@@ -9,7 +9,7 @@ DBG ?= 0 | |||||
ifeq ($(DBG),1) | ifeq ($(DBG),1) | ||||
DEBUG = -DDEBUG -g -O0 | DEBUG = -DDEBUG -g -O0 | ||||
else | else | ||||
DEBUG = -O3 | |||||
DEBUG = -O3 -g | |||||
endif | endif | ||||
CFLAGS = -std=c99 | CFLAGS = -std=c99 | ||||
@@ -30,6 +30,7 @@ SSL_CTX *setup_client_ctx(const char* curves) | |||||
ERR("Enforcing protocol to TLSv1.2"); | ERR("Enforcing protocol to TLSv1.2"); | ||||
} | } | ||||
SSL_CTX_enable_pq_experiment_signal(ctx); | |||||
return ctx; | return ctx; | ||||
} | } | ||||
@@ -76,6 +77,7 @@ void test_Handshake(const char* IP, const char* curves, size_t handshake_nb) { | |||||
if (err<=0) { | if (err<=0) { | ||||
ERR("Error connecting SSL err=%d", err); | ERR("Error connecting SSL err=%d", err); | ||||
} | } | ||||
//printf("Signal seen: %X\n", SSL_pq_experiment_signal_seen(ssl)); | |||||
assert(!SSL_session_reused(ssl)); | assert(!SSL_session_reused(ssl)); | ||||
assert(SSL_shutdown(ssl) == 0); | assert(SSL_shutdown(ssl) == 0); | ||||
assert(SSL_shutdown(ssl) == 1); | assert(SSL_shutdown(ssl) == 1); | ||||
@@ -201,6 +201,7 @@ int main(int argc, char *argv[]) | |||||
init(); | init(); | ||||
ctx = setup_server_ctx(argv[1]); | ctx = setup_server_ctx(argv[1]); | ||||
SSL_CTX_enable_pq_experiment_signal(ctx); | |||||
fd = accept_once(); | fd = accept_once(); | ||||
for(;;) { | for(;;) { | ||||
@@ -210,7 +211,6 @@ int main(int argc, char *argv[]) | |||||
DBG("Error creating SSL context"); | DBG("Error creating SSL context"); | ||||
} | } | ||||
SSL_set_fd(ssl, fd); | SSL_set_fd(ssl, fd); | ||||
ret = SSL_accept(ssl); | ret = SSL_accept(ssl); | ||||
if (ret<=0) { | if (ret<=0) { | ||||