diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/d1_both.c | 1066 |
1 files changed, 501 insertions, 565 deletions
diff --git a/src/lib/libssl/d1_both.c b/src/lib/libssl/d1_both.c index a265fed22f..c051e84874 100644 --- a/src/lib/libssl/d1_both.c +++ b/src/lib/libssl/d1_both.c | |||
| @@ -152,102 +152,102 @@ | |||
| 152 | printf("\n"); } | 152 | printf("\n"); } |
| 153 | #endif | 153 | #endif |
| 154 | 154 | ||
| 155 | static unsigned char bitmask_start_values[] = {0xff, 0xfe, 0xfc, 0xf8, 0xf0, 0xe0, 0xc0, 0x80}; | 155 | static unsigned char bitmask_start_values[] = { |
| 156 | static unsigned char bitmask_end_values[] = {0xff, 0x01, 0x03, 0x07, 0x0f, 0x1f, 0x3f, 0x7f}; | 156 | 0xff, 0xfe, 0xfc, 0xf8, 0xf0, 0xe0, 0xc0, 0x80 |
| 157 | }; | ||
| 158 | static unsigned char bitmask_end_values[] = { | ||
| 159 | 0xff, 0x01, 0x03, 0x07, 0x0f, 0x1f, 0x3f, 0x7f | ||
| 160 | }; | ||
| 157 | 161 | ||
| 158 | /* XDTLS: figure out the right values */ | 162 | /* XDTLS: figure out the right values */ |
| 159 | static unsigned int g_probable_mtu[] = {1500 - 28, 512 - 28, 256 - 28}; | 163 | static unsigned int g_probable_mtu[] = {1500 - 28, 512 - 28, 256 - 28}; |
| 160 | 164 | ||
| 161 | static unsigned int dtls1_guess_mtu(unsigned int curr_mtu); | 165 | static unsigned int dtls1_guess_mtu(unsigned int curr_mtu); |
| 162 | static void dtls1_fix_message_header(SSL *s, unsigned long frag_off, | 166 | static void dtls1_fix_message_header(SSL *s, unsigned long frag_off, |
| 163 | unsigned long frag_len); | 167 | unsigned long frag_len); |
| 164 | static unsigned char *dtls1_write_message_header(SSL *s, | 168 | static unsigned char *dtls1_write_message_header(SSL *s, unsigned char *p); |
| 165 | unsigned char *p); | ||
| 166 | static void dtls1_set_message_header_int(SSL *s, unsigned char mt, | 169 | static void dtls1_set_message_header_int(SSL *s, unsigned char mt, |
| 167 | unsigned long len, unsigned short seq_num, unsigned long frag_off, | 170 | unsigned long len, unsigned short seq_num, unsigned long frag_off, |
| 168 | unsigned long frag_len); | 171 | unsigned long frag_len); |
| 169 | static long dtls1_get_message_fragment(SSL *s, int st1, int stn, | 172 | static long dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, |
| 170 | long max, int *ok); | 173 | int *ok); |
| 171 | 174 | ||
| 172 | static hm_fragment * | 175 | static hm_fragment * |
| 173 | dtls1_hm_fragment_new(unsigned long frag_len, int reassembly) | 176 | dtls1_hm_fragment_new(unsigned long frag_len, int reassembly) |
| 174 | { | 177 | { |
| 175 | hm_fragment *frag = NULL; | 178 | hm_fragment *frag = NULL; |
| 176 | unsigned char *buf = NULL; | 179 | unsigned char *buf = NULL; |
| 177 | unsigned char *bitmask = NULL; | 180 | unsigned char *bitmask = NULL; |
| 178 | 181 | ||
| 179 | frag = (hm_fragment *)OPENSSL_malloc(sizeof(hm_fragment)); | 182 | frag = (hm_fragment *)OPENSSL_malloc(sizeof(hm_fragment)); |
| 180 | if ( frag == NULL) | 183 | if (frag == NULL) |
| 181 | return NULL; | 184 | return NULL; |
| 182 | 185 | ||
| 183 | if (frag_len) | 186 | if (frag_len) { |
| 184 | { | ||
| 185 | buf = (unsigned char *)OPENSSL_malloc(frag_len); | 187 | buf = (unsigned char *)OPENSSL_malloc(frag_len); |
| 186 | if ( buf == NULL) | 188 | if (buf == NULL) { |
| 187 | { | ||
| 188 | OPENSSL_free(frag); | 189 | OPENSSL_free(frag); |
| 189 | return NULL; | 190 | return NULL; |
| 190 | } | ||
| 191 | } | 191 | } |
| 192 | } | ||
| 192 | 193 | ||
| 193 | /* zero length fragment gets zero frag->fragment */ | 194 | /* zero length fragment gets zero frag->fragment */ |
| 194 | frag->fragment = buf; | 195 | frag->fragment = buf; |
| 195 | 196 | ||
| 196 | /* Initialize reassembly bitmask if necessary */ | 197 | /* Initialize reassembly bitmask if necessary */ |
| 197 | if (reassembly) | 198 | if (reassembly) { |
| 198 | { | ||
| 199 | bitmask = (unsigned char *)OPENSSL_malloc(RSMBLY_BITMASK_SIZE(frag_len)); | 199 | bitmask = (unsigned char *)OPENSSL_malloc(RSMBLY_BITMASK_SIZE(frag_len)); |
| 200 | if (bitmask == NULL) | 200 | if (bitmask == NULL) { |
| 201 | { | 201 | if (buf != NULL) |
| 202 | if (buf != NULL) OPENSSL_free(buf); | 202 | OPENSSL_free(buf); |
| 203 | OPENSSL_free(frag); | 203 | OPENSSL_free(frag); |
| 204 | return NULL; | 204 | return NULL; |
| 205 | } | ||
| 206 | memset(bitmask, 0, RSMBLY_BITMASK_SIZE(frag_len)); | ||
| 207 | } | 205 | } |
| 206 | memset(bitmask, 0, RSMBLY_BITMASK_SIZE(frag_len)); | ||
| 207 | } | ||
| 208 | 208 | ||
| 209 | frag->reassembly = bitmask; | 209 | frag->reassembly = bitmask; |
| 210 | 210 | ||
| 211 | return frag; | 211 | return frag; |
| 212 | } | 212 | } |
| 213 | 213 | ||
| 214 | static void | 214 | static void |
| 215 | dtls1_hm_fragment_free(hm_fragment *frag) | 215 | dtls1_hm_fragment_free(hm_fragment *frag) |
| 216 | { | 216 | { |
| 217 | 217 | ||
| 218 | if (frag->msg_header.is_ccs) | 218 | if (frag->msg_header.is_ccs) { |
| 219 | { | ||
| 220 | EVP_CIPHER_CTX_free(frag->msg_header.saved_retransmit_state.enc_write_ctx); | 219 | EVP_CIPHER_CTX_free(frag->msg_header.saved_retransmit_state.enc_write_ctx); |
| 221 | EVP_MD_CTX_destroy(frag->msg_header.saved_retransmit_state.write_hash); | 220 | EVP_MD_CTX_destroy(frag->msg_header.saved_retransmit_state.write_hash); |
| 222 | } | ||
| 223 | if (frag->fragment) OPENSSL_free(frag->fragment); | ||
| 224 | if (frag->reassembly) OPENSSL_free(frag->reassembly); | ||
| 225 | OPENSSL_free(frag); | ||
| 226 | } | 221 | } |
| 222 | if (frag->fragment) | ||
| 223 | OPENSSL_free(frag->fragment); | ||
| 224 | if (frag->reassembly) | ||
| 225 | OPENSSL_free(frag->reassembly); | ||
| 226 | OPENSSL_free(frag); | ||
| 227 | } | ||
| 227 | 228 | ||
| 228 | /* send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or SSL3_RT_CHANGE_CIPHER_SPEC) */ | 229 | /* send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or SSL3_RT_CHANGE_CIPHER_SPEC) */ |
| 229 | int dtls1_do_write(SSL *s, int type) | 230 | int |
| 230 | { | 231 | dtls1_do_write(SSL *s, int type) |
| 232 | { | ||
| 231 | int ret; | 233 | int ret; |
| 232 | int curr_mtu; | 234 | int curr_mtu; |
| 233 | unsigned int len, frag_off, mac_size, blocksize; | 235 | unsigned int len, frag_off, mac_size, blocksize; |
| 234 | 236 | ||
| 235 | /* AHA! Figure out the MTU, and stick to the right size */ | 237 | /* AHA! Figure out the MTU, and stick to the right size */ |
| 236 | if (s->d1->mtu < dtls1_min_mtu() && !(SSL_get_options(s) & SSL_OP_NO_QUERY_MTU)) | 238 | if (s->d1->mtu < dtls1_min_mtu() && !(SSL_get_options(s) & SSL_OP_NO_QUERY_MTU)) { |
| 237 | { | 239 | s->d1->mtu = BIO_ctrl(SSL_get_wbio(s), |
| 238 | s->d1->mtu = | 240 | BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL); |
| 239 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL); | ||
| 240 | 241 | ||
| 241 | /* I've seen the kernel return bogus numbers when it doesn't know | 242 | /* I've seen the kernel return bogus numbers when it doesn't know |
| 242 | * (initial write), so just make sure we have a reasonable number */ | 243 | * (initial write), so just make sure we have a reasonable number */ |
| 243 | if (s->d1->mtu < dtls1_min_mtu()) | 244 | if (s->d1->mtu < dtls1_min_mtu()) { |
| 244 | { | ||
| 245 | s->d1->mtu = 0; | 245 | s->d1->mtu = 0; |
| 246 | s->d1->mtu = dtls1_guess_mtu(s->d1->mtu); | 246 | s->d1->mtu = dtls1_guess_mtu(s->d1->mtu); |
| 247 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SET_MTU, | 247 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SET_MTU, |
| 248 | s->d1->mtu, NULL); | 248 | s->d1->mtu, NULL); |
| 249 | } | ||
| 250 | } | 249 | } |
| 250 | } | ||
| 251 | #if 0 | 251 | #if 0 |
| 252 | mtu = s->d1->mtu; | 252 | mtu = s->d1->mtu; |
| 253 | 253 | ||
| @@ -257,154 +257,144 @@ int dtls1_do_write(SSL *s, int type) | |||
| 257 | 257 | ||
| 258 | curr_mtu = mtu - BIO_wpending(SSL_get_wbio(s)); | 258 | curr_mtu = mtu - BIO_wpending(SSL_get_wbio(s)); |
| 259 | 259 | ||
| 260 | if ( curr_mtu > 0) | 260 | if (curr_mtu > 0) |
| 261 | mtu = curr_mtu; | 261 | mtu = curr_mtu; |
| 262 | else if ( ( ret = BIO_flush(SSL_get_wbio(s))) <= 0) | 262 | else if (( ret = BIO_flush(SSL_get_wbio(s))) <= 0) |
| 263 | return ret; | 263 | return ret; |
| 264 | 264 | ||
| 265 | if ( BIO_wpending(SSL_get_wbio(s)) + s->init_num >= mtu) | 265 | if (BIO_wpending(SSL_get_wbio(s)) + s->init_num >= mtu) { |
| 266 | { | ||
| 267 | ret = BIO_flush(SSL_get_wbio(s)); | 266 | ret = BIO_flush(SSL_get_wbio(s)); |
| 268 | if ( ret <= 0) | 267 | if (ret <= 0) |
| 269 | return ret; | 268 | return ret; |
| 270 | mtu = s->d1->mtu - (DTLS1_HM_HEADER_LENGTH + DTLS1_RT_HEADER_LENGTH); | 269 | mtu = s->d1->mtu - (DTLS1_HM_HEADER_LENGTH + DTLS1_RT_HEADER_LENGTH); |
| 271 | } | 270 | } |
| 272 | #endif | 271 | #endif |
| 273 | 272 | ||
| 274 | OPENSSL_assert(s->d1->mtu >= dtls1_min_mtu()); /* should have something reasonable now */ | 273 | OPENSSL_assert(s->d1->mtu >= dtls1_min_mtu()); |
| 274 | /* should have something reasonable now */ | ||
| 275 | 275 | ||
| 276 | if ( s->init_off == 0 && type == SSL3_RT_HANDSHAKE) | 276 | if (s->init_off == 0 && type == SSL3_RT_HANDSHAKE) |
| 277 | OPENSSL_assert(s->init_num == | 277 | OPENSSL_assert(s->init_num == |
| 278 | (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH); | 278 | (int)s->d1->w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH); |
| 279 | 279 | ||
| 280 | if (s->write_hash) | 280 | if (s->write_hash) |
| 281 | mac_size = EVP_MD_CTX_size(s->write_hash); | 281 | mac_size = EVP_MD_CTX_size(s->write_hash); |
| 282 | else | 282 | else |
| 283 | mac_size = 0; | 283 | mac_size = 0; |
| 284 | 284 | ||
| 285 | if (s->enc_write_ctx && | 285 | if (s->enc_write_ctx && |
| 286 | (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE)) | 286 | (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE)) |
| 287 | blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher); | 287 | blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher); |
| 288 | else | 288 | else |
| 289 | blocksize = 0; | 289 | blocksize = 0; |
| 290 | 290 | ||
| 291 | frag_off = 0; | 291 | frag_off = 0; |
| 292 | while( s->init_num) | 292 | while (s->init_num) { |
| 293 | { | 293 | curr_mtu = s->d1->mtu - BIO_wpending(SSL_get_wbio(s)) - |
| 294 | curr_mtu = s->d1->mtu - BIO_wpending(SSL_get_wbio(s)) - | 294 | DTLS1_RT_HEADER_LENGTH - mac_size - blocksize; |
| 295 | DTLS1_RT_HEADER_LENGTH - mac_size - blocksize; | ||
| 296 | 295 | ||
| 297 | if ( curr_mtu <= DTLS1_HM_HEADER_LENGTH) | 296 | if (curr_mtu <= DTLS1_HM_HEADER_LENGTH) { |
| 298 | { | ||
| 299 | /* grr.. we could get an error if MTU picked was wrong */ | 297 | /* grr.. we could get an error if MTU picked was wrong */ |
| 300 | ret = BIO_flush(SSL_get_wbio(s)); | 298 | ret = BIO_flush(SSL_get_wbio(s)); |
| 301 | if ( ret <= 0) | 299 | if (ret <= 0) |
| 302 | return ret; | 300 | return ret; |
| 303 | curr_mtu = s->d1->mtu - DTLS1_RT_HEADER_LENGTH - | 301 | curr_mtu = s->d1->mtu - DTLS1_RT_HEADER_LENGTH - |
| 304 | mac_size - blocksize; | 302 | mac_size - blocksize; |
| 305 | } | 303 | } |
| 306 | 304 | ||
