2014-06-20 20:00:00 +01:00
|
|
|
/*
|
|
|
|
* DTLS implementation written by Nagendra Modadugu
|
2018-02-26 22:02:17 +00:00
|
|
|
* (nagendra@cs.stanford.edu) for the OpenSSL project 2005.
|
2014-06-20 20:00:00 +01:00
|
|
|
*/
|
|
|
|
/* ====================================================================
|
|
|
|
* Copyright (c) 1998-2005 The OpenSSL Project. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
*
|
|
|
|
* 3. All advertising materials mentioning features or use of this
|
|
|
|
* software must display the following acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
|
|
|
*
|
|
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
|
|
* endorse or promote products derived from this software without
|
|
|
|
* prior written permission. For written permission, please contact
|
|
|
|
* openssl-core@openssl.org.
|
|
|
|
*
|
|
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
|
|
* permission of the OpenSSL Project.
|
|
|
|
*
|
|
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
|
|
* acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
* ====================================================================
|
|
|
|
*
|
|
|
|
* This product includes cryptographic software written by Eric Young
|
|
|
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
|
|
* Hudson (tjh@cryptsoft.com).
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This package is an SSL implementation written
|
|
|
|
* by Eric Young (eay@cryptsoft.com).
|
|
|
|
* The implementation was written so as to conform with Netscapes SSL.
|
|
|
|
*
|
|
|
|
* This library is free for commercial and non-commercial use as long as
|
|
|
|
* the following conditions are aheared to. The following conditions
|
|
|
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
|
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
|
|
* included with this distribution is covered by the same copyright terms
|
|
|
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
|
|
|
*
|
|
|
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
|
|
* the code are not to be removed.
|
|
|
|
* If this package is used in a product, Eric Young should be given attribution
|
|
|
|
* as the author of the parts of the library used.
|
|
|
|
* This can be in the form of a textual message at program startup or
|
|
|
|
* in documentation (online or textual) provided with the package.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* "This product includes cryptographic software written by
|
|
|
|
* Eric Young (eay@cryptsoft.com)"
|
|
|
|
* The word 'cryptographic' can be left out if the rouines from the library
|
|
|
|
* being used are not cryptographic related :-).
|
|
|
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
|
|
|
* the apps directory (application code) you must include an acknowledgement:
|
|
|
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* The licence and distribution terms for any publically available version or
|
|
|
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
|
|
* copied and put under another distribution licence
|
|
|
|
* [including the GNU Public Licence.] */
|
|
|
|
|
2015-09-15 06:48:04 +01:00
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
2014-06-20 20:00:00 +01:00
|
|
|
#include <assert.h>
|
|
|
|
#include <limits.h>
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
#include <openssl/buf.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include <openssl/mem.h>
|
|
|
|
#include <openssl/rand.h>
|
|
|
|
|
2016-12-13 06:07:13 +00:00
|
|
|
#include "../crypto/internal.h"
|
2015-04-08 03:38:30 +01:00
|
|
|
#include "internal.h"
|
2014-06-20 20:00:00 +01:00
|
|
|
|
|
|
|
|
Support symbol prefixes
- In base.h, if BORINGSSL_PREFIX is defined, include
boringssl_prefix_symbols.h
- In all .S files, if BORINGSSL_PREFIX is defined, include
boringssl_prefix_symbols_asm.h
- In base.h, BSSL_NAMESPACE_BEGIN and BSSL_NAMESPACE_END are
defined with appropriate values depending on whether
BORINGSSL_PREFIX is defined; these macros are used in place
of 'namespace bssl {' and '}'
- Add util/make_prefix_headers.go, which takes a list of symbols
and auto-generates the header files mentioned above
- In CMakeLists.txt, if BORINGSSL_PREFIX and BORINGSSL_PREFIX_SYMBOLS
are defined, run util/make_prefix_headers.go to generate header
files
- In various CMakeLists.txt files, add "global_target" that all
targets depend on to give us a place to hook logic that must run
before all other targets (in particular, the header file generation
logic)
- Document this in BUILDING.md, including the fact that it is
the caller's responsibility to provide the symbol list and keep it
up to date
- Note that this scheme has not been tested on Windows, and likely
does not work on it; Windows support will need to be added in a
future commit
Change-Id: If66a7157f46b5b66230ef91e15826b910cf979a2
Reviewed-on: https://boringssl-review.googlesource.com/31364
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Reviewed-by: David Benjamin <davidben@google.com>
2018-08-27 02:53:36 +01:00
|
|
|
BSSL_NAMESPACE_BEGIN
|
Move libssl's internals into the bssl namespace.
This is horrible, but everything else I tried was worse. The goal with
this CL is to take the extern "C" out of ssl/internal.h and move most
symbols to namespace bssl, so we can start using C++ helpers and
destructors without worry.
Complications:
- Public API functions must be extern "C" and match their declaration in
ssl.h, which is unnamespaced. C++ really does not want you to
interleave namespaced and unnamespaced things. One can actually write
a namespaced extern "C" function, but this means, from C++'s
perspective, the function is namespaced. Trying to namespace the
public header would worked but ended up too deep a rabbithole.
- Our STACK_OF macros do not work right in namespaces.
- The typedefs for our exposed but opaque types are visible in the
header files and copied into consuming projects as forward
declarations. We ultimately want to give SSL a destructor, but
clobbering an unnamespaced ssl_st::~ssl_st seems bad manners.
- MSVC complains about ambiguous names if one typedefs SSL to bssl::SSL.
This CL opts for:
- ssl/*.cc must begin with #define BORINGSSL_INTERNAL_CXX_TYPES. This
informs the public headers to create forward declarations which are
compatible with our namespaces.
- For now, C++-defined type FOO ends up at bssl::FOO with a typedef
outside. Later I imagine we'll rename many of them.
- Internal functions get namespace bssl, so we stop worrying about
stomping the tls1_prf symbol. Exported C functions are stuck as they
are. Rather than try anything weird, bite the bullet and reorder files
which have a mix of public and private functions. I expect that over
time, the public functions will become fairly small as we move logic
to more idiomatic C++.
Files without any public C functions can just be written normally.
- To avoid MSVC troubles, some bssl types are renamed to CPlusPlusStyle
in advance of them being made idiomatic C++.
Bug: 132
Change-Id: Ic931895e117c38b14ff8d6e5a273e868796c7581
Reviewed-on: https://boringssl-review.googlesource.com/18124
Reviewed-by: David Benjamin <davidben@google.com>
2017-07-18 21:34:25 +01:00
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// TODO(davidben): 28 comes from the size of IP + UDP header. Is this reasonable
|
|
|
|
// for these values? Notably, why is kMinMTU a function of the transport
|
|
|
|
// protocol's overhead rather than, say, what's needed to hold a minimally-sized
|
|
|
|
// handshake fragment plus protocol overhead.
|
2015-01-12 00:31:22 +00:00
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// kMinMTU is the minimum acceptable MTU value.
|
2015-01-12 00:31:22 +00:00
|
|
|
static const unsigned int kMinMTU = 256 - 28;
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// kDefaultMTU is the default MTU value to use if neither the user nor
|
|
|
|
// the underlying BIO supplies one.
|
2015-01-12 00:31:22 +00:00
|
|
|
static const unsigned int kDefaultMTU = 1500 - 28;
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Receiving handshake messages.
|
2016-06-23 22:57:19 +01:00
|
|
|
|
2017-10-17 06:12:53 +01:00
|
|
|
hm_fragment::~hm_fragment() {
|
|
|
|
OPENSSL_free(data);
|
|
|
|
OPENSSL_free(reassembly);
|
2016-06-18 00:30:47 +01:00
|
|
|
}
|
|
|
|
|
2017-10-17 06:12:53 +01:00
|
|
|
static UniquePtr<hm_fragment> dtls1_hm_fragment_new(
|
|
|
|
const struct hm_header_st *msg_hdr) {
|
2017-07-20 04:57:40 +01:00
|
|
|
ScopedCBB cbb;
|
2017-10-17 06:12:53 +01:00
|
|
|
UniquePtr<hm_fragment> frag = MakeUnique<hm_fragment>();
|
|
|
|
if (!frag) {
|
|
|
|
return nullptr;
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
2016-07-08 17:34:05 +01:00
|
|
|
frag->type = msg_hdr->type;
|
|
|
|
frag->seq = msg_hdr->seq;
|
|
|
|
frag->msg_len = msg_hdr->msg_len;
|
2014-12-14 00:28:18 +00:00
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Allocate space for the reassembled message and fill in the header.
