kike: set the OpenSSL's session ID context
Fixes handshake failure on session reuse attempts.
This commit is contained in:
parent
08b93c3a71
commit
9b2b3844e2
|
@ -2269,6 +2269,11 @@ irc_initialize_ssl (struct server_context *ctx, struct error **e)
|
|||
SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, irc_ssl_verify_callback);
|
||||
// XXX: maybe we should call SSL_CTX_set_options() for some workarounds
|
||||
|
||||
const unsigned char session_id_context[SSL_MAX_SSL_SESSION_ID_LENGTH]
|
||||
= PROGRAM_NAME;
|
||||
(void) SSL_CTX_set_session_id_context (ctx->ssl_ctx,
|
||||
session_id_context, sizeof session_id_context);
|
||||
|
||||
// XXX: perhaps we should read the files ourselves for better messages
|
||||
if (!SSL_CTX_use_certificate_chain_file (ctx->ssl_ctx, cert_path))
|
||||
{
|
||||
|
|
Loading…
Reference in New Issue