On Wed, 18 Sep 2024 11:40:27 GMT, Daniel Jeliński <djelin...@openjdk.org> wrote:

>> Artur Barashev has updated the pull request incrementally with one 
>> additional commit since the last revision:
>> 
>>   - Rather than proactively scanning every packet for this unlikely 
>> scenario, we reactively check for unencrypted alert after getting the 
>> BadPaddingException
>>   - Add "!context.isNegotiated" check as "handshakeContext" can be non-null 
>> if server receives a Post-Handshake message
>>   - Update test to send "close_notify" alert after "user_cancelled" alert
>
> Should the client send a close_notify if the connection is closed in the 
> middle of the handshake? I couldn't find a good answer in the TLS1.3 spec, 
> but I'd assume that closing the connection without sending a close_notify 
> would be good enough.
> Should the server throw a handshake exception when the handshake is aborted?
> Will the server throw the right exception if the client aborts the connection 
> for a different reason (like a server_hello that fails to decode correctly)?

@djelinski I pushed a new commit, please review:

    - Rather than proactively scanning every packet for this unlikely scenario, 
we reactively check for unencrypted alert after getting the BadPaddingException
    - Add "!context.isNegotiated" check as "handshakeContext" can be non-null 
if server receives a Post-Handshake message
    - Update test to send "close_notify" alert after "user_cancelled" alert

-------------

PR Comment: https://git.openjdk.org/jdk/pull/21043#issuecomment-2359429061

Reply via email to