| 307 | if ( s->init_num > curr_mtu) | 305 | if (s->init_num > curr_mtu) |
| 308 | len = curr_mtu; | 306 | len = curr_mtu; |
| 309 | else | 307 | else |
| 310 | len = s->init_num; | 308 | len = s->init_num; |
| 311 | 309 | ||
| 312 | 310 | ||
| 313 | /* XDTLS: this function is too long. split out the CCS part */ | 311 | /* XDTLS: this function is too long. split out the CCS part */ |
| 314 | if ( type == SSL3_RT_HANDSHAKE) | 312 | if (type == SSL3_RT_HANDSHAKE) { |
| 315 | { | 313 | if (s->init_off != 0) { |
| 316 | if ( s->init_off != 0) | ||
| 317 | { | ||
| 318 | OPENSSL_assert(s->init_off > DTLS1_HM_HEADER_LENGTH); | 314 | OPENSSL_assert(s->init_off > DTLS1_HM_HEADER_LENGTH); |
| 319 | s->init_off -= DTLS1_HM_HEADER_LENGTH; | 315 | s->init_off -= DTLS1_HM_HEADER_LENGTH; |
| 320 | s->init_num += DTLS1_HM_HEADER_LENGTH; | 316 | s->init_num += DTLS1_HM_HEADER_LENGTH; |
| 321 | 317 | ||
| 322 | if ( s->init_num > curr_mtu) | 318 | if (s->init_num > curr_mtu) |
| 323 | len = curr_mtu; | 319 | len = curr_mtu; |
| 324 | else | 320 | else |
| 325 | len = s->init_num; | 321 | len = s->init_num; |
| 326 | } | 322 | } |
| 327 | 323 | ||
| 328 | dtls1_fix_message_header(s, frag_off, | 324 | dtls1_fix_message_header(s, frag_off, |
| 329 | len - DTLS1_HM_HEADER_LENGTH); | 325 | len - DTLS1_HM_HEADER_LENGTH); |
| 330 | 326 | ||
| 331 | dtls1_write_message_header(s, (unsigned char *)&s->init_buf->data[s->init_off]); | 327 | dtls1_write_message_header(s, (unsigned char *)&s->init_buf->data[s->init_off]); |
| 332 | 328 | ||
| 333 | OPENSSL_assert(len >= DTLS1_HM_HEADER_LENGTH); | 329 | OPENSSL_assert(len >= DTLS1_HM_HEADER_LENGTH); |
| 334 | } | 330 | } |
| 335 | 331 | ||
| 336 | ret=dtls1_write_bytes(s,type,&s->init_buf->data[s->init_off], | 332 | ret = dtls1_write_bytes(s, type, |
| 337 | len); | 333 | &s->init_buf->data[s->init_off], len); |
| 338 | if (ret < 0) | 334 | if (ret < 0) { |
| 339 | { | ||
| 340 | /* might need to update MTU here, but we don't know | 335 | /* might need to update MTU here, but we don't know |
| 341 | * which previous packet caused the failure -- so can't | 336 | * which previous packet caused the failure -- so can't |
| 342 | * really retransmit anything. continue as if everything | 337 | * really retransmit anything. continue as if everything |
| 343 | * is fine and wait for an alert to handle the | 338 | * is fine and wait for an alert to handle the |
| 344 | * retransmit | 339 | * retransmit |
| 345 | */ | 340 | */ |
| 346 | if ( BIO_ctrl(SSL_get_wbio(s), | 341 | if (BIO_ctrl(SSL_get_wbio(s), |
| 347 | BIO_CTRL_DGRAM_MTU_EXCEEDED, 0, NULL) > 0 ) | 342 | BIO_CTRL_DGRAM_MTU_EXCEEDED, 0, NULL) > 0) |
| 348 | s->d1->mtu = BIO_ctrl(SSL_get_wbio(s), | 343 | s->d1->mtu = BIO_ctrl(SSL_get_wbio(s), |
| 349 | BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL); | 344 | BIO_CTRL_DGRAM_QUERY_MTU, 0, NULL); |
| 350 | else | 345 | else |
| 351 | return(-1); | 346 | return (-1); |
| 352 | } | 347 | } else { |
| 353 | else | ||
| 354 | { | ||
| 355 | 348 | ||
| 356 | /* bad if this assert fails, only part of the handshake | 349 | /* bad if this assert fails, only part of the handshake |
| 357 | * message got sent. but why would this happen? */ | 350 | * message got sent. but why would this happen? */ |
| 358 | OPENSSL_assert(len == (unsigned int)ret); | 351 | OPENSSL_assert(len == (unsigned int)ret); |
| 359 | 352 | ||
| 360 | if (type == SSL3_RT_HANDSHAKE && ! s->d1->retransmitting) | 353 | if (type == SSL3_RT_HANDSHAKE && ! s->d1->retransmitting) { |
| 361 | { | ||
| 362 | /* should not be done for 'Hello Request's, but in that case | 354 | /* should not be done for 'Hello Request's, but in that case |
| 363 | * we'll ignore the result anyway */ | 355 | * we'll ignore the result anyway */ |
| 364 | unsigned char *p = (unsigned char *)&s->init_buf->data[s->init_off]; | 356 | unsigned char *p = (unsigned char *)&s->init_buf->data[s->init_off]; |
| 365 | const struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; | 357 | const struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; |
| 366 | int xlen; | 358 | int xlen; |
| 367 | 359 | ||
| 368 | if (frag_off == 0 && s->version != DTLS1_BAD_VER) | 360 | if (frag_off == 0 && s->version != DTLS1_BAD_VER) { |
| 369 | { | ||
| 370 | /* reconstruct message header is if it | 361 | /* reconstruct message header is if it |
| 371 | * is being sent in single fragment */ | 362 | * is being sent in single fragment */ |
| 372 | *p++ = msg_hdr->type; | 363 | *p++ = msg_hdr->type; |
| 373 | l2n3(msg_hdr->msg_len,p); | 364 | l2n3(msg_hdr->msg_len, p); |
| 374 | s2n (msg_hdr->seq,p); | 365 | s2n (msg_hdr->seq, p); |
| 375 | l2n3(0,p); | 366 | l2n3(0, p); |
| 376 | l2n3(msg_hdr->msg_len,p); | 367 | l2n3(msg_hdr->msg_len, p); |
| 377 | p -= DTLS1_HM_HEADER_LENGTH; | 368 | p -= DTLS1_HM_HEADER_LENGTH; |
| 378 | xlen = ret; | 369 | xlen = ret; |
| 379 | } | 370 | } else { |
| 380 | else | 371 | p += DTLS1_HM_HEADER_LENGTH; |
| 381 | { | ||
| 382 | p += DTLS1_HM_HEADER_LENGTH; | ||
| 383 | xlen = ret - DTLS1_HM_HEADER_LENGTH; | 372 | xlen = ret - DTLS1_HM_HEADER_LENGTH; |
| 384 | } | 373 | } |
| 385 | 374 | ||
| 386 | ssl3_finish_mac(s, p, xlen); | 375 | ssl3_finish_mac(s, p, xlen); |
| 387 | } | 376 | } |
| 388 | 377 | ||
| 389 | if (ret == s->init_num) | 378 | if (ret == s->init_num) { |
| 390 | { | ||
| 391 | if (s->msg_callback) | 379 | if (s->msg_callback) |
| 392 | s->msg_callback(1, s->version, type, s->init_buf->data, | 380 | s->msg_callback(1, s->version, type, |
| 393 | (size_t)(s->init_off + s->init_num), s, | 381 | s->init_buf->data, |
| 394 | s->msg_callback_arg); | 382 | (size_t)(s->init_off + s->init_num), |
| 383 | s, s->msg_callback_arg); | ||
| 395 | 384 | ||
| 396 | s->init_off = 0; /* done writing this message */ | 385 | s->init_off = 0; |
| 386 | /* done writing this message */ | ||
| 397 | s->init_num = 0; | 387 | s->init_num = 0; |
| 398 | 388 | ||
| 399 | return(1); | 389 | return (1); |
| 400 | } | ||
| 401 | s->init_off+=ret; | ||
| 402 | s->init_num-=ret; | ||
| 403 | frag_off += (ret -= DTLS1_HM_HEADER_LENGTH); | ||
| 404 | } | 390 | } |
| 391 | s->init_off += ret; | ||
| 392 | s->init_num -= ret; | ||
| 393 | frag_off += (ret -= DTLS1_HM_HEADER_LENGTH); | ||
| 405 | } | 394 | } |
| 406 | return(0); | ||
| 407 | } | 395 | } |
| 396 | return (0); | ||
| 397 | } | ||
| 408 | 398 | ||
| 409 | 399 | ||
| 410 | /* Obtain handshake message of message type 'mt' (any if mt == -1), | 400 | /* Obtain handshake message of message type 'mt' (any if mt == -1), |
| @@ -412,8 +402,9 @@ int dtls1_do_write(SSL *s, int type) | |||
| 412 | * Read an entire handshake message. Handshake messages arrive in | 402 | * Read an entire handshake message. Handshake messages arrive in |
| 413 | * fragments. | 403 | * fragments. |
| 414 | */ | 404 | */ |
| 415 | long dtls1_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | 405 | long |
| 416 | { | 406 | dtls1_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) |
| 407 | { | ||
| 417 | int i, al; | 408 | int i, al; |
| 418 | struct hm_header_st *msg_hdr; | 409 | struct hm_header_st *msg_hdr; |
| 419 | unsigned char *p; | 410 | unsigned char *p; |
| @@ -421,30 +412,28 @@ long dtls1_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok) | |||
| 421 | 412 | ||
| 422 | /* s3->tmp is used to store messages that are unexpected, caused | 413 | /* s3->tmp is used to store messages that are unexpected, caused |
| 423 | * by the absence of an optional handshake message */ | 414 | * by the absence of an optional handshake message */ |
| 424 | if (s->s3->tmp.reuse_message) | 415 | if (s->s3->tmp.reuse_message) { |
| 425 | { | 416 | s->s3->tmp.reuse_message = 0; |
| 426 | s->s3->tmp.reuse_message=0; | 417 | if ((mt >= 0) && (s->s3->tmp.message_type != mt)) { |
| 427 | if ((mt >= 0) && (s->s3->tmp.message_type != mt)) | 418 | al = SSL_AD_UNEXPECTED_MESSAGE; |
| 428 | { | 419 | SSLerr(SSL_F_DTLS1_GET_MESSAGE, SSL_R_UNEXPECTED_MESSAGE); |
| 429 | al=SSL_AD_UNEXPECTED_MESSAGE; | ||
| 430 | SSLerr(SSL_F_DTLS1_GET_MESSAGE,SSL_R_UNEXPECTED_MESSAGE); | ||
| 431 | goto f_err; | 420 | goto f_err; |
| 432 | } | 421 | } |
| 433 | *ok=1; | 422 | *ok = 1; |
| 434 | s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; | 423 | s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; |
| 435 | s->init_num = (int)s->s3->tmp.message_size; | 424 | s->init_num = (int)s->s3->tmp.message_size; |
| 436 | return s->init_num; | 425 | return s->init_num; |
| 437 | } | 426 | } |
| 438 | 427 | ||
| 439 | msg_hdr = &s->d1->r_msg_hdr; | 428 | msg_hdr = &s->d1->r_msg_hdr; |
| 440 | memset(msg_hdr, 0x00, sizeof(struct hm_header_st)); | 429 | memset(msg_hdr, 0x00, sizeof(struct hm_header_st)); |
| 441 | 430 | ||
| 442 | again: | 431 | again: |
| 443 | i = dtls1_get_message_fragment(s, st1, stn, max, ok); | 432 | i = dtls1_get_message_fragment(s, st1, stn, max, ok); |
| 444 | if ( i == DTLS1_HM_BAD_FRAGMENT || | 433 | if (i == DTLS1_HM_BAD_FRAGMENT || |
| 445 | i == DTLS1_HM_FRAGMENT_RETRY) /* bad fragment received */ | 434 | i == DTLS1_HM_FRAGMENT_RETRY) /* bad fragment received */ |
| 446 | goto again; | 435 | goto again; |
| 447 | else if ( i <= 0 && !*ok) | 436 | else if (i <= 0 && !*ok) |
| 448 | return i; | 437 | return i; |
| 449 | 438 | ||
| 450 | p = (unsigned char *)s->init_buf->data; | 439 | p = (unsigned char *)s->init_buf->data; |
| @@ -452,20 +441,19 @@ again: | |||
| 452 | 441 | ||
| 453 | /* reconstruct message header */ | 442 | /* reconstruct message header */ |
| 454 | *(p++) = msg_hdr->type; | 443 | *(p++) = msg_hdr->type; |
| 455 | l2n3(msg_len,p); | 444 | l2n3(msg_len, p); |
| 456 | s2n (msg_hdr->seq,p); | 445 | s2n (msg_hdr->seq, p); |
| 457 | l2n3(0,p); | 446 | l2n3(0, p); |
| 458 | l2n3(msg_len,p); | 447 | l2n3(msg_len, p); |
| 459 | if (s->version != DTLS1_BAD_VER) { | 448 | if (s->version != DTLS1_BAD_VER) { |
| 460 | p -= DTLS1_HM_HEADER_LENGTH; | 449 | p -= DTLS1_HM_HEADER_LENGTH; |
| 461 | msg_len += DTLS1_HM_HEADER_LENGTH; | 450 | msg_len += DTLS1_HM_HEADER_LENGTH; |
| 462 | } | 451 | } |
| 463 | 452 | ||
| 464 | ssl3_finish_mac(s, p, msg_len); | 453 | ssl3_finish_mac(s, p, msg_len); |
| 465 | if (s->msg_callback) | 454 | if (s->msg_callback) |
| 466 | s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, | 455 | s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, p, msg_len, |
| 467 | p, msg_len, | 456 | s, s->msg_callback_arg); |
| 468 | s, s->msg_callback_arg); | ||
| 469 | 457 | ||
| 470 | memset(msg_hdr, 0x00, sizeof(struct hm_header_st)); | 458 | memset(msg_hdr, 0x00, sizeof(struct hm_header_st)); |
| 471 | 459 | ||
| @@ -477,64 +465,59 @@ again: | |||
| 477 | return s->init_num; | 465 | return s->init_num; |
| 478 | 466 | ||
| 479 | f_err: | 467 | f_err: |
| 480 | ssl3_send_alert(s,SSL3_AL_FATAL,al); | 468 | ssl3_send_alert(s, SSL3_AL_FATAL, al); |
| 481 | *ok = 0; | 469 | *ok = 0; |
| 482 | return -1; | 470 | return -1; |
| 483 | } | 471 | } |
| 484 | 472 | ||
| 485 | 473 | ||
| 486 | static int dtls1_preprocess_fragment(SSL *s,struct hm_header_st *msg_hdr,int max) | 474 | static int |
