Temporarily ignore NewSessionTickets for TLS1.3

We can't handle these messages yet, so ignore them for now.

Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/2157)
This commit is contained in:
Matt Caswell 2016-12-29 15:08:47 +00:00
parent 6612d87b89
commit 4954fd13b3

View File

@ -1374,6 +1374,16 @@ int ssl3_read_bytes(SSL *s, int type, int *recvd_type, unsigned char *buf,
}
}
/*
* TODO(TLS1.3): Temporarily we will just ignore NewSessionTicket messages.
* Later we will want to process them.
*/
if (!s->server && SSL_IS_TLS13(s) && s->rlayer.handshake_fragment_len >= 4
&& s->rlayer.handshake_fragment[0] == SSL3_MT_NEWSESSION_TICKET) {
SSL3_RECORD_set_read(rr);
goto start;
}
/*-
* s->rlayer.handshake_fragment_len == 4 iff rr->type == SSL3_RT_HANDSHAKE;
* s->rlayer.alert_fragment_len == 2 iff rr->type == SSL3_RT_ALERT.