Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/mono/boringssl.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDavid Benjamin <davidben@google.com>2016-06-18 01:44:38 +0300
committerAdam Langley <agl@google.com>2016-06-27 23:08:25 +0300
commitb5eb1958bb84e6bd94670866f83233df98e04bac (patch)
tree55149d1ca9c6f4ff56d71e0990986d6f6e28bd23 /ssl/d1_both.c
parentc42acee63d22c1a4d8f3ee648e98abfdb1341ba2 (diff)
Make dtls1_do_handshake_write less stateful.
Now dtls1_do_handshake_write takes in a serialized form of the full message and writes it. It's a little weird to serialize and deserialize the header a bunch, but msg_callback requires that we keep the full one around in memory anyway. Between that and the handshake hash definition, DTLS really wants messages to mean the assembled header, redundancies and all, so we'll just put together messages that way. This also fixes a bug where ssl_do_msg_callback would get passed in garbage where the header was supposed to be. The buffered messages get sampled before writing the fragment rather than after. Change-Id: I4e3b8ce4aab4c4ab4502d5428dfb8f3f729c6ef9 Reviewed-on: https://boringssl-review.googlesource.com/8433 Reviewed-by: Adam Langley <agl@google.com>
Diffstat (limited to 'ssl/d1_both.c')
-rw-r--r--ssl/d1_both.c80
1 files changed, 40 insertions, 40 deletions
diff --git a/ssl/d1_both.c b/ssl/d1_both.c
index 78f566e5..d98b5df7 100644
--- a/ssl/d1_both.c
+++ b/ssl/d1_both.c
@@ -311,7 +311,9 @@ static int dtls1_write_change_cipher_spec(SSL *ssl,
return 1;
}
-int dtls1_do_handshake_write(SSL *ssl, enum dtls1_use_epoch_t use_epoch) {
+int dtls1_do_handshake_write(SSL *ssl, size_t *out_offset, const uint8_t *in,
+ size_t offset, size_t len,
+ enum dtls1_use_epoch_t use_epoch) {
dtls1_update_mtu(ssl);
int ret = -1;
@@ -324,13 +326,21 @@ int dtls1_do_handshake_write(SSL *ssl, enum dtls1_use_epoch_t use_epoch) {
goto err;
}
- /* Consume the message header. Fragments will have different headers
- * prepended. */
- if (ssl->init_off == 0) {
- ssl->init_off += DTLS1_HM_HEADER_LENGTH;
- ssl->init_num -= DTLS1_HM_HEADER_LENGTH;
+ /* Although it may be sent as multiple fragments, a DTLS message must be sent
+ * serialized as a single fragment for purposes of |ssl_do_msg_callback| and
+ * the handshake hash. */
+ CBS cbs, body;
+ struct hm_header_st hdr;
+ CBS_init(&cbs, in, len);
+ if (!dtls1_parse_fragment(&cbs, &hdr, &body) ||
+ hdr.frag_off != 0 ||
+ hdr.frag_len != CBS_len(&body) ||
+ hdr.msg_len != CBS_len(&body) ||
+ !CBS_skip(&body, offset) ||
+ CBS_len(&cbs) != 0) {
+ OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
+ goto err;
}
- assert(ssl->init_off >= DTLS1_HM_HEADER_LENGTH);
do {
/* During the handshake, wbio is buffered to pack messages together. Flush
@@ -354,47 +364,47 @@ int dtls1_do_handshake_write(SSL *ssl, enum dtls1_use_epoch_t use_epoch) {
}
