SSL_SESSION_set1_ticket ?
Viktor Dukhovni
openssl-users at dukhovni.org
Mon Apr 1 23:31:57 UTC 2019
> On Apr 1, 2019, at 10:01 AM, Jeremy Harris <jgh at wizmail.org> wrote:
>
> Thanks for the explanation. Next, serialise/deseralise
> of the session is failing. Test code:
>
> {
> SSL_SESSION * ss = SSL_get_session(ssl);
>
> uschar * sess_asn1;
> int len;
>
> len = i2d_SSL_SESSION(ss, &sess_asn1);
This is incorrect use of the api. You need to provide a NULL
buffer, obtain the length, then call again, after allocating
a buffer of the requisite size. Here's an example from the
DANE code in Postfix (likely similar code already in Exim):
len = i2d_X509(cert, NULL);
buf2 = buf = (unsigned char *) mymalloc(len);
i2d_X509(cert, &buf2);
Note that i2d updates its second argument to point to the end of
the buffer just written, which supports append operations, but
means you also need a pointer to the original buffer, hence
the "buf2 = buf = ...". The serialized data is sandwiched
between "buf" (start) and "buf2" (end).
--
--
Viktor.
More information about the openssl-users
mailing list