diff options
author | jsing <> | 2019-02-28 17:56:43 +0000 |
---|---|---|
committer | jsing <> | 2019-02-28 17:56:43 +0000 |
commit | c033d8dd5f1b51daaea294f6d345521ac6566588 (patch) | |
tree | 5afffe228b3a0a9a1724ae29407d33698377ad48 /src/lib/libc/string/strmode.c | |
parent | fff434b2b23e8a074d741e819b9a91ddac0d4c9c (diff) | |
download | openbsd-c033d8dd5f1b51daaea294f6d345521ac6566588.tar.gz openbsd-c033d8dd5f1b51daaea294f6d345521ac6566588.tar.bz2 openbsd-c033d8dd5f1b51daaea294f6d345521ac6566588.zip |
Automatically complete the handshake from tls13_legacy_{read,write}_bytes()
If the TLS handshake has not been completed, automatically complete the
handshake as part of the read/write call, implementing the current
SSL_read()/SSL_write() behaviour.
Once the TLS handshake is completed we push a WANT_POLLIN or WANT_POLLOUT
back up to the caller, since some applications appear to incorrectly call
SSL_read() or SSL_write(), rather than repeating the previous call. This
can lead to attempts to read data that does not exist, since the
WANT_POLLIN was actually triggered as part of the handshake.
ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libc/string/strmode.c')
0 files changed, 0 insertions, 0 deletions