Vai al file
2013-10-09 00:21:47 +02:00
etc Add certs 2013-09-09 22:14:05 +02:00
client.cpp Adds description 2013-09-18 14:11:46 +02:00
client.h Init sources. Doesn't work yet 2013-09-09 15:11:51 +02:00
defs.h Show bug a bit better 2013-09-18 13:54:07 +02:00
Makefile Added exit() whenever WANT_SOMETHING 2013-09-16 23:51:05 +02:00
README.md A bit more of description 2013-10-09 00:21:47 +02:00
server.cpp Show bug a bit better 2013-09-18 13:54:07 +02:00
server.h Init sources. Doesn't work yet 2013-09-09 15:11:51 +02:00
ssl_process.cpp Init sources. Doesn't work yet 2013-09-09 15:11:51 +02:00
ssl_process.h Init sources. Doesn't work yet 2013-09-09 15:11:51 +02:00

buggy_openssl_with_fullduplex

Toy code which shows problems with non-blocking, fullduplex I/O & renegotiation in OpenSSL

What is it: This code shows that it is not possible to use SSL_write() and SSL_read() functions in the same way as ::send() and ::recv(). The main difference between SSL_write/read functions and send/recv system calls is that SSL_write function may in fact read data from the socket in some situations (similary SSL_read may need to write data to the socket).

How it works:

Client & Server:
- it has two threads - sender & receiver
- writes and reads are mutexed

Client:
- I/O is blocking (but can be non-blocking)

Server:
- I/O is non-blocking
- each thread runs it's own select()

1. After client & server are connected (and SSL handshake done) client sender
thread starts sending first message (in a loop).

2. When server receives first query it starts sending string EXCHANGE_STRING for
SEND_ITERATIONS number of times. So now we have 4 threads that are sending
and receiving traffic at the same time ( 2 send/receive threads on each
server and client side )

3. When client receives RENEG_INIT_LEN number of characters it starts
renegotiation ( if other one is not pending ). Bug starts to occure here

BUG:
Client side: client starts to report SSL_ERROR_SYSCALL
Server side: server reports SSL_ERROR_WANT_READ when receive function is called

TCP:
In TCP exchange we can see that transfer between client & server is OK until
client sends "Client Hello" packet. This packet is sent when SSL_renegotiate
is called