|
2017-07-09 21:17:55 +01:00
|
|
|
frag->data =
|
|
|
|
(uint8_t *)OPENSSL_malloc(DTLS1_HM_HEADER_LENGTH + msg_hdr->msg_len);
|
2016-07-08 17:34:05 +01:00
|
|
|
if (frag->data == NULL) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
|
2017-10-17 06:12:53 +01:00
|
|
|
return nullptr;
|
2016-07-08 17:34:05 +01:00
|
|
|
}
|
2014-12-14 00:28:18 +00:00
|
|
|
|
2017-07-20 04:57:40 +01:00
|
|
|
if (!CBB_init_fixed(cbb.get(), frag->data, DTLS1_HM_HEADER_LENGTH) ||
|
|
|
|
!CBB_add_u8(cbb.get(), msg_hdr->type) ||
|
|
|
|
!CBB_add_u24(cbb.get(), msg_hdr->msg_len) ||
|
|
|
|
!CBB_add_u16(cbb.get(), msg_hdr->seq) ||
|
|
|
|
!CBB_add_u24(cbb.get(), 0 /* frag_off */) ||
|
|
|
|
!CBB_add_u24(cbb.get(), msg_hdr->msg_len) ||
|
|
|
|
!CBB_finish(cbb.get(), NULL, NULL)) {
|
2016-07-08 17:34:05 +01:00
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
|
2017-10-17 06:12:53 +01:00
|
|
|
return nullptr;
|
2016-07-08 17:34:05 +01:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// If the handshake message is empty, |frag->reassembly| is NULL.
|
2016-07-08 17:34:05 +01:00
|
|
|
if (msg_hdr->msg_len > 0) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// Initialize reassembly bitmask.
|
2016-07-08 17:34:05 +01:00
|
|
|
if (msg_hdr->msg_len + 7 < msg_hdr->msg_len) {
|
2016-06-18 00:12:54 +01:00
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_OVERFLOW);
|
2017-10-17 06:12:53 +01:00
|
|
|
return nullptr;
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
2016-07-08 17:34:05 +01:00
|
|
|
size_t bitmask_len = (msg_hdr->msg_len + 7) / 8;
|
2017-07-09 21:17:55 +01:00
|
|
|
frag->reassembly = (uint8_t *)OPENSSL_malloc(bitmask_len);
|
2016-06-18 00:12:54 +01:00
|
|
|
if (frag->reassembly == NULL) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
|
2017-10-17 06:12:53 +01:00
|
|
|
return nullptr;
|
2016-06-18 00:12:54 +01:00
|
|
|
}
|
2016-12-13 06:07:13 +00:00
|
|
|
OPENSSL_memset(frag->reassembly, 0, bitmask_len);
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return frag;
|
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// bit_range returns a |uint8_t| with bits |start|, inclusive, to |end|,
|
|
|
|
// exclusive, set.
|
2016-06-23 22:52:47 +01:00
|
|
|
static uint8_t bit_range(size_t start, size_t end) {
|
2015-03-03 01:52:52 +00:00
|
|
|
return (uint8_t)(~((1u << start) - 1) & ((1u << end) - 1));
|
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// dtls1_hm_fragment_mark marks bytes |start|, inclusive, to |end|, exclusive,
|
|
|
|
// as received in |frag|. If |frag| becomes complete, it clears
|
|
|
|
// |frag->reassembly|. The range must be within the bounds of |frag|'s message
|
|
|
|
// and |frag->reassembly| must not be NULL.
|
2015-03-03 01:52:52 +00:00
|
|
|
static void dtls1_hm_fragment_mark(hm_fragment *frag, size_t start,
|
|
|
|
size_t end) {
|
2016-07-08 17:34:05 +01:00
|
|
|
size_t msg_len = frag->msg_len;
|
2015-03-03 01:52:52 +00:00
|
|
|
|
|
|
|
if (frag->reassembly == NULL || start > end || end > msg_len) {
|
|
|
|
assert(0);
|
|
|
|
return;
|
|
|
|
}
|
2017-08-29 21:33:21 +01:00
|
|
|
// A zero-length message will never have a pending reassembly.
|
2015-03-03 01:52:52 +00:00
|
|
|
assert(msg_len > 0);
|
|
|
|
|
2017-09-07 16:51:46 +01:00
|
|
|
if (start == end) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-03 01:52:52 +00:00
|
|
|
if ((start >> 3) == (end >> 3)) {
|
|
|
|
frag->reassembly[start >> 3] |= bit_range(start & 7, end & 7);
|
|
|
|
} else {
|
|
|
|
frag->reassembly[start >> 3] |= bit_range(start & 7, 8);
|
2016-09-05 17:47:25 +01:00
|
|
|
for (size_t i = (start >> 3) + 1; i < (end >> 3); i++) {
|
2015-03-03 01:52:52 +00:00
|
|
|
frag->reassembly[i] = 0xff;
|
|
|
|
}
|
|
|
|
if ((end & 7) != 0) {
|
|
|
|
frag->reassembly[end >> 3] |= bit_range(0, end & 7);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Check if the fragment is complete.
|
2016-09-05 17:47:25 +01:00
|
|
|
for (size_t i = 0; i < (msg_len >> 3); i++) {
|
2015-03-03 01:52:52 +00:00
|
|
|
if (frag->reassembly[i] != 0xff) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ((msg_len & 7) != 0 &&
|
|
|
|
frag->reassembly[msg_len >> 3] != bit_range(0, msg_len & 7)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
OPENSSL_free(frag->reassembly);
|
|
|
|
frag->reassembly = NULL;
|
|
|
|
}
|
|
|
|
|
2017-10-07 09:12:35 +01:00
|
|
|
// dtls1_is_current_message_complete returns whether the current handshake
|
|
|
|
// message is complete.
|
|
|
|
static bool dtls1_is_current_message_complete(const SSL *ssl) {
|
2017-10-17 06:37:51 +01:00
|
|
|
size_t idx = ssl->d1->handshake_read_seq % SSL_MAX_HANDSHAKE_FLIGHT;
|
|
|
|
hm_fragment *frag = ssl->d1->incoming_messages[idx].get();
|
2016-06-23 22:57:19 +01:00
|
|
|
return frag != NULL && frag->reassembly == NULL;
|
2015-11-03 19:54:39 +00:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// dtls1_get_incoming_message returns the incoming message corresponding to
|
|
|
|
// |msg_hdr|. If none exists, it creates a new one and inserts it in the
|
|
|
|
// queue. Otherwise, it checks |msg_hdr| is consistent with the existing one. It
|
|
|
|
// returns NULL on failure. The caller does not take ownership of the result.
|
2016-06-23 22:57:19 +01:00
|
|
|
static hm_fragment *dtls1_get_incoming_message(
|
2017-10-06 22:36:20 +01:00
|
|
|
SSL *ssl, uint8_t *out_alert, const struct hm_header_st *msg_hdr) {
|
2016-06-23 22:57:19 +01:00
|
|
|
if (msg_hdr->seq < ssl->d1->handshake_read_seq ||
|
|
|
|
msg_hdr->seq - ssl->d1->handshake_read_seq >= SSL_MAX_HANDSHAKE_FLIGHT) {
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_INTERNAL_ERROR;
|
2016-06-23 22:57:19 +01:00
|
|
|
return NULL;
|
Rewrite DTLS handshake message sending logic.
This fixes a number of bugs with the original logic:
- If handshake messages are fragmented and writes need to be retried, frag_off
gets completely confused.
