kike: set the OpenSSL's session ID context
Fixes handshake failure on session reuse attempts.
This commit is contained in:
		
							parent
							
								
									08b93c3a71
								
							
						
					
					
						commit
						9b2b3844e2
					
				| @ -2269,6 +2269,11 @@ irc_initialize_ssl (struct server_context *ctx, struct error **e) | |||||||
| 		SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, irc_ssl_verify_callback); | 		SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, irc_ssl_verify_callback); | ||||||
| 	// XXX: maybe we should call SSL_CTX_set_options() for some workarounds
 | 	// XXX: maybe we should call SSL_CTX_set_options() for some workarounds
 | ||||||
| 
 | 
 | ||||||
|  | 	const unsigned char session_id_context[SSL_MAX_SSL_SESSION_ID_LENGTH] | ||||||
|  | 		= PROGRAM_NAME; | ||||||
|  | 	(void) SSL_CTX_set_session_id_context (ctx->ssl_ctx, | ||||||
|  | 		session_id_context, sizeof session_id_context); | ||||||
|  | 
 | ||||||
| 	// XXX: perhaps we should read the files ourselves for better messages
 | 	// XXX: perhaps we should read the files ourselves for better messages
 | ||||||
| 	if (!SSL_CTX_use_certificate_chain_file (ctx->ssl_ctx, cert_path)) | 	if (!SSL_CTX_use_certificate_chain_file (ctx->ssl_ctx, cert_path)) | ||||||
| 	{ | 	{ | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user