| 487 | { | 475 | dtls1_preprocess_fragment(SSL *s, struct hm_header_st *msg_hdr, int max) { |
| 488 | size_t frag_off,frag_len,msg_len; | 476 | size_t frag_off, frag_len, msg_len; |
| 489 | 477 | ||
| 490 | msg_len = msg_hdr->msg_len; | 478 | msg_len = msg_hdr->msg_len; |
| 491 | frag_off = msg_hdr->frag_off; | 479 | frag_off = msg_hdr->frag_off; |
| 492 | frag_len = msg_hdr->frag_len; | 480 | frag_len = msg_hdr->frag_len; |
| 493 | 481 | ||
| 494 | /* sanity checking */ | 482 | /* sanity checking */ |
| 495 | if ( (frag_off+frag_len) > msg_len) | 483 | if ((frag_off + frag_len) > msg_len) { |
| 496 | { | 484 | SSLerr(SSL_F_DTLS1_PREPROCESS_FRAGMENT, SSL_R_EXCESSIVE_MESSAGE_SIZE); |
| 497 | SSLerr(SSL_F_DTLS1_PREPROCESS_FRAGMENT,SSL_R_EXCESSIVE_MESSAGE_SIZE); | ||
| 498 | return SSL_AD_ILLEGAL_PARAMETER; | 485 | return SSL_AD_ILLEGAL_PARAMETER; |
| 499 | } | 486 | } |
| 500 | 487 | ||
| 501 | if ( (frag_off+frag_len) > (unsigned long)max) | 488 | if ((frag_off + frag_len) > (unsigned long)max) { |
| 502 | { | 489 | SSLerr(SSL_F_DTLS1_PREPROCESS_FRAGMENT, SSL_R_EXCESSIVE_MESSAGE_SIZE); |
| 503 | SSLerr(SSL_F_DTLS1_PREPROCESS_FRAGMENT,SSL_R_EXCESSIVE_MESSAGE_SIZE); | ||
| 504 | return SSL_AD_ILLEGAL_PARAMETER; | 490 | return SSL_AD_ILLEGAL_PARAMETER; |
| 505 | } | 491 | } |
| 506 | 492 | ||
| 507 | if ( s->d1->r_msg_hdr.frag_off == 0) /* first fragment */ | 493 | if ( s->d1->r_msg_hdr.frag_off == 0) /* first fragment */ |
| 508 | { | 494 | { |
| 509 | /* msg_len is limited to 2^24, but is effectively checked | 495 | /* msg_len is limited to 2^24, but is effectively checked |
| 510 | * against max above */ | 496 | * against max above */ |
| 511 | if (!BUF_MEM_grow_clean(s->init_buf,msg_len+DTLS1_HM_HEADER_LENGTH)) | 497 | if (!BUF_MEM_grow_clean(s->init_buf, msg_len + DTLS1_HM_HEADER_LENGTH)) { |
| 512 | { | 498 | SSLerr(SSL_F_DTLS1_PREPROCESS_FRAGMENT, ERR_R_BUF_LIB); |
| 513 | SSLerr(SSL_F_DTLS1_PREPROCESS_FRAGMENT,ERR_R_BUF_LIB); | ||
| 514 | return SSL_AD_INTERNAL_ERROR; | 499 | return SSL_AD_INTERNAL_ERROR; |
| 515 | } | 500 | } |
| 516 | 501 | ||
| 517 | s->s3->tmp.message_size = msg_len; | 502 | s->s3->tmp.message_size = msg_len; |
| 518 | s->d1->r_msg_hdr.msg_len = msg_len; | 503 | s->d1->r_msg_hdr.msg_len = msg_len; |
| 519 | s->s3->tmp.message_type = msg_hdr->type; | 504 | s->s3->tmp.message_type = msg_hdr->type; |
| 520 | s->d1->r_msg_hdr.type = msg_hdr->type; | 505 | s->d1->r_msg_hdr.type = msg_hdr->type; |
| 521 | s->d1->r_msg_hdr.seq = msg_hdr->seq; | 506 | s->d1->r_msg_hdr.seq = msg_hdr->seq; |
| 522 | } | 507 | } else if (msg_len != s->d1->r_msg_hdr.msg_len) { |
| 523 | else if (msg_len != s->d1->r_msg_hdr.msg_len) | ||
| 524 | { | ||
| 525 | /* They must be playing with us! BTW, failure to enforce | 508 | /* They must be playing with us! BTW, failure to enforce |
| 526 | * upper limit would open possibility for buffer overrun. */ | 509 | * upper limit would open possibility for buffer overrun. */ |
| 527 | SSLerr(SSL_F_DTLS1_PREPROCESS_FRAGMENT,SSL_R_EXCESSIVE_MESSAGE_SIZE); | 510 | SSLerr(SSL_F_DTLS1_PREPROCESS_FRAGMENT, SSL_R_EXCESSIVE_MESSAGE_SIZE); |
| 528 | return SSL_AD_ILLEGAL_PARAMETER; | 511 | return SSL_AD_ILLEGAL_PARAMETER; |
| 529 | } | 512 | } |
| 530 | 513 | ||
| 531 | return 0; /* no error */ | 514 | return 0; /* no error */ |
| 532 | } | 515 | } |
| 533 | 516 | ||
| 534 | 517 | ||
| 535 | static int | 518 | static int |
| 536 | dtls1_retrieve_buffered_fragment(SSL *s, long max, int *ok) | 519 | dtls1_retrieve_buffered_fragment(SSL *s, long max, int *ok) |
| 537 | { | 520 | { |
| 538 | /* (0) check whether the desired fragment is available | 521 | /* (0) check whether the desired fragment is available |
| 539 | * if so: | 522 | * if so: |
| 540 | * (1) copy over the fragment to s->init_buf->data[] | 523 | * (1) copy over the fragment to s->init_buf->data[] |
| @@ -546,58 +529,54 @@ dtls1_retrieve_buffered_fragment(SSL *s, long max, int *ok) | |||
| 546 | 529 | ||
| 547 | *ok = 0; | 530 | *ok = 0; |
| 548 | item = pqueue_peek(s->d1->buffered_messages); | 531 | item = pqueue_peek(s->d1->buffered_messages); |
| 549 | if ( item == NULL) | 532 | if (item == NULL) |
| 550 | return 0; | 533 | return 0; |
| 551 | 534 | ||
| 552 | frag = (hm_fragment *)item->data; | 535 | frag = (hm_fragment *)item->data; |
| 553 | 536 | ||
| 554 | /* Don't return if reassembly still in progress */ | 537 | /* Don't return if reassembly still in progress */ |
| 555 | if (frag->reassembly != NULL) | 538 | if (frag->reassembly != NULL) |
| 556 | return 0; | 539 | return 0; |
| 557 | 540 | ||
| 558 | if ( s->d1->handshake_read_seq == frag->msg_header.seq) | 541 | if (s->d1->handshake_read_seq == frag->msg_header.seq) { |
| 559 | { | ||
| 560 | unsigned long frag_len = frag->msg_header.frag_len; | 542 | unsigned long frag_len = frag->msg_header.frag_len; |
| 561 | pqueue_pop(s->d1->buffered_messages); | 543 | pqueue_pop(s->d1->buffered_messages); |
| 562 | 544 | ||
| 563 | al=dtls1_preprocess_fragment(s,&frag->msg_header,max); | 545 | al = dtls1_preprocess_fragment(s, &frag->msg_header, max); |
| 564 | 546 | ||
| 565 | if (al==0) /* no alert */ | 547 | if (al == 0) /* no alert */ |
| 566 | { | 548 | { |
| 567 | unsigned char *p = (unsigned char *)s->init_buf->data+DTLS1_HM_HEADER_LENGTH; | 549 | unsigned char *p = (unsigned char *)s->init_buf->data + DTLS1_HM_HEADER_LENGTH; |
| 568 | memcpy(&p[frag->msg_header.frag_off], | 550 | memcpy(&p[frag->msg_header.frag_off], |
| 569 | frag->fragment,frag->msg_header.frag_len); | 551 | frag->fragment, frag->msg_header.frag_len); |
| 570 | } | 552 | } |
| 571 | 553 | ||
| 572 | dtls1_hm_fragment_free(frag); | 554 | dtls1_hm_fragment_free(frag); |
| 573 | pitem_free(item); | 555 | pitem_free(item); |
| 574 | 556 | ||
| 575 | if (al==0) | 557 | if (al == 0) { |
| 576 | { | ||
| 577 | *ok = 1; | 558 | *ok = 1; |
| 578 | return frag_len; | 559 | return frag_len; |
| 579 | } | 560 | } |
| 580 | 561 | ||
| 581 | ssl3_send_alert(s,SSL3_AL_FATAL,al); | 562 | ssl3_send_alert(s, SSL3_AL_FATAL, al); |
| 582 | s->init_num = 0; | 563 | s->init_num = 0; |
| 583 | *ok = 0; | 564 | *ok = 0; |
| 584 | return -1; | 565 | return -1; |
| 585 | } | 566 | } else |
| 586 | else | ||
| 587 | return 0; | 567 | return 0; |
| 588 | } | 568 | } |
| 589 | 569 | ||
| 590 | 570 | ||
| 591 | static int | 571 | static int |
| 592 | dtls1_reassemble_fragment(SSL *s, struct hm_header_st* msg_hdr, int *ok) | 572 | dtls1_reassemble_fragment(SSL *s, struct hm_header_st* msg_hdr, int *ok) { |
| 593 | { | ||
| 594 | hm_fragment *frag = NULL; | 573 | hm_fragment *frag = NULL; |
| 595 | pitem *item = NULL; | 574 | pitem *item = NULL; |
| 596 | int i = -1, is_complete; | 575 | int i = -1, is_complete; |
| 597 | unsigned char seq64be[8]; | 576 | unsigned char seq64be[8]; |
| 598 | unsigned long frag_len = msg_hdr->frag_len, max_len; | 577 | unsigned long frag_len = msg_hdr->frag_len, max_len; |
| 599 | 578 | ||
| 600 | if ((msg_hdr->frag_off+frag_len) > msg_hdr->msg_len) | 579 | if ((msg_hdr->frag_off + frag_len) > msg_hdr->msg_len) |
| 601 | goto err; | 580 | goto err; |
| 602 | 581 | ||
| 603 | /* Determine maximum allowed message size. Depends on (user set) | 582 | /* Determine maximum allowed message size. Depends on (user set) |
| @@ -608,104 +587,99 @@ dtls1_reassemble_fragment(SSL *s, struct hm_header_st* msg_hdr, int *ok) | |||
| 608 | else | 587 | else |
| 609 | max_len = DTLS1_HM_HEADER_LENGTH + SSL3_RT_MAX_ENCRYPTED_LENGTH; | 588 | max_len = DTLS1_HM_HEADER_LENGTH + SSL3_RT_MAX_ENCRYPTED_LENGTH; |
| 610 | 589 | ||
| 611 | if ((msg_hdr->frag_off+frag_len) > max_len) | 590 | if ((msg_hdr->frag_off + frag_len) > max_len) |
| 612 | goto err; | 591 | goto err; |
| 613 | 592 | ||
| 614 | /* Try to find item in queue */ | 593 | /* Try to find item in queue */ |
| 615 | memset(seq64be,0,sizeof(seq64be)); | 594 | memset(seq64be, 0, sizeof(seq64be)); |
| 616 | seq64be[6] = (unsigned char) (msg_hdr->seq>>8); | 595 | seq64be[6] = (unsigned char)(msg_hdr->seq >> 8); |
| 617 | seq64be[7] = (unsigned char) msg_hdr->seq; | 596 | seq64be[7] = (unsigned char)msg_hdr->seq; |
| 618 | item = pqueue_find(s->d1->buffered_messages, seq64be); | 597 | item = pqueue_find(s->d1->buffered_messages, seq64be); |
| 619 | 598 | ||
| 620 | if (item == NULL) | 599 | if (item == NULL) { |
| 621 | { | ||
| 622 | frag = dtls1_hm_fragment_new(msg_hdr->msg_len, 1); | 600 | frag = dtls1_hm_fragment_new(msg_hdr->msg_len, 1); |
| 623 | if ( frag == NULL) | 601 | if (frag == NULL) |
| 624 | goto err; | 602 | goto err; |
| 625 | memcpy(&(frag->msg_header), msg_hdr, sizeof(*msg_hdr)); | 603 | memcpy(&(frag->msg_header), msg_hdr, sizeof(*msg_hdr)); |
| 626 | frag->msg_header.frag_len = frag->msg_header.msg_len; | 604 | frag->msg_header.frag_len = frag->msg_header.msg_len; |
| 627 | frag->msg_header.frag_off = 0; | 605 | frag->msg_header.frag_off = 0; |
| 628 | } | 606 | } else |
| 629 | else | ||
| 630 | frag = (hm_fragment*) item->data; | 607 | frag = (hm_fragment*) item->data; |
| 631 | 608 | ||
| 632 | /* If message is already reassembled, this must be a | 609 | /* If message is already reassembled, this must be a |
| 633 | * retransmit and can be dropped. | 610 | * retransmit and can be dropped. |
| 634 | */ | 611 | */ |
| 635 | if (frag->reassembly == NULL) | 612 | if (frag->reassembly == NULL) { |
| 636 | { | ||
| 637 | unsigned char devnull [256]; | 613 | unsigned char devnull [256]; |
| 638 | 614 | ||
| 639 | while (frag_len) | 615 | while (frag_len) { |
| 640 | { | 616 | i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, |
| 641 | i = s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE, | 617 | devnull, frag_len > sizeof(devnull) ? |
| 642 | devnull, | 618 | sizeof(devnull) : frag_len, 0); |
| 643 | frag_len>sizeof(devnull)?sizeof(devnull):frag_len,0); | 619 | if (i <= 0) |
| 644 | if (i<=0) goto err; | 620 | goto err; |
| 645 | frag_len -= i; | 621 | frag_len -= i; |
| 646 | } | ||
| 647 | return DTLS1_HM_FRAGMENT_RETRY; | ||
| 648 | } | 622 | } |
| 623 | return DTLS1_HM_FRAGMENT_RETRY; | ||
| 624 | } | ||
| 649 | 625 | ||
| 650 | /* read the body of the fragment (header has already been read */ | 626 | /* read the body of the fragment (header has already been read */ |
| 651 | i = s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE, | 627 | i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, |
| 652 | frag->fragment + msg_hdr->frag_off,frag_len,0); | 628 | frag->fragment + msg_hdr->frag_off, frag_len, 0); |
| 653 | if (i<=0 || (unsigned long)i!=frag_len) | 629 | if (i <= 0 || (unsigned long)i != frag_len) |
| 654 | goto err; | 630 | goto err; |
| 655 | 631 | ||
| 656 | RSMBLY_BITMASK_MARK(frag->reassembly, (long)msg_hdr->frag_off, | 632 | RSMBLY_BITMASK_MARK(frag->reassembly, (long)msg_hdr->frag_off, |
| 657 | (long)(msg_hdr->frag_off + frag_len)); | 633 | (long)(msg_hdr->frag_off + frag_len)); |
| 658 | 634 | ||
| 659 | RSMBLY_BITMASK_IS_COMPLETE(frag->reassembly, (long)msg_hdr->msg_len, | 635 | RSMBLY_BITMASK_IS_COMPLETE(frag->reassembly, (long)msg_hdr->msg_len, |
