kike: set the OpenSSL's session ID context

Fixes handshake failure on session reuse attempts.
This commit is contained in:
Přemysl Eric Janouch 2014-08-05 21:15:24 +02:00
parent 08b93c3a71
commit 9b2b3844e2

View File

@ -2269,6 +2269,11 @@ irc_initialize_ssl (struct server_context *ctx, struct error **e)
SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, irc_ssl_verify_callback);
// XXX: maybe we should call SSL_CTX_set_options() for some workarounds
const unsigned char session_id_context[SSL_MAX_SSL_SESSION_ID_LENGTH]
= PROGRAM_NAME;
(void) SSL_CTX_set_session_id_context (ctx->ssl_ctx,
session_id_context, sizeof session_id_context);
// XXX: perhaps we should read the files ourselves for better messages
if (!SSL_CTX_use_certificate_chain_file (ctx->ssl_ctx, cert_path))
{