Ignore an s_client psk in TLSv1.3 if not TLSv1.3 suitable
authorMatt Caswell <matt@openssl.org>
Tue, 30 Jan 2018 15:41:56 +0000 (15:41 +0000)
committerMatt Caswell <matt@openssl.org>
Wed, 14 Feb 2018 15:42:36 +0000 (15:42 +0000)
The s_client psk_use_session_cb callback has a comment stating that we
should ignore a key that isn't suitable for TLSv1.3. However we were
actually causing the connection to fail. Changing the return value fixes
the issue.

Also related to this is that the early_data extension was not marked as
TLSv1.3 only which it should be.

Fixes #5202

Reviewed-by: Ben Kaduk <kaduk@mit.edu>
(Merged from https://github.com/openssl/openssl/pull/5205)

apps/s_client.c
ssl/statem/extensions.c

index ca2bd0d9b4e25f2571786c1477c28baa4bd32998..eca0a4ac57e85e3899c199e985229c0b470f2ceb 100644 (file)
@@ -208,7 +208,7 @@ static int psk_use_session_cb(SSL *s, const EVP_MD *md,
             *id = NULL;
             *idlen = 0;
             *sess = NULL;
-            return 0;
+            return 1;
         }
         usesess = SSL_SESSION_new();
         if (usesess == NULL
index daf43c6276a05ab811dc5f52f4f992dc27ad7a2d..7d456f353ab976e4a6977a04253cc88b4e7b9f2b 100644 (file)
@@ -358,7 +358,7 @@ static const EXTENSION_DEFINITION ext_defs[] = {
     {
         TLSEXT_TYPE_early_data,
         SSL_EXT_CLIENT_HELLO | SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS
-        | SSL_EXT_TLS1_3_NEW_SESSION_TICKET,
+        | SSL_EXT_TLS1_3_NEW_SESSION_TICKET | SSL_EXT_TLS1_3_ONLY,
         NULL, tls_parse_ctos_early_data, tls_parse_stoc_early_data,
         tls_construct_stoc_early_data, tls_construct_ctos_early_data,
         final_early_data