| 660 | is_complete); | 636 | is_complete); |
| 661 | 637 | ||
| 662 | if (is_complete) | 638 | if (is_complete) { |
| 663 | { | ||
| 664 | OPENSSL_free(frag->reassembly); | 639 | OPENSSL_free(frag->reassembly); |
| 665 | frag->reassembly = NULL; | 640 | frag->reassembly = NULL; |
| 666 | } | 641 | } |
| 667 | 642 | ||
| 668 | if (item == NULL) | 643 | if (item == NULL) { |
| 669 | { | 644 | memset(seq64be, 0, sizeof(seq64be)); |
| 670 | memset(seq64be,0,sizeof(seq64be)); | 645 | seq64be[6] = (unsigned char)(msg_hdr->seq >> 8); |
| 671 | seq64be[6] = (unsigned char)(msg_hdr->seq>>8); | ||
| 672 | seq64be[7] = (unsigned char)(msg_hdr->seq); | 646 | seq64be[7] = (unsigned char)(msg_hdr->seq); |
| 673 | 647 | ||
| 674 | item = pitem_new(seq64be, frag); | 648 | item = pitem_new(seq64be, frag); |
| 675 | if (item == NULL) | 649 | if (item == NULL) { |
| 676 | { | ||
| 677 | goto err; | 650 | goto err; |
| 678 | i = -1; | 651 | i = -1; |
| 679 | } | 652 | } |
| 680 | 653 | ||
| 681 | pqueue_insert(s->d1->buffered_messages, item); | 654 | pqueue_insert(s->d1->buffered_messages, item); |
| 682 | } | 655 | } |
| 683 | 656 | ||
| 684 | return DTLS1_HM_FRAGMENT_RETRY; | 657 | return DTLS1_HM_FRAGMENT_RETRY; |
| 685 | 658 | ||
| 686 | err: | 659 | err: |
| 687 | if (frag != NULL) dtls1_hm_fragment_free(frag); | 660 | if (frag != NULL) |
| 688 | if (item != NULL) OPENSSL_free(item); | 661 | dtls1_hm_fragment_free(frag); |
| 662 | if (item != NULL) | ||
| 663 | OPENSSL_free(item); | ||
| 689 | *ok = 0; | 664 | *ok = 0; |
| 690 | return i; | 665 | return i; |
| 691 | } | 666 | } |
| 692 | 667 | ||
| 693 | 668 | ||
| 694 | static int | 669 | static int |
| 695 | dtls1_process_out_of_seq_message(SSL *s, struct hm_header_st* msg_hdr, int *ok) | 670 | dtls1_process_out_of_seq_message(SSL *s, struct hm_header_st* msg_hdr, int *ok) { |
| 696 | { | 671 | int i = -1; |
| 697 | int i=-1; | ||
| 698 | hm_fragment *frag = NULL; | 672 | hm_fragment *frag = NULL; |
| 699 | pitem *item = NULL; | 673 | pitem *item = NULL; |
| 700 | unsigned char seq64be[8]; | 674 | unsigned char seq64be[8]; |
| 701 | unsigned long frag_len = msg_hdr->frag_len; | 675 | unsigned long frag_len = msg_hdr->frag_len; |
| 702 | 676 | ||
| 703 | if ((msg_hdr->frag_off+frag_len) > msg_hdr->msg_len) | 677 | if ((msg_hdr->frag_off + frag_len) > msg_hdr->msg_len) |
| 704 | goto err; | 678 | goto err; |
| 705 | 679 | ||
| 706 | /* Try to find item in queue, to prevent duplicate entries */ | 680 | /* Try to find item in queue, to prevent duplicate entries */ |
| 707 | memset(seq64be,0,sizeof(seq64be)); | 681 | memset(seq64be, 0, sizeof(seq64be)); |
| 708 | seq64be[6] = (unsigned char) (msg_hdr->seq>>8); | 682 | seq64be[6] = (unsigned char) (msg_hdr->seq >> 8); |
| 709 | seq64be[7] = (unsigned char) msg_hdr->seq; | 683 | seq64be[7] = (unsigned char) msg_hdr->seq; |
| 710 | item = pqueue_find(s->d1->buffered_messages, seq64be); | 684 | item = pqueue_find(s->d1->buffered_messages, seq64be); |
| 711 | 685 | ||
| @@ -721,92 +695,89 @@ dtls1_process_out_of_seq_message(SSL *s, struct hm_header_st* msg_hdr, int *ok) | |||
| 721 | * retransmit. | 695 | * retransmit. |
| 722 | */ | 696 | */ |
| 723 | if (msg_hdr->seq <= s->d1->handshake_read_seq || | 697 | if (msg_hdr->seq <= s->d1->handshake_read_seq || |
| 724 | msg_hdr->seq > s->d1->handshake_read_seq + 10 || item != NULL || | 698 | msg_hdr->seq > s->d1->handshake_read_seq + 10 || item != NULL || |
| 725 | (s->d1->handshake_read_seq == 0 && msg_hdr->type == SSL3_MT_FINISHED)) | 699 | (s->d1->handshake_read_seq == 0 && msg_hdr->type == SSL3_MT_FINISHED)) { |
| 726 | { | ||
| 727 | unsigned char devnull [256]; | 700 | unsigned char devnull [256]; |
| 728 | 701 | ||
| 729 | while (frag_len) | 702 | while (frag_len) { |
| 730 | { | 703 | i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, |
| 731 | i = s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE, | 704 | devnull, frag_len > sizeof(devnull) ? |
| 732 | devnull, | 705 | sizeof(devnull) : frag_len, 0); |
| 733 | frag_len>sizeof(devnull)?sizeof(devnull):frag_len,0); | 706 | if (i <= 0) |
| 734 | if (i<=0) goto err; | 707 | goto err; |
| 735 | frag_len -= i; | 708 | frag_len -= i; |
| 736 | } | ||
| 737 | } | 709 | } |
| 738 | else | 710 | } else { |
| 739 | { | ||
| 740 | if (frag_len && frag_len < msg_hdr->msg_len) | 711 | if (frag_len && frag_len < msg_hdr->msg_len) |
| 741 | return dtls1_reassemble_fragment(s, msg_hdr, ok); | 712 | return dtls1_reassemble_fragment(s, msg_hdr, ok); |
| 742 | 713 | ||
| 743 | frag = dtls1_hm_fragment_new(frag_len, 0); | 714 | frag = dtls1_hm_fragment_new(frag_len, 0); |
| 744 | if ( frag == NULL) | 715 | if (frag == NULL) |
| 745 | goto err; | 716 | goto err; |
| 746 | 717 | ||
| 747 | memcpy(&(frag->msg_header), msg_hdr, sizeof(*msg_hdr)); | 718 | memcpy(&(frag->msg_header), msg_hdr, sizeof(*msg_hdr)); |
| 748 | 719 | ||
| 749 | if (frag_len) | 720 | if (frag_len) { |
| 750 | { | ||
| 751 | /* read the body of the fragment (header has already been read */ | 721 | /* read the body of the fragment (header has already been read */ |
| 752 | i = s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE, | 722 | i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, |
| 753 | frag->fragment,frag_len,0); | 723 | frag->fragment, frag_len, 0); |
| 754 | if (i<=0 || (unsigned long)i!=frag_len) | 724 | if (i <= 0 || (unsigned long)i != frag_len) |
| 755 | goto err; | 725 | goto err; |
| 756 | } | 726 | } |
| 757 | 727 | ||
| 758 | memset(seq64be,0,sizeof(seq64be)); | 728 | memset(seq64be, 0, sizeof(seq64be)); |
| 759 | seq64be[6] = (unsigned char)(msg_hdr->seq>>8); | 729 | seq64be[6] = (unsigned char)(msg_hdr->seq >> 8); |
| 760 | seq64be[7] = (unsigned char)(msg_hdr->seq); | 730 | seq64be[7] = (unsigned char)(msg_hdr->seq); |
| 761 | 731 | ||
| 762 | item = pitem_new(seq64be, frag); | 732 | item = pitem_new(seq64be, frag); |
| 763 | if ( item == NULL) | 733 | if (item == NULL) |
| 764 | goto err; | 734 | goto err; |
| 765 | 735 | ||
| 766 | pqueue_insert(s->d1->buffered_messages, item); | 736 | pqueue_insert(s->d1->buffered_messages, item); |
| 767 | } | 737 | } |
| 768 | 738 | ||
| 769 | return DTLS1_HM_FRAGMENT_RETRY; | 739 | return DTLS1_HM_FRAGMENT_RETRY; |
| 770 | 740 | ||
| 771 | err: | 741 | err: |
| 772 | if ( frag != NULL) dtls1_hm_fragment_free(frag); | 742 | if (frag != NULL) |
| 773 | if ( item != NULL) OPENSSL_free(item); | 743 | dtls1_hm_fragment_free(frag); |
| 744 | if (item != NULL) | ||
| 745 | OPENSSL_free(item); | ||
| 774 | *ok = 0; | 746 | *ok = 0; |
| 775 | return i; | 747 | return i; |
| 776 | } | 748 | } |
| 777 | 749 | ||
| 778 | 750 | ||
| 779 | static long | 751 | static long |
| 780 | dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) | 752 | dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) |
| 781 | { | 753 | { |
| 782 | unsigned char wire[DTLS1_HM_HEADER_LENGTH]; | 754 | unsigned char wire[DTLS1_HM_HEADER_LENGTH]; |
| 783 | unsigned long len, frag_off, frag_len; | 755 | unsigned long len, frag_off, frag_len; |
| 784 | int i,al; | 756 | int i, al; |
| 785 | struct hm_header_st msg_hdr; | 757 | struct hm_header_st msg_hdr; |
| 786 | 758 | ||
| 787 | /* see if we have the required fragment already */ | 759 | /* see if we have the required fragment already */ |
| 788 | if ((frag_len = dtls1_retrieve_buffered_fragment(s,max,ok)) || *ok) | 760 | if ((frag_len = dtls1_retrieve_buffered_fragment(s, max, ok)) || *ok) { |
| 789 | { | 761 | if (*ok) |
| 790 | if (*ok) s->init_num = frag_len; | 762 | s->init_num = frag_len; |
| 791 | return frag_len; | 763 | return frag_len; |
| 792 | } | 764 | } |
| 793 | 765 | ||
| 794 | /* read handshake message header */ | 766 | /* read handshake message header */ |
| 795 | i=s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE,wire, | 767 | i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, wire, |
| 796 | DTLS1_HM_HEADER_LENGTH, 0); | 768 | DTLS1_HM_HEADER_LENGTH, 0); |
| 797 | if (i <= 0) /* nbio, or an error */ | 769 | if (i <= 0) /* nbio, or an error */ |
| 798 | { | 770 | { |
| 799 | s->rwstate=SSL_READING; | 771 | s->rwstate = SSL_READING; |
| 800 | *ok = 0; | 772 | *ok = 0; |
| 801 | return i; | 773 | return i; |
| 802 | } | 774 | } |
| 803 | /* Handshake fails if message header is incomplete */ | 775 | /* Handshake fails if message header is incomplete */ |
| 804 | if (i != DTLS1_HM_HEADER_LENGTH) | 776 | if (i != DTLS1_HM_HEADER_LENGTH) { |
| 805 | { | 777 | al = SSL_AD_UNEXPECTED_MESSAGE; |
| 806 | al=SSL_AD_UNEXPECTED_MESSAGE; | 778 | SSLerr(SSL_F_DTLS1_GET_MESSAGE_FRAGMENT, SSL_R_UNEXPECTED_MESSAGE); |
| 807 | SSLerr(SSL_F_DTLS1_GET_MESSAGE_FRAGMENT,SSL_R_UNEXPECTED_MESSAGE); | ||
| 808 | goto f_err; | 779 | goto f_err; |
| 809 | } | 780 | } |
| 810 | 781 | ||
| 811 | /* parse the message fragment header */ | 782 | /* parse the message fragment header */ |
| 812 | dtls1_get_message_header(wire, &msg_hdr); | 783 | dtls1_get_message_header(wire, &msg_hdr); |
| @@ -828,62 +799,56 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) | |||
| 828 | return dtls1_reassemble_fragment(s, &msg_hdr, ok); | 799 | return dtls1_reassemble_fragment(s, &msg_hdr, ok); |
| 829 | 800 | ||
| 830 | if (!s->server && s->d1->r_msg_hdr.frag_off == 0 && | 801 | if (!s->server && s->d1->r_msg_hdr.frag_off == 0 && |
| 831 | wire[0] == SSL3_MT_HELLO_REQUEST) | 802 | wire[0] == SSL3_MT_HELLO_REQUEST) { |
| 832 | { | ||
| 833 | /* The server may always send 'Hello Request' messages -- | 803 | /* The server may always send 'Hello Request' messages -- |
| 834 | * we are doing a handshake anyway now, so ignore them | 804 | * we are doing a handshake anyway now, so ignore them |
| 835 | * if their format is correct. Does not count for | 805 | * if their format is correct. Does not count for |
| 836 | * 'Finished' MAC. */ | 806 | * 'Finished' MAC. */ |
| 837 | if (wire[1] == 0 && wire[2] == 0 && wire[3] == 0) | 807 | if (wire[1] == 0 && wire[2] == 0 && wire[3] == 0) { |
| 838 | { | ||
| 839 | if (s->msg_callback) | 808 | if (s->msg_callback) |
| 840 | s->msg_callback(0, s->version, SSL3_RT_HANDSHAKE, | 809 | s->msg_callback(0, s->version, |
| 841 | wire, DTLS1_HM_HEADER_LENGTH, s, | 810 | SSL3_RT_HANDSHAKE, wire, |
| 842 | s->msg_callback_arg); | 811 | DTLS1_HM_HEADER_LENGTH, s, |
| 843 | 812 | s->msg_callback_arg); | |
| 813 | |||
| 844 | s->init_num = 0; | 814 | s->init_num = 0; |
| 845 | return dtls1_get_message_fragment(s, st1, stn, | 815 | return dtls1_get_message_fragment(s, st1, stn, max, ok); |
| 846 | max, ok); | 816 | } |
| 847 | } | ||
| 848 | else /* Incorrectly formated Hello request */ | 817 | else /* Incorrectly formated Hello request */ |
| 849 | { | 818 | { |
| 850 | al=SSL_AD_UNEXPECTED_MESSAGE; | 819 | al = SSL_AD_UNEXPECTED_MESSAGE; |
| 851 | SSLerr(SSL_F_DTLS1_GET_MESSAGE_FRAGMENT,SSL_R_UNEXPECTED_MESSAGE); | 820 | SSLerr(SSL_F_DTLS1_GET_MESSAGE_FRAGMENT, SSL_R_UNEXPECTED_MESSAGE); |
| 852 | goto f_err; | 821 | goto f_err; |