- The BIO_flush call didn't set rwstate, so it wasn't resumable at that point.
- The msg_callback call gets garbage because the fragment header would get
scribbled over the handshake buffer.
The original logic was also extremely confusing with how it handles init_off.
(init_off gets rewound to make room for the fragment header. Depending on
where you pause, resuming may or may not have already been rewound.)
For simplicity, just allocate a new buffer to assemble the fragment in and
avoid clobbering the old one. I don't think it's worth the complexity to
optimize that. If we want to optimize this sort of thing, not clobbering seems
better anyway because the message may need to be retransmitted. We could avoid
doing a copy when buffering the outgoing message for retransmission later.
We do still need to track how far we are in sending the current message via
init_off, so I haven't opted to disconnect this function from
init_{buf,off,num} yet.
Test the fix to the retry + fragment case by having the splitHandshake option
to the state machine tests, in DTLS, also clamp the MTU to force handshake
fragmentation.
Change-Id: I66f634d6c752ea63649db8ed2f898f9cc2b13908
Reviewed-on: https://boringssl-review.googlesource.com/6421
Reviewed-by: Adam Langley <agl@google.com>
2015-11-03 20:39:45 +00:00
|
|
|
}
|
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
size_t idx = msg_hdr->seq % SSL_MAX_HANDSHAKE_FLIGHT;
|
2017-10-17 06:37:51 +01:00
|
|
|
hm_fragment *frag = ssl->d1->incoming_messages[idx].get();
|
2016-06-23 22:57:19 +01:00
|
|
|
if (frag != NULL) {
|
2016-07-08 17:34:05 +01:00
|
|
|
assert(frag->seq == msg_hdr->seq);
|
2017-08-29 21:33:21 +01:00
|
|
|
// The new fragment must be compatible with the previous fragments from this
|
|
|
|
// message.
|
2016-07-08 17:34:05 +01:00
|
|
|
if (frag->type != msg_hdr->type ||
|
|
|
|
frag->msg_len != msg_hdr->msg_len) {
|
2016-06-23 22:57:19 +01:00
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_FRAGMENT_MISMATCH);
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_ILLEGAL_PARAMETER;
|
2016-06-23 22:57:19 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
return frag;
|
Rewrite DTLS handshake message sending logic.
This fixes a number of bugs with the original logic:
- If handshake messages are fragmented and writes need to be retried, frag_off
gets completely confused.
- The BIO_flush call didn't set rwstate, so it wasn't resumable at that point.
- The msg_callback call gets garbage because the fragment header would get
scribbled over the handshake buffer.
The original logic was also extremely confusing with how it handles init_off.
(init_off gets rewound to make room for the fragment header. Depending on
where you pause, resuming may or may not have already been rewound.)
For simplicity, just allocate a new buffer to assemble the fragment in and
avoid clobbering the old one. I don't think it's worth the complexity to
optimize that. If we want to optimize this sort of thing, not clobbering seems
better anyway because the message may need to be retransmitted. We could avoid
doing a copy when buffering the outgoing message for retransmission later.
We do still need to track how far we are in sending the current message via
init_off, so I haven't opted to disconnect this function from
init_{buf,off,num} yet.
Test the fix to the retry + fragment case by having the splitHandshake option
to the state machine tests, in DTLS, also clamp the MTU to force handshake
fragmentation.
Change-Id: I66f634d6c752ea63649db8ed2f898f9cc2b13908
Reviewed-on: https://boringssl-review.googlesource.com/6421
Reviewed-by: Adam Langley <agl@google.com>
2015-11-03 20:39:45 +00:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// This is the first fragment from this message.
|
2017-10-17 06:37:51 +01:00
|
|
|
ssl->d1->incoming_messages[idx] = dtls1_hm_fragment_new(msg_hdr);
|
|
|
|
if (!ssl->d1->incoming_messages[idx]) {
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_INTERNAL_ERROR;
|
2016-06-23 22:57:19 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
2017-10-17 06:37:51 +01:00
|
|
|
return ssl->d1->incoming_messages[idx].get();
|
Rewrite DTLS handshake message sending logic.
This fixes a number of bugs with the original logic:
- If handshake messages are fragmented and writes need to be retried, frag_off
gets completely confused.
- The BIO_flush call didn't set rwstate, so it wasn't resumable at that point.
- The msg_callback call gets garbage because the fragment header would get
scribbled over the handshake buffer.
The original logic was also extremely confusing with how it handles init_off.
(init_off gets rewound to make room for the fragment header. Depending on
where you pause, resuming may or may not have already been rewound.)
For simplicity, just allocate a new buffer to assemble the fragment in and
avoid clobbering the old one. I don't think it's worth the complexity to
optimize that. If we want to optimize this sort of thing, not clobbering seems
better anyway because the message may need to be retransmitted. We could avoid
doing a copy when buffering the outgoing message for retransmission later.
We do still need to track how far we are in sending the current message via
init_off, so I haven't opted to disconnect this function from
init_{buf,off,num} yet.
Test the fix to the retry + fragment case by having the splitHandshake option
to the state machine tests, in DTLS, also clamp the MTU to force handshake
fragmentation.
Change-Id: I66f634d6c752ea63649db8ed2f898f9cc2b13908
Reviewed-on: https://boringssl-review.googlesource.com/6421
Reviewed-by: Adam Langley <agl@google.com>
2015-11-03 20:39:45 +00:00
|
|
|
}
|
|
|
|
|
2017-10-06 22:36:20 +01:00
|
|
|
ssl_open_record_t dtls1_open_handshake(SSL *ssl, size_t *out_consumed,
|
|
|
|
uint8_t *out_alert, Span<uint8_t> in) {
|
|
|
|
uint8_t type;
|
|
|
|
Span<uint8_t> record;
|
|
|
|
auto ret = dtls_open_record(ssl, &type, &record, out_consumed, out_alert, in);
|
|
|
|
if (ret != ssl_open_record_success) {
|
|
|
|
return ret;
|
2015-11-03 19:54:39 +00:00
|
|
|
}
|
|
|
|
|
2017-10-06 22:36:20 +01:00
|
|
|
switch (type) {
|
2017-06-26 03:42:55 +01:00
|
|
|
case SSL3_RT_APPLICATION_DATA:
|
2017-08-29 21:33:21 +01:00
|
|
|
// Unencrypted application data records are always illegal.
|
2017-06-26 03:42:55 +01:00
|
|
|
if (ssl->s3->aead_read_ctx->is_null_cipher()) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_RECORD);
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_UNEXPECTED_MESSAGE;
|
|
|
|
return ssl_open_record_error;
|
2017-06-26 03:42:55 +01:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Out-of-order application data may be received between ChangeCipherSpec
|
|
|
|
// and finished. Discard it.
|
2017-10-06 22:36:20 +01:00
|
|
|
return ssl_open_record_discard;
|
2017-06-26 03:42:55 +01:00
|
|
|
|
|
|
|
case SSL3_RT_CHANGE_CIPHER_SPEC:
|
2017-08-29 21:33:21 +01:00
|
|
|
// We do not support renegotiation, so encrypted ChangeCipherSpec records
|
|
|
|
// are illegal.
|
2017-06-26 03:42:55 +01:00
|
|
|
if (!ssl->s3->aead_read_ctx->is_null_cipher()) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_RECORD);
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_UNEXPECTED_MESSAGE;
|
|
|
|
return ssl_open_record_error;
|
2017-06-26 03:42:55 +01:00
|
|
|
}
|
|
|
|
|
2017-10-06 22:36:20 +01:00
|
|
|
if (record.size() != 1u || record[0] != SSL3_MT_CCS) {
|
2017-06-26 03:42:55 +01:00
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_CHANGE_CIPHER_SPEC);
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_ILLEGAL_PARAMETER;
|
|
|
|
return ssl_open_record_error;
|
2017-06-26 03:42:55 +01:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Flag the ChangeCipherSpec for later.
|
2017-06-26 03:42:55 +01:00
|
|
|
ssl->d1->has_change_cipher_spec = true;
|
|
|
|
ssl_do_msg_callback(ssl, 0 /* read */, SSL3_RT_CHANGE_CIPHER_SPEC,
|
2017-10-06 22:36:20 +01:00
|
|
|
record);
|
|
|
|
return ssl_open_record_success;
|
2014-12-14 00:28:18 +00:00
|
|
|
|
2017-06-26 03:42:55 +01:00
|
|
|
case SSL3_RT_HANDSHAKE:
|
2017-08-29 21:33:21 +01:00
|
|
|
// Break out to main processing.
|
2017-06-26 03:42:55 +01:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_RECORD);
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_UNEXPECTED_MESSAGE;
|
|
|
|
return ssl_open_record_error;
|
Rewrite DTLS handshake message sending logic.
