Re: SSL_peek() removes the session ticket from the underlying BIO ??

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thank you for the quick reply, Matt !! 

Is my understanding correct that if the buffer is empty and SSL_peek() is invoked while trying to process more records, only application data gets placed into that buffer?

--Rahul 


On Thu, May 2, 2024 at 12:33 PM Matt Caswell <matt@xxxxxxxxxxx> wrote:


On 02/05/2024 06:19, Rahul Shukla wrote:
> Hi All,
> As per the OpenSSL doc :
> /
> /
> /"SSL_peek_ex() and SSL_peek() are identical to SSL_read_ex() and
> SSL_read() respectively except no bytes are actually removed from the
> underlying BIO during the read, so that a subsequent call to
> SSL_read_ex() or SSL_read() will yield at least the same bytes."/
>
> *I have a quick question here, Does SSL_peek() remove the session ticket
> (Non application data) from the underlying BIO or will it remain there
> just like application data until unless SSL_read() is called to read the
> session ticket. *


It depends.

OpenSSL has an internal buffer of application data that has already been
processed and is available for immediate read. If that buffer has data
in it then a call to SSL_peek() (or in fact SSL_read()) will return that
data and will not attempt to process any further incoming records.

If the buffer is empty then it will attempt to process further records
in order to put more data into that buffer. In doing that if it
encounters any non-application data records (such as a session ticket)
then it will process those records in the same way as SSL_read() would
have done.

Matt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux