diff options
author | Daniel Stenberg <daniel@haxx.se> | 2019-11-11 11:45:12 +0100 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2019-11-12 09:40:00 +0100 |
commit | 8686aab69402ccad4bde0c2d73ec18e503ca11fd (patch) | |
tree | 2dc01581299b6d39f84338c4eda2777c9ce8ab51 | |
parent | cbaaae44fee13767a2436cc358348236342fbb9c (diff) | |
download | curl-8686aab69402ccad4bde0c2d73ec18e503ca11fd.tar.gz |
openssl: prevent recursive function calls from ctx callbacks
Follow the pattern of many other callbacks.
Ref: #4546
Closes #4585
-rw-r--r-- | lib/vtls/openssl.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/lib/vtls/openssl.c b/lib/vtls/openssl.c index 760758d23..26c8aa479 100644 --- a/lib/vtls/openssl.c +++ b/lib/vtls/openssl.c @@ -2806,8 +2806,10 @@ static CURLcode ossl_connect_step1(struct connectdata *conn, int sockindex) /* give application a chance to interfere with SSL set up. */ if(data->set.ssl.fsslctx) { + Curl_set_in_callback(data, true); result = (*data->set.ssl.fsslctx)(data, BACKEND->ctx, data->set.ssl.fsslctxp); + Curl_set_in_callback(data, false); if(result) { failf(data, "error signaled by ssl ctx callback"); return result; |