This fixes a number of bugs with the original logic:
- If handshake messages are fragmented and writes need to be retried, frag_off
gets completely confused.
- The BIO_flush call didn't set rwstate, so it wasn't resumable at that point.
- The msg_callback call gets garbage because the fragment header would get
scribbled over the handshake buffer.
The original logic was also extremely confusing with how it handles init_off.
(init_off gets rewound to make room for the fragment header. Depending on
where you pause, resuming may or may not have already been rewound.)
For simplicity, just allocate a new buffer to assemble the fragment in and
avoid clobbering the old one. I don't think it's worth the complexity to
optimize that. If we want to optimize this sort of thing, not clobbering seems
better anyway because the message may need to be retransmitted. We could avoid
doing a copy when buffering the outgoing message for retransmission later.
We do still need to track how far we are in sending the current message via
init_off, so I haven't opted to disconnect this function from
init_{buf,off,num} yet.
Test the fix to the retry + fragment case by having the splitHandshake option
to the state machine tests, in DTLS, also clamp the MTU to force handshake
fragmentation.
Change-Id: I66f634d6c752ea63649db8ed2f898f9cc2b13908
Reviewed-on: https://boringssl-review.googlesource.com/6421
Reviewed-by: Adam Langley <agl@google.com>
2015-11-03 20:39:45 +00:00
|
|
|
}
|
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
CBS cbs;
|
2017-10-06 22:36:20 +01:00
|
|
|
CBS_init(&cbs, record.data(), record.size());
|
2016-06-23 22:57:19 +01:00
|
|
|
while (CBS_len(&cbs) > 0) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// Read a handshake fragment.
|
2016-06-23 22:57:19 +01:00
|
|
|
struct hm_header_st msg_hdr;
|
|
|
|
CBS body;
|
|
|
|
if (!dtls1_parse_fragment(&cbs, &msg_hdr, &body)) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_HANDSHAKE_RECORD);
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_DECODE_ERROR;
|
|
|
|
return ssl_open_record_error;
|
2015-11-03 19:54:39 +00:00
|
|
|
}
|
2014-12-14 00:28:18 +00:00
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
const size_t frag_off = msg_hdr.frag_off;
|
|
|
|
const size_t frag_len = msg_hdr.frag_len;
|
|
|
|
const size_t msg_len = msg_hdr.msg_len;
|
|
|
|
if (frag_off > msg_len || frag_off + frag_len < frag_off ||
|
|
|
|
frag_off + frag_len > msg_len ||
|
|
|
|
msg_len > ssl_max_handshake_message_len(ssl)) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_EXCESSIVE_MESSAGE_SIZE);
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_ILLEGAL_PARAMETER;
|
|
|
|
return ssl_open_record_error;
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// The encrypted epoch in DTLS has only one handshake message.
|
2016-07-27 22:40:37 +01:00
|
|
|
if (ssl->d1->r_epoch == 1 && msg_hdr.seq != ssl->d1->handshake_read_seq) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_UNEXPECTED_RECORD);
|
2017-10-06 22:36:20 +01:00
|
|
|
*out_alert = SSL_AD_UNEXPECTED_MESSAGE;
|
|
|
|
return ssl_open_record_error;
|
2016-07-27 22:40:37 +01:00
|
|
|
}
|
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
if (msg_hdr.seq < ssl->d1->handshake_read_seq ||
|
|
|
|
msg_hdr.seq >
|
|
|
|
(unsigned)ssl->d1->handshake_read_seq + SSL_MAX_HANDSHAKE_FLIGHT) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// Ignore fragments from the past, or ones too far in the future.
|
2016-06-23 22:57:19 +01:00
|
|
|
continue;
|
Rewrite DTLS handshake message sending logic.
This fixes a number of bugs with the original logic:
- If handshake messages are fragmented and writes need to be retried, frag_off
gets completely confused.
- The BIO_flush call didn't set rwstate, so it wasn't resumable at that point.
- The msg_callback call gets garbage because the fragment header would get
scribbled over the handshake buffer.
The original logic was also extremely confusing with how it handles init_off.
(init_off gets rewound to make room for the fragment header. Depending on
where you pause, resuming may or may not have already been rewound.)
For simplicity, just allocate a new buffer to assemble the fragment in and
avoid clobbering the old one. I don't think it's worth the complexity to
optimize that. If we want to optimize this sort of thing, not clobbering seems
better anyway because the message may need to be retransmitted. We could avoid
doing a copy when buffering the outgoing message for retransmission later.
We do still need to track how far we are in sending the current message via
init_off, so I haven't opted to disconnect this function from
init_{buf,off,num} yet.
Test the fix to the retry + fragment case by having the splitHandshake option
to the state machine tests, in DTLS, also clamp the MTU to force handshake
fragmentation.
Change-Id: I66f634d6c752ea63649db8ed2f898f9cc2b13908
Reviewed-on: https://boringssl-review.googlesource.com/6421
Reviewed-by: Adam Langley <agl@google.com>
2015-11-03 20:39:45 +00:00
|
|
|
}
|
2015-11-03 19:54:39 +00:00
|
|
|
|
2017-10-06 22:36:20 +01:00
|
|
|
hm_fragment *frag = dtls1_get_incoming_message(ssl, out_alert, &msg_hdr);
|
2016-06-23 22:57:19 +01:00
|
|
|
if (frag == NULL) {
|
2017-10-06 22:36:20 +01:00
|
|
|
return ssl_open_record_error;
|
2015-01-12 00:25:32 +00:00
|
|
|
}
|
2016-07-08 17:34:05 +01:00
|
|
|
assert(frag->msg_len == msg_len);
|
2014-12-14 00:28:18 +00:00
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
if (frag->reassembly == NULL) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// The message is already assembled.
|
2016-06-23 22:57:19 +01:00
|
|
|
continue;
|
2016-06-17 23:44:38 +01:00
|
|
|
}
|
2016-06-23 22:57:19 +01:00
|
|
|
assert(msg_len > 0);
|
2014-12-14 00:28:18 +00:00
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Copy the body into the fragment.
