@ -740,8 +740,8 @@ void tlsext_cb(SSL *s, int client_server, int type,
}
# ifndef OPENSSL_NO_SOCK
int generate_ cookie_callback( SSL * ssl , unsigned char * cookie ,
unsigned in t * cookie_len )
int generate_ stateless_ cookie_callback( SSL * ssl , unsigned char * cookie ,
size_ t * cookie_len )
{
unsigned char * buffer = NULL ;
size_t length = 0 ;
@ -800,16 +800,16 @@ end:
return res ;
}
int verify_ cookie_callback( SSL * ssl , const unsigned char * cookie ,
unsigned in t cookie_len )
int verify_ stateless_ cookie_callback( SSL * ssl , const unsigned char * cookie ,
size_ t cookie_len )
{
unsigned char result [ EVP_MAX_MD_SIZE ] ;
unsigned in t resultlength ;
size_ t resultlength ;
/* Note: we check cookie_initialized because if it's not,
* it cannot be valid */
if ( cookie_initialized
& & generate_ cookie_callback( ssl , result , & resultlength )
& & generate_ stateless_ cookie_callback( ssl , result , & resultlength )
& & cookie_len = = resultlength
& & memcmp ( result , cookie , resultlength ) = = 0 )
return 1 ;
@ -817,20 +817,20 @@ int verify_cookie_callback(SSL *ssl, const unsigned char *cookie,
return 0 ;
}
int generate_ stateless_ cookie_callback( SSL * ssl , unsigned char * cookie ,
size_ t * cookie_len )
int generate_ cookie_callback( SSL * ssl , unsigned char * cookie ,
unsigned in t * cookie_len )
{
unsigned int temp = 0 ;
size_t temp = 0 ;
int res = generate_stateless_cookie_callback ( ssl , cookie , & temp ) ;
int res = generate_cookie_callback ( ssl , cookie , & temp ) ;
* cookie_len = temp ;
* cookie_len = ( unsigned int ) temp ;
return res ;
}
int verify_ stateless_ cookie_callback( SSL * ssl , const unsigned char * cookie ,
size_ t cookie_len )
int verify_ cookie_callback( SSL * ssl , const unsigned char * cookie ,
unsigned in t cookie_len )
{
return verify_ cookie_callback( ssl , cookie , cookie_len ) ;
return verify_ stateless_ cookie_callback( ssl , cookie , cookie_len ) ;
}
# endif