| 853 | } | ||
| 854 | } | 822 | } |
| 823 | } | ||
| 855 | 824 | ||
| 856 | if ((al=dtls1_preprocess_fragment(s,&msg_hdr,max))) | 825 | if ((al = dtls1_preprocess_fragment(s, &msg_hdr, max))) |
| 857 | goto f_err; | 826 | goto f_err; |
| 858 | 827 | ||
| 859 | /* XDTLS: ressurect this when restart is in place */ | 828 | /* XDTLS: ressurect this when restart is in place */ |
| 860 | s->state=stn; | 829 | s->state = stn; |
| 861 | 830 | ||
| 862 | if ( frag_len > 0) | 831 | if (frag_len > 0) { |
| 863 | { | 832 | unsigned char *p = (unsigned char *)s->init_buf->data + DTLS1_HM_HEADER_LENGTH; |
| 864 | unsigned char *p=(unsigned char *)s->init_buf->data+DTLS1_HM_HEADER_LENGTH; | ||
| 865 | 833 | ||
| 866 | i=s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE, | 834 | i = s->method->ssl_read_bytes(s, SSL3_RT_HANDSHAKE, |
| 867 | &p[frag_off],frag_len,0); | 835 | &p[frag_off], frag_len, 0); |
| 868 | /* XDTLS: fix this--message fragments cannot span multiple packets */ | 836 | /* XDTLS: fix this--message fragments cannot span multiple packets */ |
| 869 | if (i <= 0) | 837 | if (i <= 0) { |
| 870 | { | 838 | s->rwstate = SSL_READING; |
| 871 | s->rwstate=SSL_READING; | ||
| 872 | *ok = 0; | 839 | *ok = 0; |
| 873 | return i; | 840 | return i; |
| 874 | } | ||
| 875 | } | 841 | } |
| 876 | else | 842 | } else |
| 877 | i = 0; | 843 | i = 0; |
| 878 | 844 | ||
| 879 | /* XDTLS: an incorrectly formatted fragment should cause the | 845 | /* XDTLS: an incorrectly formatted fragment should cause the |
| 880 | * handshake to fail */ | 846 | * handshake to fail */ |
| 881 | if (i != (int)frag_len) | 847 | if (i != (int)frag_len) { |
| 882 | { | 848 | al = SSL3_AD_ILLEGAL_PARAMETER; |
| 883 | al=SSL3_AD_ILLEGAL_PARAMETER; | 849 | SSLerr(SSL_F_DTLS1_GET_MESSAGE_FRAGMENT, SSL3_AD_ILLEGAL_PARAMETER); |
| 884 | SSLerr(SSL_F_DTLS1_GET_MESSAGE_FRAGMENT,SSL3_AD_ILLEGAL_PARAMETER); | ||
| 885 | goto f_err; | 850 | goto f_err; |
| 886 | } | 851 | } |
| 887 | 852 | ||
| 888 | *ok = 1; | 853 | *ok = 1; |
| 889 | 854 | ||
| @@ -895,62 +860,59 @@ dtls1_get_message_fragment(SSL *s, int st1, int stn, long max, int *ok) | |||
| 895 | return frag_len; | 860 | return frag_len; |
| 896 | 861 | ||
| 897 | f_err: | 862 | f_err: |
| 898 | ssl3_send_alert(s,SSL3_AL_FATAL,al); | 863 | ssl3_send_alert(s, SSL3_AL_FATAL, al); |
| 899 | s->init_num = 0; | 864 | s->init_num = 0; |
| 900 | 865 | ||
| 901 | *ok=0; | 866 | *ok = 0; |
| 902 | return(-1); | 867 | return (-1); |
| 903 | } | 868 | } |
| 904 | 869 | ||
| 905 | int dtls1_send_finished(SSL *s, int a, int b, const char *sender, int slen) | 870 | int |
| 906 | { | 871 | dtls1_send_finished(SSL *s, int a, int b, const char *sender, int slen) |
| 907 | unsigned char *p,*d; | 872 | { |
| 873 | unsigned char *p, *d; | ||
| 908 | int i; | 874 | int i; |
| 909 | unsigned long l; | 875 | unsigned long l; |
| 910 | 876 | ||
| 911 | if (s->state == a) | 877 | if (s->state == a) { |
| 912 | { | 878 | d = (unsigned char *)s->init_buf->data; |
| 913 | d=(unsigned char *)s->init_buf->data; | 879 | p = &(d[DTLS1_HM_HEADER_LENGTH]); |
| 914 | p= &(d[DTLS1_HM_HEADER_LENGTH]); | ||
| 915 | 880 | ||
| 916 | i=s->method->ssl3_enc->final_finish_mac(s, | 881 | i = s->method->ssl3_enc->final_finish_mac(s, |
| 917 | sender,slen,s->s3->tmp.finish_md); | 882 | sender, slen, s->s3->tmp.finish_md); |
| 918 | s->s3->tmp.finish_md_len = i; | 883 | s->s3->tmp.finish_md_len = i; |
| 919 | memcpy(p, s->s3->tmp.finish_md, i); | 884 | memcpy(p, s->s3->tmp.finish_md, i); |
| 920 | p+=i; | 885 | p += i; |
| 921 | l=i; | 886 | l = i; |
| 922 | 887 | ||
| 923 | /* Copy the finished so we can use it for | 888 | /* Copy the finished so we can use it for |
| 924 | * renegotiation checks | 889 | * renegotiation checks |
| 925 | */ | 890 | */ |
| 926 | if(s->type == SSL_ST_CONNECT) | 891 | if (s->type == SSL_ST_CONNECT) { |
| 927 | { | 892 | OPENSSL_assert(i <= EVP_MAX_MD_SIZE); |
| 928 | OPENSSL_assert(i <= EVP_MAX_MD_SIZE); | 893 | memcpy(s->s3->previous_client_finished, |
| 929 | memcpy(s->s3->previous_client_finished, | 894 | s->s3->tmp.finish_md, i); |
| 930 | s->s3->tmp.finish_md, i); | 895 | s->s3->previous_client_finished_len = i; |
| 931 | s->s3->previous_client_finished_len=i; | 896 | } else { |
| 932 | } | 897 | OPENSSL_assert(i <= EVP_MAX_MD_SIZE); |
| 933 | else | 898 | memcpy(s->s3->previous_server_finished, |
| 934 | { | 899 | s->s3->tmp.finish_md, i); |
| 935 | OPENSSL_assert(i <= EVP_MAX_MD_SIZE); | 900 | s->s3->previous_server_finished_len = i; |
| 936 | memcpy(s->s3->previous_server_finished, | ||
| 937 | s->s3->tmp.finish_md, i); | ||
| 938 | s->s3->previous_server_finished_len=i; | ||
| 939 | } | 901 | } |
| 940 | 902 | ||
| 941 | d = dtls1_set_message_header(s, d, SSL3_MT_FINISHED, l, 0, l); | 903 | d = dtls1_set_message_header(s, d, SSL3_MT_FINISHED, l, 0, l); |
| 942 | s->init_num=(int)l+DTLS1_HM_HEADER_LENGTH; | 904 | s->init_num = (int)l + DTLS1_HM_HEADER_LENGTH; |
| 943 | s->init_off=0; | 905 | s->init_off = 0; |
| 944 | 906 | ||
| 945 | /* buffer the message to handle re-xmits */ | 907 | /* buffer the message to handle re-xmits */ |
| 946 | dtls1_buffer_message(s, 0); | 908 | dtls1_buffer_message(s, 0); |
| 947 | 909 | ||
| 948 | s->state=b; | 910 | s->state = b; |
| 949 | } | 911 | } |
| 950 | 912 | ||
| 951 | /* SSL3_ST_SEND_xxxxxx_HELLO_B */ | 913 | /* SSL3_ST_SEND_xxxxxx_HELLO_B */ |
| 952 | return(dtls1_do_write(s,SSL3_RT_HANDSHAKE)); | 914 | return (dtls1_do_write(s, SSL3_RT_HANDSHAKE)); |
| 953 | } | 915 | } |
| 954 | 916 | ||
| 955 | /* for these 2 messages, we need to | 917 | /* for these 2 messages, we need to |
| 956 | * ssl->enc_read_ctx re-init | 918 | * ssl->enc_read_ctx re-init |
| @@ -960,161 +922,154 @@ int dtls1_send_finished(SSL *s, int a, int b, const char *sender, int slen) | |||
| 960 | * ssl->session->read_compression assign | 922 | * ssl->session->read_compression assign |
| 961 | * ssl->session->read_hash assign | 923 | * ssl->session->read_hash assign |
| 962 | */ | 924 | */ |
| 963 | int dtls1_send_change_cipher_spec(SSL *s, int a, int b) | 925 | int |
| 964 | { | 926 | dtls1_send_change_cipher_spec(SSL *s, int a, int b) |
| 927 | { | ||
| 965 | unsigned char *p; | 928 | unsigned char *p; |
| 966 | 929 | ||
| 967 | if (s->state == a) | 930 | if (s->state == a) { |
| 968 | { | 931 | p = (unsigned char *)s->init_buf->data; |
| 969 | p=(unsigned char *)s->init_buf->data; | ||
| 970 | *p++=SSL3_MT_CCS; | 932 | *p++=SSL3_MT_CCS; |
| 971 | s->d1->handshake_write_seq = s->d1->next_handshake_write_seq; | 933 | s->d1->handshake_write_seq = s->d1->next_handshake_write_seq; |
| 972 | s->init_num=DTLS1_CCS_HEADER_LENGTH; | 934 | s->init_num = DTLS1_CCS_HEADER_LENGTH; |
| 973 | 935 | ||
| 974 | if (s->version == DTLS1_BAD_VER) { | 936 | if (s->version == DTLS1_BAD_VER) { |
| 975 | s->d1->next_handshake_write_seq++; | 937 | s->d1->next_handshake_write_seq++; |
| 976 | s2n(s->d1->handshake_write_seq,p); | 938 | s2n(s->d1->handshake_write_seq, p); |
| 977 | s->init_num+=2; | 939 | s->init_num += 2; |
| 978 | } | 940 | } |
| 979 | 941 | ||
| 980 | s->init_off=0; | 942 | s->init_off = 0; |
| 981 | 943 | ||
| 982 | dtls1_set_message_header_int(s, SSL3_MT_CCS, 0, | 944 | dtls1_set_message_header_int(s, SSL3_MT_CCS, 0, |
| 983 | s->d1->handshake_write_seq, 0, 0); | 945 | s->d1->handshake_write_seq, 0, 0); |
| 984 | 946 | ||
| 985 | /* buffer the message to handle re-xmits */ | 947 | /* buffer the message to handle re-xmits */ |
| 986 | dtls1_buffer_message(s, 1); | 948 | dtls1_buffer_message(s, 1); |
| 987 | 949 | ||
| 988 | s->state=b; | 950 | s->state = b; |
| 989 | } | 951 | } |
| 990 | 952 | ||
| 991 | /* SSL3_ST_CW_CHANGE_B */ | 953 | /* SSL3_ST_CW_CHANGE_B */ |
| 992 | return(dtls1_do_write(s,SSL3_RT_CHANGE_CIPHER_SPEC)); | 954 | return (dtls1_do_write(s, SSL3_RT_CHANGE_CIPHER_SPEC)); |
| 993 | } | 955 | } |
| 994 | 956 | ||
| 995 | static int dtls1_add_cert_to_buf(BUF_MEM *buf, unsigned long *l, X509 *x) | 957 | static int |
| 996 | { | 958 | dtls1_add_cert_to_buf(BUF_MEM *buf, unsigned long *l, X509 *x) |
| 959 | { | ||
| 997 | int n; | 960 | int n; |
| 998 | unsigned char *p; | 961 | unsigned char *p; |
| 999 | 962 | ||
| 1000 | n=i2d_X509(x,NULL); | 963 | n = i2d_X509(x, NULL); |
| 1001 | if (!BUF_MEM_grow_clean(buf,(int)(n+(*l)+3))) | 964 | if (!BUF_MEM_grow_clean(buf,(int)(n + (*l) + 3))) { |
| 1002 | { | 965 | SSLerr(SSL_F_DTLS1_ADD_CERT_TO_BUF, ERR_R_BUF_LIB); |
| 1003 | SSLerr(SSL_F_DTLS1_ADD_CERT_TO_BUF,ERR_R_BUF_LIB); | ||
| 1004 | return 0; | 966 | return 0; |
| 1005 | } | 967 | } |
| 1006 | p=(unsigned char *)&(buf->data[*l]); | 968 | p = (unsigned char *)&(buf->data[*l]); |
| 1007 | l2n3(n,p); | 969 | l2n3(n, p); |
| 1008 | i2d_X509(x,&p); | 970 | i2d_X509(x, &p); |
| 1009 | *l+=n+3; | 971 | *l += n + 3; |
| 1010 | 972 | ||
| 1011 | return 1; | 973 | return 1; |
| 1012 | } | 974 | } |
| 1013 | unsigned long dtls1_output_cert_chain(SSL *s, X509 *x) | 975 | |
| 1014 | { | 976 | unsigned long |
| 977 | dtls1_output_cert_chain(SSL *s, X509 *x) | ||
| 978 | { | ||
| 1015 | unsigned char *p; | 979 | unsigned char *p; |
| 1016 | int i; | 980 | int i; |
| 1017 | unsigned long l= 3 + DTLS1_HM_HEADER_LENGTH; | 981 | unsigned long l = 3 + DTLS1_HM_HEADER_LENGTH; |
| 1018 | BUF_MEM *buf; | 982 | BUF_MEM *buf; |
| 1019 | 983 | ||
| 1020 | /* TLSv1 sends a chain with nothing in it, instead of an alert */ | 984 | /* TLSv1 sends a chain with nothing in it, instead of an alert */ |
| 1021 | buf=s->init_buf; | 985 | buf = s->init_buf; |
| 1022 | if (!BUF_MEM_grow_clean(buf,10)) | 986 | if (!BUF_MEM_grow_clean(buf, 10)) { |
| 1023 | { | 987 | SSLerr(SSL_F_DTLS1_OUTPUT_CERT_CHAIN, ERR_R_BUF_LIB); |
| 1024 | SSLerr(SSL_F_DTLS1_OUTPUT_CERT_CHAIN,ERR_R_BUF_LIB); | 988 | return (0); |
| 1025 | return(0); | 989 | } |
| 1026 | } | 990 | if (x != NULL) { |
| 1027 | if (x != NULL) | ||
| 1028 | { | ||
| 1029 | X509_STORE_CTX xs_ctx; | 991 | X509_STORE_CTX xs_ctx; |
| 1030 | 992 | ||
| 1031 | if (!X509_STORE_CTX_init(&xs_ctx,s->ctx->cert_store,x,NULL)) | 993 | if (!X509_STORE_CTX_init(&xs_ctx, s->ctx->cert_store, x, NULL)) { |
| 1032 | { | 994 | SSLerr(SSL_F_DTLS1_OUTPUT_CERT_CHAIN, ERR_R_X509_LIB); |
| 1033 | SSLerr(SSL_F_DTLS1_OUTPUT_CERT_CHAIN,ERR_R_X509_LIB); | 995 | return (0); |
| 1034 | return(0); | 996 | } |
| 1035 | } | 997 | |
| 1036 | |||
| 1037 | X509_verify_cert(&xs_ctx); | 998 | X509_verify_cert(&xs_ctx); |
| 1038 | /* Don't leave errors in the queue */ | 999 | /* Don't leave errors in the queue */ |
| 1039 | ERR_clear_error(); | 1000 | ERR_clear_error(); |
| 1040 | for (i=0; i < sk_X509_num(xs_ctx.chain); i++) | 1001 | for (i = 0; i < sk_X509_num(xs_ctx.chain); i++) { |
| 1041 | { | ||
| 1042 | x = sk_X509_value(xs_ctx.chain, i); | 1002 | x = sk_X509_value(xs_ctx.chain, i); |
| 1043 | 1003 | ||
| 1044 | if (!dtls1_add_cert_to_buf(buf, &l, x)) | 1004 | if (!dtls1_add_cert_to_buf(buf, &l, x)) { |
| 1045 | { | ||
| 1046 | X509_STORE_CTX_cleanup(&xs_ctx); | 1005 | X509_STORE_CTX_cleanup(&xs_ctx); |
| 1047 | return 0; | 1006 | return 0; |
