diff options
| author | jsing <> | 2020-05-29 17:47:30 +0000 |
|---|---|---|
| committer | jsing <> | 2020-05-29 17:47:30 +0000 |
| commit | e0e84f310956950abc8c5d9f225578b3f6945ee9 (patch) | |
| tree | 87f4d432f87e6b391e38fa5c2e73bbef1e8dd87d /src/lib/libssl/tls13_legacy.c | |
| parent | 0fa647cafcb45ea07c768d172165a3a041e8c58f (diff) | |
| download | openbsd-e0e84f310956950abc8c5d9f225578b3f6945ee9.tar.gz openbsd-e0e84f310956950abc8c5d9f225578b3f6945ee9.tar.bz2 openbsd-e0e84f310956950abc8c5d9f225578b3f6945ee9.zip | |
Wire up the servername callback in the TLSv1.3 server.
This makes SNI work correctly with TLSv1.3.
Found the hard way by danj@, gonzalo@ and others.
ok beck@ inoguchi@ tb@
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/tls13_legacy.c | 28 |
1 files changed, 27 insertions, 1 deletions
diff --git a/src/lib/libssl/tls13_legacy.c b/src/lib/libssl/tls13_legacy.c index be89e9aa24..4d68287141 100644 --- a/src/lib/libssl/tls13_legacy.c +++ b/src/lib/libssl/tls13_legacy.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls13_legacy.c,v 1.7 2020/05/16 14:42:35 jsing Exp $ */ | 1 | /* $OpenBSD: tls13_legacy.c,v 1.8 2020/05/29 17:47:30 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -519,3 +519,29 @@ tls13_legacy_shutdown(SSL *ssl) | |||
| 519 | 519 | ||
| 520 | return 0; | 520 | return 0; |
| 521 | } | 521 | } |
| 522 | |||
| 523 | int | ||
| 524 | tls13_legacy_servername_process(struct tls13_ctx *ctx, uint8_t *alert) | ||
| 525 | { | ||
| 526 | int legacy_alert = SSL_AD_UNRECOGNIZED_NAME; | ||
| 527 | int ret = SSL_TLSEXT_ERR_NOACK; | ||
| 528 | SSL_CTX *ssl_ctx = ctx->ssl->ctx; | ||
| 529 | SSL *ssl = ctx->ssl; | ||
| 530 | |||
| 531 | if (ssl_ctx->internal->tlsext_servername_callback == NULL) | ||
| 532 | ssl_ctx = ssl->initial_ctx; | ||
| 533 | if (ssl_ctx->internal->tlsext_servername_callback == NULL) | ||
| 534 | return 1; | ||
| 535 | |||
| 536 | ret = ssl_ctx->internal->tlsext_servername_callback(ssl, &legacy_alert, | ||
| 537 | ssl_ctx->internal->tlsext_servername_arg); | ||
| 538 | |||
| 539 | if (ret == SSL_TLSEXT_ERR_ALERT_FATAL || | ||
| 540 | ret == SSL_TLSEXT_ERR_ALERT_WARNING) { | ||
| 541 | if (legacy_alert >= 0 && legacy_alert <= 255) | ||
| 542 | *alert = legacy_alert; | ||
| 543 | return 0; | ||
| 544 | } | ||
| 545 | |||
| 546 | return 1; | ||
| 547 | } | ||
