summaryrefslogtreecommitdiff
path: root/networking/tls.c
diff options
context:
space:
mode:
authorJames Byrne <james.byrne@origamienergy.com>2019-07-02 11:35:03 +0200
committerDenys Vlasenko <vda.linux@googlemail.com>2019-07-02 11:35:03 +0200
commit6937487be73cd4563b876413277a295a5fe2f32c (patch)
treef16cc9999a7c827891e6ec8d99c699fc791008ee /networking/tls.c
parentcaecfdc20d450686cd1f7e9b5f650322f894b3c2 (diff)
downloadbusybox-w32-6937487be73cd4563b876413277a295a5fe2f32c.tar.gz
busybox-w32-6937487be73cd4563b876413277a295a5fe2f32c.tar.bz2
busybox-w32-6937487be73cd4563b876413277a295a5fe2f32c.zip
libbb: reduce the overhead of single parameter bb_error_msg() calls
Back in 2007, commit 0c97c9d43707 ("'simple' error message functions by Loic Grenie") introduced bb_simple_perror_msg() to allow for a lower overhead call to bb_perror_msg() when only a string was being printed with no parameters. This saves space for some CPU architectures because it avoids the overhead of a call to a variadic function. However there has never been a simple version of bb_error_msg(), and since 2007 many new calls to bb_perror_msg() have been added that only take a single parameter and so could have been using bb_simple_perror_message(). This changeset introduces 'simple' versions of bb_info_msg(), bb_error_msg(), bb_error_msg_and_die(), bb_herror_msg() and bb_herror_msg_and_die(), and replaces all calls that only take a single parameter, or use something like ("%s", arg), with calls to the corresponding 'simple' version. Since it is likely that single parameter calls to the variadic functions may be accidentally reintroduced in the future a new debugging config option WARN_SIMPLE_MSG has been introduced. This uses some macro magic which will cause any such calls to generate a warning, but this is turned off by default to avoid use of the unpleasant macros in normal circumstances. This is a large changeset due to the number of calls that have been replaced. The only files that contain changes other than simple substitution of function calls are libbb.h, libbb/herror_msg.c, libbb/verror_msg.c and libbb/xfuncs_printf.c. In miscutils/devfsd.c, networking/udhcp/common.h and util-linux/mdev.c additonal macros have been added for logging so that single parameter and multiple parameter logging variants exist. The amount of space saved varies considerably by architecture, and was found to be as follows (for 'defconfig' using GCC 7.4): Arm: -92 bytes MIPS: -52 bytes PPC: -1836 bytes x86_64: -938 bytes Note that for the MIPS architecture only an exception had to be made disabling the 'simple' calls for 'udhcp' (in networking/udhcp/common.h) because it made these files larger on MIPS. Signed-off-by: James Byrne <james.byrne@origamienergy.com> Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
Diffstat (limited to 'networking/tls.c')
-rw-r--r--networking/tls.c14
1 files changed, 7 insertions, 7 deletions
diff --git a/networking/tls.c b/networking/tls.c
index db7be07f3..854937302 100644
--- a/networking/tls.c
+++ b/networking/tls.c
@@ -446,7 +446,7 @@ static void hmac_begin(hmac_precomputed_t *pre, uint8_t *key, unsigned key_size,
446 // than INSIZE bytes will first hash the key using H and then use the 446 // than INSIZE bytes will first hash the key using H and then use the
447 // resultant OUTSIZE byte string as the actual key to HMAC." 447 // resultant OUTSIZE byte string as the actual key to HMAC."
448 if (key_size > SHA_INSIZE) { 448 if (key_size > SHA_INSIZE) {
449 bb_error_msg_and_die("HMAC key>64"); //does not happen (yet?) 449 bb_simple_error_msg_and_die("HMAC key>64"); //does not happen (yet?)
