From f551307b25934acd84205155d6286b2d937e2479 Mon Sep 17 00:00:00 2001 From: tb <> Date: Mon, 31 Aug 2020 14:04:51 +0000 Subject: Send alert on ssl_get_prev_session failure ssl_get_prev_session() can fail for various reasons some of which may be internal_error others decode_error alerts. Propagate the appropriate alert up to the caller so we can abort the handshake by sending a fatal alert instead of rudely closing the pipe. Currently only 28 of 292 test cases of tlsfuzzer's test-extension.py pass. With this diff, 272 pass. The rest will require fixes elsewhere. ok beck inoguchi jsing --- src/lib/libssl/ssl_srvr.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'src/lib/libssl/ssl_srvr.c') diff --git a/src/lib/libssl/ssl_srvr.c b/src/lib/libssl/ssl_srvr.c index 67671f276c..745b15aad0 100644 --- a/src/lib/libssl/ssl_srvr.c +++ b/src/lib/libssl/ssl_srvr.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssl_srvr.c,v 1.80 2020/07/03 04:12:50 tb Exp $ */ +/* $OpenBSD: ssl_srvr.c,v 1.81 2020/08/31 14:04:51 tb Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -920,11 +920,11 @@ ssl3_get_client_hello(SSL *s) CBS_dup(&cbs, &ext_block); - i = ssl_get_prev_session(s, &session_id, &ext_block); + i = ssl_get_prev_session(s, &session_id, &ext_block, &al); if (i == 1) { /* previous session */ s->internal->hit = 1; } else if (i == -1) - goto err; + goto f_err; else { /* i == 0 */ if (!ssl_get_new_session(s, 1)) -- cgit v1.2.3-55-g6feb