Open
Bug 273861
Opened 20 years ago
Updated 2 years ago
SSL_ForceHandshake a bit too forceful?
Categories
(NSS :: Libraries, defect, P2)
Tracking
(Not tracked)
NEW
People
(Reporter: nelson, Unassigned)
References
Details
After a first SSL3/TLS handshake has completed on an SSL socket, When you call SSL_ForceHandshake to drive a SECOND handshake through to completion, it calls ssl3_GatherCompleteHandshake() without first checking to see if there is already previously-received and decrypted SSL appliation data still sitting there in the "gather state" buffer, still unconsumed by the application. Consequently, any previously unconsumed appliation data sitting in that buffer is immediately lost. This function has always behaved this way. In the past, we've told users to use SSL_DataPending to see if there is unconsumed buffered received data, and if so, to read it all out before calling SSL_ForceHandshake (again). But I'm wondering (which is why I filed this bug as UNCONFIRMED) if the definition of SSL_ForceHandshake could be changed so that it checks for unconsumed read data and return immediately if such is found, and if such a change would break any existing users of SSL_ForceHandshake. I've been trying to think why (or HOW) a program would be dependent on this data-discarding behavior of SSL_ForceHandshake, and it's not obvious. Any thoughts?
| Reporter | ||
Updated•20 years ago
|
QA Contact: bishakhabanerjee → jason.m.reid
| Reporter | ||
Updated•19 years ago
|
QA Contact: jason.m.reid → libraries
| Reporter | ||
Comment 1•18 years ago
|
||
I think - this really is a bug - it can be fixed without breaking any existing code that CORRECTLY uses SSL_ForceHandshake - I should fix it for 3.12 (if not sooner)
Status: UNCONFIRMED → NEW
Ever confirmed: true
Priority: -- → P2
Target Milestone: --- → 3.12
| Reporter | ||
Comment 2•16 years ago
|
||
Unsetting target milestone in unresolved bugs whose targets have passed.
Target Milestone: 3.12 → ---
| Reporter | ||
Updated•15 years ago
|
Assignee: nelson → nobody
Updated•2 years ago
|
Severity: normal → S3
You need to log in
before you can comment on or make changes to this bug.
Description
•