A call to SSL_write() with a zero length buffer should still advance the
handshake. Applications (including s_client) may rely on this.
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Hugo Landau <hlandau@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21578)
*written = 0;
- if (len == 0)
- return 1;
-
if (!expect_quic_with_stream_lock(s, /*remote_init=*/0, &ctx))
return 0;
goto out;
}
+ if (len == 0) {
+ ret = 1;
+ goto out;
+ }
+
if (xso_blocking_mode(ctx.xso))
ret = quic_write_blocking(&ctx, buf, len, written);
else if (partial_write)