|
2017-01-03 15:30:35 +00:00
|
|
|
OPENSSL_memcpy(frag->data + DTLS1_HM_HEADER_LENGTH + frag_off,
|
|
|
|
CBS_data(&body), CBS_len(&body));
|
2016-06-23 22:57:19 +01:00
|
|
|
dtls1_hm_fragment_mark(frag, frag_off, frag_off + frag_len);
|
2016-06-17 23:48:29 +01:00
|
|
|
}
|
2016-06-23 22:57:19 +01:00
|
|
|
|
2017-10-06 22:36:20 +01:00
|
|
|
return ssl_open_record_success;
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
|
|
|
|
2017-08-01 21:32:25 +01:00
|
|
|
bool dtls1_get_message(SSL *ssl, SSLMessage *out) {
|
|
|
|
if (!dtls1_is_current_message_complete(ssl)) {
|
|
|
|
return false;
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
|
|
|
|
2017-10-17 06:37:51 +01:00
|
|
|
size_t idx = ssl->d1->handshake_read_seq % SSL_MAX_HANDSHAKE_FLIGHT;
|
|
|
|
hm_fragment *frag = ssl->d1->incoming_messages[idx].get();
|
2017-08-01 21:32:25 +01:00
|
|
|
out->type = frag->type;
|
|
|
|
CBS_init(&out->body, frag->data + DTLS1_HM_HEADER_LENGTH, frag->msg_len);
|
|
|
|
CBS_init(&out->raw, frag->data, DTLS1_HM_HEADER_LENGTH + frag->msg_len);
|
|
|
|
out->is_v2_hello = false;
|
|
|
|
if (!ssl->s3->has_message) {
|
2017-10-06 22:54:10 +01:00
|
|
|
ssl_do_msg_callback(ssl, 0 /* read */, SSL3_RT_HANDSHAKE, out->raw);
|
2017-08-31 20:06:42 +01:00
|
|
|
ssl->s3->has_message = true;
|
2017-08-01 23:38:41 +01:00
|
|
|
}
|
2017-08-01 21:32:25 +01:00
|
|
|
return true;
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2017-08-01 22:35:55 +01:00
|
|
|
void dtls1_next_message(SSL *ssl) {
|
2017-08-01 21:32:25 +01:00
|
|
|
assert(ssl->s3->has_message);
|
2016-07-27 22:51:49 +01:00
|
|
|
assert(dtls1_is_current_message_complete(ssl));
|
|
|
|
size_t index = ssl->d1->handshake_read_seq % SSL_MAX_HANDSHAKE_FLIGHT;
|
2017-10-17 06:37:51 +01:00
|
|
|
ssl->d1->incoming_messages[index].reset();
|
2016-07-27 22:51:49 +01:00
|
|
|
ssl->d1->handshake_read_seq++;
|
2017-08-31 20:06:42 +01:00
|
|
|
ssl->s3->has_message = false;
|
2017-08-29 21:33:21 +01:00
|
|
|
// If we previously sent a flight, mark it as having a reply, so
|
|
|
|
// |on_handshake_complete| can manage post-handshake retransmission.
|
2017-08-22 22:47:22 +01:00
|
|
|
if (ssl->d1->outgoing_messages_complete) {
|
|
|
|
ssl->d1->flight_has_reply = true;
|
|
|
|
}
|
2016-07-27 22:51:49 +01:00
|
|
|
}
|
|
|
|
|
2017-10-06 23:26:36 +01:00
|
|
|
bool dtls_has_unprocessed_handshake_data(const SSL *ssl) {
|
|
|
|
if (ssl->d1->has_change_cipher_spec) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-07-15 04:10:43 +01:00
|
|
|
size_t current = ssl->d1->handshake_read_seq % SSL_MAX_HANDSHAKE_FLIGHT;
|
|
|
|
for (size_t i = 0; i < SSL_MAX_HANDSHAKE_FLIGHT; i++) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// Skip the current message.
|
2017-08-01 21:32:25 +01:00
|
|
|
if (ssl->s3->has_message && i == current) {
|
2016-07-27 22:51:49 +01:00
|
|
|
assert(dtls1_is_current_message_complete(ssl));
|
|
|
|
continue;
|
|
|
|
}
|
2017-10-17 06:37:51 +01:00
|
|
|
if (ssl->d1->incoming_messages[i] != nullptr) {
|
2017-10-06 23:26:36 +01:00
|
|
|
return true;
|
2016-07-15 04:10:43 +01:00
|
|
|
}
|
|
|
|
}
|
2017-10-06 23:26:36 +01:00
|
|
|
return false;
|
2016-07-15 04:10:43 +01:00
|
|
|
}
|
|
|
|
|
2017-10-07 09:12:35 +01:00
|
|
|
bool dtls1_parse_fragment(CBS *cbs, struct hm_header_st *out_hdr,
|
|
|
|
CBS *out_body) {
|
2016-12-13 06:07:13 +00:00
|
|
|
OPENSSL_memset(out_hdr, 0x00, sizeof(struct hm_header_st));
|
2016-06-23 22:57:19 +01:00
|
|
|
|
|
|
|
if (!CBS_get_u8(cbs, &out_hdr->type) ||
|
|
|
|
!CBS_get_u24(cbs, &out_hdr->msg_len) ||
|
|
|
|
!CBS_get_u16(cbs, &out_hdr->seq) ||
|
|
|
|
!CBS_get_u24(cbs, &out_hdr->frag_off) ||
|
|
|
|
!CBS_get_u24(cbs, &out_hdr->frag_len) ||
|
|
|
|
!CBS_get_bytes(cbs, out_body, out_hdr->frag_len)) {
|
2017-10-07 09:12:35 +01:00
|
|
|
return false;
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-10-07 09:12:35 +01:00
|
|
|
return true;
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-10-06 22:36:20 +01:00
|
|
|
ssl_open_record_t dtls1_open_change_cipher_spec(SSL *ssl, size_t *out_consumed,
|
|
|
|
uint8_t *out_alert,
|
|
|
|
Span<uint8_t> in) {
|
|
|
|
if (!ssl->d1->has_change_cipher_spec) {
|
|
|
|
// dtls1_open_handshake processes both handshake and ChangeCipherSpec.
|
|
|
|
auto ret = dtls1_open_handshake(ssl, out_consumed, out_alert, in);
|
|
|
|
if (ret != ssl_open_record_success) {
|
2017-06-26 03:42:55 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
2017-10-06 22:36:20 +01:00
|
|
|
if (ssl->d1->has_change_cipher_spec) {
|
|
|
|
ssl->d1->has_change_cipher_spec = false;
|
|
|
|
return ssl_open_record_success;
|
|
|
|
}
|
|
|
|
return ssl_open_record_discard;
|
2017-06-26 03:42:55 +01:00
|
|
|
}
|
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Sending handshake messages.
|
2016-06-23 22:57:19 +01:00
|
|
|
|
2017-10-17 06:12:53 +01:00
|
|
|
void DTLS_OUTGOING_MESSAGE::Clear() {
|
|
|
|
OPENSSL_free(data);
|
|
|
|
data = nullptr;
|
|
|
|
}
|
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
void dtls_clear_outgoing_messages(SSL *ssl) {
|
2016-09-05 17:47:25 +01:00
|
|
|
for (size_t i = 0; i < ssl->d1->outgoing_messages_len; i++) {
|
2017-10-17 06:12:53 +01:00
|
|
|
ssl->d1->outgoing_messages[i].Clear();
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
ssl->d1->outgoing_messages_len = 0;
|
2017-01-03 15:30:35 +00:00
|
|
|
ssl->d1->outgoing_written = 0;
|
|
|
|
ssl->d1->outgoing_offset = 0;
|
2017-08-03 00:46:29 +01:00
|
|
|
ssl->d1->outgoing_messages_complete = false;
|
2017-08-22 22:47:22 +01:00
|
|
|
ssl->d1->flight_has_reply = false;
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-10-07 09:12:35 +01:00
|
|
|
bool dtls1_init_message(SSL *ssl, CBB *cbb, CBB *body, uint8_t type) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// Pick a modest size hint to save most of the |realloc| calls.
|
2016-06-23 22:57:19 +01:00
|
|
|
if (!CBB_init(cbb, 64) ||
|
|
|
|
!CBB_add_u8(cbb, type) ||
|
|
|
|
!CBB_add_u24(cbb, 0 /* length (filled in later) */) ||
|
|
|
|
!CBB_add_u16(cbb, ssl->d1->handshake_write_seq) ||
|
|
|
|
!CBB_add_u24(cbb, 0 /* offset */) ||
|
|
|
|
!CBB_add_u24_length_prefixed(cbb, body)) {
|
2017-10-07 09:12:35 +01:00
|
|
|
return false;
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-10-07 09:12:35 +01:00
|
|
|
return true;
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-10-07 09:12:35 +01:00
|
|
|
bool dtls1_finish_message(SSL *ssl, CBB *cbb, Array<uint8_t> *out_msg) {
|
2017-09-21 16:20:53 +01:00
|
|
|
if (!CBBFinishArray(cbb, out_msg) ||
|
|
|
|
out_msg->size() < DTLS1_HM_HEADER_LENGTH) {
|
2016-06-23 22:57:19 +01:00
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
2017-10-07 09:12:35 +01:00
|
|
|
return false;
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Fix up the header. Copy the fragment length into the total message
|
|
|
|
// length.
