Add ctrls to set and get RFC4507bis keys to enable several contexts to
reuse the same tickets.
This commit is contained in:
25
ssl/s3_lib.c
25
ssl/s3_lib.c
@@ -2536,6 +2536,31 @@ long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
|
||||
case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:
|
||||
ctx->tlsext_servername_arg=parg;
|
||||
break;
|
||||
case SSL_CTRL_SET_TLSEXT_TICKET_KEYS:
|
||||
case SSL_CTRL_GET_TLSEXT_TICKET_KEYS:
|
||||
{
|
||||
unsigned char *keys = parg;
|
||||
if (!keys)
|
||||
return 48;
|
||||
if (larg != 48)
|
||||
{
|
||||
SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_INVALID_TICKET_KEYS_LENGTH);
|
||||
return 0;
|
||||
}
|
||||
if (cmd == SSL_CTRL_SET_TLSEXT_TICKET_KEYS)
|
||||
{
|
||||
memcpy(ctx->tlsext_tick_key_name, keys, 16);
|
||||
memcpy(ctx->tlsext_tick_hmac_key, keys + 16, 16);
|
||||
memcpy(ctx->tlsext_tick_aes_key, keys + 32, 16);
|
||||
}
|
||||
else
|
||||
{
|
||||
memcpy(keys, ctx->tlsext_tick_key_name, 16);
|
||||
memcpy(keys + 16, ctx->tlsext_tick_hmac_key, 16);
|
||||
memcpy(keys + 32, ctx->tlsext_tick_aes_key, 16);
|
||||
}
|
||||
return 1;
|
||||
}
|
||||
#endif /* !OPENSSL_NO_TLSEXT */
|
||||
/* A Thawte special :-) */
|
||||
case SSL_CTRL_EXTRA_CHAIN_CERT:
|
||||
|
Reference in New Issue
Block a user