Hi Neetish,
I would recommend considering the following in your research:
- The impact of Nagle. See https://github.com/openssl/openssl/issues/4237
- The impact of the KeyShare calculation on TLS 1.3 session resumption
(assuming most deployments will use psk_dhe_ke)
- The impact of
This seems to be a bug in how s_time handles the TLS 1.3 post-handshake
NewSessionTicket message; more specifically: not handling the retry when
SSL_read() returns -1.
The following diff (in tls1.3-draft-19 branch) appears to resolve the issue:
$ git diff
diff --git a/apps/s_time.c