| 1048 | } | 1007 | } |
| 1049 | } | 1008 | } |
| 1050 | X509_STORE_CTX_cleanup(&xs_ctx); | 1009 | X509_STORE_CTX_cleanup(&xs_ctx); |
| 1051 | } | 1010 | } |
| 1052 | /* Thawte special :-) */ | 1011 | /* Thawte special :-) */ |
| 1053 | for (i=0; i<sk_X509_num(s->ctx->extra_certs); i++) | 1012 | for (i = 0; i < sk_X509_num(s->ctx->extra_certs); i++) { |
| 1054 | { | 1013 | x = sk_X509_value(s->ctx->extra_certs, i); |
| 1055 | x=sk_X509_value(s->ctx->extra_certs,i); | ||
| 1056 | if (!dtls1_add_cert_to_buf(buf, &l, x)) | 1014 | if (!dtls1_add_cert_to_buf(buf, &l, x)) |
| 1057 | return 0; | 1015 | return 0; |
| 1058 | } | 1016 | } |
| 1059 | 1017 | ||
| 1060 | l-= (3 + DTLS1_HM_HEADER_LENGTH); | 1018 | l -= (3 + DTLS1_HM_HEADER_LENGTH); |
| 1061 | 1019 | ||
| 1062 | p=(unsigned char *)&(buf->data[DTLS1_HM_HEADER_LENGTH]); | 1020 | p = (unsigned char *)&(buf->data[DTLS1_HM_HEADER_LENGTH]); |
| 1063 | l2n3(l,p); | 1021 | l2n3(l, p); |
| 1064 | l+=3; | 1022 | l += 3; |
| 1065 | p=(unsigned char *)&(buf->data[0]); | 1023 | p = (unsigned char *)&(buf->data[0]); |
| 1066 | p = dtls1_set_message_header(s, p, SSL3_MT_CERTIFICATE, l, 0, l); | 1024 | p = dtls1_set_message_header(s, p, SSL3_MT_CERTIFICATE, l, 0, l); |
| 1067 | 1025 | ||
| 1068 | l+=DTLS1_HM_HEADER_LENGTH; | 1026 | l += DTLS1_HM_HEADER_LENGTH; |
| 1069 | return(l); | 1027 | return (l); |
| 1070 | } | 1028 | } |
| 1071 | 1029 | ||
| 1072 | int dtls1_read_failed(SSL *s, int code) | 1030 | int |
| 1073 | { | 1031 | dtls1_read_failed(SSL *s, int code) |
| 1074 | if ( code > 0) | 1032 | { |
| 1075 | { | 1033 | if (code > 0) { |
| 1076 | fprintf( stderr, "invalid state reached %s:%d", __FILE__, __LINE__); | 1034 | fprintf( stderr, "invalid state reached %s:%d", __FILE__, __LINE__); |
| 1077 | return 1; | 1035 | return 1; |
| 1078 | } | 1036 | } |
| 1079 | 1037 | ||
| 1080 | if (!dtls1_is_timer_expired(s)) | 1038 | if (!dtls1_is_timer_expired(s)) { |
| 1081 | { | ||
| 1082 | /* not a timeout, none of our business, | 1039 | /* not a timeout, none of our business, |
| 1083 | let higher layers handle this. in fact it's probably an error */ | 1040 | let higher layers handle this. in fact it's probably an error */ |
| 1084 | return code; | 1041 | return code; |
| 1085 | } | 1042 | } |
| 1086 | 1043 | ||
| 1087 | #ifndef OPENSSL_NO_HEARTBEATS | 1044 | #ifndef OPENSSL_NO_HEARTBEATS |
| 1088 | if (!SSL_in_init(s) && !s->tlsext_hb_pending) /* done, no need to send a retransmit */ | 1045 | if (!SSL_in_init(s) && !s->tlsext_hb_pending) /* done, no need to send a retransmit */ |
| 1089 | #else | 1046 | #else |
| 1090 | if (!SSL_in_init(s)) /* done, no need to send a retransmit */ | 1047 | if (!SSL_in_init(s)) /* done, no need to send a retransmit */ |
| 1091 | #endif | 1048 | #endif |
| 1092 | { | 1049 | { |
| 1093 | BIO_set_flags(SSL_get_rbio(s), BIO_FLAGS_READ); | 1050 | BIO_set_flags(SSL_get_rbio(s), BIO_FLAGS_READ); |
| 1094 | return code; | 1051 | return code; |
| 1095 | } | 1052 | } |
| 1096 | 1053 | ||
| 1097 | #if 0 /* for now, each alert contains only one record number */ | 1054 | #if 0 /* for now, each alert contains only one record number */ |
| 1098 | item = pqueue_peek(state->rcvd_records); | 1055 | item = pqueue_peek(state->rcvd_records); |
| 1099 | if ( item ) | 1056 | if (item ) { |
| 1100 | { | ||
| 1101 | /* send an alert immediately for all the missing records */ | 1057 | /* send an alert immediately for all the missing records */ |
| 1102 | } | 1058 | } else |
| 1103 | else | ||
| 1104 | #endif | 1059 | #endif |
| 1105 | 1060 | ||
| 1106 | #if 0 /* no more alert sending, just retransmit the last set of messages */ | 1061 | #if 0 /* no more alert sending, just retransmit the last set of messages */ |
| 1107 | if ( state->timeout.read_timeouts >= DTLS1_TMO_READ_COUNT) | 1062 | if (state->timeout.read_timeouts >= DTLS1_TMO_READ_COUNT) |
| 1108 | ssl3_send_alert(s,SSL3_AL_WARNING, | 1063 | ssl3_send_alert(s, SSL3_AL_WARNING, |
| 1109 | DTLS1_AD_MISSING_HANDSHAKE_MESSAGE); | 1064 | DTLS1_AD_MISSING_HANDSHAKE_MESSAGE); |
| 1110 | #endif | 1065 | #endif |
| 1111 | 1066 | ||
| 1112 | return dtls1_handle_timeout(s); | 1067 | return dtls1_handle_timeout(s); |
| 1113 | } | 1068 | } |
| 1114 | 1069 | ||
| 1115 | int | 1070 | int |
| 1116 | dtls1_get_queue_priority(unsigned short seq, int is_ccs) | 1071 | dtls1_get_queue_priority(unsigned short seq, int is_ccs) |
| 1117 | { | 1072 | { |
| 1118 | /* The index of the retransmission queue actually is the message sequence number, | 1073 | /* The index of the retransmission queue actually is the message sequence number, |
| 1119 | * since the queue only contains messages of a single handshake. However, the | 1074 | * since the queue only contains messages of a single handshake. However, the |
| 1120 | * ChangeCipherSpec has no message sequence number and so using only the sequence | 1075 | * ChangeCipherSpec has no message sequence number and so using only the sequence |
| @@ -1124,11 +1079,11 @@ dtls1_get_queue_priority(unsigned short seq, int is_ccs) | |||
| 1124 | * index (important for priority queues) and fits in the unsigned short variable. | 1079 | * index (important for priority queues) and fits in the unsigned short variable. |
| 1125 | */ | 1080 | */ |
| 1126 | return seq * 2 - is_ccs; | 1081 | return seq * 2 - is_ccs; |
| 1127 | } | 1082 | } |
| 1128 | 1083 | ||
| 1129 | int | 1084 | int |
| 1130 | dtls1_retransmit_buffered_messages(SSL *s) | 1085 | dtls1_retransmit_buffered_messages(SSL *s) |
| 1131 | { | 1086 | { |
| 1132 | pqueue sent = s->d1->sent_messages; | 1087 | pqueue sent = s->d1->sent_messages; |
| 1133 | piterator iter; | 1088 | piterator iter; |
| 1134 | pitem *item; | 1089 | pitem *item; |
| @@ -1137,24 +1092,23 @@ dtls1_retransmit_buffered_messages(SSL *s) | |||
| 1137 | 1092 | ||
| 1138 | iter = pqueue_iterator(sent); | 1093 | iter = pqueue_iterator(sent); |
| 1139 | 1094 | ||
| 1140 | for ( item = pqueue_next(&iter); item != NULL; item = pqueue_next(&iter)) | 1095 | for (item = pqueue_next(&iter); item != NULL; item = pqueue_next(&iter)) { |
| 1141 | { | ||
| 1142 | frag = (hm_fragment *)item->data; | 1096 | frag = (hm_fragment *)item->data; |
| 1143 | if ( dtls1_retransmit_message(s, | 1097 | if (dtls1_retransmit_message(s, |
| 1144 | (unsigned short)dtls1_get_queue_priority(frag->msg_header.seq, frag->msg_header.is_ccs), | 1098 | (unsigned short)dtls1_get_queue_priority( |
| 1145 | 0, &found) <= 0 && found) | 1099 | frag->msg_header.seq, frag->msg_header.is_ccs), 0, |
| 1146 | { | 1100 | &found) <= 0 && found) { |
| 1147 | fprintf(stderr, "dtls1_retransmit_message() failed\n"); | 1101 | fprintf(stderr, "dtls1_retransmit_message() failed\n"); |
| 1148 | return -1; | 1102 | return -1; |
| 1149 | } | ||
| 1150 | } | 1103 | } |
| 1104 | } | ||
| 1151 | 1105 | ||
| 1152 | return 1; | 1106 | return 1; |
| 1153 | } | 1107 | } |
| 1154 | 1108 | ||
| 1155 | int | 1109 | int |
| 1156 | dtls1_buffer_message(SSL *s, int is_ccs) | 1110 | dtls1_buffer_message(SSL *s, int is_ccs) |
| 1157 | { | 1111 | { |
| 1158 | pitem *item; | 1112 | pitem *item; |
| 1159 | hm_fragment *frag; | 1113 | hm_fragment *frag; |
| 1160 | unsigned char seq64be[8]; | 1114 | unsigned char seq64be[8]; |
| @@ -1167,16 +1121,13 @@ dtls1_buffer_message(SSL *s, int is_ccs) | |||
| 1167 | 1121 | ||
| 1168 | memcpy(frag->fragment, s->init_buf->data, s->init_num); | 1122 | memcpy(frag->fragment, s->init_buf->data, s->init_num); |
| 1169 | 1123 | ||
| 1170 | if ( is_ccs) | 1124 | if (is_ccs) { |
| 1171 | { | 1125 | OPENSSL_assert(s->d1->w_msg_hdr.msg_len + |
| 1172 | OPENSSL_assert(s->d1->w_msg_hdr.msg_len + | 1126 | ((s->version == DTLS1_VERSION) ? DTLS1_CCS_HEADER_LENGTH : 3) == (unsigned int)s->init_num); |
| 1173 | ((s->version==DTLS1_VERSION)?DTLS1_CCS_HEADER_LENGTH:3) == (unsigned int)s->init_num); | 1127 | } else { |
| 1174 | } | 1128 | OPENSSL_assert(s->d1->w_msg_hdr.msg_len + |
| 1175 | else | 1129 | DTLS1_HM_HEADER_LENGTH == (unsigned int)s->init_num); |
| 1176 | { | 1130 | } |
| 1177 | OPENSSL_assert(s->d1->w_msg_hdr.msg_len + | ||
| 1178 | DTLS1_HM_HEADER_LENGTH == (unsigned int)s->init_num); | ||
| 1179 | } | ||
| 1180 | 1131 | ||
| 1181 | frag->msg_header.msg_len = s->d1->w_msg_hdr.msg_len; | 1132 | frag->msg_header.msg_len = s->d1->w_msg_hdr.msg_len; |
| 1182 | frag->msg_header.seq = s->d1->w_msg_hdr.seq; | 1133 | frag->msg_header.seq = s->d1->w_msg_hdr.seq; |
| @@ -1191,38 +1142,37 @@ dtls1_buffer_message(SSL *s, int is_ccs) | |||
| 1191 | frag->msg_header.saved_retransmit_state.compress = s->compress; | 1142 | frag->msg_header.saved_retransmit_state.compress = s->compress; |
| 1192 | frag->msg_header.saved_retransmit_state.session = s->session; | 1143 | frag->msg_header.saved_retransmit_state.session = s->session; |
| 1193 | frag->msg_header.saved_retransmit_state.epoch = s->d1->w_epoch; | 1144 | frag->msg_header.saved_retransmit_state.epoch = s->d1->w_epoch; |
| 1194 | 1145 | ||
| 1195 | memset(seq64be,0,sizeof(seq64be)); | 1146 | memset(seq64be, 0, sizeof(seq64be)); |
| 1196 | seq64be[6] = (unsigned char)(dtls1_get_queue_priority(frag->msg_header.seq, | 1147 | seq64be[6] = (unsigned char)(dtls1_get_queue_priority(frag->msg_header.seq, |
| 1197 | frag->msg_header.is_ccs)>>8); | 1148 | frag->msg_header.is_ccs) >> 8); |
| 1198 | seq64be[7] = (unsigned char)(dtls1_get_queue_priority(frag->msg_header.seq, | 1149 | seq64be[7] = (unsigned char)(dtls1_get_queue_priority(frag->msg_header.seq, |
| 1199 | frag->msg_header.is_ccs)); | 1150 | frag->msg_header.is_ccs)); |
| 1200 | 1151 | ||
| 1201 | item = pitem_new(seq64be, frag); | 1152 | item = pitem_new(seq64be, frag); |
| 1202 | if ( item == NULL) | 1153 | if (item == NULL) { |
| 1203 | { | ||
| 1204 | dtls1_hm_fragment_free(frag); | 1154 | dtls1_hm_fragment_free(frag); |
| 1205 | return 0; | 1155 | return 0; |
| 1206 | } | 1156 | } |
| 1207 | 1157 | ||
| 1208 | #if 0 | 1158 | #if 0 |
| 1209 | fprintf( stderr, "buffered messge: \ttype = %xx\n", msg_buf->type); | 1159 | fprintf(stderr, "buffered messge: \ttype = %xx\n", msg_buf->type); |
| 1210 | fprintf( stderr, "\t\t\t\t\tlen = %d\n", msg_buf->len); | 1160 | fprintf(stderr, "\t\t\t\t\tlen = %d\n", msg_buf->len); |
| 1211 | fprintf( stderr, "\t\t\t\t\tseq_num = %d\n", msg_buf->seq_num); | 1161 | fprintf(stderr, "\t\t\t\t\tseq_num = %d\n", msg_buf->seq_num); |
| 1212 | #endif | 1162 | #endif |
| 1213 | 1163 | ||
| 1214 | pqueue_insert(s->d1->sent_messages, item); | 1164 | pqueue_insert(s->d1->sent_messages, item); |
| 1215 | return 1; | 1165 | return 1; |
| 1216 | } | 1166 | } |
| 1217 | 1167 | ||
| 1218 | int | 1168 | int |
| 1219 | dtls1_retransmit_message(SSL *s, unsigned short seq, unsigned long frag_off, | 1169 | dtls1_retransmit_message(SSL *s, unsigned short seq, unsigned long frag_off, |
| 1220 | int *found) | 1170 | int *found) |
| 1221 | { | 1171 | { |
| 1222 | int ret; | 1172 | int ret; |
| 1223 | /* XDTLS: for now assuming that read/writes are blocking */ | 1173 | /* XDTLS: for now assuming that read/writes are blocking */ |
