summaryrefslogtreecommitdiff
path: root/src/lib/libssl/tls13_lib.c
diff options
context:
space:
mode:
authorjsing <>2019-02-28 17:56:43 +0000
committerjsing <>2019-02-28 17:56:43 +0000
commitc033d8dd5f1b51daaea294f6d345521ac6566588 (patch)
tree5afffe228b3a0a9a1724ae29407d33698377ad48 /src/lib/libssl/tls13_lib.c
parentfff434b2b23e8a074d741e819b9a91ddac0d4c9c (diff)
downloadopenbsd-c033d8dd5f1b51daaea294f6d345521ac6566588.tar.gz
openbsd-c033d8dd5f1b51daaea294f6d345521ac6566588.tar.bz2
openbsd-c033d8dd5f1b51daaea294f6d345521ac6566588.zip
Automatically complete the handshake from tls13_legacy_{read,write}_bytes()
If the TLS handshake has not been completed, automatically complete the handshake as part of the read/write call, implementing the current SSL_read()/SSL_write() behaviour. Once the TLS handshake is completed we push a WANT_POLLIN or WANT_POLLOUT back up to the caller, since some applications appear to incorrectly call SSL_read() or SSL_write(), rather than repeating the previous call. This can lead to attempts to read data that does not exist, since the WANT_POLLIN was actually triggered as part of the handshake. ok inoguchi@ tb@
Diffstat (limited to 'src/lib/libssl/tls13_lib.c')
-rw-r--r--src/lib/libssl/tls13_lib.c14
1 files changed, 13 insertions, 1 deletions
diff --git a/src/lib/libssl/tls13_lib.c b/src/lib/libssl/tls13_lib.c
index e371d71750..c5e2faf3fc 100644
--- a/src/lib/libssl/tls13_lib.c
+++ b/src/lib/libssl/tls13_lib.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: tls13_lib.c,v 1.7 2019/02/28 17:44:56 jsing Exp $ */ 1/* $OpenBSD: tls13_lib.c,v 1.8 2019/02/28 17:56:43 jsing Exp $ */
2/* 2/*
3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org> 3 * Copyright (c) 2018, 2019 Joel Sing <jsing@openbsd.org>
4 * 4 *
@@ -241,6 +241,12 @@ tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len, int pee
241 struct tls13_ctx *ctx = ssl->internal->tls13; 241 struct tls13_ctx *ctx = ssl->internal->tls13;
242 ssize_t ret; 242 ssize_t ret;
243 243
244 if (ctx == NULL || !ctx->handshake_completed) {
245 if ((ret = ssl->internal->handshake_func(ssl)) <= 0)
246 return ret;
247 return tls13_legacy_return_code(ssl, TLS13_IO_WANT_POLLIN);
248 }
249
244 if (peek) { 250 if (peek) {
245 /* XXX - support peek... */ 251 /* XXX - support peek... */
246 SSLerror(ssl, ERR_R_INTERNAL_ERROR); 252 SSLerror(ssl, ERR_R_INTERNAL_ERROR);
@@ -266,6 +272,12 @@ tls13_legacy_write_bytes(SSL *ssl, int type, const void *buf, int len)
266 struct tls13_ctx *ctx = ssl->internal->tls13; 272 struct tls13_ctx *ctx = ssl->internal->tls13;
267 ssize_t ret; 273 ssize_t ret;
268 274
275 if (ctx == NULL || !ctx->handshake_completed) {
276 if ((ret = ssl->internal->handshake_func(ssl)) <= 0)
277 return ret;
278 return tls13_legacy_return_code(ssl, TLS13_IO_WANT_POLLOUT);
279 }
280
269 if (type != SSL3_RT_APPLICATION_DATA) { 281 if (type != SSL3_RT_APPLICATION_DATA) {
270 SSLerror(ssl, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED); 282 SSLerror(ssl, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
271 return -1; 283 return -1;