Disable all PSK if no callback.
Reviewed-by: Matt Caswell <matt@openssl.org>
This commit is contained in:
parent
332a251fd7
commit
fe5eef3a3b
@ -3933,7 +3933,7 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
|
|||||||
|
|
||||||
#ifndef OPENSSL_NO_PSK
|
#ifndef OPENSSL_NO_PSK
|
||||||
/* with PSK there must be server callback set */
|
/* with PSK there must be server callback set */
|
||||||
if ((alg_k & SSL_kPSK) && s->psk_server_callback == NULL)
|
if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL)
|
||||||
continue;
|
continue;
|
||||||
#endif /* OPENSSL_NO_PSK */
|
#endif /* OPENSSL_NO_PSK */
|
||||||
|
|
||||||
|
@ -1111,7 +1111,7 @@ void ssl_set_client_disabled(SSL *s)
|
|||||||
/* with PSK there must be client callback set */
|
/* with PSK there must be client callback set */
|
||||||
if (!s->psk_client_callback) {
|
if (!s->psk_client_callback) {
|
||||||
s->s3->tmp.mask_a |= SSL_aPSK;
|
s->s3->tmp.mask_a |= SSL_aPSK;
|
||||||
s->s3->tmp.mask_k |= SSL_kPSK;
|
s->s3->tmp.mask_k |= SSL_PSK;
|
||||||
}
|
}
|
||||||
#endif /* OPENSSL_NO_PSK */
|
#endif /* OPENSSL_NO_PSK */
|
||||||
#ifndef OPENSSL_NO_SRP
|
#ifndef OPENSSL_NO_SRP
|
||||||
|
Loading…
x
Reference in New Issue
Block a user