diff options
author | Jérémy Rocher <rocher.jeremy@gmail.com> | 2018-11-09 14:05:26 +0100 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2018-11-09 22:32:47 +0100 |
commit | 27cb384679154b050f1008c0382e8345b7abbc41 (patch) | |
tree | 062971458545dcdc31d9bc7a4d847eed738a870a | |
parent | a1aabed817c2d4e2226382eca5f211a8a2364277 (diff) |
openssl: support BoringSSL TLS renegotiation
As per BoringSSL porting documentation [1], BoringSSL rejects peer
renegotiations by default.
curl fails when trying to authenticate to server through client
certificate if it is requested by server after the initial TLS
handshake.
Enable renegotiation by default with BoringSSL to get same behavior as
with OpenSSL. This is done by calling SSL_set_renegotiate_mode [2]
which was introduced in commit 1d5ef3bb1eb9 [3].
1 - https://boringssl.googlesource.com/boringssl/+/HEAD/PORTING.md#tls-renegotiation
2 - https://boringssl.googlesource.com/boringssl/+/master/include/openssl/ssl.h#3482
3 - https://boringssl.googlesource.com/boringssl/+/1d5ef3bb1eb97848617db5e7d633d735a401df86
Signed-off-by: Jérémy Rocher <rocher.jeremy@gmail.com>
Fixes #3258
Closes #3259
-rw-r--r-- | lib/vtls/openssl.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c index 4c5e8c19c..7c30ab373 100644 --- a/lib/vtls/openssl.c +++ b/lib/vtls/openssl.c @@ -2610,6 +2610,10 @@ static CURLcode ossl_connect_step1(struct connectdata *conn, int sockindex) SSL_set_tlsext_status_type(BACKEND->handle, TLSEXT_STATUSTYPE_ocsp); #endif +#ifdef OPENSSL_IS_BORINGSSL + SSL_set_renegotiate_mode(BACKEND->handle, ssl_renegotiate_freely); +#endif + SSL_set_connect_state(BACKEND->handle); BACKEND->server_cert = 0x0; |