On 06/08/16 02:32, Jim Carroll wrote:
> We have a non-blocking windows app that we are migrating to from OpenSSL
> 1.0.2i to 1.1.0-pre7-dev. We move data from sockets to SSL via
> BIO_s_mem() objects.
> 
>  
> 
>     rbio = BIO_new(BIO_s_mem());
> 
>     wbio = BIO_new(BIO_s_mem());
> 
>  
> 
>     ssl = SSL_new(ssl_ctx);
> 
>     SSL_set_bio(ssl, rbio, wbio);
> 
>  
> 
> We move data in via BIO_write(rbio, ...), but later an SSL_read(ssl,
> ...) returns bytes -1 and SSL_get_error() returns SSL_ERROR(1)
> 
>  
> 
> Debug stepping through the code, we were surprised to discover that
> ssl3_read_n() dispatched the SSL_read() into BIO_s_connect(). A detailed
> study of the code, and I can assure that at no point do we ever
> associate the windows socket with SSL.
>
> Is it possible that that SSL_new() no longer allows the use of memory
> BIO's? I know that's a long shot question, but we're grasping at straws
> here.

No, the use of memory BIO's is perfectly acceptable - and in fact we do
exactly that in our own self-tests. See create_ssl_connection() in
test/ssltestlib.c.

Matt

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to