Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.
 
 
 
 
 
 

212 строки
6.6 KiB

  1. /* Copyright (c) 2018, Google Inc.
  2. *
  3. * Permission to use, copy, modify, and/or distribute this software for any
  4. * purpose with or without fee is hereby granted, provided that the above
  5. * copyright notice and this permission notice appear in all copies.
  6. *
  7. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  8. * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  9. * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
  10. * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  11. * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
  12. * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
  13. * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
  14. #include "handshake_util.h"
  15. #include <assert.h>
  16. #include <functional>
  17. #include "async_bio.h"
  18. #include "packeted_bio.h"
  19. #include "test_config.h"
  20. #include "test_state.h"
  21. #include <openssl/ssl.h>
  22. using namespace bssl;
  23. bool RetryAsync(SSL *ssl, int ret) {
  24. // No error; don't retry.
  25. if (ret >= 0) {
  26. return false;
  27. }
  28. TestState *test_state = GetTestState(ssl);
  29. assert(GetTestConfig(ssl)->async);
  30. if (test_state->packeted_bio != nullptr &&
  31. PacketedBioAdvanceClock(test_state->packeted_bio)) {
  32. // The DTLS retransmit logic silently ignores write failures. So the test
  33. // may progress, allow writes through synchronously.
  34. AsyncBioEnforceWriteQuota(test_state->async_bio, false);
  35. int timeout_ret = DTLSv1_handle_timeout(ssl);
  36. AsyncBioEnforceWriteQuota(test_state->async_bio, true);
  37. if (timeout_ret < 0) {
  38. fprintf(stderr, "Error retransmitting.\n");
  39. return false;
  40. }
  41. return true;
  42. }
  43. // See if we needed to read or write more. If so, allow one byte through on
  44. // the appropriate end to maximally stress the state machine.
  45. switch (SSL_get_error(ssl, ret)) {
  46. case SSL_ERROR_WANT_READ:
  47. AsyncBioAllowRead(test_state->async_bio, 1);
  48. return true;
  49. case SSL_ERROR_WANT_WRITE:
  50. AsyncBioAllowWrite(test_state->async_bio, 1);
  51. return true;
  52. case SSL_ERROR_WANT_CHANNEL_ID_LOOKUP: {
  53. UniquePtr<EVP_PKEY> pkey =
  54. LoadPrivateKey(GetTestConfig(ssl)->send_channel_id);
  55. if (!pkey) {
  56. return false;
  57. }
  58. test_state->channel_id = std::move(pkey);
  59. return true;
  60. }
  61. case SSL_ERROR_WANT_X509_LOOKUP:
  62. test_state->cert_ready = true;
  63. return true;
  64. case SSL_ERROR_PENDING_SESSION:
  65. test_state->session = std::move(test_state->pending_session);
  66. return true;
  67. case SSL_ERROR_PENDING_CERTIFICATE:
  68. test_state->early_callback_ready = true;
  69. return true;
  70. case SSL_ERROR_WANT_PRIVATE_KEY_OPERATION:
  71. test_state->private_key_retries++;
  72. return true;
  73. case SSL_ERROR_WANT_CERTIFICATE_VERIFY:
  74. test_state->custom_verify_ready = true;
  75. return true;
  76. default:
  77. return false;
  78. }
  79. }
  80. int CheckIdempotentError(const char *name, SSL *ssl,
  81. std::function<int()> func) {
  82. int ret = func();
  83. int ssl_err = SSL_get_error(ssl, ret);
  84. uint32_t err = ERR_peek_error();
  85. if (ssl_err == SSL_ERROR_SSL || ssl_err == SSL_ERROR_ZERO_RETURN) {
  86. int ret2 = func();
  87. int ssl_err2 = SSL_get_error(ssl, ret2);
  88. uint32_t err2 = ERR_peek_error();
  89. if (ret != ret2 || ssl_err != ssl_err2 || err != err2) {
  90. fprintf(stderr, "Repeating %s did not replay the error.\n", name);