450// md5sha_ctx_t ctx; 450// md5sha_ctx_t ctx;
451// begin(&ctx); 451// begin(&ctx);
452// md5sha_hash(&ctx, key, key_size); 452// md5sha_hash(&ctx, key, key_size);
@@ -1132,7 +1132,7 @@ static int tls_xread_record(tls_state_t *tls, const char *expected)
1132 } 1132 }
1133 } 1133 }
1134 if (sz < 0) 1134 if (sz < 0)
1135 bb_error_msg_and_die("encrypted data too short"); 1135 bb_simple_error_msg_and_die("encrypted data too short");
1136 1136
1137 //dump_hex("<< %s\n", tls->inbuf, RECHDR_LEN + sz); 1137 //dump_hex("<< %s\n", tls->inbuf, RECHDR_LEN + sz);
1138 1138
@@ -1411,7 +1411,7 @@ static void find_key_in_der_cert(tls_state_t *tls, uint8_t *der, int len)
1411 dbg("ECDSA key\n"); 1411 dbg("ECDSA key\n");
1412 //UNUSED: tls->flags |= GOT_CERT_ECDSA_KEY_ALG; 1412 //UNUSED: tls->flags |= GOT_CERT_ECDSA_KEY_ALG;
1413 } else 1413 } else
1414 bb_error_msg_and_die("not RSA or ECDSA cert"); 1414 bb_simple_error_msg_and_die("not RSA or ECDSA cert");
1415 } 1415 }
1416 1416
1417 if (tls->flags & GOT_CERT_RSA_KEY_ALG) { 1417 if (tls->flags & GOT_CERT_RSA_KEY_ALG) {
@@ -1882,7 +1882,7 @@ static void process_server_key(tls_state_t *tls, int len)
1882 /* So far we only support curve_x25519 */ 1882 /* So far we only support curve_x25519 */
1883 move_from_unaligned32(t32, keybuf); 1883 move_from_unaligned32(t32, keybuf);
1884 if (t32 != htonl(0x03001d20)) 1884 if (t32 != htonl(0x03001d20))
1885 bb_error_msg_and_die("elliptic curve is not x25519"); 1885 bb_simple_error_msg_and_die("elliptic curve is not x25519");
1886 1886
1887 memcpy(tls->hsd->ecc_pub_key32, keybuf + 4, 32); 1887 memcpy(tls->hsd->ecc_pub_key32, keybuf + 4, 32);
1888 tls->flags |= GOT_EC_KEY; 1888 tls->flags |= GOT_EC_KEY;
@@ -1929,7 +1929,7 @@ static void send_client_key_exchange(tls_state_t *tls)
1929 if (!(tls->flags & NEED_EC_KEY)) { 1929 if (!(tls->flags & NEED_EC_KEY)) {
1930 /* RSA */ 1930 /* RSA */
1931 if (!(tls->flags & GOT_CERT_RSA_KEY_ALG)) 1931 if (!(tls->flags & GOT_CERT_RSA_KEY_ALG))
1932 bb_error_msg("server cert is not RSA"); 1932 bb_simple_error_msg("server cert is not RSA");
1933 1933
1934 tls_get_random(rsa_premaster, sizeof(rsa_premaster)); 1934 tls_get_random(rsa_premaster, sizeof(rsa_premaster));
1935 if (TLS_DEBUG_FIXED_SECRETS) 1935 if (TLS_DEBUG_FIXED_SECRETS)
@@ -1959,7 +1959,7 @@ static void send_client_key_exchange(tls_state_t *tls)
1959 uint8_t privkey[CURVE25519_KEYSIZE]; //[32] 1959 uint8_t privkey[CURVE25519_KEYSIZE]; //[32]
1960 1960
1961 if (!(tls->flags & GOT_EC_KEY)) 1961 if (!(tls->flags & GOT_EC_KEY))
1962 bb_error_msg("server did not provide EC key"); 1962 bb_simple_error_msg("server did not provide EC key");
1963 1963
1964 /* Generate random private key, see RFC 7748 */ 1964 /* Generate random private key, see RFC 7748 */
1965 tls_get_random(privkey, sizeof(privkey)); 1965 tls_get_random(privkey, sizeof(privkey));
@@ -2322,7 +2322,7 @@ void FAST_FUNC tls_run_copy_loop(tls_state_t *tls, unsigned flags)
2322 int nread; 2322 int nread;
2323 2323
2324 if (safe_poll(pfds, 2, -1) < 0) 2324 if (safe_poll(pfds, 2, -1) < 0)
2325 bb_perror_msg_and_die("poll"); 2325 bb_simple_perror_msg_and_die("poll");
2326 2326
2327 if (pfds[0].revents) { 2327 if (pfds[0].revents) {
2328 void *buf; 2328 void *buf;