]> git.ipfire.org Git - thirdparty/curl.git/commitdiff
wolfssl: failing to set a session id is not reason to error out
authorDaniel Stenberg <daniel@haxx.se>
Mon, 5 Jul 2021 15:55:24 +0000 (17:55 +0200)
committerDaniel Stenberg <daniel@haxx.se>
Wed, 7 Jul 2021 08:19:28 +0000 (10:19 +0200)
... as it is *probably* just timed out.

Reported-by: Francisco Munoz
Closes #7358

lib/vtls/wolfssl.c

index 8d217ec54e6ab74e42a27e26b666334e9c4520b8..d21c007c19be93535681537141fd4c057c5404d6 100644 (file)
@@ -494,15 +494,11 @@ wolfssl_connect_step1(struct Curl_easy *data, struct connectdata *conn,
                               &ssl_sessionid, NULL, sockindex)) {
       /* we got a session id, use it! */
       if(!SSL_set_session(backend->handle, ssl_sessionid)) {
-        char error_buffer[WOLFSSL_MAX_ERROR_SZ];
-        Curl_ssl_sessionid_unlock(data);
-        failf(data, "SSL: SSL_set_session failed: %s",
-              ERR_error_string(SSL_get_error(backend->handle, 0),
-                               error_buffer));
-        return CURLE_SSL_CONNECT_ERROR;
+        Curl_ssl_delsessionid(data, ssl_sessionid);
+        infof(data, "Can't use session ID, going on without\n");
       }
-      /* Informational message */
-      infof(data, "SSL re-using session ID\n");
+      else
+        infof(data, "SSL re-using session ID\n");
     }
     Curl_ssl_sessionid_unlock(data);
   }