Fix no-psk
authorMatt Caswell <matt@openssl.org>
Mon, 24 Sep 2018 11:00:10 +0000 (12:00 +0100)
committerMatt Caswell <matt@openssl.org>
Tue, 25 Sep 2018 15:01:22 +0000 (16:01 +0100)
Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/7306)

ssl/ssl_locl.h

index 440a5d6c19d8f2473d23026295517af5ff3f2d29..c22c1f9ee8f69a2f6507c0afd6d2e8ebc63ba404 100644 (file)
@@ -471,7 +471,11 @@ struct ssl_method_st {
     long (*ssl_ctx_callback_ctrl) (SSL_CTX *s, int cb_id, void (*fp) (void));
 };
 
-# define TLS13_MAX_RESUMPTION_PSK_LENGTH      PSK_MAX_PSK_LEN
+/*
+ * Matches the length of PSK_MAX_PSK_LEN. We keep it the same value for
+ * consistency, even in the event of OPENSSL_NO_PSK being defined.
+ */
+# define TLS13_MAX_RESUMPTION_PSK_LENGTH      256
 
 /*-
  * Lets make this into an ASN.1 type structure as follows