todo -= DTLS1_HM_HEADER_LENGTH;
- if (todo > (size_t)ssl->init_num) {
- todo = ssl->init_num;
+ if (todo > CBS_len(&body)) {
+ todo = CBS_len(&body);
}
if (todo >= (1u << 24)) {
todo = (1u << 24) - 1;
}
- size_t len;
+ size_t buf_len;
if (!CBB_init_fixed(&cbb, buf, ssl->d1->mtu) ||
- !CBB_add_u8(&cbb, ssl->d1->w_msg_hdr.type) ||
- !CBB_add_u24(&cbb, ssl->d1->w_msg_hdr.msg_len) ||
- !CBB_add_u16(&cbb, ssl->d1->w_msg_hdr.seq) ||
- !CBB_add_u24(&cbb, ssl->init_off - DTLS1_HM_HEADER_LENGTH) ||
+ !CBB_add_u8(&cbb, hdr.type) ||
+ !CBB_add_u24(&cbb, hdr.msg_len) ||
+ !CBB_add_u16(&cbb, hdr.seq) ||
+ !CBB_add_u24(&cbb, offset) ||
!CBB_add_u24(&cbb, todo) ||
- !CBB_add_bytes(
- &cbb, (const uint8_t *)ssl->init_buf->data + ssl->init_off, todo) ||
- !CBB_finish(&cbb, NULL, &len)) {
+ !CBB_add_bytes(&cbb, CBS_data(&body), todo) ||
+ !CBB_finish(&cbb, NULL, &buf_len)) {
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
goto err;
}
int write_ret =
- dtls1_write_record(ssl, SSL3_RT_HANDSHAKE, buf, len, use_epoch);
+ dtls1_write_record(ssl, SSL3_RT_HANDSHAKE, buf, buf_len, use_epoch);
if (write_ret <= 0) {
ret = write_ret;
goto err;
}
- ssl->init_off += todo;
- ssl->init_num -= todo;
- } while (ssl->init_num > 0);
- ssl_do_msg_callback(ssl, 1 /* write */, ssl->version, SSL3_RT_HANDSHAKE,
- ssl->init_buf->data,
- (size_t)(ssl->init_off + ssl->init_num));
+ if (!CBS_skip(&body, todo)) {
+ OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
+ goto err;
+ }
+ offset += todo;
+ } while (CBS_len(&body) != 0);
- ssl->init_off = 0;
- ssl->init_num = 0;
+ ssl_do_msg_callback(ssl, 1 /* write */, ssl->version, SSL3_RT_HANDSHAKE, in,
+ len);
ret = 1;
err:
+ *out_offset = offset;
CBB_cleanup(&cbb);
OPENSSL_free(buf);
return ret;
@@ -680,16 +690,10 @@ static int dtls1_retransmit_message(SSL *ssl, hm_fragment *frag) {
if (frag->msg_header.is_ccs) {
ret = dtls1_write_change_cipher_spec(ssl, use_epoch);
} else {
- /* Restore the message body.
- * TODO(davidben): Make this less stateful. */
- memcpy(ssl->init_buf->data, frag->fragment,
- frag->msg_header.msg_len + DTLS1_HM_HEADER_LENGTH);
- ssl->init_num = frag->msg_header.msg_len + DTLS1_HM_HEADER_LENGTH;
-
- dtls1_set_message_header(ssl, frag->msg_header.type,
- frag->msg_header.msg_len, frag->msg_header.seq,
- 0, frag->msg_header.frag_len);
- ret = dtls1_do_handshake_write(ssl, use_epoch);
+ size_t offset = 0;
+ ret = dtls1_do_handshake_write(
+ ssl, &offset, frag->fragment, offset,
+ frag->msg_header.msg_len + DTLS1_HM_HEADER_LENGTH, use_epoch);
}
return ret;
@@ -756,10 +760,6 @@ static int dtls1_buffer_change_cipher_spec(SSL *ssl, uint16_t seq) {
}
int dtls1_buffer_message(SSL *ssl) {
- /* this function is called immediately after a message has
- * been serialized */
- assert(ssl->init_off == 0);
-
hm_fragment *frag = dtls1_hm_fragment_new(ssl->init_num, 0);
if (!frag) {
return 0;