| 1224 | pitem *item; | 1174 | pitem *item; |
| 1225 | hm_fragment *frag ; | 1175 | hm_fragment *frag; |
| 1226 | unsigned long header_length; | 1176 | unsigned long header_length; |
| 1227 | unsigned char seq64be[8]; | 1177 | unsigned char seq64be[8]; |
| 1228 | struct dtls1_retransmit_state saved_state; | 1178 | struct dtls1_retransmit_state saved_state; |
| @@ -1234,33 +1184,32 @@ dtls1_retransmit_message(SSL *s, unsigned short seq, unsigned long frag_off, | |||
| 1234 | */ | 1184 | */ |
| 1235 | 1185 | ||
| 1236 | /* XDTLS: the requested message ought to be found, otherwise error */ | 1186 | /* XDTLS: the requested message ought to be found, otherwise error */ |
| 1237 | memset(seq64be,0,sizeof(seq64be)); | 1187 | memset(seq64be, 0, sizeof(seq64be)); |
| 1238 | seq64be[6] = (unsigned char)(seq>>8); | 1188 | seq64be[6] = (unsigned char)(seq >> 8); |
| 1239 | seq64be[7] = (unsigned char)seq; | 1189 | seq64be[7] = (unsigned char)seq; |
| 1240 | 1190 | ||
| 1241 | item = pqueue_find(s->d1->sent_messages, seq64be); | 1191 | item = pqueue_find(s->d1->sent_messages, seq64be); |
| 1242 | if ( item == NULL) | 1192 | if (item == NULL) { |
| 1243 | { | ||
| 1244 | fprintf(stderr, "retransmit: message %d non-existant\n", seq); | 1193 | fprintf(stderr, "retransmit: message %d non-existant\n", seq); |
| 1245 | *found = 0; | 1194 | *found = 0; |
| 1246 | return 0; | 1195 | return 0; |
| 1247 | } | 1196 | } |
| 1248 | 1197 | ||
| 1249 | *found = 1; | 1198 | *found = 1; |
| 1250 | frag = (hm_fragment *)item->data; | 1199 | frag = (hm_fragment *)item->data; |
| 1251 | 1200 | ||
| 1252 | if ( frag->msg_header.is_ccs) | 1201 | if (frag->msg_header.is_ccs) |
| 1253 | header_length = DTLS1_CCS_HEADER_LENGTH; | 1202 | header_length = DTLS1_CCS_HEADER_LENGTH; |
| 1254 | else | 1203 | else |
| 1255 | header_length = DTLS1_HM_HEADER_LENGTH; | 1204 | header_length = DTLS1_HM_HEADER_LENGTH; |
| 1256 | 1205 | ||
| 1257 | memcpy(s->init_buf->data, frag->fragment, | 1206 | memcpy(s->init_buf->data, frag->fragment, |
| 1258 | frag->msg_header.msg_len + header_length); | 1207 | frag->msg_header.msg_len + header_length); |
| 1259 | s->init_num = frag->msg_header.msg_len + header_length; | 1208 | s->init_num = frag->msg_header.msg_len + header_length; |
| 1260 | 1209 | ||
| 1261 | dtls1_set_message_header_int(s, frag->msg_header.type, | 1210 | dtls1_set_message_header_int(s, frag->msg_header.type, |
| 1262 | frag->msg_header.msg_len, frag->msg_header.seq, 0, | 1211 | frag->msg_header.msg_len, frag->msg_header.seq, 0, |
| 1263 | frag->msg_header.frag_len); | 1212 | frag->msg_header.frag_len); |
| 1264 | 1213 | ||
| 1265 | /* save current state */ | 1214 | /* save current state */ |
| 1266 | saved_state.enc_write_ctx = s->enc_write_ctx; | 1215 | saved_state.enc_write_ctx = s->enc_write_ctx; |
| @@ -1269,34 +1218,32 @@ dtls1_retransmit_message(SSL *s, unsigned short seq, unsigned long frag_off, | |||
| 1269 | saved_state.session = s->session; | 1218 | saved_state.session = s->session; |
| 1270 | saved_state.epoch = s->d1->w_epoch; | 1219 | saved_state.epoch = s->d1->w_epoch; |
| 1271 | saved_state.epoch = s->d1->w_epoch; | 1220 | saved_state.epoch = s->d1->w_epoch; |
| 1272 | 1221 | ||
| 1273 | s->d1->retransmitting = 1; | 1222 | s->d1->retransmitting = 1; |
| 1274 | 1223 | ||
| 1275 | /* restore state in which the message was originally sent */ | 1224 | /* restore state in which the message was originally sent */ |
| 1276 | s->enc_write_ctx = frag->msg_header.saved_retransmit_state.enc_write_ctx; | 1225 | s->enc_write_ctx = frag->msg_header.saved_retransmit_state.enc_write_ctx; |
| 1277 | s->write_hash = frag->msg_header.saved_retransmit_state.write_hash; | 1226 | s->write_hash = frag->msg_header.saved_retransmit_state.write_hash; |
| 1278 | s->compress = frag->msg_header.saved_retransmit_state.compress; | 1227 | s->compress = frag->msg_header.saved_retransmit_state.compress; |
| 1279 | s->session = frag->msg_header.saved_retransmit_state.session; | 1228 | s->session = frag->msg_header.saved_retransmit_state.session; |
| 1280 | s->d1->w_epoch = frag->msg_header.saved_retransmit_state.epoch; | 1229 | s->d1->w_epoch = frag->msg_header.saved_retransmit_state.epoch; |
| 1281 | 1230 | ||
| 1282 | if (frag->msg_header.saved_retransmit_state.epoch == saved_state.epoch - 1) | 1231 | if (frag->msg_header.saved_retransmit_state.epoch == saved_state.epoch - 1) { |
| 1283 | { | ||
| 1284 | memcpy(save_write_sequence, s->s3->write_sequence, sizeof(s->s3->write_sequence)); | 1232 | memcpy(save_write_sequence, s->s3->write_sequence, sizeof(s->s3->write_sequence)); |
| 1285 | memcpy(s->s3->write_sequence, s->d1->last_write_sequence, sizeof(s->s3->write_sequence)); | 1233 | memcpy(s->s3->write_sequence, s->d1->last_write_sequence, sizeof(s->s3->write_sequence)); |
| 1286 | } | 1234 | } |
| 1287 | 1235 | ||
| 1288 | ret = dtls1_do_write(s, frag->msg_header.is_ccs ? | 1236 | ret = dtls1_do_write(s, frag->msg_header.is_ccs ? |
| 1289 | SSL3_RT_CHANGE_CIPHER_SPEC : SSL3_RT_HANDSHAKE); | 1237 | SSL3_RT_CHANGE_CIPHER_SPEC : SSL3_RT_HANDSHAKE); |
| 1290 | 1238 | ||
| 1291 | /* restore current state */ | 1239 | /* restore current state */ |
| 1292 | s->enc_write_ctx = saved_state.enc_write_ctx; | 1240 | s->enc_write_ctx = saved_state.enc_write_ctx; |
| 1293 | s->write_hash = saved_state.write_hash; | 1241 | s->write_hash = saved_state.write_hash; |
| 1294 | s->compress = saved_state.compress; | 1242 | s->compress = saved_state.compress; |
| 1295 | s->session = saved_state.session; | 1243 | s->session = saved_state.session; |
| 1296 | s->d1->w_epoch = saved_state.epoch; | 1244 | s->d1->w_epoch = saved_state.epoch; |
| 1297 | 1245 | ||
| 1298 | if (frag->msg_header.saved_retransmit_state.epoch == saved_state.epoch - 1) | 1246 | if (frag->msg_header.saved_retransmit_state.epoch == saved_state.epoch - 1) { |
| 1299 | { | ||
| 1300 | memcpy(s->d1->last_write_sequence, s->s3->write_sequence, sizeof(s->s3->write_sequence)); | 1247 | memcpy(s->d1->last_write_sequence, s->s3->write_sequence, sizeof(s->s3->write_sequence)); |
| 1301 | memcpy(s->s3->write_sequence, save_write_sequence, sizeof(s->s3->write_sequence)); | 1248 | memcpy(s->s3->write_sequence, save_write_sequence, sizeof(s->s3->write_sequence)); |
| 1302 | } | 1249 | } |
| @@ -1305,47 +1252,45 @@ dtls1_retransmit_message(SSL *s, unsigned short seq, unsigned long frag_off, | |||
| 1305 | 1252 | ||
| 1306 | (void)BIO_flush(SSL_get_wbio(s)); | 1253 | (void)BIO_flush(SSL_get_wbio(s)); |
| 1307 | return ret; | 1254 | return ret; |
| 1308 | } | 1255 | } |
| 1309 | 1256 | ||
| 1310 | /* call this function when the buffered messages are no longer needed */ | 1257 | /* call this function when the buffered messages are no longer needed */ |
| 1311 | void | 1258 | void |
| 1312 | dtls1_clear_record_buffer(SSL *s) | 1259 | dtls1_clear_record_buffer(SSL *s) |
| 1313 | { | 1260 | { |
| 1314 | pitem *item; | 1261 | pitem *item; |
| 1315 | 1262 | ||
| 1316 | for(item = pqueue_pop(s->d1->sent_messages); | 1263 | for(item = pqueue_pop(s->d1->sent_messages); item != NULL; |
| 1317 | item != NULL; item = pqueue_pop(s->d1->sent_messages)) | 1264 | item = pqueue_pop(s->d1->sent_messages)) { |
| 1318 | { | ||
| 1319 | dtls1_hm_fragment_free((hm_fragment *)item->data); | 1265 | dtls1_hm_fragment_free((hm_fragment *)item->data); |
| 1320 | pitem_free(item); | 1266 | pitem_free(item); |
| 1321 | } | ||
| 1322 | } | 1267 | } |
| 1268 | } | ||
| 1323 | 1269 | ||
| 1324 | 1270 | ||
| 1325 | unsigned char * | 1271 | unsigned char * |
| 1326 | dtls1_set_message_header(SSL *s, unsigned char *p, unsigned char mt, | 1272 | dtls1_set_message_header(SSL *s, unsigned char *p, unsigned char mt, |
| 1327 | unsigned long len, unsigned long frag_off, unsigned long frag_len) | 1273 | unsigned long len, unsigned long frag_off, unsigned long frag_len) |
| 1328 | { | 1274 | { |
| 1329 | /* Don't change sequence numbers while listening */ | 1275 | /* Don't change sequence numbers while listening */ |
| 1330 | if (frag_off == 0 && !s->d1->listen) | 1276 | if (frag_off == 0 && !s->d1->listen) { |
| 1331 | { | ||
| 1332 | s->d1->handshake_write_seq = s->d1->next_handshake_write_seq; | 1277 | s->d1->handshake_write_seq = s->d1->next_handshake_write_seq; |
| 1333 | s->d1->next_handshake_write_seq++; | 1278 | s->d1->next_handshake_write_seq++; |
| 1334 | } | 1279 | } |
| 1335 | 1280 | ||
| 1336 | dtls1_set_message_header_int(s, mt, len, s->d1->handshake_write_seq, | 1281 | dtls1_set_message_header_int(s, mt, len, s->d1->handshake_write_seq, |
| 1337 | frag_off, frag_len); | 1282 | frag_off, frag_len); |
| 1338 | 1283 | ||
| 1339 | return p += DTLS1_HM_HEADER_LENGTH; | 1284 | return p += DTLS1_HM_HEADER_LENGTH; |
| 1340 | } | 1285 | } |
| 1341 | 1286 | ||
| 1342 | 1287 | ||
| 1343 | /* don't actually do the writing, wait till the MTU has been retrieved */ | 1288 | /* don't actually do the writing, wait till the MTU has been retrieved */ |
| 1344 | static void | 1289 | static void |
| 1345 | dtls1_set_message_header_int(SSL *s, unsigned char mt, | 1290 | dtls1_set_message_header_int(SSL *s, unsigned char mt, |
| 1346 | unsigned long len, unsigned short seq_num, unsigned long frag_off, | 1291 | unsigned long len, unsigned short seq_num, unsigned long frag_off, |
| 1347 | unsigned long frag_len) | 1292 | unsigned long frag_len) |
| 1348 | { | 1293 | { |
| 1349 | struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; | 1294 | struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; |
| 1350 | 1295 | ||
| 1351 | msg_hdr->type = mt; | 1296 | msg_hdr->type = mt; |
| @@ -1353,21 +1298,21 @@ dtls1_set_message_header_int(SSL *s, unsigned char mt, | |||
| 1353 | msg_hdr->seq = seq_num; | 1298 | msg_hdr->seq = seq_num; |
| 1354 | msg_hdr->frag_off = frag_off; | 1299 | msg_hdr->frag_off = frag_off; |
| 1355 | msg_hdr->frag_len = frag_len; | 1300 | msg_hdr->frag_len = frag_len; |
| 1356 | } | 1301 | } |
| 1357 | 1302 | ||
| 1358 | static void | 1303 | static void |
| 1359 | dtls1_fix_message_header(SSL *s, unsigned long frag_off, | 1304 | dtls1_fix_message_header(SSL *s, unsigned long frag_off, |
| 1360 | unsigned long frag_len) | 1305 | unsigned long frag_len) |
| 1361 | { | 1306 | { |
| 1362 | struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; | 1307 | struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; |
| 1363 | 1308 | ||
| 1364 | msg_hdr->frag_off = frag_off; | 1309 | msg_hdr->frag_off = frag_off; |
| 1365 | msg_hdr->frag_len = frag_len; | 1310 | msg_hdr->frag_len = frag_len; |
| 1366 | } | 1311 | } |
| 1367 | 1312 | ||
| 1368 | static unsigned char * | 1313 | static unsigned char * |
| 1369 | dtls1_write_message_header(SSL *s, unsigned char *p) | 1314 | dtls1_write_message_header(SSL *s, unsigned char *p) |
| 1370 | { | 1315 | { |
| 1371 | struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; | 1316 | struct hm_header_st *msg_hdr = &s->d1->w_msg_hdr; |
| 1372 | 1317 | ||
| 1373 | *p++ = msg_hdr->type; | 1318 | *p++ = msg_hdr->type; |
| @@ -1378,33 +1323,32 @@ dtls1_write_message_header(SSL *s, unsigned char *p) | |||