|
2017-09-21 16:20:53 +01:00
|
|
|
OPENSSL_memcpy(out_msg->data() + 1,
|
|
|
|
out_msg->data() + DTLS1_HM_HEADER_LENGTH - 3, 3);
|
2017-10-07 09:12:35 +01:00
|
|
|
return true;
|
2016-11-12 03:23:25 +00:00
|
|
|
}
|
2016-06-23 22:57:19 +01:00
|
|
|
|
2018-05-08 23:04:35 +01:00
|
|
|
// ssl_size_t_greater_than_32_bits returns whether |v| exceeds the bounds of a
|
|
|
|
// 32-bit value. The obvious thing doesn't work because, in some 32-bit build
|
|
|
|
// configurations, the compiler warns that the test is always false and breaks
|
|
|
|
// the build.
|
|
|
|
static bool ssl_size_t_greater_than_32_bits(size_t v) {
|
|
|
|
#if defined(OPENSSL_64_BIT)
|
|
|
|
return v > 0xffffffff;
|
|
|
|
#elif defined(OPENSSL_32_BIT)
|
|
|
|
return false;
|
|
|
|
#else
|
|
|
|
#error "Building for neither 32- nor 64-bits."
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// add_outgoing adds a new handshake message or ChangeCipherSpec to the current
|
2017-10-07 09:12:35 +01:00
|
|
|
// outgoing flight. It returns true on success and false on error.
|
2017-10-17 06:12:53 +01:00
|
|
|
static bool add_outgoing(SSL *ssl, bool is_ccs, Array<uint8_t> data) {
|
2017-08-03 00:46:29 +01:00
|
|
|
if (ssl->d1->outgoing_messages_complete) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// If we've begun writing a new flight, we received the peer flight. Discard
|
|
|
|
// the timer and the our flight.
|
2017-08-03 00:46:29 +01:00
|
|
|
dtls1_stop_timer(ssl);
|
|
|
|
dtls_clear_outgoing_messages(ssl);
|
|
|
|
}
|
|
|
|
|
2017-07-15 00:36:07 +01:00
|
|
|
static_assert(SSL_MAX_HANDSHAKE_FLIGHT <
|
|
|
|
(1 << 8 * sizeof(ssl->d1->outgoing_messages_len)),
|
|
|
|
"outgoing_messages_len is too small");
|
2017-09-21 16:20:53 +01:00
|
|
|
if (ssl->d1->outgoing_messages_len >= SSL_MAX_HANDSHAKE_FLIGHT ||
|
2018-05-08 23:04:35 +01:00
|
|
|
ssl_size_t_greater_than_32_bits(data.size())) {
|
2017-10-07 09:12:35 +01:00
|
|
|
assert(false);
|
2017-01-03 15:30:35 +00:00
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
2017-10-07 09:12:35 +01:00
|
|
|
return false;
|
2017-01-03 15:30:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!is_ccs) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// TODO(svaldez): Move this up a layer to fix abstraction for SSLTranscript
|
|
|
|
// on hs.
|
2017-01-12 18:17:07 +00:00
|
|
|
if (ssl->s3->hs != NULL &&
|
2017-10-11 22:19:19 +01:00
|
|
|
!ssl->s3->hs->transcript.Update(data)) {
|
2017-01-12 18:17:07 +00:00
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
2017-10-07 09:12:35 +01:00
|
|
|
return false;
|
2017-01-12 18:17:07 +00:00
|
|
|
}
|
2017-01-03 15:30:35 +00:00
|
|
|
ssl->d1->handshake_write_seq++;
|
|
|
|
}
|
2016-06-23 22:57:19 +01:00
|
|
|
|
2017-01-03 15:30:35 +00:00
|
|
|
DTLS_OUTGOING_MESSAGE *msg =
|
|
|
|
&ssl->d1->outgoing_messages[ssl->d1->outgoing_messages_len];
|
2017-09-21 16:20:53 +01:00
|
|
|
size_t len;
|
|
|
|
data.Release(&msg->data, &len);
|
2017-01-03 15:30:35 +00:00
|
|
|
msg->len = len;
|
|
|
|
msg->epoch = ssl->d1->w_epoch;
|
|
|
|
msg->is_ccs = is_ccs;
|
|
|
|
|
|
|
|
ssl->d1->outgoing_messages_len++;
|
2017-10-07 09:12:35 +01:00
|
|
|
return true;
|
2017-01-03 15:30:35 +00:00
|
|
|
}
|
|
|
|
|
2017-10-07 09:12:35 +01:00
|
|
|
bool dtls1_add_message(SSL *ssl, Array<uint8_t> data) {
|
2017-10-17 06:12:53 +01:00
|
|
|
return add_outgoing(ssl, false /* handshake */, std::move(data));
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-10-07 09:12:35 +01:00
|
|
|
bool dtls1_add_change_cipher_spec(SSL *ssl) {
|
2017-10-17 06:12:53 +01:00
|
|
|
return add_outgoing(ssl, true /* ChangeCipherSpec */, Array<uint8_t>());
|
2017-01-03 15:30:35 +00:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// dtls1_update_mtu updates the current MTU from the BIO, ensuring it is above
|
|
|
|
// the minimum.
|
2017-01-03 15:30:35 +00:00
|
|
|
static void dtls1_update_mtu(SSL *ssl) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// TODO(davidben): No consumer implements |BIO_CTRL_DGRAM_SET_MTU| and the
|
|
|
|
// only |BIO_CTRL_DGRAM_QUERY_MTU| implementation could use
|
|
|
|
// |SSL_set_mtu|. Does this need to be so complex?
|
2017-01-03 15:30:35 +00:00
|
|
|
if (ssl->d1->mtu < dtls1_min_mtu() &&
|
|
|
|
!(SSL_get_options(ssl) & SSL_OP_NO_QUERY_MTU)) {
|
2018-07-03 00:47:27 +01:00
|
|
|
long mtu = BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL);
|
2017-01-03 15:30:35 +00:00
|
|
|
if (mtu >= 0 && mtu <= (1 << 30) && (unsigned)mtu >= dtls1_min_mtu()) {
|
|
|
|
ssl->d1->mtu = (unsigned)mtu;
|
|
|
|
} else {
|
|
|
|
ssl->d1->mtu = kDefaultMTU;
|
2018-07-03 00:47:27 +01:00
|
|
|
BIO_ctrl(ssl->wbio.get(), BIO_CTRL_DGRAM_SET_MTU, ssl->d1->mtu, NULL);
|
2017-01-03 15:30:35 +00:00
|
|
|
}
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// The MTU should be above the minimum now.
|
2017-01-03 15:30:35 +00:00
|
|
|
assert(ssl->d1->mtu >= dtls1_min_mtu());
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
|
|
|
|
2017-01-03 15:30:35 +00:00
|
|
|
enum seal_result_t {
|
|
|
|
seal_error,
|
|
|
|
seal_no_progress,
|
|
|
|
seal_partial,
|
|
|
|
seal_success,
|
|
|
|
};
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// seal_next_message seals |msg|, which must be the next message, to |out|. If
|
|
|
|
// progress was made, it returns |seal_partial| or |seal_success| and sets
|
|
|
|
// |*out_len| to the number of bytes written.
