diff options
author | Erlang/OTP <[email protected]> | 2018-05-02 15:53:28 +0200 |
---|---|---|
committer | Erlang/OTP <[email protected]> | 2018-05-02 15:53:28 +0200 |
commit | 83455cc2a96d0ffd73a417846fa06882ad6b39d4 (patch) | |
tree | 0ca49231c595fa2894af1474be210949c8c18f58 /lib/ssl/src/ssl_connection.erl | |
parent | 6faad4dd9c202931469bc25cea5a0e47aa0000dc (diff) | |
parent | 8c8d71980e1f94a3987e4e72e93b3e8a84c49f6a (diff) | |
download | otp-83455cc2a96d0ffd73a417846fa06882ad6b39d4.tar.gz otp-83455cc2a96d0ffd73a417846fa06882ad6b39d4.tar.bz2 otp-83455cc2a96d0ffd73a417846fa06882ad6b39d4.zip |
Merge branch 'ingela/ssl/client-has-no-cert/ERL-599/OTP-15050' into maint-20
* ingela/ssl/client-has-no-cert/ERL-599/OTP-15050:
ssl: Prepare for release
ssl: Proper handling of clients that choose to send an empty answer to a certificate request
Diffstat (limited to 'lib/ssl/src/ssl_connection.erl')
-rw-r--r-- | lib/ssl/src/ssl_connection.erl | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/lib/ssl/src/ssl_connection.erl b/lib/ssl/src/ssl_connection.erl index 63fae78195..64ecc29b97 100644 --- a/lib/ssl/src/ssl_connection.erl +++ b/lib/ssl/src/ssl_connection.erl @@ -709,6 +709,22 @@ certify(internal, #server_key_exchange{exchange_keys = Keys}, Version, ?FUNCTION_NAME, State) end end; +certify(internal, #certificate_request{}, + #state{role = client, negotiated_version = Version, + key_algorithm = Alg} = State, _) + when Alg == dh_anon; Alg == ecdh_anon; + Alg == psk; Alg == dhe_psk; Alg == ecdhe_psk; Alg == rsa_psk; + Alg == srp_dss; Alg == srp_rsa; Alg == srp_anon -> + handle_own_alert(?ALERT_REC(?FATAL, ?HANDSHAKE_FAILURE), + Version, ?FUNCTION_NAME, State); +certify(internal, #certificate_request{}, + #state{session = #session{own_certificate = undefined}, + role = client} = State0, Connection) -> + %% The client does not have a certificate and will send an empty reply, the server may fail + %% or accept the connection by its own preference. No signature algorihms needed as there is + %% no certificate to verify. + {Record, State} = Connection:next_record(State0), + Connection:next_event(?FUNCTION_NAME, Record, State#state{client_certificate_requested = true}); certify(internal, #certificate_request{} = CertRequest, #state{session = #session{own_certificate = Cert}, role = client, |