Using NewSessionCallback for bssl client.
TLS 1.3 requires callers use the callback rather than SSL_get_session.
Change-Id: I2caae70e641b102ce93256c847c178871bf78bac
Reviewed-on: https://boringssl-review.googlesource.com/9076
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/tool/client.cc b/tool/client.cc
index c26a917..9d662d7 100644
--- a/tool/client.cc
+++ b/tool/client.cc
@@ -119,6 +119,21 @@
fflush(g_keylog_file);
}
+static ScopedBIO session_out;
+
+static int NewSessionCallback(SSL *ssl, SSL_SESSION *session) {
+ if (session_out) {
+ if (!PEM_write_bio_SSL_SESSION(session_out.get(), session) ||
+ BIO_flush(session_out.get()) <= 0) {
+ fprintf(stderr, "Error while saving session:\n");
+ ERR_print_errors_cb(PrintErrorCallback, stderr);
+ return 0;
+ }
+ }
+
+ return 0;
+}
+
bool Client(const std::vector<std::string> &args) {
if (!InitSocketLibrary()) {
return false;
@@ -239,6 +254,16 @@
}
}
+ if (args_map.count("-session-out") != 0) {
+ session_out.reset(BIO_new_file(args_map["-session-out"].c_str(), "wb"));
+ if (!session_out) {
+ fprintf(stderr, "Error while saving session:\n");
+ ERR_print_errors_cb(PrintErrorCallback, stderr);
+ return false;
+ }
+ SSL_CTX_sess_set_new_cb(ctx.get(), NewSessionCallback);
+ }
+
int sock = -1;
if (!Connect(&sock, args_map["-connect"])) {
return false;
@@ -294,16 +319,6 @@
fprintf(stderr, "Connected.\n");
PrintConnectionInfo(ssl.get());
- if (args_map.count("-session-out") != 0) {
- ScopedBIO out(BIO_new_file(args_map["-session-out"].c_str(), "wb"));
- if (!out ||
- !PEM_write_bio_SSL_SESSION(out.get(), SSL_get0_session(ssl.get()))) {
- fprintf(stderr, "Error while saving session:\n");
- ERR_print_errors_cb(PrintErrorCallback, stderr);
- return false;
- }
- }
-
bool ok = TransferData(ssl.get(), sock);
return ok;