Skip to content

Commit db1fb54

Browse files
committed
TLS, start shutdown only when peer did not already close
- refs curl#10290 - When curl sees a TCP close from the peer, do not start a TLS shutdown. TLS shutdown is a handshake and if the peer already closed the connection, it is not interested in participating.
1 parent 7168137 commit db1fb54

File tree

5 files changed

+22
-5
lines changed

5 files changed

+22
-5
lines changed

lib/vtls/gtls.c

+3-1
Original file line numberDiff line numberDiff line change
@@ -117,6 +117,8 @@ static ssize_t gtls_pull(void *s, void *buf, size_t blen)
117117
(CURLE_AGAIN == result)? EAGAIN : EINVAL);
118118
nread = -1;
119119
}
120+
else if(nread == 0)
121+
connssl->peer_closed = TRUE;
120122
return nread;
121123
}
122124

@@ -1489,7 +1491,7 @@ static int gtls_shutdown(struct Curl_cfilter *cf,
14891491
bool done = FALSE;
14901492
char buf[120];
14911493

1492-
while(!done) {
1494+
while(!done && !connssl->peer_closed) {
14931495
int what = SOCKET_READABLE(Curl_conn_cf_get_socket(cf, data),
14941496
SSL_SHUTDOWN_TIMEOUT);
14951497
if(what > 0) {

lib/vtls/openssl.c

+10-2
Original file line numberDiff line numberDiff line change
@@ -769,6 +769,9 @@ static int ossl_bio_cf_in_read(BIO *bio, char *buf, int blen)
769769
if(CURLE_AGAIN == result)
770770
BIO_set_retry_read(bio);
771771
}
772+
else if(nread == 0) {
773+
connssl->peer_closed = TRUE;
774+
}
772775

773776
/* Before returning server replies to the SSL instance, we need
774777
* to have setup the x509 store or verification will fail. */
@@ -1887,7 +1890,9 @@ static void ossl_close(struct Curl_cfilter *cf, struct Curl_easy *data)
18871890
DEBUGASSERT(backend);
18881891

18891892
if(backend->handle) {
1890-
if(cf->next && cf->next->connected) {
1893+
/* Send the TLS shutdown if we are still connected *and* if
1894+
* the peer did not already close the connection. */
1895+
if(cf->next && cf->next->connected && !connssl->peer_closed) {
18911896
char buf[1024];
18921897
int nread, err;
18931898
long sslerr;
@@ -1896,7 +1901,10 @@ static void ossl_close(struct Curl_cfilter *cf, struct Curl_easy *data)
18961901
Read it to avoid an RST on the TCP connection. */
18971902
(void)SSL_read(backend->handle, buf, (int)sizeof(buf));
18981903
ERR_clear_error();
1899-
if(SSL_shutdown(backend->handle) == 1) {
1904+
if(connssl->peer_closed) {
1905+
CURL_TRC_CF(data, cf, "peer closed connection");
1906+
}
1907+
else if(SSL_shutdown(backend->handle) == 1) {
19001908
CURL_TRC_CF(data, cf, "SSL shutdown finished");
19011909
}
19021910
else {

lib/vtls/rustls.c

+4-1
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,7 @@ static int
8686
read_cb(void *userdata, uint8_t *buf, uintptr_t len, uintptr_t *out_n)
8787
{
8888
struct io_ctx *io_ctx = userdata;
89+
struct ssl_connect_data *const connssl = io_ctx->cf->ctx;
8990
CURLcode result;
9091
int ret = 0;
9192
ssize_t nread = Curl_conn_cf_recv(io_ctx->cf->next, io_ctx->data,
@@ -97,6 +98,8 @@ read_cb(void *userdata, uint8_t *buf, uintptr_t len, uintptr_t *out_n)
9798
else
9899
ret = EINVAL;
99100
}
101+
else if(nread == 0)
102+
connssl->peer_closed = TRUE;
100103
*out_n = (int)nread;
101104
return ret;
102105
}
@@ -697,7 +700,7 @@ cr_close(struct Curl_cfilter *cf, struct Curl_easy *data)
697700

698701
DEBUGASSERT(backend);
699702

700-
if(backend->conn) {
703+
if(backend->conn && !connssl->peer_closed) {
701704
rustls_connection_send_close_notify(backend->conn);
702705
n = cr_send(cf, data, NULL, 0, &tmperr);
703706
if(n < 0) {

lib/vtls/vtls_int.h

+1
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,7 @@ struct ssl_connect_data {
7676
int port; /* remote port at origin */
7777
BIT(use_alpn); /* if ALPN shall be used in handshake */
7878
BIT(reused_session); /* session-ID was reused for this */
79+
BIT(peer_closed); /* peer has closed connection */
7980
};
8081

8182

lib/vtls/wolfssl.c

+4-1
Original file line numberDiff line numberDiff line change
@@ -321,6 +321,8 @@ static int wolfssl_bio_cf_in_read(WOLFSSL_BIO *bio, char *buf, int blen)
321321
wolfSSL_BIO_clear_retry_flags(bio);
322322
if(nread < 0 && CURLE_AGAIN == result)
323323
BIO_set_retry_read(bio);
324+
else if(nread == 0)
325+
connssl->peer_closed = TRUE;
324326
return (int)nread;
325327
}
326328

@@ -1059,7 +1061,8 @@ static void wolfssl_close(struct Curl_cfilter *cf, struct Curl_easy *data)
10591061
/* Maybe the server has already sent a close notify alert.
10601062
Read it to avoid an RST on the TCP connection. */
10611063
(void)wolfSSL_read(backend->handle, buf, (int)sizeof(buf));
1062-
(void)wolfSSL_shutdown(backend->handle);
1064+
if(!connssl->peer_closed)
1065+
(void)wolfSSL_shutdown(backend->handle);
10631066
wolfSSL_free(backend->handle);
10641067
backend->handle = NULL;
10651068
}

0 commit comments

Comments
 (0)