Add a few missing SSL_R_BIO_NOT_SET cases.

The ssl_buffer.cc code handles this, but since outgoing handshake I/O
goes through a different path, it was missing these checks.

Change-Id: I4fed62b435b577645c405d0d995511a58d47a702
Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/46531
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Adam Langley <agl@google.com>
grpc-202302
David Benjamin 4 years ago committed by CQ bot account: commit-bot@chromium.org
parent 9bcf307c4c
commit 084064becc
  1. 5
      ssl/d1_both.cc
  2. 5
      ssl/s3_both.cc

@ -771,6 +771,11 @@ static int send_flight(SSL *ssl) {
return -1; return -1;
} }
if (ssl->wbio == nullptr) {
OPENSSL_PUT_ERROR(SSL, SSL_R_BIO_NOT_SET);
return -1;
}
dtls1_update_mtu(ssl); dtls1_update_mtu(ssl);
int ret = -1; int ret = -1;

@ -322,6 +322,11 @@ int tls_flush_flight(SSL *ssl) {
} }
} }
if (ssl->wbio == nullptr) {
OPENSSL_PUT_ERROR(SSL, SSL_R_BIO_NOT_SET);
return -1;
}
// Write the pending flight. // Write the pending flight.
while (ssl->s3->pending_flight_offset < ssl->s3->pending_flight->length) { while (ssl->s3->pending_flight_offset < ssl->s3->pending_flight->length) {
int ret = BIO_write( int ret = BIO_write(

Loading…
Cancel
Save