|
2017-01-03 15:30:35 +00:00
|
|
|
static enum seal_result_t seal_next_message(SSL *ssl, uint8_t *out,
|
|
|
|
size_t *out_len, size_t max_out,
|
|
|
|
const DTLS_OUTGOING_MESSAGE *msg) {
|
|
|
|
assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len);
|
|
|
|
assert(msg == &ssl->d1->outgoing_messages[ssl->d1->outgoing_written]);
|
|
|
|
|
2016-06-23 22:57:19 +01:00
|
|
|
enum dtls1_use_epoch_t use_epoch = dtls1_use_current_epoch;
|
2017-07-19 03:45:18 +01:00
|
|
|
if (ssl->d1->w_epoch >= 1 && msg->epoch == ssl->d1->w_epoch - 1) {
|
2016-06-23 22:57:19 +01:00
|
|
|
use_epoch = dtls1_use_previous_epoch;
|
2017-07-19 03:45:18 +01:00
|
|
|
} else if (msg->epoch != ssl->d1->w_epoch) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
|
|
|
return seal_error;
|
2016-06-23 22:57:19 +01:00
|
|
|
}
|
2017-07-19 03:45:18 +01:00
|
|
|
|
2017-01-03 15:30:35 +00:00
|
|
|
size_t overhead = dtls_max_seal_overhead(ssl, use_epoch);
|
|
|
|
size_t prefix = dtls_seal_prefix_len(ssl, use_epoch);
|
2016-06-23 22:57:19 +01:00
|
|
|
|
|
|
|
if (msg->is_ccs) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// Check there is room for the ChangeCipherSpec.
|
2017-01-03 15:30:35 +00:00
|
|
|
static const uint8_t kChangeCipherSpec[1] = {SSL3_MT_CCS};
|
|
|
|
if (max_out < sizeof(kChangeCipherSpec) + overhead) {
|
|
|
|
return seal_no_progress;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!dtls_seal_record(ssl, out, out_len, max_out,
|
|
|
|
SSL3_RT_CHANGE_CIPHER_SPEC, kChangeCipherSpec,
|
|
|
|
sizeof(kChangeCipherSpec), use_epoch)) {
|
|
|
|
return seal_error;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssl_do_msg_callback(ssl, 1 /* write */, SSL3_RT_CHANGE_CIPHER_SPEC,
|
2017-10-04 23:14:28 +01:00
|
|
|
kChangeCipherSpec);
|
2017-01-03 15:30:35 +00:00
|
|
|
return seal_success;
|
2015-11-03 19:54:39 +00:00
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// DTLS messages are serialized as a single fragment in |msg|.
|
2017-01-03 15:30:35 +00:00
|
|
|
CBS cbs, body;
|
|
|
|
struct hm_header_st hdr;
|
|
|
|
CBS_init(&cbs, msg->data, msg->len);
|
|
|
|
if (!dtls1_parse_fragment(&cbs, &hdr, &body) ||
|
|
|
|
hdr.frag_off != 0 ||
|
|
|
|
hdr.frag_len != CBS_len(&body) ||
|
|
|
|
hdr.msg_len != CBS_len(&body) ||
|
|
|
|
!CBS_skip(&body, ssl->d1->outgoing_offset) ||
|
|
|
|
CBS_len(&cbs) != 0) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
|
|
|
return seal_error;
|
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Determine how much progress can be made.
|
2017-01-03 15:30:35 +00:00
|
|
|
if (max_out < DTLS1_HM_HEADER_LENGTH + 1 + overhead || max_out < prefix) {
|
|
|
|
return seal_no_progress;
|
|
|
|
}
|
|
|
|
size_t todo = CBS_len(&body);
|
|
|
|
if (todo > max_out - DTLS1_HM_HEADER_LENGTH - overhead) {
|
|
|
|
todo = max_out - DTLS1_HM_HEADER_LENGTH - overhead;
|
|
|
|
}
|
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// Assemble a fragment, to be sealed in-place.
|
2017-07-20 04:57:40 +01:00
|
|
|
ScopedCBB cbb;
|
2017-01-03 15:30:35 +00:00
|
|
|
uint8_t *frag = out + prefix;
|
|
|
|
size_t max_frag = max_out - prefix, frag_len;
|
2017-07-20 04:57:40 +01:00
|
|
|
if (!CBB_init_fixed(cbb.get(), frag, max_frag) ||
|
|
|
|
!CBB_add_u8(cbb.get(), hdr.type) ||
|
|
|
|
!CBB_add_u24(cbb.get(), hdr.msg_len) ||
|
|
|
|
!CBB_add_u16(cbb.get(), hdr.seq) ||
|
|
|
|
!CBB_add_u24(cbb.get(), ssl->d1->outgoing_offset) ||
|
|
|
|
!CBB_add_u24(cbb.get(), todo) ||
|
|
|
|
!CBB_add_bytes(cbb.get(), CBS_data(&body), todo) ||
|
|
|
|
!CBB_finish(cbb.get(), NULL, &frag_len)) {
|
2017-01-03 15:30:35 +00:00
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_INTERNAL_ERROR);
|
|
|
|
return seal_error;
|
|
|
|
}
|
|
|
|
|
2017-10-04 23:14:28 +01:00
|
|
|
ssl_do_msg_callback(ssl, 1 /* write */, SSL3_RT_HANDSHAKE,
|
|
|
|
MakeSpan(frag, frag_len));
|
2017-01-03 15:30:35 +00:00
|
|
|
|
|
|
|
if (!dtls_seal_record(ssl, out, out_len, max_out, SSL3_RT_HANDSHAKE,
|
|
|
|
out + prefix, frag_len, use_epoch)) {
|
|
|
|
return seal_error;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (todo == CBS_len(&body)) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// The next message is complete.
|
2017-01-03 15:30:35 +00:00
|
|
|
ssl->d1->outgoing_offset = 0;
|
|
|
|
return seal_success;
|
|
|
|
}
|
|
|
|
|
|
|
|
ssl->d1->outgoing_offset += todo;
|
|
|
|
return seal_partial;
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
2014-06-20 20:00:00 +01:00
|
|
|
|
2017-08-29 21:33:21 +01:00
|
|
|
// seal_next_packet writes as much of the next flight as possible to |out| and
|
|
|
|
// advances |ssl->d1->outgoing_written| and |ssl->d1->outgoing_offset| as
|
|
|
|
// appropriate.
|
2017-10-07 09:12:35 +01:00
|
|
|
static bool seal_next_packet(SSL *ssl, uint8_t *out, size_t *out_len,
|
|
|
|
size_t max_out) {
|
|
|
|
bool made_progress = false;
|
2017-01-03 15:30:35 +00:00
|
|
|
size_t total = 0;
|
|
|
|
assert(ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len);
|
|
|
|
for (; ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len;
|
|
|
|
ssl->d1->outgoing_written++) {
|
|
|
|
const DTLS_OUTGOING_MESSAGE *msg =
|
|
|
|
&ssl->d1->outgoing_messages[ssl->d1->outgoing_written];
|
|
|
|
size_t len;
|
|
|
|
enum seal_result_t ret = seal_next_message(ssl, out, &len, max_out, msg);
|
|
|
|
switch (ret) {
|
|
|
|
case seal_error:
|
2017-10-07 09:12:35 +01:00
|
|
|
return false;
|
2017-01-03 15:30:35 +00:00
|
|
|
|
|
|
|
case seal_no_progress:
|
|
|
|
goto packet_full;
|
|
|
|
|
|
|
|
case seal_partial:
|
|
|
|
case seal_success:
|
|
|
|
out += len;
|
|
|
|
max_out -= len;
|
|
|
|
total += len;
|
2017-10-07 09:12:35 +01:00
|
|
|
made_progress = true;
|
2017-01-03 15:30:35 +00:00
|
|
|
|
|
|
|
if (ret == seal_partial) {
|
|
|
|
goto packet_full;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2016-05-06 01:45:48 +01:00
|
|
|
}
|
2017-01-03 15:30:35 +00:00
|
|
|
|
|
|
|
packet_full:
|
2017-08-29 21:33:21 +01:00
|
|
|
// The MTU was too small to make any progress.