| 1378 | l2n3(msg_hdr->frag_len, p); | 1323 | l2n3(msg_hdr->frag_len, p); |
| 1379 | 1324 | ||
| 1380 | return p; | 1325 | return p; |
| 1381 | } | 1326 | } |
| 1382 | 1327 | ||
| 1383 | unsigned int | 1328 | unsigned int |
| 1384 | dtls1_min_mtu(void) | 1329 | dtls1_min_mtu(void) |
| 1385 | { | 1330 | { |
| 1386 | return (g_probable_mtu[(sizeof(g_probable_mtu) / | 1331 | return (g_probable_mtu[(sizeof(g_probable_mtu) / |
| 1387 | sizeof(g_probable_mtu[0])) - 1]); | 1332 | sizeof(g_probable_mtu[0])) - 1]); |
| 1388 | } | 1333 | } |
| 1389 | 1334 | ||
| 1390 | static unsigned int | 1335 | static unsigned int |
| 1391 | dtls1_guess_mtu(unsigned int curr_mtu) | 1336 | dtls1_guess_mtu(unsigned int curr_mtu) |
| 1392 | { | 1337 | { |
| 1393 | unsigned int i; | 1338 | unsigned int i; |
| 1394 | 1339 | ||
| 1395 | if ( curr_mtu == 0 ) | 1340 | if (curr_mtu == 0) |
| 1396 | return g_probable_mtu[0] ; | 1341 | return g_probable_mtu[0]; |
| 1397 | 1342 | ||
| 1398 | for ( i = 0; i < sizeof(g_probable_mtu)/sizeof(g_probable_mtu[0]); i++) | 1343 | for (i = 0; i < sizeof(g_probable_mtu)/sizeof(g_probable_mtu[0]); i++) |
| 1399 | if ( curr_mtu > g_probable_mtu[i]) | 1344 | if (curr_mtu > g_probable_mtu[i]) |
| 1400 | return g_probable_mtu[i]; | 1345 | return g_probable_mtu[i]; |
| 1401 | 1346 | ||
| 1402 | return curr_mtu; | 1347 | return curr_mtu; |
| 1403 | } | 1348 | } |
| 1404 | 1349 | ||
| 1405 | void | 1350 | void |
| 1406 | dtls1_get_message_header(unsigned char *data, struct hm_header_st *msg_hdr) | 1351 | dtls1_get_message_header(unsigned char *data, struct hm_header_st *msg_hdr) { |
| 1407 | { | ||
| 1408 | memset(msg_hdr, 0x00, sizeof(struct hm_header_st)); | 1352 | memset(msg_hdr, 0x00, sizeof(struct hm_header_st)); |
| 1409 | msg_hdr->type = *(data++); | 1353 | msg_hdr->type = *(data++); |
| 1410 | n2l3(data, msg_hdr->msg_len); | 1354 | n2l3(data, msg_hdr->msg_len); |
| @@ -1412,41 +1356,41 @@ dtls1_get_message_header(unsigned char *data, struct hm_header_st *msg_hdr) | |||
| 1412 | n2s(data, msg_hdr->seq); | 1356 | n2s(data, msg_hdr->seq); |
| 1413 | n2l3(data, msg_hdr->frag_off); | 1357 | n2l3(data, msg_hdr->frag_off); |
| 1414 | n2l3(data, msg_hdr->frag_len); | 1358 | n2l3(data, msg_hdr->frag_len); |
| 1415 | } | 1359 | } |
| 1416 | 1360 | ||
| 1417 | void | 1361 | void |
| 1418 | dtls1_get_ccs_header(unsigned char *data, struct ccs_header_st *ccs_hdr) | 1362 | dtls1_get_ccs_header(unsigned char *data, struct ccs_header_st *ccs_hdr) { |
| 1419 | { | ||
| 1420 | memset(ccs_hdr, 0x00, sizeof(struct ccs_header_st)); | 1363 | memset(ccs_hdr, 0x00, sizeof(struct ccs_header_st)); |
| 1421 | 1364 | ||
| 1422 | ccs_hdr->type = *(data++); | 1365 | ccs_hdr->type = *(data++); |
| 1423 | } | 1366 | } |
| 1424 | 1367 | ||
| 1425 | int dtls1_shutdown(SSL *s) | 1368 | int |
| 1426 | { | 1369 | dtls1_shutdown(SSL *s) |
| 1370 | { | ||
| 1427 | int ret; | 1371 | int ret; |
| 1428 | #ifndef OPENSSL_NO_SCTP | 1372 | #ifndef OPENSSL_NO_SCTP |
| 1429 | if (BIO_dgram_is_sctp(SSL_get_wbio(s)) && | 1373 | if (BIO_dgram_is_sctp(SSL_get_wbio(s)) && |
| 1430 | !(s->shutdown & SSL_SENT_SHUTDOWN)) | 1374 | !(s->shutdown & SSL_SENT_SHUTDOWN)) { |
| 1431 | { | ||
| 1432 | ret = BIO_dgram_sctp_wait_for_dry(SSL_get_wbio(s)); | 1375 | ret = BIO_dgram_sctp_wait_for_dry(SSL_get_wbio(s)); |
| 1433 | if (ret < 0) return -1; | 1376 | if (ret < 0) |
| 1377 | return -1; | ||
| 1434 | 1378 | ||
| 1435 | if (ret == 0) | 1379 | if (ret == 0) |
| 1436 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN, 1, NULL); | 1380 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN, 1, NULL); |
| 1437 | } | 1381 | } |
| 1438 | #endif | 1382 | #endif |
| 1439 | ret = ssl3_shutdown(s); | 1383 | ret = ssl3_shutdown(s); |
| 1440 | #ifndef OPENSSL_NO_SCTP | 1384 | #ifndef OPENSSL_NO_SCTP |
| 1441 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN, 0, NULL); | 1385 | BIO_ctrl(SSL_get_wbio(s), BIO_CTRL_DGRAM_SCTP_SAVE_SHUTDOWN, 0, NULL); |
| 1442 | #endif | 1386 | #endif |
| 1443 | return ret; | 1387 | return ret; |
| 1444 | } | 1388 | } |
| 1445 | 1389 | ||
| 1446 | #ifndef OPENSSL_NO_HEARTBEATS | 1390 | #ifndef OPENSSL_NO_HEARTBEATS |
| 1447 | int | 1391 | int |
| 1448 | dtls1_process_heartbeat(SSL *s) | 1392 | dtls1_process_heartbeat(SSL *s) |
| 1449 | { | 1393 | { |
| 1450 | unsigned char *p = &s->s3->rrec.data[0], *pl; | 1394 | unsigned char *p = &s->s3->rrec.data[0], *pl; |
| 1451 | unsigned short hbtype; | 1395 | unsigned short hbtype; |
| 1452 | unsigned int payload; | 1396 | unsigned int payload; |
| @@ -1454,8 +1398,8 @@ dtls1_process_heartbeat(SSL *s) | |||
| 1454 | 1398 | ||
| 1455 | if (s->msg_callback) | 1399 | if (s->msg_callback) |
| 1456 | s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, | 1400 | s->msg_callback(0, s->version, TLS1_RT_HEARTBEAT, |
| 1457 | &s->s3->rrec.data[0], s->s3->rrec.length, | 1401 | &s->s3->rrec.data[0], s->s3->rrec.length, |
| 1458 | s, s->msg_callback_arg); | 1402 | s, s->msg_callback_arg); |
| 1459 | 1403 | ||
| 1460 | /* Read type and payload length first */ | 1404 | /* Read type and payload length first */ |
| 1461 | if (1 + 2 + 16 > s->s3->rrec.length) | 1405 | if (1 + 2 + 16 > s->s3->rrec.length) |
| @@ -1466,12 +1410,11 @@ dtls1_process_heartbeat(SSL *s) | |||
| 1466 | return 0; /* silently discard per RFC 6520 sec. 4 */ | 1410 | return 0; /* silently discard per RFC 6520 sec. 4 */ |
| 1467 | pl = p; | 1411 | pl = p; |
| 1468 | 1412 | ||
| 1469 | if (hbtype == TLS1_HB_REQUEST) | 1413 | if (hbtype == TLS1_HB_REQUEST) { |
| 1470 | { | ||
| 1471 | unsigned char *buffer, *bp; | 1414 | unsigned char *buffer, *bp; |
| 1472 | unsigned int write_length = 1 /* heartbeat type */ + | 1415 | unsigned int write_length = 1 /* heartbeat type */ + |
| 1473 | 2 /* heartbeat length */ + | 1416 | 2 /* heartbeat length */ + |
| 1474 | payload + padding; | 1417 | payload + padding; |
| 1475 | int r; | 1418 | int r; |
| 1476 | 1419 | ||
| 1477 | if (write_length > SSL3_RT_MAX_PLAIN_LENGTH) | 1420 | if (write_length > SSL3_RT_MAX_PLAIN_LENGTH) |
| @@ -1496,16 +1439,14 @@ dtls1_process_heartbeat(SSL *s) | |||
| 1496 | 1439 | ||
| 1497 | if (r >= 0 && s->msg_callback) | 1440 | if (r >= 0 && s->msg_callback) |
| 1498 | s->msg_callback(1, s->version, TLS1_RT_HEARTBEAT, | 1441 | s->msg_callback(1, s->version, TLS1_RT_HEARTBEAT, |
| 1499 | buffer, write_length, | 1442 | buffer, write_length, |
| 1500 | s, s->msg_callback_arg); | 1443 | s, s->msg_callback_arg); |
| 1501 | 1444 | ||
| 1502 | OPENSSL_free(buffer); | 1445 | OPENSSL_free(buffer); |
| 1503 | 1446 | ||
| 1504 | if (r < 0) | 1447 | if (r < 0) |
| 1505 | return r; | 1448 | return r; |
| 1506 | } | 1449 | } else if (hbtype == TLS1_HB_RESPONSE) { |
| 1507 | else if (hbtype == TLS1_HB_RESPONSE) | ||
| 1508 | { | ||
| 1509 | unsigned int seq; | 1450 | unsigned int seq; |
| 1510 | 1451 | ||
| 1511 | /* We only send sequence numbers (2 bytes unsigned int), | 1452 | /* We only send sequence numbers (2 bytes unsigned int), |
| @@ -1513,20 +1454,19 @@ dtls1_process_heartbeat(SSL *s) | |||
| 1513 | * sequence number */ | 1454 | * sequence number */ |
| 1514 | n2s(pl, seq); | 1455 | n2s(pl, seq); |
| 1515 | 1456 | ||
| 1516 | if (payload == 18 && seq == s->tlsext_hb_seq) | 1457 | if (payload == 18 && seq == s->tlsext_hb_seq) { |
| 1517 | { | ||
| 1518 | dtls1_stop_timer(s); | 1458 | dtls1_stop_timer(s); |
| 1519 | s->tlsext_hb_seq++; | 1459 | s->tlsext_hb_seq++; |
| 1520 | s->tlsext_hb_pending = 0; | 1460 | s->tlsext_hb_pending = 0; |
| 1521 | } | ||
| 1522 | } | 1461 | } |
| 1462 | } | ||
| 1523 | 1463 | ||
| 1524 | return 0; | 1464 | return 0; |
| 1525 | } | 1465 | } |
| 1526 | 1466 | ||
| 1527 | int | 1467 | int |
| 1528 | dtls1_heartbeat(SSL *s) | 1468 | dtls1_heartbeat(SSL *s) |
| 1529 | { | 1469 | { |
| 1530 | unsigned char *buf, *p; | 1470 | unsigned char *buf, *p; |
| 1531 | int ret; | 1471 | int ret; |
| 1532 | unsigned int payload = 18; /* Sequence number + random bytes */ | 1472 | unsigned int payload = 18; /* Sequence number + random bytes */ |
| @@ -1534,25 +1474,22 @@ dtls1_heartbeat(SSL *s) | |||
| 1534 | 1474 | ||
| 1535 | /* Only send if peer supports and accepts HB requests... */ | 1475 | /* Only send if peer supports and accepts HB requests... */ |
| 1536 | if (!(s->tlsext_heartbeat & SSL_TLSEXT_HB_ENABLED) || | 1476 | if (!(s->tlsext_heartbeat & SSL_TLSEXT_HB_ENABLED) || |
| 1537 | s->tlsext_heartbeat & SSL_TLSEXT_HB_DONT_SEND_REQUESTS) | 1477 | s->tlsext_heartbeat & SSL_TLSEXT_HB_DONT_SEND_REQUESTS) { |
| 1538 | { | 1478 | SSLerr(SSL_F_DTLS1_HEARTBEAT, SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT); |
| 1539 | SSLerr(SSL_F_DTLS1_HEARTBEAT,SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT); | ||
| 1540 | return -1; | 1479 | return -1; |
| 1541 | } | 1480 | } |
| 1542 | 1481 | ||
| 1543 | /* ...and there is none in flight yet... */ | 1482 | /* ...and there is none in flight yet... */ |
| 1544 | if (s->tlsext_hb_pending) | 1483 | if (s->tlsext_hb_pending) { |
| 1545 | { | 1484 | SSLerr(SSL_F_DTLS1_HEARTBEAT, SSL_R_TLS_HEARTBEAT_PENDING); |
| 1546 | SSLerr(SSL_F_DTLS1_HEARTBEAT,SSL_R_TLS_HEARTBEAT_PENDING); | ||
| 1547 | return -1; | 1485 | return -1; |
| 1548 | } | 1486 | } |
| 1549 | 1487 | ||
| 1550 | /* ...and no handshake in progress. */ | 1488 | /* ...and no handshake in progress. */ |
| 1551 | if (SSL_in_init(s) || s->in_handshake) | 1489 | if (SSL_in_init(s) || s->in_handshake) { |
| 1552 | { | 1490 | SSLerr(SSL_F_DTLS1_HEARTBEAT, SSL_R_UNEXPECTED_MESSAGE); |
| 1553 | SSLerr(SSL_F_DTLS1_HEARTBEAT,SSL_R_UNEXPECTED_MESSAGE); | ||
| 1554 | return -1; | 1491 | return -1; |
| 1555 | } | 1492 | } |
| 1556 | 1493 | ||
| 1557 | /* Check if padding is too long, payload and padding | 1494 | /* Check if padding is too long, payload and padding |
| 1558 | * must not exceed 2^14 - 3 = 16381 bytes in total. | 1495 | * must not exceed 2^14 - 3 = 16381 bytes in total. |
| @@ -1583,19 +1520,18 @@ dtls1_heartbeat(SSL *s) | |||
| 1583 | RAND_pseudo_bytes(p, padding); | 1520 | RAND_pseudo_bytes(p, padding); |
| 1584 | 1521 | ||
| 1585 | ret = dtls1_write_bytes(s, TLS1_RT_HEARTBEAT, buf, 3 + payload + padding); | 1522 | ret = dtls1_write_bytes(s, TLS1_RT_HEARTBEAT, buf, 3 + payload + padding); |
| 1586 | if (ret >= 0) | 1523 | if (ret >= 0) { |
| 1587 | { | ||
| 1588 | if (s->msg_callback) | 1524 | if (s->msg_callback) |
| 1589 | s->msg_callback(1, s->version, TLS1_RT_HEARTBEAT, | 1525 | s->msg_callback(1, s->version, TLS1_RT_HEARTBEAT, |
| 1590 | buf, 3 + payload + padding, | 1526 | buf, 3 + payload + padding, |
| 1591 | s, s->msg_callback_arg); | 1527 | s, s->msg_callback_arg); |
| 1592 | 1528 | ||
| 1593 | dtls1_start_timer(s); | 1529 | dtls1_start_timer(s); |
| 1594 | s->tlsext_hb_pending = 1; | 1530 | s->tlsext_hb_pending = 1; |
| 1595 | } | 1531 | } |
| 1596 | 1532 | ||
| 1597 | OPENSSL_free(buf); | 1533 | OPENSSL_free(buf); |
| 1598 | 1534 | ||
| 1599 | return ret; | 1535 | return ret; |
| 1600 | } | 1536 | } |
| 1601 | #endif | 1537 | #endif |
