kike: set the OpenSSL's session ID context
Fixes handshake failure on session reuse attempts.
This commit is contained in:
parent
08b93c3a71
commit
9b2b3844e2
@ -2269,6 +2269,11 @@ irc_initialize_ssl (struct server_context *ctx, struct error **e)
|
|||||||
SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, irc_ssl_verify_callback);
|
SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, irc_ssl_verify_callback);
|
||||||
// XXX: maybe we should call SSL_CTX_set_options() for some workarounds
|
// XXX: maybe we should call SSL_CTX_set_options() for some workarounds
|
||||||
|
|
||||||
|
const unsigned char session_id_context[SSL_MAX_SSL_SESSION_ID_LENGTH]
|
||||||
|
= PROGRAM_NAME;
|
||||||
|
(void) SSL_CTX_set_session_id_context (ctx->ssl_ctx,
|
||||||
|
session_id_context, sizeof session_id_context);
|
||||||
|
|
||||||
// XXX: perhaps we should read the files ourselves for better messages
|
// XXX: perhaps we should read the files ourselves for better messages
|
||||||
if (!SSL_CTX_use_certificate_chain_file (ctx->ssl_ctx, cert_path))
|
if (!SSL_CTX_use_certificate_chain_file (ctx->ssl_ctx, cert_path))
|
||||||
{
|
{
|
||||||
|
Loading…
Reference in New Issue
Block a user