  91. char buf[256];
  92. ERR_error_string_n(err, buf, sizeof(buf));
  93. fprintf(stderr, "Wanted: %d %d %s\n", ret, ssl_err, buf);
  94. ERR_error_string_n(err2, buf, sizeof(buf));
  95. fprintf(stderr, "Got: %d %d %s\n", ret2, ssl_err2, buf);
  96. // runner treats exit code 90 as always failing. Otherwise, it may
  97. // accidentally consider the result an expected protocol failure.
  98. exit(90);
  99. }
  100. }
  101. return ret;
  102. }
  103. // MoveBIOs moves the |BIO|s of |src| to |dst|. It is used for handoff.
  104. static void MoveBIOs(SSL *dest, SSL *src) {
  105. BIO *rbio = SSL_get_rbio(src);
  106. BIO_up_ref(rbio);
  107. SSL_set0_rbio(dest, rbio);
  108. BIO *wbio = SSL_get_wbio(src);
  109. BIO_up_ref(wbio);
  110. SSL_set0_wbio(dest, wbio);
  111. SSL_set0_rbio(src, nullptr);
  112. SSL_set0_wbio(src, nullptr);
  113. }
  114. static bool HandoffReady(SSL *ssl, int ret) {
  115. return ret < 0 && SSL_get_error(ssl, ret) == SSL_ERROR_HANDOFF;
  116. }
  117. static bool HandbackReady(SSL *ssl, int ret) {
  118. return ret < 0 && SSL_get_error(ssl, ret) == SSL_ERROR_HANDBACK;
  119. }
  120. bool DoSplitHandshake(UniquePtr<SSL> *ssl_uniqueptr, SettingsWriter *writer,
  121. bool is_resume) {
  122. SSL *ssl = ssl_uniqueptr->get();
  123. SSL_set_handoff_mode(ssl, 1);
  124. const TestConfig *config = GetTestConfig(ssl);
  125. int ret = -1;
  126. do {
  127. ret = CheckIdempotentError("SSL_do_handshake", ssl,
  128. [&]() -> int { return SSL_do_handshake(ssl); });
  129. } while (!HandoffReady(ssl, ret) &&
  130. config->async &&
  131. RetryAsync(ssl, ret));
  132. ScopedCBB cbb;
  133. Array<uint8_t> handoff;
  134. if (!HandoffReady(ssl, ret) ||
  135. !CBB_init(cbb.get(), 512) ||
  136. !SSL_serialize_handoff(ssl, cbb.get()) ||
  137. !CBBFinishArray(cbb.get(), &handoff) ||
  138. !writer->WriteHandoff(handoff)) {
  139. fprintf(stderr, "Handoff failed.\n");
  140. return false;
  141. }
  142. UniquePtr<SSL_CTX> ctx = config->SetupCtx(ssl->ctx.get());
  143. if (!ctx) {
  144. return false;
  145. }
  146. UniquePtr<SSL> ssl_handshaker =
  147. config->NewSSL(ctx.get(), nullptr, false, nullptr);
  148. if (!ssl_handshaker) {
  149. return false;
  150. }
  151. MoveBIOs(ssl_handshaker.get(), ssl);
  152. if (!MoveTestState(ssl_handshaker.get(), ssl) ||
  153. !SSL_apply_handoff(ssl_handshaker.get(), handoff)) {
  154. fprintf(stderr, "Handoff application failed.\n");
  155. return false;
  156. }
  157. do {
  158. ret = CheckIdempotentError(
  159. "SSL_do_handshake", ssl_handshaker.get(),
  160. [&]() -> int { return SSL_do_handshake(ssl_handshaker.get()); });
  161. } while (config->async && RetryAsync(ssl_handshaker.get(), ret));
  162. Array<uint8_t> handback;
  163. if (!HandbackReady(ssl_handshaker.get(), ret) ||
  164. !CBB_init(cbb.get(), 512) ||
  165. !SSL_serialize_handback(ssl_handshaker.get(), cbb.get()) ||
  166. !CBBFinishArray(cbb.get(), &handback) ||
  167. !writer->WriteHandback(handback)) {
  168. fprintf(stderr, "Handback failed.\n");
  169. return false;
  170. }
  171. UniquePtr<SSL> ssl_handback =
  172. config->NewSSL(ctx.get(), nullptr, false, nullptr);
  173. if (!ssl_handback) {
  174. return false;
  175. }
  176. MoveBIOs(ssl_handback.get(), ssl_handshaker.get());
  177. if (!MoveTestState(ssl_handback.get(), ssl_handshaker.get()) ||
  178. !SSL_apply_handback(ssl_handback.get(), handback)) {
  179. fprintf(stderr, "Handback application failed.\n");
  180. return false;
  181. }
  182. *ssl_uniqueptr = std::move(ssl_handback);
  183. return true;
  184. }