OpenSSL: Handshake completion and resumption state into debug log
This new debug log entry makes it more convenient to check how TLS handshake was completed. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
a7803b0caf
commit
a89beee589
1 changed files with 8 additions and 2 deletions
|
@ -3082,8 +3082,14 @@ openssl_connection_handshake(struct tls_connection *conn,
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (SSL_is_init_finished(conn->ssl) && appl_data && in_data)
|
if (SSL_is_init_finished(conn->ssl)) {
|
||||||
*appl_data = openssl_get_appl_data(conn, wpabuf_len(in_data));
|
wpa_printf(MSG_DEBUG,
|
||||||
|
"OpenSSL: Handshake finished - resumed=%d",
|
||||||
|
tls_connection_resumed(conn->ssl_ctx, conn));
|
||||||
|
if (appl_data && in_data)
|
||||||
|
*appl_data = openssl_get_appl_data(conn,
|
||||||
|
wpabuf_len(in_data));
|
||||||
|
}
|
||||||
|
|
||||||
if (conn->invalid_hb_used) {
|
if (conn->invalid_hb_used) {
|
||||||
wpa_printf(MSG_INFO, "TLS: Heartbeat attack detected - do not send response");
|
wpa_printf(MSG_INFO, "TLS: Heartbeat attack detected - do not send response");
|
||||||
|
|
Loading…
Reference in a new issue