mirror of https://github.com/wolfSSL/wolfssl
make sure example clients don't use EDH when sniffer active
This commit is contained in:
parent
906e5c19ad
commit
c4e54556c5
|
@ -89,6 +89,11 @@ void client_test(void* args)
|
|||
SSL_CTX_set_default_passwd_cb(ctx, PasswordCallBack);
|
||||
#endif
|
||||
|
||||
#ifdef CYASSL_SNIFFER
|
||||
/* don't use EDH, can't sniff tmp keys */
|
||||
SSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
||||
#endif
|
||||
|
||||
#ifndef NO_FILESYSTEM
|
||||
if (SSL_CTX_load_verify_locations(ctx, caCert, 0) != SSL_SUCCESS)
|
||||
err_sys("can't load ca file");
|
||||
|
|
|
@ -63,6 +63,11 @@ void echoclient_test(void* args)
|
|||
load_buffer(ctx, caCert, CYASSL_CA);
|
||||
#endif
|
||||
|
||||
#ifdef CYASSL_SNIFFER
|
||||
/* don't use EDH, can't sniff tmp keys */
|
||||
SSL_CTX_set_cipher_list(ctx, "AES256-SHA");
|
||||
#endif
|
||||
|
||||
#ifdef OPENSSL_EXTRA
|
||||
SSL_CTX_set_default_passwd_cb(ctx, PasswordCallBack);
|
||||
#endif
|
||||
|
|
|
@ -127,7 +127,7 @@ THREAD_RETURN CYASSL_THREAD echoserver_test(void* args)
|
|||
CloseSocket(clientfd);
|
||||
continue;
|
||||
}
|
||||
#ifdef ECHO_OUT
|
||||
#if defined(PEER_INFO)
|
||||
showPeer(ssl);
|
||||
#endif
|
||||
|
||||
|
|
|
@ -56,7 +56,7 @@ THREAD_RETURN CYASSL_THREAD server_test(void* args)
|
|||
#if defined(CYASSL_DTLS)
|
||||
method = DTLSv1_server_method();
|
||||
#elif !defined(NO_TLS)
|
||||
method = TLSv1_server_method();
|
||||
method = SSLv23_server_method();
|
||||
#else
|
||||
method = SSLv3_server_method();
|
||||
#endif
|
||||
|
|
Loading…
Reference in New Issue