Only allow SSL_set_session before the handshake.
Otherwise things break horribly. Explicitly abort to help catch bugs.
Change-Id: I66e2bf8808199b3331b3adde68d73758a601eb8c
Reviewed-on: https://boringssl-review.googlesource.com/10761
Reviewed-by: Adam Langley <agl@google.com>
Commit-Queue: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/tls13_client.c b/ssl/tls13_client.c
index d2d99a7..8dfb5da 100644
--- a/ssl/tls13_client.c
+++ b/ssl/tls13_client.c
@@ -228,7 +228,7 @@
ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_INTERNAL_ERROR);
return ssl_hs_error;
}
- SSL_set_session(ssl, NULL);
+ ssl_set_session(ssl, NULL);
} else {
if (!ssl_get_new_session(ssl, 0)) {
ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_INTERNAL_ERROR);