|
2017-01-03 15:30:35 +00:00
|
|
|
if (!made_progress) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_MTU_TOO_SMALL);
|
2017-10-07 09:12:35 +01:00
|
|
|
return false;
|
2017-01-03 15:30:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
*out_len = total;
|
2017-10-07 09:12:35 +01:00
|
|
|
return true;
|
2017-01-03 15:30:35 +00:00
|
|
|
}
|
|
|
|
|
2017-08-03 00:46:29 +01:00
|
|
|
static int send_flight(SSL *ssl) {
|
2017-10-12 23:09:20 +01:00
|
|
|
if (ssl->s3->write_shutdown != ssl_shutdown_none) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, SSL_R_PROTOCOL_IS_SHUTDOWN);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2017-01-03 15:30:35 +00:00
|
|
|
dtls1_update_mtu(ssl);
|
2015-02-19 23:51:58 +00:00
|
|
|
|
2016-05-06 01:45:48 +01:00
|
|
|
int ret = -1;
|
2017-07-09 21:17:55 +01:00
|
|
|
uint8_t *packet = (uint8_t *)OPENSSL_malloc(ssl->d1->mtu);
|
2017-01-03 15:30:35 +00:00
|
|
|
if (packet == NULL) {
|
|
|
|
OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (ssl->d1->outgoing_written < ssl->d1->outgoing_messages_len) {
|
|
|
|
uint8_t old_written = ssl->d1->outgoing_written;
|
|
|
|
uint32_t old_offset = ssl->d1->outgoing_offset;
|
|
|
|
|
|
|
|
size_t packet_len;
|
|
|
|
if (!seal_next_packet(ssl, packet, &packet_len, ssl->d1->mtu)) {
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2018-07-03 00:47:27 +01:00
|
|
|
int bio_ret = BIO_write(ssl->wbio.get(), packet, packet_len);
|
2017-01-03 15:30:35 +00:00
|
|
|
if (bio_ret <= 0) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// Retry this packet the next time around.
|
2017-01-03 15:30:35 +00:00
|
|
|
ssl->d1->outgoing_written = old_written;
|
|
|
|
ssl->d1->outgoing_offset = old_offset;
|
2017-10-14 00:17:22 +01:00
|
|
|
ssl->s3->rwstate = SSL_WRITING;
|
2017-01-03 15:30:35 +00:00
|
|
|
ret = bio_ret;
|
2016-05-06 01:45:48 +01:00
|
|
|
goto err;
|
2015-02-19 23:51:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-03 00:47:27 +01:00
|
|
|
if (BIO_flush(ssl->wbio.get()) <= 0) {
|
2017-10-14 00:17:22 +01:00
|
|
|
ssl->s3->rwstate = SSL_WRITING;
|
2017-01-27 15:06:07 +00:00
|
|
|
goto err;
|
2016-05-06 02:17:53 +01:00
|
|
|
}
|
2016-05-06 01:45:48 +01:00
|
|
|
|
2017-01-27 15:06:07 +00:00
|
|
|
ret = 1;
|
|
|
|
|
2016-05-06 01:45:48 +01:00
|
|
|
err:
|
2017-01-03 15:30:35 +00:00
|
|
|
OPENSSL_free(packet);
|
2016-05-06 01:45:48 +01:00
|
|
|
return ret;
|
2015-02-19 23:51:58 +00:00
|
|
|
}
|
|
|
|
|
2017-08-03 00:46:29 +01:00
|
|
|
int dtls1_flush_flight(SSL *ssl) {
|
|
|
|
ssl->d1->outgoing_messages_complete = true;
|
2017-08-29 21:33:21 +01:00
|
|
|
// Start the retransmission timer for the next flight (if any).
|
2017-08-03 00:46:29 +01:00
|
|
|
dtls1_start_timer(ssl);
|
|
|
|
return send_flight(ssl);
|
|
|
|
}
|
|
|
|
|
2017-01-03 15:30:35 +00:00
|
|
|
int dtls1_retransmit_outgoing_messages(SSL *ssl) {
|
2017-08-29 21:33:21 +01:00
|
|
|
// Rewind to the start of the flight and write it again.
|
|
|
|
//
|
|
|
|
// TODO(davidben): This does not allow retransmits to be resumed on
|
|
|
|
// non-blocking write.
|
2017-01-03 15:30:35 +00:00
|
|
|
ssl->d1->outgoing_written = 0;
|
|
|
|
ssl->d1->outgoing_offset = 0;
|
|
|
|
|
2017-08-03 00:46:29 +01:00
|
|
|
return send_flight(ssl);
|
2015-11-03 19:54:39 +00:00
|
|
|
}
|
|
|
|
|
2014-12-14 00:28:18 +00:00
|
|
|
unsigned int dtls1_min_mtu(void) {
|
2015-01-12 00:31:22 +00:00
|
|
|
return kMinMTU;
|
2014-12-14 00:28:18 +00:00
|
|
|
}
|
Move libssl's internals into the bssl namespace.
This is horrible, but everything else I tried was worse. The goal with
this CL is to take the extern "C" out of ssl/internal.h and move most
symbols to namespace bssl, so we can start using C++ helpers and
destructors without worry.
Complications:
- Public API functions must be extern "C" and match their declaration in
ssl.h, which is unnamespaced. C++ really does not want you to
interleave namespaced and unnamespaced things. One can actually write
a namespaced extern "C" function, but this means, from C++'s
perspective, the function is namespaced. Trying to namespace the
public header would worked but ended up too deep a rabbithole.
- Our STACK_OF macros do not work right in namespaces.
- The typedefs for our exposed but opaque types are visible in the
header files and copied into consuming projects as forward
declarations. We ultimately want to give SSL a destructor, but
clobbering an unnamespaced ssl_st::~ssl_st seems bad manners.
- MSVC complains about ambiguous names if one typedefs SSL to bssl::SSL.
This CL opts for:
- ssl/*.cc must begin with #define BORINGSSL_INTERNAL_CXX_TYPES. This
informs the public headers to create forward declarations which are
compatible with our namespaces.
- For now, C++-defined type FOO ends up at bssl::FOO with a typedef
outside. Later I imagine we'll rename many of them.
- Internal functions get namespace bssl, so we stop worrying about
stomping the tls1_prf symbol. Exported C functions are stuck as they
are. Rather than try anything weird, bite the bullet and reorder files
which have a mix of public and private functions. I expect that over
time, the public functions will become fairly small as we move logic
to more idiomatic C++.
Files without any public C functions can just be written normally.
- To avoid MSVC troubles, some bssl types are renamed to CPlusPlusStyle
in advance of them being made idiomatic C++.
Bug: 132
Change-Id: Ic931895e117c38b14ff8d6e5a273e868796c7581
Reviewed-on: https://boringssl-review.googlesource.com/18124
Reviewed-by: David Benjamin <davidben@google.com>
2017-07-18 21:34:25 +01:00
|
|
|
|
Support symbol prefixes
- In base.h, if BORINGSSL_PREFIX is defined, include
boringssl_prefix_symbols.h
- In all .S files, if BORINGSSL_PREFIX is defined, include
boringssl_prefix_symbols_asm.h
- In base.h, BSSL_NAMESPACE_BEGIN and BSSL_NAMESPACE_END are
defined with appropriate values depending on whether
BORINGSSL_PREFIX is defined; these macros are used in place
of 'namespace bssl {' and '}'
- Add util/make_prefix_headers.go, which takes a list of symbols
and auto-generates the header files mentioned above
- In CMakeLists.txt, if BORINGSSL_PREFIX and BORINGSSL_PREFIX_SYMBOLS
are defined, run util/make_prefix_headers.go to generate header
files
- In various CMakeLists.txt files, add "global_target" that all
targets depend on to give us a place to hook logic that must run
before all other targets (in particular, the header file generation
logic)
- Document this in BUILDING.md, including the fact that it is
the caller's responsibility to provide the symbol list and keep it
up to date
- Note that this scheme has not been tested on Windows, and likely
does not work on it; Windows support will need to be added in a
future commit
Change-Id: If66a7157f46b5b66230ef91e15826b910cf979a2
Reviewed-on: https://boringssl-review.googlesource.com/31364
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Reviewed-by: David Benjamin <davidben@google.com>
2018-08-27 02:53:36 +01:00
|
|
|
BSSL_NAMESPACE_END
|