSL_SESSION_dup(WOLFSSL_SESSION* session);
|
||||||
WOLFSSL_API WOLFSSL_SESSION* wolfSSL_SESSION_new(void);
|
WOLFSSL_API WOLFSSL_SESSION* wolfSSL_SESSION_new(void);
|
||||||
WOLFSSL_API void wolfSSL_SESSION_free(WOLFSSL_SESSION* session);
|
WOLFSSL_API void wolfSSL_SESSION_free(WOLFSSL_SESSION* session);
|
||||||
|
WOLFSSL_API int wolfSSL_SESSION_set_cipher(WOLFSSL_SESSION* session,
|
||||||
|
const WOLFSSL_CIPHER* cipher);
|
||||||
WOLFSSL_API int wolfSSL_is_init_finished(WOLFSSL*);
|
WOLFSSL_API int wolfSSL_is_init_finished(WOLFSSL*);
|
||||||
|
|
||||||
WOLFSSL_API const char* wolfSSL_get_version(const WOLFSSL*);
|
WOLFSSL_API const char* wolfSSL_get_version(const WOLFSSL*);
|
||||||
@ -2159,6 +2161,14 @@ enum { /* ssl Constants */
|
|||||||
wc_psk_client_callback);
|
wc_psk_client_callback);
|
||||||
WOLFSSL_API void wolfSSL_set_psk_client_callback(WOLFSSL*,
|
WOLFSSL_API void wolfSSL_set_psk_client_callback(WOLFSSL*,
|
||||||
wc_psk_client_callback);
|
wc_psk_client_callback);
|
||||||
|
#ifdef OPENSSL_EXTRA
|
||||||
|
typedef int (*wc_psk_use_session_cb_func)(WOLFSSL* ssl, const WOLFSSL_EVP_MD* md,
|
||||||
|
const unsigned char **id,
|
||||||
|
size_t* idlen,
|
||||||
|
WOLFSSL_SESSION **sess);
|
||||||
|
WOLFSSL_API void wolfSSL_set_psk_use_session_callback(WOLFSSL* ssl,
|
||||||
|
wc_psk_use_session_cb_func cb);
|
||||||
|
#endif
|
||||||
#ifdef WOLFSSL_TLS13
|
#ifdef WOLFSSL_TLS13
|
||||||
typedef unsigned int (*wc_psk_client_tls13_callback)(WOLFSSL*, const char*,
|
typedef unsigned int (*wc_psk_client_tls13_callback)(WOLFSSL*, const char*,
|
||||||
char*, unsigned int, unsigned char*, unsigned int, const char**);
|
char*, unsigned int, unsigned char*, unsigned int, const char**);
|
||||||
@ -4376,13 +4386,6 @@ WOLFSSL_API int wolfSSL_EVP_PKEY_param_check(WOLFSSL_EVP_PKEY_CTX* ctx);
|
|||||||
WOLFSSL_API void wolfSSL_CTX_set_security_level(WOLFSSL_CTX* ctx, int level);
|
WOLFSSL_API void wolfSSL_CTX_set_security_level(WOLFSSL_CTX* ctx, int level);
|
||||||
WOLFSSL_API int wolfSSL_CTX_get_security_level(const WOLFSSL_CTX* ctx);
|
WOLFSSL_API int wolfSSL_CTX_get_security_level(const WOLFSSL_CTX* ctx);
|
||||||
|
|
||||||
typedef int (*wc_psk_use_session_cb_func)(WOLFSSL* ssl, const WOLFSSL_EVP_MD* md,
|
|
||||||
const unsigned char **id,
|
|
||||||
size_t* idlen,
|
|
||||||
WOLFSSL_SESSION **sess);
|
|
||||||
WOLFSSL_API void wolfSSL_set_psk_use_session_callback(WOLFSSL* ssl,
|
|
||||||
wc_psk_use_session_cb_func cb);
|
|
||||||
|
|
||||||
WOLFSSL_API int wolfSSL_SESSION_is_resumable(const WOLFSSL_SESSION *s);
|
WOLFSSL_API int wolfSSL_SESSION_is_resumable(const WOLFSSL_SESSION *s);
|
||||||
|
|
||||||
WOLFSSL_API void wolfSSL_CRYPTO_free(void *str, const char *file, int line);
|
WOLFSSL_API void wolfSSL_CRYPTO_free(void *str, const char *file, int line);
|
||||||
|
@ -1515,19 +1515,45 @@ static WC_INLINE unsigned int my_psk_server_tls13_cb(WOLFSSL* ssl,
|
|||||||
return 32; /* length of key in octets or 0 for error */
|
return 32; /* length of key in octets or 0 for error */
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if defined(OPENSSL_EXTRA)
|
||||||
|
static unsigned char local_psk[32];
|
||||||
static WC_INLINE int my_psk_use_session_cb(WOLFSSL* ssl,
|
static WC_INLINE int my_psk_use_session_cb(WOLFSSL* ssl,
|
||||||
const WOLFSSL_EVP_MD* md, const unsigned char **id,
|
const WOLFSSL_EVP_MD* md, const unsigned char **id,
|
||||||
size_t* idlen, WOLFSSL_SESSION **sess)
|
size_t* idlen, WOLFSSL_SESSION **sess)
|
||||||
{
|
{
|
||||||
|
int i;
|
||||||
|
int b = 0x01;
|
||||||
|
WOLFSSL_SESSION* lsess;
|
||||||
|
/* TLS13_BYTE 0x13 */
|
||||||
|
/* TLS_AES_128_GCM_SHA256 0x01 */
|
||||||
|
word16 cipher_id = (0x13<<8) | 0x01;
|
||||||
|
const SSL_CIPHER* cipher = NULL;
|
||||||
(void)ssl;
|
(void)ssl;
|
||||||
(void)md;
|
(void)md;
|
||||||
(void)id;
|
|
||||||
(void)idlen;
|
printf("use psk session callback \n");
|
||||||
(void)sess;
|
|
||||||
|
lsess = wolfSSL_SESSION_new();
|
||||||
return 0;
|
if (lsess == NULL) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
cipher = SSL_get_cipher_by_value(cipher_id);
|
||||||
|
|
||||||
|
SSL_SESSION_set_cipher(lsess, cipher);
|
||||||
|
|
||||||
|
for (i = 0; i < 32; i++, b += 0x22) {
|
||||||
|
if (b >= 0x100)
|
||||||
|
b = 0x01;
|
||||||
|
local_psk[i] = b;
|
||||||
|
}
|
||||||
|
|
||||||
|
*id = local_psk;
|
||||||
|
*idlen = 32;
|
||||||
|
*sess = lsess;
|
||||||
|
|
||||||
|
return 1;
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
#endif /* !NO_PSK */
|
#endif /* !NO_PSK */
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user